Categories
Apple Windows

Joost mag het weten

They might not know it, but the name of the new p2p video over internet service called Joost (before it was called The Venice Project) actually has a meaning in Dutch. Joost is both a dutch name and part of a saying that you can use whenever someone asks you a question that you don’t know the answer to.

Joost mag het weten ! = Joost may know ! (where Joost is actually the devil).

I received an invitation by a friend yesterday (Thanks Kam!) to testdrive the new Joost beta (it exists for Mac or for Windows clients). You simply download the application and then start it up after which you register using a simple registration proces involving your email address (tip : use the email address you received the invitiation on).

If you have a firewall like Little Snitch or ZoneAlarm running on your computer, note that this is a peer-to-peer application and that it setups a mega-boatload of connections to other computers on the internet. From what I saw in Little Snitch, it certainly uses outbound tcp ports 80 (http), 443 (hhtps) and udp port 33333. You might need to open more ports, in the doc it states that if you want to use chat this uses tcp port 5223 both inbound and outbound.

You are then switched to full screen and immediately the introductory channel “Joost suggests” starts playing selections from the different content channels. There’s an anime channe (BONGO) and a sci-fi channel and a National Geographic channel and a sports channel and quite a few others.

It’s not immediately clear how to escape from the full screen mode, but if you move your mouse inside an overlay menu will popup with clearly defined icons – it won’t take you too much guesswork to find out how to window the screen or select another channel, most is self-explanatory. I proceeded to switch to the anime channel and selecting an episode I wanted to watch.

If you select a channel, it will start playing whatever is normally up next and will loop around when it reaches the end of the channel. Sorta like a normal tv, if you leave it on you get new content.

I was pleasantly surprised by the video quality – on my 24inch iMac the screen was probably to big for full-screen resolution, but it beat hands down the quality of the other video streams I received from the internet before.

When I was watching Ikki Tousen (Battle Vixen something, an anime involving a scantily dressed super-martial-arts girl showing gratuitous shots of her underwear every 15 seconds or so) sometimes the pixellation was very clear.

When I scaled it down to a window, it was pixel-perfect quality, my guess would be 640×480 size. Full-screen again in the sci-fi channel there was again some pixelation and one time some serious hiccup snowed the whole screen, but this cleared up in about a second or so.

For a free service, I can live with this. It’s not totally free, as you do get some adverts just before the episode starts (but I wasn’t sure if it was seperate from the episode itself or if it was actually part of the episode) and during the episode show. These in the middle adverts are unannounced – suddenly the screen goes black and you are thinking that the connection was cut when suddenly it starts up again and shows you the advert – it’s about 30 seconds long, so it’s tolerable enough.

The adverts itself don’t seem to have been targeted as yet. As far as I know, T-mobile is not available in Belgium (but is connected with Proximus), and the other one about candy I didn’t recognise at all.

Overall, I find Joost very intriguing and will continue to explore it (especially as I am a sucker for anime and sci-fi) but there is one caveat : it consumes up a LOT of bandwidth.

One hour of Joost video means you download about 320MB and upload (remember ? this is a peer2peer application) about 105MB.

Depending on how popular the content is, this can drop a bit but one thing is clear : anybody with a capped line (meaning that you can only download or upload a number of Gigabytes) will need to check regularly (ie. like a hawk) to see if he or she reached the limit (and stop before).

I’m in luck, since my ISP (Telenet) just consolidated it’s capping : before I could upload 2GB and download 10MB, since April they have declared that is is all one and I now have 12GB per month to do with as I please. Had I tried Joost then, I would have quickly used up my uploading limit.

One strange thing happened : after shutting down the Joost program on my mac, I tried regular surfing, and websites would load very,very slowly for a while. Either this is caused by extra traffic still trying to come my way or Telenet has implemented some traffic-shaping that limits your bandwidth after you use your line to the full in order to recoup some of the effort in sending you so much data.

Since I’m (for now) just about the only user at home, I rarely reach that capped 12GB limit. But if you have a few young un’s at home that like to download stuff or watch Joost or you yourself are a heavy p2p user, you should take care to avoid a nasty surprise and monitor your usage – almost daily.

A tip for window users : after watching, you need to shut down the Joost service in the lower right toolbar otherwise it will continue to send and receive data !

Categories
Blog News

Tom and Sam : the same yet not the same

This post is more for my own benefit (and perhaps theirs, if this blog survives until they are grown up and can read english). So ignore it if you are interested in technical things, I promise I’ll write some more technical posts here the coming months.

Tom is now 5 years old and Sam is nearly 2. Time for a short look at both. They are both considerable alike in many ways, doing some things exactly the same way, looking at something the same way, and yet in other things they are 2 completely different beings.

Tom at 5 years old has changed from a chubby baby to a very lean and tall child. Lots of brown-gold hair and deep-brown big eyes make him a natural attraction for other children. The school teacher told me that everybody wants to sits next to Tom, and it sometimes devolves into an argument.

[This is something in which he differs from me – I wasn’t one from the popular kids, and it concerns me that I won’t be able to help him how to deal with this. How do you explain to your kid that it’s a privilege that children want to sit next to you and that you should treat them correctly ?]

He’s also very sensitive, sometimes too much so. I remember myself as being as sensitive as him, and it makes me afraid for him that he will be picked on, yet I mustn’t think that his experiences will be the same as mine. Tom is also a very bright and intelligent child, who asks lots of questions that we always try to answer honestly. If it is too complex, we’ll tell him so and promise to explain it to him later.

Sam has grown into an inquisitive and precocious child : not yet 2 years old, he emulates the things his brother does as much as possible. Already he no longer wants a bottle; he drinks from a proper (plastic) cup, just like his brother. He dearly, DEARLY loves soup – any soup you give him he will eat. Foodwise he likes to eat his favourite things (chocolate !!) and has a very distinct and round tummy. If he likes what he eats, he gobbles it up, often filling his mouth to capacity instead of taking bites. It isn’t surprising that he weighs more than Tom did at his age !

Because he has a brother, he learns things much faster than Tom did.

Tom is his idol, he adores him and follows him around. We noticed this recently when he went crazy after not seeing Tom for a few days. He can also be a real pest to him, taking his favorite toy and running off with it; Tom usually stands there crying; lately he’s going on active chase behind him (we encourage him to come up for his own rights). We try too intervene not too much, although I have a really hard time seeing them push and pull like that (no blows allowed upon dire punishment by dad or mom).

Sam still wakes up from time to time at night, which is taxing, but at least it is less and less. He is very sensitive to respiratory infection though, during the winter we sat him at the inhalator every evening. Even now he sometimes wakes up coughing…

While Tom is very cautious and will ask us for permission before exploring, Sam loves to explore, to the point where we need to keep an eye on him – he doesn’t care if we are following or not, he’s off to explore as much as he can. He’s also less affected by pain; he falls and gets up without crying most of the time. I hope that Tom and Sam will cross-pollinate : that Tom will learn to explore without fear and that Sam will learn cautioness.

It’s been a wonderful experience so far for both Dolores and me. Sometimes I find it hard to believe that is us that have gotten these 2 delightful children and the privilege to educate them in the way of living…

Categories
Apple Programming

Mac Automator

I discovered a new function in the mac ‘automater‘ – the graphical GUI tool that allows you to drag-n-drop parts to make a batch program.

You can actually save a created automator script as a plugin – the most useful in this case would be an iCal plugin. This allows you for example to create a script that can be launched at certain times (but your computer needs to be awake for it work, though).

Very cool – I used to do this via Cronnix, but this is better.

There’s actually heaps and heaps of automator actions that are becoming available all the time. It’s great ! You can create an automator script that will

  • import your photos from your camera
  • rename and resize them (if you have the correct programs installed)
  • and will upload them to your website
  • and create a backup .dmg file, ready to be archived on cd or dvd

I loooooooove my mac !

Categories
Apple Hardware Links TechScience Future

Using RFID to configure your wireless network

Apple has gotten a bright idea (and patented it right away too) : put a Radio Frequency ID (RFID) chip in your networking device, and bring them in close proximity to each other.

They’ll recognise each other, and can then configure the rest of the wireless network setup themselves : an extract from the MacRumors site :

The system describes using RFID tags in networking equipment that would communicate basic configuration settings when the devices got close to one another. The devices would then be able to establish a rudimentary network based on that information and be able to automatically finish setting up a more complex and secure wireless network.

Personally, I think it’s a damn cool idea, one of those “slap-your-forehead and wonder why nobody thought of this before” ideas…

I can already see it before me : you’ve bought a new laptop, you come home and unbox it, and bring it close to your router during the network setup. They see it each other and immediately set themselves up using the correct protocols and keys.

Still, two things need to be cleared up : one, RFID chips in their current state are notoriously unsecure, so Apple will need to secure them in one way or another, and two, there has to be a mechanism to agree on the router that you want to add a new client (a button to press ?).

Categories
Blog News

Tom is learning to ride a bike… while Sam is learning lingo.

While Sam is learning words all the time (not very pronounceable, but still, he’s got his own lingo by now), Tom is busy learning to cycle on his superbike. He’s really very persistent and despite multiple falls (cushioned by his helmet, luckely) he continues to advance, and is not nearly so erratic as in the beginning.

When he first started without his training wheels he went everywhere he looked, except that he forgot to look straight ahead where he was going.

Still he has been having a blast, pity that our garden isn’t really suited for bike-riding or he would be riding all over it. As it is, we go around the church or visit the Haller bos where there are no cars.

I’m really proud of him, and his don’t-give-up attitude !

Categories
Blog News

Spammity Spam

I just noticed that Akismet has blocked 5627 spam comments on my blog.

Phew. Without that plugin, I would have closed up my comments long ago, making this just another static website on the internet, not even giving the illusion that a comment could be made by someone.

Thank you, developers of Akismet !

Categories
Gaming Links

So yes, I've got a Wii

A friend of mine sent me this link to a google video. It’s a spoof on the mac adverts, this time between the PS3 and the Wii.

And now you know why I have a Wii.

Categories
Blog News

Another new theme – K2 this time

K2 theme

I keep finding all these greatlooking new themes, but then I usually discover that the developers behind it haven’t really finished it, or want to get paid to finish it, or really couldn’t care less about finishing it, or don’t have the time to finish it, or are waiting on the original theme author to finish it so they can adapt it, etcetera.

Okay, okay, so I’m getting fed up looking for a new theme. Preferably 3-column based, widget ready with the possibility to change colors and change headers.

Mind ya, the themes being free I can’t actually really complain about it.

But for just once I would like to find a nice theme that I like that is actually finished, or where someone makes some effort to finish it.

As a theme developer here’s a good rule for you – don’t just throw it out on the internet expecting everyone to use it without getting comments on errors, or on how it could be made better, or questions on how to adapt it. If you decide to release a new theme, either indicate clearly that it’s a beta theme and you want comments (obviously) or that it is finished ‘as is’.

As lots of themes seem to be based on or around the K2 theme, I’ve installed that. It’s been around for a long time, seems to get lots of support, and you can write your own CSS stylesheets. Plus it seems as flexible as a Chinese acrobatic circus performer, allowing you to modify pretty much everything you want.

Maybe with this I can actually create my own adaption to suit my needs. Scratch my itch, so to speak.

Categories
Blog News

NTLM proxy authentication

In case you are stuck behind a firewall that uses NTLM proxy authentication, and the programs that you want to use don’t know how to deal with that, the following can help you out.

The NTLM authorization proxy server (Sourceforge project) is a local proxy that sits between your program and the NTLM proxy and does the authentication for you. It’s written in Python, so you do need to have that installed (there are quite a few other NTLM authorization servers written in other languages around, though).

Simply configure the server.cfg file with the correct NTLM info (you can leave the password blank so it asks you for it upon started, more secure) and launch it in an open dos window. By default, it disallows other clients connecting to your pc, although it does have that option.

You then launch your other (python or other) program in another dos window, where you do a ‘set HTTP_PROXY=127.0.0.1:5865’ so that it redirects to the ntlm authentication proxy.

Works like a charm !

Categories
Blog News

Belgian Domain names divided by Community

I just found an interesting link on the Inquierer : a link to a dynamically generated map of Belgium that shows the domains registered to Belgian people, divided up by location.

It shows some very interesting things :

  • Using the above link, you can see that per commune more are registered in Flanders then in Wallonie.
  • If you change the selection to show per inhabitant of the commune, it shows up even more clearly that there is a difference between Flanders and Wallonie.

I just wish they would also show how many Dutch are holding on to .be names… I know of a few that are holding on to a lot of domain names.