Thursday, September 29, 2011

An inquiry into the finer points of translation


Is That a Fish in Your Ear? by David Bellos - review

An inquiry into the finer points of translation
Sign with Chinese characters translated into English as 'On meeting, don't interrupt please'
Photograph: James Hardy/Getty Images/PhotoAlto
Michael Hofmann

The Guardian, Thu 22 Sep 2011 22.55 BST

A frolicsome cover, and a title and subtitle that perform in two different registers of cool, mask a disquisition of remarkable freshness on language, speech and translation. In short, punchy, instructive chapters that take in such things as linguistics, philosophy, dictionaries, machine translation, Bible translations, international law, the Nuremberg trials, the European Union and the rise of simultaneous interpreting ("the Soviet delegate has just made a joke"), David Bellos, Princeton professor and translator of Georges Perec, Ismail Kadare and others, makes a maximalist case for translation as perhaps the definitive human activity.
The great Australian poet Les Murray says simply: "We are a language species." There are some 7,000 languages currently in use in the world. Were there to be parity among them – which of course there isn't – that would give rise to 25 million different pairs of languages, and therefore twice as many "potentially separate translation practices"; French into English not being the same as English into French. Suddenly, a new 49 million-ply international industry looms. In fact, though, there are only around 50 languages that participate significantly in the give and take of translation – resulting in a paltry 2,500 language relationships (thus winnowing the field by a factor of a handy 20,000) – and those not particularly equally.
There is a top table of a dozen or so languages (Chinese, Hindi, Arabic, Spanish, and so on) which will obtain access to most of the world for you, and then there is English, which is the "inter-language" of choice. (Bellos has a faible for technical terms, and luckily another one for explaining them.) For some reason – Hollywood, science, military alliances, tourism, pop music, the web – it's most people's favourite alternative language. "The reasons why English has made a clean sweep [...] are not straightforward. Among them we cannot possibly include the unfortunate but widespread idea that English is simpler than other languages." It's a very typical Bellos notion, that of the effective wrong idea.
Of the million translated books listed by Unesco since its inception, fully one tenth are translated into English, and a staggering two thirds from English. This means (at least) two things: books written in English are at an enormous advantage against books written in any other language; and "whatever language you write in, the translation that counts is the English one". English is the floor, the language of international competition, the language of visibility. Sans English, you do not pass go. Sans English, there is no go.
It also means that in the field of translations, English is in play fully three-quarters of the time. Who knew? Really, it ought to mean that we have a keen sense of our good fortune; that (as befits a trading nation and an island state) we are comfortable with the idea of translation, knowing as we do that our books have an absurdly easy time of it abroad, and that we are kept tolerably well supplied from other languages; that we devote a respectable amount of thought to the commerce of books and ideas through a jostle of languages. That, to adapt one of Bellos's eccentric and wonderful heroes, a Francophone writer with the nom de plume of Antoine Volodine, we revere English not as the language of Byron and Shakespeare and JK Rowling, but as the ultimate repository of, say, Eco and Remarque and Kawabata. Instead of which, translation is a dirty secret, and the level of thinking about it ought to be an embarrassment. (That's not Bellos, by the way, it's me.)
Because Bellos seems to have that rare and wonderful thing, a sunny, Scotch (or Scotch-educated) temperament. There may be no particular reason for things to be the way they are – "the solar structure of the global book world wasn't designed by anyone"; he points it out, and moves on. He doesn't accuse, doesn't lament, doesn't gripe. The terrain is fraught with misconceptions, many of them ancient and indurated. He clears away a few: "The Great Eskimo Vocabulary Hoax" (that's the "hundred words for snow" idea to you); the canard of fidelity; the "no substitute for the original" prejudice against translation (mostly – though you don't find him saying so – from people who have never learned a language or crossed a street to read an author); the idea of languages as settled, finite things whose natural habitat is dictionaries (as if wild animals came from zoos); the idea of language as separate from speech (this too he has a label for: "scriptism"); the idea that Robert Frost ever said anything like "poetry is what gets lost in translation" (it was news to me too that he hadn't).
He doesn't make translating appear any harder than it is, or better than it is. He describes his work as rewriting foreign books into something he engagingly calls "English-minus" – English with the least possible amount of local or regional or national variations, so that it can be read all over the (English-speaking) world. Literary translators "don't have too hard a time", he says. "Using one word for another isn't special, it's what [people] do all the time." And then, for the T-shirt: "Translators just do it in two languages."
When Bellos finally settles on a thing for a translation to be, it doesn't come trailing philosophical clouds of glory and ingenuity. In that empirical, British, stone-kicking way, finding a dauntingly simple word for something almost indescribable, he asks that it be "a match". I could say anyone with an interest in translation should read Is That a Fish, but there wouldn't be very much point; instead, anyone with no interest in translation, please read David Bellos's brilliant book.
Michael Hofmann's Selected Poems is published by Faber.



Friday, March 25, 2011

Forged degree racket busted



— PHOTO: CH. VIJAYA BHASKAR

Big Catch: ACP A. Subba Rao displays forged certificates at a press conference in Vijayawada on Friday.
VIJAYAWADA: A seven-member gang producing forged degrees of Acharya Nagarjuna University has been busted by the police following a complaint lodged by the Hyderabad-based United States Consulate pertaining to veracity of an original certificate.
Chennupati Nitish, a Vijayawada student, had applied for a US visa and produced a forged B.Tech provisional certificate and marks memo of the ANU. The US Consulate officials grew suspicious when they found that the certificate showed the candidate having passed out of the ANU Campus Engineering College, which was established only a year ago.
The police on Friday arrested all the seven accused, but the beneficiary student, Nitish of Vasavi Nagar in the city, was still absconding.
Producing the accused before the media, Assistant Commissioner of Police (Central) A. Subba Rao said that they began investigating the case on March 17 on receiving a complaint and apprehended the brain behind the operation, M. Harish, along with his accomplices and recovered a computer and some original blank certificates of the university.
On interrogation, the police found that the gang had sold four certificates for Rs.35,000 each to four students – Ch. Nitish, Ahmed, Sriram and Pavan Kumar. All the four had studied B.Tech but failed.
Two attenders of the ANU press, K. Kiran and Syed Authullah, were arrested, as they stole the blank original certificates and received Rs.7,000 for each one from the main accused Harish, the ACP said. The police also arrested K. Gopi, G. Ganesh Babu and Lakshman Kumar, who allegedly assisted Harish in preparing the forged certificates. All the accused would be produced in the court on Saturday.

Monday, March 21, 2011

Turning Off Google Eagle Eye | BLOGGERMIND

Wednesday, February 23, 2011

4G network 'will create GPS dead zones across the US' - tech - 22 February 2011 - New Scientist

4G network 'will create GPS dead zones across the US' - tech - 22 February 2011 - New Scientist

4G network 'will create GPS dead zones across the US'

Bumpy road ahead for satnavs? (Image: Mario Beauregard/The Canadian Press/PA)

Bumpy road ahead for satnavs? (Image: Mario Beauregard/The Canadian Press/PA)

WHAT would you rather have - a superfast data connection on your cellphone, or a reliable GPS signal to pinpoint your location? If a plan to install a network of base stations for the new 4G mobile wireless protocol goes ahead, it may mean you can have one but not the other.

GPS satellites transmit their navigation signals in the range 1559 to 1610 megahertz. Telecoms firm LightSquared of Reston, Virginia, has long communicated with its satellites using low-power signals in the adjacent frequency band, from 1525 to 1559 MHz, part of the "L band". Despite the closeness of the frequencies, satnav receivers have so far operated without any interference problems.

But in January, the US Federal Communications Commission (FCC) gave preliminary approval to a plan by LightSquared to build 40,000 new 4G base stations on the ground. These stations would broadcast much stronger signals in the 1525 to 1559 MHz range, to link to cellphones.

Based on lab simulations of the new transmissions, Scott Burgett and Bronson Hokuf, engineers with satnav manufacturer Garmin International in Olathe, Kansas, say this will seriously damage GPS reception. In a report to the FCC last month, they say that overlaps between the two systems are inevitable, and that this "will result in widespread, severe GPS jamming [and] will deny GPS service over vast areas of the United States".

Jeff Carlisle of LightSquared says it is the GPS receivers, not his company's base stations, that are at fault. "The issue is that some GPS receivers may be able to see into the L band where we operate," he told New Scientist.

The stakes are high. By 2015, LightSquared expects to spend $6 to $8 billion to complete the network, which promises to bring download speeds of 5 to 10 megabits per second to cellphone users. Meanwhile, over a billion GPS receivers are in use worldwide.

LightSquared has until 25 February to submit a plan to the FCC for working with the GPS industry and federal agencies to analyse interference issues; a final report detailing a solution is due by 15 June. LightSquared wants all future tests to be performed with real transmitters rather than simulators.

Friday, February 18, 2011

Encrypting Phone Storage and Transmission? (2011 Version) - Slashdot

Thursday, February 17, 2011

New Hacking Tools Pose Bigger Threats to Wi-Fi Users - NYTimes.com

February 16, 2011

New Hacking Tools Pose Bigger Threats to Wi-Fi Users

You may think the only people capable of snooping on your Internet activity are government intelligence agents or possibly a talented teenage hacker holed up in his parents’ basement. But some simple software lets just about anyone sitting next to you at your local coffee shop watch you browse the Web and even assume your identity online.

“Like it or not, we are now living in a cyberpunk novel,” said Darren Kitchen, a systems administrator for an aerospace company in Richmond, Calif., and the host of Hak5, a video podcast about computer hacking and security. “When people find out how trivial and easy it is to see and even modify what you do online, they are shocked.”

Until recently, only determined and knowledgeable hackers with fancy tools and lots of time on their hands could spy while you used your laptop or smartphone at Wi-Fi hot spots. But a free program called Firesheep, released in October, has made it simple to see what other users of an unsecured Wi-Fi network are doing and then log on as them at the sites they visited.

Without issuing any warnings of the possible threat, Web site administrators have since been scrambling to provide added protections.

“I released Firesheep to show that a core and widespread issue in Web site security is being ignored,” said Eric Butler, a freelance software developer in Seattle who created the program. “It points out the lack of end-to-end encryption.”

What he means is that while the password you initially enter on Web sites like Facebook, Twitter, Flickr, Amazon, eBay and The New York Times is encrypted, the Web browser’s cookie, a bit of code that that identifies your computer, your settings on the site or other private information, is often not encrypted. Firesheep grabs that cookie, allowing nosy or malicious users to, in essence, be you on the site and have full access to your account.

More than a million people have downloaded the program in the last three months (including this reporter, who is not exactly a computer genius). And it is easy to use.

The only sites that are safe from snoopers are those that employ the cryptographic protocol transport layer security or its predecessor, secure sockets layer, throughout your session. PayPal and many banks do this, but a startling number of sites that people trust to safeguard their privacy do not. You know you are shielded from prying eyes if a little lock appears in the corner of your browser or the Web address starts with “https” rather than “http.”

“The usual reason Web sites give for not encrypting all communication is that it will slow down the site and would be a huge engineering expense,” said Chris Palmer, technology director at the Electronic Frontier Foundation, an electronic rights advocacy group based in San Francisco. “Yes, there are operational hurdles, but they are solvable.”

Indeed, Gmail made end-to-end encryption its default mode in January 2010. Facebook began to offer the same protection as an opt-in security feature last month, though it is so far available only to a small percentage of users and has limitations. For example, it doesn’t work with many third-party applications.

“It’s worth noting that Facebook took this step, but it’s too early to congratulate them,” said Mr. Butler, who is frustrated that “https” is not the site’s default setting. “Most people aren’t going to know about it or won’t think it’s important or won’t want to use it when they find out that it disables major applications.”

Joe Sullivan, chief security officer at Facebook, said the company was engaged in a “deliberative rollout process,” to access and address any unforeseen difficulties. “We hope to have it available for all users in the next several weeks,” he said, adding that the company was also working to address problems with third-party applications and to make “https” the default setting.

Many Web sites offer some support for encryption via “https,” but they make it difficult to use. To address these problems, the Electronic Frontier Foundation in collaboration with the Tor Project, another group concerned with Internet privacy, released in June an add-on to the browser Firefox, called Https Everywhere. The extension, which can be downloaded at eff.org/https-everywhere, makes “https” the stubbornly unchangeable default on all sites that support it.

Since not all Web sites have “https” capability, Bill Pennington, chief strategy officer with the Web site risk management firm WhiteHat Security in Santa Clara, Calif., said: “I tell people that if you’re doing things with sensitive data, don’t do it at a Wi-Fi hot spot. Do it at home.”

But home wireless networks may not be all that safe either, because of free and widely available Wi-Fi cracking programs like Gerix WiFi Cracker, Aircrack-ng and Wifite. The programs work by faking legitimate user activity to collect a series of so-called weak keys or clues to the password. The process is wholly automated, said Mr. Kitchen at Hak5, allowing even techno-ignoramuses to recover a wireless router’s password in a matter of seconds. “I’ve yet to find a WEP-protected network not susceptible to this kind of attack,” Mr. Kitchen said.

A WEP-encrypted password (for wired equivalent privacy) is not as strong as a WPA (or Wi-Fi protected access) password, so it’s best to use a WPA password instead. Even so, hackers can use the same free software programs to get on WPA password-protected networks as well. It just takes much longer (think weeks) and more computer expertise.

Using such programs along with high-powered Wi-Fi antennas that cost less than $90, hackers can pull in signals from home networks two to three miles away. There are also some computerized cracking devices with built-in antennas on the market, like WifiRobin ($156). But experts said they were not as fast or effective as the latest free cracking programs, because the devices worked only on WEP-protected networks.

To protect yourself, changing the Service Set Identifier or SSID of your wireless network from the default name of your router (like Linksys or Netgear) to something less predictable helps, as does choosing a lengthy and complicated alphanumeric password.

Setting up a virtual private network, or V.P.N., which encrypts all communications you transmit wirelessly whether on your home network or at a hot spot, is even more secure. The data looks like gibberish to a snooper as it travels from your computer to a secure server before it is blasted onto the Internet.

Popular V.P.N. providers include VyperVPN, HotSpotVPN and LogMeIn Hamachi. Some are free; others are as much as $18 a month, depending on how much data is encrypted. Free versions tend to encrypt only Web activity and not e-mail exchanges.

However, Mr. Palmer at the Electronic Frontier Foundation blames poorly designed Web sites, not vulnerable Wi-Fi connections, for security lapses. “Many popular sites were not designed for security from the beginning, and now we are suffering the consequences,” he said. “People need to demand ‘https’ so Web sites will do the painful integration work that needs to be done.”

Saturday, January 08, 2011

Even though the investigations are belated...?!

On Aseemananda Case : RSS Hand

Date:
8 January 2011

The reported statements by Aseemananda, co-accused in a series of bomb blasts by Hindutva terrorist groups shows that it is not just a few extremist individuals involved but a wide network which includes the involvement of top pracharaks of the RSS. Even though the investigations are belated, it is imperative that there should now be no let up in nailing those responsible for the heinous terrorist crimes in Malegaon, Ajmer Sharif, Mecca Masjid and the Samjhauta train blasts. The Hindutva terror groups have been spawned by the hate politics of the RSS and as is now revealed by Aseemananda have received direct support. No effort should be spared to bring the guilty to book. They constitute a grave danger to the integrity and unity of our country.

http://cpim.org/content/aseemananda-case-rss-hand

Urdu-Hindi Transliteration/Translation System :: Default Page

Will RSS be banned for a fourth time? - India - DNA

Will RSS be banned for a fourth time?
DNA / Anil Anand / Saturday, January 8, 2011 1:20 IST

After Rashtriya Swayamsevak Sangh (RSS) leader Swami Aseemanand allegedly confessed before a magistrate that he and other Hindu leaders - Indresh Kumar, Pragya Singh and Sunil Joshi - were involved in the Samjhauta Express and other bombings at Muslim religious places, Congress demanded “strict action” against the outfit on Friday.

Stating that the confession exposed the “terror face” of RSS, party spokesman Shakeel Ahmed said the “government must act and take firm action against such organisations”.

He, however, skirted a direct reply when asked if RSS should be banned. The outfit has been banned thrice in the past for various reasons.

“Reports about Aseemanand’s confession have appeared in the media. This Sanghi terrorism poses a big threat to the country,” Ahmed said.

Aseemanand, who worked for Vanvasi Kalyan Ashram in Dangs, Gujarat, reportedly confessed to involvement in the Samjhauta Express blast that killed 68 people, mostly Pakistanis. The swami has been quoted as saying, “I told everyone that bomb must be responded with a bomb.”

The statement made under section 164 before a magistrate will be considered key evidence.

Interestingly, the Samjhauta blast is being probed by National Investigating Agency, while Aseemanand made the confession to CBI which is interrogating him for involvement in some other cases.

URL of the article: http://www.dnaindia.com/india/report_will-rss-be-banned-for-a-fourth-time_1491744-all