The Fundamental Absurdity of the Christian Faith

In 1990, as a senior in high school, I had an atheist friend ask me: “What, precisely, is it that Christians believe?”  I will call her “Amy”, because that was her name.  Amy had been raised as an atheist by two atheist parents and had never really known much about Christianity.  I had been raised Protestant by two Christian parents, I had gone to Church and Sunday School every Sunday my whole life, I had gone to Christian youth group (Young Life, mostly) for years, and countless Christian summer camps.  I felt like I had a pretty good understanding of late 20th-century Christian theology.

By that time, I was basically an apostate myself, so Amy’s question left me with an interesting exercise:  how to simply and truthfully explain the essential Christian theology without proselytizing?  I had spent a lot of time at that point literally soul-searching and questioning the truth of the Christian message, but until I explained it to an atheist friend without trying to convert her, I’d never reflected on the complete absurdity of it. This is roughly how that sounded: Continue reading

Galaxy Chart in D3

When I first started working in for the Deputy CIO for Business Process & Systems Review, I was exposed to a data visualization called a “galaxy chart“. The version I saw was developed by Technomics, Inc., who (interestingly) do a lot of work for my former organization, PA&E (now CAPE).

While Technomics seemed to claim (when I met them) that they “invented” the galaxy chart, I think this is probably an overstatement, since there seems to be plenty of prior art.

Anyhow, I built a D3 plugin for a galaxy-chart layout.

Example galaxy chart

Example galaxy chart displaying a view of the United States Federal Budget for Fiscal Year 2011

A Burning Man 2014 Story

A cabinet, standing alone, in the Black Rock DesertIt was early in the morning around Thursday, when my family let me off-leash to go cruise the playa to see the art. I was way out in the deep playa, almost at the 12:00 apex of the trash fence, almost as far out as it is possible to be.  I rode my bike up to a cabinet standing alone by itself in the desert. The sun was just over the hills to the east. There was a man and woman about 50 meters away, on a blanket watching the sunrise, but otherwise, I was alone.

The cabinet was a slightly battered-looking piece of furniture, like you would find in a bedroom at a beach rental.  There were some drawers on the left, and two swinging doors, top and bottom.  The drawers were screwed shut.  The bottom door was secured with some heavy steel rings, locked with a bicycle lock, the kind that you dial in a combination of four letters and it releases. As I parked my bicycle and walked up to the cabinet, I could hear a woman’s voice from within, telling a story.  Here is what I heard, retold as best I can remember 6 weeks later… Continue reading

Most cryptic error message of 2014

My work computer (Windows 7 Enterprise) informed me today with a sad red “x” icon that:

Provider could not perform the action since the context was acquired as silent.

This is now my favorite error message; just barely edging out the message from 2003-era Windows ME which informed my girlfriend that she should contact her system administrator.

How to apply an Open Source License to a US Government Work

This article is also posted to my Intelink blog.


Every so often, a government project manager asks me a question like this:

I’m looking to hire some government guys and I’m interested in young folks hacking on [my project].

So, here’s my predicament:  if they work on the code, their work becomes ‘public domain’ and not something that could be restricted by licenses (at least according to some legal advice I’ve been given).  If the work is the in public domain, I have no way of ensuring that someone won’t take the code and sell it back to the government as their own (because they could modify it and put a proprietary seal on it).

Here’s my question: is there some legal structures that can be put in place to restrict modification, use and distribution like typical software licenses for government-created works?

Here’s some ways this has been done before. Continue reading