Bits Blog: TSMC Anticipates Big Orders. Is Apple One of Them?

Analysts expect Apple to drop Samsung Electronics as a chip supplier, but when?

In business, it’s not usually wise to be funding your competition. Unfortunately for Apple, processor chips for iPhones and iPads are made by Samsung, the South Korean company that is its top competitor in smartphones.

Most analysts expect Apple will eventually change suppliers. One potential suitor that keeps popping up in the rumor mill is the Taiwan Semiconductor Manufacturing Company (TSMC), the world’s largest contract chip maker, and for good reason.

TSMC is one of the few companies that have the capacity and the technology to meet Apple’s demand. The company had $17.5 billion in revenue in 2012 and its net income rose 32 percent in the fourth quarter. The chairman and chief executive, Morris Chang, is planning a record $9 billion in capital expenditures to expand production in 2013. TSMC makes some of the smallest and most powerful chips, and these chips go into both computers and smartphones.

The added incentive is, TSMC solely makes chips by contract, and probably will never compete with Apple in finished consumer electronics as Samsung has.

“This is the reason that companies such as Nvidia and AMD, which actually compete against each other in PCs, both go to TSMC (to make their chips),” Patrick Liao, an analyst at Nomura Securities, said. “They never worry about technology theft.”

For the last year and a half, industry watchers have tried to predict when TSMC will receive its first big order from Apple.

TSMC’s latest 28-nanometer chip was oversubscribed by existing customers to the point of shortage in 2012, and many believe the company does not have enough capacity for a large Apple order in 2013.

However, the 20-nanometer chip, which TSMC expects to go into full production in 2014, looks promising, analysts say. (Connections within a chip are measured in nanometers, or one-billionth of a meter.)

At an earnings conference on Thursday, Mr. Chang declined to comment on Apple, but he bullishly predicted the 20-nanometer would outsell the 28-nanometer in its first two years.

“Enough discussions have taken place, with enough customers who have large requirements (on 20nm), to lead us to believe that the volume will be very large,” Mr. Chang said.

That bullishness leads analysts to believe that Apple could be a customer involved in these discussions.

“That language makes you feel like the direction is headed where we all expect,” said Steven Pelayo, regional head of technology research at HSBC.

If Samsung cuts capital spending this year, Mr. Pelayo says, that will add another piece to the puzzle of when Apple plans to exit.

“2013 is really a status quo year. Samsung ramps down, TSMC ramps up. We’ll see what happens in 2014.”

Read More..

IHT Rendezvous: Poland's Push for Human Rights

BERLIN — Without Poland, there would be no European Endowment for Democracy. The E.E.D., which I write about in my latest Letter from Europe, will become a new and much-needed source of funding for pro-democracy individuals and groups in Europe’s eastern and southern neighborhoods.

The foundation is the brainchild of the Polish government, especially Radek Sikorski, the foreign minister.

The center-right government in Warsaw believes that it is the moral and political obligation of the European Union to support people who strive for human rights and freedom, especially in the countries along its borders. After all, these are the union’s defining values.

Values matter a lot to Poland. An E.U. member since 2004, Poland has never been complacent about democracy and freedom.

Polish policy is not just about helping its Eastern neighbors become stable, prosperous and democratic so that they can provide a buffer zone against Russia, or encourage Russian democracy activists. Poland wants these conditions for people in North Africa and the Middle East too.

Page Two

Posts written by the IHT’s Page Two columnists.

That is why, when Poland was heading the union’s rotating presidency last year, it campaigned hard to get the idea of the E.E.D. accepted. It wanted the foundation to be free of E.U. bureaucracy and internal politics. It wanted to show those striving for democracy that Europe still had some strategic goals for its eastern and southern neighbors.

Poland also wants Europe to have a strong defense and security policy so as to defend its values and become a serious global player.

France desperately wants that, too. But the meager support offered to Paris by E.U. member states after François Hollande, the French president, sent fighter aircraft and troops to northern Mali indicates that much of Europe is not really interested in having a strong, common defense and security policy.

This is not just about supporting France militarily, either.

The conflict in Mali has consequences for Europe, including the export of terrorism and criminal gangs to the European continent, and rising numbers of refugees.

The attack this past week by radical Islamists on the gas fields in Algeria shows the urgency of the threat.

Yet as Poland and France have shown, each in its own way, in today’s Europe national governments have to go it alone before getting even some support from the other E.U. states.

Read More..

How M.I.T. Ensnared a Hacker, Bucking a Freewheeling Culture



Months earlier, the mysterious visitor had used the school’s computer network to begin copying millions of research articles belonging to Jstor, the nonprofit organization that sells subscription access to universities.


The visitor was clever — switching identifications to avoid being blocked by M.I.T.’s security system — but eventually the university believed it had shut down the intrusion, then spent weeks reassuring furious officials at Jstor that the downloading had been stopped.


However, on Jan. 3, 2011, according to internal M.I.T. documents obtained by The New York Times, the university was informed that the intruder was back — this time downloading documents very slowly, with a new method of access, so as not to alert the university’s security experts.


“The user was now not using any of the typical methods to access MITnet to avoid all usual methods of being disabled,” concluded Mike Halsall, a senior security analyst at M.I.T., referring to the university’s computer network.


What the university officials did not know at the time was that the intruder was Aaron Swartz, one of the shining lights of the technology world and a leading advocate for open access to information, with a fellowship down the road at Harvard.


Mr. Swartz’s actions presented M.I.T. with a crucial choice: the university could try to plug the weak spot in its network or it could try to catch the hacker, then unknown.


The decision — to treat the downloading as a continuing crime to be investigated rather than a security threat that had been stopped — led to a two-day cat-and-mouse game with Mr. Swartz and, ultimately, to charges of computer and wire fraud. Mr. Swartz, 26, who faced a potentially lengthy prison term and whose trial was to begin in April, was found dead of an apparent suicide in his Brooklyn apartment on Jan. 11.


Mr. Swartz’s supporters called M.I.T.’s decision a striking step for an institution that prides itself on operating an open computer network and open campus — the home of a freewheeling programming culture. M.I.T.’s defenders viewed the intrusion as a computer crime that needed to be taken seriously.


M.I.T. declined to confirm any of these details or comment on its actions during the investigation. The university’s president, L. Rafael Reif, said last week, “It pains me to think that M.I.T. played any role in a series of events that have ended in tragedy.” He appointed a professor, Hal Abelson, to analyze M.I.T.’s conduct in the investigation. To comment now, a spokeswoman for the university said, would be “to get ahead of that analysis.”


Early on Jan. 4, at 8:08 a.m., according to Mr. Halsall’s detailed internal timeline of the events, a security expert was able to locate that new method of access precisely — the wiring in a network closet in the basement of Building 16, a nondescript rectangular structure full of classrooms and labs that, like many buildings on campus, is kept unlocked.


In the closet, Mr. Halsall wrote, there was a netbook, or small portable computer, “hidden under a box,” connected to an external hard drive that was receiving the downloaded documents.


At 9:44 a.m. the M.I.T. police were called in; by 10:30 a.m., the Cambridge police were en route, and by 11 a.m., Michael Pickett, a Secret Service agent and expert on computer crime, was on the scene. On his recommendation, a surveillance camera was installed in the closet and a second laptop was connected to the network switch to track the traffic.


There may have been a reason for the university’s response. According to the timeline, the tech team detected brief activity from China on the netbook — something that occurs all the time but still represents potential trouble.


E-mails among M.I.T. officials that Tuesday in January 2011 highlight the pressures university officials felt over a problem they thought they had solved. Ann J. Wolpert, the director of libraries, wrote to Ellen Finnie Duranceau, the official who was receiving Jstor’s complaints: “Has there ever been a situation similar to this when we brought in campus police? The magnitude, systematic and careful nature of the abuses could be construed as approaching criminal action. Certainly, that’s how Jstor views it.”


Some of Mr. Swartz’s defenders argue that collecting and providing evidence to the government without a warrant may have violated federal and state wiretapping statutes.


John Schwartz contributed reporting.



This article has been revised to reflect the following correction:

Correction: January 21, 2013

An earlier version of this article misquoted part of statement by a spokeswoman for the Massachusetts Institute of Technology. Referring to a review of M.I.T.’s conduct that was commissioned by the university’s president, she said to comment now on the events surrounding Aaron Swartz’s arrest would be “to get ahead of that analysis,” not “to get ahead of that investigation.” 



Read More..

Recipes for Health: Lentil, Celery and Tomato Minestrone


Andrew Scrivani for The New York Times







If you did a lot of cooking over the Christmas and New Year’s holidays you may have some celery hearts lingering in your refrigerator. You needed a few branches for a stew, a stock, or a soup, so you bought a whole bunch, and here it is weeks later and the rest of the celery is wilting in the produce drawer.




This doesn’t have to happen if you think of this vegetable as something more than an aromatic. I’m a big fan of celery, both raw and cooked, as the main ingredient or as one of several featured ingredients in a dish. You can do the traditional thing with raw celery and dice it up and add it to a potato, tuna or egg salad, or you can make a celery salad, slicing the branches as thin as you can get them and tossing them with herbs, radishes, oil and vinegar, and blue cheese. If you are cooking with celery, don’t stop at one branch when you make soup. The celery contributes a wonderful herbal flavor dimension. It retains its texture for a long time when you cook it, so I used it as the main vegetable in a risotto and loved the way it stood up to the creamy rice.


You always see celery listed as an ingredient in tonic juices and blender drinks. It has long been used in Chinese medicine to help control high blood pressure, which makes sense because it contains phytochemicals called phthalides that reduce stress hormones and work to relax the muscle walls in arteries, increasing blood flow. The vegetable is an excellent source of Vitamins K and C, and a very good source of potassium, folate, dietary fiber, molybdenum, manganese, and Vitamin B6. Another bonus attribute – it is very low in calories. However, it is on the high side as far as sodium goes.


Lentil, Celery and Tomato Minestrone


I make minestrones like this all the time, but I hadn’t made a version with this much celery in it until I made this one, and I loved the dimension of flavor it contributes to the mix.


1 cup lentils, rinsed


1 onion, halved


A bouquet garni made with 2 sprigs each thyme and parsley, a bay leaf, and a Parmesan rind


1 1/2 quarts water


1 tablespoon extra virgin olive oil


1 medium carrot, diced


3 celery stalks, diced


2 garlic cloves, minced


Salt, preferably kosher salt, to taste


1 28-ounce can chopped tomatoes, with liquid


Pinch of sugar


2 tablespoons tomato paste


1/4 cup chopped fresh parsley


Very thinly sliced celery, from the inner heart, for garnish


Freshly grated Parmesan cheese for serving


1. Combine the lentils, 1/2 onion and the bouquet garni with 1 quart water in a saucepan and bring to a boil. Reduce the heat, add salt to taste, cover and simmer 30 minutes.


2. Chop the remaining onion. Heat the olive oil in a large, heavy soup pot or Dutch oven over medium heat and add the onion, carrot, and celery. Cook, stirring often, until the onion is tender, about 5 minutes, and add the garlic and a pinch of salt. Stir together until fragrant, about 1 minute, and add the canned tomatoes with their liquid and the sugar. Bring to a simmer and cook, stirring often, for about 10 minutes, until the tomatoes have cooked down somewhat and smell fragrant.


3. Add the lentils with their broth, the tomato paste, salt to taste, an additional 2 cups water, and bring to a boil. Reduce the heat, cover, and simmer 30 minutes. Taste and adjust seasonings. Season to taste with freshly ground pepper, stir in the parsley and serve, garnishing each bowl with thinly sliced celery heart if you want some crunch, and passing the Parmesan at the table.


Yield: Serves 4 to 6 (4 if there are teen-agers in your house)


Advance preparation: This will keep for three or four days in the refrigerator. It may require thinning out. It’s even better the day after you make it. I have a teenage son and he just about polished off the leftovers – which should have served 3 – the day after I tested the recipe.


Variation: Shortly before serving add 2 cups baby spinach and simmer just until wilted.


Nutritional information per serving (4 servings): 276 calories; 4 grams fat; 0 grams saturated fat; 1 gram polyunsaturated fat; 2 grams monounsaturated fat; 0 milligrams cholesterol; 49 grams carbohydrates; 12 grams dietary fiber; 392 milligrams sodium (does not include salt to taste); 17 grams protein


Nutritional information per serving (6 servings): 184 calories; 2 grams fat; 0 grams saturated fat; 0 grams polyunsaturated fat; 2 grams monounsaturated fat; 0 milligrams cholesterol; 32 grams carbohydrates; 8 grams dietary fiber; 261 milligrams sodium (does not include salt to taste); 11 grams protein


Martha Rose Shulman is the author of “The Very Best of Recipes for Health.”


Read More..

How M.I.T. Ensnared a Hacker, Bucking a Freewheeling Culture



Months earlier, the mysterious visitor had used the school’s computer network to begin copying millions of research articles belonging to Jstor, the nonprofit organization that sells subscription access to universities.


The visitor was clever — switching identifications to avoid being blocked by M.I.T.’s security system — but eventually the university believed it had shut down the intrusion, then spent weeks reassuring furious officials at Jstor that the downloading had been stopped.


However, on Jan. 3, 2011, according to internal M.I.T. documents obtained by The New York Times, the university was informed that the intruder was back — this time downloading documents very slowly, with a new method of access, so as not to alert the university’s security experts.


“The user was now not using any of the typical methods to access MITnet to avoid all usual methods of being disabled,” concluded Mike Halsall, a senior security analyst at M.I.T., referring to the university’s computer network.


What the university officials did not know at the time was that the intruder was Aaron Swartz, one of the shining lights of the technology world and a leading advocate for open access to information, with a fellowship down the road at Harvard.


Mr. Swartz’s actions presented M.I.T. with a crucial choice: the university could try to plug the weak spot in its network or it could try to catch the hacker, then unknown.


The decision — to treat the downloading as a continuing crime to be investigated rather than a security threat that had been stopped — led to a two-day cat-and-mouse game with Mr. Swartz and, ultimately, to charges of computer and wire fraud. Mr. Swartz, 26, who faced a potentially lengthy prison term and whose trial was to begin in April, was found dead of an apparent suicide in his Brooklyn apartment on Jan. 11.


Mr. Swartz’s supporters called M.I.T.’s decision a striking step for an institution that prides itself on operating an open computer network and open campus — the home of a freewheeling programming culture. M.I.T.’s defenders viewed the intrusion as a computer crime that needed to be taken seriously.


M.I.T. declined to confirm any of these details or comment on its actions during the investigation. The university’s president, L. Rafael Reif, said last week, “It pains me to think that M.I.T. played any role in a series of events that have ended in tragedy.” He appointed a professor, Hal Abelson, to analyze M.I.T.’s conduct in the investigation. To comment now, a spokeswoman for the university said, would be “to get ahead of that analysis.”


Early on Jan. 4, at 8:08 a.m., according to Mr. Halsall’s detailed internal timeline of the events, a security expert was able to locate that new method of access precisely — the wiring in a network closet in the basement of Building 16, a nondescript rectangular structure full of classrooms and labs that, like many buildings on campus, is kept unlocked.


In the closet, Mr. Halsall wrote, there was a netbook, or small portable computer, “hidden under a box,” connected to an external hard drive that was receiving the downloaded documents.


At 9:44 a.m. the M.I.T. police were called in; by 10:30 a.m., the Cambridge police were en route, and by 11 a.m., Michael Pickett, a Secret Service agent and expert on computer crime, was on the scene. On his recommendation, a surveillance camera was installed in the closet and a second laptop was connected to the network switch to track the traffic.


There may have been a reason for the university’s response. According to the timeline, the tech team detected brief activity from China on the netbook — something that occurs all the time but still represents potential trouble.


E-mails among M.I.T. officials that Tuesday in January 2011 highlight the pressures university officials felt over a problem they thought they had solved. Ann J. Wolpert, the director of libraries, wrote to Ellen Finnie Duranceau, the official who was receiving Jstor’s complaints: “Has there ever been a situation similar to this when we brought in campus police? The magnitude, systematic and careful nature of the abuses could be construed as approaching criminal action. Certainly, that’s how Jstor views it.”


Some of Mr. Swartz’s defenders argue that collecting and providing evidence to the government without a warrant may have violated federal and state wiretapping statutes.


John Schwartz contributed reporting.



This article has been revised to reflect the following correction:

Correction: January 21, 2013

An earlier version of this article misquoted part of statement by a spokeswoman for the Massachusetts Institute of Technology. Referring to a review of M.I.T.’s conduct that was commissioned by the university’s president, she said to comment now on the events surrounding Aaron Swartz’s arrest would be “to get ahead of that analysis,” not “to get ahead of that investigation.” 



Read More..

IHT Rendezvous: China's 'Lamborghini' Coefficient: Who's Getting Richer and Who Poorer?

BEIJING — Search the word Gini, or “jini,” for Gini coefficient, the well-known measure of income inequality, on China’s biggest microblogging site and the first result today was for Lamborghini, the Italian luxury sports car (in Chinese, the two words share a similar sound in the last part of the car’s name.)

That is very ironic because the Gini coefficient measures income inequality and the Lamborghini, which can set a buyer back $300,000, is not an uncommon sight on the streets of big Chinese cities, an object of resentment among ordinary people who view it as a symbol of how a few people are amassing tremendous wealth as many struggle with low incomes, low bank deposit rates, high property prices and persistent inflation.

In other words, income inequality in China is politically sensitive.

(The Gini index is a measure of household income inequality; zero represents perfect income equality and one, perfect inequality, a situation where one person would own all the wealth, as the World Bank explains.)

So last Friday, when the government announced China’s Gini coefficient figures for the first time in over a decade, there was excitement – and quite a bit of scorn – expressed online and in media reports as well as private conversations. Why?

According to the figures, China today is actually more equal than in 2003, the National Bureau of Statistics said.

From 2003, the Gini coefficient did indeed rise, the bureau said, from 0.479 to a high in 2008 of 0.491. But by 2012 the figure had dropped to 0.474, meaning China is a more equal society today than a decade ago – despite all those Lamborghinis on the street.

At a news conference, Ma Jiantang, the bureau director, called the rate nevertheless “relatively high,” Xinhua reported. “China must accelerate its income distribution reform to narrow the rich-poor gap,” Xinhua said.

Yet the government’s “effective measures” to “bring benefits for its people” after the gobal financial crisis began in 2008 had brought down the measure, it quoted Mr. Ma as saying.

To compare with the United States: In 2011, the Gini coefficient there was also high, at 0.477, according to the U.S. Census Bureau.

Xinhua quoted the United Nations as putting the “warning level” on the rich-poor gap at 0.4.

Yet in China this weekend, few believed the new figures.

Here are two lively reactions from microblogs, from a journalist and an economist who together have over six million followers:

“Please choose one: 1. Really, thank you Fatherland; 2. That’s a myth; 3. Not sure, but hurry up and increase my salary,” Shi Shusi, a journalist and social commentator, the director of the state-run Worker’s Daily Weekly, said on his Sina Weibo account to nearly 875,000 followers.

Xu Xiaonian, a professor of finance and economics at the China Europe International Business School, wrote on his Weibo account (5.5 million followers): “A journalist rang to ask me to comment on today’s macroeconomic figures. I’d have to be crazy to truthfully comment on false figures. That Gini coefficient, to use the words of Zheng Yuanjie,” a popular children’s story writer, “‘no-one would even dare to write a fairytale like that.’”

A different report, in December, by researchers at the Southwestern University of Finance and Economics in the city of Chengdu, put China’s Gini at 0.61 for 2010.

While people are by and large glad to see the government once again measuring the figure after a decade-long hiatus (which Mr. Ma explained last year was due to the fact that the government did not actually know what people in the cities were earning, as I explored in a Letter from China,) a major problem facing the government is the scale of people’s “hidden income,” estimated by the Beijing-based economist Wang Xiaolu several years ago to be about 9.3 trillion renminbi (nearly $1.5 trillion).

Read More..

Digital Daredevil Behind Megaupload Has a New Venture


AUCKLAND — At 6:48 a.m. Sunday, the Internet tycoon Kim Dotcom opened his new file-storage Web site to the public — one year to the minute after the police raided the mansion he rents in New Zealand.


The raid was part of a coordinated operation with the F.B.I. that also shut down Megaupload, the file-sharing business he had founded.


Mr. Dotcom faces charges in the United States of pirating copyrighted material and money laundering and is awaiting an extradition hearing in New Zealand. But on Sunday, his focus was on the new site, which was already straining under heavy traffic within two hours of its introduction. In the first 14 hours of the site’s operation, more than half a million people registered to use it, Mr. Dotcom said.


“This should not be seen as the mocking of any government or Hollywood,” Mr. Dotcom, 39, said Sunday at a news conference at the Auckland mansion. “This is us being innovators and executing our right to run a business.”


The event marking the introduction of Mega, held at the same property that had been raided by the police, was designed to be a spectacle. As Mr. Dotcom addressed a large crowd of journalists and guests, actors dressed as armed police officers rappelled down the sloping roof of the main house and shouted that all those present would be detained. A helicopter emblazoned with “F.B.I.” hovered overhead.


Mr. Dotcom, a German citizen and permanent resident of New Zealand who was born Kim Schmitz, was arrested Jan. 20, 2012. During the raid on his home that day, the police seized vehicles worth about 6 million New Zealand dollars, or $5 million, and froze about 11 million dollars in bank accounts, according to a news release issued at the time.


Over the past year, Mr. Dotcom has become an ever-prominent figure in New Zealand as the legal and political saga surrounding his case has played out in the public sphere.


In June, a High Court judge ruled that the police had used the wrong type of search warrants to enter Mr. Dotcom’s property, meaning that the raid had been illegal. In September, Prime Minister John Key of New Zealand apologized to Mr. Dotcom after it was disclosed that the country’s intelligence agency had acted illegally by spying on him, even though he holds a permanent resident’s visa.


Mega, Mr. Dotcom’s new Web site, is a file-storage and sharing system that encrypts files on one’s computer before they are uploaded to the site’s servers. Files can then be downloaded and decrypted. This means that files on Mega’s servers cannot be read by anyone, including by the company itself, without the user’s decryption key.


The allegation that Mr. Dotcom’s previous venture, Megaupload, knew its users were illegally uploading copyrighted material — and indeed sought to encourage the practice — is a crucial part of the U.S. Department of Justice’s indictment against the site and those who operated it.


In contrast, the new site appears to distance Mega intentionally from any legal responsibility for the content on its servers, although the terms and conditions of the site do explicitly forbid uploading copyrighted material.


“What he’s trying to do is give himself a second-string argument,” Charles Alexander, a lawyer in Sydney who specializes in intellectual property law, told The Associated Press. “‘Even if I was wrong before, this one’s all right because how can I control something if I don’t know that it’s there?”’ he imagined the new company thinking. “I can understand the argument; whether it would be successful or not is another matter.”


U.S. prosecutors declined to comment on the new site, The A.P. reported, referring only to a court document that cites promises Mr. Dotcom made while seeking bail, including one that he would not start a Megaupload-style business until the criminal case was resolved.


“Legally it’s probably the most scrutinized Internet start-up in history,” Mr. Dotcom said. “Every pixel on the site has been checked for, you know, all kinds of illegal — potential legal challenges. We have a great team of very talented lawyers that are experts in intellectual property and Internet law, and they have worked together with us to create Mega.”


The Motion Picture Association of America, which has filed complaints about alleged copyright infringement by Megaupload, told The A.P. that it was skeptical that Mr. Dotcom’s new site was harmless. “We are still reviewing how this new project will operate, but we do know that Kim Dotcom has built his career and his fortune on stealing creative works,” it said in a news release.


The Mega site offers 50 gigabytes of storage free; additional storage and bandwidth can be purchased at three tiers of monthly fees.


Read More..

Well: Holly the Cat's Incredible Journey

Nobody knows how it happened: an indoor housecat who got lost on a family excursion managing, after two months and about 200 miles, to return to her hometown.

Even scientists are baffled by how Holly, a 4-year-old tortoiseshell who in early November became separated from Jacob and Bonnie Richter at an R.V. rally in Daytona Beach, Fla., appeared on New Year’s Eve — staggering, weak and emaciated — in a backyard about a mile from the Richter’s house in West Palm Beach.

“Are you sure it’s the same cat?” wondered John Bradshaw, director of the University of Bristol’s Anthrozoology Institute. In other cases, he has suspected, “the cats are just strays, and the people have got kind of a mental justification for expecting it to be the same cat.”

But Holly not only had distinctive black-and-brown harlequin patterns on her fur, but also an implanted microchip to identify her.

“I really believe these stories, but they’re just hard to explain,” said Marc Bekoff, a behavioral ecologist at the University of Colorado. “Maybe being street-smart, maybe reading animal cues, maybe being able to read cars, maybe being a good hunter. I have no data for this.”

There is, in fact, little scientific dogma on cat navigation. Migratory animals like birds, turtles and insects have been studied more closely, and use magnetic fields, olfactory cues, or orientation by the sun.

Scientists say it is more common, although still rare, to hear of dogs returning home, perhaps suggesting, Dr. Bradshaw said, that they have inherited wolves’ ability to navigate using magnetic clues. But it’s also possible that dogs get taken on more family trips, and that lost dogs are more easily noticed or helped by people along the way.

Cats navigate well around familiar landscapes, memorizing locations by sight and smell, and easily figuring out shortcuts, Dr. Bradshaw said.

Strange, faraway locations would seem problematic, although he and Patrick Bateson, a behavioral biologist at Cambridge University, say that cats can sense smells across long distances. “Let’s say they associate the smell of pine with wind coming from the north, so they move in a southerly direction,” Dr. Bateson said.

Peter Borchelt, a New York animal behaviorist, wondered if Holly followed the Florida coast by sight or sound, tracking Interstate 95 and deciding to “keep that to the right and keep the ocean to the left.”

But, he said, “nobody’s going to do an experiment and take a bunch of cats in different directions and see which ones get home.”

The closest, said Roger Tabor, a British cat biologist, may have been a 1954 study in Germany which cats placed in a covered circular maze with exits every 15 degrees most often exited in the direction of their homes, but more reliably if their homes were less than five kilometers away.

New research by the National Geographic and University of Georgia’s Kitty Cams Project, using video footage from 55 pet cats wearing video cameras on their collars, suggests cat behavior is exceedingly complex.

For example, the Kitty Cams study found that four of the cats were two-timing their owners, visiting other homes for food and affection. Not every cat, it seems, shares Holly’s loyalty.

KittyCams also showed most of the cats engaging in risky behavior, including crossing roads and “eating and drinking substances away from home,” risks Holly undoubtedly experienced and seems lucky to have survived.

But there have been other cats who made unexpected comebacks.

“It’s actually happened to me,” said Jackson Galaxy, a cat behaviorist who hosts “My Cat From Hell” on Animal Planet. While living in Boulder, Colo., he moved across town, whereupon his indoor cat, Rabbi, fled and appeared 10 days later at the previous house, “walking five miles through an area he had never been before,” Mr. Galaxy said.

Professor Tabor cited longer-distance reports he considered credible: Murka, a tortoiseshell in Russia, traveling about 325 miles home to Moscow from her owner’s mother’s house in Voronezh in 1989; Ninja, who returned to Farmington, Utah, in 1997, a year after her family moved from there to Mill Creek, Wash.; and Howie, an indoor Persian cat in Australia who in 1978 ran away from relatives his vacationing family left him with and eventually traveled 1,000 miles to his family’s home.

Professor Tabor also said a Siamese in the English village of Black Notley repeatedly hopped a train, disembarked at White Notley, and walked several miles back to Black Notley.

Still, explaining such journeys is not black and white.

In the Florida case, one glimpse through the factual fog comes on the little cat’s feet. While Dr. Bradshaw speculated Holly might have gotten a lift, perhaps sneaking under the hood of a truck heading down I-95, her paws suggest she was not driven all the way, nor did Holly go lightly.

“Her pads on her feet were bleeding,” Ms. Richter said. “Her claws are worn weird. The front ones are really sharp, the back ones worn down to nothing.”

Scientists say that is consistent with a long walk, since back feet provide propulsion, while front claws engage in activities like tearing. The Richters also said Holly had gone from 13.5 to 7 pounds.

Holly hardly seemed an adventurous wanderer, though her background might have given her a genetic advantage. Her mother was a feral cat roaming the Richters’ mobile home park, and Holly was born inside somebody’s air-conditioner, Ms. Richter said. When, at about six weeks old, Holly padded into their carport and jumped into the lap of Mr. Richter’s mother, there were “scars on her belly from when the air conditioner was turned on,” Ms. Richter said.

Scientists say that such early experience was too brief to explain how Holly might have been comfortable in the wild — after all, she spent most of her life as an indoor cat, except for occasionally running outside to chase lizards. But it might imply innate personality traits like nimbleness or toughness.

“You’ve got these real variations in temperament,” Dr. Bekoff said. “Fish can by shy or bold; there seem to be shy and bold spiders. This cat, it could be she has the personality of a survivor.”

He said being an indoor cat would not extinguish survivalist behaviors, like hunting mice or being aware of the sun’s orientation.

The Richters — Bonnie, 63, a retired nurse, and Jacob, 70, a retired airline mechanics’ supervisor and accomplished bowler — began traveling with Holly only last year, and she easily tolerated a hotel, a cabin or the R.V.

But during the Good Sam R.V. Rally in Daytona, when they were camping near the speedway with 3,000 other motor homes, Holly bolted when Ms. Richter’s mother opened the door one night. Fireworks the next day may have further spooked her, and, after searching for days, alerting animal agencies and posting fliers, the Richters returned home catless.

Two weeks later, an animal rescue worker called the Richters to say a cat resembling Holly had been spotted eating behind the Daytona franchise of Hooters, where employees put out food for feral cats.

Then, on New Year’s Eve, Barb Mazzola, a 52-year-old university executive assistant, noticed a cat “barely standing” in her backyard in West Palm Beach, struggling even to meow. Over six days, Ms. Mazzola and her children cared for the cat, putting out food, including special milk for cats, and eventually the cat came inside.

They named her Cosette after the orphan in Les Misérables, and took her to a veterinarian, Dr. Sara Beg at Paws2Help. Dr. Beg said the cat was underweight and dehydrated, had “back claws and nail beds worn down, probably from all that walking on pavement,” but was “bright and alert” and had no parasites, heartworm or viruses. “She was hesitant and scared around people she didn’t know, so I don’t think she went up to people and got a lift,” Dr. Beg said. “I think she made the journey on her own.”

At Paws2Help, Ms. Mazzola said, “I almost didn’t want to ask, because I wanted to keep her, but I said, ‘Just check and make sure she doesn’t have a microchip.’” When told the cat did, “I just cried.”

The Richters cried, too upon seeing Holly, who instantly relaxed when placed on Mr. Richter’s shoulder. Re-entry is proceeding well, but the mystery persists.

“We haven’t the slightest idea how they do this,” Mr. Galaxy said. “Anybody who says they do is lying, and, if you find it, please God, tell me what it is.”

Read More..

Well: Holly the Cat's Incredible Journey

Nobody knows how it happened: an indoor housecat who got lost on a family excursion managing, after two months and about 200 miles, to return to her hometown.

Even scientists are baffled by how Holly, a 4-year-old tortoiseshell who in early November became separated from Jacob and Bonnie Richter at an R.V. rally in Daytona Beach, Fla., appeared on New Year’s Eve — staggering, weak and emaciated — in a backyard about a mile from the Richter’s house in West Palm Beach.

“Are you sure it’s the same cat?” wondered John Bradshaw, director of the University of Bristol’s Anthrozoology Institute. In other cases, he has suspected, “the cats are just strays, and the people have got kind of a mental justification for expecting it to be the same cat.”

But Holly not only had distinctive black-and-brown harlequin patterns on her fur, but also an implanted microchip to identify her.

“I really believe these stories, but they’re just hard to explain,” said Marc Bekoff, a behavioral ecologist at the University of Colorado. “Maybe being street-smart, maybe reading animal cues, maybe being able to read cars, maybe being a good hunter. I have no data for this.”

There is, in fact, little scientific dogma on cat navigation. Migratory animals like birds, turtles and insects have been studied more closely, and use magnetic fields, olfactory cues, or orientation by the sun.

Scientists say it is more common, although still rare, to hear of dogs returning home, perhaps suggesting, Dr. Bradshaw said, that they have inherited wolves’ ability to navigate using magnetic clues. But it’s also possible that dogs get taken on more family trips, and that lost dogs are more easily noticed or helped by people along the way.

Cats navigate well around familiar landscapes, memorizing locations by sight and smell, and easily figuring out shortcuts, Dr. Bradshaw said.

Strange, faraway locations would seem problematic, although he and Patrick Bateson, a behavioral biologist at Cambridge University, say that cats can sense smells across long distances. “Let’s say they associate the smell of pine with wind coming from the north, so they move in a southerly direction,” Dr. Bateson said.

Peter Borchelt, a New York animal behaviorist, wondered if Holly followed the Florida coast by sight or sound, tracking Interstate 95 and deciding to “keep that to the right and keep the ocean to the left.”

But, he said, “nobody’s going to do an experiment and take a bunch of cats in different directions and see which ones get home.”

The closest, said Roger Tabor, a British cat biologist, may have been a 1954 study in Germany which cats placed in a covered circular maze with exits every 15 degrees most often exited in the direction of their homes, but more reliably if their homes were less than five kilometers away.

New research by the National Geographic and University of Georgia’s Kitty Cams Project, using video footage from 55 pet cats wearing video cameras on their collars, suggests cat behavior is exceedingly complex.

For example, the Kitty Cams study found that four of the cats were two-timing their owners, visiting other homes for food and affection. Not every cat, it seems, shares Holly’s loyalty.

KittyCams also showed most of the cats engaging in risky behavior, including crossing roads and “eating and drinking substances away from home,” risks Holly undoubtedly experienced and seems lucky to have survived.

But there have been other cats who made unexpected comebacks.

“It’s actually happened to me,” said Jackson Galaxy, a cat behaviorist who hosts “My Cat From Hell” on Animal Planet. While living in Boulder, Colo., he moved across town, whereupon his indoor cat, Rabbi, fled and appeared 10 days later at the previous house, “walking five miles through an area he had never been before,” Mr. Galaxy said.

Professor Tabor cited longer-distance reports he considered credible: Murka, a tortoiseshell in Russia, traveling about 325 miles home to Moscow from her owner’s mother’s house in Voronezh in 1989; Ninja, who returned to Farmington, Utah, in 1997, a year after her family moved from there to Mill Creek, Wash.; and Howie, an indoor Persian cat in Australia who in 1978 ran away from relatives his vacationing family left him with and eventually traveled 1,000 miles to his family’s home.

Professor Tabor also said a Siamese in the English village of Black Notley repeatedly hopped a train, disembarked at White Notley, and walked several miles back to Black Notley.

Still, explaining such journeys is not black and white.

In the Florida case, one glimpse through the factual fog comes on the little cat’s feet. While Dr. Bradshaw speculated Holly might have gotten a lift, perhaps sneaking under the hood of a truck heading down I-95, her paws suggest she was not driven all the way, nor did Holly go lightly.

“Her pads on her feet were bleeding,” Ms. Richter said. “Her claws are worn weird. The front ones are really sharp, the back ones worn down to nothing.”

Scientists say that is consistent with a long walk, since back feet provide propulsion, while front claws engage in activities like tearing. The Richters also said Holly had gone from 13.5 to 7 pounds.

Holly hardly seemed an adventurous wanderer, though her background might have given her a genetic advantage. Her mother was a feral cat roaming the Richters’ mobile home park, and Holly was born inside somebody’s air-conditioner, Ms. Richter said. When, at about six weeks old, Holly padded into their carport and jumped into the lap of Mr. Richter’s mother, there were “scars on her belly from when the air conditioner was turned on,” Ms. Richter said.

Scientists say that such early experience was too brief to explain how Holly might have been comfortable in the wild — after all, she spent most of her life as an indoor cat, except for occasionally running outside to chase lizards. But it might imply innate personality traits like nimbleness or toughness.

“You’ve got these real variations in temperament,” Dr. Bekoff said. “Fish can by shy or bold; there seem to be shy and bold spiders. This cat, it could be she has the personality of a survivor.”

He said being an indoor cat would not extinguish survivalist behaviors, like hunting mice or being aware of the sun’s orientation.

The Richters — Bonnie, 63, a retired nurse, and Jacob, 70, a retired airline mechanics’ supervisor and accomplished bowler — began traveling with Holly only last year, and she easily tolerated a hotel, a cabin or the R.V.

But during the Good Sam R.V. Rally in Daytona, when they were camping near the speedway with 3,000 other motor homes, Holly bolted when Ms. Richter’s mother opened the door one night. Fireworks the next day may have further spooked her, and, after searching for days, alerting animal agencies and posting fliers, the Richters returned home catless.

Two weeks later, an animal rescue worker called the Richters to say a cat resembling Holly had been spotted eating behind the Daytona franchise of Hooters, where employees put out food for feral cats.

Then, on New Year’s Eve, Barb Mazzola, a 52-year-old university executive assistant, noticed a cat “barely standing” in her backyard in West Palm Beach, struggling even to meow. Over six days, Ms. Mazzola and her children cared for the cat, putting out food, including special milk for cats, and eventually the cat came inside.

They named her Cosette after the orphan in Les Misérables, and took her to a veterinarian, Dr. Sara Beg at Paws2Help. Dr. Beg said the cat was underweight and dehydrated, had “back claws and nail beds worn down, probably from all that walking on pavement,” but was “bright and alert” and had no parasites, heartworm or viruses. “She was hesitant and scared around people she didn’t know, so I don’t think she went up to people and got a lift,” Dr. Beg said. “I think she made the journey on her own.”

At Paws2Help, Ms. Mazzola said, “I almost didn’t want to ask, because I wanted to keep her, but I said, ‘Just check and make sure she doesn’t have a microchip.’” When told the cat did, “I just cried.”

The Richters cried, too upon seeing Holly, who instantly relaxed when placed on Mr. Richter’s shoulder. Re-entry is proceeding well, but the mystery persists.

“We haven’t the slightest idea how they do this,” Mr. Galaxy said. “Anybody who says they do is lying, and, if you find it, please God, tell me what it is.”

Read More..

N.T.S.B. Rules Out a Cause for Battery Fire on 787 Dreamliner





Federal investigations said Sunday that they had ruled out excessive voltage as the cause of a battery fire on a Boeing 787 in Boston this month, widening the mystery into what led to the grounding of the world’s most technologically advanced jet after a second battery-related problem last week.




With investigators focused on the plane’s lithium-ion batteries, the National Transportation Safety Board said an examination of the data from the plane’s flight recorder indicated that the battery “did not exceed the designed voltage of 32 volts.” The fire aboard a Japan Airlines plane on Jan. 7 at Logan International Airport in Boston occurred after the passengers had gotten off.


Last week, a battery problem on another 787 forced an All Nippon Airways jetliner to make an emergency landing in Japan. That episode prompted aviation authorities around the world to ground the plane, also known as the Dreamliner. The Federal Aviation Administration said last week that it would not lift the ban until Boeing could show that the batteries were safe.


But with investigators on a global quest to find out what went wrong, the safety board’s statement suggested that there might not be a rapid resumption of 787 flights. The 787 first entered service in November 2011 after more than three and a half years of production delays. Eight airlines currently own 50 787s, including United Airlines.


On Friday, Japanese safety officials, who are in charge of investigating the second battery problem, suggested that overcharging a battery might have caused it to overheat. Pilots decided to make an emergency landing 20 minutes after takeoff after receiving several alarms about the battery and smelled smoke in the cockpit.


That investigation is conducted by Japan’s transportation safety board. American investigators are heplping with the inquiry.


The GS Yuasa Corporation of Japan, one of the world’s leading lithium-ion battery manufacturers, makes the batteries for the 787, and Thales, of France, makes the control systems for the battery. The battery is part of a complex electrical system that powers the 787. Like many other components and structures, Boeing outsourced much of the manufacturing to partners around the world.


The safety board typically conducts investigations through a process of elimination, and rules out possible causes along the way.


It said that the lithium-ion battery that powered the auxiliary power unit, a small jet engine used on the ground, had been examined in the safety board’s Materials Laboratory in Washington.


The battery was first X-rayed and put through a CT scan. Investigators then disassembled it into its eight individual cells for detailed examination and documentation. Three of the cells were selected for more detailed radiographic examination.


Investigators have also examined several other components that they removed from the airplane, including wire bundles and battery management circuit boards as well as the battery management unit, the controller for the auxiliary power unit, the battery charger and the power start unit.


On Tuesday, investigators will convene in Arizona to test and examine the battery charger and download nonvolatile memory from the auxiliary power unit controller. Several other components have been sent for download or examination to Boeing’s facility in Seattle and manufacturer’s facilities in Japan.


Read More..