The New Global Warming Flooding Drought

These are two screen captures from the Chromebox from yesterday. I’ve not yet found an easy way to crop these (Chrome applications are sometimes a bit obtuse, and sometimes limited, so my ‘edit’ ability is hobbled. I hope to get a real Linux installed on the thing in the next month or two to solve that, but we’ll see how time availability goes). Both are from our (US) government. One shows the present ongoing horrible end of life as we know it Global Warming caused Mother Of All Droughts (that is indistinguishable to me from the half dozen or so I’ve lived through in California). The other shows the present ongoing horrible end of life as we know it Global Warming caused Mother Of All Floods (that is indistinguishable from the half dozen or so I’ve lived through in California – other than being a bit wimpy compared to the early ’60s).

Yes, we seem to be having a Drought Flood, or maybe a Flood Drought. Clearly we need a new vocabulary to deal with all the Horrible End Of Life As We Know It things brought to us by the ‘science’ of Global Warming. Wet drought? Dought flood? Decisions decisions….

Drought Index 2014 Dec 12 showing California Drought

Drought Index 2014 Dec 12 showing California Drought

So that’s the drought conditions at present. When I was a kid, droughts ended when the rains came. Now a drought doesn’t end until you have refilled all reservoirs (even those being flushed to sea for bait fish) and have had above average rainfall for enough years to have the running average reach normal. That can take a few years. The net result is that we have near perpetual “official drought” even long after normal rainfall returns. Which brings us to:

California flood risk map 2014 Dec 12 showing loads of rain and flooding.

California flood risk map 2014 Dec 12 showing loads of rain and flooding.

Such is the stuff that the Global Warming panic is made of. California, like Australia and many other places, has absolutely normal oscillation between dry and wet. Proper use of running means, averaging when inappropriate, and changing traditional definitions of things like ‘drought’; you too can create a catastrophe out of just about any normal cyclical change.

But you end up with the problem of having your two ‘catastrophes’ overlap… It will be interesting to see how they sell the New, Improved, “Global Warming Flooding Drought”…

Then there’s the problem of folks like me who lived in California for about 60 consecutive years. I’ve seen a full 60 year weather cycle. What’s happening now is indistinguishable from normal. Much like the ’50s to early ’60s IMHO. Maybe they can just define us away… Call us the D-Word (or worse?).

But when it comes to drought and flood in California: “Yet, it cycles! -E.M. Smith”

Subscribe to feed


About E.M.Smith

A technical managerial sort interested in things from Stonehenge to computer science. My present "hot buttons' are the mythology of Climate Change and ancient metrology; but things change...
This entry was posted in AGW and Weather News Events and tagged , , , , , . Bookmark the permalink.

13 Responses to The New Global Warming Flooding Drought

  1. Ian W says:

    There was a song back in 1972 (before the satellite era) about that too:

    “Seems it never rains in southern California
    Seems I’ve often heard that kind of talk before
    It never rains in California, but girl, don’t they warn ya?
    It pours, man, it pours”

    So these ‘floughts’ are well known events even making into popular songs.

  2. omanuel says:

    They are NOT EVIL: They assumed a few little white lies were justified to save the world from nuclear annihilation in 1945.

  3. R. de Haan says:

    I think they push for the concept of the extremes. People getting interviewed telling us “I´ve never experienced such an even all my life.”

    We already went the way from AGW to climate change to Global Climate Disruption, the extrems and we will have much more of those extremes en though are historic weather statistic tell us the current period of weather extremes is at an all time low.

    In short, they just keep on lying and with 80% morons among our populations they will get away with it.

  4. punmaster52 says:

    80% ? Seems a bit low to me.

  5. omanuel says:

    Since 1945 humanity has lived like rats in a “Maze of Deception” – apparently constructed by leaders of the Geophysics Sections of NAS and RS, etc., to save the world and themselves from possible nuclear annihilation by forbidding public knowledge of the energy that destroyed Hiroshima.

    More details and links are posted on Steven Goddard’s blog on fake global temperatures:

  6. peter azlac says:

    I do not know whether it works with Chromebook but the Chrome plugin Awesome Screenshot should do what you want.

  7. E.M.Smith says:

    @Peter Azlac:

    Thanks for the pointer. I’ll take a look at it. Might be simpler than what I found. Hitting “print screen” then using the photo editor. The photo editor lets you hit an ‘edit’ icon (that for me was not exactly obvious) THEN you get a set of cropping angles and can trim the edges (in a limited and regular rectangle kind of way…)

    FWIW, my overall opinion of Chrome is that it’s very good as a specific purpose appliance ( browsing and some small file manipulation behaviours) but limited at pretty much all the edges (so no full function graphics editor or full function file system or full function programming environment or…) It’s worked just fine as a blog interface appliance and web browser; but limited when you want to do anything fancy. Now it’s always possible I’m just not schooled enough in Chrome to know the ‘Chrome way’ of doing things… but that would imply the UI isn’t exactly friendly… Since I’m ‘conversant’ in several diverse OS interfaces (from IBM Mainframe to PC to Apple of several ages to Unix of many flavors to Linux of a dozen stripes to…) so if the features are there, they are not rapidly discoverable by an experienced computer guy…

    So I’m quite happy with the Chromebox in terms of ‘bang for the buck’ and ‘rapid fix to my need for basic function’; it’s a bit ‘toy like’ on depth of features compared to things like a PC or especially a full on Linux box. Then again, I’ve not felt the need to actually install Linux on this one even though I’ve had it for a few months. Each time I’ve “found a way” around that need. Including this time when I found the steps to get into the crop function of the photo editor for screen captures. Color me happy with it, in a ‘yet another thing to learn, really?’ kind of way ;-)

  8. p.g.sharrow says:

    “Rained all night the day I left, the weather it was dry, Sun so hot I nearly froze to death, Suzanna don’t you cry.”
    Old song, things haven’t changed much in my 68 years. With hot, cold, cycles of about 60 years, any changes of less duration is just weather. 5 full cycles, 300 years would be needed to see any actual climate change.
    @EMSmith I thought you were going to figure out a basic “Web Machine” for us ;-) Lol
    Remember, As long as you work for a living, you will never make money. pg

  9. E.M.Smith says:


    I’m still working on my ideal “box”. Not going to give up on it. There are several folks already working on a ‘black phone’ that is not NSA / Microsoft / Apple / Google pre-buggered and tattling to nanny-state; so I don’t see much upside to me starting a new project. Better just to keep track of it.

    On the “box” side; there are several folks already making a clean OS (including, of all folks, China – for their own domestic military industrial use… I’ve got a half-done posting on that ‘in the wings’… based on BSD Unix and a Linux UI overlay. Right up my alley…) THE big issue I’ve run into is that ‘bios’ layer change. It’s a nightmare of non-provably secure between you and the hardware. EUFI is semi-sucky in that regard. So I got a ChromeBox to check it out as a cheap platform with a plausibly workable bios interface. Better than the MicroSoft crap, but not by much… I’m happy to use it for limited purposes, but not anything needing real security.

    The unfortunate downside of THAT, is that I need to get down a further layer to know that the BIOS isn’t buggering my actual security. Get below / outside of EUFI. Hard hoeing at that point… Add in that the TrueCrypt folks saw that same problem and just ‘packed it in’ instead of tackling it… well, that sucked. (They realized that in an EUFI world they could not assure security as that layer always was stuck between them and the real hardware).

    So if it isn’t possible to have a secure EUFI based system, what hardware to use? That’s a bit of an issue… (My present speculation is that it will be usable to make a ‘gaggle of embedded systems’ type hardware. Essentially, using things like a half dozen Raspberry Pi boards as a cluster computing solution. Get cheap enough per board and it isn’t possible to put a buggered intelligent layer between you and the hardware… then gang them into a cluster.) But that fails on single heavy compute tasks that can’t be spread over multiple dumb processors. Luckily there are not a lot of those tasks…)

    So, in short, I’ve not let go of that problem while solving my immediate need for a ‘blog management console’ as the HP laptop died. I expect that in a couple of months I’ll have some kind of update on that front. For now, I’m using the Chromebox as my ‘console’ and posting engine while I find out just how many security holes can be built into a paradigm while keeping it looking secure… (Just found out that to use it as a terminal it wants to send all the relevant connection data – like host and login – to a web site… like that’s going to work for me. CROSH the Chrome Shell has a built in SSH that looks usable and likely secure enough for most uses, but the whole paradigm is based around sharing anything useful from the Chrome world with Google. I’d not use it for anything requiring security from Google or the Government who are completely in their house… for that, it’s a gaggle of limited hardware as a Linux based Beowulf.)

    Hopefully that’s intelligible. I’d do more, faster, but I need to sell my time for food and roof. Such is the way of things. (If only someone with a huge bucket o money wanted to be my patron… oh, for the old Medieval ways of things ;-) But at least the present situation lets me be brutally honest and true to myself. ;-)

    FWIW, I’ve done a draft of my proposed infrastructure solution. It will be implemented as a ‘router and system” structure. At the moment using a R.Pi as the ‘boundary router’ with NAT and firewall, tossing UDP on the floor as it looks to be the NSA bleat method of choice, and with both blacklist and whitelist DNS lookups locally. Then if the backend gets buggered with something that wants to bleat packets to the outside, they tend to get quashed; while attempts to connect inbound get dropped on the floor. As the R.Pi is in firmware and a locked SD card, it is hard to bugger once built. Then the “mostly browser and such” inside system has too few services to easily compromise. That’s the basic idea. The Chromebox will be an interesting test case as the boundary router limits what it can ‘communicate’ without notification…

    At any rate, that’s what I’m working on. Though more slowly than I’d like.

  10. Graeme No.3 says:

    Transputer type system? Way out of my depth, browsing led to Taos and Dick Pountain – used to like his articles, not as much as yours.

  11. E.M.Smith says:

    @Graeme No.3:

    Sort of… The Transputer was a chip designed to allow parallel processing. Now that ability is built in to most general purpose multitasking processors. A Beowulf is a way of using a gaggle of those ordinary (today) multitasking processors to act as one large parallel machine. The communications (“backplane” if you will) is based on a wired network (typically 100 Mb or 1 Gb) that’s too slow for really “top 500” class supercomputing, but way faster than any average Joe or Jane needs for lots of usable processing (such as graphics and images – the biggest load most folks put on their machines).

    If I want to have a significant performance, but without using motherboards built for Windoz 8 or newer (so not afflicted with EUFI bios and those potential govt mandated back door potentials) I need to use a board that’s intended for other things. “Uninteresting” things, from an NSA point of view. That means “embedded processor” boards that also often have lower power each, or ‘hacker boards’ like the Raspberry Pi. That gives me control of the buggering of the bios. But at the cost of lower power / board… which you fix by ganging them together into a cluster. Either a COW (collection of workstations or cluster of workstations) or a Beowulf or some other approach.

    Now that’s a reasonably clean system (with control of bios and OS via clustered Linux); but there’s still an exposure at the browser / user level. For that, we can’t completely eliminate it (folks will screw up) but some simple things can kill a lot of it. Use a local caching DNS server (so folks can’t redirect on you too easily), and tossing suspect packets on the floor (since we now know the NSA likes to use encrypted UDP to get info out of your box, just trash UDP packets… most of what the average folk do is TCP protocol based… UDP is “toss it at a target and hope” while TCP is “get confirmation or re-try until it makes it”.) By having that protocol / DNS / firewall and routing stuff in a dedicated layer (board) with the OS locked, it’s very hard to bugger it ‘on the fly’. And now you must get through that to bugger the workstation… that isn’t “the usual” MS Windoz or Apple. Furthermore, since the cluster can be set up to boot from a “boot server” that can itself be locked down, a simple re-boot tends to restore the original config and erase any attempts at OS buggery.

    This is starting to get a bit ‘way off topic’ and deep, so likely ought to go into it’s own thread. But as a ‘take away’, the general approach is to divide functions between dedicated small and controlled units. No one unit has all you need to attack it, and many of them are locked in structure, not subject to change at all, and you must get past them to get to and change the ‘desktop’, that is itself restored on reboot. Not perfect, but a hard nut to crack and if you reboot daily, pretty well a PITA for any attacker. (Compare to the typical workstation where the bios, OS, and all services are existing on one box. Get control on that box, you have the world. In this distributed, locked, clustered model, you must capture it all prior to it being rebooted…or you start all over…)

  12. Pingback: Raining Again in San Jose, In June, In A Drought | Musings from the Chiefio

Comments are closed.