Quotulatiousness

April 3, 2014

ESR reviews Jeremy Rifkin’s latest book

Filed under: Books, Economics, Media, Technology — Tags: , , , , — Nicholas @ 10:46

The publisher sent a copy of The Zero Marginal Cost Society along with a note that Rifkin himself wanted ESR to receive a copy (because Rifkin thinks ESR is a good representative of some of the concepts in the book). ESR isn’t impressed:

In this book, Rifkin is fascinated by the phenomenon of goods for which the marginal cost of production is zero, or so close to zero that it can be ignored. All of the present-day examples of these he points at are information goods — software, music, visual art, novels. He joins this to the overarching obsession of all his books, which are variations on a theme of “Let us write an epitaph for capitalism”.

In doing so, Rifkin effectively ignores what capitalists do and what capitalism actually is. “Capital” is wealth paying for setup costs. Even for pure information goods those costs can be quite high. Music is a good example; it has zero marginal cost to reproduce, but the first copy is expensive. Musicians must own expensive instruments, be paid to perform, and require other capital goods such as recording studios. If those setup costs are not reliably priced into the final good, production of music will not remain economically viable.

[…]

Rifkin cites me in his book, but it is evident that he almost completely misunderstood my arguments in two different way, both of which bear on the premises of his book.

First, software has a marginal cost of production that is effectively zero, but that’s true of all software rather than just open source. What makes open source economically viable is the strength of secondary markets in support and related services. Most other kinds of information goods don’t have these. Thus, the economics favoring open source in software are not universal even in pure information goods.

Second, even in software — with those strong secondary markets — open-source development relies on the capital goods of software production being cheap. When computers were expensive, the economics of mass industrialization and its centralized management structures ruled them. Rifkin acknowledges that this is true of a wide variety of goods, but never actually grapples with the question of how to pull capital costs of those other goods down to the point where they no longer dominate marginal costs.

There are two other, much larger, holes below the waterline of Rifkin’s thesis. One is that atoms are heavy. The other is that human attention doesn’t get cheaper as you buy more of it. In fact, the opposite tends to be true — which is exactly why capitalists can make a lot of money by substituting capital goods for labor.

These are very stubborn cost drivers. They’re the reason Rifkin’s breathless hopes for 3-D printing will not be fulfilled. Because 3-D printers require feedstock, the marginal cost of producing goods with them has a floor well above zero. That ABS plastic, or whatever, has to be produced. Then it has to be moved to where the printer is. Then somebody has to operate the printer. Then the finished good has to be moved to the point of use. None of these operations has a cost that is driven to zero, or near zero at scale. 3-D printing can increase efficiency by outcompeting some kinds of mass production, but it can’t make production costs go away.

April 2, 2014

Enigma’s 21st century open sourced descendent

Filed under: History, Military, Technology, WW2 — Tags: , , — Nicholas @ 09:51

The Enigma device was used by the German military in World War 2 to encrypt and decrypt communication between units and headquarters on land and at sea. Original Enigma units — the few that are on the market at any time — sell for tens of thousands of dollars. You may not be able to afford an original, but you might be interested in a modern implementation of Enigma using Arduino-based open-source hardware and software:

Actual hand-crafted Final design

Actual hand-crafted Final design

Enigma machines have captivated everyone from legendary code breaker Alan Turing and the dedicated cryptographers from England’s Bletchley Park to historians and collectors the world over.

But while many history buffs would surely love to get their hands on an authentic Enigma machine used during WWII, the devices aren’t exactly affordable (last year, a 1944 German Enigma machine was available for auction at Bonhams with an estimated worth of up to $82,000). Enter the Open Enigma Project, a kit for building one from scratch.

The idea came to Marc Tessier and James Sanderson from S&T Geotronics by accident.

“We were working on designing and building intelligent Arduino-based open-source geocaching devices to produce a unique interactive challenge at an upcoming Geocaching Mega Event,” Tessier told Crave. “A friend of ours suggested we use an Enigma type encrypting/decrypting machine as the ultimate stage of the challenge and pointed us to an Instructables tutorial that used a kid’s toy to provide some Enigma encoding. We looked all over to buy a real Enigma machine even if we had to assemble it ourselves and realized that there was nothing available at the moment. So we decided to build our own.”

[…]

“Our version is an electronic microprocessor-based machine that is running software which is a mathematical expression of how the historical mechanical machine behaved,” Sanderson told Crave. “Having never touched a real Enigma M4, we built our open version based on what we read online. From what we understand, the real electro-mechanical devices are much heavier and a little bigger.”

They took some design liberties — replacing the physical rotors with LED units and replacing the light bulbs with white LEDs. The replica can be modified by changing the Arduino code and can communicate to any computer via USB. Future versions may include Wi-Fi and/or Bluetooth.

March 3, 2014

The origins of hacking and the myth of a lost Eden of open source code

Filed under: History, Technology — Tags: , , , — Nicholas @ 09:40

Gather round you kids, ’cause Uncle Eric is going to tell you about the dim, distant days of hacking before open source:

I was a historian before I was an activist, and I’ve been reminded recently that a lot of younger hackers have a simplified and somewhat mythologized view of how our culture evolved, one which tends to back-project today’s conditions onto the past.

In particular, many of us never knew – or are in the process of forgetting – how dependent we used to be on proprietary software. I think by failing to remember that past we are risking that we will misunderstand the present and mispredict the future, so I’m going to do what I can to set the record straight.

[…]

Without the Unix-spawned framework of concepts and technologies, having source code simply didn’t help very much. This is hard for younger hackers to realize, because they have no experience of the software world before retargetable compilers and code portability became relatively common. It’s hard for a lot of older hackers to remember because we mostly cut our teeth on Unix environments that were a few crucial years ahead of the curve.

But we shouldn’t forget. One very good reason is that believing a myth of the fall obscures the remarkable rise that we actually accomplished, bootstrapping ourselves up through a series of technological and social inventions to where open source on everyone’s desk and in everyone’s phone and ubiquitous in the Internet infrastructure is now taken for granted.

We didn’t get here because we failed in our duty to protect a prelapsarian software commons, but because we succeeded in creating one. That is worth remembering.

Update: In a follow-up post, ESR talks about closed source “sharecroppers” and Unix “nomads”.

Like the communities around SHARE (IBM mainframe users) and DECUS (DEC minicomputers) in the 1960s and 1970s, whatever community existed around ESPOL was radically limited by its utter dependence on the permissions and APIs that a single vendor was willing to provide. The ESPOL compiler was not retargetable. Whatever community developed around it could neither develop any autonomy nor survive the death of its hardware platform; the contributors had no place to retreat to in the event of predictable single-point failures.

I’ll call this sort of community “sharecroppers”. That term is a reference to SHARE, the oldest such user group. It also roughly expresses the relationship between these user groups and contributors, on the one hand, and the vendor on the other. The implied power relationship was pretty totally asymmetrical.

Contrast this with early Unix development. The key difference is that Unix-hosted code could survive the death of not just original hardware platforms but entire product lines and vendors, and contributors could develop a portable skillset and toolkits. The enabling technology – retargetable C compilers – made them not sharecroppers but nomads, able to evade vendor control by leaving for platforms that were less locked down and taking their tools with them.

I understand that it’s sentimentally appealing to retrospectively sweep all the early sharecropper communities into “open source”. But I think it’s a mistake, because it blurs the importance of retargetability, the ability to resist or evade vendor lock-in, and portable tools that you can take away with you.

Without those things you cannot have anything like the individual mental habits or collective scale of contributions that I think is required before saying “an open-source culture” is really meaningful.

February 7, 2014

Hackers, “technologists”, … and girls

Filed under: Technology — Tags: , , , , — Nicholas @ 13:35

An interesting post by Susan Sons illustrating some of the reasons women do not become hackers in the same proportion that men do:

Looking around at the hackers I know, the great ones started before puberty. Even if they lacked computers, they were taking apart alarm clocks, repairing pencil sharpeners or tinkering with ham radios. Some of them built pumpkin launchers or LEGO trains. I started coding when I was six years old, sitting in my father’s basement office, on the machine he used to track inventory for his repair service. After a summer of determined trial and error, I’d managed to make some gorillas throw things other than exploding bananas. It felt like victory!

[…]

Twelve-year-old girls today don’t generally get to have the experiences that I did. Parents are warned to keep kids off the computer lest they get lured away by child molesters or worse — become fat! That goes doubly for girls, who then grow up to be liberal arts majors. Then, in their late teens or early twenties, someone who feels the gender skew in technology communities is a problem drags them to a LUG meeting or an IRC channel. Shockingly, this doesn’t turn the young women into hackers.

Why does anyone, anywhere, think this will work? Start with a young woman who’s already formed her identity. Dump her in a situation that operates on different social scripts than she’s accustomed to, full of people talking about a subject she doesn’t yet understand. Then tell her the community is hostile toward women and therefore doesn’t have enough of them, all while showing her off like a prize poodle so you can feel good about recruiting a female. This is a recipe for failure.

[…]

I’ve never had a problem with old-school hackers. These guys treat me like one of them, rather than “the woman in the group”, and many are old enough to remember when they worked on teams that were about one third women, and no one thought that strange. Of course, the key word here is “old” (sorry guys). Most of the programmers I like are closer to my father’s age than mine.

The new breed of open-source programmer isn’t like the old. They’ve changed the rules in ways that have put a spotlight on my sex for the first time in my 18 years in this community.

When we call a man a “technologist”, we mean he’s a programmer, system administrator, electrical engineer or something like that. The same used to be true when we called a woman a “technologist”. However, according to the new breed, a female technologist might also be a graphic designer or someone who tweets for a living. Now, I’m glad that there are social media people out there — it means I can ignore that end of things — but putting them next to programmers makes being a “woman in tech” feel a lot like the Programmer Special Olympics.

August 14, 2013

The “Indie Web” is the very definition of a fringe project

Filed under: Media, Technology — Tags: , , , , , — Nicholas @ 08:55

Wired‘s Klint Finley wants you to meet the indie hackers who want to jailbreak the internet (among other things):

One guy is wearing his Google Glass. Another showed up in an HTML5 t-shirt. And then there’s the dude who looks like the Mad Hatter, decked out in a top hat with an enormous white flower tucked into the brim.

At first, they look like any other gaggle of tech geeks. But then you notice that one of them is Ward Cunningham, the man who invented the wiki, the tech that underpins Wikipedia. And there’s Kevin Marks, the former vice president of web services at British Telecom. Oh, and don’t miss Brad Fitzpatrick, creator of the seminal blogging site LiveJournal and, more recently, a coder who works in the engine room of Google’s online empire.

Packed into a small conference room, this rag-tag band of software developers has an outsized digital pedigree, and they have a mission to match. They hope to jailbreak the internet.

They call it the Indie Web movement, an effort to create a web that’s not so dependent on tech giants like Facebook, Twitter, and, yes, Google — a web that belongs not to one individual or one company, but to everyone. “I don’t trust myself,” says Fitzpatrick. “And I don’t trust companies.” The movement grew out of an egalitarian online project launched by Fitzpatrick, before he made the move to Google. And over the past few years, it has roped in about 100 other coders from around the world.

March 30, 2013

Looking at crowdfunding as a replacement for venture capital

Filed under: Business, Economics, Technology — Tags: , , , — Nicholas @ 07:43

ESR looks at where crowdfunding fits in the traditional tech start-up food chain:

In How crowdfunding and the JOBS Act will shape open source companies, Fred Trotter proposes that crowdfunding a la Kickstarter and IndieGoGo is going to displace venture capitalists as the normal engine of funding for open-source tech startups, and that this development will be a tremendous enabler. Trotter paints a rosy picture of idealistic geeks enabled to do fully open-source projects because they’ll no longer feel as pressed to offer a lucrative early exit to VCs on the promise of rent capture from proprietary technology.

Some of the early evidence from crowdfunding successes does seem to point at this kind of outcome, especially near 3D printing and consumer electronics with a lot of geek buy-in. And I’d love to believe all of Trotter’s optimism. But there’s a nagging problem of scale here that makes me think the actual consequences will be more mixed and messy than he suggests.

In general, VCs don’t want to talk to you at all unless they can see a good case for ploughing in at least $2 million, and they don’t get really interested below a scale of about $15M. This is because the amount of time required for them to babysit an investment (sit on the company’s board, assist job searches, etc.) doesn’t scale down for smaller investments — small plays are just as much work for much less money. This is why there’s a second class of investors, often called “angels”, who trade early financing on the $100K order of magnitude for equity. The normal trajectory of a startup goes from friends & family money through angels up to VCs. Each successive stage in this pipeline is generally placing a larger bet and accordingly has less risk tolerance and a higher time discount than the previous; VCs, in particular, will be looking for a fast cash-out via initial public offering.

The problem is this: it’s quite rare for crowdfunding to raise money even equivalent to the low-end threshold of a VC, let alone the volume they lay down when they’re willing to bet heavily. Unless crowdfunding becomes an order of magnitude more effective than it is now (which seems to me possible but unlikely) the financing source it will displace isn’t VCs but angels.

July 5, 2012

Cisco “updates” consumer routers to allow tracking of internet usage, automatic bricking for terms & conditions violations

If you have a modern Cisco or LinkSys router on your home network, you may have just given up a significant amount in the last “update” the company distributed. ESR has the details:

For those of you who have missed the news, last a few days Cisco pushed a firmware update to several of its most popular routers that bricked the device unless you signed up for Cisco’s “cloud” service. To sign up, you had to agree to the following restrictions:

    When you use the Service, we may keep track of certain information related to your use of the Service, including but not limited to the status and health of your network and networked products; which apps relating to the Service you are using; which features you are using within the Service infrastructure; network traffic (e.g., megabytes per hour); internet history; how frequently you encounter errors on the Service system and other related information (“Other Information”).

So in order to continue using the hardware you bought and paid for and own, you have to agree to let Cisco snoop your browser history and monitor your traffic — a clickstream they would of course instantly turn around and sell to advertising agencies and other snoops. Those terms are so loose (“including but not limited to”) that they could legally read your email and sell that data too.

Disgusted enough yet? Wait, it gets better. The cloud terms of service also includes this gem:

    You agree not to use or permit the use of the Service: (i) to invade another’s privacy; (ii) for obscene, pornographic, or offensive purposes; (iii) to infringe another’s rights, including but not limited to any intellectual property rights; (iv) to upload, email or otherwise transmit or make available any unsolicited or unauthorized advertising, promotional materials, spam, junk mail or any other form of solicitation; (v) to transmit or otherwise make available any code or virus, or perform any activity, that could harm or interfere with any device, software, network or service (including this Service); or (vi) to violate, or encourage any conduct that would violate any applicable law or regulation or give rise to civil or criminal liability.

Translated out of lawyerese, this gives Cisco the right to brick your router if you use it to view anything Cisco considers pornography, or do anything that it might consider IP theft — like, say, bit-torrenting a movie. Or even if you send anything it considers unsolicited advertising — which doesn’t have to mean bulk spam, see “any other form of solicitation”?

The sum of these paragraphs is: “We control your digital life. We can spy on you, we can filter your traffic, we can cut off your net access unilaterally if you do anything we don’t like, and you have no recourse.”

The idea of replacing your router with one that can load and run an open source rather than proprietary system just became a lot more enticing (such things do already exist, although not for all routers).

March 16, 2011

Guest post: Virginia Postrel and the “magic” iPad

Filed under: Technology — Tags: , , , , — Nicholas @ 11:16

This was written by Jon, my former virtual landlord, in an email to me earlier today. I’ve asked his permission to post it on the blog.

Did you see this Wall Street Journal post?

When Apple introduced the iPad last year, it added a new buzzword to technology marketing. The device, it declared, was not just “revolutionary,” a tech-hype cliché, but “magical.” Skeptics rolled their eyes, and one Apple fan even started an online petition against such superstitious language.

But the company stuck with the term. When Steve Jobs appeared on stage last week to unveil the iPad 2, which hit stores Friday, he said, “People laughed at us for using the word ‘magical,’ but, you know what, it’s turned out to be magical.”

I’m not sure what she’s on about when get gets to magic and dissing “makers” and hackers for their disdain of such. More on that later.

Sadly, I think love for the iPad is explained in much simpler terms: it is a shiny object, and people like shiny objects.

The thing is well proportioned (I’ve not looked at the specs, but I suspect that golden ratio proportions are present in its design), it has a polished surface, the display is bright and vivid — and people simply dig that sort of thing. I admit that I find the things attractive, but not attractive enough to overcome what are, for me, wallet-crushing limitations:

  • No ROI. I cannot be measurably productive on an iPad — I could not write or code or draw on the thing — so I’m never going to make back its cost. I’ve been able to pay for all of my computers by being productive on them, but that would not happen on the iPad. For that to happen, I would have to devote far more time than I have to, say, learning how to program for the thing — and that’s not likely to happen. Your mileage will, of course, vary on this: if you can measure and assign a dollar value to the time saved by having a portable internet access point around the office, plant, home, or on the road, then you’ll see more of a return here. At present, though, I don’t need that — at least not in a way that can be represented by income or cashflow.
  • Hyper-accelerated planned obsolescence. Apple is notorious for this — the next generation of device typically makes the earlier generation either less desirable or downright useless. My first — and only — Mac taught me this lesson, and I won’t fall for it again — at least not with an Apple product. The device becoming less desirable may not be an issue for most people, unless they are stylish hipsters who buy the device simply for its value as a fashion accessory. The reduced functionality, lack of updates, and lack of development support might be a real problem for people who bought the things for measurable productivity. So again, as ever and always, your mileage will vary.

Another thing that keeps me from buying one of these is that I can see that they are not going to age well. A portable device is going to get beat up, and the iPad will lose much of its Jobs-gizz-polished luster as the screen gets greasy and smudged, the case gets dinged and pitted, and then, finally — horror of horrors — the screen gets a deep corner-to-corner gouge after you read about the next generation device, drop the thing face down in shock, accidentally kick it into the next stall, and the hobo there picks it up and does who knows what with it before passing it back to you under the cubicle wall. Something as precious as the iPad just will not weather that sort of abuse. And even if it did, would you really want it back after that?

Postrel dibbles:

Even the “maker ethic” of do-it-yourself hobbyists depends on having the right ingredients and tools, from computers, lasers and video cameras to plywood, snaps and glue. Extraordinarily rare even among the most accomplished seamstresses, chefs and carpenters are those who spin their own fibers, thresh their own wheat or trim their own lumber — all once common skills. Rarer still is the Linux hacker who makes his own chips. Who among us can reproduce from scratch every component of a pencil or a pencil skirt? We don’t notice their magic — or the wonder of electricity or eyeglasses, anesthesia or aspirin — only because we’re used to them.

I’m not sure what to make of that. It sounds like she’s saying that hackers should revere the iPad simply because they could not make one themselves from scratch. By that logic, I should revere a shipping pallet because I could not make one from scratch — and I’m thinking beyond my lack of woodworking skills here. To Postrel, the shipping pallet should be seen as magic because I did not plant the acorn that grew into the oak that I cut down with the axe that I forged myself from ore that . . . oh, screw it, you know where I’m going with this and have better things to do with your time than to follow me there).

Postrel is missing the fact that clever people have commoditized magic: they’ve found methods to manufacture tedious or complicated things in ways that make them commonplace and disposable. It’s true that your average hacker could not build an iPad from scratch, starting from raw silicon and copper and gold and dead plankton transmogrified into petrochemicals. I mean, really, who has the time to farm plankton, wait for them to die, settle to the bottom of the ocean, be covered by sediment, be compressed through the build-up of rock strata over geological epochs — sorry, I’m doing it again. While your average hacker is not going to build an iPad from raw materials, your average hacker could probably build a world-changing application for a popular platform if that platform were open.

The article throws out the old groan about any sufficiently advanced technology being indistinguishable from magic. To those who don’t think too much about how that technology works, it certainly must seem like magic. What’s truly magical, though, is when such magic is commoditized and becomes commonplace. It goes from being a flashy-bangy trick to something that’s actually useful. Sadly, Apple is not building magic — they are building a captive audience.

Damnit. I’ve been letting this stew for a couple of days, and I can see that it’s just going to boil down to some lame bromide about how free markets and free access to products that one actually owns after paying for them are what is truly magical, but I’m just not going to go there. So I’m going to consider this done and send it off.

January 21, 2011

If you are finding Firefox to be much slower lately, uninstall the Skype toolbar

Filed under: Technology — Tags: , , , , — Nicholas @ 12:51

I’ve been using Firefox as my main browser for a few years, and it generally works well for me. In the last month or so, however, I’ve noticed it being much slower. Some of that problem may have been caused by the Skype toolbar:

Mozilla has blocked a Skype toolbar add-on for its Firefox browser, after blaming the extension for causing 40,000 crashes last week.

The open source outfit said it vastly slowed down webpage-loading times.

The crash-prone add-on downed Firefox 3.6.13 — which is the current stable version of the browser — far too much, grumbled Mozilla.

“Additionally, depending on the version of the Skype Toolbar you’re using, the methods it uses to detect and re-render phone numbers can make DOM [document object model] manipulation up to 300 times slower, which drastically affects the page rendering times of a large percentage of web content served today (plain English: to the user, it appears that Firefox is slow loading web pages),” it said.

I started using Firefox as my default browser around the time they introduced tabbed pages (which every browser has offered for years now). I also use Opera, Chrome, and (unwillingly) IE for specific purposes. If the Firefox performance issues aren’t resolved when they release the new version 4.0 next month, I’ll consider switching to Chrome as my primary browser instead.

February 21, 2010

It sounds like the correct answer to the legal question

Filed under: Law, Railways, Technology — Tags: , , , — Nicholas @ 19:07

It’s surprising that a dispute over the use of open source software in a model railway application would be the one to set the legal precedent, but that is what happened here:

Although some people viewed it as a tempest in a teapot, the long-running legal case Jacobsen v. Katzer stirred up some seminal open source issues. We first reported on the dust-up all the way back in August of 2008, noting that the dispute centered around — of all things — model train software.

Specifically, Jacobsen had developed JMRI, the Java Model Railroad Interface project. When Katzer built the code for the project into proprietary model train software, deleting existing copyright notices within the code, Jacobsen filed suit. Now, settlement documents are available online, and the end of the dispute points to a final victory for open source licenses.

The settlement documents show that Katzer will pay Jacobsen $100,000 over 18 months, cease using the JMRI code, and not attempt to register domains using the JMRI name. Previously, the legal dispute had gone all the way to the United States Court of Appeals for the Federal Circuit, which is the last legal stop before the Supreme Court. As Lawrence Lessig noted in a post, when the Court of Appeals upheld the Artistic License that governed the use of JMRI, it was “an important victory” for free licenses. Lessig noted that the decision had broad implications for many open source licenses.

Just because someone allows the use of source code freely does not mean you can, in effect, file off the serial numbers and pretend that it’s all your own work . . .

H/T to Craig Zeni for the link.

July 22, 2009

Hurrah for Alex Nolan

Filed under: Technology — Tags: , , — Nicholas @ 18:33

I’ve had a bunch of Microsoft Access database files kicking around for the last several months, but due to version incompatibilities, I’ve been unable to open them. I didn’t want to buy a license for the program, just to pull my data out, so I’d looked for alternative ways to free my data from the proprietary clutches of Access.

I’d tried using Open Office, which includes a database program, but ran into the consequences of my own bad planning: Base (the OOo database component) could open Access files, but couldn’t do anything useful with them if they didn’t have a primary key. Most of my files were pretty basic flat files with a single table, so I’d never bothered to add a primary key (yes, I know: bad database practice).

Base would also let me export individual tables or queries to Calc (the spreadsheet component), but the process seemed pretty dicey — it locked up on me three times as I tried to save a new Calc spreadsheet as a .CSV file. I wasn’t comfortable that all the data in the table had been properly captured in the output, either.

Enter Mr. Nolan’s neat little MDB Viewer Plus utility (downloadable from here). It’s just a simple viewer for Microsoft Access files, but it worked a treat on extracting the tables I needed out of the proprietary MDB format to a .CSV I can import into something else (after this experience, something open source by preference).

Update: Aagh! Not quite as clean as I first thought. It appears that any date that has a value of greater than 12 for the day has been dropped. I wonder if this is an artifact of the difference between British and American usage (D/M/Y versus M/D/Y). Data normalization looks to be a lengthy task after all.

« Newer Posts

Powered by WordPress