Quotulatiousness

July 3, 2020

Birth, rapid growth, profitable stasis, bureausclerosis, decline, death – typical tech firm lifecycle

Filed under: Bureaucracy, Business, Technology — Tags: , , , — Nicholas @ 03:00

In the Continental Telegraph, what looks to be a pretty solid characterization of the corporate life-cycle for technology firms:

There are generally, 6 stages in the life of a tech company:

  1. Inception. A couple of smart kids start something in a garage. Massive innovation.
  2. Fast growth. The business moves to some good offices, number of staff increases. They take on smart, fast moving people who are innovating big. A few people know them.
  3. Steady growth. The business is now something of a household name. They get their own small head office. Staff are more like normal business. Innovation continues, but the bureaucracy starts to grow.
  4. Bureaucracy. The business is a household name. They have multiple offices, or something designed by a smart-ass architect. There’s still staff coming in, but they’re mostly seeing it as a nice warm place to sit and be bureaucrats. The innovators start leaving as it’s just not interesting. They might even be making lots of money, but it’s mostly just living off what was built in earlier phases, or large dumb wasteful projects that go nowhere for years.
  5. Decline. A new disruptor arrives on the scene. They innovate in a field you’re involved in. You can’t keep up because in the previous phase, you replaced the innovators with bureaucrats. You’re outsmarted.
  6. Terminal decline and death. You slowly or quickly disappear, maybe holding onto a few customers who habitually use you.

I think there might also be something about when government starts taking an interest in you, and I think it’s quite some time into stage 4. Google are already there. Firing James Damore is very much bureaucracy state behaviour. They wouldn’t have cared when it was a tiny number of staff in an office. And how much have they really innovated in the last decade?

May 16, 2020

QotD: Division of labour in the modern world

Filed under: Business, Economics, Quotations, Technology — Tags: , , , , — Nicholas @ 01:00

… digital devices slow us down in subtler ways, too. Microsoft Office may be as much a drag on productivity as Candy Crush Saga. To see why, consider Adam Smith’s argument that economic progress was built on a foundation of the division of labour. His most celebrated example was a simple pin factory: “One man draws out the wire, another straights it, a third cuts it, a fourth points” and 10 men together made nearly 50,000 pins a day.

In another example — the making of a woollen coat — Smith emphasises that the division of labour allows us to use machines, even “that very simple machine, the shears with which the shepherd clips the wool”.

The shepherd has the perfect tool for a focused task. That tool needs countless other focused specialists: the bricklayer who built the foundry; the collier who mined fuel; the smith who forged the blades. It is a reinforcing spiral: the division of labour lets us build new machines, while machines work best when jobs have been divided into one small task after another.

The rise of the computer complicates this story. Computers can certainly continue the process of specialisation, parcelling out jobs into repetitive chunks, but fundamentally they are general purpose devices, and by running software such as Microsoft Office they are turning many of us into generalists.

In a modern office there are no specialist typists; we all need to be able to pick our way around a keyboard. PowerPoint has made amateur slide designers of everyone. Once a slide would be produced by a professional, because no one else had the necessary equipment or training. Now anyone can have a go — and they do.

Well-paid middle managers with no design skills take far too long to produce ugly slides that nobody wants to look at. They also file their own expenses, book their own travel and, for that matter, do their own shopping in the supermarket. On a bill-by-the-minute basis none of this makes sense.

Why do we behave like this? It is partly a matter of pride: since everyone has the tools to build a website or lay out a book, it feels a little feeble to hand the job over to a professional. And it is partly bad organisational design: sacking the administrative assistants and telling senior staff to do their own expenses can look, superficially, like a cost saving.

Tim Harford, “Why Microsoft Office is a bigger productivity drain than Candy Crush Saga”, The Undercover Economist, 2018-02-02.

April 28, 2020

ESR on “Lassie errors” in software

Filed under: Technology — Tags: , , , — Nicholas @ 03:00

I’d never heard this term before, but it’s an excellent description of the problem:

“Interactive UNIX Booting” by mrbill is licensed under CC BY 2.0

Lassie was a fictional dog. In all her literary, film, and TV adaptations the most recurring plot device was some character getting in trouble (in the print original, two brothers lost in a snowstorm; in popular memory “Little Timmy fell in a well”, though this never actually happened in the movies or TV series) and Lassie running home to bark at other humans to get them to follow her to the rescue.

In software, “Lassie error” is a diagnostic message that barks “error” while being comprehensively unhelpful about what is actually going on. The term seems to have first surfaced on Twitter in early 2020; there is evidence in the thread of at least two independent inventions, and I would be unsurprised to learn of others.

In the Unix world, a particularly notorious Lassie error is what the ancient line-oriented Unix editor “ed” does on a command error. It says “?” and waits for another command – which is especially confusing since ed doesn’t have a command prompt. Ken Thompson had an almost unique excuse for extreme terseness, as ed was written in 1973 to run on a computer orders of magnitude less capable than the embedded processor in your keyboard.

Herewith the burden of my rant: You are not Ken Thompson, 1973 is a long time gone, and all the cost gradients around error reporting have changed. If you ever hear this term used about one of your error messages, you have screwed up. You should immediately apologize to the person who used it and correct your mistake.

Part of your responsibility as a software engineer, if you take your craft seriously, is to minimize the costs that your own mistakes or failures to anticipate exceptional conditions inflict on others. Users have enough friction costs when software works perfectly; when it fails, you are piling insult on that injury if your Lassie error leaves them without a clue about how to recover.

April 25, 2020

Professor Neil Ferguson – “I wrote the code (thousands of lines of undocumented C) 13+ years ago to model flu pandemics…”

Filed under: Britain, Government, Health — Tags: , , , — Nicholas @ 03:00

An anonymous guest post at Hector Drummond’s blog pivots on the disturbing quote in the headline from one of the key advisors to the British government on the Wuhan Coronavirus epidemic:

To say I was gobsmacked at his admission is an understatement. He’s one of the experts advising the government about the Covid-19 pandemic, and was consulted in previous health crises such as Foot & Mouth disease. Like the approach to combating that, we’re seeing a kind of scorched earth approach to containing another transmissible disease.

Even though the “C” programming language that Ferguson used is nearly 50 years old, the language chosen isn’t the problem. Undocumented means that modules and other code fragments are not commented, so their purpose may be unclear to someone unfamiliar with the code. In the worst case it means that modules and variables don’t have self-documenting names. For example, an accounting program could have the variables BalanceBroughtForward and BalanceCarriedForward, but a sloppy programmer might call them B1 and B2 instead – a sure recipe for confusion.

The “C” language is good to work with but has some inherent issues which can lead to subtle bugs affecting the output without causing an error. A common problem is the conditional which uses two equals signs rather than one.

To compare variables A and B for equality you would write this: if (A == B). However, it’s easy to accidentally write this: if (A = B). The latter always returns true and assigns the value of variable B to A. I have no idea whether Ferguson’s code contains any bugs, this is just one minor example of the need for strict testing.

The reason for commenting code extensively and properly is so that the programmer himself, and anyone else who maintains it, can understand what it does and how it works, reduce the chance of mistakes and avoid unnecessary effort. During my IT career I would have terminated the contract of any contractor working for me who wrote thousands of lines of undocumented code. Not only is such code a nightmare for others to work on, it can be difficult for the original programmer to maintain if coming back to it after a long time. Sloppiness in the coding raises the worry of a concomitant lack of rigour in testing, although that’s not to assert Ferguson’s code isn’t working as intended and/or wasn’t tested.

November 2, 2019

Notepad++ release 7.8.1, also known as the “Free Uyghur” edition, draws unfriendly Chinese attention

Filed under: China, Liberty, Religion, Technology — Tags: , , — Nicholas @ 03:00

I’ve been using Notepad++ as one of my text editor options for a long time. It’s a very useful tool, and I heartily commend it to anyone needing a Windows text editor that can do a lot more than just edit text. I hadn’t downloaded the most recent version, so I was unaware that the developer was under attack from Chinese government supporters for his explicit designation of version 7.8.1 as the Free Uyghur edition:

On Tuesday, Don HO, the developer of Notepad++, a free GPL source code editor and notepad application for Microsoft Windows, released version 7.8.1, prompting a social media firestorm and a distributed denial of service attack.

Notepad++ v7.8.1 was designated “the Free Uyghur edition,” in reference to the predominantly Muslim ethnic group in western China that faces ongoing human rights violations and persecution at the hands of Beijing.

“The site notepad-plus-plus.org has suffered DDoS attack from 1230 to 1330 Paris time,” HO said in an email to The Register. “I saw the [reduced] amount of visitors via Google analytics then the support of my host confirmed the attack. The DDoS attack has been stopped by an anti-DDoS service provided by our host [Cloudflare].”

Previous politically-themed Notepad++ releases have focused on Tiananmen Square and the terrorist attack on French satirical publication Charlie Hebdo.

A post on the project’s website explains HO’s decision to criticize the Chinese government, something companies with business interests in China generally try not to do for fear of retribution.

From the Notepad++ website:

Human rights in China is always a hotly contested topic. Since 2017, numerous reports have emerged of the Uyghur people being detained in extrajudicial “re-education camps”, subjected to political indoctrination, and sometimes even torture. 2018 estimates place the number of detainees in the hundreds of thousands.

The Uyghurs are not ethnically Chinese but live in China’s so-called autonomous Xinjiang region. The region’s name suggests the Uyghurs have autonomy and self-governance. But similarly to Tibet, Xinjiang is a tightly controlled region of China. After the recent Xinjiang conflict, Beijing has recast the Uyghur ethnic group as a terrorist collective. This has allowed Beijing to justify its transformation of Xinjiang into a surveillance state. There has also been a marked rise of Islamophobia across China.

At least 120,000 members of Kashgar’s Muslim Uyghur minority have been detained in Xinjiang’s re-education camps which aim to change the political thinking of detainees, their identities, and their religious beliefs. Reports from the World Uyghur Congress submitted to the United Nations in July 2018 suggest that 1 million Uyghurs are currently being held in the re-education camps.

August 17, 2019

How Diablo was completely Reverse Engineered without Source Code | MVG

Filed under: Gaming, Technology — Tags: , — Nicholas @ 02:00

Modern Vintage Gamer
Published on Jul 1, 2019

In 1996 Blizzard Entertainment released Diablo, an Action RPG that sold over 2.5 million copies and defined a genre. In 2018 a developer known as GalaXyHaXz almost completely reverse engineered the code in 4 months and released it as open source. How was this accomplished? Find out in this episode!

► Consider supporting me – https://www.patreon.com/ModernVintage…

Links

DevilutionX (Open Source Diablo) https://github.com/diasurgical/devilu…
► My Nintendo Switch Port – https://github.com/lantus/devilution-nx

August 4, 2019

Blog housekeeping notes

Filed under: Randomness — Tags: , — Nicholas @ 05:00

Sorry to anyone who tried to access the blog on Saturday morning, as it went down hard for about an hour after my WordPress statistics plug-in got holed below the waterline and had to be scuttled. I’ve been using it for several years without a problem, but somehow Saturday was the day it decided to stop working. A reader notified me on one of the social media sites that the blog wasn’t loading and I checked the dashboard to see a long list of fatal errors pop up. It looked like the initial problem was a call to a non-existent function in SQL which then caused a cascade of other uncaught errors and the blog no longer displayed for would-be readers. I switched to the troubleshooting tab and then looked at the details on the CyStats plug-in, and suddenly the answer appeared:

You may have to look really closely to see what the issue is…

I guess I’ll have to do without my old stats package now.

May 10, 2019

Microsoft can’t get worse than old Clippy? “Hold my non-alcoholic beer”

Filed under: Technology — Tags: , , , , — Nicholas @ 05:00

Libby Emmons reports on a new Microsoft Word plugin that puts Clippy into the history books:

Coming soon to a word processing app you probably already subscribe to is Microsoft’s new Ideas plugin. This leap forward in the predictive text trend will endeavor to help you be less offensive. Worried you might be a little bit racist? A little gender confused? Not sure about the difference between disabled persons and persons who are disabled? Never fear, Microsoft will fix your language for you.

Using machine learning and AI, Microsoft’s Ideas in Word will help writers be their least offensive, most milquetoast selves. Just like spell check and grammar check function, Ideas will make suggestions as to how to improve your text to be more inclusive. On the surface, this seems like a terrible idea, but when we dig further beneath the impulse, and the functionality of the program, it gets even worse. What’s happening is that AI and machine learning are going to be the background of pretty much every application, learning from our behaviours not only how we’d like to format our PowerPoint presentations, but learning, across platforms, how best to construct language so that we say what we are wanted to say as opposed to what we really mean.

There is an essential component of honest communication, namely that a person express themselves using their own words. When children are learning to talk and to articulate themselves, they are told to “use your words.” Microsoft will give writers the option of using someone else’s words, some amalgamation of users’ words across the platform, and the result will be that the ideas exhibited will not be the writer’s own.

October 8, 2018

QotD: The closed-source software dystopia we barely avoided

Filed under: Business, Quotations, Technology — Tags: , , , — Nicholas @ 01:00

Thought experiment: imagine a future in which everybody takes for granted that all software outside a few toy projects in academia will be closed source controlled by managerial elites, computers are unhackable sealed boxes, communications protocols are opaque and locked down, and any use of computer-assisted technology requires layers of permissions that (in effect) mean digital information flow is utterly controlled by those with political and legal master keys. What kind of society do you suppose eventually issues from that?

Remember Trusted Computing and Palladium and crypto-export restrictions? RMS and Linus Torvalds and John Gilmore and I and a few score other hackers aborted that future before it was born, by using our leverage as engineers and mentors of engineers to change the ground of debate. The entire hacker culture at the time was certainly less than 5% of the population, by orders of magnitude.

And we may have mainstreamed open source just in time. In an attempt to defend their failing business model, the MPAA/RIAA axis of evil spent years pushing for digital “rights” management so pervasively baked into personal-computer hardware by regulatory fiat that those would have become unhackable. Large closed-source software producers had no problem with this, as it would have scratched their backs too. In retrospect, I think it was only the creation of a pro-open-source constituency with lots of money and political clout that prevented this.

Did we bend the trajectory of society? Yes. Yes, I think we did. It wasn’t a given that we’d get a future in which any random person could have a website and a blog, you know. It wasn’t even given that we’d have an Internet that anyone could hook up to without permission. And I’m pretty sure that if the political class had understood the implications of what we were actually doing, they’d have insisted on more centralized control. ~For the public good and the children, don’t you know.~

So, yes, sometimes very tiny groups can change society in visibly large ways on a short timescale. I’ve been there when it was done; once or twice I’ve been the instrument of change myself.

Eric S. Raymond, “Engineering history”, Armed and Dangerous, 2010-09-12.

September 24, 2018

Verity Stob on early GUI experiences

Filed under: History, Technology — Tags: , , — Nicholas @ 05:00

“Verity Stob” began writing about technology issues three decades back. She reminisces about some things that have changed and others that are still irritatingly the same:

It’s 30 years since .EXE Magazine carried the first Stob column; this is its pearl Perl anniversary. Rereading article #1, a spoof self-tester in the Cosmo style, I was struck by how distant the world it invoked seemed. For example:

    Your program requires a disk to have been put in the floppy drive, but it hasn’t. What happens next?

The original answers, such as:

    e) the program crashes out into DOS, leaving dozens of files open

would now need to be supplemented by

    f) what’s ‘the floppy drive’ already, Grandma? And while you’re at it, what is DOS? Part of some sort of DOS and DON’TS list?

I say: sufficient excuse to present some Then and Now comparisons with those primordial days of programming, to show how much things have changed – or not.

1988: Drag-and-drop was a showy-offy but not-quite-satisfactory technology.

My first DnD encounter was by proxy. In about 1985 my then boss, a wise and cynical old Brummie engineer, attended a promotional demo, free wine and nibbles, of an exciting new WIMP technology called GEM. Part of the demo was to demonstrate the use of the on-screen trash icon for deleting files.

According to Graham’s gleeful report, he stuck up his hand at this point. “What happens if you drag the clock into the wastepaper basket?’

The answer turned out to be: the machine crashed hard on its arse, and it needed about 10 minutes embarrassed fiddling to coax it back onto its feet. At which point Graham’s arm went up again. “What happens if you drop the wastepaper basket into the clock?’

Drag-ons ‘n’ drag-offs

GEM may have been primitive, but it was at least consistent.

The point became moot a few months later, when Apple won a look-and-feel lawsuit and banned the GEM trashcan outright.

2018: Not that much has changed. Windows Explorer users: how often has your mouse finger proved insufficiently strong to grasp the file? And you have accidentally dropped the document you wanted into a deep thicket of nested server directories?

Or how about touch interface DnD on a phone, where your skimming pinkie exactly masks from view the dragged thing?

Well then.

However, I do confess admiration for this JavaScript library that aims to make a dragging and dropping accessible to the blind. Can’t fault its ambition.

August 24, 2018

From Software-as-a-Service to emerging Techno-Feudalism

Filed under: Business, Europe, History, Technology — Tags: , , — Nicholas @ 03:00

The shift from selling software to selling software subscriptions was a major sea-change in the technology world. Here’s a bit of historical perspective from The Z Man to explain why this could be a very bad thing indeed for the average user:

Feudalism only works when a small elite controls the source of wealth. Then they can control the exploitation of it. In Europe, as Christianity spread, the Church acquired lands, becoming one of the most powerful forces in society. The warrior elite was exclusively Catholic, thus they had a loyalty to the Pope, as God’s representative on earth. Therefore, the system of controlling wealth not only had a direct financial benefit to the people at the top, it had the blessing of God’s representative, who sat atop the whole system.

That’s something to keep in mind as we see technology evolve into a feudal system, where a small elite controls the resources and grants permission to users. The software oligopolies are now shifting all of their licensing to a subscription model. It’s not just the mobile platforms. Developers of enterprise software for business are adopting the same model. The users have no ownership rights. Instead they are renters, subject to terms and conditions imposed by the developer or platform holder. The user is literally a tenant.

The main reason developers are shifting to this model is that they cannot charge high fees for their software, due to the mass of software on the market. Competition has drive down prices. Further, customers are not inclined to pay high maintenance fees, when they can buy new systems at competitive rates. The solution is stop selling the stuff and start renting it. This fits the oligopoly scheme as it ultimately puts them in control of the developers. Apple and Google are now running protection rackets for developers.

It also means the end of any useful development. Take a look at the situation Stefan Molyneux faces. A band of religious fanatics has declared him a heretic and wants him burned. The Great Church of Technology is now in the process of having him expelled from the internet. As he wrote in a post, he invests 12 years building his business on-line, only to find out he owns none of it. He was always just a tenant farmer, who foolishly invested millions in YouTube. Like a peasant, he is now about to be evicted.

How long before someone like this monster discovers that Google and Apple will no longer allow him to use any apps on his phone? Or maybe he is denied access to his accounting system? How long before his insurer cuts off his business insurance, claiming the threat from homosexual terrorists poses too high of a risk? Federal law prevents the electric company from shutting off his power due to politics, but Federal law used to prevent secret courts and secret warrants. Things change as the people in charge change.

June 20, 2018

Do You Have a Right To Repair Your Phone? The Fight Between Big Tech and Consumers

Filed under: Business, Law, Liberty, Technology — Tags: , , , , , — Nicholas @ 04:00

ReasonTV
Published on 18 Jun 2018

Eric Lundgren got 15 months in prison for selling pirated Microsoft software that the tech giant gives away for free. His case cuts to the heart of a major battle going on in the tech industry today: Companies are trying to preserve aspects of U.S. copyright law that give them enormous power over the products we own.

Reason is the planet’s leading source of news, politics, and culture from a libertarian perspective. Go to reason.com for a point of view you won’t get from legacy media and old left-right opinion magazines.

February 16, 2018

Games Should Not Cost $60 Anymore – Inflation, Microtransactions, and Publishing – Extra Credits

Filed under: Business, Economics, Gaming — Tags: , — Nicholas @ 02:00

Extra Credits
Published on 24 Jan 2018

You would think that paying $60 for a game would be enough, but so many games these days ask for money with DLC, microtransactions, and yes, lootboxes. There’s a reason for that.

January 31, 2018

QotD: “Enhancing the user experience”

Filed under: Business, Media, Quotations, Technology — Tags: , , , — Nicholas @ 01:00

Once upon a time, computers weren’t all constantly connected to the intertubes. What we call “air-gapped” these days was the normal state of machines back in the desktop beige box days.

Back then, when you bought a program it came in a cardboard box on physical media. You would install it on your computer and it would work the same way from the day you installed it to the day you stopped using it. Nobody could rearrange the menus on WordPerfect or change the buttons in Secret Weapons of the Lufwaffe … Good times.

Nowadays, half the software you interact with doesn’t even reside on your PC. Further, there are whole departments at, say, Facebook or Blizzard or Google whose entire job is to “enhance the user experience”. If they’re not constantly dicking around, adding and removing features, changing what buttons do, moving things around … then they’re not doing their jobs.

We have incentivized instability.

Tamara Keel, “Tinkering for tinkering’s sake…”, View From The Porch, 2018-01-10.

December 12, 2017

“Well sir, there’s nothing on Earth like a genuine, bona-fide, electrified, six-car blockchain!”

Filed under: Technology — Tags: , , , — Nicholas @ 03:00

The way blockchain technology is being hyped these days, you’d think it was being pushed by the monorail salesman on The Simpsons. At Catallaxy Files, this guest post by Peter Van Valkenburgh is another of their informative series on what blockchain tech can do:

“Blockchain” has become a buzzword in the technology and financial industries. It is often cited as a panacea for all manner business and governance problems. “Blockchain’s” popularity may be an encouraging sign for innovation, but it has also resulted in the word coming to mean too many things to too many people, and — ultimately — almost nothing at all.

The word “blockchain” is like the word “vehicle” in that they both describe a broad class of technology. But unlike the word “blockchain” no one ever asks you, “Hey, how do you feel about vehicle?” or excitedly exclaims, “I’ve got it! We can solve this problem with vehicle.” And while you and I might talk about “vehicle technology,” even that would be a strangely abstract conversation. We should probably talk about cars, trains, boats, or rocket ships, depending on what it is about vehicles that we are interested in. And “blockchain” is the same. There is no “The Blockchain” any more than there is “The Vehicle,” and the category “blockchain technology” is almost hopelessly broad.

There’s one thing that we definitely know is blockchain technology, and that’s Bitcoin. We know this for sure because the word was originally invented to name and describe the distributed ledger of bitcoin transactions that is created by the Bitcoin network. But since the invention of Bitcoin in 2008, there have been several individuals, companies, consortia, and nonprofits who have created new networks or software tools that borrow something from Bitcoin—maybe directly borrowing code from Bitcoin’s reference client or maybe just building on technological or game-theoretical ideas that Bitcoin’s emergence uncovered. You’ve probably heard about some of these technologies and companies or seen their logos.

Aside from being in some way inspired by Bitcoin what do all of these technologies have in common? Is there anything we can say is always true about a blockchain technology? Yes.

All Blockchains Have…

All blockchain technologies should have three constituent parts: peer-to-peer networking, consensus mechanisms, and (yes) blockchains, A.K.A. hash-linked data structures. You might be wondering why we call them blockchain technologies if the blockchain is just one of three essential parts. It probably just comes down to good branding. Ever since Napster and BitTorrent, the general public has unfortunately come to associate peer-to-peer networks with piracy and copyright infringement. “Consensus mechanism” sounds very academic and a little too hard to explain a little too much of a mouthful to be a good brand. But “blockchain,” well that sounds interesting and new. It almost rolls off the tongue; at least compared to, say, “cryptography” which sounds like it happens in the basement of a church.

But understanding each of those three constituent parts makes blockchain technology suddenly easier to understand. And that’s because we can write a simple one sentence explanation about how the three parts achieve a useful result:

Connected computers reach agreement over shared data.

That’s what a blockchain technology should do; it should allow connected computers to reach agreement over shared data. And each part of that sentence corresponds to our three constituent technologies.

Connected Computers. The computers are connected in a peer-to-peer network. If your computer is a part of a blockchain network it is talking directly to other computers on that network, not through a central server owned by a corporation or other central party.

Reach Agreement. Agreement between all of the connected computers is facilitated by using a consensus mechanism. That means that there are rules written in software that the connected computers run, and those rules help ensure that all the computers on the network stay in sync and agree with each other.

Shared Data. And the thing they all agree on is this shared data called a blockchain. “Blockchain” just means the data is in a specific format (just like you can imagine data in the form of a word document or data in the form of an image file). The blockchain format simply makes data easy for machines to verify the consistency of a long and growing log of data. Later data entries must always reference earlier entries, creating a linked chain of data. Any attempt to alter an early entry will necessitate altering every subsequent entry; otherwise, digital signatures embedded in the data will reveal a mismatch. Specifically how that all works is beyond the scope of this backgrounder, but it mostly has to do with the science of cryptography and digital signatures. Some people might tell you that this makes blockchains “immutable;” that’s not really accurate. The blockchain data structure will make alterations evident, but if the people running the connected computers choose to accept or ignore the alterations then they will remain.

« Newer PostsOlder Posts »

Powered by WordPress