Quotulatiousness

April 11, 2012

“Facebook is like an NYPD police van crashing into an IKEA, forever”

Filed under: Media, Technology — Tags: , , — Nicholas @ 08:55

An interesting analysis of the Instagram takeover by Facebook:

First, to understand this deal it’s important to understand Facebook. Unfortunately everything about Facebook defies logic. In terms of user experience (insider jargon: “UX”), Facebook is like an NYPD police van crashing into an IKEA, forever — a chaotic mess of products designed to burrow into every facet of your life. The company is also technologically weird. For example, much of the code that runs the site is written in a horrible computer language called PHP, which stands for nothing you care about. Millions of websites are built with PHP, because it works and it’s cheap to run, but PHP is a programming language like scrapple is a meat. Imagine eating two pounds of scrapple every day for the rest of your life — that’s what Facebook does, programming-wise. Which is just to say that Facebook has its own way of doing things that looks very suspect from the outside world — but man, does it work.

Now consider Instagram. If Facebook is a sprawling, intertextual garden of forking pokes, Instagram is no more complex than a chapbook of poetry: It lets you share pictures with your friends and keep track of strangers who post interesting pictures. It barely has a website; all the action happens on mobile devices. Thirty million people use it to pass time in the bathroom. You can add some fairly silly filters to the photos to make the pictures look like they were taken in the seventies, but that’s more of a novelty than a requirement. So that’s Instagram. It’s not a site, or an app. What it is, really, is a product.

[. . .]

To some users, this looks like a sellout. And that’s because it is. You might think the people crabbing about how Instagram is going to suck now are just being naïve, but I don’t think that’s true. Small product companies put forth that the user is a sacred being, and that community is all-important. That the money to pay for the service comes from venture capital, which seeks a specific return on investment over a period of time, is between the company and the venture capitalists; the relationship between the user and the product is holy, or is supposed to be.

So if you’re an Instagram user, you’ve been picking up on all of the cues about how important you are, how valuable you are to Instagram. Then along comes Facebook, the great alien presence that just hovers over our cities, year after year, as we wait and fear. You turn on the television and there it is, right above the Empire State Building, humming. And now a hole has opened up on its base and it has dumped a billion dollars into a public square — which turned out to not be public, but actually belongs to a few suddenly-very-rich dudes. You can’t blame users for becoming hooting primates when a giant spaceship dumps a billion dollars out of its money hole. It’s like the monolith in the movie 2001 appeared filled with candy and a sign on the front that said “NO CANDY FOR YOU.”

F-22 pilot air supply issue still not resolved

Filed under: Military, Technology, USA — Tags: , , — Nicholas @ 08:29

Strategy Page has an update on the F-22 and the ongoing investigation into air supply problems for the pilot:

The U.S. Air Force is admitting that it is having a problem with the pilot air supply on the F-22, a problem they have not been able to find the cause of. Despite this, the air force is going to continue flying its F-22s. The decision to keep flying was made because the air supply problems have not killed anyone yet and they are rare (once every 10,000 sorties.)

The 14 incidents so far were all cases of F-22 pilots apparently experiencing problems. The term “apparently” is appropriate because the pilots did not black out and a thorough check of the air supply system and the aircraft found nothing wrong. There have been nearly 30 of these “dizziness or disorientation” incidents in the last four years, with 14 of them serious enough to be called real incidents. Only one F-22 has been lost to an accident so far and, while that did involve an air supply issue, it was caused by pilot error, not equipment failure.

Meanwhile the air force is spending $7 million to install commercial oxygen status sensors in the air supply systems of its F-22 fighters. This is part of a year-long effort to find out what’s causing the air supply on F-22s to get contaminated and cause pilots to become disoriented or pass out. Twice in the past year the entire F-22 fleet was grounded because of the air supply problems. The first grounding lasted 140 days and ended last September. The second grounding lasted a week and ended five months ago. The 180 F-22s comprise the most powerful component of the air force’s air combat capability and the brass are eager to find out what is wrong.

April 8, 2012

The chronicle of the declining “old media” empires

Filed under: Liberty, Media, Technology — Tags: , , , , — Nicholas @ 10:32

Matt Welch explains why, even though more reporting is being done now than ever before in human history, the “old media” portrays the situation in the same way the dinosaurs might view the end of their era:

Imagine for a moment that the hurly-burly history of American retail was chronicled not by reporters and academics but by life-long employees of A&P, a largely forgotten supermarket chain that enjoyed a 75 percent market share as recently as the 1950s. How do you suppose an A&P Organization Man might portray the rise of discount super-retailer Wal-Mart, or organic foods-popularizer Whole Foods, let alone such newfangled Internet ventures as Peapod.com? Life looks a hell of a lot different from the perspective of a dinosaur slowly leaking power than it does to a fickle consumer happily gobbling up innovation wherever it shoots up.

That is largely where we find ourselves in the journalism conversation of 2012, with a dreary roll call of depressive statistics invariably from the behemoth’s point of view: newspaper job losses, ad-spending cutbacks, shuttered bureaus, plummeting stock prices, major-media bankruptcies. Never has there been more journalism produced or consumed, never has it been easier to find or create or curate news items, and yet this moment is being portrayed by self-interested insiders as a tale of decline and despair.

It is no insult to the hard work and good faith of either newspaper reporters or media-beat writers (and I’ve been both) to acknowledge that their conflict of interest in this story far exceeds that of, say, academic researchers who occasionally take corporate money, or politicians who pocket campaign donations from entities they help regulate, to name two perennial targets of newspaper editorial boards. We should not expect anything like impartial analysis from people whose very livelihoods—and those of their close friends—are directly threatened by their subject matter.

This goes a long way toward explaining a persistent media-criticism dissonance that has been puzzling observers since at least the mid-1990s: Successful, established journalism insiders tend to be the most dour about the future of the craft, while marginalized and even unpaid aspirants are almost giddy about what might come next. More kids than ever go to journalism school; more commencement speeches than ever warn graduates that, sadly, there’s no more gold in them thar hills. Consumers are having palpable fun finding, sharing, packaging, supplementing, and dreaming up pieces of editorial content; newsroom veterans are consistently among the most depressed of all modern professionals.

April 7, 2012

Arizona’s internet-trolls-go-to-jail bill

Filed under: Law, Liberty, Media, Technology, USA — Tags: , , , , , — Nicholas @ 11:21

Interestingly, aside from the occasional mention of the Arizona Cardinals, almost every post I’ve marked with the Arizona tag over the last three years is about stupid laws or bills that infringe constitutional rights. What up, Arizona?

Project Glass: brilliant or cracked?

Filed under: Media, Technology — Tags: , — Nicholas @ 09:41

Howard Baldwin and Ed Oswald discuss the arguments for and against Google’s most recently announced project:

Here are two opposing viewpoints on Google’s Project Glass eyewear. PCWorld contributor Howard Baldwin argues the pro side of the argument while PCWorld contributor Ed Oswald represents the naysayers.

PRO – People have been trying to build wearable computers for years. Project Glass puts the technology into something people already wear.

CON – Easily breakable? While I understand Google’s desire to make these glasses as unobtrusive as possible, they look awfully fragile. Consumers will use these in situations where they may be dropped or come loose. These are no doubt going to be expensive, so people will want some assurance that these won’t easily break.

PRO – Who doesn’t love hands-free computing? Maybe these will help us bypass those nanny-state laws and let us talk while we’re driving again.

CON – Using the glasses will likely be more distracting than texting currently is. Google glasses places the data in front of your line of sight so that you probably will focus on the data rather than what’s around you. This could be more dangerous than texting or using your cell phone while driving.

In the same way that Bluetooth headsets made it hard to distinguish between the homeless guy arguing with the voices in his head and the investment banker screwing his Muppets, Project Glass may help to weed out the easily distracted amongst us. An updated version of what I referred to as the Darwinator app:

April 3, 2012

Popehat tells Arizona “Come Get Me, Coppers!”

Arizona has a law on the books that should replace the old chestnut about King Canute and the tide: they’ve criminalized annoying and offending people on the internet:

Dear Members of the Arizona State Legislature,

By this post, it is my specific intent to use this digital device — a computer — to annoy and offend you.

I do so because you have passed Arizona H.B. 2549, which provides in relevant part as follows:

    It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use a telephone ANY ELECTRONIC OR DIGITAL DEVICE and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person.

OK. I certainly don’t intend to convey any physical threat. And I can’t terrify or intimidate you, even with the prospect of revealing you for a pack of morons who ought to be voted out of office — after all, you’re in Arizona, where prolonged lawlessness, venality and idiocy seem to be sure paths to electoral victory.

I certainly do mean to annoy and offend you, though. You’ve been swept up in the moronic and thoughtless anti-bullying craze and consequently passed a bill that is ridiculous on its face, a bill that criminalizes annoying and offending people on the internet. That’s like criminalizing driving on the road. By so clearly violating the First Amendment, you’ve violated your oaths of office. You should be ashamed of yourselves. What kind of example are you setting for the children of Arizona by ignoring the law to pass fashionable rubbish? It is no excuse that you are merely modifying an archaic law to apply it to the internet — you’re still enacting patently unconstitutional legislation.

That’s Ken at Popehat, inviting the Arizona state legislature to “snort my taint, go to Hell, and go fuck yourselves”.

April 1, 2012

Nightmare progression from Facebook data to stalker app to genocide tool

Filed under: Liberty, Media, Technology — Tags: , , , — Nicholas @ 00:11

Charles Stross on the very disturbing implications of Facebook and other social media tools:

There is an app, currently on the Apple app store as a free download, called Girls Around Me.

A couple of days ago, computer journalist John Brownlee wrote an essay about it explaining why he found it disturbing. I’d like to propose that it is symptomatic of a really major side-effect of our forced acculturation into Facebook’s broken model of human social interaction — a broken model shared by all the most successful social networks, by design — and that it is going to get much worse, until it kills people. Quite possibly in very large numbers.

I wish this was an April Fool’s joke or a piece of dystopian near-future fiction. Unfortunately it isn’t.

[. . .]

What “Girls Around Me” does is simple: it looks up your GPS location, then queries Facebook and FourSquare for people matching a simple search criterion (are they female?) who have checked in (or been checked in by their friends) in your vicinity. It then makes it really easy to pull up their publicly visible information — stuff such as age, occupation, favourite sports, what school they attended, and so on. All the stuff Facebook encourages you to share.

You can probably see why John and his friends became increasingly uneasy about this app: it’s pitched as innocent, slightly hokey fun, but it stops being amusing the instant you imagine it in the hands of a stalker or serial rapist. Or even just an unscrupulous ass-hat in search of a one night stand who isn’t above researching his target’s taste in music and drinks without their knowledge.

Creepy and stalkerish, right? So where’s the dystopic vision? Right here:

It’s easy to imagine how we could make something worse than “Girls Around Me” — something much worse. Facebook encourages us to disclose a wide range of information about ourselves, including our religion and a photograph. Religion is obvious: “Yids Among Us” would obviously be one of the go-to tools of choice for Neo-Nazis. As for skin colour, ethnicity identification from face images is out there already. Want to go queer bashing? There’s an algorithm out there for guessing sexual orientation based on the network graph of the target’s facebook friends. It’s probably possible to apply this sort of data mining exercise to determine whether a woman has had an abortion or is pro-choice.

In the worst case, it’s possible to envisage geolocation and data aggregation apps being designed to facilitate the identification and elimination of some ethnic or class enemy, not only by making it easy for users to track them down, but by making it easy for users to identify each other and form ad-hoc lynch mobs. (Hence my reference to the Rwandan Genocide earlier. Think it couldn’t happen? Look at Iran and imagine an app written for the Basij to make it easy to identify dissidents and form ad-hoc goon squads to proactively hunt them down. Or any other organization in the post-networked world that has a social role corresponding to the Red Guards.)

But as I said earlier, the app is not the problem. The problem is the deployment by profit-oriented corporations of behavioural psychology techniques to induce people to over-share information which can then be aggregated and disclosed to third parties for targeted marketing purposes.

Update, 2 April: The app has been pulled from the App Store after Foursquare revoked the developer’s API access, but the underlying problem is still there.

March 31, 2012

Botched investigation into GCHQ staff member’s mysterious death

Filed under: Britain, Government, Science, Technology — Tags: , , , — Nicholas @ 09:17

This sounds particularly bad:

Forensic investigators have apologized for the bungling of the inquiry into the mysterious death of a codebreaker employed by the Government Communications Headquarters (GCHQ).

In August 2010, Gareth Williams, described as a mathematical genius by his peers and employed at GCHQ since leaving university, was found dead in his flat in London. Williams, who had recently qualified for deployment with MI6 — Britain’s version of the CIA — was found naked and partially decomposed in a sports bag that had been locked from the outside and placed in the bath.

In the pre-inquest hearing on Friday, the court heard that the investigation into Williams’ death had been botched from the start. LGS Forensics said that DNA found on Mr Williams’ body was investigated, but later turned out to have been transferred there from one of the forensic scientists investigating the death, and a search of the apartment turned up no clues as to his death.

Warning: Despite a total lack of evidence, we still want video game “violence” warning stickers

Filed under: Gaming, Government, Liberty, Media, Technology — Tags: , , , — Nicholas @ 00:14

Erik Kain in Forbes on the latest attempt to put scare warnings on pretty much all video games sold in stores:

“WARNING: Exposure to violent video games has been linked to aggressive behavior.”

That’s the label Reps. Joe Baca and Frank Wolf want to place on every video game that hits store shelves.

Well okay, not every video game. Just every game with an E (Everyone) rating or higher. Only EC (Early Childhood) games would avoid the label. Every other game, regardless of content, would have the equivalent of cigarette warnings slapped on them.

This means that games like Tiger Woods PGA Tour would get a violence-warning label.

Can I humbly suggest that we sponsor a bill that would slap warning labels on all our elected officials?

“WARNING: May enact pointless, freedom-quashing laws based on bad data and lies due to sanctimonious pandering to special interest groups.”

The EFF is on the case.

EFF has put together an action alert that lets you to tell your Congressmember that you stand against the unnecessary and burdensome regulation of speech in video games, and that she should too.

Even though it is not required by law, many video game developers have been self-regulating games for age-level and content with Entertainment Software Ratings Board (ESRB) ratings since 1994. That system is widely understood in the marketplace, and allows consumers and parents to make informed decisions about their video game purchases.

March 29, 2012

F-35 and the “bubbling skin” problem

Filed under: Cancon, Military, Technology — Tags: , , , — Nicholas @ 11:25

Michael Byers and Stewart Webb report on the latest technical glitch to be reported in the F-35 development:

The ability of F-35s to avoid radar detection depends on a “fibre mat,” which is cured into the composite surfaces of the aircraft.

In December 2011, a test version of the F-35 for the first time achieved the design speed of Mach 1.6. According to Bill Sweetman of Aviation Week, the flight caused “peeling and bubbling” of the stealth coating on the horizontal tails and damage to the engine’s thermal panels, and the entire test fleet was subsequently limited to Mach 1.0.

Repairing and replacing stealth materials is a time- and technology-intensive process that reduces the “mission capable rate” of aircraft. Indeed, it has been reported by the U.S. Congressional Research Service that after five years of service the F-35’s sister plane, the F-22, has a mission capable rate of just 60%.

And then they touch on the issue that has been lurking below the surface for a while, regarding the small number of aircraft the RCAF will be able to afford (assuming the government goes through with the F-35 purchase):

If the F-35 has a similar mission capable rate, Canada will, at any given time, only be able to deploy approximately 44 of its planned 65 planes. When attrition through accidents is factored in — and Canada has lost 18 of its CF-18s since 1982 — we could soon have an available fleet of just 30-35 planes, or roughly half of what the Department of National Defence says we need.

That might be the crucial point on which the F-35 acquisition fails: no matter how good the aircraft are (and I believe they will eventually work through and fix all the major issues), we can’t afford enough of them. Even without taking on new missions, we need a certain minimum number of aircraft, and I thought 65 was low-balling that number. The alternatives are to buy some F-35’s and a larger number of less expensive planes like the Super Hornet, or skip the F-35 altogether and just buy a different aircraft. The problem with splitting the order is that what we’d save on reduced F-35 acquisition costs, we’d more than lose because the RCAF would have to maintain duplicate maintenance and training programs. Unlike the RAF or the USAF, the RCAF isn’t big enough to fly multiple models on an ongoing basis (and you know that the government can’t and won’t fund a larger air force budget).

March 28, 2012

Speaking of science, here’s a new development in “thermal cloaking”

Filed under: France, Science, Technology — Tags: , — Nicholas @ 09:42

Lewis Page at The Register walks us through the high points of a new development from France:

Top boffins in France have come up with a radical new take on the “cloaking” and invisible-shed physics breakthroughs of recent years. They have designed a technology which instead of bending microwaves or light can shield an object from heat — or concentrate heat upon it.

“Our key goal with this research was to control the way heat diffuses in a manner similar to those that have already been achieved for waves, such as light waves or sound waves,” says Sebastien Guenneau, of Aix-Marseille uni and France’s Centre National de la Recherche Scientifique (CRNS).

“Heat isn’t a wave — it simply diffuses from hot to cold regions,” Guenneau adds. “The mathematics and physics at play are much different.”

For now designed only in two dimensions, Guenneau and his colleagues’ approach involved shaping isotherms — lines showing density of heat flux transferring from point — so as to make heat travel around a given area rather than into it.

“We can design a cloak so that heat diffuses around an invisibility region, which is then protected from heat. Or we can force heat to concentrate in a small volume, which will then heat up very rapidly,” Guenneau says.

Odd network issue

Filed under: Technology — Tags: — Nicholas @ 08:18

As many of you know, I’m an editor at GuildMag, an online magazine devoted to the ArenaNet games Guild Wars and the soon-to-be-released Guild Wars 2. Yesterday, I’d been on the GuildMag site several times to update our most recent beta coverage post. Around 5 pm, I’d added a few entries to the blog post and saved the page (it’s a WordPress blog). The page timed out on me.

Not a big deal, just reload the page — but it still won’t reload. It’s not just the blog UI, it’s the whole site that is inaccessible. Several re-tries, but no change. I posted a Twitter update to let people know that the site was temporarily down and that we’d be back as soon as possible … but I was told that the site is fine: it’s apparently just me having connectivity problems. Well, it was getting toward time to break for dinner anyway, so I logged off for a few hours.

Later that night, I still have the same problem, but on a different computer (that is, it’s not just my laptop being unable to load www.guildmag.com). That means the problem lies somewhere between our wireless router and the site. I took my laptop down into the basement and directly connected it to the cable modem, but the site is still inaccessible (so it’s not our router that’s suddenly allergic to GuildMag). I did a “whois” search to get the IP address (81.169.145.152). Still can’t connect using the IP address in Chrome, Firefox, and IE.

The editor-in-chief says he believes me, but clearly suspects that I’m trying to avoid some upcoming work…

Update: Ah, thanks to a suggestion from Marc, I tried connecting to the site on my iPhone: it works on a 3G connection, but doesn’t work when I use the wifi.

(more…)

March 26, 2012

Rick Mercer updates us on the status of the F-35

Filed under: Cancon, Humour, Military, Technology — Tags: , , , — Nicholas @ 06:27

March 23, 2012

Software patents: a legal minefield with no accurate maps

Filed under: Economics, Law, Technology — Tags: , , — Nicholas @ 10:33

In the Atlantic, Timothy B. Lee explains why most software companies are effectively ignoring the patent system:

A major reason for the recent explosion of patent litigation is that it’s hard for software firms to figure out which patents they’re in danger of infringing. There are hundreds of thousands of software patents in existence, with more than 40,000 new ones issued each year. Indeed, in a recent paper, Christina Mulligan and I estimated that it’s effectively impossible for all software-producing firms to do the legal research, known as a “freedom-to-operate” (FTO) search, required to avoid infringing software patents — there simply aren’t enough patent attorneys to do the work. That’s a major reason why most software firms simply ignore the patent system.

One of the striking things about the patent debate is vast gulf between the views of computer programmers on the one hand and patent attorneys on the other. Steve Lundberg is a patent attorney and blogger who mentioned our paper in a blog post exploring the challenges of performing FTO searches in the software industry. I don’t want to pick on Lundberg, because I think you’d get similar arguments from many patent lawyers. But his post shows a fundamental lack of understanding of how the software industry works.

I work in the software industry (although not as a programmer), and I’ve lost count of the number of times I’ve seen software patents granted for things that clearly do not meet the stated criteria for granting patents. It could be a geeky party drinking game: guess whether a particular common programming technique or decades-old user interface element is patented or not, take a drink when you guess wrong. It’d be educational, although guessing “patented” every time might leave you stone cold sober at the end of the party.

As a matter of patent theory, Lundberg is absolutely correct. Patent law’s novelty and obviousness requirements are supposed to narrow the scope of patent protection. But in practice he’s dead wrong. The patent office issues a seemingly endless stream of patents on broad, obvious concepts like emoticon menus, one-click shopping, and wireless email.

And the existence of these broad, obvious patents means that software companies are constantly infringing each other’s patents by accident. The companies with the largest patent portfolios, such as Microsoft and IBM, have tens of thousands of patents, allowing them to credibly threaten almost anyone in the software industry. Even Yahoo, with its relatively modest cache of 1000 patents, was able to find ten patents to assert against Facebook.

Facebook seen as harmful … to deployed troops

Filed under: Asia, Middle East, Military, Technology, USA — Tags: , , , , — Nicholas @ 08:17

Strategy Page explains how increasing sophistication on the part of the al Qaeda/Taliban forces has been allowing them to select targets of opportunity through things like Facebook posts and cell phone traffic:

The U.S. Army is warning its troops to be careful what they post to on social networking sites (like Facebook). When they post photos of themselves they often reveal militarily useful information. This was discovered in Iraq, where a lot of tech savvy people working with terrorists were able to compile information from what troops posted. This sometimes led to attacks, and this was discovered from interrogating captured terrorists and captured documents and computer data. The background of pictures often indicated targets for the terrorists, or details of base defenses and American tactics. Islamic terrorists have been quick to use the Internet and other modern technology to plan and carry out their attacks.

Some of this technology can be very dangerous, like the geo-locating capability of many smart phones (which include GPS receivers and location data that hackers can obtain.) Troops in combat zones are ordered to turn geo-locating off while in areas where the enemy could use it. Even without geo-locating turned on, cell phone use can provide militarily useful information. This goes back to a century old practice called traffic analysis. This has been used with great success against terrorists in Iraq, Afghanistan and elsewhere, but it can be used against the troops.

[. . .]

Al Qaeda was long suspected of knowing how to manipulate message traffic in order to deceive our traffic analysis methods. This was rarely the case, but this form of deception has been used in the past with success. For example, when the June 6, 1944 D-Day invasion of France was being planned, a fake army group headquarters was set up in England. Actually, this “army group” consisted largely of a lot of radio and telegraph operators sending a large number of messages that would be normal if the “army group” were preparing for an invasion of France, in an area other than where the actual invasion was going to take place. The deception worked. German traffic analysis experts were fooled and the Germans believed the actual invasion at Normandy was just a feint, a move to get the Germans to send their reinforcements to Normandy rather than were the fake “army group” was going to invade.

Intelligence agencies have to be constantly on the guard for al Qaeda, or any other terrorist group, using this kind of deception. It has happened in a few instances, so a larger-scale attempt is not out of the question.

« Newer PostsOlder Posts »

Powered by WordPress