Quotulatiousness

May 22, 2010

Copyright suits . . . and profanity

Filed under: Humour, Law, Technology — Tags: , , — Nicholas @ 11:27

Cory Doctorow finds fulfilling both interests easy in this case:

You know what I’m interested in? Copyright lawsuits.

And profanity.

Lucky for me, Google and Viacom have provided both today, in the form of a series of emails released through the discovery process in Viacom’s billion-dollar lawsuit against YouTube. In these emails, the two companies take turns cussin’ and spittin’ and swearin’ about each other. Hilarity ensues. Ars Technica rounds up some of the highlights.

May 21, 2010

Your iPod is even more valuable than you think

Filed under: Economics, Law, Media, Technology — Tags: , , , , — Nicholas @ 12:54

Sing along with the RIAA:


Full image here

May 18, 2010

An end to stereotypical MMO “questing”?

Filed under: Gaming, Technology — Tags: , , — Nicholas @ 12:45

An interesting article at IncGamers looks at some of the implications of the recently announced design decisions in Guild Wars 2:

An event in the area/world will cause new events to become available depending on the actions of the players.

For those of you who have played various MMOs you’ll know that the general flow of a quest is this:

Go to quest giver → collect quest → kill x amount of y critter, who is minding it’s own business in a field a good journey away from the quest giver → return to quest giver and collect reward, usually ignoring the small novel worth of text.

And after umpteen levels of this you can understand why people cringe at the thought of having to level a new character up to max. At least in WAR you could almost completely ignore PvE and level up by bashing the opposing realm’s skulls in.

Now with GW2 we’ll hopefully start to see a step away from the standard quest model and towards one that actually feels like you’ve had an impact on the world. Example:

I could be exploring an find a floating crystal. Me being me I decide to poke it with a stick. This causes the crystal to release the monsters it was holding, which begin to attack the nearby village. Depending on how successful this is the village will either survive or be destroyed (until it is rebuilt) and from that a new line of quests will appear.

As I’ve mentioned before, I’m quite interested in the innovations the folks on the development and content teams are working on, and I really do hope they can pull it off: it’ll be much more compelling than the current standard.

QotD: Time to kill the “information wants to be free” meme

Filed under: Economics, Media, Quotations, Technology — Tags: , , — Nicholas @ 12:06

“Information wants to be free” (IWTBF hereafter) is half of Stewart Brand’s famous aphorism, first uttered at the Hackers Conference in Marin County, California (where else?), in 1984: “On the one hand information wants to be expensive, because it’s so valuable. The right information in the right place just changes your life. On the other hand, information wants to be free, because the cost of getting it out is getting lower and lower all the time. So you have these two fighting against each other.”

This is a chunky, chewy little koan, and as these go, it’s an elegant statement of the main contradiction of life in the “information age”. It means, fundamentally, that the increase in information’s role as an accelerant and source of value is accompanied by a paradoxical increase in the cost of preventing the spread of information. That is, the more IT you have, the more IT generates value, and the more information becomes the centre of your world. But the more IT (and IT expertise) you have, the easier it is for information to spread and escape any proprietary barrier. As an oracular utterance predicting the next 40 years’ worth of policy, business and political fights, you can hardly do better.

But it’s time for it to die.

Cory Doctorow, “Saying information wants to be free does more harm than good”, The Guardian, 2010-05-18

May 12, 2010

Dynamic events in Guild Wars 2

Filed under: Gaming, Technology — Tags: , , — Nicholas @ 13:43

Reading through this article by GW2 Lead Content Designer Colin Johanson shows that the game is going to be significantly different from other MMOs:

When building an MMO, we had to examine every core piece of accepted content from traditional games in the genre and ask, “How can this be improved?” By looking at the traditional quest system used in basically every MMO ever made, we’ve come to the conclusion that quests have a lot of areas for improvement. To address these flaws, we’ve developed our dynamic event system.

[. . .]

In Guild Wars 2, our event system won’t make you read a huge quest description to find out what’s going on. You’ll experience it by seeing and hearing things in the world. If a dragon is attacking, you won’t read three paragraphs telling you about it, you’ll see buildings exploding in giant balls of fire, and hear characters in the game world screaming about a dragon attack. You’ll hear guards from nearby cities trying to recruit players to go help fight the dragon, and see huge clouds of smoke in the distance, rising from the village under siege.

[. . .]

In traditional MMOs, when a quest is completed it has no real effect on the game world. You receive your reward and then move on, looking for the next quest to do. The world appears no better or worse for your actions. In GW2, the outcome of every event will directly affect the game world around you. If an enemy dredge army is marching out of their main base, players will be asked to mobilize with their allies and help destroy the army. If the dredge army is defeated, other events will cascade out from there. Players will be able battle their way inside the dredge base, face off against their commander, rescue captured friendly troops being held in the dredge prisons, and even hold the captured base while fighting waves of dredge, who arrive from deep underground to try and take back their home.

This sounds great, and helps to explain why Guild Wars 2 has been so long in development: you can’t use off-the-shelf programming for something that hasn’t been done before.

I’m quite looking forward to the new game (the original Guild Wars has been my main online addiction for years), although I am concerned that the development team may be attempting to change too many things away from the MMORPG default models. The whole “the world changes based on player activity” thing could get quite messy — although it’ll certainly take away a lot of the “been there, done that, got the reward” feeling you can get in games of this type.

Technical snag delays further testing for EMALS

Filed under: Britain, Military, Technology, USA — Tags: , , , , — Nicholas @ 12:32

A minor directional error has caused a several month slip in the testing for a new aircraft carrier catapult design:

The so-called Electromagnetic Aircraft Launch System, or EMALS, is now under development in a shore-based test facility at Lakehurst naval air station in New Jersey. However, according to reports, the test mass-driver installation suffered serious damage earlier this year in a mishap blamed on a “software malfunction”. Apparently the “shuttle” — which moves along the catapult track to accelerate a plane to flying speed — went the wrong way in a test shot and smashed into important equipment.

The Newport News Daily Press, reporting on an interview with EMALS programme chief Captain Randy Mahr, says that the accident has delayed the shore-based testing by several months. It had been planned to commence launching aircraft — as opposed to test loads — this summer, but that will not now happen until autumn.

The next US supercarrier, CVN 78, aka USS Gerald R Ford, is now under construction and intended to join the fleet in 2015. Navy officials confirmed last year that it is now too late to amend the ship’s design and revert to steam catapults: EMALS must be made to work or the US Navy will receive the largest and most expensive helicopter carrier ever.

The EMALS development is of great interest to the Royal Navy’s Fleet Air Arm, as the two new carriers under construction (pending the new British government’s defence review) will not be equipped with catapults. Conventional catapults are steam operated, and the British carriers will have gas-turbine propulsion (unlike US and French carriers which use nuclear power plants, providing plenty of steam on demand). If EMALS works as designed, it could be fitted to the new carriers, allowing the Royal Navy to pass on the (ultra-expensive) new F-35B in favour of conventional carrier aircraft.

May 11, 2010

Android alert!

Filed under: Economics, Technology — Tags: , , , , , — Nicholas @ 12:24

Apple fanboi faithful must be having mass cases of the vapours with the news that Android sales are eating everyone’s lunch:

I’ve written before that I think Google has been running a long game aimed against the telecomms carriers’ preferred strategy of customer lock-in, and executing on that game very well. Against the iPhone, its strategy has been a classic example of what the economist Clayton Christensen called “disruption from below” in his classic The Innovator’s Dilemma. With the G-1, Google initially competed on price, winning customers who didn’t want to pay Apple/AT&T’s premium and were willing to trade away Apple’s perceived superiority in “user experience” for a better price. Just as importantly, Android offered a near-irresistible deal to the carriers: months, even years slashed off time-to-market for a state-of-the-art cellphone; a huge advantage in licensing costs; and the illusion (now disintegrating) that said carriers would be able to retain enough control of Android-powered devices to practice their habitual screw-the-customer tactics.

In Christensen’s model, a market being disrupted from below features two products, sustaining and disrupter, both improving over time but with the disruptor at a lower price point and lesser capabilities. Typically, the sustaining company will be focused on control of its customers and business partners to extract maximum margins; on the other hand, the disruptor will be playing a ubiquity game, sacrificing margin to gain share. The sustaining company will gold-plate its product in order to chase high-end price-insenstive customers; the disruptor will seek out price-sensitive low-end customers.

I have to admit, I didn’t see this coming . . . I thought Google was mistaken to put so much development effort into the mobile phone market. I was clearly wrong about that.

In the smartphone market I have been expecting a disruptive break that would body-slam Apple’s market share, but I expected it to be several quarters in the future and with a really fast drop-off when it happened. Instead, it looks like Apple took a bruising in 4Q 2009 and has failed to regain share in 1Q 2010 while Android sales continued to rocket. Android hammered market-leader Blackberry just as badly, a fact which has gooten far less play than it probably should because the trade-press loves the drama of the Apple-vs.-Google catfight so much.

What actually seems to be going on here is that Android is successfully disrupting both Apple and Blackberry from below; together they’ve lost about 25% of market share, not enough to put Android on top but close enough that another quarter like the last will certainly do that.

I’ve heard several comments from folks that Apple’s iPhone sales are probably lower because of the widespread interest in the “next” iPhone model, which is likely to be announced in the next few weeks. Apple has followed this pattern since introducing the original iPhone, but there’s no rule saying they can’t break the pattern.

I’ll be interested in the announcement, as I’ll have a year left in my Rogers contract, so if the next iPhone isn’t a block-buster, I’ll be considering other options for when I’m out of contract.

May 10, 2010

Graphical illustration of the death of privacy on Facebook

Filed under: Media, Technology — Tags: , , , — Nicholas @ 09:49

Matt McKeon has a very persuasive set of images, showing the extent of changes to your private information on Facebook between 2005 and last month:

2005

Compare that to the latest set of changes to the default Facebook privacy settings:

April 2010

Facebook is a great service. I have a profile, and so does nearly everyone I know under the age of 60.

However, Facebook hasn’t always managed its users’ data well. In the beginning, it restricted the visibility of a user’s personal information to just their friends and their “network” (college or school). Over the past couple of years, the default privacy settings for a Facebook user’s personal information have become more and more permissive. They’ve also changed how your personal information is classified several times, sometimes in a manner that has been confusing for their users. This has largely been part of Facebook’s effort to correlate, publish, and monetize their social graph: a massive database of entities and links that covers everything from where you live to the movies you like and the people you trust.

May 8, 2010

Facebook’s business model

Filed under: Media, Technology — Tags: , , , — Nicholas @ 09:47

Ryan Singel looks at where Facebook started and why it’s changed its privacy protections:

Facebook used to be a place to share photos and thoughts with friends and family and maybe play a few stupid games that let you pretend you were a mafia don or a homesteader. It became a very useful way to connect with your friends, long-lost friends and family members. Even if you didn’t really want to keep up with them.

Soon everybody — including your uncle Louie and that guy you hated from your last job — had a profile.

And Facebook realized it owned the network.

Then Facebook decided to turn “your” profile page into your identity online — figuring, rightly, that there’s money and power in being the place where people define themselves. But to do that, the folks at Facebook had to make sure that the information you give it was public.

So in December, with the help of newly hired Beltway privacy experts, it reneged on its privacy promises and made much of your profile information public by default. That includes the city that you live in, your name, your photo, the names of your friends and the causes you’ve signed onto.

This spring Facebook took that even further. All the items you list as things you like must become public and linked to public profile pages. If you don’t want them linked and made public, then you don’t get them — though Facebook nicely hangs onto them in its database in order to let advertisers target you.

Every time Facebook changes their privacy policies, well-meaning folks try to explain how to retain as much of your previous settings as possible . . . and every time, Facebook’s defaults have changed further towards exposing everything. There’s money in that information, money that Facebook is determined to obtain. Privacy? The inevitability of zero-privacy is Facebook’s unspoken motto.

May 5, 2010

Facebook obliterates the entire notion of “privacy settings”

Filed under: Technology — Tags: , , , , — Nicholas @ 09:03

As someone noted the other day, when it comes to Facebook and their constant twiddling with privacy settings, you can just copy-and-paste the last outraged story you did and change the date. That being said, the latest Facebook changes are pretty bad:

“Connections.” It’s an innocent-sounding word. But it’s at the heart of some of the worst of Facebook’s recent changes.

Facebook first announced Connections a few weeks ago, and EFF quickly wrote at length about the problems they created. Basically, Facebook has transformed substantial personal information — including your hometown, education, work history, interests, and activities — into “Connections.” This allows far more people than ever before to see this information, regardless of whether you want them to.

Since then, our email inbox has been flooded with confused questions and reports about these changes. We’ve learned lots more about everyone’s concerns and experiences. Drawing from this, here are six things you need to know about Connections:

  1. Facebook will not let you share any of this information without using Connections. [. . .]
  2. Facebook will not respect your old privacy settings in this transition. [. . .]
  3. Facebook has removed your ability to restrict its use of this information. [. . .]
  4. Facebook will continue to store and use your Connections even after you delete them. [. . .]
  5. Facebook sometimes creates a Connection when you “Like” something. [. . .]
  6. Facebook sometimes creates a Connection when you post to your wall. [. . .]

Overall, you’d have to assume that nobody in the Facebook architecture group has ever needed or even wanted to keep certain information private. Every change they make seems to make it harder and harder to restrict where your personal information will be accessible, and it’s not as though there haven’t been complaints: Facebook just carries on as if nobody cared.

I’ve still got a Facebook account, although I find I’m using it less and less (ironically, many of you reading this will have come here because of a link from Facebook . . .). Lack of ability to fine-tune the privacy settings is certainly one of the reasons I don’t use Facebook as much as I once did.

May 4, 2010

The lesson, kids, is don’t ask for colour advice

Filed under: Humour, Randomness, Technology — Tags: , , — Nicholas @ 08:04

A colour survey gone very wrong:

Thank you so much for all the help on the color survey. Over five million colors were named across 222,500 user sessions. If you never got around to taking it, it’s too late to contribute any data, but if you want you can see how it worked and take it for fun here.

First, a few basic discoveries:

* If you ask people to name colors long enough, they go totally crazy.
* “Puke” and “vomit” are totally real colors.
* Colorblind people are more likely than non-colorblind people to type “fuck this” (or some variant) and quit in frustration.
* Indigo was totally just added to the rainbow so it would have 7 colors and make that “ROY G. BIV” acronym work, just like you always suspected. It should really be ROY GBP, with maybe a C or T thrown in there between G and B depending on how the spectrum was converted to RGB.
* A couple dozen people embedded SQL ‘drop table’ statements in the color names. Nice try, kids.
* Nobody can spell “fuchsia”.

Overall, the results were really cool and a lot of fun to analyze. There are some basic limitations of this survey, which are discussed toward the bottom of this post. But the sheer amount of data here is cool.

And a selection of miscellaneous answers:

Spear phishing (test) attack on US Air Force

Filed under: Military, Technology — Tags: , , , , , — Nicholas @ 07:43

I’d heard the term “phishing” before, and I’ve reported at least a dozen various attempts to the appropriate parties (companies and organizations who are used in phishing attempts often have a reporting address set up so you can just forward the message to them). “Spear phishing” was new to me, and apparently it was also new to a large number of US Air Force personnel:

Offers to hire American airmen, stationed at an airbase on the Central Pacific island of Guam, as extras in the Transformers 3 movie, turned out to be an unexpectedly scary training exercise. First, keep in mind that there is no Transformers 3 filming scheduled for Guam. The email was a fake, used to test how well airmen could detect a hacker attempts to deceive military Internet users to give up valuable information.

The Transformers 3 email was a test to see how many airmen would fall for a “spear phishing” offensive. “Phishing” (pronounced “fishing”) is when a hacker sends out thousands, or millions, of emails that look like warnings from banks, eBay or PayPal, asking for you to log in (thus revealing your password to the hackers, who have set up a false website for this purpose) to take care of some administrative matter. The hacker then uses your password to loot your account. “Spear phishing” is when the emails are prepared with specific individuals in mind. The purpose here is to get specific information from, say, a bank manager, or someone known to be working on a secret project. In the Guam case, the targets of the spear phishing test were asked to go to a web site and fill out an application form to be eligible to be an extra. That form asked for information that would have enabled hostile hackers to gain more access to air force networks. A lot of the airmen who received the Transformers 3 email, responded. The air force won’t say how many, but it was more than expected. A lot more.

I doubt that many readers need to be told this, but no legitimate bank or financial institution should ever be sending you an email requesting you to follow an embedded link and log in to your account. If you get such an email, forward it to the bank’s security folks. If it’s legitimate, they can confirm it for you, but in 2010, no sensible bank should be communicating with you in this way.

April 30, 2010

The revolution is almost complete . . . hold on tight

Filed under: Economics, Technology — Tags: , , , , , — Nicholas @ 16:25

Charles Stross thinks he understands why Steve Jobs won’t allow Adobe Flash on to the iPhone and iPad:

Steve Jobs believes he’s gambling Apple’s future — the future of a corporation with a market cap well over US $200Bn — on an all-or-nothing push into a new market. HP have woken up and smelled the forest fire, two or three years late; Microsoft are mired in a tar pit, unable to grasp that the inferno heading towards them is going to burn down the entire ecosystem in which they exist. There is the smell of panic in the air, and here’s why . . .

We have known since the mid-1990s that the internet was the future of computing. With increasing bandwidth, data doesn’t need to be trapped in the hard drives of our desktop computers: data and interaction can follow us out into the world we live in. Modem uptake drove dot-com 1.0; broadband uptake drove dot-com 2.0. Now everyone is anticipating what you might call dot-com 3.0, driven by a combination of 4G mobile telephony (LTE or WiMax, depending on which horse you back) and wifi everywhere. Wifi and 4G protocols will shortly be delivering 50-150mbps to whatever gizmo is in your pocket, over the air. (3G is already good for 6mbps, which is where broadband was around the turn of the millennium. And there are ISPs in Tokyo who are already selling home broadband delivered via WiMax. It’s about as fast as my cable modem connection was in 2005.)

[. . .]

This is why there’s a stench of panic hanging over silicon valley. this is why Apple have turned into paranoid security Nazis, why HP have just ditched Microsoft from a forthcoming major platform and splurged a billion-plus on buying up a near-failure; it’s why everyone is terrified of Google:

The PC revolution is almost coming to an end, and everyone’s trying to work out a strategy for surviving the aftermath.

Read the whole thing. I don’t see any obvious flaw in his line of thought. It may not happen the way he predicts, but it is consistent with what we know, and it should frighten the heck out of Apple’s competitors.

April 29, 2010

Did Bruno Ganz do too good a job playing Adolf Hitler?

Filed under: History, Media, Technology — Tags: , , , , , , — Nicholas @ 12:11

Now that you actually have to work at it to find some of the Downfall parodies on YouTube, John Naughton looks at the cultural power of remix culture, which has been most recently popularized by Bruno Ganz in his mesmerizing performance as Adolf Hitler:

Ganz’s performance is a real tour de force, so much so that the New Yorker critic wondered aloud if it would have the effect of humanising Hitler. But the scene had another, equally extraordinary, side-effect. It became the basis for a wildly successful and entertaining comic virus, in which people used everyday video-editing software to remix the scene in modern contexts (politics, sports, technology, popular culture). The German soundtrack was left unchanged, but new subtitles were added and then the results were posted on YouTube.

[. . .]

Some of these parodies are tiresome. But many are side-splittingly funny, a testimony to the power of remixing as a way of enlivening cultural life. Nevertheless, not everyone is delighted by this new art form. Jewish organisations have been understandably disturbed by the way the architect of the Holocaust has been turned into a comic turn. “Hitler,” said the director of the Anti-Defamation League, “is not a cartoon character”.

[. . .]

The YouTube remix culture is thus a new take on a venerable tradition. I wouldn’t argue that the Downfall spoofs are high art, but they are evidence of bottom-up creativity and intelligence in a new medium. And if we allow narrow considerations of intellectual property to stifle this creativity, then we may all, except for the lawyers, live to regret it.

Back to 1996

Filed under: Randomness, Technology — Tags: , — Nicholas @ 08:07

BoingBoing linked to this online time machine, which shows you what your website would look like (and sound like) back in 1996:

Presenting Geocities-izer!

« Newer PostsOlder Posts »

Powered by WordPress