Quotulatiousness

October 23, 2011

What to do when “Tech Support” calls you

Filed under: Humour, Law, Technology — Tags: , , — Nicholas @ 11:39

crshbndct recounts the heart-warming story of his recent call from “Tech Support”:

“Good Morning Sir, I am calling to inform you that you have serious issues with your pc and that we can help you fix them”

“Really? I just got it working today (had been having a nightmare of a time with video drivers)”

“Yes, Sir, but do not worry, we can help you to fix this problems”

(Realising its a scam, but willing to play along)

“Oh OK well that’s good. How are you going to do that?”

“Well Sir, Your computer runs a thing called Windows XP, which has many viruses and malware and rootkits and things like this which infect your master root on your CPU and slow it down and causes problems with your computer which can cost a lot to fix. We can help you fix this really cheaply”
“Really cheaply?!?! That sounds fantastic!! How do I do it?”

September 30, 2011

Another science fiction device may be on the way to reality

Filed under: Technology — Tags: , , — Nicholas @ 08:59

Ever read some of those late-60s or early-70s SF stories that assumed that computers that ran using non-binary logic would replace the binary logic machines of the day? Welcome to the future:

In 2007, Hewlett-Packard’s labs demonstrated the first memristor recognized as such. A portmanteau of “memory” and “resistor,” “memristance” was the theoretical fourth circuit variable first described in 1971. While HP stock will probably not yield the sort of profits we’re looking for here, it will help generate them indirectly.

Because of its unique properties, memristors will enable far more powerful circuitry. Unlike transistor-based circuits that form the core of modern electronics, memristive circuits retain their state after losing power. Theoretically, you could power on a memristor-based computer and have all the data in memory that it had when you powered off. Memristor memory could replace hard drives and transistor-based RAM.

Memristors, however, can do more than act as memory. They can replace existing processing components. This means that much more functionality can be implemented in a single component. Instead of busing data back and forth between separate memory and processing locations on a circuit board, memristors do it all. Data, then, are available for processing with shorter wait times. Memristors reduce total hardware size, cost and energy consumption. Yet memristors can multitask in other ways, opening up a whole range of exciting possibilities.

September 2, 2011

Time perspectives

Filed under: Economics, Education, Media, Technology — Tags: , , , — Nicholas @ 00:06

H/T to Chris Myrick for the link.

August 20, 2011

For his next trick, he’ll be knapping his own flint for arrowheads

Filed under: History, Technology — Tags: , — Nicholas @ 09:54

Okay, I exaggerate . . . a bit:

When IBM released its first personal computer, the 5150, 30 years ago, it was deliberately drab — black, gray, and low-key. That’s because IBM intended the 5150 to be a serious machine for people doing serious work.

So how better to celebrate this important anniversary than by using the 5150 for what it was meant to do? Working on a 5150 seems to be a tall task in today’s vastly accelerated computing world, however. Could a PC that’s as old as I am manage to email, surf the Web, produce documents, edit photos, and even tweet?

I sequestered myself for four days amid boxes of 5.25-inch floppy drives and serial cables to find out. The answer to my question turned out to be both yes and no — but more interesting was all the retro-computing magic I had to perform. In the end, my experiment proved two things:

  • People now use the PC for many things that weren’t even conceived of in 1981, and the 5150, unsurprisingly, is woefully underpowered for those advanced tasks. But when you use it for the core computing tasks the 5150 was designed for, IBM’s first PC has still got game.
  • Early floppy discs were just too darned small!

August 16, 2011

Charles Stross on the future of network security

Filed under: Science, Technology — Tags: , , , — Nicholas @ 12:40

Charles isn’t a professional in network security, but he has a good track record of exploring the consequences of new technology in his science fiction works. He was invited to give the keynote address at the 2011 USENIX conference.

Unlike you, I am not a security professional. However, we probably share a common human trait, namely that none of us enjoy looking like a fool in front of a large audience. I therefore chose the title of my talk to minimize the risk of ridicule: if we should meet up in 2061, much less in the 26th century, you’re welcome to rib me about this talk. Because I’ll be happy to still be alive to rib.

So what follows should be seen as a farrago of speculation by a guy who earns his living telling entertaining lies for money.

The question I’m going to spin entertaining lies around is this: what is network security going to be about once we get past the current sigmoid curve of accelerating progress and into a steady state, when Moore’s first law is long since burned out, and networked computing appliances have been around for as long as steam engines?

I’d like to start by making a few basic assumptions about the future, some implicit and some explicit: if only to narrow the field.

August 10, 2011

xkcd on the paradox of passwords

Filed under: Humour, Technology — Tags: , , , , — Nicholas @ 10:10

He’s absolutely right, you know . . .

August 8, 2011

Another technical problem? Must be a day with a “y” in it

Filed under: Administrivia, Technology — Tags: , — Nicholas @ 21:44

Last week, you’ll recall that I was bewailing the failings of the Microsoft Windows Easy Transfer utility. Having given up on that and managed the transfer of files by the traditional tools of Brute Force and Ignorance (BF&ITM), I thought I was done.

All the necessary files now reside on the new laptop, and the old laptop has been dedicated to a new life as a genealogy workstation for Elizabeth. Today’s problem was network connectivity.

But not just network connectivity for the laptop, as I discovered when I tried turning on my desktop machine a little while ago.

At some point while we were away, the wireless router seems to have had some hiccoughs, because now it seems to imagine that it’s actually two separate machines. When I tried to connect to the internet this morning (from the new laptop), it insisted that I was connected to both a public network and our own named private network. But because it thought the public network was the primary, it refused to actually interact with our named network. It took several iterations of running diagnostics and power-cycling the router before the phantom “public” network disappeared and I was able to connect to the internet normally.

This evening, I had a similar problem with my desktop, except that my desktop machine is connected by ethernet cable, not wireless. That phantom “public” network re-appeared, and nothing I could do would get rid of it. The physical connections were fine, but nothing could persuade my desktop that it actually had a connection to the router and it was unable to get an IP address.

Having just bought a new laptop, I’m hoping that these symptoms do not imply that I need to also buy a new router, as you can imagine.

August 1, 2011

Back to the drawing board

Filed under: Administrivia — Tags: , , — Nicholas @ 10:15

As I mentioned yesterday, I’ve been trying to use Microsoft’s Windows Easy Transfer utility to move 100Gb of files and settings from my old laptop to the new one, but between technical glitches and thunderstorms, it still hasn’t completely worked. When the initial estimate ballooned up from a few hours to nearly two days, I started to suspect things were not going to go according to the script . . .

Today’s plan is to do it in two stages: back up the old machine’s files to the NAS, then install the files from the NAS to the new laptop.

July 31, 2011

Upgrades in slow motion

Filed under: Technology — Tags: , , — Nicholas @ 16:55

I bought a new laptop yesterday, as my old laptop is starting to creak when I load up a full suite of work tools (Adobe FrameMaker, Open Office Writer or Microsoft Word, a couple of web browsers plus a virtual machine or two under VMWare). Elizabeth will be taking over my old laptop and retiring her Acer with its constant beeping and lock-ups when I’ve finished installing all the software and moving over all my files to the new laptop.

I’m currently trying to transfer files and settings from my old laptop to the new machine. The Windows Easy Transfer tool makes it look pretty straightforward . . . but it’s slow, slow, slow. I started a transfer last night after dinner, anticipating it’d be done this morning, but the WiFi router glitched not long after I started the process, so it didn’t happen. Plus, we had some lively thunderstorms roll through early this morning, which meant I had to jump out of bed and shut everything down anyway.

Second attempt this afternoon, once the weather cleared up, and it’s now telling me to expect the transfer to take “1 day 15 hours”. And, of course, you can’t use either machine for anything else while the files are being transferred.

July 27, 2011

MS-DOS at thirty

Filed under: History, Technology — Tags: , , — Nicholas @ 07:25

It was indeed, according to The Register, thirty years ago that MS-DOS hit the market:

MS-DOS is 30 years old today. Well, kind of. On 27 July 1981, Microsoft gave the name MS-DOS to the disk operating system it acquired on that day from Seattle Computer Products (SCP), a hardware company owned and run by a fellow called Rod Brock.

SCP developed what it at various times called QDOS and 86-DOS to run on a CPU card it had built based on Intel’s 8086 processor.

July 25, 2011

Electronic weapons to destroy other electronics

Filed under: China, Military, Technology, Weapons — Tags: , — Nicholas @ 12:05

Strategy Page looks at some interesting developments in the electronic weapons area:

A U.S. government report (from the National Ground Intelligence Center) indicates that China has developed useful weapons for disabling the electronics on American aircraft and warships. This is done using high-powered microwave (HPM) devices to create something like the EMP (Electromagnetic Pulse) put out by nuclear weapons, which damaged or destroys microelectronics.

[. . .]

Then there’s the EMP bomb, a legendary weapon that is much talked about, but has never actually been seen. Throughout the 1990s, information came out of Russia that a weapon had been developed that could generate a short range EMP (electromagnetic pulse) similar to that created by nuclear explosions. All computers within the range of the EMP bomb would be ruined. This is a truly devastating capability. Microprocessors are found everywhere these days; in automobiles, appliances, industrial equipment, medical devices and many other devices. Military microprocessors are often shielded to protect them against EMP, but the shielding is not thoroughly tested and even some military equipment will probably be disabled by an EMP attack.

A decade ago, a British military research team announced that they had duplicated the rumored Russian device and produced an EMP bomb that can fit in a 155mm artillery shell, small rockets or bombs. Such a device was supposed to be inexpensive and could be used to destroy civilian electronics that might be useful to nearby enemy troops. What is particularly worrisome about this new development is that, in the hands of terrorists, it could do a new kind of damage. While not killing people directly, the destruction of all electronics within an urban area could cause casualties and much economic loss. But none of these EMP bombs has ever actually reached the stage where they were actually ready to use. There was always some kind of flaw discovered in testing. Naturally, China is thought to have developed an EMP bomb.

July 11, 2011

Can the government force you to provide your password?

Filed under: Government, Law, Liberty, Technology, USA — Tags: , , , , — Nicholas @ 09:37

Declan McCullagh discusses a potentially precedent-setting case in Colorado that may determine whether the 5th amendment applies to your personal passwords:

The Colorado prosecution of a woman accused of a mortgage scam will test whether the government can punish you for refusing to disclose your encryption passphrase.

The Obama administration has asked a federal judge to order the defendant, Ramona Fricosu, to decrypt an encrypted laptop that police found in her bedroom during a raid of her home.

Because Fricosu has opposed the proposal, this could turn into a precedent-setting case. No U.S. appeals court appears to have ruled on whether such an order would be legal or not under the U.S. Constitution’s Fifth Amendment, which broadly protects Americans’ right to remain silent.

I’d hope that the protections against self-incrimination would apply in this case, but government power has been expended so far in the last ten years that it would not surprise me if the courts gut this right in their deference to the executive (just like every other time, it seems).

May 24, 2011

Why is the move to IPv6 so important?

Filed under: Media, Technology — Tags: , — Nicholas @ 08:42

As you may remember, June 8th is World IPv6 Day, where hundreds of major players including Google, Facebook, and Yahoo will all turn on IPv6 access (but then turn it off again at the end of the day). It seems odd to make a big to-do about IPv6 Day then go back to business as usual after 24 hours. Most end users will not notice the change, as most of us connect through our various ISP networks using IPv4 addresses anyway.

So, what happens if IPv6 isn’t taken up by the movers and shakers of the networking world?

Proponents of IPv6 make dire predictions about the fate of the Internet if usage of IPv6 doesn’t rise dramatically in the next few years. They say the complexity of the Internet infrastructure will increase, network operations costs will rise, and innovation will be hampered. This is due to the multiple layers of network address translation (NAT) devices that will be required to share limited IPv4 addresses among a rapidly growing base of users and devices.

“If IPv6 fails to catch on, then the Internet will include nesting of NAT upon NAT,” says Russ Housley, chairman of the Internet Engineering Task Force (IETF), the Internet standards body that created IPv6. “I hope this is not our future because it would be a very fragile Internet, making innovation more difficult. On the other hand, IPv6 will greatly reduce the need for NAT, restoring the opportunities for innovation that were envisioned by the original Internet architecture.”

Dorian Kim, vice president of IP engineering, Global IP Network at NTT America, a leading provider of IPv6 services in the United States, says that without IPv6 the Internet “will be even more heavily NATed than it currently is, but life will mostly go on. Unfortunately, such an Internet likely will have a negative effect on potential development of application or service innovation due to inherent issues with NATs. Additionally, should service providers become more and more reliant on NATs, this will probably change the cost and scaling trajectories of Internet services over time due to high cost and limited scalability of large-scale NAT solutions.”

May 17, 2011

Memristor breakthrough

Filed under: Technology — Tags: , , — Nicholas @ 09:12

A report at The Register talks about HP’s new leads in the development of the “memristor”:

HP scientists have made a breakthrough in the development of memristors, a fundamental circuit type that looks increasingly likely to replace NAND flash and possibly DRAM.

Essentially, they’ve figured out the physical and chemical mechanisms that make memristors work.

“We were on a path where we would have had something that works reasonably well, but this improves our confidence and should allow us to improve the devices such that they are significantly better,” the leader of the HP research team, R. Stanley Williams, told IDG News.

Memristors are the fourth fundamental type of passive circuitry, along with the resistor, capacitor and inductor. Like flash, memristors are nonvolatile — they “remember” their state when power isn’t applied to them.

The core advantage of memristors is that they can theoretically achieve speeds 10 times that of flash at one-tenth the power budget per cell. They can also be stacked, enabling exceptionally dense memory structures.

Of course, this is all still in the research lab, so don’t expect to see memristor technology show up in your next tablet or smartphone. It could be several years before the new tech becomes widely available.

May 15, 2011

How many e-books do you need to read to make your reading device economical?

Filed under: Books, Economics, Media, Technology — Tags: , , , — Nicholas @ 13:01

Dark Water Muse does the math for you:

In this piece DWM does not explore other possible ways that a tablet does things differently to a smart phone, net book, laptop or desktop computer. This is not a general review of tablet capabilities. It can be considered an update to DWM’s eReader versus Book piece [Ed: linked to from this post last week] with emphasis on the cost of the use of the tablet as an eReader.

Since DWM is focused on eReading then cost is an influential factor when considering any eReader device.

If you trust DWM to do the math and you don’t want to review DWM’s work (included further below in the section entitled “The Math”) then you can read the results in the Table #1: comparison of relative eReading costs below.

If we assume the average book price is $20 and eBooks are discounted by 40% (a gracious discount from DWM’s experience) then we get the following equation for N, the number of eBooks you must purchase and read on your new device to ensure you’re not paying more for the content you could have read as a book:

N = cost of device / $8

Table #1: comparison of relative eReading costs: The following table indicates the number of books N you must read on the corresponding eReader on the market today (prices taken from the web as of May 15, 2011) in order that the cost of the device does not drive up the cost of eBooks you read.

« Newer PostsOlder Posts »

Powered by WordPress