Quotulatiousness

May 13, 2010

A “secret weapon” from WW2 updated for the 21st century

Filed under: History, Military, WW2 — Tags: , , , — Nicholas @ 07:54

Strategy Page looks at Operations Research in its modern guise:

It all began back in the 1970s, when some CIA analysts discovered a new way to analyze the mountains of information they were receiving. The new tool was predictive analysis. What does this do for intelligence analysts? Predictive analysis was the result of a fortuitous combination of OR (Operations Research), large amounts of data and more powerful computers. OR is one the major (and generally unheralded) scientific developments of the early 20th century. OR is basically applying mathematical analysis to problems. OR turned out to be a major “weapon” for the Allies during World War II. OR, like radar, was developed in the 1930s, just in time for a major war, when whatever was available was put to work to win the conflict. OR is also, half jokingly, called a merger of math and common sense. It is widely used today in science, industry and, especially, in business (it’s the primary tool of MBAs, where it’s called “management science”.) With predictive analysis, the most important OR tool was the ability to “backtest” (see if the simulation of a situation could accurately predict the outcome of something that had already happened, if the same historical decisions are made). For predictive analysis of contemporary situations, the backtest is, instead, a predictive tool that reveals likely outcomes.

Predictive analysis, like OR in general, creates a framework that points you towards the right questions, and often provides the best answers as well. Like many OR problems, especially in the business world, the simulation framework is often quite rough. But in war, as in commerce, anything that will give you an edge can lead to success over your opponents. A predictive analysis is similar to what engineers call “a 60 percent solution” that can be calculated on the back of an envelope.

The one form of predictive analysis that the general public is aware of is wargames, and these have been increasingly useful in predicting the outbreak, and outcomes, of wars. There have even been commercial manual (like chess) wargames that have successfully applied predictive analysis. The commercial manual wargames produced some impressive results when it came to actual wars.

In late 1972 a game (“Year of the Rat”) was published covering the recent (earlier in the year) North Vietnamese invasion of South Vietnam. This game didn’t predict the outcome of the war, but it got the attention of people in the intelligence community, especially those who knew something about wargames, for it was a convincing demonstration of what a manual wargame, using unclassified data, could do in representing a very recently fought campaign. There was even talk that these games could actually predict the outcome, and details, of a future war. The next year, wargames did just that, accurately portraying the outcome of the 1973 Arab-Israeli war. The game (“Sinai”) was about to be published when the war broke out, but some people in the intelligence community knew about it. A member of the Israeli UN delegation had watched the game in development (he was a wargamer), and was assigned to camp out at the publishers offices, while the war raged, and report what the game was predicting.

May 4, 2010

The lesson, kids, is don’t ask for colour advice

Filed under: Humour, Randomness, Technology — Tags: , , — Nicholas @ 08:04

A colour survey gone very wrong:

Thank you so much for all the help on the color survey. Over five million colors were named across 222,500 user sessions. If you never got around to taking it, it’s too late to contribute any data, but if you want you can see how it worked and take it for fun here.

First, a few basic discoveries:

* If you ask people to name colors long enough, they go totally crazy.
* “Puke” and “vomit” are totally real colors.
* Colorblind people are more likely than non-colorblind people to type “fuck this” (or some variant) and quit in frustration.
* Indigo was totally just added to the rainbow so it would have 7 colors and make that “ROY G. BIV” acronym work, just like you always suspected. It should really be ROY GBP, with maybe a C or T thrown in there between G and B depending on how the spectrum was converted to RGB.
* A couple dozen people embedded SQL ‘drop table’ statements in the color names. Nice try, kids.
* Nobody can spell “fuchsia”.

Overall, the results were really cool and a lot of fun to analyze. There are some basic limitations of this survey, which are discussed toward the bottom of this post. But the sheer amount of data here is cool.

And a selection of miscellaneous answers:

April 30, 2010

The revolution is almost complete . . . hold on tight

Filed under: Economics, Technology — Tags: , , , , , — Nicholas @ 16:25

Charles Stross thinks he understands why Steve Jobs won’t allow Adobe Flash on to the iPhone and iPad:

Steve Jobs believes he’s gambling Apple’s future — the future of a corporation with a market cap well over US $200Bn — on an all-or-nothing push into a new market. HP have woken up and smelled the forest fire, two or three years late; Microsoft are mired in a tar pit, unable to grasp that the inferno heading towards them is going to burn down the entire ecosystem in which they exist. There is the smell of panic in the air, and here’s why . . .

We have known since the mid-1990s that the internet was the future of computing. With increasing bandwidth, data doesn’t need to be trapped in the hard drives of our desktop computers: data and interaction can follow us out into the world we live in. Modem uptake drove dot-com 1.0; broadband uptake drove dot-com 2.0. Now everyone is anticipating what you might call dot-com 3.0, driven by a combination of 4G mobile telephony (LTE or WiMax, depending on which horse you back) and wifi everywhere. Wifi and 4G protocols will shortly be delivering 50-150mbps to whatever gizmo is in your pocket, over the air. (3G is already good for 6mbps, which is where broadband was around the turn of the millennium. And there are ISPs in Tokyo who are already selling home broadband delivered via WiMax. It’s about as fast as my cable modem connection was in 2005.)

[. . .]

This is why there’s a stench of panic hanging over silicon valley. this is why Apple have turned into paranoid security Nazis, why HP have just ditched Microsoft from a forthcoming major platform and splurged a billion-plus on buying up a near-failure; it’s why everyone is terrified of Google:

The PC revolution is almost coming to an end, and everyone’s trying to work out a strategy for surviving the aftermath.

Read the whole thing. I don’t see any obvious flaw in his line of thought. It may not happen the way he predicts, but it is consistent with what we know, and it should frighten the heck out of Apple’s competitors.

April 27, 2010

Tech-clueless in Toronto

Filed under: Humour, Technology — Tags: , , — Nicholas @ 11:08

I received the following rant from a reader who is experiencing some, um, technical challenges in his job. Not technical challenges for himself: boss and co-worker foundering under the foaming, rushing waters of technology:

They are going to drive me absolutely insane.

Did you know … that you can select the program with which to open a file by right-clicking on the file and selecting Open With…?

DID YOU KNOW THAT?!

That is the MOST AMAZING THING EVER, according to the oldsters. These guys could not figure out how to open a text file that has an extension other than .TXT. I showed them the Open With… twiddlebit, and now Head Oldster is busy adding the procedure to our internal style guide.

Gobsmacked with heartbroken outrage, I said “Dude. Anyone who has used Windows for any amount of time will know that. You don’t have to put it into our style guide.”

To which he responded: “I have been doing this for 20 years, and this is the first time I’ve heard of this. So it should be documented.”

I don’t know how much longer I can work here.

And to top if off, BOTH OF THEM are constantly getting calls from headhunters and former employers who want them back as contractors. How is that possible? Head Oldster can generally get through the day, but The New Guy — Judas on a Vespa with Cheese and Peppers. Watching him navigate through FrameMaker is like watching Stephen Hawking type out A Brief History of Time character-by-character with his eyeballs, minus the genius part of it.

The guy struggles to find the SAME FUNCTIONS THAT HE USES EVERY DAY in the menus. How can he possibly beswamped with job offers? IS THE ECONOMY DOING THAT WELL?

Crickey.

I have to admit, reading this rant made me feel better about my own work . . .

April 26, 2010

McAfee’s tech problem resolved: image problem will take much longer

Filed under: Technology — Tags: , , , — Nicholas @ 08:43

After the technical disaster of an anti-virus company releasing an update that shut down many of their customers’ computers, McAfee now has to cope with the public relations disaster:

After dealing with McAfee’s most recent fix that sabotaged Windows XP PC clients worldwide, users of the antivirus software headed over to Twitter to vent their rage, creating a public-relations and legal nightmare that will likely continue long after the last machine is patched.

“I hate McAfee,” more than one Tweeter wrote, summing up the frustration felt when a McAfee update identified a “normal Windows process” as malware and killed it, kicking off a death spiral for the affected machines.

Another Tweet: “McAfee DAT 5958, you’ve made…no wait, what’s the opposite of “made my day”?… you’ve DESTROYED MY DAY. hate you McAfee. HAAATEEEEE.”

“VirusScan,” another person Tweeted. “The cure is worse than the disease.”

I was fortunate, as fellow blogger William P. alerted me to the issue and I got home and turned off McAfee automatic updating before my desktop machine loaded the poison update.

April 21, 2010

When copyright goes bad

Filed under: Law, Media, Technology — Tags: , , , , — Nicholas @ 12:09

H/T to Cory Doctorow.

April 20, 2010

Apple officially asks for their missing iPhone back

Filed under: Technology — Tags: , , — Nicholas @ 07:50

I guess Gizmodo did get their hands on something genuine, as Apple has sent a letter formally asking for the device to be returned to them:

Gizmodo says it has now received a letter from Apple’s senior vice president and general counsel Bruce Sewell:

“It has come to our attention that Gizmodo is currently in possession of a device that belongs to Apple. This letter constitutes a formal request that you return the device to Apple. Please let us know where to pick up the unit.”

Gizmodo says the iPhone 4G/iPhone HD — take your pick — was left in a German beer garden (we like those details) called Gourmet Haus Staudt in Redwood. Speculate what you will about this: how convenient this kind of intense interest is for Apple, whether this is a fake, the various ways in which infamously secretive Apple might retaliate against the hapless prototype phone-loser Gray Powell — or, as the well-connected John Gruber says, why Gizmodo paid $5,000 for the phone which was stolen from Apple.

Given that almost any device Apple introduces is greeted with hosannas and hallelujahs from the fanboy crowd, it does seem unlikely that this is a deliberate attempt by Apple to create or increase public interest in their next iPhone release.

25 years on, the “Hackers” bestride the globe

Filed under: History, Technology — Tags: , , , , — Nicholas @ 07:34

Steven Levy revisits some of the people he profiled in his book Hackers, back in the Pre-Cambrian period of the geek revolution:

“It’s funny in a way”, says Bill Gates, relaxing in an armchair in his office. “When I was young, I didn’t know any old people. When we did the microprocessor revolution, there was nobody old, nobody. It’s weird how old this industry has become.” The Microsoft cofounder and I, a couple of fiftysomething codgers, are following up on an interview I had with a tousle-headed Gates more than a quarter century ago. I was trying to capture what I thought was the red-hot core of the then-burgeoning computer revolution — the scarily obsessive, absurdly brainy, and endlessly inventive people known as hackers. Back then, Gates had just pulled off a deal to supply his DOS operating system to IBM. His name was not yet a household word; even Word was not yet a household word. I would interview Gates many times over the years, but that first conversation was special. I saw his passion for computers as a matter of historic import. Gates himself saw my reverence as an intriguing novelty. But by then I was convinced that I was documenting a movement that would affect everybody.

The book I was writing, Hackers: Heroes of the Computer Revolution, came out just over 25 years ago, in the waning days of 1984. My editor had urged me to be ambitious, and so I shot high, crafting a 450-page narrative in three parts, making the case that hackers — brilliant programmers who discovered worlds of possibility within the coded confines of a computer — were the key players in a sweeping digital transformation.

I hadn’t expected to reach that conclusion. When I embarked on my project, I thought of hackers as little more than an interesting subculture. But as I researched them, I found that their playfulness, as well as their blithe disregard for what others said was impossible, led to the breakthroughs that would define the computing experience for millions of people.

I must have read Hackers during my first or second semester in college, as I tried to figure out how to get out of the series of dead-end jobs I’d had since leaving school. I found strong echoes of many of the characters Levy portrayed in the people I encountered in my first few “high tech” jobs, although I don’t think any of them have managed to become billionaires yet.

Americans’ eroded right to be free from invasive searches

Filed under: Law, Liberty, USA — Tags: , , — Nicholas @ 07:23

John Perry Barlow shared a link to this Washington Times editorial, which clearly illustrates how the US federal government has managed to undermine Americans’ right to privacy:

Federal security workers are now free to snoop through more than just your undergarments and luggage at the airport. Thanks to a recent series of federal court decisions, the digital belongings of international fliers are now open for inspection. This includes reading the saved e-mails on your laptop, scanning the address book on your iPhone or BlackBerry and closely scrutinizing your digital vacation snapshots.

Unlike the more common confiscations of dangerous Evian bottles and fingernail clippers, these searches are not being done in the name of safety. The digital seizures instead are part of a disturbing trend of federal agencies using legal gimmicks to sidestep Fourth Amendment constitutional protections. This became clear in an April 8 court ruling that found admissible the evidence obtained by officials who had peeped at a passenger’s laptop files at George Bush Intercontinental Airport in Houston.

Didn’t you guys fight a war a couple of hundred years back over the 18th century equivalent of this kind of thing?

April 16, 2010

QotD: Blog Post EULA

Filed under: Humour, Law, Quotations, Technology — Tags: , , , — Nicholas @ 09:05

READ CAREFULLY. By reading this blog post, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies (“BOGUS AGREEMENTS”) that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer.

Cory Doctorow, “Video-game shoppers surrender their immortal souls”, BoingBoing, 2010-04-16

April 15, 2010

Properly defining what are “public goods”

Filed under: Economics, Law, Media, Technology — Tags: , , , — Nicholas @ 07:50

Milena Popova, guest-blogging while Charles Stross is out experiencing Japan, has a long discussion up about public goods and why content (digitally speaking) is a classic example:

There’s a theory in economics about things called “public goods”. To understand the distinction between private goods, public goods and the couple of shades of grey in between, you first need to get your head around two concepts: rival and excludable.

Rival: (Wikipedia seems to call this “rivalrous”, but when I were a young economist lass we used to call it rival so I’ll stick with that.) A good is rival if my consumption of it diminishes the amount of the good that you can consume. Say we had 10 apples, and I ate one. There would now be 9 apples left which you could eat. If we had one apple and I ate all of it, tough luck, no apples for you. Knowing whether a good is rival or not tells you whether you want to use the market (if I were a good economist that would possibly be capital-M Market 😉 to allocate access to that good. If it’s rival, then the market is an efficient way of allocating the good; if it’s not, then you might want to think about other ways of getting your good to people. Remember that scary anti-piracy clip at the start of your DVDs which says “You wouldn’t steal a handbag”? Hold that thought for a minute.

Excludable: A good is excludable if you physically have a way of stopping people from consuming it. Back to the apples: if they’re in my fridge, inside my locked house and you don’t have a key, you can’t have my apples. (Yes, yes, you could break in. The law provides additional protection here, but ultimately there’s probably a better way for you to obtain an apple than breaking into my house, right?) Knowing whether a good is excludable tells you whether you can use the market to distribute the good. If your good is excludable, go ahead and sell it on the open market; if it’s not — you might struggle because you can’t stop people from just taking it for free.

So. Most of the goods you deal with in your day-to-day life are both rival and excludable. We call them pure private goods. But there’s a few things here and there that aren’t as clear-cut, and this is where it gets a little messy.

March 15, 2010

Minor irritations

Filed under: Administrivia, Technology — Tags: , , — Nicholas @ 11:49

I realize it’s a positive sign that all I’ve got to complain about is a trivial thing, but damn it’s annoying.

“It”, specifically, is the latest update to Firefox (now at version 3.6). There’s now a problem with my mouse scrolling wheel in Firefox, but only in my Rogers/Yahoo webmail client. You don’t realize how often you use a feature until it stops working unexpectedly. I noticed it on my desktop last week, but didn’t directly attribute it to Firefox until this morning when I updated the browser on my laptop and it started displaying the same symptoms (also, YouTube videos lose their sound, but that’s only on the laptop).

March 10, 2010

Some things never change

Filed under: Humour, Law, Politics, Technology — Tags: , , , , — Nicholas @ 12:39

I was looking though some old postings and found this little gem, which is as true as ever:

It is a sad real-world fact that most legislators, when presented with something they do not understand, almost always attempt to ban it. This probably started with the first neolithic fire-tamer . . . who was probably beaten to death with sticks when the tribal shaman saw it. Senator Hatch is showing all the finely nuanced reactions of Ug the caveman here.

This was in reaction to Senator Orrin Hatch introducing a bill to make peer-to-peer file sharing illegal back in 2004.

There goes another slice of office productivity

Filed under: Gaming — Tags: , — Nicholas @ 09:39

Matt Peckham looks at a new “office productivity suite” which is sure to be popular in certain work-averse environments:

Pilot a spaceship, paddle a ball, even play horizontal Tetris, all while crafting reports, cutting costs, and scanning monthly performance charts…or at least appearing to. It’s the latest way to avoid work while looking like you’re furiously engaged in it.

The brainchild of four developers from the Netherlands, CantYouSeeImBusy.com teases a collection of free Flash-based mini games that let you slack off, chameleon-like, by adopting the form of an office productivity suite. Each one opens like a full-screen pop-up and offers a panic button that’s smarter than the average escape hatch: Tap the space bar and the “game” elements vanish, leaving just the “productivity” features in place.

“Let’s face it, we all want to relax every now and then, but still want to appear professional or busy!” reads the site intro. “That’s why all the games at CantYouSeeImBusy.com are designed in a way that nobody can see that you’re gaming. In fact, your boss and colleagues will think that you’re working harder than ever before.”

March 9, 2010

Another anti-piracy scheme that hurts legitimate users

Filed under: Economics, Gaming, Technology — Tags: , , , — Nicholas @ 07:06

French games developer Ubisoft was the target of a DDoS attack over the weekend, which took out their license verification servers. This left thousands of gamers unable to play their games . . . but not all gamers. Only the ones who bought the game legitimately, because the “real” version requires online validation every time you play . . . the cracked versions do not:

PC users started reporting problems accessing some of the French company’s most popular games, including best-seller Assassin’s Creed 2, on Sunday afternoon. It later emerged that attackers had targeted the company’s controversial anti-piracy system, causing it to break down — which in turn left thousands of people unable to play.

The chaos was so widespread because of the way that Ubisoft’s copy protection system — which requires players who have bought the game to log in online and verify that they are not playing a pirated version — is designed. By flooding the anti-piracy servers with web traffic, the unknown attackers forced it to collapse and therefore locked out those players who tried to sign in.

This angered many gamers, who felt that they had been punished for buying legal copies of the company’s games — which cost as much as £50.

“We’ve had to agree to their draconian rules in order to play their game, however Ubisoft haven’t given a single thought to what happens when their servers screw up,” said one disgruntled user on the company’s web forums.

This is far from the only example of companies trying to protect their intellectual property by imposing DRM “solutions” which punish their customers. In the long term, no matter how nice the product may be, it can’t be a good practice to place barriers in the way of the people who’ve paid to use the product.

« Newer PostsOlder Posts »

Powered by WordPress