Quotulatiousness

February 18, 2010

Civilization V? In development, apparently

Filed under: Gaming, History — Tags: , , — Nicholas @ 12:56

I was a huge fan of the Civilization series of games, starting with the original game and running through the series, although as I mentioned back in 2005, I wasn’t enjoying the later releases as much as I had the earlier ones. To my surprise, there will be a follow-on Civilization V available later this year:

Funny story, I was musing about a Civilization sequel just yesterday while out for a run, and lo and behold, 2K Games says it’s in development as I’m typing this. What’s more — and I have to admit, somewhat unexpectedly — it’s still being developed for PC.

What’s Civilization? Surely you jest . . . but in case you’re serious, it’s pretty simple: One of the most important turn-based strategy video game in the history of the medium. Also: A pretty spot-on history simulator (in terms of history’s broad strokes and ideological angles, anyway). The general goal — to conquer the world by diplomatic or less-than-diplomatic means — hasn’t changed much since the original debuted in 1991, but as they say, the journey is all, and that journey’s generally improved by leaps and bounds with each installment.

Calling Civilization V‘s new engine “astonishing,” 2K says the game has been rebuilt “from the ground-up” with a brand new combat engine, more sophisticated diplomacy, and expansions all around to existing features.

Here’s the web site for the upcoming game. Yeah, I’ll almost certainly buy it, even though it may be coming out around the same time as my current gaming addiction’s next release (Guild Wars 2).

January 24, 2010

Canadian infantry to get new personal equipment

Filed under: Cancon, Military, Technology — Tags: , , — Nicholas @ 13:25

Strategy Page reports that the Canadian Forces will be introducing new equipment for infantry soldiers next year:

Canada is joining its NATO allies in providing its infantry with new basic equipment, including electronic gear that, until quite recently, no one saw the troops getting for a decade or more. The Canadian gear set is called ISSP (Integrated Soldier System Project). The first components of ISSP will be issued next year. ISSP contains the usual elements of improved infantry gear. New uniforms, that incorporate improvements the troops have been demanding for years, plus new helmets and protective vests, that are lighter and provide improved shielding from bullets and fragments. New communications gear gives each soldier a link with everyone in his unit, while individual GPS is something troops have already provided for themselves. As other armies have discovered, the troops have already bought a lot of the new gear that is now proposed for the new standard issue.

A lot of this new stuff is commercial, with the military taking the best and most appropriate gear designed for outdoor living. This is particularly true of stuff marketed to the demanding mountain climbing and winter sports enthusiasts. Canada isn’t plunging into unknown territory here. The U.S., France, Germany and most other major NATO countries have already gone this route, and left a lot of practical experience in their wake. Thus the major goal is to get all the most useful gear, and reduce the weight of stuff the infantry have to carry into combat. It’s much easier to find new gear that works better, than it is to find stuff that’s lighter, and still gets the job done.

This is very good news, although there’s always a trade-off between “useful stuff to have” and “weight to be carried”. Modern computer gear is far lighter than it used to be, except for batteries, but there’s always the temptation on the part of the planners to add “just one more” neat bit of kit to the burden already being humped across the field by the infantry.

There’s also the challenge of making the technology both useful and as non-distracting as possible. As Robert Heinlein wrote back in the late 1950’s, “If you load a mudfoot down with a lot of gadgets he has to watch somebody a lot more simply equipped — say with a stone axe — will sneak up and bash his head in while he is trying to read a Vernier.”

January 21, 2010

And yet more on passwords

Filed under: Technology — Tags: , , , , , — Nicholas @ 13:11

This is becoming a quarterly topic around here. Imperva has done some statistical analysis of the 32 million passwords which were exposed in the Rockyou.com security breach:

Key findings of the study include:

* The shortness and simplicity of passwords means many users select credentials that will make them susceptible to basic forms of cyber attacks known as “brute force attacks.”

* Nearly 50% of users used names, slang words, dictionary words or trivial passwords (consecutive digits, adjacent keyboard keys, and so on). The most common password is “123456”.

* Recommendations for users and administrators for choosing strong passwords.

“Everyone needs to understand what the combination of poor passwords means in today’s world of automated cyber attacks: with only minimal effort, a hacker can gain access to one new account every second—or 1000 accounts every 17 minutes,” explained Imperva’s CTO Amichai Shulman.

The report identifies the most commonly used passwords:

1. 123456
2. 12345
3. 123456789
4. Password
5. iloveyou
6. princess
7. rockyou
8. 1234567
9. 12345678
10. abc123

So there you go — all the tools you need to be a world-class password cracker.

January 15, 2010

Why China won’t be able to corner the rare earth market

Filed under: China, Economics, Technology — Tags: , — Nicholas @ 08:36

Tim Worstall looks at the importance of rare earth to the modern electronics industry, and why China’s ongoing attempt to corner the market won’t work in the long run:

The Chinese government is trying to corner the rare earths market and that isn’t good news for the tech business. Those with good memories of Chemistry O Level will know what the rare earths are: the funny little line of elements from Lanthanum to Lutetium at the bottom of the periodic table, along with Yttrium and Scandium, which we usually add to the list.

The reason we like them in the tech business is because they’re what enables us to make a lot of this tech stuff that is the business. You can’t run fibre optic cables without your Erbium repeaters, Europium, Terbium and Yttrium are all used to make the coloured dots in CRTs, the lens on your camera phone is 25 per cent Lanthanum oxide (yes, really, glass is made of metal oxides) and without Neodimium and Dysprosium we’d not have permanent magnets: no hard drives nor iPod headphones.

[. . .] it is still true that we get all of them – apart from Scandium, which is a rather different little beastie – from the same ore. In fact, we tend to get them not just from the same ore, but from the same mine: Bautou in Inner Mongolia (that’s the Chinese part, not the independent country).

And that’s where our problems really start. Over the past couple of decades China has been cracking down on small mines, usually in the name of environmental policy. That even may have been the real reason, as rare earth mines can be messy things. The outcome is that now 95 per cent of the earth’s supply comes from this one mining complex and the Chinese Government has just announced export restrictions.

So, if they have a monopoly on 95% of the world supply, why won’t it hold up? Because in spite of the name, they’re not as rare as all that . . . and there are substitutions that can be made for some or all of the current application needs. By restricting the supply and/or driving up the price, China will spur new competitors to enter the field and new sources of rare earths to be developed. In the short term, it will definitely create price increases (which, of course, will be passed on to the consumer), but in the medium-to-long term they will create a vibrant competitive marketplace which will almost inevitably drive the prices down below current levels.

Isn’t economics fascinating?

January 4, 2010

Sony’s latest consumer mis-step

Filed under: Technology — Tags: , , , , — Nicholas @ 08:44

Dark Water Muse treated himself to a new bit of electronic kit over the holidays, a Sony Reader Touch. He wasn’t best pleased by the purchase:

The Sony Reader is an all but useless device, certainly at its current price point. Especially if you already happen to own a portable electronic device capable of rendering common document and media file formats — got a smart phone? Got a netbook or laptop? Then you’re already living the dream that is merely Sony’s Reader Touch nightmare.

DWM gives the Sony Reader Touch negative 1 out of 10. Truly impressively bad, particularly when measured on a scale of +1 to +10.

How does DWM compute negative one? Read on.

Only the newly arrived on H. G. Wells’ Time Machine could find utility in a Sony Reader. Or if you’re too proud to admit you fucked up by buying one in the first place and prefer to go to your grave, Sony Reader over your heart (trust DWM when he says, any friends you might still have after becoming a Sony Reader Touch owner, or surviving relatives, want to see it buried with you too), rather than get your money back.

DWM returned his Sony Reader Touch after making extra special efforts to try and modify his relationship to reading text with it. He wanted the Sony Reader to work. He was willing to tolerate “a little” deficit in the reading experience, if only to avoid having to slaughter one more tree to feed his hunger for crime novels. But, feeling disappointed and defeated, DWM sent his Sony Reader Touch back to from whence it had come (extruded from that great product anus behind so many retail consumer products).

I’ve got a couple of dozen books on my iPhone, but I consider them to be “emergency” reading . . . for those times when I don’t have internet access. It’s great that the iPhone can work as a small ebook display, but the key word here is “small”.

December 18, 2009

More on passwords

Filed under: Technology — Tags: , , , , — Nicholas @ 08:58

The Economist‘s Tech.view correspondent confesses to password laxity:

He admits to flouting the advice of security experts: his failings include using essentially the same logon and password for many similar sites, relying on easily remembered words—and, heaven forbid, writing them down on scraps of paper. So his new year’s resolution is to set up a proper software vault for the various passwords and ditch the dog-eared list.

Your correspondent’s one consolation is that he is not alone in using easily crackable words for most of his passwords. Indeed, the majority of online users have an understandable aversion to strong, but hard-to-remember, passwords. The most popular passwords in Britain are “123” followed by “password”. At least people in America have learned to combine letters and numbers. Their most popular ones are “password1” followed by “abc123”.

I’ve written some carefully considered advice on passwords, which is still as valid today as it was in those dark, distant days of October.

December 15, 2009

Women in IT jobs

Filed under: Technology — Tags: , — Nicholas @ 07:28

According to a recent study, the reason there are not more women in the IT sector is that they’re put off by the ubiquitous cans of Coke and science fiction posters:

There’s more research out this week on the vexed question of why there aren’t more women in the field of computing and IT. According to the latest study, such seemingly harmless habits as putting up sci-fi posters or leaving cans of Coke about can be much more offputting than one might think.

“When people think of computer science the image that immediately pops into many of their minds is of the computer geek surrounded by such things as computer games, science fiction memorabilia and junk food,” says Sapna Cheryan, a junior trick-cyclist at the university of Washington, America. “That stereotype doesn’t appeal to many women who don’t like the portrait of masculinity that it evokes.”

Cheryan and her colleagues arranged multiple experiments and surveys among hundreds of non-computing-subjects students at Washington uni. Questionnaires were filled in in different rooms — one previously prepared with a science fiction poster, games kit and Coke cans; one instead with “nature” and “art” wall graphics, books and coffee cups. This stage dressing was ostensibly not part of the tests, but nonetheless it had a powerful effect on decisions by the ladies taking part.

December 9, 2009

“There is no app for that”

Filed under: History, Technology — Tags: , , , , , — Nicholas @ 13:06

Alex Tabarrok looks at the Chilean “Cybersyn” project:

Cybersyn was a project of the socialist government of Salvador Allende (1970-1973) and British cybernetic visionary Stafford Beer; its goal was to control the Chilean economy in real-time using computers and “cybernetic principles.” The military regime that overthrew Allende dropped the project and probably for this reason when the project is periodically rediscovered it is often written about in a romantic tone as a revolutionary “socialist internet,” decades ahead of its time that was “destroyed” by the military because it was “too egalitarian” or because they didn’t understand it.

Although some sources at the time said the Chilean economy was “run by computer,” the project was in reality a bit of a joke, albeit a rather expensive one, and about the only thing about it that worked were the ordinary Western Union telex machines spread around the country. The IBM 360 two computers supposedly used to run the Chilean economy were IBM 360s (or machines on that order). These machines were no doubt very impressive to politicians and visionaries eager to use their technological might to control an economy [. . .] Today, our perspective will perhaps be somewhat different when we realize that these behemoths were far less powerful than an iPhone. Run an economy with an iPhone? Sorry, there is no app for that.

Cybersyn_stage

[. . .] The control room is like the bridge of the Starship Enterprise in another respect–both are stage sets. Nothing about the room is real, even the computer displays on the wall are simply hand drawn slides projected from the other side with Kodak carousels.

December 1, 2009

QotD: Nomenclature, 2.0

Filed under: Economics, Humour, Quotations — Tags: , , — Nicholas @ 13:28

Paused over lunch to roll through the Deadpool on TechCrunch, reading about expired internet companies. Been a while. Most had to do with “social media,” and most got millions of dollars to produce a novel way where X could connect Y with P using Z, and then: profit! The names of these companies makes me weep:

Zopo, Lefora, Meetro, Ning, Sinopio, CapaZoo, Joox, Foonz.

These are not businesses. These are characters in a pre-school TV show. I have a tough time imagining a hard-nosed venture capitalist saying Well, it’s an interesting idea you have, and on behalf of my group, we’re willing to invest $12 million in Shagafumoo.

James Lileks, Bleat, 2009-12-01

November 20, 2009

Thinking about the Singularity

Filed under: Science, Technology — Tags: , , , — Nicholas @ 09:17

For some of you, this will be old hat (ancient history, even). For lots of people, however, the notion of a technological Singularity will be new — and disturbing in a way that hokey woo-woo New Age 2012 Mayan calendars ending is not. Glenn Reynolds writes about it in the December issue of Popular Mechanics:

For some time now, futurists have been talking about a concept called the Singularity, a technological jump so big that society will be transformed. If they’re right, the Industrial Revolution — or even the development of agriculture or harnessing of fire — might seem like minor historical hiccups by comparison. The possibility is now seeming realistic enough that scientists and engineers are grappling with the implications — for good and ill.

When I spoke to technology pioneer and futurist Ray Kurzweil (who popularized the idea in his book The Singularity Is Near), he put it this way: “Within a quarter-century, nonbiological intelligence will match the range and subtlety of human intelligence. It will then soar past it.”

Even before we reach that point, Kurzweil and his peers foresee breathtaking advances. Scientists in Israel have developed tiny robots to crawl through blood vessels attacking cancers, and labs in the United States are working on similar technology. These robots will grow smaller and more capable. One day, intelligent nanorobots may be integrated into our bodies to clear arteries and rebuild failing organs, communicating with each other and the outside world via a “cloud” network. Tiny bots might attach themselves to neurons in the brain and add their processing power — and that of other computers in the cloud — to ours, giving us mental resources that would dwarf anything available now. By stimulating the optic, auditory or tactile nerves, such nanobots might be able to simulate vision, hearing or touch, providing “augmented reality” overlays identifying street names, helping with face recognition or telling us how to repair things we’ve never seen before.

Of course, there are some very scary scenarios as well: you think it’s bad when your email address or bank information gets hacked? How much worse will it be when you’re wearing your immersive technology 24/7? And how much worse again when you’re not wearing it at all, but have it embedded in your body? Being “hacked” then becomes life endangering, not just inconvenient. Charles Stross has written a few books exploring different possible futures (particularly Glasshouse and Halting State, both excellent and highly recommended novels, BTW), and it’s just possible that he’s being too optimistic.

Destructive technologies generally seem to come along sooner than constructive ones — we got war rockets before missile interceptors, and biological warfare before antibiotics. This suggests that there will be a window of vulnerability between the time when we develop technologies that can do dangerous things, and the time when we can protect against those dangers. The slower we move, the longer that window may remain open, leaving more time for the evil, the unscrupulous or the careless to wreak havoc. My conclusion? Faster, please.

October 22, 2009

Instant reactions to Windows 7

Filed under: Technology — Tags: , , — Nicholas @ 07:31

The Register polled their readers about their out-of-the-box experiences with the new Microsoft operating system:

Microsoft takes the wraps off Windows 7 tonight, but thanks to the UK’s looming postal strike Reg readers have been playing with the final, shrink-wrapped product for days.

So before you go out and spend money on the new OS and/or a new PC, you might be interested in our what ad hoc panel of real readers has to say.

First up is Gary, who says installation took a blisteringly fast 30 minutes “end-to-end from removal of shrink wrap and checking what was left in situ”. And what was left in situ? Everything, apparently.

Phil, a self-confessed Linux fan, was more restrained, but after upgrading Vista on a work laptop, declared: “I’m fairly impressed really.”

Installation was not as quick for him as Gary, taking over three hours. Phil doesn’t mention any problems with the shrinkwrap, so we presume it was the installation process itself that slowed things up.

Not quite the adoration Microsoft’s marketing department would have liked, but Register readers are a tough crowd . . . this is high praise from them.

October 10, 2009

Passwords and the average user

Filed under: Humour, Technology — Tags: , , , , — Nicholas @ 11:22

In this day of widely publicized panic about online security, it’s time we revisited the basics of password security. I’m sure that none of you reading this would ever have a less-than-ironclad routine for all your online activities:

  1. Never ever use the same password on multiple sites. Once they’ve grabbed for login for the MyLittlePony site, they’re into your bank account . . . or worse, your MyLittlePonyDoesDallas account.
  2. Always use the maximum number of characters allowed . . . I know it’s a pain when a site allows 1024 characters, but your online security is paramount. I believe most health insurance now covers carpal tunnel treatment, so you’re golden.
  3. Never include any word — in any human language — embedded within your password: this includes all the words in the Scrabble® dictionary for every known language. Can’t assume that the black hats speak English, y’know.
  4. Always use both capital and lower-case letters and include at least a single digit and a non-letter character in every password.
  5. Note: Don’t try to be clever and use 1337speak. The folks trying to crack your password all post on 4chan: you’re giving them a head-start. They dream in 1337.

  6. Change your password regularly. Daily, if necessary. Even hourly if you share a computer with others.
  7. Never, ever write your password down. That’s the first thing they’ll look for when they break down your door and trash your crib.
  8. Never, ever re-use a password. Don’t pretend you haven’t done this one. We all used to do it, until site admins started checking that you hadn’t re-used an old password.

Of course, even the professionals don’t do all of this. Some of ’em don’t do any of it. Do like the pros do: set all your passwords to “passw0rd”. Nobody ever guesses that.

For actual password advice that might be helpful, you can try this post on the Gmail Blog.

September 21, 2009

Come on, Microsoft!

Filed under: Technology — Tags: , , — Nicholas @ 14:56

I’ve discovered the guaranteed no-fail, works-every-time method to lock up your Vista laptop. It’s kind of complicated, so follow along carefully with these intricate and unlikely-to-occur-in-ordinary-use steps:

  1. Open Windows Explorer.
  2. Select a file.
  3. Right-click the file and select Rename from the context menu.
  4. Profit?

Yes, that arduous and complicated set of steps — that nobody would ever discover during normal use — are enough to consistently lock up my laptop. Lock up tight enough that recovery requires removing the battery to force the machine to power down.

September 13, 2009

A primer on how to manage geeks

Filed under: Bureaucracy — Tags: , — Nicholas @ 12:49

Jeff Ello looks at the problem non-geeks have when they need to manage geeks in the workplace:

I can sum up every article, book and column written by notable management experts about managing IT in two sentences: “Geeks are smart and creative, but they are also egocentric, antisocial, managerially and business-challenged, victim-prone, bullheaded and credit-whoring. To overcome these intractable behavioral deficits you must do X, Y and Z.”

X, Y and Z are variable and usually contradictory between one expert and the next, but the patronizing stereotypes remain constant. I’m not entirely sure that is helpful. So, using the familiar brush, allow me to paint a different picture of those IT pros buried somewhere in your organization.

I’m often amused (and sometimes alarmed) by the ways companies handle and mis-handle their technical staff. It’s surprising how often the blatant levels of distrust and disrespect non-technical managers display when working with technical staff. He’s quite correct here:

Few people notice this, but for IT groups respect is the currency of the realm. IT pros do not squander this currency. Those whom they do not believe are worthy of their respect might instead be treated to professional courtesy, a friendly demeanor or the acceptance of authority. Gaining respect is not a matter of being the boss and has nothing to do with being likeable or sociable; whether you talk, eat or smell right; or any measure that isn’t directly related to the work. The amount of respect an IT pro pays someone is a measure of how tolerable that person is when it comes to getting things done, including the elegance and practicality of his solutions and suggestions. IT pros always and without fail, quietly self-organize around those who make the work easier, while shunning those who make the work harder, independent of the organizational chart.

September 12, 2009

Grumble, mutter, frickin’ hard drives, grumble mutter

Filed under: Technology — Tags: — Nicholas @ 01:06

So . . . I finally get the desktop back from the shop. Another dead hard drive. Oddly enough, another Seagate. You’d think by dead drive #4, I’d start to notice a pattern, wouldn’t you?

Yep. After the old Seagate 120Gb drive died, which was neither unexpected nor particularly traumatic — because I had backups that worked — I just disconnected it and carried on . . . no point in powering a dead drive. It had had a long and useful life as the primary drive in my previous desktop, so it had paid its dues.

The two 320Gb Seagate Free Agent drives having MTBF measured in tens of hours was depressing, but oh well. It’s not like either one of them lasted long enough to actually be, you know, useful or anything.

The fricking Seagate 500Gb primary backup drive crapping out after just over a year was more than a bit disappointing. It was the drive I’d been using for backups and for local storage of infrequently needed things (photos, old documents, scans, etc.). Not everything on the drive had made its way to other media, of course. Some documents lost, some scans I’ll have to re-do, and so on.

So, today’s to-do list includes picking up a 2-bay drive enclosure with an Ethernet port, and a matching pair of big hard drives to put in it. RAID-1, here I come.

Update: I’m now waiting for the pair of 1Tb hard drives to be formatted for RAID-1. Advice from Chris Taylor, Andre B., and Dark Water Muse was much appreciated, thanks guys. I ended up buying a D-Link DNS-323 for the enclosure, and a pair of Hitachi SATA drives. I’d have preferred the Western Digital Green equivalents, but they were out of stock, and I wanted to get this up and running today.

« Newer PostsOlder Posts »

Powered by WordPress