Quotulatiousness

May 8, 2019

Your electronic devices and the Canadian Border Services Agency

Filed under: Cancon, Law, Liberty, Technology — Tags: , , , , , , — Nicholas @ 03:00

A few years ago, many civil libertarians were upset that the US government allowed warrantless searches of electronic devices at the border, but it was less well known that the Canadian Border Services Agency does the same at the Canadian border:

According to the CBSA, it has the right to search electronic devices at the border for evidence of customs-related offences — without a warrant — just as it does with luggage.

If travellers refuse to provide their passwords, officers can seize their devices.

The CBSA said that between November 2017 and March 2019, 19,515 travellers had their digital devices examined, which represents 0.015 per cent of all cross-border travellers during that period.

During 38 per cent of those searches, officers uncovered evidence of a customs-related offence — which can include possessing prohibited material or undeclared goods, and money laundering, said the agency.

While the laws governing CBSA searches have existed for decades, applying them to digital devices has sparked concern in an era where many travellers carry smartphones full of personal and sometimes very sensitive data.

A growing number of lawyers across Canada argue that warrantless digital device searches at the border are unconstitutional, and the practice should be stopped or at least limited.

“The policy of the CBSA of searching devices isn’t something that is justifiable in a free and democratic society,” said Wright who ran as a Green Party candidate in the 2015 federal election.

“It’s appalling, it’s shocking, and I hope that government, government agencies and the courts, and individual citizens will inform themselves and take action.”

March 19, 2019

The dangers of over-relying on new technology

Filed under: Cancon, Military, Technology — Tags: — Nicholas @ 03:00

Ted Campbell discusses one of the potential problems when military organizations depend too much on new tech working as advertised by the developer:

I have been a constant critic, in these pages, and in other fora, of the Canadian military’s command and control (C²) superstructure. I believe it is overly complex and bureaucratic, too top heavy and it is ‘fat,’ even, I have said, morbidly obese. I think Canada has far, far too many admirals and generals, almost all (except for, perhaps, a half dozen, at most) being one or two ranks higher than is needed for the job they do, in too many headquarters that do little of value except talk to at each other. I believe our C² has more do do with trying to emulate our (equally grossly obese) neighbour to the south than with meeting the needs of Canada.

The solution to the C² obesity problem is about 99% political … it needs a minister who will direct the Chief of the Defence Staff to chop something between ⅓ and ½ of the admirals and generals and commodores and Navy captains and Army and Air Force colonels and many of the HQs in which they sit. Of course that will require a massive (and overdue) revision to the entire military remuneration system so that admirals and colonels and corporals and privates, too, all get paid, appropriately well, for what they do for Canada. That needs to be agreed, by the prime minister, before the Minister of National Defence orders give the order to “chop.”

But that’s the top level problem and I have, I think, ranted on enough about it … my readers will either agree or not.

I believe, as I said the other day, that there is also a serious problem at the operational and tactical levels of the military, and it involves more than just command and control (C²), it involves the command, control and communications (C³) systems and, especially, the degree to which they are reliant on modern electronics and, especially, yet again, the electro-magnetic spectrum to establish a global information network upon which the military is nearly totally reliant. When, not if, “nearly totally reliant” becomes over-reliant, as I believe is now the case, and is most pronounced, the military sometimes uses the acronym C4I, meaning command, control, communications, computers and intelligence or worse, C4I2 which means command, control, communications, computers, intelligence and interoperability according to the US Department of Defense Dictionary of Military and Associated Terms. The mere fact that we seem to want to assign fancy acronyms to a few aluminium and plastic boxes full of solid sate circuits seems to me to indicate that we don’t actually understand that, beneath the blinking lights and flashy displays is a process than, in many respects, is little changed from what we did 75 years ago. The need to manage and handle information is unchanged, the technology we can use to do those things has changed.*

The problem, as I see it, is that the modern military is fascinated with what technology can do ~ and it can do a lot of really useful things ~ but are less willing to understand its limitations.

Don’t get me wrong: I think computers are wonderful; they make many mundane but time consuming tasks easy to accomplish in the blink of an eye. Ditto for radios and radars which seem to erase distance as show us things that used to be invisible. But all technology comes at a price … sometimes, as in the world of electronic warfare (EW), the price is fairly easy to understand: if you say anything on your radio then a modestly sophisticated enemy can, quickly and accurately, locate your exact position and send artillery or sir strikes your way; or the enemy can ‘spoof’ your communications networks, feeding false information into it and spreading confusion. The enemy can, also, use the radio spectrum to gain access to (hack) your computer network and make you deceive yourself. Or the threats may be physical, like the anti-satellite networks, such as the Chinese are developing, which according to Lieutenant General Jay Raymond of the United Stares Air Force, mean that “soon every satellite in every orbit will be able to be held at risk.” Our, Canadian and allied, national surveillance and air defence systems use satellite networks as do our strategic command and control (C²) networks which manage Canada’s armed forces at home and overseas. Even the most modern “networked” systems might be rendered deaf and blind.

February 17, 2019

QotD: Nanotechnology and quantum computing

When I say Quantum Computing is a bullshit field, I don’t mean everything in the field is bullshit, though to first order, this appears to be approximately true. I don’t have a mathematical proof that Quantum Computing isn’t at least theoretically possible. I also do not have a mathematical proof that we can make the artificial bacteria of K. Eric Drexler’s nanotech fantasies. Yet, I know both fields are bullshit. Both fields involve forming new kinds of matter that we haven’t the slightest idea how to construct. Neither field has a sane ‘first step’ to make their large claims true.

Drexler and the “nanotechnologists” who followed him, they assume because we know about the Schroedinger equation we can make artificial forms of life out of arbitrary forms of matter. This is nonsense; nobody understands enough about matter in detail or life in particular to do this. There are also reasonable thermodynamic, chemical and physical arguments against this sort of thing. I have opined on this at length, and at this point, I am so obviously correct on the nanotech front, there is nobody left to argue with me. A generation of people who probably would have made first rate chemists or materials scientists wasted their early, creative careers following this over hyped and completely worthless woo. Billions of dollars squandered down a rat hole of rubbish and wishful thinking. Legal wankers wrote legal reviews of regulatory regimes to protect us from this nonexistent technology. We even had congressional hearings on this nonsense topic back in 2003 and again in 2005 (and probably some other times I forgot about). Russians built a nanotech park to cash in on the nanopocalyptic trillion dollar nanotech economy which was supposed to happen by now.

Similarly, “quantum computing” enthusiasts expect you to overlook the fact that they haven’t a clue as to how to build and manipulate quantum coherent forms of matter necessary to achieve quantum computation. A quantum computer capable of truly factoring the number 21 is missing in action. In fact, the factoring of the number 15 into 3 and 5 is a bit of a parlour trick, as they design the experiment while knowing the answer, thus leaving out the gates required if we didn’t know how to factor 15. The actual number of gates needed to factor a n-bit number is 72 * n^3; so for 15, it’s 4 bits, 4608 gates; not happening any time soon.

It’s been almost 25 years since Peter Shor had his big idea, and we are no closer to factoring large numbers than we were … 15 years ago when we were also able to kinda sorta vaguely factor the number 15 using NMR ‘quantum computers.’

I had this conversation talking with a pal at … a nice restaurant near one of America’s great centers of learning. Our waiter was amazed and shared with us the fact that he had done a Ph.D. thesis on the subject of quantum computing. My pal was convinced by this that my skepticism is justified; in fact he accused me of arranging this. I didn’t, but am motivated to write to prevent future Ivy League Ph.D. level talent having to make a living by bringing a couple of finance nerds their steaks.

Scott Locklin, “Quantum computing as a field is obvious bullshit”, Locklin on Science, 2019-01-15.

January 23, 2019

The value of boredom

Filed under: Health, Liberty, Media, Technology — Tags: , , , — Nicholas @ 03:00

I must have missed this Quillette essay by Caroline ffiske when it was published earlier this month:

In their book The Coddling of the American Mind Jonathan Haidt and Greg Lukianoff wonder where it all went wrong. How did we get to a situation where so many of our kids see themselves as fragile victims, but at the same time throw their weight around, telling the rest of us what we are allowed to think and say and do? Haidt and Lukianoff have set up a website devoted to exploring the issue and finding solutions.

I have a suggestion. It hit me like a hammer blow when I read Joseph Brodsky’s essay “In Praise of Boredom.” This was delivered as a commencement address at Dartmouth College in July 1989. Here is the opening sentence: “A substantial part of what lies ahead of you is going to be claimed by boredom.” That’s right. Joseph Brodsky, winner of the Nobel Prize for literature in 1987, assumed that these Ivy League graduates, in common with the rest of humanity since the dawn of time would face hours of the psychological Sahara of boredom that “starts right in your bedroom and spurns the horizon.”

How could Brodsky have guessed that the young people he addressed in July 1989 would be the last Western generation to live alongside boredom: in their bedrooms, on the bus, at the end of the day, and in the morning? That now, when the tiniest tips of our little fingers feel the first twinges of tedium, while the elevator travels between ground and first, we reach for our screens to become masters of fate, captains of souls, kings of new continents.

Even the vocabulary of boredom is disappearing. Brodsky lists these: “anguish, ennui, tedium, doldrums, humdrum, the blahs, apathy, listlessness, stolidity, lethargy, languor, accidie, etc.” Most of those can be excised from the Dictionary. Tell me honestly when you last used any of them?

[…]

Why? Because boredom represents your window onto infinity. And that is to say, onto your own insignificance. “For boredom speaks the language of time, and it is to teach you the most valuable lesson in your life … the lesson of your utter insignificance.” Boredom puts your existence into perspective “the net result of which is precision and humility.” The more you learn about your own size “the more humble and compassionate you become to your likes.”

Is boredom the ingredient our “snowflake” generation is missing?

October 23, 2018

Quantum Computing – The World of the Future – Extra History – #6

Filed under: History, Science, Technology — Tags: , , — Nicholas @ 04:00

Extra Credits
Published on 21 Oct 2018

Credit to Alisa Bishop for her art on this series: http://www.alisabishop.com/

What does the quantum revolution mean today? We talk about quantum computing application possibilities in machine learning, cybersecurity, environmental science, and more.

A tremendous thank-you to Alexander Tamas, the “mystery patron” who made this series possible. We finally found room in our busy production schedule to create and air this series alongside our regularly scheduled, patron-approved Extra History videos. A huge thank you to the multiple guest artists we got to work with, to Matt Krol for his skillful wrangling of the production schedule and keeping everyone happy, and to our Patreon supporters for your patience and support.

Support us on Patreon! http://bit.ly/EHPatreon

October 17, 2018

Quantum Computing – Decoherence – Extra History – #5

Filed under: History, Science — Tags: , , — Nicholas @ 04:00

Extra Credits
Published on 14 Oct 2018

Credit to Alisa Bishop for her art on this series: http://www.alisabishop.com/

Quantum computing isn’t a replacement for classical computing … yet. Quantum decoherence happens when anything gets in the way of a qubit’s job, so sterile low-temperature environments are an absolute necessity.

A tremendous thank-you to Alexander Tamas, the “mystery patron” who made this series possible. We finally found room in our busy production schedule to create and air this series alongside our regularly scheduled, patron-approved Extra History videos. A huge thank you to the multiple guest artists we got to work with, to Matt Krol for his skillful wrangling of the production schedule and keeping everyone happy, and to our Patreon supporters for your patience and support.

Join us on Patreon! http://bit.ly/EHPatreon

October 10, 2018

Quantum Computing – Spooky Action at a Distance – Extra History – #4

Filed under: History, Science — Tags: , , — Nicholas @ 04:00

Extra Credits
Published on 7 Oct 2018

What happens when we can’t link physical cause and effect between two actions? Well, quantum bits (or qubits) do this all the time. Let’s look into how quantum entanglement can be used in computing.

Credit to Alisa Bishop for her art on this series: http://www.alisabishop.com/

A tremendous thank-you to Alexander Tamas, the “mystery patron” who made this series possible. We finally found room in our busy production schedule to create and air this series alongside our regularly scheduled, patron-approved Extra History videos. A huge thank you to the multiple guest artists we got to work with, to Matt Krol for his skillful wrangling of the production schedule and keeping everyone happy, and to our Patreon supporters for your patience and support.

Support us on Patreon! http://bit.ly/EHPatreon

QotD: The first time ESR changed the world

Filed under: Bureaucracy, History, Quotations, Technology — Tags: , , , — Nicholas @ 01:00

I think it was at the 1983 Usenix/UniForum conference (there is an outside possibility that I’m off by a year and it was ’84, which I will ignore in the remainder of this report). I was just a random young programmer then, sent to the conference as a reward by the company for which I was the house Unix guru at the time (my last regular job). More or less by chance, I walked into the meeting where the leaders of IETF were meeting to finalize the design of Internet DNS.

When I walked in, the crowd in that room was all set to approve a policy architecture that would have abolished the functional domains (.com, .net, .org, .mil, .gov) in favor of a purely geographic system. There’d be a .us domain, state-level ones under that, city and county and municipal ones under that, and hostnames some levels down. All very tidy and predictable, but I saw a problem.

I raised a hand tentatively. “Um,” I said, “what happens when people move?

There was a long, stunned pause. Then a very polite but intense argument broke out. Most of the room on one side, me and one other guy on the other.

OK, I can see you boggling out there, you in your world of laptops and smartphones and WiFi. You take for granted that computers are mobile. You may have one in your pocket right now. Dude, it was 1983. 1983. The personal computers of the day barely existed; they were primitive toys that serious programmers mostly looked down on, and not without reason. Connecting them to the nascent Internet would have been ludicrous, impossible; they lacked the processing power to handle it even if the hardware had existed, which it didn’t yet. Mainframes and minicomputers ruled the earth, stolidly immobile in glass-fronted rooms with raised floors.

So no, it wasn’t crazy that the entire top echelon of IETF could be blindsided with that question by a twentysomething smartaleck kid who happened to have bought one of the first three IBM PCs to reach the East Coast. The gist of my argument was that (a) people were gonna move, and (b) because we didn’t really know what the future would be like, we should be prescribing as much mechanism and as little policy as we could. That is, we shouldn’t try to kill off the functional domains, we should allow both functional and geographical ones to coexist and let the market sort out what it wanted. To their eternal credit, they didn’t kick me out of the room for being an asshole when I actually declaimed the phrase “Let a thousand flowers bloom!”.

[…]

The majority counter, at first, was basically “But that would be chaos!” They were right, of course. But I was right too. The logic of my position was unassailable, really, and people started coming around fairly quickly. It was all done in less than 90 minutes. And that’s why I like to joke that the domain-name gold rush and the ensuing bumptious anarchy in the Internet’s host-naming system is all my fault.

It’s not true, really. It isn’t enough that my argument was correct on the merits; for the outcome we got, the IETF had to be willing to let a n00b who’d never been part of their process upset their conceptual applecart at a meeting that I think was supposed to be mainly a formality ratifying decisions that had already been made in working papers. I give them much more credit for that than I’ll ever claim for being the n00b in question, and I’ve emphasized that every time I’ve told this story.

Eric S. Raymond, “Eminent Domains: The First Time I Changed History”, Armed and Dangerous, 2010-09-11.

October 8, 2018

QotD: The closed-source software dystopia we barely avoided

Filed under: Business, Quotations, Technology — Tags: , , , — Nicholas @ 01:00

Thought experiment: imagine a future in which everybody takes for granted that all software outside a few toy projects in academia will be closed source controlled by managerial elites, computers are unhackable sealed boxes, communications protocols are opaque and locked down, and any use of computer-assisted technology requires layers of permissions that (in effect) mean digital information flow is utterly controlled by those with political and legal master keys. What kind of society do you suppose eventually issues from that?

Remember Trusted Computing and Palladium and crypto-export restrictions? RMS and Linus Torvalds and John Gilmore and I and a few score other hackers aborted that future before it was born, by using our leverage as engineers and mentors of engineers to change the ground of debate. The entire hacker culture at the time was certainly less than 5% of the population, by orders of magnitude.

And we may have mainstreamed open source just in time. In an attempt to defend their failing business model, the MPAA/RIAA axis of evil spent years pushing for digital “rights” management so pervasively baked into personal-computer hardware by regulatory fiat that those would have become unhackable. Large closed-source software producers had no problem with this, as it would have scratched their backs too. In retrospect, I think it was only the creation of a pro-open-source constituency with lots of money and political clout that prevented this.

Did we bend the trajectory of society? Yes. Yes, I think we did. It wasn’t a given that we’d get a future in which any random person could have a website and a blog, you know. It wasn’t even given that we’d have an Internet that anyone could hook up to without permission. And I’m pretty sure that if the political class had understood the implications of what we were actually doing, they’d have insisted on more centralized control. ~For the public good and the children, don’t you know.~

So, yes, sometimes very tiny groups can change society in visibly large ways on a short timescale. I’ve been there when it was done; once or twice I’ve been the instrument of change myself.

Eric S. Raymond, “Engineering history”, Armed and Dangerous, 2010-09-12.

September 27, 2018

Mind Your Business #4: Free the Unikrn

Filed under: Gaming, Sports, Technology — Tags: , , — Nicholas @ 04:00

Foundation for Economic Education
Published on 25 Sep 2018

Forget about slot machines, the future of gaming is virtual reality! In this episode of Mind Your Business, Andrew Heaton is teaming up with entrepreneur Rahul Sood to learn all about esports, safe and legal online betting, and the global community that is surging behind organized competitive video gaming.

September 24, 2018

Verity Stob on early GUI experiences

Filed under: History, Technology — Tags: , , — Nicholas @ 05:00

“Verity Stob” began writing about technology issues three decades back. She reminisces about some things that have changed and others that are still irritatingly the same:

It’s 30 years since .EXE Magazine carried the first Stob column; this is its pearl Perl anniversary. Rereading article #1, a spoof self-tester in the Cosmo style, I was struck by how distant the world it invoked seemed. For example:

    Your program requires a disk to have been put in the floppy drive, but it hasn’t. What happens next?

The original answers, such as:

    e) the program crashes out into DOS, leaving dozens of files open

would now need to be supplemented by

    f) what’s ‘the floppy drive’ already, Grandma? And while you’re at it, what is DOS? Part of some sort of DOS and DON’TS list?

I say: sufficient excuse to present some Then and Now comparisons with those primordial days of programming, to show how much things have changed – or not.

1988: Drag-and-drop was a showy-offy but not-quite-satisfactory technology.

My first DnD encounter was by proxy. In about 1985 my then boss, a wise and cynical old Brummie engineer, attended a promotional demo, free wine and nibbles, of an exciting new WIMP technology called GEM. Part of the demo was to demonstrate the use of the on-screen trash icon for deleting files.

According to Graham’s gleeful report, he stuck up his hand at this point. “What happens if you drag the clock into the wastepaper basket?’

The answer turned out to be: the machine crashed hard on its arse, and it needed about 10 minutes embarrassed fiddling to coax it back onto its feet. At which point Graham’s arm went up again. “What happens if you drop the wastepaper basket into the clock?’

Drag-ons ‘n’ drag-offs

GEM may have been primitive, but it was at least consistent.

The point became moot a few months later, when Apple won a look-and-feel lawsuit and banned the GEM trashcan outright.

2018: Not that much has changed. Windows Explorer users: how often has your mouse finger proved insufficiently strong to grasp the file? And you have accidentally dropped the document you wanted into a deep thicket of nested server directories?

Or how about touch interface DnD on a phone, where your skimming pinkie exactly masks from view the dragged thing?

Well then.

However, I do confess admiration for this JavaScript library that aims to make a dragging and dropping accessible to the blind. Can’t fault its ambition.

September 13, 2018

Mind Your Business Ep. 2: Aceable in the Hole

Filed under: Business, Technology, USA — Tags: , , , , — Nicholas @ 04:00

Foundation for Economic Education
Published on 11 Sep 2018

Believe it or not, parallel parking is not an impossible task. Meet Blake Garrett, the entrepreneur who is using VR to teach people how to drive, without actually getting behind the wheel.
____________
Produced & Directed by Michael Angelo Zervos
Executive Produced by Sean W. Malone
Hosted by Andrew Heaton
Original Music by Ben B. Goss
Featuring Blake Garrett

August 16, 2018

In praise of Donald Knuth

Filed under: Books, History, Technology — Tags: , — Nicholas @ 03:00

David Warren sings the praises of the inventor of “TeX”:

Among my heroes in that trade is a man now octogenarian, a certain Donald Knuth, author of the multi-volumed Art of Computer Programming, and of the great mass of algorithms behind the “TeX” composing system. A life-long opponent of patenting for software, and still not on email, he is one of the finer products of the Whole Earth Catalogue mindset of that era, though as a devoted Christian, he had it from older sources. (The mindset of: forget politics and do-it-yerself.)

Perfesser Knuth’s life journey was somewhat altered when a publisher presented him with the galley proofs for a reissue of one of his earlier volumes. They were, compared to the pages of the original hot-metal edition, a dog’s breakfast. In particular, even when technically correct, the mathematical formulae appeared to have been set by monkeys. He resolved to “make the world a better place” by doing something about this.

Knowing (pronounce the “k” as we do in this author’s surname) that computers can do many things that humans can’t — or can’t within one lifetime — he set about designing the computer processes to calculate beautiful letter and word spacings, line-breaks, line spacings, marginal proportions and such. He understood that civilization depends on literacy, literacy on legibility, and legibility on elegance. Ruthlessly, he recognized that things like “widowed” and “orphaned” lines of text are moral evils, and discovered algorithms that could exterminate them by complex anticipation. Too, he contributed to the counter-revolution by which the letters themselves could be drawn not pixelated.

I will quickly lose my few remaining readers if I go into the details. But here was a man (and still is) who discerned that nature herself is built on aesthetic principles, which men can investigate and apply. It is when something is ugly that we can know that it is wrong. Mathematicians, like poets and other artists, can embody the Faith at the root of this.

To my mind, or I would rather say K-nowledge, there is nothing wrong with technology, per se. We can often do things better with new tools. But we must be guided by the uncompromising demands of Beauty. Everything must be made as beautiful as we can make it: there must be no wavering, no surrender. All that is ugly must be consigned to Hell.

June 5, 2018

The Internet-of-Things as “Moore’s Revenge”

Filed under: Technology — Tags: , , , — Nicholas @ 03:00

El Reg‘s Mark Pesce on the end of Moore’s Law and the start of Moore’s Revenge:

… the cost of making a device “smart” – whether that means, aware, intelligent, connected, or something else altogether – is now trivial. We’re therefore quickly transitioning from the Death of Moore’s Law into the era of Moore’s Revenge – where pretty much every manufactured object has a chip in it.

This is going to change the whole world, and it’s going to begin with a fundamental reorientation of IT, away from the “pinnacle” desktops and servers, toward the “smart dust” everywhere in the world: collecting data, providing services – and offering up a near infinity of attack surfaces. Dumb is often harder to hack than smart, but – as we saw last month in the Z-Wave attack that impacted hundreds of millions of devices – once you’ve got a way in, enormous damage can result.

The focus on security will produce new costs for businesses – and it will be on IT to ensure those costs don’t exceed the benefits of this massively chipped-and-connected world. It’ll be a close-run thing.

It’s also likely to be a world where nothing works precisely as planned. With so much autonomy embedded in our environment, the likelihood of unintended consequences amplifying into something unexpected becomes nearly guaranteed.

We may think the world is weird today, but once hundreds of billions of marginally intelligent and minimally autonomous systems start to have a go, that weirdness will begin to arc upwards exponentially.

May 12, 2018

QotD: Women in I.T.

Filed under: Business, Quotations — Tags: , , , — Nicholas @ 01:00

… any woman who wants to be in a STEM field should be able to get as far as talent, hard work, and desire to succeed will take her, without facing artificial barriers erected by prejudice or other factors. If there are women who dream of being in STEM but have felt themselves driven off that path, the system is failing them. And the system is failing itself, too; talent is not so common that we can afford to waste it.

Now I’m going to refocus on computing, because that’s what I know best and I think it exhibits the problems that keep women out of STEM fields in an extreme form. There’s a lot of political talk that the tiny and decreasing number of women in computing is a result of sexism and prejudice that has to be remedied with measures ranging from sensitivity training up through admission and hiring quotas. This talk is lazy, stupid, wrong, and prevents correct diagnosis of much more serious problems.

I don’t mean to deny that there is still prejudice against women lurking in dark corners of the field. But I’ve known dozens of women in computing who wouldn’t have been shy about telling me if they were running into it, and not one has ever reported it to me as a primary problem. The problems they did report were much worse. They centered on one thing: women, in general, are not willing to eat the kind of shit that men will swallow to work in this field.

Now let’s talk about death marches, mandatory uncompensated overtime, the beeper on the belt, and having no life. Men accept these conditions because they’re easily hooked into a monomaniacal, warrior-ethic way of thinking in which achievement of the mission is everything. Women, not so much. Much sooner than a man would, a woman will ask: “Why, exactly, am I putting up with this?”

Correspondingly, young women in computing-related majors show a tendency to tend to bail out that rises directly with their comprehension of what their working life is actually going to be like. Biology is directly implicated here. Women have short fertile periods, and even if they don’t consciously intend to have children their instincts tell them they don’t have the option young men do to piss away years hunting mammoths that aren’t there.

There are other issues, too, like female unwillingness to put up with working environments full of the shadow-autist types that gravitate to programming. But I think those are minor by comparison, too. If we really want to fix the problem of too few women in computing, we need to ask some much harder questions about how the field treats everyone in it.

Eric S. Raymond, “Women in computing: first, get the problem right”, Armed and Dangerous, 2010-07-15.

« Newer PostsOlder Posts »

Powered by WordPress