Quotulatiousness

October 30, 2010

Another way to exasperate your customers

Filed under: Technology — Tags: , , , — Nicholas @ 10:12

Clive sent me a snippet from Thom Hogan’s Nikon Field Guide (no direct linking to the article, apparently):

I’ve never been a big fan of complicated DRM systems, and I’m not sure that they actually work to prevent real theft of software any better than loose or no systems do. This argument started back in the 70’s. I remember having a conversation with Seymour Rubenstein about DRM vis-a-vis WordStar (Seymour was the founder and owner of MicroPro, the producers of WordStar). Seymour’s take was that you couldn’t prevent illegal copying and that some of that illegal copying eventually led to sales that you wouldn’t have otherwise gotten (usually at an update cycle back then, as we didn’t have the Internet to provide instant access). My own experience with DRM in Silicon Valley was similar. Indeed, I’d say that all heavy-handed DRM does is increase your Customer Support costs. But all this just masks the real problem: Nikon’s software costs too much, does too little, and is poorly updated and maintained. So adding tight DRM to the product just pisses the customer off even more when they get hit with it incorrectly.

August 20, 2010

“C will not only let you shoot yourself in the foot, it will hand you a new magazine when you run out of bullets”

Filed under: History, Technology — Tags: , , — Nicholas @ 21:28

Charles Stross enumerates some of the ways “we went wrong” in the rush to today’s computing world:

According to one estimate pushed by the FBI in 2006, computer crime costs US businesses $67 billion a year. And identity fraud in the US allegedly hit $52.6Bn in 2004.

Even allowing for self-serving reporting (the FBI would obviously find it useful to inflate the threat of crime, if only to justify their budget requests), that’s a lot of money being pumped down a rat-hole. Extrapolate it worldwide and the figures are horrendous — probably nearer to $300Bn a year. To put it in perspective, it’s like the combined revenue (not profits; gross turnover) of Intel, Microsoft, Apple, and IBM — and probably a few left-overs like HP and Dell — being lost due to deliberate criminal activity.

Where does this parasitic drag come from? Where did we go wrong?

I’m compiling a little list, of architectural sins of the founders (between 1945 and 1990, more or less) that have bequeathed us the current mess. They’re fundamental design errors in our computing architectures; their emergent side-effects have permitted the current wave of computer crime to happen . . .

I make it a rule never to believe the order of magnitude claimed by a self-interested party about how much money is “lost” because of their current hobby-horse mopery and dopery. Even if the amount claimed by the FBI is off by an order of magnitude, that’s still serious money.

May 21, 2010

More detail on Guild Wars 2 Dynamic Events

Filed under: Gaming — Tags: , , — Nicholas @ 12:22

For gaming geeks, this will probably be of interest. For everyone else, maybe not. I’ll put it under the fold so it won’t cause too much distress for non-gaming readers.

(more…)

May 18, 2010

An end to stereotypical MMO “questing”?

Filed under: Gaming, Technology — Tags: , , — Nicholas @ 12:45

An interesting article at IncGamers looks at some of the implications of the recently announced design decisions in Guild Wars 2:

An event in the area/world will cause new events to become available depending on the actions of the players.

For those of you who have played various MMOs you’ll know that the general flow of a quest is this:

Go to quest giver → collect quest → kill x amount of y critter, who is minding it’s own business in a field a good journey away from the quest giver → return to quest giver and collect reward, usually ignoring the small novel worth of text.

And after umpteen levels of this you can understand why people cringe at the thought of having to level a new character up to max. At least in WAR you could almost completely ignore PvE and level up by bashing the opposing realm’s skulls in.

Now with GW2 we’ll hopefully start to see a step away from the standard quest model and towards one that actually feels like you’ve had an impact on the world. Example:

I could be exploring an find a floating crystal. Me being me I decide to poke it with a stick. This causes the crystal to release the monsters it was holding, which begin to attack the nearby village. Depending on how successful this is the village will either survive or be destroyed (until it is rebuilt) and from that a new line of quests will appear.

As I’ve mentioned before, I’m quite interested in the innovations the folks on the development and content teams are working on, and I really do hope they can pull it off: it’ll be much more compelling than the current standard.

May 12, 2010

Dynamic events in Guild Wars 2

Filed under: Gaming, Technology — Tags: , , — Nicholas @ 13:43

Reading through this article by GW2 Lead Content Designer Colin Johanson shows that the game is going to be significantly different from other MMOs:

When building an MMO, we had to examine every core piece of accepted content from traditional games in the genre and ask, “How can this be improved?” By looking at the traditional quest system used in basically every MMO ever made, we’ve come to the conclusion that quests have a lot of areas for improvement. To address these flaws, we’ve developed our dynamic event system.

[. . .]

In Guild Wars 2, our event system won’t make you read a huge quest description to find out what’s going on. You’ll experience it by seeing and hearing things in the world. If a dragon is attacking, you won’t read three paragraphs telling you about it, you’ll see buildings exploding in giant balls of fire, and hear characters in the game world screaming about a dragon attack. You’ll hear guards from nearby cities trying to recruit players to go help fight the dragon, and see huge clouds of smoke in the distance, rising from the village under siege.

[. . .]

In traditional MMOs, when a quest is completed it has no real effect on the game world. You receive your reward and then move on, looking for the next quest to do. The world appears no better or worse for your actions. In GW2, the outcome of every event will directly affect the game world around you. If an enemy dredge army is marching out of their main base, players will be asked to mobilize with their allies and help destroy the army. If the dredge army is defeated, other events will cascade out from there. Players will be able battle their way inside the dredge base, face off against their commander, rescue captured friendly troops being held in the dredge prisons, and even hold the captured base while fighting waves of dredge, who arrive from deep underground to try and take back their home.

This sounds great, and helps to explain why Guild Wars 2 has been so long in development: you can’t use off-the-shelf programming for something that hasn’t been done before.

I’m quite looking forward to the new game (the original Guild Wars has been my main online addiction for years), although I am concerned that the development team may be attempting to change too many things away from the MMORPG default models. The whole “the world changes based on player activity” thing could get quite messy — although it’ll certainly take away a lot of the “been there, done that, got the reward” feeling you can get in games of this type.

April 27, 2010

Further evidence that PowerPoint is the tool of Satan

Filed under: Bureaucracy, Humour, Technology — Tags: , , , — Nicholas @ 17:09

DarkWater Muse sent me the following link, saying “Finally somebody who sympathizes with my long held views on PowerPoint”:

Gen. Stanley A. McChrystal, the leader of American and NATO forces in Afghanistan, was shown a PowerPoint slide in Kabul last summer that was meant to portray the complexity of American military strategy, but looked more like a bowl of spaghetti.

“When we understand that slide, we’ll have won the war,” General McChrystal dryly remarked, one of his advisers recalled, as the room erupted in laughter.

[. . .]

“PowerPoint makes us stupid,” Gen. James N. Mattis of the Marine Corps, the Joint Forces commander, said this month at a military conference in North Carolina. (He spoke without PowerPoint.) Brig. Gen. H. R. McMaster, who banned PowerPoint presentations when he led the successful effort to secure the northern Iraqi city of Tal Afar in 2005, followed up at the same conference by likening PowerPoint to an internal threat.

“It’s dangerous because it can create the illusion of understanding and the illusion of control,” General McMaster said in a telephone interview afterward. “Some problems in the world are not bullet-izable.

[. . .]

Senior officers say the program does come in handy when the goal is not imparting information, as in briefings for reporters.

The news media sessions often last 25 minutes, with 5 minutes left at the end for questions from anyone still awake. Those types of PowerPoint presentations, Dr. Hammes said, are known as “hypnotizing chickens.”

One of the worst aspects of any PowerPoint presentation is that by the use of graphic tricks and pretty effects, serious flaws in actual content can be “handwaved over”. This is great for the presenter who doesn’t want to impart real information, but terrible for the victims audience. Bulleted lists are a useful device for summarizing key ideas that don’t necessarily have a hard sequence or hierarchy, but they can also be used to imply illogical or inconsistent groupings of concepts or facts, especially when the eye (and the mind) is being entranced by whizzy tricks.

To paraphrase Sir Humphrey Appleby, “a good Civil Servant must be able to use PowerPoint not as a window into the mind but as a curtain to draw across it.”

I’ve sounded the warning call about the evil incarnate that is PowerPoint before. Do have a look at the (yes, I recognize the irony) slideshow here.

Update, 30 April: PowerPoint badges for your BDUs.

Tech-clueless in Toronto

Filed under: Humour, Technology — Tags: , , — Nicholas @ 11:08

I received the following rant from a reader who is experiencing some, um, technical challenges in his job. Not technical challenges for himself: boss and co-worker foundering under the foaming, rushing waters of technology:

They are going to drive me absolutely insane.

Did you know … that you can select the program with which to open a file by right-clicking on the file and selecting Open With…?

DID YOU KNOW THAT?!

That is the MOST AMAZING THING EVER, according to the oldsters. These guys could not figure out how to open a text file that has an extension other than .TXT. I showed them the Open With… twiddlebit, and now Head Oldster is busy adding the procedure to our internal style guide.

Gobsmacked with heartbroken outrage, I said “Dude. Anyone who has used Windows for any amount of time will know that. You don’t have to put it into our style guide.”

To which he responded: “I have been doing this for 20 years, and this is the first time I’ve heard of this. So it should be documented.”

I don’t know how much longer I can work here.

And to top if off, BOTH OF THEM are constantly getting calls from headhunters and former employers who want them back as contractors. How is that possible? Head Oldster can generally get through the day, but The New Guy — Judas on a Vespa with Cheese and Peppers. Watching him navigate through FrameMaker is like watching Stephen Hawking type out A Brief History of Time character-by-character with his eyeballs, minus the genius part of it.

The guy struggles to find the SAME FUNCTIONS THAT HE USES EVERY DAY in the menus. How can he possibly beswamped with job offers? IS THE ECONOMY DOING THAT WELL?

Crickey.

I have to admit, reading this rant made me feel better about my own work . . .

April 26, 2010

McAfee’s tech problem resolved: image problem will take much longer

Filed under: Technology — Tags: , , , — Nicholas @ 08:43

After the technical disaster of an anti-virus company releasing an update that shut down many of their customers’ computers, McAfee now has to cope with the public relations disaster:

After dealing with McAfee’s most recent fix that sabotaged Windows XP PC clients worldwide, users of the antivirus software headed over to Twitter to vent their rage, creating a public-relations and legal nightmare that will likely continue long after the last machine is patched.

“I hate McAfee,” more than one Tweeter wrote, summing up the frustration felt when a McAfee update identified a “normal Windows process” as malware and killed it, kicking off a death spiral for the affected machines.

Another Tweet: “McAfee DAT 5958, you’ve made…no wait, what’s the opposite of “made my day”?… you’ve DESTROYED MY DAY. hate you McAfee. HAAATEEEEE.”

“VirusScan,” another person Tweeted. “The cure is worse than the disease.”

I was fortunate, as fellow blogger William P. alerted me to the issue and I got home and turned off McAfee automatic updating before my desktop machine loaded the poison update.

April 20, 2010

25 years on, the “Hackers” bestride the globe

Filed under: History, Technology — Tags: , , , , — Nicholas @ 07:34

Steven Levy revisits some of the people he profiled in his book Hackers, back in the Pre-Cambrian period of the geek revolution:

“It’s funny in a way”, says Bill Gates, relaxing in an armchair in his office. “When I was young, I didn’t know any old people. When we did the microprocessor revolution, there was nobody old, nobody. It’s weird how old this industry has become.” The Microsoft cofounder and I, a couple of fiftysomething codgers, are following up on an interview I had with a tousle-headed Gates more than a quarter century ago. I was trying to capture what I thought was the red-hot core of the then-burgeoning computer revolution — the scarily obsessive, absurdly brainy, and endlessly inventive people known as hackers. Back then, Gates had just pulled off a deal to supply his DOS operating system to IBM. His name was not yet a household word; even Word was not yet a household word. I would interview Gates many times over the years, but that first conversation was special. I saw his passion for computers as a matter of historic import. Gates himself saw my reverence as an intriguing novelty. But by then I was convinced that I was documenting a movement that would affect everybody.

The book I was writing, Hackers: Heroes of the Computer Revolution, came out just over 25 years ago, in the waning days of 1984. My editor had urged me to be ambitious, and so I shot high, crafting a 450-page narrative in three parts, making the case that hackers — brilliant programmers who discovered worlds of possibility within the coded confines of a computer — were the key players in a sweeping digital transformation.

I hadn’t expected to reach that conclusion. When I embarked on my project, I thought of hackers as little more than an interesting subculture. But as I researched them, I found that their playfulness, as well as their blithe disregard for what others said was impossible, led to the breakthroughs that would define the computing experience for millions of people.

I must have read Hackers during my first or second semester in college, as I tried to figure out how to get out of the series of dead-end jobs I’d had since leaving school. I found strong echoes of many of the characters Levy portrayed in the people I encountered in my first few “high tech” jobs, although I don’t think any of them have managed to become billionaires yet.

April 16, 2010

QotD: Blog Post EULA

Filed under: Humour, Law, Quotations, Technology — Tags: , , , — Nicholas @ 09:05

READ CAREFULLY. By reading this blog post, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies (“BOGUS AGREEMENTS”) that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer.

Cory Doctorow, “Video-game shoppers surrender their immortal souls”, BoingBoing, 2010-04-16

March 30, 2010

The US Army’s love affair with Apple

Filed under: Military, Technology — Tags: , , , — Nicholas @ 07:41

The US Army, like every army since the dawn of history, can be a slow-moving, ponderous, and hidebound organization. Surprisingly, it’s not always behind the times:

The U.S. Army is getting very tight with the Apple Corporation, mainly because soldiers have long been enthusiastic users of Apple products (iPod and iPhone, and probably iPad as well). But Apple has tight control over what software can be used on these devices, so the military needs a close relationship with Apple just to get their custom military software on the iPods, iPhones and iPads the troops are so enthusiastic about.

This relationship enabled the army to recently run a programming contest for troops and civilian employees. The goal was to create the most effective smart phone software for the troops. Mainly, this was for the iPhones (and iPod Touch), but also for other smart phones like the Google Android. The army believes their military and civilian personnel know what applications are most needed. The troops have already decided what hardware they most need, because they have been buying iPods and iPhones with their own money.

The army sees these portable devices as key battlefield devices. Not just for communication, but for a wide range of data handling (computer) chores. The army wants to work closely with Apple to ensure the troops get the software need, as well as customized hardware. Details are largely kept secret.

[. . .]

The Touch has become the new “most favorite gadget” for the troops. It’s cheap (under $200), has the same interface as the iPhone, has several hundred thousand programs (and growing rapidly) available, and can also serve as an iPod (to listen to music or view vids). What the military sees the Touch as is the PDA (Personal Digital Assistant) that has often (in many different models) been issued over the years, but never really caught on. The Touch has caught on, and it does the job better than any earlier PDA. The Touch also has wi-fi built in, making it easier for the troops to get new software or data onto their Touch.

For use in the combat zone, troops usually put one of the many protective covers on their Touch, and, so far, the Touch has held up well under battlefield conditions. Meanwhile, some of the software written for earlier iPods, is now available for the Touch. This includes the VCommunicator Mobile software and libraries. This system translates English phrases into many foreign languages. Each language takes up four gigabytes per language, so they easily fit on the Touch. The software displays graphics, showing either the phrase in Arabic, or a video of a soldier making the appropriate hand gesture (there are a lot of those in Arabic), and this looks great on the Touch. There are collections of phrases for specific situations, like checkpoint, raid or patrol. You can use any accessory made for the iPod, like larger displays or megaphones.

March 15, 2010

Minor irritations

Filed under: Administrivia, Technology — Tags: , , — Nicholas @ 11:49

I realize it’s a positive sign that all I’ve got to complain about is a trivial thing, but damn it’s annoying.

“It”, specifically, is the latest update to Firefox (now at version 3.6). There’s now a problem with my mouse scrolling wheel in Firefox, but only in my Rogers/Yahoo webmail client. You don’t realize how often you use a feature until it stops working unexpectedly. I noticed it on my desktop last week, but didn’t directly attribute it to Firefox until this morning when I updated the browser on my laptop and it started displaying the same symptoms (also, YouTube videos lose their sound, but that’s only on the laptop).

March 10, 2010

There goes another slice of office productivity

Filed under: Gaming — Tags: , — Nicholas @ 09:39

Matt Peckham looks at a new “office productivity suite” which is sure to be popular in certain work-averse environments:

Pilot a spaceship, paddle a ball, even play horizontal Tetris, all while crafting reports, cutting costs, and scanning monthly performance charts…or at least appearing to. It’s the latest way to avoid work while looking like you’re furiously engaged in it.

The brainchild of four developers from the Netherlands, CantYouSeeImBusy.com teases a collection of free Flash-based mini games that let you slack off, chameleon-like, by adopting the form of an office productivity suite. Each one opens like a full-screen pop-up and offers a panic button that’s smarter than the average escape hatch: Tap the space bar and the “game” elements vanish, leaving just the “productivity” features in place.

“Let’s face it, we all want to relax every now and then, but still want to appear professional or busy!” reads the site intro. “That’s why all the games at CantYouSeeImBusy.com are designed in a way that nobody can see that you’re gaming. In fact, your boss and colleagues will think that you’re working harder than ever before.”

February 21, 2010

It sounds like the correct answer to the legal question

Filed under: Law, Railways, Technology — Tags: , , , — Nicholas @ 19:07

It’s surprising that a dispute over the use of open source software in a model railway application would be the one to set the legal precedent, but that is what happened here:

Although some people viewed it as a tempest in a teapot, the long-running legal case Jacobsen v. Katzer stirred up some seminal open source issues. We first reported on the dust-up all the way back in August of 2008, noting that the dispute centered around — of all things — model train software.

Specifically, Jacobsen had developed JMRI, the Java Model Railroad Interface project. When Katzer built the code for the project into proprietary model train software, deleting existing copyright notices within the code, Jacobsen filed suit. Now, settlement documents are available online, and the end of the dispute points to a final victory for open source licenses.

The settlement documents show that Katzer will pay Jacobsen $100,000 over 18 months, cease using the JMRI code, and not attempt to register domains using the JMRI name. Previously, the legal dispute had gone all the way to the United States Court of Appeals for the Federal Circuit, which is the last legal stop before the Supreme Court. As Lawrence Lessig noted in a post, when the Court of Appeals upheld the Artistic License that governed the use of JMRI, it was “an important victory” for free licenses. Lessig noted that the decision had broad implications for many open source licenses.

Just because someone allows the use of source code freely does not mean you can, in effect, file off the serial numbers and pretend that it’s all your own work . . .

H/T to Craig Zeni for the link.

July 22, 2009

Hurrah for Alex Nolan

Filed under: Technology — Tags: , , — Nicholas @ 18:33

I’ve had a bunch of Microsoft Access database files kicking around for the last several months, but due to version incompatibilities, I’ve been unable to open them. I didn’t want to buy a license for the program, just to pull my data out, so I’d looked for alternative ways to free my data from the proprietary clutches of Access.

I’d tried using Open Office, which includes a database program, but ran into the consequences of my own bad planning: Base (the OOo database component) could open Access files, but couldn’t do anything useful with them if they didn’t have a primary key. Most of my files were pretty basic flat files with a single table, so I’d never bothered to add a primary key (yes, I know: bad database practice).

Base would also let me export individual tables or queries to Calc (the spreadsheet component), but the process seemed pretty dicey — it locked up on me three times as I tried to save a new Calc spreadsheet as a .CSV file. I wasn’t comfortable that all the data in the table had been properly captured in the output, either.

Enter Mr. Nolan’s neat little MDB Viewer Plus utility (downloadable from here). It’s just a simple viewer for Microsoft Access files, but it worked a treat on extracting the tables I needed out of the proprietary MDB format to a .CSV I can import into something else (after this experience, something open source by preference).

Update: Aagh! Not quite as clean as I first thought. It appears that any date that has a value of greater than 12 for the day has been dropped. I wonder if this is an artifact of the difference between British and American usage (D/M/Y versus M/D/Y). Data normalization looks to be a lengthy task after all.

« Newer Posts

Powered by WordPress