Quotulatiousness

May 1, 2013

Google Glass may not be evil, but it will enable lots of less-than-ethical activities

Filed under: Media, Technology — Tags: , , , , , — Nicholas @ 09:10

Jason Perlow on the current capabilities of Google Glass and the easy to envision upgrades that will soon be possible:

Because Glass is an Android device, runs an ARM-based Linux kernel, and can run Android user space programs and custom libraries, any savvy developer can create code that modifies the default behavior in such a way that recording can occur with no display activity showing in the eye prism whatsoever.

And while the default video recording is 10 seconds, code could also be written that begins and stops recording for as long as needed with a custom gesture or head movement, or even innocuous custom voice commands like: “Boy, I’m tired” to begin, and “Boy, I need coffee” to end it.

You could write and side load an application that polls the camera and takes a still photo every 30 seconds, should you say … want to “case” and thoroughly photodocument a place of business prior to committing a crime, or even engage in corporate espionage. Or simply capture ambient audio from unsuspecting people around you.

[. . .]

Once you have root on a Glass headset, any number of custom software packages could be installed without Google being able to prevent one from doing things that would make your hair stand on end, such as on-the-fly image and audio processing.

This is the kind of stuff that until now, only major intelligence agencies could do with very expensive surveillance equipment. Just wait until Israeli and Eastern European startups, which are staffed with former intelligence personnel who have a huge wealth of knowledge in using this kind of technology, get a hold of this thing.

April 22, 2013

Not news: nearly 90% of all spreadsheets have errors

Filed under: Business, Economics, Technology — Tags: , , — Nicholas @ 08:02

I’ve said it before, spreadsheets are great organizing tools and provide opportunities for both financial whizzes and ordinary folks to make splashy, expensive errors:

Microsoft Excel makes it easy for anyone to do the kind of number crunching once reserved for accountants and statisticians. But the world’s best-selling spreadsheet software has also contributed to the proliferation of bad math.

Close to 90% of spreadsheet documents contain errors, a 2008 analysis of multiple studies suggests. “Spreadsheets, even after careful development, contain errors in 1% or more of all formula cells,” writes Ray Panko, a professor of IT management at the University of Hawaii and an authority on bad spreadsheet practices. “In large spreadsheets with thousands of formulas, there will be dozens of undetected errors.”

Given that Microsoft says there are close to 1 billion Office users worldwide, “errors in spreadsheets are pandemic,” Panko says.

Such mistakes not only can lead to miscalculations in family budgets and distorted balance sheets at small businesses, but also might result in questionable rationales for global fiscal policy, as indicated by the case of a math error in a Harvard economics study. By failing to include certain spreadsheet cells in its calculations, the study by Harvard economists Carmen Reinhart and Kenneth Rogoff may have overstated the impact that debt burdens have on a nation’s economic growth.

There’s a reason I nominated Microsoft Excel as “The Most Dangerous Software on Earth“.

March 30, 2013

Looking at crowdfunding as a replacement for venture capital

Filed under: Business, Economics, Technology — Tags: , , , — Nicholas @ 07:43

ESR looks at where crowdfunding fits in the traditional tech start-up food chain:

In How crowdfunding and the JOBS Act will shape open source companies, Fred Trotter proposes that crowdfunding a la Kickstarter and IndieGoGo is going to displace venture capitalists as the normal engine of funding for open-source tech startups, and that this development will be a tremendous enabler. Trotter paints a rosy picture of idealistic geeks enabled to do fully open-source projects because they’ll no longer feel as pressed to offer a lucrative early exit to VCs on the promise of rent capture from proprietary technology.

Some of the early evidence from crowdfunding successes does seem to point at this kind of outcome, especially near 3D printing and consumer electronics with a lot of geek buy-in. And I’d love to believe all of Trotter’s optimism. But there’s a nagging problem of scale here that makes me think the actual consequences will be more mixed and messy than he suggests.

In general, VCs don’t want to talk to you at all unless they can see a good case for ploughing in at least $2 million, and they don’t get really interested below a scale of about $15M. This is because the amount of time required for them to babysit an investment (sit on the company’s board, assist job searches, etc.) doesn’t scale down for smaller investments — small plays are just as much work for much less money. This is why there’s a second class of investors, often called “angels”, who trade early financing on the $100K order of magnitude for equity. The normal trajectory of a startup goes from friends & family money through angels up to VCs. Each successive stage in this pipeline is generally placing a larger bet and accordingly has less risk tolerance and a higher time discount than the previous; VCs, in particular, will be looking for a fast cash-out via initial public offering.

The problem is this: it’s quite rare for crowdfunding to raise money even equivalent to the low-end threshold of a VC, let alone the volume they lay down when they’re willing to bet heavily. Unless crowdfunding becomes an order of magnitude more effective than it is now (which seems to me possible but unlikely) the financing source it will displace isn’t VCs but angels.

March 11, 2013

Chris Kluwe on the PR disaster that was the SimCity 5 launch

Filed under: Business, Gaming — Tags: , , , , — Nicholas @ 11:13

In addition to his “day job” as the punter for the Minnesota Vikings, and his public advocacy role in pushing for same-sex marriage, Chris Kluwe is also a gamer. In this latter persona, he was invited to review the new SimCity 5 release from EA games on behalf of PC Gamer. Business Insider had to bleep out a fair bit of raw Kluwe-ism in the aftermath:

Hi. I’m Chris. I’ve been playing SimCity ever since the Super Nintendo version, and I’ve always been a huge fan of the franchise (SimCity 3000 is my favorite). Thus, when PC Gamer came to me and said “Hey Chris! We want you to play the new SimCity 5 with us in our Celebrity SimCity region,” I wasted no time in responding with a resounding “Hell yeah!”

I mean, what could go wrong?

(Other than the inevitable giant lizards, meteor showers, and poor sewage planning that happen in every SimCity game)

[. . .]

At the time of writing this piece, SimCity 5 has been active for almost 62 hours. Of those 62 hours, I’ve been able to log in for around ten. Of those ten, four consisted of massive latency issues and corrupted games, so (quick calculation here), I’ve had access to the actual game for maybe 10 percent of the time I’ve had it. EA’s servers are, to put it bluntly, utterly bug[redacted], and there’s no option to play the game offline.

Therein lies the heart of my problem. SimCity is, at its heart, a single player game. Having access to other players’ cities is cool, but I want to build MY city, and I don’t want some [redacted], totally unnecessary “always on” DRM to keep me from playing the game (full disclosure: PC Gamer was kind enough to provide me with a download code for the game, so you can only imagine my rage levels if I had actually put money into EA’s pockets for this “experience”).

And now the math:

Sadly, EA seems to have failed to do some very simple math. Let’s look at an example. We’ll assume that for an amazingly successful game like SimCity, about 20,000 people will end up pirating it (those who have the technical knowhow and Internet savvy to find a working crack). I have 160,000 Twitter followers, of whom around 50,000 follow me for gaming. I just told those 50,000 people NOT to buy SimCity because EA cannot handle its s***, and the game is unplayable. We’ll say half those people listen to me and haven’t bought the game already. Soooo, carrying the pi, we see that EA is already out 5,000 more sales than if they had just created a normal, single player offline capable game with multiplayer components.

(Don’t forget, “always on” DRM also screws over people who don’t have access to Internet for large periods of time, like rural areas and travelers. More lost sales!)

In addition to the bad PR of a terrible launch experience, EA is also reportedly refusing to process refunds to purchasers despite having made this an explicit promise in their pre-release information package.

Best comment on the EU move to penalize Microsoft over web browser choice

Filed under: Europe, Humour, Law, Technology — Tags: , , , — Nicholas @ 09:06

From “Purp” at Ace of Spades H.Q.:

In other news, the EU plans to fine Microsoft $700M dollars because European users are apparently too stupid to figure out they can download other browsers for free. Porn and bootleg software? Mad skilz baby, mad skilz. Browsers? Not so much…huh? what? where am I? what is this thing, why does it beep? Help, I’ve fallen down and can’t get up.

The fine works out to around $50 for each machine in violation that was shipped by OEM’s. The EU says they’re cutting Microsoft a bargain cuz they could have been fined $7B, or $500/machine. Either way, its a pretty harsh shakedown caused by Euro-users (apparently) being lemming like incompetent imbeciles who are unaware other stuff exists. Its truly a wonder they manage to find the power switch…or maybe the EU sends out specially trained techs to turn on computers for people?

March 4, 2013

Admit it, you probably know someone who would wear this “ironically”

Filed under: Business, Technology — Tags: , , — Nicholas @ 09:20

Amazon Keep Calm and blank T-shirt

Pete Ashton explains how such an item appears on the Amazon.com website:

Nobody made, or approved, the design. This is the headfuck moment that most people can’t comprehend. There’s a completely understandable assumption that someone decided it would be a great idea to sell Keep Calm t-shirts with the word Rape on them and, because they exist (which they don’t, but let’s assume they do) that there’s a reasonable demand for them. This is because we’re used to there being a cost in producing a product like a t-shirt and an economic requirement to mass-produce them in huge numbers. If there’s a significant cost then a decision has to be made whether to spend it or not. We’re looking to blame whoever made that decision, or lament that it was even an option.

But, as we see above, there’s no cost involved. The shirts don’t exist. All that exists is a graphics file on a computer ready to be printed onto a shirt if an order comes through. Still, you might say, someone had to make that file, to type those words and click save. Not necessarily.

The t-shirts are created by an algorithm. The word “algorithm” is a little scary to some people because they don’t know what it means. It’s basically a process automated by a computer programme, sometimes simple, sometimes complex as hell. Amazon’s recommendations are powered by an algorithm. They look at what you’ve been browsing and buying, find patterns in that behaviour and show you things the algorithm thinks you might like to buy. Amazon’s algorithms are very complex and powerful, which is why they work. The algorithm that creates these t-shirts is not complex or powerful. This is how I expect it works.

1) Start a sentence with the words KEEP CALM AND.
2) Pick a word from this long list of verbs. Any word will do. Don’t worry, I’m sure they’re all fine.
3) Finish the sentence with one of the following: OFF, THEM, IT, A LOT or US.
4) Lay these words out in the classic Keep Calm style.
5) Create a mockup jpeg of a t-shirt.
6) Submit the design to Amazon using our boilerplate t-shirt description.
7) Go back to 1 and start again.

H/T to Cory Doctorow for the link.

February 21, 2013

Reason.tv: How Patent Trolls Kill Innovation

Filed under: Business, Law, USA — Tags: , , , — Nicholas @ 00:01

“My statement to someone that is the victim of a patent troll lawsuit is that you are completely screwed,” says Austin Meyer, who is himself the target of a so-called “patent troll” lawsuit.

Meyer is a software developer and aviation enthusiast. His two passions intersected in the ’90s when he created a flight simulator called X-Plane, which quickly grew in popularity, outlasting even the once-popular Microsoft Flight Simulator. As many software developers do, Meyer made his application available on mobile devices like the iPhone and Android. And this is where he first ran into trouble.

A company called Uniloc has sued Meyer for patent infringement over a patent called, “System and Method for Preventing Unauthorized Access to Electronic Data.” When a computer runs a paid application, one way that developers can assure that a customer has actually purchased the application is by coding the application to match a license code with an encrypted database. This is a method that most paid applications on the Android market use. It’s a method that Meyer argues has been in use since at least the late ’80s. This is the idea that Uniloc claims to own.

February 14, 2013

Microsoft Excel: the most dangerous software on Earth?

Filed under: Business, Economics, Technology — Tags: , , — Nicholas @ 00:02

I’ve made this case in conversation several times — usually after having to forensically determine just why someone’s spreadsheet produced an unlikely answer — the greatest strength of spreadsheets is also their greatest weakness. Anyone who’s built a spreadsheet knows how easy it is to make a mistake, and how hard that mistake can be to detect after the fact. Spreadsheets are free-form: you can set up relationships on the fly, pull data from one place to plug into a different formula somewhere else. It’s literally empowering to gain that much control over your data without having to learn a full programming language.

But that flexibility and power comes at a cost: there’s no built-in error checking of your assumptions. Oh, it’ll alert you to practical problems like mis-matched data types or mechanical errors in your formula, but can’t tell you whether the operation you’re attempting makes sense. The program can’t read your mind and can’t sanity check your work.

Do a spreadsheet for your family budget and you’ll almost certainly make a minor error or two.

Make a set of inter-linked spreadsheets and you probably double the chances of error for each new spreadsheet in the set.

Make a set of inter-linked spreadsheets that require manual copy-and-paste updates and you exponentially increase the chances of error.

Then, make that manually updated set of spreadsheets have a real-world impact on vast amounts of money:

To give you and idea of how important this is here’s a great tale from James Kwak:

    The issue is described in the appendix to JPMorgan’s internal investigative task force’s report. To summarize: JPMorgan’s Chief Investment Office needed a new value-at-risk (VaR) model for the synthetic credit portfolio (the one that blew up) and assigned a quantitative whiz (“a London-based quantitative expert, mathematician and model developer” who previously worked at a company that built analytical models) to create it. The new model “operated through a series of Excel spreadsheets, which had to be completed manually, by a process of copying and pasting data from one spreadsheet to another.” The internal Model Review Group identified this problem as well as a few others, but approved the model, while saying that it should be automated and another significant flaw should be fixed.** After the London Whale trade blew up, the Model Review Group discovered that the model had not been automated and found several other errors. Most spectacularly,

    “After subtracting the old rate from the new rate, the spreadsheet divided by their sum instead of their average, as the modeler had intended. This error likely had the effect of muting volatility by a factor of two and of lowering the VaR . . .”

To translate that into the vernacular, the bank, JP Morgan, was running huge bets (tens of billions of dollars, what we might think of a golly gee gosh that’s a lot of money) in London. The way they were checking what they were doing was playing around in Excel. And not even in the Masters of the Universe style that we might hope, all integrated, automated and self-checking, but by cutting and pasting from one spreadsheet to another. And yes, they got one of the equations wrong as a result of which the bank lost several billion dollars (perhaps we might drop the gee here but it’s still golly gosh that’s a lot of money).

And it’s not just JP Morgan: every financial firm, every bank, every brokerage uses Excel (or another spreadsheet program). Multiply JP Morgan’s experiences by the number of companies to get a rough idea of how much is at risk from un-audited (possibly even un-audit-able) financial models running on spreadsheets.

February 13, 2013

US Cyber Command’s recruiting headache

Filed under: Bureaucracy, Military, Technology, USA — Tags: , , , — Nicholas @ 09:23

Strategy Page on the “who could possibly have seen this coming” problems that the new electronic warfare organization is having with staffing:

U.S. Cyber Command (USCYBERCOM) has been operational for two years now, and it is encountering some serious problems in recruiting people qualified to deal with the enemy (skilled hackers attacking American networks for whatever reason). People in the software and Internet security business have been telling Cyber Command leaders that they will have to change the way they recruit if they want to get qualified people. That means hiring hackers who lived on the dark side (criminal hacking) at one point or another. Such recruits would not pass the screening usually given to potential government employees who would be handling, and protecting, classified information and critical Internet systems. Few government officials are willing to bend the rules, mainly because no one wants to be responsible for some rogue hacker who got hired without the usual screening. It’s safer to go by the book and use that for your defense when the inadequate recruiting effort leads to a major Cyber War disaster.

Cyber Command is headquartered in Fort Meade (outside Washington, DC), most of the manpower, and capabilities, come from the Cyber War operations the military services have already established. Within Cyber Command there are some smaller organizations that coordinate Cyber War activities among the services, as well as with other branches of the government and commercial organizations that are involved in network security. At the moment Cyber Command wants to expand its core staff from 900 to 4,900 in the next five years. Twenty percent of those new people will be civilians, including a number of software specialists sufficiently skilled to quickly recognize skillful intrusions into American networks and quickly develop countermeasures. That kind of talent is not only expensive, but those who possess often have work histories that don’t pass the normal screening. These are the personnel Cyber Command is having a difficult time recruiting.

The big problems are not only recruiting hackers (technical personnel who can deal with the bad-guy hackers out there) but also managing them. The problem is one of culture, and economics. The military is a strict hierarchy that does not, at least in peacetime, reward creativity. Troops with good technical skills can make more money, and get hassled less, in a similar civilian job. The military is aware of these problems, but it is slow going trying to fix them.

January 31, 2013

The “clean” side of archaeology

Filed under: History, Science, Technology — Tags: , , , — Nicholas @ 09:11

BBC News has an interesting segment on how digital technology is changing the field of archaeology:

Archaeologists may not need to get their hands so dirty any more, thanks to the kind of digital technology being pioneered at Southampton University.

Its ‘µ-VIS Centre for Computed Tomography’ possesses the largest, high energy scanner of its kind in Europe: a ‘micro-CT’ machine manufactured by Nikon.

Capable of resolutions better than 0.1mm — the diameter of a human hair — it allows archaeologists to carefully examine material while still encased in soil.

Using visualisation software, archaeologists can then analyse their finds in 3D. This keeps the material in its original form, and postpones any commitment to the painstaking process of excavation by hand.

Video of the machine in operation at the BBC News site.

January 25, 2013

Even before “The internet is for porn”, mainframe computers were for cheesecake

Filed under: History, Media, Technology — Tags: , , — Nicholas @ 09:47

The very first human image displayed on a computer was a pinup girl:

First human image on a computer

During a time when computing power was so scarce that it required a government-defense budget to finance it, a young man used a $238 million military computer, the largest such machine ever built, to render an image of a curvy woman on a glowing cathode ray tube screen. The year was 1956, and the creation was a landmark moment in computer graphics and cultural history that has gone unnoticed until now.

Using equipment designed to guard against the apocalypse, a pin-up girl had been drawn.

She was quite probably the first human likeness to ever appear on a computer screen.

She glowed.

[. . .]

In early 1959, 21-year-old Airman First Class Lawrence A. Tipton snapped the only known photo of this pin-up program in action at Ft. Lee. The photo shows the tube of an SD console displaying the outline of woman with her arms held high, cradling her head while emphasizing her bosom. She reclines awkwardly, her legs splayed apart in an uncomfortable but provocative pose that smacks of mid-century pin-up art.

“One day I decided to take pictures for posterity’s sake,” recalls Tipton, “And those two Polaroids are the only ones that made it out of the building.” The other Polaroid is a self-portrait of Tipton himself sitting in front of the AN/FSQ-7’s Duplex Maintenance Console. “We used the Polaroid cameras to take pictures of anomaly conditions. When the computers would malfunction, you’d take pictures of those main consoles to diagnose the conditions.”

December 4, 2012

Tumblr gets trolled

Filed under: Media, Technology — Tags: , , , , — Nicholas @ 09:58

The Register‘s John Leyden on the JavaScript troubles inflicted on Tumblr the other day:

A worm spread like wildfire across Tumblr on Monday, defacing pages on the blogging website with an abusive message penned by a notorious trolling crew.

The outbreak was triggered by the GNAA, a group of anonymous troublemakers who get their kicks from winding up bloggers with offensive posts.

Tumblr temporarily halted the publication of new journal posts to prevent the worm from spreading further before restoring the service to normal a few hours later.

[. . .]

“It appears that the worm took advantage of Tumblr’s reblogging feature, meaning that anyone who was logged into Tumblr would automatically reblog the infectious post if they visited one of the offending pages,” wrote Graham Cluley, senior technology consultant at Sophos.

“It shouldn’t have been possible for someone to post such malicious JavaScript into a Tumblr post — our assumption is that the attackers managed to skirt around Tumblr’s defences by disguising their code through Base 64 encoding and embedding it in a data URI,” he added.

December 3, 2012

The feudal technopeasant internet

Filed under: History, Liberty, Technology — Tags: , , , , , , — Nicholas @ 11:20

Bruce Schneier on the less-than-appealing state of user security in today’s internet:

It’s a feudal world out there.

Some of us have pledged our allegiance to Google: We have Gmail accounts, we use Google Calendar and Google Docs, and we have Android phones. Others have pledged allegiance to Apple: We have Macintosh laptops, iPhones, and iPads; and we let iCloud automatically synchronize and back up everything. Still others of us let Microsoft do it all. Or we buy our music and e-books from Amazon, which keeps records of what we own and allows downloading to a Kindle, computer, or phone. Some of us have pretty much abandoned e-mail altogether … for Facebook.

These vendors are becoming our feudal lords, and we are becoming their vassals. We might refuse to pledge allegiance to all of them — or to a particular one we don’t like. Or we can spread our allegiance around. But either way, it’s becoming increasingly difficult to not pledge allegiance to at least one of them.

Feudalism provides security. Classical medieval feudalism depended on overlapping, complex, hierarchical relationships. There were oaths and obligations: a series of rights and privileges. A critical aspect of this system was protection: vassals would pledge their allegiance to a lord, and in return, that lord would protect them from harm.

Of course, I’m romanticizing here; European history was never this simple, and the description is based on stories of that time, but that’s the general model.

And it’s this model that’s starting to permeate computer security today.

November 30, 2012

Can we bury iTunes yet?

Filed under: Media, Technology — Tags: , , , — Nicholas @ 10:42

In Slate, Farhad Manjoo calls for the abolition of the worst carbuncle on Apple’s escutcheon:

iTunes 11 did not arrive on time. Apple originally promised to deliver the next version of its ubiquitous music-management program in October. Last month, though, the company announced that the release would slip to November, because the company needed “a little extra time to get it right.” This week the Wall Street Journal, citing “people who have seen it,” reported that the real cause was “engineering issues that required parts to be rebuilt.”

I suspect both those explanations are euphemisms for what’s really happening in Cupertino. I picture frazzled engineers growing increasingly alarmed as they discover that the iTunes codebase has been overrun by some kind of self-replicating virus that keeps adding random features and redesigns. The coders can’t figure out what’s going on — why iTunes, alone among Apple products, keeps growing more ungainly. At the head of the team is a grizzled old engineer who’s been at Apple forever. He’s surly and crude, always making vulgar jokes about iPads. But the company can’t afford to get rid of him — he’s the only one who understands how to operate the furnaces in the iTunes boiler room.

Then one morning the crew hears a strange clanging from iTunes’ starboard side. Scouts report that an ancient piston — something added for compatibility with the U2 iPod and then refashioned dozens of times — has been damaged while craftsmen removed the last remnants of a feature named Ping whose purpose has been lost to history. The old engineer dons his grease-covered overalls and heads down to check it out. Many anxious minutes pass. Then the crew is shaken by a huge blast. A minute later, they hear a lone, muffled wail. They send a medic, but it’s too late. The engineer has been battered by shrapnel from the iOS app management system, which is always on the fritz. His last words haunt the team forever: She can’t take much more of this. Too. Many. Features.

I use iTunes, but only because I need to back up my iPhone data … and nearly half the time, iTunes craps out on me and I have to go looking for fixes or work-arounds from Apple. Since I updated my iPhone to the most recent iOS version, I haven’t been able to sync with iTunes at all. Here’s hoping that the new version will fix that — and maybe, if we’re lucky, some other issues, too.

Update, 1 December: The update went well enough, but it still couldn’t contact the iTunes store or detect my iPhone. After a few minutes of looking through the Apple troubleshooting help pages, I reset the DNS cache and re-enabled iTunes to run in Administrator mode. That was enough to let it detect the iPhone and run a backup and re-synch.

November 26, 2012

End software patents

Filed under: Business, Law, Technology — Tags: , , , — Nicholas @ 11:15

Marginal Revolution writer and George Mason economics professor Alex Tabarrok argues for an end to software patents.

« Newer PostsOlder Posts »

Powered by WordPress