Quotulatiousness

March 11, 2013

Best comment on the EU move to penalize Microsoft over web browser choice

Filed under: Europe, Humour, Law, Technology — Tags: , , , — Nicholas @ 09:06

From “Purp” at Ace of Spades H.Q.:

In other news, the EU plans to fine Microsoft $700M dollars because European users are apparently too stupid to figure out they can download other browsers for free. Porn and bootleg software? Mad skilz baby, mad skilz. Browsers? Not so much…huh? what? where am I? what is this thing, why does it beep? Help, I’ve fallen down and can’t get up.

The fine works out to around $50 for each machine in violation that was shipped by OEM’s. The EU says they’re cutting Microsoft a bargain cuz they could have been fined $7B, or $500/machine. Either way, its a pretty harsh shakedown caused by Euro-users (apparently) being lemming like incompetent imbeciles who are unaware other stuff exists. Its truly a wonder they manage to find the power switch…or maybe the EU sends out specially trained techs to turn on computers for people?

March 4, 2013

Admit it, you probably know someone who would wear this “ironically”

Filed under: Business, Technology — Tags: , , — Nicholas @ 09:20

Amazon Keep Calm and blank T-shirt

Pete Ashton explains how such an item appears on the Amazon.com website:

Nobody made, or approved, the design. This is the headfuck moment that most people can’t comprehend. There’s a completely understandable assumption that someone decided it would be a great idea to sell Keep Calm t-shirts with the word Rape on them and, because they exist (which they don’t, but let’s assume they do) that there’s a reasonable demand for them. This is because we’re used to there being a cost in producing a product like a t-shirt and an economic requirement to mass-produce them in huge numbers. If there’s a significant cost then a decision has to be made whether to spend it or not. We’re looking to blame whoever made that decision, or lament that it was even an option.

But, as we see above, there’s no cost involved. The shirts don’t exist. All that exists is a graphics file on a computer ready to be printed onto a shirt if an order comes through. Still, you might say, someone had to make that file, to type those words and click save. Not necessarily.

The t-shirts are created by an algorithm. The word “algorithm” is a little scary to some people because they don’t know what it means. It’s basically a process automated by a computer programme, sometimes simple, sometimes complex as hell. Amazon’s recommendations are powered by an algorithm. They look at what you’ve been browsing and buying, find patterns in that behaviour and show you things the algorithm thinks you might like to buy. Amazon’s algorithms are very complex and powerful, which is why they work. The algorithm that creates these t-shirts is not complex or powerful. This is how I expect it works.

1) Start a sentence with the words KEEP CALM AND.
2) Pick a word from this long list of verbs. Any word will do. Don’t worry, I’m sure they’re all fine.
3) Finish the sentence with one of the following: OFF, THEM, IT, A LOT or US.
4) Lay these words out in the classic Keep Calm style.
5) Create a mockup jpeg of a t-shirt.
6) Submit the design to Amazon using our boilerplate t-shirt description.
7) Go back to 1 and start again.

H/T to Cory Doctorow for the link.

February 21, 2013

Reason.tv: How Patent Trolls Kill Innovation

Filed under: Business, Law, USA — Tags: , , , — Nicholas @ 00:01

“My statement to someone that is the victim of a patent troll lawsuit is that you are completely screwed,” says Austin Meyer, who is himself the target of a so-called “patent troll” lawsuit.

Meyer is a software developer and aviation enthusiast. His two passions intersected in the ’90s when he created a flight simulator called X-Plane, which quickly grew in popularity, outlasting even the once-popular Microsoft Flight Simulator. As many software developers do, Meyer made his application available on mobile devices like the iPhone and Android. And this is where he first ran into trouble.

A company called Uniloc has sued Meyer for patent infringement over a patent called, “System and Method for Preventing Unauthorized Access to Electronic Data.” When a computer runs a paid application, one way that developers can assure that a customer has actually purchased the application is by coding the application to match a license code with an encrypted database. This is a method that most paid applications on the Android market use. It’s a method that Meyer argues has been in use since at least the late ’80s. This is the idea that Uniloc claims to own.

February 14, 2013

Microsoft Excel: the most dangerous software on Earth?

Filed under: Business, Economics, Technology — Tags: , , — Nicholas @ 00:02

I’ve made this case in conversation several times — usually after having to forensically determine just why someone’s spreadsheet produced an unlikely answer — the greatest strength of spreadsheets is also their greatest weakness. Anyone who’s built a spreadsheet knows how easy it is to make a mistake, and how hard that mistake can be to detect after the fact. Spreadsheets are free-form: you can set up relationships on the fly, pull data from one place to plug into a different formula somewhere else. It’s literally empowering to gain that much control over your data without having to learn a full programming language.

But that flexibility and power comes at a cost: there’s no built-in error checking of your assumptions. Oh, it’ll alert you to practical problems like mis-matched data types or mechanical errors in your formula, but can’t tell you whether the operation you’re attempting makes sense. The program can’t read your mind and can’t sanity check your work.

Do a spreadsheet for your family budget and you’ll almost certainly make a minor error or two.

Make a set of inter-linked spreadsheets and you probably double the chances of error for each new spreadsheet in the set.

Make a set of inter-linked spreadsheets that require manual copy-and-paste updates and you exponentially increase the chances of error.

Then, make that manually updated set of spreadsheets have a real-world impact on vast amounts of money:

To give you and idea of how important this is here’s a great tale from James Kwak:

    The issue is described in the appendix to JPMorgan’s internal investigative task force’s report. To summarize: JPMorgan’s Chief Investment Office needed a new value-at-risk (VaR) model for the synthetic credit portfolio (the one that blew up) and assigned a quantitative whiz (“a London-based quantitative expert, mathematician and model developer” who previously worked at a company that built analytical models) to create it. The new model “operated through a series of Excel spreadsheets, which had to be completed manually, by a process of copying and pasting data from one spreadsheet to another.” The internal Model Review Group identified this problem as well as a few others, but approved the model, while saying that it should be automated and another significant flaw should be fixed.** After the London Whale trade blew up, the Model Review Group discovered that the model had not been automated and found several other errors. Most spectacularly,

    “After subtracting the old rate from the new rate, the spreadsheet divided by their sum instead of their average, as the modeler had intended. This error likely had the effect of muting volatility by a factor of two and of lowering the VaR . . .”

To translate that into the vernacular, the bank, JP Morgan, was running huge bets (tens of billions of dollars, what we might think of a golly gee gosh that’s a lot of money) in London. The way they were checking what they were doing was playing around in Excel. And not even in the Masters of the Universe style that we might hope, all integrated, automated and self-checking, but by cutting and pasting from one spreadsheet to another. And yes, they got one of the equations wrong as a result of which the bank lost several billion dollars (perhaps we might drop the gee here but it’s still golly gosh that’s a lot of money).

And it’s not just JP Morgan: every financial firm, every bank, every brokerage uses Excel (or another spreadsheet program). Multiply JP Morgan’s experiences by the number of companies to get a rough idea of how much is at risk from un-audited (possibly even un-audit-able) financial models running on spreadsheets.

February 13, 2013

US Cyber Command’s recruiting headache

Filed under: Bureaucracy, Military, Technology, USA — Tags: , , , — Nicholas @ 09:23

Strategy Page on the “who could possibly have seen this coming” problems that the new electronic warfare organization is having with staffing:

U.S. Cyber Command (USCYBERCOM) has been operational for two years now, and it is encountering some serious problems in recruiting people qualified to deal with the enemy (skilled hackers attacking American networks for whatever reason). People in the software and Internet security business have been telling Cyber Command leaders that they will have to change the way they recruit if they want to get qualified people. That means hiring hackers who lived on the dark side (criminal hacking) at one point or another. Such recruits would not pass the screening usually given to potential government employees who would be handling, and protecting, classified information and critical Internet systems. Few government officials are willing to bend the rules, mainly because no one wants to be responsible for some rogue hacker who got hired without the usual screening. It’s safer to go by the book and use that for your defense when the inadequate recruiting effort leads to a major Cyber War disaster.

Cyber Command is headquartered in Fort Meade (outside Washington, DC), most of the manpower, and capabilities, come from the Cyber War operations the military services have already established. Within Cyber Command there are some smaller organizations that coordinate Cyber War activities among the services, as well as with other branches of the government and commercial organizations that are involved in network security. At the moment Cyber Command wants to expand its core staff from 900 to 4,900 in the next five years. Twenty percent of those new people will be civilians, including a number of software specialists sufficiently skilled to quickly recognize skillful intrusions into American networks and quickly develop countermeasures. That kind of talent is not only expensive, but those who possess often have work histories that don’t pass the normal screening. These are the personnel Cyber Command is having a difficult time recruiting.

The big problems are not only recruiting hackers (technical personnel who can deal with the bad-guy hackers out there) but also managing them. The problem is one of culture, and economics. The military is a strict hierarchy that does not, at least in peacetime, reward creativity. Troops with good technical skills can make more money, and get hassled less, in a similar civilian job. The military is aware of these problems, but it is slow going trying to fix them.

January 31, 2013

The “clean” side of archaeology

Filed under: History, Science, Technology — Tags: , , , — Nicholas @ 09:11

BBC News has an interesting segment on how digital technology is changing the field of archaeology:

Archaeologists may not need to get their hands so dirty any more, thanks to the kind of digital technology being pioneered at Southampton University.

Its ‘µ-VIS Centre for Computed Tomography’ possesses the largest, high energy scanner of its kind in Europe: a ‘micro-CT’ machine manufactured by Nikon.

Capable of resolutions better than 0.1mm — the diameter of a human hair — it allows archaeologists to carefully examine material while still encased in soil.

Using visualisation software, archaeologists can then analyse their finds in 3D. This keeps the material in its original form, and postpones any commitment to the painstaking process of excavation by hand.

Video of the machine in operation at the BBC News site.

January 25, 2013

Even before “The internet is for porn”, mainframe computers were for cheesecake

Filed under: History, Media, Technology — Tags: , , — Nicholas @ 09:47

The very first human image displayed on a computer was a pinup girl:

First human image on a computer

During a time when computing power was so scarce that it required a government-defense budget to finance it, a young man used a $238 million military computer, the largest such machine ever built, to render an image of a curvy woman on a glowing cathode ray tube screen. The year was 1956, and the creation was a landmark moment in computer graphics and cultural history that has gone unnoticed until now.

Using equipment designed to guard against the apocalypse, a pin-up girl had been drawn.

She was quite probably the first human likeness to ever appear on a computer screen.

She glowed.

[. . .]

In early 1959, 21-year-old Airman First Class Lawrence A. Tipton snapped the only known photo of this pin-up program in action at Ft. Lee. The photo shows the tube of an SD console displaying the outline of woman with her arms held high, cradling her head while emphasizing her bosom. She reclines awkwardly, her legs splayed apart in an uncomfortable but provocative pose that smacks of mid-century pin-up art.

“One day I decided to take pictures for posterity’s sake,” recalls Tipton, “And those two Polaroids are the only ones that made it out of the building.” The other Polaroid is a self-portrait of Tipton himself sitting in front of the AN/FSQ-7’s Duplex Maintenance Console. “We used the Polaroid cameras to take pictures of anomaly conditions. When the computers would malfunction, you’d take pictures of those main consoles to diagnose the conditions.”

December 4, 2012

Tumblr gets trolled

Filed under: Media, Technology — Tags: , , , , — Nicholas @ 09:58

The Register‘s John Leyden on the JavaScript troubles inflicted on Tumblr the other day:

A worm spread like wildfire across Tumblr on Monday, defacing pages on the blogging website with an abusive message penned by a notorious trolling crew.

The outbreak was triggered by the GNAA, a group of anonymous troublemakers who get their kicks from winding up bloggers with offensive posts.

Tumblr temporarily halted the publication of new journal posts to prevent the worm from spreading further before restoring the service to normal a few hours later.

[. . .]

“It appears that the worm took advantage of Tumblr’s reblogging feature, meaning that anyone who was logged into Tumblr would automatically reblog the infectious post if they visited one of the offending pages,” wrote Graham Cluley, senior technology consultant at Sophos.

“It shouldn’t have been possible for someone to post such malicious JavaScript into a Tumblr post — our assumption is that the attackers managed to skirt around Tumblr’s defences by disguising their code through Base 64 encoding and embedding it in a data URI,” he added.

December 3, 2012

The feudal technopeasant internet

Filed under: History, Liberty, Technology — Tags: , , , , , , — Nicholas @ 11:20

Bruce Schneier on the less-than-appealing state of user security in today’s internet:

It’s a feudal world out there.

Some of us have pledged our allegiance to Google: We have Gmail accounts, we use Google Calendar and Google Docs, and we have Android phones. Others have pledged allegiance to Apple: We have Macintosh laptops, iPhones, and iPads; and we let iCloud automatically synchronize and back up everything. Still others of us let Microsoft do it all. Or we buy our music and e-books from Amazon, which keeps records of what we own and allows downloading to a Kindle, computer, or phone. Some of us have pretty much abandoned e-mail altogether … for Facebook.

These vendors are becoming our feudal lords, and we are becoming their vassals. We might refuse to pledge allegiance to all of them — or to a particular one we don’t like. Or we can spread our allegiance around. But either way, it’s becoming increasingly difficult to not pledge allegiance to at least one of them.

Feudalism provides security. Classical medieval feudalism depended on overlapping, complex, hierarchical relationships. There were oaths and obligations: a series of rights and privileges. A critical aspect of this system was protection: vassals would pledge their allegiance to a lord, and in return, that lord would protect them from harm.

Of course, I’m romanticizing here; European history was never this simple, and the description is based on stories of that time, but that’s the general model.

And it’s this model that’s starting to permeate computer security today.

November 30, 2012

Can we bury iTunes yet?

Filed under: Media, Technology — Tags: , , , — Nicholas @ 10:42

In Slate, Farhad Manjoo calls for the abolition of the worst carbuncle on Apple’s escutcheon:

iTunes 11 did not arrive on time. Apple originally promised to deliver the next version of its ubiquitous music-management program in October. Last month, though, the company announced that the release would slip to November, because the company needed “a little extra time to get it right.” This week the Wall Street Journal, citing “people who have seen it,” reported that the real cause was “engineering issues that required parts to be rebuilt.”

I suspect both those explanations are euphemisms for what’s really happening in Cupertino. I picture frazzled engineers growing increasingly alarmed as they discover that the iTunes codebase has been overrun by some kind of self-replicating virus that keeps adding random features and redesigns. The coders can’t figure out what’s going on — why iTunes, alone among Apple products, keeps growing more ungainly. At the head of the team is a grizzled old engineer who’s been at Apple forever. He’s surly and crude, always making vulgar jokes about iPads. But the company can’t afford to get rid of him — he’s the only one who understands how to operate the furnaces in the iTunes boiler room.

Then one morning the crew hears a strange clanging from iTunes’ starboard side. Scouts report that an ancient piston — something added for compatibility with the U2 iPod and then refashioned dozens of times — has been damaged while craftsmen removed the last remnants of a feature named Ping whose purpose has been lost to history. The old engineer dons his grease-covered overalls and heads down to check it out. Many anxious minutes pass. Then the crew is shaken by a huge blast. A minute later, they hear a lone, muffled wail. They send a medic, but it’s too late. The engineer has been battered by shrapnel from the iOS app management system, which is always on the fritz. His last words haunt the team forever: She can’t take much more of this. Too. Many. Features.

I use iTunes, but only because I need to back up my iPhone data … and nearly half the time, iTunes craps out on me and I have to go looking for fixes or work-arounds from Apple. Since I updated my iPhone to the most recent iOS version, I haven’t been able to sync with iTunes at all. Here’s hoping that the new version will fix that — and maybe, if we’re lucky, some other issues, too.

Update, 1 December: The update went well enough, but it still couldn’t contact the iTunes store or detect my iPhone. After a few minutes of looking through the Apple troubleshooting help pages, I reset the DNS cache and re-enabled iTunes to run in Administrator mode. That was enough to let it detect the iPhone and run a backup and re-synch.

November 26, 2012

End software patents

Filed under: Business, Law, Technology — Tags: , , , — Nicholas @ 11:15

Marginal Revolution writer and George Mason economics professor Alex Tabarrok argues for an end to software patents.

November 25, 2012

Anthropology and hacker culture

Filed under: Media, Technology — Tags: , , , , — Nicholas @ 11:56

Cory Doctorow on a new book by Biella Coleman called Coding Freedom: The Ethics and Aesthetics of Hacking:

[Coleman’s dissertation has been], edited and streamlined, under the title of Coding Freedom: The Ethics and Aesthetics of Hacking, which comes out today from Princeton University Press (Quinn Norton, also well known for her Wired reporting on Anonymous and Occupy, had a hand in the editing). Coding Freedom walks the fine line between popular accessibility and scholarly rigor, and does a very good job of expressing complex ideas without (too much) academic jargon.

Coding Freedom is insightful and fascinating, a superbly observed picture of the motives, divisions and history of the free software and software freedom world. As someone embedded in both those worlds, I found myself surprised by connections I’d never made on my own, but which seemed perfectly right and obvious in hindsight. Coleman’s work pulls together a million IRC conversations and mailing list threads and wikiwars and gets to their foundations, the deep discussion evolving through the world of free/open source software.

November 12, 2012

Firefox users more likely to stay on old version longer than other browser users

Filed under: Technology — Tags: , , — Nicholas @ 08:47

John Leyden summarizes the recent findings about how quickly users update their web browsers after a new release:

Nearly one in four netizens are using outdated web browsers and are therefore easy pickings for viruses and exploit-wielding crooks.

The average home user upgrades his or her browser to the latest version one month after it is released, according to a survey of 10 million punters. Two thirds of those using old browser software are simply stuck on the version prior to the latest release — the remaining third are using even older code.

Internet Explorer is the most popular browser (used by 37.8 per cent of consumers), closely followed by Google Chrome (36.5 per cent). Firefox is in third place with 19.5 per cent.

Firefox users tend to be the worst for keeping up to date with new software releases, according to the survey by security biz Kaspersky Lab. The proportion of users with the most recent version installed was 80.2 per cent for Internet Explorer and 79.2 per cent for Chrome, but just 66.1 per cent for Firefox.

Old-codgers Internet Explorer 6 and 7, with a combined share of 3.9 per cent, are still used by hundreds of thousands of punters worldwide.

November 4, 2012

Rethinking software patents

Filed under: Business, Law, Technology — Tags: , , , , , — Nicholas @ 00:01

Software patents are becoming a clear and present danger to innovation:

The basic problem being that there are so many patents, covering so many things, that the system is in danger of eating itself like Ourobouros.

    When Dan Ravicher of the Public Patent Foundation studied one large program (Linux, which is the kernel of the GNU/Linux operating system) in 2004, he found 283 U.S. patents that appeared to cover computing ideas implemented in the source code of that program. That same year, it was estimated that Linux was .25 percent of the whole GNU/Linux system. Multiplying 300 by 400 we get the order-of-magnitude estimate that the system as a whole was threatened by around 100,000 patents.

    If half of those patents were eliminated as “bad quality” — i.e., mistakes of the patent system — it would not really change things. Whether 100,000 patents or 50,000, it’s the same disaster. This is why it’s a mistake to limit our criticism of software patents to just “patent trolls” or ”bad quality” patents. In this sense Apple, which isn’t a “troll” by the usual definition, is the most dangerous patent aggressor today. I don’t know whether Apple’s patents are “good quality,” but the better the patent’s “quality,” the more dangerous its threat.

It’s near impossible to develop new software when there are so many such patents out there. Further, even if you tried to get clearance (or signed up to licenses and so on) to use them it would be near impossible.And we do need to recall what the purpose of a patent system is. No, it isn’t to provide and income to those who create inventions. That’s only the proximate aim: the ultimate aim is to maximise the amount of invention and innovation.

The economics of patents accepts that there is a tradeoff here. Yes, we’d like people who come up with useful new things to make money. Because that incentivises people to work on coming up with interesting new things to all our benefit. However, we also want people to be able to create derivative innovations and inventions. If our protection of the original inventors is too strong then we limit this. What we want is a system that hits the sweet spot, of encouraging the maximum amount of both, original and derivative. The problem of course being that to encourage one we weaken the incentives to do the other, either way around.

October 8, 2012

Legal weapons of mass destruction

Filed under: Business, Law, Technology — Tags: , , , , — Nicholas @ 11:19

Software patents: two words that probably should not go together at all.

Mr. Phillips and Vlingo are among the thousands of executives and companies caught in a software patent system that federal judges, economists, policy makers and technology executives say is so flawed that it often stymies innovation.

Alongside the impressive technological advances of the last two decades, they argue, a pall has descended: the marketplace for new ideas has been corrupted by software patents used as destructive weapons.

[. . .]

Patents are vitally important to protecting intellectual property. Plenty of creativity occurs within the technology industry, and without patents, executives say they could never justify spending fortunes on new products. And academics say that some aspects of the patent system, like protections for pharmaceuticals, often function smoothly.

However, many people argue that the nation’s patent rules, intended for a mechanical world, are inadequate in today’s digital marketplace. Unlike patents for new drug formulas, patents on software often effectively grant ownership of concepts, rather than tangible creations. Today, the patent office routinely approves patents that describe vague algorithms or business methods, like a software system for calculating online prices, without patent examiners demanding specifics about how those calculations occur or how the software operates.

As a result, some patents are so broad that they allow patent holders to claim sweeping ownership of seemingly unrelated products built by others. Often, companies are sued for violating patents they never knew existed or never dreamed might apply to their creations, at a cost shouldered by consumers in the form of higher prices and fewer choices.

« Newer PostsOlder Posts »

Powered by WordPress