Tim O’Reilly is the world’s most astute publisher. He’s also a great Twitterer. Someone retrieved his Tweets using a Python script to produce this Wordle tag-cloud.
Monthly Archives: April 2009
40 years on
Today, the Open University has added a new album to its iTunesU site to mark the fact that the packet-switched network, like the OU itself, is 40 years old this year. The album is a compilation of interviews we’ve done over the years with various Internet pioneers like Vint Cerf, Don Davies and Ray Tomlinson (the inventor of email). The whole shebang is headed by an overview interview with me. Sufferers from insomnia can find it here.
US begins to get its act together on cyberattack
A panel of experts deliberating under the auspices of the National Science Foundation has come up with a report which is highly critical of the US’s approach to the threat of cyberattack and has issued this list of recommendations:
1. The United States should establish a public national policy regarding cyberattack for all sectors of government, including but not necessarily limited to the Departments of Defense, State, Homeland Security, Treasury, and Commerce; the intelligence community; and law enforcement. The senior leadership of these organizations should be involved in formulating this national policy.
2. The U.S. government should conduct a broad, unclassified national debate and discussion about cyberattack policy, ensuring that all parties—particularly Congress, the professional military, and the intelligence agencies—are involved in discussions and are familiar with the issues.
3. The U.S. government should work to find common ground with other nations regarding cyberattack. Such common ground should include better mutual understanding regarding various national views of cyberattack, as well as measures to promote transparency and confidence building.
4. The U.S. government should have a clear, transparent, and inclusive decision- making structure in place to decide how, when, and why a cyberattack will be conducted.
5. The U.S. government should provide a periodic accounting of cyberattacks undertaken by the U.S. armed forces, federal law enforcement agencies, intelligence agencies, and any other agencies with authorities to conduct such attacks in sufficient detail to provide decision makers with a more comprehensive understanding of these activities. Such a periodic accounting should be made available both to senior decision makers in the executive branch and to the appropriate congressional leaders and committees.
6. U.S. policy makers should judge the policy, legal, and ethical significance of launching a cyberattack largely on the basis of both its likely direct effects and its indirect effects.
7. U.S. policy makers should apply the moral and ethical principles underlying the law of armed conflict to cyberattack even in situations that fall short of actual armed conflict.
8. The United States should maintain and acquire effective cyberattack capabilities. Advances in capabilities should be continually factored into policy development, and a comprehensive budget accounting for research, development, testing, and evaluation relevant to cyberattack should be available to appropriate decision makers in the executive and legislative branches.
9. The U.S. government should ensure that there are sufficient levels of personnel trained in all dimensions of cyberattack, and that the senior leaders of government have more than a nodding acquaintance with such issues.
10. The U.S. government should consider the establishment of a government-based institutional structure through which selected private sector entities can seek immediate relief if they are the victims of cyberattack.
11. The U.S. government should conduct high-level wargaming exercises to understand the dynamics and potential consequences of cyberconflict.
12. Foundations and government research funders should support academic and think- tank inquiry into cyberconflict, just as they have supported similar work on issues related to nuclear, biological, and chemical weapons.
According to the NYT report,
The United States has no clear military policy about how the nation might respond to a cyberattack on its communications, financial or power networks, a panel of scientists and policy advisers warned Wednesday, and the country needs to clarify both its offensive capabilities and how it would respond to such attacks.
The NYT report also suggests that the US doesn’t rule out the use of nukes in retaliation to a cyberattack, but then goes on to quote Pentagon officials as saying that this is nothing new. The US, it seems, never rules out anything. This is apparently to keep potential aggressors guessing.**
Text of the Executive Summary of the NSF report (pdf) from here.
** Footnote: this didn’t deter Osama bin Laden & Co, though.
Coming soon — an Android NetBook?
From Technology Review.
Skytone, a Chinese manufacturer, has started showing off the first netbook to run Android, an operating system developed by Google that currently runs on just a single device, the G1mobile phone. Using Android makes sense for Skytone because its netbook is minimal (even by netbook standards): it supports 128 megabits of RAM and only up to 4 gigabytes of storage on a flash-based, solid-state disk. And importantly, its central processing unit is an ARM11 chip–the same model found inside the iPhone.
Football while you work
The Eye of the Needle
I’ve often thought that, in the obnoxiousness stakes, Andrew Lloyd-Webber ranks just below Jeffrey Archer, the so-called ‘novelist’, in that the same joke can apply to either:
First man: Why did you take an instant dislike to Jeffrey Archer/Andrew Lloyd-Webber?
Second man: I found that it saved time.
Now comes a lovely blog post by Sean French
In today’s Mail on Sunday Andrew Lloyd-Webber compares the tax-raising Labour Party to Somali pirates.
Thirty years ago I was, in a way, an employee of Lloyd-Webber. In my gap year I worked as a stagehand at London’s Palace Theatre where Jesus Christ Superstar was then in its sixth year. I used to collect the ointment jar from Mary Magdalene and prepare the incense for the orgy scene in the temple. I estimate that I sat through the musical about 150 times.
I will make no comment about the effect of that experience on me and my feelings towards Lloyd-Webber, except to say that it would give me great pleasure if circumstances arose so that he was able to experience Somalian piracy at first hand.
Me too. Strange: until now I’ve felt quite hostile towards those pirates.
ISPs to do the government’s monitoring for it
From a BBC report.
Communications firms are being asked to record all internet contacts between people as part of a modernisation in UK police surveillance tactics.
The home secretary scrapped plans for a database but wants details to be held and organised for security services.
The new system would track all e-mails, phone calls and internet use, including visits to social network sites.
The Tories said the Home Office had “buckled under Conservative pressure” in deciding against a giant database.
Announcing a consultation on a new strategy for communications data and its use in law enforcement, Jacqui Smith said there would be no single government-run database.
Communications data is an essential tool for law enforcement agencies to track murderers and paedophiles, save lives and tackle crime
But she also said that “doing nothing” in the face of a communications revolution was not an option.
The Web vs the Cloud
Interesting thought.
The Web was perfectly named. Every point connecting to other points, not always directly, but your requests and data would get there. And even if part of the web were to be destroyed or taken down in some way, then the remainder would exist. Cloud Computing will retain this aspect of the web design as its backbone form of communication. However, the Cloud Computing concept is also perfectly named.
Whereas with the Web we could, from any point on the web, see pretty much everything else, with the Cloud we will not be able to know what’s taking place in the system, just as we cannot see today what exists inside of clouds. They are murky, dense objects that reveal almost no depth at all. In fact, if you’ve ever seen airplanes fly in and out of clouds, you know that once they are a few feet on the inside they’re completely obscured. And it’s the same with Cloud Computing.
We will have access points to access these future Cloud Computing systems, the ones which from all outward appearances will seem like a regular website. However, the evolution of computing power over time has mandated (from a business perspective) that the available data be mined for usable information which can then, in some way, relate to profit — either through better services offered to users, or for marketing and sales revenues through more directly targeted campaigns.
While everything on the outside appears to be as it was before, what’s happening on the inside of the new cloud-computing systems will be completely different. And I have, as of yet, to see a comprehensive analysis of how our privacy, our data security and our online lives will be affected by such a system.
To me, Cloud Computing models offer the greatest possibility for data control–and the abuse of that control–that I’ve ever seen.
Twittering executives
Lucy Kellaway has been looking at what business executives do with Twitter. She is predictably funny about it:
Despite the dismal use to which executives are putting Twitter, more and more are signing up for fear of being left behind. Last week I met a British business leader who told me that he had just joined, but complained that he was now so focused on turning the details of his day into pithy tweets that he was finding it hard to pay attention to what he was doing. Worse, once he had composed his Tweet he felt insecure and unpopular as only three people seemed to be following him….
Labour’s affair with bankers
Gordon Brown sucking up to Richard S. Fuld, CEO of Lehman Bros, just after opening Lehman’s new London HQ. Photograph from tonight’s ‘Dispatches’ on Channel 4.
Terrific FT.com column by John Kay.
What would have happened if the Financial Services Authority or Bank of England had sought to block the competing bids from RBS and Barclays for ABN Amro – a contest which, we now know, would bankrupt the bank that won the race? The phones in Downing Street would have been ringing insistently and it is easy to imagine the government’s response.
Little has changed. The government continues to see financial services through the eyes of the financial services industry, for which the priority is to restore business as usual. For a time in 2008, it seemed possible to argue that a package of temporary support for the banking industry, combined with substantial recapitalisation of the weaker players, might stabilise the financial sector and prevent serious knock-on effects.
But the problems of banks are much deeper than were then acknowledged and the destabilisation of the real economy has happened anyway. Government now provides taxpayers’ money to financial services businesses in previously unimaginable quantities. But there is no control over the use of the money, no insistence on structural reform or management reorganisation, no safeguarding of the essential economic functions of the financial services industry and no accountability for the damage that has been done.
It is as though the teenage children and their friends were to wreck the house and then demand that the grown-ups clean up before the next party. Their parents are too intimidated to do anything more than ask Uncle Adair to keep an eye on them and excoriate the hapless Fred who made off with some of the silver.