America at 10mph
A web designer is travelling across America on a Segway. Just one question: why?
America at 10mph
A web designer is travelling across America on a Segway. Just one question: why?
The rise and rise of Instant Messaging
According to the latest survey from the Pew Internet and American Life Project, 42% of online Americans use instant messaging, and 24% of instant messagers say they use IM more frequently than email. This translates to 53 million American adults who instant message and over 12 million who IM more than emailing. On a typical day, 29% of instant messengers– or roughly 15 million American adults — use IM.
The new survey also finds that instant messaging is especially popular among younger adults and technology enthusiasts. 62% of Americans aged between 18 and 27 use IM. Within that age group, 46% report using IM more frequently than email.
Hmmm… There are serious security issues here — for example, the risk of an explosion in Spim (Spam over Instant Messaging). The anti-virus industry is concerned because viruses introduced via IM could replicate even faster than those borne by email. One of the companies has produced a scary simulation model of this, but I can’t locate it just now.
The Three Laws of US Robotics
The kids and I have just been to see the movie I, Robot. I went because it was supposed to be based on Isaac Asimov’s book. (It was — loosely.) But the really funny bit was that the Evil Company in the film was called ‘USR’ — which in my day was the abbreviation for US Robotics, a perfectly respectable manufacturer of rather nice analog modems. I’ve just checked, and it is still a respectable manufacturer of same (and it still has USR in its domain name). So how did the movie makers get away with giving the baddies the same handle? Did they pay a hefty ransom?
At last — a useful new HTML tag
Lovely picture which will appeal to HTML coders — from the anti-Bush protests in New York.
Hint for non-techies: it means “End Bush”.
Richard Posner on the 9/11 Commission Report
He’s not impressed. In a very good piece, he writes:
“The tale of how we were surprised by the 9/11 attacks is a product of hindsight; it could not be otherwise. And with the aid of hindsight it is easy to identify missed opportunities (though fewer than had been suspected) to have prevented the attacks, and tempting to leap from that observation to the conclusion that the failure to prevent them was the result not of bad luck, the enemy’s skill and ingenuity or the difficulty of defending against suicide attacks or protecting an almost infinite array of potential targets, but of systemic failures in the nation’s intelligence and security apparatus that can be corrected by changing the apparatus.
That is the leap the commission makes, and it is not sustained by the report’s narrative. The narrative points to something different, banal and deeply disturbing: that it is almost impossible to take effective action to prevent something that hasn’t occurred previously. Once the 9/11 attacks did occur, measures were taken that have reduced the likelihood of a recurrence. But before the attacks, it was psychologically and politically impossible to take those measures. The government knew that Al Qaeda had attacked United States facilities and would do so again. But the idea that it would do so by infiltrating operatives into this country to learn to fly commercial aircraft and then crash such aircraft into buildings was so grotesque that anyone who had proposed that we take costly measures to prevent such an event would have been considered a candidate for commitment. No terrorist had hijacked an American commercial aircraft anywhere in the world since 1986. Just months before the 9/11 attacks the director of the Defense Department’s Defense Threat Reduction Agency wrote: ”We have, in fact, solved a terrorist problem in the last 25 years. We have solved it so successfully that we have forgotten about it; and that is a treat. The problem was aircraft hijacking and bombing. We solved the problem. . . . The system is not perfect, but it is good enough. . . . We have pretty much nailed this thing.” In such a climate of thought, efforts to beef up airline security not only would have seemed gratuitous but would have been greatly resented because of the cost and the increased airport congestion.”
He concludes:
“The report ends on a flat note. But one can sympathize with the commission’s problem. To conclude after a protracted, expensive and much ballyhooed investigation that there is really rather little that can be done to reduce the likelihood of future terrorist attacks beyond what is being done already, at least if the focus is on the sort of terrorist attacks that have occurred in the past rather than on the newer threats of bioterrorism and cyberterrorism, would be a real downer — even a tad un-American. Americans are not fatalists. When a person dies at the age of 95, his family is apt to ascribe his death to a medical failure. When the nation experiences a surprise attack, our instinctive reaction is not that we were surprised by a clever adversary but that we had the wrong strategies or structure and let’s change them and then we’ll be safe. Actually, the strategies and structure weren’t so bad; they’ve been improved; further improvements are likely to have only a marginal effect; and greater dangers may be gathering of which we are unaware and haven’t a clue as to how to prevent.”
Cropping and context
My sunset picture has already puzzled at least one reader. The diagonal line is the top bar of a gate which was wet from the rain. A small pool of rainwater, clinging to the surface of the bar via surface tension, was reflecting the pink cloud. But the picture becomes even more puzzling if it’s cropped to remove the sky — like this. Now it looks as though some strange distorted goldfish is swimming in the pool. The camera may not always lie, but it can be darned enigmatic sometimes.
Why are business books so awful
I thought it was just me. I always get depressed when I pass the ‘business and management’ section in an airport bookshop. How can people write such gibberish? And why would anyone read it? The only explanation I can think of is that most managers spend their entire working lives trying (unsuccessfully) to keep chaos at bay, and delude themselves that if only they could discover The Secret then they will get on top of things. This is a delusion because there is no secret: chaos comes with the territory. But how nice to find the learned Economist weighing in on my side. Quote:
“If you want to profit from your pen, first write a bestselling business book. In few other literary genres are the spin-offs so lucrative. If you speak well enough to make a conference of dozing middle managers sit up, your fortune is made. You can, says Mark French of Leading Authorities, a top speaking agency, make a seven-figure income from speechifying alone.
Given this strong motivation to succeed, it is astonishing how bad most business books are. Many appear to be little more than expanded PowerPoint presentations, with bullet points and sidebars setting out unrelated examples or unconnected thoughts. Some read like an extended paragraph from a consultant’s report (and, indeed, many consultancies encourage their stars to write books around a single idea and lots of examples from the clientele). Few business books are written by a single author; lots require a whole support team of researchers. And all too many have meaningless diagrams.”
The malware problem
The problem of malicious software is the computing world’s equivalent of global warming — except that the timescales are much shorter. The most effective way of doing something about it quickly is to educate computer users so that they become less vulnerable — which is why my colleagues and I have been beavering away on an online course aimed at a non-specialist audience. One of our problems we had was communicating to people how serious the problem is. Here’s a nice opinion piece by Martin Kelly on “The Polluted Internet” which does the job nicely. Here’s a sample:
“If you live in a major metropolitan city where high bandwidth connections are as common as your plain old telephone service, take a look at your firewall and IDS logs. It’s not exciting at all, but you should do it. Compare the results with what you saw even just six months ago. Unwanted packets from worms and trojans are now hitting your network every second. New viruses, old viruses, mutated viruses, you name it. Big worms, fast worms, and worms that have been alive for years, they all reach my firewall and are silently stopped. Nothing new.
The only thing new about this is the magnitude of the problem.
Stare into the light
If you have a cable or DSL modem at home, pause and reflect for a minute as you look into the light. Let me explain.
Take a few short moments to watch the receive light on your modem or unfettered ethernet connection. Here in high bandwidth Canada, that flashing light now flashes almost solid. It’s almost unbelievable. It’s almost all malicious traffic.”
Cloud pool
There was a beautiful sunset tonight after a torrential shower.
Anatomy of a software bug
Anyone who doubts that modern software is unsustainably complex should have a look at this detailed account by Microsoft developer Rick Schaut about how he tracked down a well-known bug in Word. He’s also good on the notion of complexity:
“In this context, ‘complexity’ doesn’t refer to the code itself. Rather, we’re talking about the shear [sic] volume of things the user can do. In Word, for example, we have:
* More than 850 command functions (e.g. Bold and Italic are the same command function)
* More than 1600 distinct commands (e.g. Bold and Italic are distinct commands)
* At any given time roughly 50% of these commands are enabled (conservative estimate)
With just 3 steps, the possible combinations of code execution paths exceeds 500 million.”