Boosting the disruptive signal

Boosting the disruptive signal

According to the “NYT”, a start-up in California has found a way of harnessing phased-array antennae technology greatly to extend the range of WiFi coverage. The formal launch of the technology is scheduled for next week, but there won’t be products until Q1 2003. That’s assuming it’s not vapourware, of course.

Saddam’s inbox

Saddam’s inbox

Thanks to Gerard de Vries for a link to an International Herald Tribune article about how a journalist from Wired hacked into Saddam’s inbox. How did he do it? Why by the old trick of guessing that the password for press@uruklink.net (Saddam’s email handle) would be — wait for it — ‘press’. Lots of interesting stuff in there, including messages from Western companies offering their assistance to the Butcher of Baghdad. But it seems that he doesn’t check his email all that often — the box had reached its quota and begun bouncing messages! Sigh. Poor ol’ Dubya will just have to pick up the phone. Or send his opposite number a message by cruise missile.

Microsoft’s er, ‘generosity’ spurned by Namibia

Microsoft’s er, ‘generosity’ spurned by Namibia
Register story.

“The African nation of Namibia is large in area and small in population with considerable distances between communities. Imagine the challenges of getting its schools wired to the Net. SchoolNet Namibia, a chiefly volunteer organization, struggles to do precisely that with a free ISP and numerous other initiatives to get the nation’s schools, many of which lack any library resources at all, on-line.

Imagine the pleasure with which SchoolNet would initially have confronted a charitable overture from Microsoft involving free software. Now imagine the disappointment of learning that accepting the ‘gift’ would entail outlays of money in the range of fifteen times the value of the M$ Trojan horse….”

The weakest link in computer security — as ever

The weakest link in computer security — as ever
Economist piece.

No — it’s not your Microsoft operating system (though of course that also figures in the calculation). It’s humans. In one survey, carried out by PentaSafe Security, two-thirds of commuters at London’s Victoria Station were happy to reveal their computer password in return for a ballpoint pen.

Jeffrey Rosen on the Eldred case

Jeffrey Rosen on the Eldred case

Interesting and insightful commentary on Larry Lessig’s case against the CTEA. “In Congress, defenders of the CTEA came up with only one argument for how the act might promote creativity. They testified that the act could encourage major studios to digitize hit films from the ’20s and ’30s by extending their economic value. But this argument is not convincing. As the head of The Hal Roach Studio–the leading restorer of Laurel and Hardy and other films from the ’20s and ’30s–argued in a principled brief that clashed with his financial interests, the CTEA extends the copyright for 19,000 films made between 1923 and 1942. Of these, only 5,000 continue to earn royalties, which means that the remaining 14,000 have little economic value but are of great historical interest. Many of these are “orphan” films whose copyright holders are very difficult to track down today. The CTEA makes restorations of such films economically prohibitive by requiring nonprofit restorers to hire private detectives to track down the lost copyright holders for the music, the credits, and so forth. As a result, the orphan films will continue to rot unwatched in the Library of Congress. And even if the CTEA actually did increase the incentive to restore these films, as Congress unconvincingly concluded, the preservation of 14,000 films hardly justifies the removal of more than 400,000 other creative works–books, poems, songs, and photographs–from the public domain. ”

Meshing the future

Meshing the future

I’ve been reading an advance copy of a DEMOS paper, “The Politics of Bandwidth”, and pondering the phenomenon of disruptive technologies. For me, WiFi (or 802.11b networking) is a classic example. But its true disruptive potential has yet to be revealed — which is why mesh networking is so interesting. The neatest thing about the mesh idea is that the more devices there are, the better the service gets. Much better than 3G.

Daft corporate names department

Daft corporate names department

After Accenture, here comes KPMG Consulting’s new moniker: “Bearing Point”. Eh? It’s a post-Enron byproduct of the scramble to disengage KPMG’s consulting arm from its auditing wing. But you’d have thought that an outfit which is supposed to have a high collective IQ could come up with something more inspired.

Root Servers under attack

Root Servers under attack

According to this report, nine of the 13 Root Servers came under sustained DoS attack last Monday. Details are sketchy, for obvious reasons. Here is the Washington Post account, which claims that all 13 servers were attacked and that there was more than one attack. The Register has the most detailed report. “In a distributed denial of service attack that began 5pm US Eastern time Monday and lasted one hour, seven of the 13 servers at the top of the internet’s domain name system hierarchy were rendered virtually inaccessible, sources told ComputerWire.”

“It was the largest and most complex DDoS attack on all 13 roots,” a source familiar with the attacks said. “Only four of the primary 13 root servers were up during the attack. Seven were completely down and two were suffering severe degradation.”

The source said each of the servers was hit by two to three times the load normally born by the entire 13-server constellation. Paul Vixie, chairman of the Internet Software Consortium, which manages one of the servers, said he saw 80Mbps of traffic to the box, which usually only handles 8Mbps.