RSS

Category Archives: technology

I don’t need those ads anymore… I already bought that!

This will be short rant.

While I was reading the New York Times I was served an ad for tires for my car from Town Fair Tire.

I was served this ad because well over a week ago I was searching for tires and in particular BF Goldrich dealers… because my BF Goodrich Traction TA radials died a premature life and my warranty said I needed a dealer to inspect them before I could get compensated.

The problem is that I bought the replacement a week ago.

There are two things I am absolutely certain of:

  1. I am not the first person to comment on this stupid behavior of the system.
  2. It is mostly impossible for web based ad servers to automatically know what I bought.  This isn’t strictly a technical problem.  I’m sure that it would be technically possible to create an opt-in service such that consumers would give their permission for the credit card company to push transaction data to web advertisers.  The only problem is the people part: who in their right mind would tell an advertising firm what they are buying?

I’m quite sure that this has been proposed, but why can’t ads have a “I bought that already” button so that more relevant ads would be served up?  I’m just asking…

Advertisements
 
2 Comments

Posted by on February 12, 2012 in advertising, business model, privacy, technology

 

IT, users, tools, and machine shops

I was reading the article “Bring your own apps: The new consumer threat to the CIO” on TechRepublic this morning.  I had to chuckle.

The lead sentence,”The CIO’s control over workplace IT is gradually slipping away as today’s digitally-savvy workforce have decided they want to call the shots when it comes to the technology they use at work,” could have come out of a Computerworld from 1983.  The IBM PC had been released in 1981 and in January of 1983 Lotus 1-2-3 allowed users to take IT into their hands.

Backing up, historically speaking, we find:

“There is no reason anyone would want a computer in their home.” — Ken Olson, president, chairman and founder of Digital Equipment Corp., 1977, and

“I think there is a world market for maybe five computers.” — Thomas Watson, chairman of IBM, 1943.

(both courtesy “Bad Predictions”)

What does this “history repeating” moment tell us?

It has always been about users, taking what’s available to get what they need, when they need it, the way they need it. Technology is not an end onto itself.  Technology is a tool to get something done.

And, ultimately, isn’t how we make, use, and improve our tools fundamental to our humanity?

It has been said that IT departments should be tool-chests for users.  I’d argue that they need to be more like a  machine shop, allowing users to craft their own tools.  IT departments need to furnish the nuts and bolts of their enterprises and the tools to use those parts to fabricate whole new tools.

I think we need to stop clinging to old models. We talk about mashups with its throwback to the term “lash-up” which Merriam-Webster defines “as any improvised arrangement for temporary use.” To use this term actually belittles the activity: it implies that mashups are put together until IT comes up with a more permanent solution.  Actually, mashups are a tool-defining activity onto themselves: users getting what they need, when they need it, the way they need it. Let’s give credit where credit is due: the user!

 

Tags: , , , , ,

Google can’t afford to sell people’s personal data

You can’t believe the number of people that have asked me about what I think about Google’s new privacy policy.  I’m sure this might not attract a lot of fans, but here’s my take:

  • Plenty of other media sites already integrate tracking of people’s experiences across their offerings on the web.  Google goes out of its way to actual say they are going to do this… and they get criticized.
  • I know of plenty of commercial and educational sites that use Google Apps as the foundation for their business.  I personally know a well regarded security expert at one of the world’s largest medical supply companies that conducted a security and privacy review of Google Apps.  The fact this company now uses Google Apps is a testimony in itself.
  • If a company shares personal data inside the company (say, for example, Verizon sharing people’s wireless and FIOS usage inside of itself) is it really a breach of privacy?  When Verizon does this, they call it bundling and its customers save money.  When Google does this, it is called evil.

I hear now that members of Congress want to call Google before it again because of this issue. I’m not sure this is the best use of their time with lots of other important issues before it… and I’ll leave it at that.

More than anything, I think this fear is about the fact the Google is very big.  I can’t remember which of the talkshows I recently heard this on, but the observation that was made was that right now, Americans fear anything that is big: big government or big business. We fear that which we do not understand.

My fourth and most important bullet is this:

  • Google has reiterated (though some seem not to hear it) that it still isn’t going to sell  personal data.  And do you know why they won’t sell personal data? Because if they were caught selling personal data, it would destroy their entire business model. Not selling personal data is good business for Google. Let’s be real clear about this: if Google were selling people’s personal data, no one would use Google.  If no one used Google, there would be no way it could sell advertising.  Google is making plenty of money without selling people’s personal data.  The bottom line is simple: Google can’t afford to sell people’s personal data.
 
 

Tags: , , ,

When “new stuff” is decades old

Of course, this is just going to be the rantings of an old fart… but I guess that’s part of the reason to have a blog, right?  To rant?

Geek alert… this is going to be a bit technical.

The other day we were discussing the need to move an internal website from a rough and tumble, less-than-actively-supported environment to something more mainstream (as in, supported by IT).  I reflected that if the prototype environment was contained to single disk partition, it would be relatively easy to make a virtual image of it and move it to a supported VMware server and run it intact. (Translation: if the website was on a single disk drive, we could copy that disk drive to a file, which could be used by a piece of software to simulate a real computer).

The response I got was to the effect “yeah, that would work and wow do you know your stuff!”

I had to chuckle.  Virtualization, the process of having a real computer simulate one or more computers, has been around since 1967 when IBM created an operating system called CP-40 (and later, CP-67).  I first encountered virtualization more than a decade later when in 1979 I was a system programmer working at Hewlett Packard in their mainframe data center. I was responsible for installing IBM’s then current virtualizing operating system, VM (for virtual machine) on HP’s multi-million dollar Amdahl mainframe.  At that time HP only had one mainframe (hey, they cost a lot of money, even for HP) and if a systems programmer wanted to try out a change to the operating system, you’d need to come in on the weekend for the few hours that the data center wasn’t running. By installing VM, we could run two simulations of our physical mainframe.  One would run our production operating system, and allow business to carry on as usual.  The other we could use to test new versions of the operating system.  No more weekend testing!

Later, as I started to develop PC software, I watched how Intel added capabilities of their microprocessor chip.  By the time Intel announced the 80386 version of their microprocessor chip in 1985, they had added everything needed so that it could simulate multiple computers using virtualization. It wasn’t until 1998 that VMware was formed and created the first software to virtualize the PC.

Being a virtualization affectionado I’ve been experimenting and using VMware’s software since 2001. This included (and still includes) running their Mac OS X specific version, Fusion, on my Mac Book Air.  For those that are PC-only literate, Fusion allows me to run Apple’s Mac OS X operating system AND SIMULTANEOUSLY run Windows 7 on my Mac Book Air.  I can readily switch between the two environments, including cutting and pasting (a version of which had been present in IBM’s VM mainframe operating system in the early 1980’s).

VMware is not the only company that provides virtualizing software.  There are even open source versions.

So, referring back to the comment that set this off… yeah, I know this stuff.  Been there, done that… and even in more than one environment.

But I think the bigger picture is this… in any maturing industry, great ideas are going to be reused.  I’ve watched from a point where computers were so expensive that everyone had to share to a point where computers are so cheap everyone has one (or more!). I’ve watched the data move from that centralized model, where all the data is in one place, to a decentralized model (first with distributed minicomputers and later PCs on local area networks) and now back again… to the “cloud.”

Likewise, social media has its roots in technology that was created in the earliest days of computing.  In the earliest days there was commercial systems like Compuserve, but even before Compuserve there were systems such as Douglas Engelbert’s NLS demonstrated in 1968. Oh, by the way, Engelbert demonstrated the mouse at the same time as part of the user interface to NLS.

Business models need to take this phenomena into account.  Not only do you need to be aware of the side attacks that Clayton Christensen talks about in “The Innovator’s Dilemma,” you need to see where yesterday’s solutions might once again solve the problem’s your product is solving today.

You’ve heard it before: history repeats itself.  Unfortunately, I think some technology companies think they are immune from that law. They are not. And there is nothing more embarrassing than to lose to the past.

Oh, and if you are looking for an industry to model where the past is new again, look west to Hollywood and east to Broadway.  They’ve realized this and profited from it for years.

 
 

Tags: , , , , ,

OpenDNS & DNSCrypt – Cool new security for the web

I’ve got to hand it to the folks at OpenDNS… they are really, really, smart cookies.

I think Clayton Christensen would be proud. They took a pretty mundane job that needs to be done, reliable domain name services (DNS), and have created the number one DNS service on the internet.  They are so big, it is difficult to see a competitor trying to come after them.  In fact, one has to wonder why Google didn’t think of this… and why they aren’t competing.

DNS is the internet service your computer uses to find servers on the web.  When you type in “www.google.com” into your browser, the network software in your computer sends it to a DNS server which returns a numeric IP address.  Think of DNS like a phone book: you search for a name and end up with a phone number.

All internet service providers (ISPs) provide DNS services.  Unfortunately, while DNS is very important to the proper operation of their network, they really don’t spend a lot of time optimizing it.  What does that mean to you?  Slow lookups… which means it takes longer to get to the website you want to view.

OpenDNS solved that by creating a really, really, REALLY fast and reliable DNS.  It is likely that if you change your computer to use OpenDNS, you will have a faster browsing experience.

Best of all, OpenDNS is free.

But the folks at OpenDNS didn’t stop there.  They added things parental controls and usage monitor. Doing it in a DNS server is the perfect place to do it, instead of each computer, because it is centralized in “the cloud.”

What is OpenDNS’s economic incentive to do this?  Just like Google sells information about the click throughs that occur when people search on Google, OpenDNS sells information about who is looking up which websites when.

Additionally, OpenDNS sells premium DNS services to large organizations like BP and Eastern Mountain Sports.

Now OpenDNS has created DNSCrypt.  What’s that and how does it make them money?

Well, when your computer talks to a regular DNS, it does so in a very trusting manner.  DNS was designed for an internet where the network was completely trusted: when a computer wishes to be directed to a computer at a specific numeric IP address, it was assumed the network would reliably and truthfully directed you to that computer.

Unfortunately, when your computer is in the wild, such as on a WiFi hotspot, your computer may not be on a trustworthy network.  The network can actually intercept requests going to a DNS server and provide nefarious responses.

For example, let’s say your computer is asking to go to http://www.your-banks-website.com and you are using your computer on a bad guy’s WiFi hotspot (or a good hotspot that has been hacked).  The evil network can imitate the DNS your computer was trying to use and direct it to a bad guy’s website that looks like your bank’s website.  Then all the bad guy’s website needs to do is simulate the login page of your bank.  You’ll enter your userid and password, they’ll save it, and then pass you to the bank’s website.  It might appear as if you’ve typed the wrong password, so once you are at the legitimate bank’s website, you’ll be prompted again, and this time login into your bank’s website. You won’t even know your userid and password have been compromised.

(You might ask about the lock icon in the status line of your browser and why that can’t be trusted.  Most people don’t even pay attention to the lock icon anymore, and that can be hacked, too, for lots of other reasons we won’t go into here.)

The bottom line is the bad guys can trick your computer into tricking you to give up your userid and password. This is called man-in-the-middle attack.

What DNSCrypt does is this: it causes your computer to only use a DNS server if that server can speak a secret language.  In more technical terms, it encrypts all the requests flowing from your computer to a DNS server.  Since this is encrypted, the bad guys can’t get in the middle and pretend to be a DNS.

What is the business opportunity, then for OpenDNS by providing DNSCrypt?  By providing DNSCrypt, more people will use OpenDNS, resulting in more websites being looked up by OpenDNS, and resulting in more information for OpenDNS to sell.  In fact, one could see a day virtually everyone who has a mobile device uses DNSCrypt and by extension OpenDNS.

Honestly, you got to love these folks… this is brilliant way to make money, much in the same brilliant way that Google makes their money.  Given what OpenDNS has accomplished already, I see them being right up there with the significant web businesses in the future. Further, I’m convinced they’ve got a bunch of other cool money making ideas up their sleeves.

OpenDNS-a company to watch.

 

Technology is no longer an ends onto itself

Once upon a time, I was a very early adopter.  I had the first IBM PC, HP’s first DOS laptop (I actually wrote communications software for it under contract to HP), the first Palm, the first smartphone, and the list goes on and on.

There was a lot of personal satisfaction in taking on new technology and making it my own.  In one case, a MIDI tone generator from Yamaha (that’s a box that makes musical sounds under the control of a computer), I actually had to write the Windows device drivers for it to work on Windows

You see, Yamaha had built the device for Macs and didn’t believe it could be made to work on Windows. They thought the Windows operating system was too slow  I said that it could… if you knew what you were doing.  They gave me the device and when I got it working, I sold the device drivers to them.  Yamaha was happy, their product was now Windows compatible.  I was happy: I got some money and a really sweet tone generator that worked on Windows.  A few years after that, I saw my software operating the tone generator at Disney World and the Smithsonian.

(For the geeks out there: I had to write a significant part of the device driver in assembly language and do some low level buffering directly in the interrupt handler.)

But, today, thinks are different for me.

For example, let’s talk about tablets.  I’d really love to have a tablet but, as great as even the iPad is, it will not replace my Mac Book Air.  I need a serious OS and a keyboard.  I would, however, love a tablet to replace the 5×7 notepad I carry with me to take notes.  So, I’ve been looking and waiting for a notepad that is really suitable for that.   But I’m not buying a tablet without it being the right size (a seven inch), the right weight (should approximate my current paper notepad and the leather portfolio I carry it in), and with a dependable OS. I’m really hoping that might be the Samsung Galaxy Tab 7.7.  We’ll see.

Likewise, I think I’ve pushed my HTC Incredible smartphone as far as it will go.  The Gingberbread 2.3 upgrade now causes HTC’s Sense UI to reload every time I use the browser.  From what I read, the Android 4.0 Ice Cream Sandwich (ICS) is a superior architecture… but the only phone with ICS now is the Samsung Nexus, which is said to have battery life problems along with reception problems (similar to the iPhone 4’s “AntennaGate”).

(By the way: I’d love an iPhone if it only had some sort of AUDIBLE missed call reminder like virtually every other cell phone in the market has).

The point is that I’m in a place where new technology actually has to bring me more value than just being new technology. And I am less tolerant of compromising with problems just to have the latest. I’m not sure if that’s a sign of my maturity or the demands we all place on more mature technologies.

That being said… I’ve seriously got my eye on the Lystro camera….

 
Leave a comment

Posted by on January 29, 2012 in technology

 

Tags: , , , , , , ,

The Phaedrus

The Phaedrus is a discussion between Socrates and Phaedrus as recorded by Plato.  I found this portion referenced in a comment to the New York Times article “The Dilemma of Being a Cyborg” by Carina Chocano.  The article is a worthy read as well.  I found it interesting that already back in Plato’s time, there was a concern that memory would be eroded when it was offloaded to secondary storage (such as the written word).
The article speaks to being human is to forget, something we all do, and to reminisce. We generally do this gracefully, over time.  When we entrust our memory to a device and the device fails, we lose our memories completely all at once, something that is out of our normal context. 
The commenter to the article mentioned that this was not a new thought… that Plato had recorded it a long time ago…

Socrates: At the Egyptian city of Naucratis, there was a famous old god, whose name was Theuth; the bird which is called the Ibis is sacred to him, and he was the inventor of many arts, such as arithmetic and calculation and geometry and astronomy and draughts and dice, but his great discovery was the use of letters. 

Now in those days the god Thamus was the king of the whole country of Egypt; and he dwelt in that great city of Upper Egypt which the Hellenes call Egyptian Thebes, and the god himself is called by them Ammon. To him came Theuth and showed his inventions, desiring that the other Egyptians might be allowed to have the benefit of them; he enumerated them, and Thamus enquired about their several uses, and praised some of them and censured others, as he approved or disapproved of them. 

It would take a long time to repeat all that Thamus said to Theuth in praise or blame of the various arts. But when they came to letters, This, said Theuth, will make the Egyptians wiser and give them better memories; it is a specific both for the memory and for the wit. Thamus replied: O most ingenious Theuth, the parent or inventor of an art is not always the best judge of the utility or inutility of his own inventions to the users of them. And in this instance, you who are the father of letters, from a paternal love of your own children have been led to attribute to them a quality which they cannot have; for this discovery of yours will create forgetfulness in the learners’ souls, because they will not use their memories; they will trust to the external written characters and not remember of themselves. The specific which you have discovered is an aid not to memory, but to reminiscence, and you give your disciples not truth, but only the semblance of truth; they will be hearers of many things and will have learned nothing; they will appear to be omniscient and will generally know nothing; they will be tiresome company, having the show of wisdom without the reality.

 
Leave a comment

Posted by on January 28, 2012 in humanity, technology, thought

 
 
%d bloggers like this: