Apr 292014
 

The other day, I watched a delightful 30+ year old movie that I never saw before, The World According to Garp. In one scene, the protagonist decides to buy a house after a small airplane crashes into it, explaining that it is unlikely to ever happen again; that house has been “pre-disastered”. (Yes, it’s a logical fallacy, but the scene was still funny.) I think it was this movie that inspired me today, when I finally managed to talk to a human representative at Scotiabank, after being endlessly and needlessly frustrated by a voice recognition answering system.

450px-Sony_Qrio_Robot_2Voice recognition systems infuriate me. I am not alone, and this should come as no surprise. The phenomenon when something that looks, feels (or in this case, sounds) almost, but not quite, human creeps out people is so well known, it even has a name: Uncanny Valley. I am perfectly comfortable with answering systems that ask me to make menu choices by pressing buttons on my phone. Yet I am filled with blind fury and rage by voice response systems that, usually in an overly friendly and syrupy-sweet voice, ask me to explain, in words, what I am calling about. “I WANT TO TALK TO A FREAKING HUMAN YOU STUPID MACHINE!”

Fortunately, my self-control prevailed this morning. When (after stabbing “0” more than a few times with my finger while shouting nonsense, finally convincing the voice recognition algorithm to give up) I was at last connected to an actual (very nice) human lady, I remained polite. However, at the end of our conversation, I could not refrain from asking her to please pass on my request to the Powers That Be at Scotiabank to get rid of this stupid voice recognition system. She agreed that indeed, many customers are annoyed like I was. I commented on the fact that it was usually people like her who become the victims of their callers’ anger… when they arrive, like I did, pre-high-blood-pressured. She laughed so hard… I think I made her day.

As I am writing this, I am thinking that there might be another way to climb out of the uncanny valley: better AI. This is, after all, 2014, the age of self-driving cars and Google Search that knows what you are about to type even before you do. I could easily imagine a voice recognition system that, instead of spoon feeding me instructions like I was mentally retarded, began a natural conversation: “Hello, this is the Scotiabank automated assistant. This call may be recorded for quality assurance. How can we help you today?” (Avoid talking like the caller was retarded. Avoid using “I” because you are not a self-aware person. Speak in a natural voice, not like you were talking to someone hard of hearing, not unless they indicate that they are, in fact, hard of hearing.) If this system could actually carry out a decent conversation instead of being a poorly thought-out replacement of a touchtone menu system, it might work a lot better… and, for that matter, may even reduce the need for human operators as I bet it could respond to many inquiries successfully without human intervention.

 Posted by at 9:09 pm
Apr 102014
 

In light of the latest Internet security scare, the Heartbleed bug, there are again many voices calling for an end to the use of passwords, to be replaced instead by fingerprint scanners or other kinds of biometric identification.

I think it is a horrifyingly, terribly bad idea.

Just to be clear, I am putting aside any concerns about the reliability of biometric identification. They are not as reliable as their advocates would like us to believe, but this is not really the issue. I am assuming that as of today, biometric technologies are absolutely, 100% reliable. Even so, they are still a terrible idea, and here is why.

First, what happens if your biometric identification becomes compromised? However it is acquired, it is still transmitted in the form of a series of bits and bytes, which can be intercepted by an attacker. If this were a password, you could easily change it to thwart an attack. But how do you change your fingerprint? Your retina print? Your voice? Your heartbeat?

Second, what happens if you “lose” your biometric identification marker? Fingers get chopped off in accidents. People lose their eyesight. An emergency tracheotomy may deprive you of your normal voice. What then?

And what about privacy concerns? There have been rulings I understand, in the US and perhaps elsewhere, that imply that the same legal or constitutional guarantees that protect you from being compelled to reveal a password may not apply when it comes to providing a fingerprint, a DNA sample, or other biometric markers.

The bottom line is this: a password associating an account or a service to a unique piece of secret knowledge. This knowledge can be changed, passed on, or revoked, and owners may be protected by law from being compelled to reveal it. Biometric identification fundamentally changes this relationship by associating the account or the service with an unmalleable biometric characteristic of a person.

Please don’t.

 Posted by at 10:27 am
Apr 082014
 

winxp-supportMicrosoft officially ended support for Windows XP today.

I hope someone will sue the hell out of them.

To be clear, I understand why they are doing this: they don’t want to continue supporting forever an obsolete, 14 year old operating system.

But something like one quarter or so of the world’s computers continue running Windows XP. One can argue that Microsoft is not responsible for the behavior of system owners who, for whatever reason, choose not to update their systems. But what about those who do everything right and still become the victims of cyberattacks that utilize networks of unpatched Windows XP computers? The decision to terminate support makes Microsoft a de facto accomplice of these cybercriminals.

My fearless prediction is that within a few months, Microsoft will quietly start releasing high priority security patches for Windows XP again.

Meanwhile, Microsoft began releasing a significant update to Windows 8.1. I noticed that when I updated my Windows 8.1 laptop, it booted directly into the Windows desktop. Wow! Now all we need is a decent Start menu and the ability to perform basic system configuration tasks without going through the touch-optimized “Modern UI” and all will be bliss again. One of these days, I might even upgrade one of my development workstations to Windows 8.1!

 Posted by at 10:21 pm
Mar 112014
 

The computer game Myst is best known as the first “killer game” of the early CD-ROM era. A game that became the reason for many to purchase CD-ROM drives for their computers. A game that was played not just by geeks but by users who never touched a computer game before. Myst remained the all-time best-selling PC game for the better part of a decade.

Myst spawned its own mythology, and a series of three books. It also spawned five sequels, among them Uru, the company’s flawed yet hauntingly beautiful attempt to create a massively multiplayer online game. The final game in the Myst series was Myst V: End of Ages.

The other day, I pulled out my copy of Myst V, mainly to look at the wonderful worlds (or Ages, as they are called in the game) that I visited as a player. Perhaps the most breathtaking is the age called Todelmer. The player lands on top of a massive spire, towering high above the lower atmosphere of what appears to be a moon orbiting a ringed planet. Puzzles involve bringing some of the machinery back to life, reconnecting pieces of an ancient astronomical observatory.


Todelmer seems as beautiful as it was when I first saw it. Too bad it only exists in the imagination.

 Posted by at 7:22 pm
Mar 112014
 

Second Tuesday of the month. Not my favorite day.

This is when Microsoft releases their monthly batch of updates for Windows.

And this is usually when I also update other software, e.g., Java, Flash, Firefox, on computers that I do not use every day.

Here is about half of them.

The other half sit on different desks.

Oh, that big screen, by the way, is shared by four different computers. Fortunately, two of them are Linux servers. Not that they don’t require updating, but those updates do not usually come on the second Tuesday of the month.

 Posted by at 4:07 pm
Dec 092013
 

Here is something new: America’s ever watchful National Security Agency is not content with spying in all the real lands of the world. Their interests also extend to imaginary realms, like the virtual world of Second Life and World of Warcraft.

Ostensibly, their concern is that terrorists around the world might be using online games for secret communication. The idea is not, in fact, new; for what it’s worth, a similar idea exists as a plot device in Margaret Atwood’s superb, dystopian Oryx and Crake trilogy.

So I guess I should count it as a blessing that other aspects of Atwood’s nightmarish future have not become reality yet. Instead of corporatist anarchy, all we have is a benevolent superstate ever more keen on enforcing Pax Americana. And who knows… our freedoms and privacy may be somewhat curtailed in this New World Order, but if the Roman example is any guide, it may be a small price to pay for centuries of stable prosperity.

Anyhow, for what it’s worth, as far as I know there is no spying going on in MUD1/British Legends and MUD2. I can actually vouch for MUD1 personally; I, after all, wrote the code for the current implementation.

 Posted by at 9:23 pm
Oct 112013
 

Is this a worthy do-it-yourself neuroscience experiment, or an example of a technology gone berserk, foreshadowing a bleak future?

A US company is planning to ship $99 kits this fall, allowing anyone to turn a cockroach into a remote controlled cyborg. Educational? Or more like the stuff of bad dreams?

For me, it’s the latter. Perhaps it doesn’t help that I am halfway through reading Margaret Atwood’s The Year of the Flood, sequel to Oryx and Crake, a dystopian science fiction novel set in a bleak future in which humanity destroys itself through the reckless use of biotech and related technologies.

A cockroach may not be a beloved animal. Its nervous system may be too small, too simple for it to feel real pain. Nonetheless, I feel there is something deeply disturbing and fundamentally unethical about the idea of turning a living animal into a remote control toy.

To put it more simply: it creeps the hell out of me.

 Posted by at 11:49 am
Sep 062013
 

So the NSA and their counterparts elsewhere, including Canada and the UK, are spying on us. I wish I could say the news shocked me, but it didn’t.

The level of secrecy is a cause for concern of course. It is one thing for these agencies not to disclose specific sources and methods, it is another to keep the existence of entire programs secret, especially when these programs are designed to collect data wholesale.

But my biggest concern is that the programs themselves represent a huge security threat for all of us.

First, the NSA apparently relies on its ability to compromise the security of encryption products and technologies or on backdoors built into these products. An unspoken assumption is that only the NSA would be able to exploit these weaknesses. But how do we know that this is the case? How do we know that the same weaknesses and backdoors used by the NSA to decrypt our communications are not discovered and then exploited by foreign intelligence agencies, industrial spies, or criminal organizations?

As an illustrative example, imagine purchasing a very secure lock for your front door. Now imagine that the manufacturer does not tell you that the locks are designed such that there exists a master key that opens them all. Maybe the only officially sanctioned master key is deposited in a safe place, but what are the guarantees that it does not get stolen? Copied? Or that the lock is not reverse engineered?

My other worry is about how the NSA either directly collects, or compels service providers to collect, and store, large amounts of data (e.g., raw Internet traffic). Once again, the unspoken assumption is that only authorized personnel are able to access the data that was collected. But what are the guarantees for that? How do we know that these databases are not compromised and that our private data will not fall into hands not bound by laws and legislative oversight?

These are not groundless concerns. As Edward Snowden’s case demonstrates, the NSA was unable to control unauthorized access even by its own contract employees working in what was supposedly a highly structured, extremely secure work environment. (How on Earth was Snowden able to copy data from a top secret system to a portable device? That violates just about every security rule in the book.)

So even if the NSA and friends play entirely above board and never act in an unlawful manner, these serious concerns remain.

I do not believe we, as citizens, should grant the authority to any state security apparatus to collect data wholesale, or to compromise the cryptographic security of our digital infrastructure. Even if it makes it harder to catch bad guys.

So, our message to the NSA, the CSE, the GCHQ and their friends elsewhere in the free world should be simply this: back off, guys. Or else, risk undermining the very thing you purportedly protect, our basic security.

 Posted by at 1:50 pm
Jul 152013
 

What an ugly word: monetization. Never liked it.

I especially do not like it when it comes to games.

When it comes to computer games, my age shows I guess. The first computer game I ever played was an arcade version of Pong. And the first multiplayer world I participated in was British Legends, the Compuserve implementation of the original MUD, or Multi-User Dungeon. Eventually, I started hosting MUD’s successor, MUD2, and when CompuServe shut down British Legends, I began hosting my own port of MUD1 here as well. And for a while, I did charge MUD2 users a subscription fee but that’s just not a viable business model for a small gaming site these days, so eventually we dropped all such fees.

In any case, subscription fees are not what come to my mind when I think about game monetization. It is more insidious ways to compel players to cough up hard earned money.

And now I came across an intriguing article that offers a thorough review of several monetization tricks and schemes. The basic idea is to compel players to purchase in-game add-ons, “power-ups” and other improvements, and pay ever greater amounts as they progress through the game.

Of course it cannot be done as blatantly as that. As the article explains, a good monetization scheme does not destroy the player’s illusion that the game is skill-based. Paying may help a little, or help a player avoid losing prior achievements, but the player’s perception remains that the game is fundamentally rewarding skill, not big spending. Which, of course, is untrue, but the most successful monetization schemes can liberate hundreds of dollars from the pockets of devoted players each month.

I don’t like these schemes. They feel… dishonest. I do purchase the occasional game, both for my phone and for my PC (thanks to GOG.COM and DOTEMU.COM who offer great titles free of DRM). But I never pay for in-game features or upgrades as a matter of principle, and a good thing, too: as the article explains, once you pay, you end up paying more, in part to protect the investment you made earlier by paying real money to help your progress.

 Posted by at 12:42 pm
Jul 152013
 

The NSA engaged in domestic surveillance on a massive scale. It collected information on both foreign nationals and US citizens. It collected large amounts of data indiscriminately. It did so in secret, with little oversight. It did so with the collaboration of major telecommunication companies.

Sounds familiar? Perhaps. But what I am describing is project SHAMROCK, an NSA program terminated in 1975 that collected telegrams sent to or from the United States.

Arguably, the situation is somewhat better today, as the NSA is now under Congressional oversight and it has (supposedly) internal procedures in place to prevent the unlawful use of data that they collect. That is, if you believe their statements. But then, they made similar reassuring statements back in 1975, too, before details about SHAMROCK came to light.

The bottom line, it seems to me, is that governments have the technological means, the capacity, and the willingness to engage in large-scale surveillance of their own citizens. No guarantees against an Orwellian nightmare can come from futile attempts to limit these capabilities. The genie cannot be put back into the bottle. Only the openness and transparency of our political institutions can guarantee that the capabilities will not be abused.

 Posted by at 12:02 pm
Jun 202013
 

I have read about this before and I didn’t want to believe it then. I still don’t believe it, to be honest, but it is apparently happening.

Yahoo will recycle inactive user IDs. That is, if you don’t log on to Yahoo for a period of 12 months, your old user ID will be up for grabs by whoever happens to be interested.

Like your friendly neighborhood identity thief.

Yahoo claims that they are going to extraordinary lengths to prevent identity theft. But that is an insanely stupid thing to say. How can Yahoo prevent, say, a financial institution from sending a password confirmation e-mail to a hapless user’s old Yahoo ID if said user happened to use that ID to establish the account years ago?

That is just one of many scenarios that I can think about for Yahoo’s bone-headed decision to backfire.

And I can’t think of a single sensible reason as to why Yahoo wants to do this in the first place. They will piss off a great many users and likely please no one.

I hope they will change their mind before it’s too late. I hope that if they don’t change their mind, something nasty happens soon and someone sues their pants off.

 Posted by at 11:00 pm
Jun 172013
 

The presumed yottabyte capacity of the new Utah Center of the NSA, about which I commented a few days ago, is still making the rounds on news channels and news cites. Someone calculated that a yottabyte is equivalent to 500 quintillion printed pages. CNN helpfully added that a stack of paper with this many pages could reach all the way to the Moon and back 66 million times.

What they ought to have calculated is the size and volume of 250 billion 4 TB hard drives.

A lighter hard drive weighs about 0.4 kg. 250 billion of them? That would be 100 billion kilograms. Or 100 million metric tons. Or roughly 1000 of the largest cargo ships, each the size of a small city, filled to capacity with hard drives.

A hard drive is about 15/16″ tall. That’s 2.38 centimeters. 250 billion of them? Why, it’s a stack tall enough to reach all the way to the Moon and back 8 times.

The volume of a standard hard drive is about 342 cubic centimeters. 250 billion? That would be just a tad under 0.1 cubic kilometers (8.56 × 107 cubic meters, to be a bit more precise). That would be a field that is a kilometer square, filled with hard drives to the height of a small-ish skyscraper, about 25-30 stories high. Large as the Utah facility is, it’s by no means large enough.

Some might want to point out that if the NSA used flash memory instead, the volume (and also the power consumption) would go way down. True. But the price would go up. Flash memory is still roughly an order of magnitude more expensive than hard drives. So if the NSA wanted to build a yottabyte facility using flash memory, instead of spending 1.5 times the GDP of the entire United States, they’d be spending 15 times that amount. Or roughly three times the “gross world product”, estimated at 83 trillion US dollars.

Perhaps CNN and friends should do a little more math, not just to impress their readers but also to fact check the stuff that they report. Would be nice.

For illustration, I chose a Hungarian bank note from 1946, reportedly the highest denomination ever printed anywhere: it is a 100 quintillion pengő note. It is still far short of a yottapengő: you would need 10,000 of these banknotes. Then again, by the time hyperinflation ended and a new currency (the Hungarian forint, still in circulation) was introduced, the exchange rate was 400 octillion pengős to the forint; that would be 400,000 yottapengős.

 Posted by at 11:39 am
Jun 112013
 

In reaction to the news about large scale NSA surveillance, the new NSA data storage facility currently under construction in Utah has been mentioned frequently. Along with the factoid that this facility will supposedly be able to store a yottabyte of data.

Yottabyte? That is a lot of data. And when I say a lot, I mean A LOT. An incredibly large amount of data. And in this case, I mean “incredible” in the literal sense of the word, as in not credible. Despite the fact that this tidbit even appears on Wikipedia.

A yottabyte is a trillion trillion bytes. A trillion terabytes, in other words.

The largest commercially available hard drives currently hold about 4 terabytes of data. To store a yottabyte, you would need a quarter trillion, or 250 billion 4TB hard drives. That would amount to about 35 hard drives for each living person on the planet.

A 4 TB hard drive consumes about 3-6 W of power. Say, 4 W on average. 250 billion drives would therefore consume a trillion watts of power. Which is roughly the peak electrical power generation capacity of the entire United States. We know that the Utah facility will consume a lot of power, but the figure I’ve seen mentioned in one article was a much more modest 75 megawatts. Which is about one ten thousandths the amount of power I just calculated.

Then there is the price. The retail price of a 4TB drive is a tad under $200 these days. Presumably, they would cost a lot less if purchased in bulk; say, $100 per drive, including power supplies, interface circuits, whatever. So 250 billion 4TB hard drives would only cost 25 trillion US dollars.

That is, more than one and a half times the United States GDP.

However important it is for the United Stasi of America to keep a watchful eye over every citizen of the world, I don’t think a price tag like this is feasible. Indeed, the cost of the facility is a lot less, reportedly around 1.5 to 2 billion dollars. Let me round it up to 2.5 billion; after all, government projects are rarely completed within budget. And let me assume that all that money is spent on data storage. Well… that’s still not a yottabyte. It’s one ten thousandths of a yottabyte. Or 0.1 zettabytes. Or 100 exabytes.

Still a staggering amount, but much more modest. After all, large service providers like Google are already storing hundreds of petabytes, even exabytes of data. And the entire world may already have collected a few zettabytes.

But not yottabytes. Never mind the NSA; the world as a whole is still a long way away from a yottabyte. Probably a couple of decades, even assuming continuing exponential growth in global data storage capacity.

In any case, a yottabyte is an insane amount of data, even for an institution like the NSA. It is sufficient to store about eight years worth of broadcast quality video for each individual living on the planet. Or, if you are content with lower video quality, a complete visual record of the entire life of every living person on the planet could easily fit in a yottabyte.

Besides… is it really believable that the NSA sits on top of a technology that increases the efficiency of data storage by 4-5 orders of magnitude, a factor of 10,000 or more? There are some really smart people working for the NSA, to be sure, but they are not space aliens. Exotic storage technologies may be in the works in storage technology labs, but I suspect that when they become practical and usable, we will first see them in our next generation gadgets, not secret US government data centers.

So no, the NSA is not going to store a yottabyte of data, breathless news reports and the hype notwithstanding. Not even a zettabyte. A few exabytes, maybe.

Which is still a lot. Far too much, in fact, for my comfort.

 Posted by at 12:40 pm
Jun 082013
 

Yes, it’s Orwellian, and this time around, it’s no hyperbole.

The US government apparently not only collects information (“metadata”) on all telephone calls, they also have the means collect e-mails, online chats, voice-over-IP (e.g., Skype) telephone calls, file transfers, photographs and other stored data, and who knows what else… basically, all data handled by some of the largest Internet companies, including Google, Facebook, Skype and others.

Last summer, I decided to revamp my e-mail system. The main goal was to make it compatible with mobile devices; instead of using a conventional mail client that downloads and stores messages, I set up an IMAP server.

But before I did so, I seriously considered off-loading all this stuff to Google’s Gmail or perhaps, Microsoft’s outlook.com. After all, why should I bother maintaining my own server, when these fine companies offer all the services I need for free (or for a nominal fee)?

After evaluating all options, I decided against “outsourcing” my mail system. The fact that I did not want to have my mail stored on servers that fall under the jurisdiction of the US government played a significant role in my decision. Not because I have anything to hide; it’s because I value my privacy.

Little did I know back then just how extensively the US government was already keeping services such as Google under surveillance:

 
 

From the leaked slides (marked top secret, sensitive information, originator controlled, no foreign nationals; just how much more secret can stuff get?) and the accompanying newspaper articles it is not clear if this is blanket surveillance (as in the case of telephone company metadata) or targeted surveillance. Even so, the very fact that the US government has set up this capability and recruited America’s leading Internet companies (apparently not concerned about their reputation; after all, a presentation, internal as it may be, looks so much nicer if you can splatter the logos of said companies all over your slides) is disconcerting, to say the least.

True, they are doing this supposedly to keep us safe. And I am willing to believe that. But if I preferred security over liberty, I’d have joined Hungary’s communist party in 1986 instead of emigrating and starting a new life in a foreign country. Communist countries were very safe, after all. (And incidentally, they were not nearly this intrusive. Though who knows how intrusive they’d have become if they had the technical means available.)

One thing I especially liked: the assurances that the NSA does not spy on US residents or citizens. Of course… they don’t have to. This will be done for them by their British (or Canadian?) counterparts. No agency is breaking any of the laws of its own country, yet everybody is kept under surveillance. And this is not even new: I remember reading an article in the Globe and Mail some 20 years ago, detailing this “mutually beneficial” practice. I may even have kept a copy, but if so, it is probably buried somewhere in my basement.

Meanwhile, I realize that the good people at the NSA or at Canada’s Communications Security Establishment must really hate folks like me, though, running our own secure mail servers. I wonder when I will get on some suspect list for simply refusing to use free services like Gmail that can be easily monitored by our masters and overlords.

 Posted by at 7:17 pm
May 222013
 

Today, the weirdest thing happened on my main desktop computer: the right-click menu of Windows Explorer, as well as the Windows desktop, disappeared. I was also unable to bring up the Properties dialog, even through the menu bar.

The worst part of it is, I could not figure out what happened. A reboot didn’t fix things, nor did an obvious Registry hack (making sure that HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoViewContextMenu is set to 0. For some reason, it was set to 1.) Eventually, I resorted to the big guns and used System Restore (thanks to the fact that I do backups daily, I had a restore point from 2AM this morning) to fix things. Still, it bugs me that something happened that I do not understand.

In comparison with another, mostly identical system, I noted that the other system had no subkeys under the Policies key whatsoever. So I wonder exactly when and how the Explorer and System subkeys were created on this workstation.

And while I was at it, I searched the Registry a little more and found another, possibly relevant entry: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoViewContextMenu. Once again, this Registry value is missing from the other machine, so I wonder how, why and when it was created on this workstation.

This is deeply disturbing. I don’t like mysteries, especially not on a machine that I use on a daily basis. Life is short and one does not need to resolve every mystery, but occasionally, such unexpected behavior can be a sign of a security issue.

 Posted by at 7:02 pm
May 102013
 

So a few weeks ago, I purchased a new laptop. For just a tad over 500 bucks, I was able to get a fairly decent lightweight ASUS machine. Most importantly, it is a machine equipped with a touch screen, allowing me to experience Windows 8 as intended by its designers.

And I really gave it a try. During my recent trip to Europe, I took this laptop along. And, I made it a point not to install software such as a replacement Start menu; I wanted to experience Windows 8 exactly as its designers intended.

What can I say? I am not impressed. The way the world of Microsoft’s “Modern UI” is grafted onto Windows just feels… well, it feels like a kludge. The apps are not bad but they leave a lot to be desired. The built in mail app crashed on me countless of times, and even when it was working, it was rather finicky when it came to synchronizing IMAP folders. The built in Skype app crashed on my countless of times, and even when it was working, it was often stuck in a disconnected state, with no obvious means to initiate a reconnect. Windows itself boots up very quickly, which is a good thing, but unfortunately I needed to reboot it more often than I should have: that is because Windows 8 sometimes just went berserk, for instance during a perfectly ordinary network copy operation that locked up so bad, I had to hard reset the machine to recover from this failure. Simply put, I am not used to having to reboot a modern operating system regularly as a means of recovering from trivial malfunctions.

When things worked, they worked fine. The mail app is actually quite decent. The gestures, one can get used to (again, a touch screen helps a lot.) The laptop played nice with my Bluetooth headset, which made Skype a pleasure to use (when it worked.) Nonetheless, I kept missing the Start menu, and I kept missing the Aero glass interface.

When I finally got back home, sitting down in front of my trusty workstation that runs Windows 7, it actually felt like I was finally using a “proper” version of Windows as opposed to a downgrade or older edition. This is not supposed to happen. Even with Vista, one may have felt that it was misguided in many ways, but it did feel like an upgrade of Windows XP. Windows 8 does not feel like an upgrade of Windows 7. Quite the contrary.

I will continue to use my new laptop, as I have gotten quite fond of this machine. It was very good value for the money. (Finally I have a laptop weighing less than 4 pounds that has zero trouble playing back an ISO image of a Blu-Ray disc and has enough battery power for a feature length movie.) And I don’t really mind Windows 8. It’s just… it’s just… just silly.

 Posted by at 10:46 pm
Mar 242013
 

Here is one of our four cats, Kifli. (Literally, his name means croissant in Hungarian. How did he get this name, you ask? Well, when we got him back in 2001, he was only a few weeks old and he and his brother Szürke actually fit on the palm of my hand, both of them together. Szürke is a gray tabby and perhaps somewhat unimaginatively, that’s exactly what his name means in Hungarian; gray, that is. Kifli has the color of a freshly baked bun, but when he was little, Kifli was very thin and did not look like a bun at all. In Hungarian bakeries, the two most common small bakery products are buns and croissants; not the puffy French type made from leavened dough, but croissants baked from the same dough that is used to make white bread and, well, buns. These croissants are long and thin, just like Kifli. Hence, his name.)

Anyhow, I was testing out an Android photo editing app (PicsArt, in case you’re wondering; seems like an excellent app, by the way) tonight when I snapped this picture of Kifli and applied one of the app’s effects. I think it’s real nice. And while it’s not so nice that Kifli jumped onto a table that he’s not supposed to be on, I certainly approve of his reading choices.

 Posted by at 8:39 pm
Mar 202013
 

I thought my server would break some record in the coming months, perhaps running up to two years without a restart.

Alas, that will not happen: we received notice from Ottawa Hydro that they will be doing maintenance tomorrow morning and our power will be shut off for a while. The duration (3.5 hours) is way more than what my server’s UPS can handle.

Oh well. It was nice while it lasted:

$ uptime
21:30:33 up 582 days,  2:02,  4 users,  load average: 0.85, 0.51, 0.55

 Posted by at 9:32 pm
Mar 102013
 

I am getting close to breaking some of my records here. My main server has now been up 70 days longer than the planned trip to Mars:

There really was no need to reboot, and there won’t be any unless a) there is a critical patch to this version of the Linux kernel, b) I decide to carry out a planned upgrade to Slackware 14.0, c) the system crashes, d) the hardware fails, or perhaps most likely: e) I decide to bring down the server in order to remove a few pounds of cat hair, dust bunnies and whatever else may have accumulated in its case over the course of 19 months.

 Posted by at 2:25 pm
Feb 212013
 

I have been password protecting my smartphone ever since I got one, and more recently, now that Android supports encryption, I took advantage of that feature as well.

The reason is simple: if my phone ever gets stolen, I wouldn’t want my data to fall into the wrong hands. But, it appears, there is now another good reason: it seems that at least in Ontario, if your phone is password protected, police need a search warrant before they can legitimately access its contents.

Privacy prevailed… at least this time.

 Posted by at 3:21 pm