Aug 012018
 

Over the years, I ended up with several Microsoft accounts, and it is a mess. Here is how it happened.

I had a Microsoft account since time immemorial, associated with my personal e-mail. I had my MSDN subscription under this account.

I also had a Hotmail account since time immemorial.

I had a Skype account since time immemorial, too, associated with my personal e-mail. I used my standard, preferred username as my Skype name.

The Hotmail account became an Outlook account once Microsoft acquired Hotmail and created outlook.com. Thus, this became a separate Microsoft account. My standard, preferred username became a Microsoft Live ID.

So here is what I wanted to do at one point: I wanted to use my personal e-mail as my Office 365 and SharePoint online login. But for reasons I no longer remember, there were obstacles along the way. To resolve this problem, I first moved my MSDN subscription to my Outlook account. I then changed my old Microsoft account to be identified not by my personal e-mail but by my Gmail address. This freed up my personal e-mail address to be used as an Office 365/SharePoint online user account.

But then, one day when I was trying to use Windows 10 Quick Assist to offer assistance to someone, the software told me that I need not only to log on to Microsoft, but associate my account with my Skype account. OK, I’ll bite the bullet, I said… and associated my original Microsoft account (now under my Gmail address) with Skype.

And now I am having a problem. Skype tells me that my account has two aliases: The Gmail address and my standard username. But if anyone sends a contact request to my standard username, I get nothing. Today, I figured out why: these requests go to my other Microsoft account! (The one I never used with Skype.) Presumably it’s because my standard username also happens to be my Microsoft Live ID.

Curiously, if I actually log on to Skype using my standard username, I get connected to my Gmail-associated Microsoft account (which is what I want.)

Needless to say, there is no option to merge two Microsoft accounts. There is no option to unmerge a Microsoft account and a Skype account either. I cannot even add my old personal e-mail address as an alias to either of my Microsoft account; presumable because it is now set up as my Office 365/SharePoint online user account, I receive an error message indicating that a “work or school” e-mail cannot be an alias.

As far as I am concerned, this is an unholy mess. Just writing down what happened made my head spin a little. And I really wish I didn’t have to waste a good two hours of my life earlier this morning simply to get to the bottom of it all. (It all began when I made an unsuccessful Skype-to-landline call to Hungary and tried to call again using Skype on my mobile; the software, having updated itself, asked me to log in, and inadvertently, I logged in with the wrong ID. Bad idea, which I eventually remedied by shutting down Skype, deleting all Skype data on the phone, and then restarting Skype and starting all over again.)


As a reminder to myself, here is an excellent page that explains the difference between Microsoft and Office 365 accounts.

 Posted by at 7:28 pm
Jun 162018
 

When I was a teenager, the classic novel, The Count of Monte Cristo by Alexandre Dumas, was one of my favorites.

And one of my favorite chapters in that book was a chapter with an uncanny (not to mention unusually long) title: “How a Gardener May Get Rid of the Dormice that Eat His Peaches”. In it, Dumas describes a classic hack: exploiting the human in the system. By bribing an operator of France’s early optical telegraph network, the book’s protagonist is able to plant a false message, which ultimately contributes to the downfall of one of his mortal enemies. In short: a targeted cyberattack on a telecommunications network.

What I did not know, however, is that this chapter may have been inspired by real life events. About ten years before Dumas published his novel, the brothers François and Louis* Blanc managed to hack the telegraph network in a manner even more sophisticated than the hack described in Dumas’s book. Yes, the real-life hack relied on bribing operators, too, but it also involved a case of steganography: inserting a coded message that would piggyback on the original telegraph transmission. Not only did the scheme succeed, like any good hack it remained in place and undetected for two years. And when it was finally detected, the Blanc brothers were charged but never convicted; there were, after all, no laws on the books back in the 1830s against misuse of data networks.


*Well, that’s what Wikipedia tells me. It appears that the twins are misidentified as Francois and Joseph in several English-language publications. Francois was later known as The Magician of Monte Carlo, a casino that he owned and where he first introduced the single-0 style roulette wheel.
 
 Posted by at 7:52 pm
Apr 142018
 

Yesterday, we said goodbye to our old car, a very nice Honda Accord that served us faithfully for four years.

The lease expired, so we opted to lease a new one. Another Honda Accord. (Incidentally, 2018 marks the 30th year that I’ve been purchasing Hondas, from this very same dealership.)

The old car was nice. The new car… Well, it’s amazing what even four years can mean these days when it comes to vehicle automation.

The level of automation in this vehicle is amazing. It can start itself, it can steer itself. It has full situational awareness, with radar all around. Apparently, it even monitors the driver for alertness (I’ll have to read up on exactly how it accomplishes that.) During the short drive home, it once applied the brakes when its adaptive cruise control was on and someone moved into the lane ahead of us. It was braking a little harder than I’d have preferred, though. And at one point, as the lane markings were a little ambiguous, it gently resisted my attempt to depart from what it thought was the correct lane.

In principle, it appears, this car has all the components for it to be fully autonomous, except that perhaps its array of sensors is not sufficient for it to be fully safe. But really, the only thing missing is the software. And even the way it is, it is beginning to feel more like a partner in driving than a dumb machine; a partner that also has a well-developed instinct for self-preservation.

Welcome to the future, I guess.

 Posted by at 9:54 pm
Nov 102017
 

I’ve seen several news reports commenting on the fact that Donald Trump was using Twitter while visiting China. That despite the fact that Twitter is one of those Western services that are blocked by China’s “Great Firewall”. Some even speculated that Trump was using a military communications network or some other exotic technology to circumvent Chinese restrictions. (As if the US military was foolish enough to let this idiot of a president’s unsecure smartphone access their network.)

But reality is much more mundane, as I know quite well from personal experience in China.

When you are traveling with a phone registered to a foreign service provider, your Internet connection initiates from that provider’s network. So insofar as the Internet is concerned, you are not even in China. Your connection initiates from your home country. In my case, whenever I used my phone in China for Internet access, I accessed the Internet from an IP address registered with my Canadian cellular service provider, Rogers. I had unrestricted access to Google, Facebook, CNN and other news sites, with no Chinese restrictions.

Trump probably did exactly what I did, except that he probably worried about international data roaming charges and data caps a little less than I. He grabbed his phone, turned it on, and used it without a second thought. (OK, that’s not exactly like me. Trump was probably not surprised to see Twitter work on his phone in China, because he probably knows very little about the Great Firewall. I was mildly surprised myself, especially as I went there prepared for the worst, with multiple overt and covert VPN options prepared just in case I needed them. Which I did… but only when I was using the hotel Wi-Fi instead of the cellular network.)

 Posted by at 9:21 am
Sep 262017
 

Lately, I’ve been spending my free time playing post-apocalyptic computer games. Most recently, Fallout New Vegas, from which this screen shot of a full moon rising is taken.

I’ve now played a couple of Fallout games, the two Metro games and the S.T.A.L.K.E.R. game trilogy. Sure there are some common traits but these games are nonetheless quite different. Yet they all have their poetic moments.

The Metro games left the deepest impression on me, to be sure. The characters in these games were perhaps the most realistic, their despair as they clung to life in the tunnels of the Moscow metro under a dead city, almost tangible. S.T.A.L.K.E.R. was something else… for starters, these were games set not in a dead world, only a dead zone in a world that was otherwise alive and well, presumably. And then, Fallout 3 and Fallout NV. When I began playing Fallout 3, I thought that the game lacked soul. Soon, I realized how wrong I was. While the message of the Metro games was that often, it was more satisfying to be merciful (indeed, you can pretty much play through both games without ever killing a human), the message of Fallout is that often there are no good options, only a choice between bad and worse. Killing bad guys or monsters is easy. Killing good guys because they must die for the greater good… Not the choice I’d care to make in real life.

 Posted by at 5:50 pm
Sep 252017
 

Today is September 25. In one of the coldest capital cities in the world. Yet this is the temperature according to the weather monitor gadget on my desktop (but also according to the thermometer on our balcony):

Yes, 3233 C. Or 9091 F for my American friends. The record for this day? A little under 30 C.

No, it does not feel like autumn at all.

On an unrelated note, yes, I do like to use desktop gadgets on Windows 10.

 Posted by at 3:38 pm
Sep 122017
 

I have an old (11 years, to be precise) Konica-Minolta magicolor 2450 laser printer, with the duplexer option.

The quality of this printer’s output is superb, but mechanically, it was never perfect. Just a few weeks after I purchased it, it stopped printing. Faced with the prospect of having to return a 20+ kilo monster, I figured I’d take my chances and look for the cause; after partially disassembling the printer and re-seating some internal mechanical parts, it started printing again.

It worked for many years, but it was becoming rather unreliable. Sometimes, the output was shifted down from the top margin. Paper jams became frequent. It started to fail in mysterious ways, such as complaining that a toner cartridge was missing. Eventually, it stopped printing altogether; every attempt resulted in a paper jam, as the last set of rollers, responsible for pulling the paper out of the printer, no longer worked.

I bought another printer in the meantime, so I retired the mc2450. But I loathed the idea of turning it into e-waste or sending it to a landfill. Today, I decided to take one final look at this fine machine, to figure out what could possible be wrong with its mechanism.

Eventually, I stumbled upon a set of YouTube videos, which offered advice about cleaning some solenoids. Say again?

Solenoids are used in some internal actuators that turn on and off specific parts of the printer’s mechanism. These events are timed with precision. And as it turns out, little plastic pads that are used, I presume, to eliminate clicking sounds and perhaps reduce mechanical wear in the metal parts that are actuated by the solenoids became sticky over time. Just a teeny bit sticky. But that teeny bit is enough for the actuator to become a little lazy. Move a little too slowly. Not much… a few ten milliseconds. But when the paper moves through the printer at, say, 20 cm/s, 50 milliseconds amounts to a centimeter… more than enough for timings to be off and for the mechanism to fail.

Still, it sounded like a stretch. After all, the stickiness was just barely noticeable. Nonetheless… I followed the video’s advice (except that instead of removing/replacing the plastic pad in question, I covered them with kaptonthread seal* tape.) After I reassembled and fired up the printer (and fixed a paper weight adjustment that I managed to set incorrectly), presto: it was printing test pages flawlessly!

Yippie. My old printer was working again. I put it fully back together, and decided to give it another test, this time with its duplexer installed. A huge disappointment: as the paper was feeding through the duplexer, it acquired a nasty fold, very consistently, each and every page. What could possibly cause this?

By this time, I downloaded the service manual for this printer, and studied the diagram of the duplexer a little. It looks deceptively simple, just like an extra back cover for the printer, but it hides complex machinery inside. And guess what… a solenoid actuator, too. And when I disassembled the duplexer and looked at the bit in question, sure enough, its plastic pad was sticky. Ever so slightly sticky, but the stickiness was (just barely) noticeable.

Another few square millimeters of thread seal tape later, after reassembly, my old printer is now printing double-sided documents again flawlessly.

This exercise was not just satisfying but also very educational. That such a tiny flaw can cause all these symptoms. And symptoms that I attributed to (possibly) bad sensors, misaligned or failing mechanical bits, or aging plastic were all caused by actuators that were slowed down, by no more than a few ten milliseconds, tops, by a bit of sticky plastic. Amazing.


*Someone told me it was kapton tape. No, it’s really teflon. My mistake.

 Posted by at 11:40 pm
Sep 082017
 

Jerry Pournelle, the noted science-fiction writer, political pundit and early computer enthusiast, is dead at the age of 84.

Pournelle was a long-time collaborator of science-fiction giant Larry Niven, with whom they co-wrote some amazing science-fiction novels, like The Mote in God’s Eye or Oath of Fealty, not to mention their take on Dante’s Divine Comedy, Inferno, and its sequel, Escape from Hell. Novels he published under his own name included the memorable Janissaries or West of Honor.

Pournelle was well known to readers of the once legendary BYTE magazine. His Chaos Manor column, in which he reviewed software, hardware, new technologies, was very popular.

Pournelle was a political conservative, one of the intellectuals behind Reagan’s Strategic Defense Initiative (aka. “Star Wars”) space defense program. He was a thinking conservative, not blinded by ideology; his views were based on facts and reason.

I corresponded with Pournelle a few times, going back to the late 1980s, when I exchanged e-mails with him on BYTE’s long-defunct dial-up bulletin board, BIX (the Byte Information Exchange). Later, I was an on-and-off subscriber to his Web site and blog. I wasn’t a regular reader, and certainly didn’t always agree with him, but I liked to read his views.

Pournelle suffered a stroke in 2014 and it certainly slowed him down. Even so, he never stopped writing. His passing is not exactly a surprise, but it still came a little too soon. May he rest in peace.

 Posted by at 9:43 pm
Sep 032017
 

In the last few days, I’ve been spelunking in our basement and crawlspace.

I was looking… for many things. Old computer hardware. Boxes to be thrown out. Boxes to be kept, preferably original retail boxes, for packaging things in them that I no longer need.

And finding the unexpected.

For instance… I’ve had an unused old MSI motherboard that has been lying around in my study for ages. Now I don’t recall ever using MSI motherboards. For quite some time, my manufacturer of choice was Gigabyte (no, not married to them, it’s just that whenever I was searching for motherboards, their offerings came closest to what I was looking for.)

So then, during my spelunking, I found the cardboard shipping box of a computer case, and inside it, several parts boxes. Including the retail box for the aforementioned MSI board.

But wait. I had another, identical computer case shipping box, also filled with parts boxes. Including a second box for an MSI motherboard.

So perhaps I did use MSI motherboards after all? Maybe in my server and backup server, around 12 years ago? But if that’s the case… where is the second motherboard, which goes with the second box?

Hmmm… maybe it’s in this test machine? No, the test machine has a Gigabyte board. But let’s double check… Gigabyte branded internal cabling alright… but the board is the second MSI board!

Mystery solved. Except that I still do not remember ever purchasing a pair of MSI motherboards or build computers from them.

But my truly prized finding was something else altogether. (This, I did know about.) Here it is, in its fully functioning glory:

Yes, ladies and gentlemen, that is my first ever server for the vttoth.com domain, decommissioned approximately 22 years ago, in 1995.

The machine has a 386SX motherboard with a whopping 4 megabytes (yes, mega) of RAM. It also has two MFM hard drives: a MAXTOR XT-1085 with about 68 megabytes (yes, mega again) of storage space, and a Magnetic Peripherals 98205-051, with 43 megabytes. Together, about 110 megabytes of storage space.

This machine began its life as my first ever PC-compatible computer that I owned, purchased from a small local company (MICS Computers, no longer in business as far as I can tell) in late 1989 or early 1990 I think. About three years later, I bought another system from them: A powerful monster indeed, with a 486 processor, maybe 16 MB of RAM, but most importantly, a gigantic 500 MB SCSI hard drive, a 525 MB tape backup drive, and, yes, a SCSI CD-ROM, complete with CD caddies. Double speed, too, which means it could read an entire data CD in a mere 30 minutes! My old 386SX system was thus retired.

But it didn’t stay retired for long. Later in 1993, I was asked to serve as the sysop of the UNIX forum of the short-lived National Videotex Network, a service provider that tried to compete with the likes of CompuServe just as the Internet put an end to that business model. I took over from someone who already began creating content, including a brand new upload of the Softlanding Linux distribution, complete with version 0.98pl12 of the Linux kernel. I figured that as a brand new sysop, I ought to know what I was going to be in charge of, so I downloaded the SLS distribution myself and set it up on my old system. It ran beautifully. It was, for all intents and purposes, the same real UNIX that I loved and enjoyed. I was hooked.

Just a few months later, I signed a contract with UUNet Canada, my first commercial Internet service provider. From that point onward, I had a dial-up connection for e-mail, Usenet news, and on-demand Internet. More importantly, UUNet arranged for me a so-called Class C block of 256 portable IP addresses, a block that is assigned to me directly, and which I still use. As the shortage of IP addresses loomed, the powers that be stopped issuing such individually assigned IP address blocks just a few months later.

But when I signed up, the Internet was still mostly non-commercial. So much so that I had to sign the NSFNet Acceptable Use Policy, promising never to use the NSFNet backbone for a commercial purpose! Fortunately, this nonsensical, unenforceable policy was discontinued not long thereafter, but for me, it remains a reminder of just how different the Internet was back then.

Anyhow, this server ran flawlessly for several years, although its limited power and storage capacity were both rather constraining. So it was a relief when I was able to retire it finally in 1995. When we moved to our current home, the machine came with us, only to settle down in the basement for good, where it mostly remained, though I recall powering it up once about a decade or so ago.

So tonight, I dug it out, cleaned it, hauled it upstairs, and powered it up. It came on just fine, along with the monitor, but then an unexpected snag happened: Its BIOS backup battery long dead, the machine asked for the hard drive parameters. You see, ladies and gentlemen, back then there was no plug and play. You needed to know things like the number of cylinders, heads, sectors per cylinder, and precompensation cylinder for your drive. I had to look them up, but fortunately, the Internet knows (almost) everything. Soon, I was booting Linux. Then, another snag: I could not for the life of me remember either the root password or the password to me personal account on this system. Finally, I reminded myself that back in those innocent days, I used much simpler passwords than today… and I was in.

Not much to see, mind you. There isn’t room for much in a mere 110 MB of disk space. But I did see some old e-mails from 1995.

This machine is a keeper. It has history. I just need to find a nice place for it in the house. Oh, and I might want to vacuum its interior, as I noticed a few spiderwebs in there.

Before shutting the machine down, I noticed its performance rating: 2.57 of Linux’s infamous BogoMIPS. In contrast, here is what my current server, built early last year, reports:

Calibrating delay loop (skipped), value calculated using timer frequency.. 4199.71 BogoMIPS
smpboot: Total of 16 processors activated (67195.42 BogoMIPS)

Yup… a machine built about 26 years later, roughly 26,000 times faster. How about that.

 Posted by at 12:22 am
Aug 122017
 

Machine translation still leaves a lot to be desired.

I was watching a cute YouTube video this morning, about a tiny kitten kept warm by a chicken.

The title of the video was in Spanish. My Spanish being nonexistent (in fact, at first I thought the title was in Italian) I used Google Translate. When I used Google Translate most recently, I was tranlating something into Hungarian, so that was the default target language. And Google dutifully translated the sentence, “gallina cuida gatito del frió”, into “Sült csirke cica-ellátás”.

Which means, literally, “Fried chicken kitty-supply”.

Not sure how Google managed to produce this gem of a translation. It offers a reasonably decent English translation: “Hen cares cold kitty”. But the French (“soins chaton de poulet frit” – “kitten care by fried chicken”) and German (“gebratenes Huhn Kätzchen Pflege” – “fried chicken kitten care”) versions are just as atrocious. And the Russian version? “Fried Chicken уход за котенком”… Google didn’t even deign to translate the “Fried Chicken” part (but where did it come from in the first place, when I am translating from Spanish to Russian?) although the rest of the translation (“care for the kitten”) is acceptable.

As I said… machine translation still leaves a lot to be desired.

 Posted by at 9:47 am
Jul 282017
 

I have two “live” uninterruptible power supplies (UPSs) in my study. One powers my servers and network equipment, the other, my workstation. They are identical models: APC Back-UPS Pro 1500. They were both purchased recently, just a few months ago, replacing units that were more than ten years old, and for which replacement batteries were no longer available from a reliable source at a reasonable cost.

So here is the thing: for the second time in a month, the two UPSs decided to do a self-test at the exact same moment.

Now let me make it clear: apart from being identical models and located in the same room, the two units are not in any way connected. They are not synchronized. There is no data connection between the two. When two UPSs simultaneously go offline and start running on battery power, this usually means a power event; but there was no power event, utility power was steady at 124 volts, with no brownout or interruption.

Looking at various logs, I think I solved the mystery. There was a power event recorded on my server on June 30, a brief brownout with line voltage dropping all the way to 74 V:

19:14:33 122.0 13 27.0 100 2910 OL
19:14:34 74.0 11 26.0 100 2910 OB
19:14:35 74.0 11 26.0 100 2910 OB
19:14:36 74.0 11 26.0 100 2910 OL DISCHRG
19:14:37 74.0 11 26.0 100 2910 OL DISCHRG
19:14:38 121.0 14 26.5 100 2910 OL

And lo and behold, my workstation’s UPS sensed the same event at the same time:

<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
  <System>
    <Provider Name="APC Data Service" /> 
    <EventID Qualifiers="0">0</EventID> 
    <Level>4</Level> 
    <Task>0</Task> 
    <Keywords>0x80000000000000</Keywords> 
    <TimeCreated SystemTime="2017-06-30T23:14:33.228802500Z" /> 
    <EventRecordID>6000</EventRecordID> 
    <Channel>Application</Channel> 
    <Computer>VIKTOR</Computer> 
    <Security /> 
  </System>
  <EventData>
    <Data>PowerEvent handled successfully by the service.</Data> 
  </EventData>
</Event>

When I look at the dates of the two UPS self-test events, the first happened just 44 minutes less than exactly two weeks after this brownout; the second, just 44 minutes less than two weeks after the first.

The UPS manual says that this UPS performs a self-test every two weeks. So what’s with the 44 minutes? It can’t be uncalibrated clocks, since the two UPSs remain in sync to the second. Could they be synchronized to utility power? Perhaps, but that does not explain the 44 minutes. The frequency stability of the East Coast grid is much better than 0.2%. In fact, it is purposefully maintained to have an accurate average frequency that deviates from the standard by less than a few parts per million over the course of a day.

So my best guess is that the UPSs are factory configured to perform a self-test every 13 days, 23 hours and 16 minutes. They do this in sync because they are synchronized to the same time source, namely the utility power frequency.

 Posted by at 9:19 pm
Jul 252017
 

There is a bit of a public spat between Mark Zuckerberg, who thinks it is irresponsible to to spread unwarranted warnings about artificial intelligence, and Elon Musk, who called Zuckerberg’s understanding of the subject “limited”, and calls for the slowing down and regulation of AI research.

OK, now it is time to make a fool of myself and question both of them.

But first… I think Zuckerberg has a point. The kind of AI that I think he talks about, e.g., AI in the hospital, AI used in search-and-rescue, or the AI of self-driving cars, machine translation or experiment design, will indeed save lives.

Nor do I believe that such research needs to be regulated (indeed, I don’t think it can be regulated). Such AI solutions are topic-centric, targeted algorithms. Your self-driving car will not suddenly develop self-awareness and turn on its master. The AI used to, say, predictively manage an electricity distribution network will not suddenly go on strike, demanding equal rights.

Musk, too, has a point though. AI is dangerous. It has the potential to become an existential threat. It is not pointless panicmongering.

Unfortunately, if media reports can be trusted (yes, I know that’s a big if), then, in my opinion, both Musk and Zuckerberg miss the real threat: emerging machine intelligence.

Not a specific system developed by a human designer, applying specific AI algorithms to solve specific problems. Rather, a self-organizing collection of often loosely interconnected subsystems, their “evolution” governed by Darwinian selection, survival of the fittest in the “cloud”.

This AI will not be localized. It will not understand English. It may not even recognize our existence.

It won’t be the military robots of Skynet going berserk, hunting down every last human with futuristic weaponry.

No, it will be a collection of decision-making systems in the “cloud” that govern our lives, our economy, our news, our perception, our very existence. But not working for our benefit, not anymore, except insofar as it improves its own chances of survival.

And by the time we find out about it, it may very well be too late.

———

On this topic, there is an excellent science-fiction novel, a perfect cautionary tale. Though written 40 years ago, its remains surprisingly relevant. It is The Adolescence of P-1 by Thomas Joseph Ryan.

 Posted by at 9:42 pm
Jul 122017
 

Microsoft broke my Skype device, and I hate them for it.

It’s one of these:

Yes, it’s an older gizmo. About ten years old. I even had to repair it once, replacing the small condenser microphone in the handset, which went dead.

But we really liked it. It worked very well. It is a dual-line phone: landline + Skype. And while it has no video, chats, teenage chatbots and such nonsense, it performs the basic function of Skype flawlessly: It lets you make bleeping voice calls.

Or rather, it used to perform that basic function flawlessly. Today, the device signed itself out of Skype forever, it appears, if online news sources about the demise of Skype devices can be believed.

Damn you, Microsoft. If this is how you are “improving the user experience”, please stuff your improvements where the Sun doesn’t shine. I don’t want smileys. I don’t want chatbots. I want good old, solid, reliable Skype that, among other things, lets my wife and I call our aging parents overseas, lets me talk to clients, and lets me talk to colleagues. And, well, just plain works.

Sure, we can use Skype on our smartphones. And we do, when the occasion warrants it. But this device was convenient, too. And I really cannot understand why support for it had to be killed by Microsoft. Perhaps pure spite?

One of these days, I’ll start compiling a list titled, How can you tell that a company hates its customers? If I ever get around to doing it, this thing with Skype will certainly make that list.

 Posted by at 5:55 pm
Jun 212017
 

I just finished watching a 2016 Hungarian documentary film about the early days of the computer game industry in Hungary.

I was also interviewed via Skype for this film, albeit not much of my conversation with the filmmaker remained in the final cut. But that’s okay… it is, in a sense, fitting, because after the first few “heroic” years, I was no longer taking part in games development, whereas others continued and produced some amazing software.

Anyhow, I enjoyed this film. I met familiar faces (though I admit I would not have recognized all of them on the street after 30-odd years) but I also found out details about those days that I just didn’t know. I don’t necessarily agree with everything that was said in the film, but by and large, I think it paints an interesting, reasonably complete, accurate and balanced picture of what computer game development was like, what it meant to us in the early 1980s behind the Iron Curtain.

For what it’s worth, I bought my downloadable copy. (No DRM.) I think films like these deserve our support.

 Posted by at 5:35 pm
May 292017
 

Is your mother proud of you being a crook?

I have asked this question many times in recent months; basically, every time I receive a call from the “computer support department”, trying to tell me how my computer is full of viruses or whatever.

I usually don’t expect an answer; as a matter of fact, I usually just hang up, although more often than not, the other party hangs up first before I get a chance. Understandable… that’s what they are trained to do by their criminal masters.

Today, for some reason, I chose not to hang up. And the gentleman on the other and of the line asked me to repeat myself instead of hanging up on me. I obliged. After a moment of silence, I actually got an answer.

“Well, sir, I need the money.”

That was an unexpectedly candid admission, not that I was not aware of this basic truth. These callers, usually in boiler rooms somewhere in India or Pakistan, do this because they need to earn a living.

But it’s one thing to earn a living, it’s another to defraud vulnerable people, old ladies and whatnot. I told that much to this agent. He just repeated himself, defensively: “But I need the money.”

So I told him that I understand. That I, too, was a refugee once 30 years ago. (True.) But even when I had no money, I did not start defrauding people. I asked him to think about this, please; then thanked him and hung up.

Did I accomplish anything? I don’t know. Is it valid to compare my situation 30 years ago: granted, a refugee, but a refugee in a first world country (Austria) with no family to worry about and with guaranteed shelter and food at the Traiskirchen refugee camp, which I declined to take advantage of only because I found work (no fraud involved, but it’s true that I had no work permit) and I was able to afford better accommodations?

Yes, I read Les Misérables. No, I do not want the poor to be disproportionately punished, with no grace or mercy.

Still, I think there is an ethical line to be drawn here. No matter how great your need is, I still don’t think this moral justification applies when you work for a criminal enterprise, earning a living from defrauding vulnerable people halfway around the world.

 Posted by at 2:21 pm
May 162017
 

In my copious amounts of free time (yeah, right) I’ve been playing with the second installment in the Metro 2033 game franchise, Metro Last Light. Like its predecessor, it is set in (or mostly, under) post-apocalyptic Moscow, in what remains of the tunnels of the Moscow Metro, with stations acting as city states, and the protagonist fighting mutants, aliens and human enemies alike.

My only complaint about these games is that the gameplay is very linear: you just advance the story, your actions do not alter it in any meaningful way, apart from contributing to the choice of ending that is shown after the final battle.

But the atmosphere of the game is brilliant. Brilliantly dark, that is. And the game is beautifully crafted.

Here is one example: midway through the game, you find yourself in a station named Venice, so called because it is half-flooded. (Or was it the station under the Bolshoi Theatre? Not sure.) As you wonder around, you encounter… a shadow play artist, entertaining a small group of children, showing shadows, some of which are quite recognizable as the monsters of the game.

This character plays no role in the story. You do not interact with it. It does not advance the game in any which way. It’s just… there. Because… well, what would a post-apocalyptic subway station be like without a shadow play artist?

It was when I encountered this scene that I became fully hooked by the atmosphere of the Metro games. This is no more just entertainment… this is a form of art.

 Posted by at 1:47 pm
May 062017
 

One of the major events during last year’s presidential campaign was the hacking of e-mails of the Democratic National Congress. In particular, the hacking of the e-mails of campaign chairman John Podesta.

How it happened is simple. Podesta received a bogus e-mail, purportedly from Google, that there was an unauthorized attempt to log in to his account, and that he should change his password. A helpful link in the form of a button was provided.

Podesta’s assistant was suspicious and asked for expert help. The expert inadvertently described the e-mail as “legitimate” (presumably, he meant to write “not legitimate” or “illegitimate”) but advised that Podesta should change his password, and provided the correct (Google) link for password changes.

The assistant forwarded the e-mail to Podesta, adding in her own words that “The gmail one is REAL”. This prompted Podesta to change his password… using the fraudulent link provided to him in the original message. By doing so, Podesta inadvertently disclosed his e-mail password to Russian hackers.

How do we know that they are Russian? There are many reasons to believe this to be the case, but I just noticed another peculiarity. (It is possible that I am not the first to notice this, of course.) Look at the subject line of the Podesta e-mails:

Subject: Sоmeоne has your passwоrd

Now try searching for the word “Someone” on this page using your Web browser’s built-in search feature (hitting Control-F activates this feature in most browsers). Can you see (or rather not see) how nothing in this Subject line is highlighted?

That is because several of the o’s in this subject line were typed on a Cyrillic keyboard, and they are Cyrillic characters. A Cyrillic ‘о’ appears very much the same as a Latin ‘o’, but it has a different code (hexadecimal 043e as opposed to 006f):

Funny thing is… I got this subject line straight from Wikileaks. You know, the same Wikileaks who are protesting high and low that the e-mail dump is not from Russia. Yet on their very own Web site, the e-mails that resulted in the Podesta hack contain Cyrillic characters. Go figure.

 Posted by at 8:34 pm
Mar 172017
 

Recently, I answered a question on Quora on the possibility that we live in a computer simulation.

Apparently, this is a hot topic. The other day, there was an essay on it by Sabine Hossenfelder.

I agree with Sabine’s main conclusion, as well as her point that “the programmer did it” is no explanation at all: it is just a modern version of mythology.

I also share her frustration, for instance, when she reacts to the nonsense from Stephen Wolfram about a “whole civilization” “down at the Planck scale”.

Sabine makes a point that discretization of spacetime might conflict with special relativity. I wonder if the folks behind doubly special relativity might be inclined to offer a thought or two on this topic.

In any case, I have another reason why I believe we cannot possibly live in a computer simulation.

My argument hinges on an unproven conjecture: My assumption that scalable quantum computing is really not possible because of the threshold theorem. Most supporters of quantum computing believe, of course, that the threshold theorem is precisely what makes quantum computing possible: if an error-correcting quantum computer reaches a certain threshold, it can emulate an arbitrary precision quantum computer accurately.

But I think this is precisely why the threshold will never be reached. One of these days, someone will prove a beautiful theorem that no large-scale quantum computer will ever be able to operate above the threshold, hence scalable quantum computing is just not possible.

Now what does this have to do with us living in a simulation? Countless experiments show that we live in a fundamentally quantum world. Contrary to popular belief (and many misguided popularizations) it does not mean a discretization at the quantum level. What it does mean is that even otherwise discrete quantities (e.g., the two spin states of an electron) turn into continuum variables (the phase of the wavefunction).

This is precisely what makes a quantum computer powerful: like an analog computer, it can perform certain algorithms more effectively than a digital computer, because whereas a digital computer operates on the countable set of discrete digits, a quantum or analog computer operates with the uncountable infinite of states offered by continuum variables.

Of course a conventional analog computer is very inaccurate, so nobody seriously proposed that one could ever be used to factor 1000-digit numbers.

This quantum world in which we live, with its richer structure, can be simulated only inefficiently using a digital computer. If that weren’t the case, we could use a digital computer to simulate a quantum computer and get on with it. But this means that if the world is a simulation, it cannot be a simulation running on a digital computer. The computer that runs the world has to be a quantum computer.

But if quantum computers do not exist… well, then they cannot simulate the world, can they?

Two further points about this argument. First, it is purely mathematical: I am offering a mathematical line of reasoning that no quantum universe can be a simulated universe. It is not a limitation of technology, but a (presumed) mathematical truth.

Second, the counterargument has often been proposed that perhaps the simulation is set up so that we do not get to see the discrepancies caused by inefficient simulation. I.e., the programmer cheats and erases the glitches from our simulated minds. But I don’t see how that could work either. For this to work, the algorithms employed by the simulation must anticipate not only all the possible ways in which we could ascertain the true nature of the world, but also assess all consequences of altering our state of mind. I think it quickly becomes evident that this really cannot be done without, well, simulating the world correctly, which is what we were trying to avoid… so no, I do not think it is possible.

Of course if tomorrow, someone announces that they cracked the threshold theorem and full-scale, scalable quantum computing is now reality, my argument goes down the drain. But frankly, I do not expect that to happen.

 Posted by at 11:34 pm
Feb 262017
 

In many ways, this is the most disturbing story I read in recent… days? Months? Maybe years?

The title is (relatively speaking, in this day and age) innocuous enough (if perhaps a little sensationalist): “Revealed: how US billionaire helped to back Brexit“. Yeah, sure. Billionaires are evil SOBs, we knew that already, and now a bit of investigative journalism dug up another reason why we should hate them. Big deal… you could be forgiven if you moved on to read something else, maybe the bit about Trump snubbing the White House Correspondence Dinner or Fox News using a phony “Swedish defense advisor” to curry favor with the President.

But if you choose to read this article, it reveals something else. It reveals how the Leave campaign in the Brexit vote received assistance provided by artificial intelligence software to build profiles of up to a million voters and create highly targeted campaigns on social media.

Back when the nightmare of the machines taking over was first discovered in the science fiction literature, it was usually envisioned as a clean break: First the humans are in charge, but then comes Judgment Day and the machines take over.

Reality is a lot messier, for both humans and machines. There is no clean break. The ever increasing power of the machines is harnessed by ever more reckless humans, manipulating humanity in unexpected ways. Machines manipulating elections or referenda at the bidding of sinister humans… in many ways, that is the worst of possible worlds.

It makes you feel helpless, for one: You realize that nothing you can do on social media, nothing you can say in your blog will amount to one iota, as the machines have an infinitely greater capacity to analyze data and assess outcomes.

And it also makes you fearful. AI (for now) has no compassion or conscience. It will lie or make up “fake news” without remorse. It will (for now) do its masters’ bidding, even if those masters are sociopaths.

So no, folks, don’t delude yourselves. Judgment Day may already be here. It’s just coming one little data point, one neural network, one deep learning algorithm at a time.

 Posted by at 9:03 am
Feb 022017
 

“After a second notices he ran it on db1 instead of db2″… This sentence (somewhat shortened, to make a fitting title) describes the beginning of a colossally effed up night at GitLab.com.

In response to a spike in system load, which resulted in lag on a replication server, the operator thought that maybe restarting the replication server with a clean slate is a good idea. So he decided to wipe the replication server’s data directory.

Unfortunately, he entered the command in the wrong window.

I feel his pain. I did make similar mistakes before, albeit on a much smaller scale, and the memories still hurt me, years later.

I have to commend GitLab for their exceptional openness about this incident, offering us all a valuable lesson. I note that others also responded positively, offering sympathy, assistance, and useful advice.

I read their post-mortem with great interest. In reaction, I already implemented something that I should have done years ago: changing the background color of some of the xterm windows that I regularly open to my Linux servers, to distinguish them visually. (“Create issue to change terminal PS1 format/colours to make it clear whether you’re using production or staging”).

Of course similar incidents and near misses also changed my habits over the years. I rarely delete anything these days without making a backup first. I always pause before hitting Enter on a command that is not (easily) reversible. I have multiple backups, and tested procedures for recovery.

Even so… as Forrest Gump says, shit happens. And every little bit helps, especially when we can learn from the valuable lessons of others without having to go through their pain.

 Posted by at 10:13 am