Category Archive 'Technology'
02 Oct 2009

Win 7: Soon To Be Released

, , , , , , ,


Win7 Launch Party video (Don’t watch it!)

Charlie Booker, at the Guardian, knows that Windows sucks, but explains that he still hates Mac and Mac users more.

Recently I sat in a room trying to write something on a Sony Vaio PC laptop which seemed to be running a special slow-motion edition of Windows Vista specifically designed to infuriate human beings as much as possible. Trying to get it to do anything was like issuing instructions to a depressed employee over a sluggish satellite feed. When I clicked on an application it spent a small eternity contemplating the philosophical implications of opening it, begrudgingly complying with my request several months later. It drove me up the wall. I called it a bastard and worse. At one point I punched a table. …

I know Windows is awful. Everyone knows Windows is awful. Windows is like the faint smell of piss in a subway: it’s there, and there’s nothing you can do about it. OK, OK: I know other operating systems are available. But their advocates seem even creepier, snootier and more insistent than Mac owners. The harder they try to convince me, the more I’m repelled. To them, I’m a sheep. And they’re right. I’m a helpless, stupid, lazy sheep. I’m also a masochist. And that’s why I continue to use Windows – horrible Windows – even though I hate every second of it. It’s grim, it’s slow, everything’s badly designed and nothing really works properly: using Windows is like living in a communist bloc nation circa 1981. And I wouldn’t change it for the world, because I’m an abject bloody idiot and I hate myself, and this is what I deserve: to be sentenced to Windows for life.

That’s why Windows works for me. But I’d never recommend it to anybody else, ever. This puts me in line with roughly everybody else in the world. No one has ever earnestly turned to a fellow human being and said, “Hey, have you considered Windows?” Not in the real world at any rate.

Until now. Microsoft, hellbent on tackling the conspicuous lack of word-of-mouth recommendation, is encouraging people – real people – to host “Windows 7 launch parties” to celebrate the 22 October release of, er, Windows 7. The idea is that you invite a group of friends – your real friends – to your home – your real home – and entertain them with a series of Windows 7 tutorials.

Win 7 Launch Party video: A very serious contender for lamest (interminable at 6:14) video ever made.

Read the whole thing.

23 Sep 2009

Genre Fiction Generator

, , , ,

David Malki’s original Electroplasmic Hydrocephalic Genre Fiction Generator 2000 design.

Liam Cooke’s working model

Hat tip to Karen L. Myers.

31 Aug 2009

Licensed to Surf

, , ,

Not just anyone should be allowed to take his mouse and ride the Information Superhighway anonymously, argues an Australian authority on crime.

Australia’s leading criminologist thinks online scams have escalated to such a point that first-time users of computers should have to earn a licence to surf the web.

Russel Smith, principal criminologist at the Australian Institute of Criminology said the concept of a “computer drivers licence” should be taken seriously as an option for combating internet-related crime.

“There’s been some discussion in Europe about the use of what’s called a computer drivers licence – where you have a standard set of skills people should learn before they start using computers,” Dr Smith told iTnews.

“At the moment we have drivers licences for cars, and cars are very dangerous machines. Computers are also quite dangerous in the way that they can make people vulnerable to fraud.

“In the future we might want to think about whether it’s necessary there be some sort of compulsory education of people before they start using computers,” he said.

17 Aug 2009

Not With My Daughter

, , , , , , ,

L33T parents draw the line at their daughter’s new boyfriend. “You’re a L33T, damnit! We don’t date N00bs, we pwn them.”

1:39 video

From College Humor via Atomic Nerds via Karen L. Myers.

12 Aug 2009

SPCA Outrage in Philadelphia 10: Answering Pat Burns

, , , , , , , , , ,


Burns is the dumb-looking one in the middle

When NYM published the first blog coverage last week on the Murder Hollow Basset raid by the PSPCA, fellow field sports blogger Pat Burns of Terrierman’s Daily Dose, went into investigative mode, took Amy Worden’s essentially PSPCA-dictated damage control press release in the Inquirer as gospel, and proceeded to dismiss me as a paranoid rightwing blogger and Murder Hollow’s Master Wendy Willard as a “nutter” and a dog abuser. Burns’s publicly-performed Snoopy dance of triumph on this one was sufficient to make readers think he had the Pulitzer Prize in the bag.

He certainly made points with the PETA crowd, who happily began quoting Burns as the party line on the story.

I was personally disappointed because I actually read Burns’s blog regularly, but I merely noted in my response that Burns was relying on a single, obviously partisan source, repeating the PSPCA version of circumstances and events. I also identified some reasons why I think PSPCA’s word is not to be trusted.

Naturally, since I had received so much attention in Burn’s blog, I tried forwarding a link to my own posting in response. I had to go through a major log-in procedure to try posting a comment, and in the end my comment was merely forwarded to Burns for approval.

Several days later, it had not gotten into TDD’s comments, and I was rather displeased at what seemed to be a policy of censoring rejoinders at TDD, so I sent Burns a short email commenting negatively.

He responded, claiming to be “away from keyboard,” answering via cellphone, and he and I wound up arguing about all this by email much of the day on Sunday.

I didn’t publish our email correspondence myself, but Burns took a really stupid point of argument which no rational response could persuade him to relinquish as the occasion for another blog article.

I have challenged Mr Zincavage and the 11 “staff members” of the Murder Hollow Bassets to pay for three or four years worth of private (and legal) kenneling for those seized Philadelphia dogs.

There are many commercial kennels in Pennsylvania, and I am sure the the SPCA will have no objection to the dogs being placed in a good private kennel provided that three or four years worth of kennel fees are paid up in full and in advance, plus any veterinary bills accrued.

No, not a month. No, not four months. Three or four years.

After all, these dogs deserve continuity of care, and with 12 people to shoulder the cost of kenneling, it shouldn’t be too big a deal for everyone to pony up the price.

Talk is cheap.

But, of course, so too are most people — a point missed by many conservatives.

They will tell you they are against taxation, preferring instead that everything be done by some mysterious thing called “a Thousand Points of Light.”

Fine. Here’s a chance for Mr. Zincavage and the Murder Hollow “staff” to be a Point of Light. Pay for the veterinary costs plus three or four years of private kenneling for Wendy Willard’s basset hounds. She will still own them — the donors will simply be making a charitable gift to make sure things are done right by the dogs.

As I explained in our emails, nobody wants to lock up 11 hunting bassets away from their home, their owner, their pack, and the out-of-doors in a commercial kennel operated by strangers for three or four years. (How long does Burns think hounds live, do you suppose?) No rational reason or necessity proposes such a course.

Ms. Willard, her ten staff members, and the dozens of residents of the greater Philadelphia area who hunt with Murder Hollow Bassets are perfectly able to provide for those hounds, and if some imaginary tragic circumstance arrived to eliminate from the world every person affiliated with Murder Hollow, that hound pack is part of a national organization of affiliated packs. There are plenty of packs and individual basset hunters out there who could and would give all of Murder Hollow’s hounds new homes.

There is no need to do what Mr. Burns insists on proposing as his own subjective test of bona fides. No one wants such an arrangement. The PSPCA wouldn’t agree to it. And it would not, in the least, be in the interest of the hounds.

One really wonders, reading this kind of idiocy, what kind of understanding of hunting dogs, or dogs in general, the Terrierman possesses. Burns seems to look upon dogs purely as a cost center, a kind of tool requiring fixed costs that anyone can cheerfully stuff away in a warehouse setting for 3-4 years in order to prove a point.

But there is no point. The Murder Hollow Bassets have been an organized hunting pack chasing quarry in the field since 1986, and participating and competing in hound shows and pack trials since at least 1994. If they didn’t meet all the costs Mr. Burns’s fantasy is intended to project, they would hardly still be in operating existence, nor would they be accepted as a recognized basset pack by a knowledgeable community of hound lovers and keen sportsmen or be permitted to be part of the national organization.

05 Aug 2009

Marines Don’t Tweet

, ,

Wired’s Danger Room has the story:

The U.S. Marine Corps has banned Twitter, Facebook, MySpace and other social media sites from its networks, effective immediately.

“These internet sites in general are a proven haven for malicious actors and content and are particularly high risk due to information exposure, user generated content and targeting by adversaries,” reads a Marine Corps order, issued Monday. “The very nature of SNS [social network sites] creates a larger attack and exploitation window, exposes unnecessary information to adversaries and provides an easy conduit for information leakage that puts OPSEC [operational security], COMSEC [communications security], [and] personnel… at an elevated risk of compromise.”

The Marines’ ban will last a year. It was drawn up in response to a late July warning from U.S. Strategic Command, which told the rest of the military it was considering a Defense Department-wide ban on the Web 2.0 sites, due to network security concerns. Scams, worms, and Trojans often spread unchecked throughout social media sites, passed along from one online friend to the next. “The mechanisms for social networking were never designed for security and filtering. They make it way too easy for people with bad intentions to push malicious code to unsuspecting users,” a Stratcom source told Danger Room.

Yet many within the Pentagon’s highest ranks find value in the Web 2.0 tools. The Chairman of the Joint Chiefs of Staff has 4,000 followers on Twitter. The Department of Defense is getting ready to unveil a new home page, packed with social media tools. The Army recently ordered all U.S. bases to provide access to Facebook. Top generals now blog from the battlefield.

08 Jul 2009

Bad News for Redmond

, , , , , , , ,

Lifehacker tells us that Google will be be releasing its free, open-source Chrome Operating System later this year. Google says:

We’re designing the OS to be fast and lightweight, to start up and get you onto the web in a few seconds. The user interface is minimal to stay out of your way, and most of the user experience takes place on the web. And as we did for the Google Chrome browser, we are going back to the basics and completely redesigning the underlying security architecture of the OS so that users don’t have to deal with viruses, malware and security updates. It should just work.

Chrome OS is going to be netbook oriented in its earliest version, and the idea apparently is ultimately to replace PC software with on-live Google applications like Gmail and Google Docs.

Persuading users to give up the familiar isn’t easy, but Microsoft has done a fine job lately, particularly with Vista, in creating a real opportunity for anyone able to offer more speed and convenience.

03 Jun 2009

Bye Bye, Dinosaur Media

, , , ,


Declining Newspaper Quarterly Ad Revenues From 2006

Another graph, this one is from Tech Crunch:

Total newspaper ad sales dropped by an unprecedented 28.28% in the first quarter of 2009, a deep plunge that represents a loss of more than $2.6 billion in ad revenue compared year-over-year. Compared to 3 years ago – 2006 was a pretty good year for American newspapers – we’re looking at a drop of more than $4.5 billion in ad sales in just three years if you only take into account the first quarter.

The sharp decline is caused by the lousy state of both digital and dead tree ad sales: the stats posted on the Newspaper Association of America website show that print sales fell by 29.7% in the first three months of this year (to $5.9 billion), while online sales dropped a record 13.4% (to $696.3 million).

Buggy whip sales figures probably looked a lot like this after Henry Ford’s Model T hit the market.

Of course, some of us think it isn’t only the Internet & Craig’s List producing this decline. The arrogance, insularity, partisanship, and dishonesty of establishment newspapers has to be having some negative impact.

18 May 2009

New Search Engine: WolframAlpha

, , ,

Mike Harvey, at the Times of London, describes a new approach to web searches.

A revolutionary new search engine that computes answers rather than pointing to websites will be launched officially today amid heated talk that it could challenge the might of Google.

WolframAlpha, named after Stephen Wolfram, the British-born computer scientist and inventor behind the project, takes a query and uses computational power to crunch through huge databases.

The service can compute the distance between two cities, the population of a country at a specific date and the position of the Space Shuttle at a given moment. The user does not have to search through links provided by the engine; the answer comes immediately and, if appropriate, is accompanied by charts or graphs. …

The new service, available at wolframalpha.com, was previewed several months ago amid industry speculation that it could be a “Google killer”. Dr Wolfram, however, is at pains to point out that his brainchild is a “computational knowledge engine”, not a traditional search engine.

01 May 2009

Burglar Caught by Webcam

,

Cybersavvy crime victim uses remote login and built-in webcam to send the cops to retrieve his stolen notebook.

Newsweek

29 Mar 2009

China’s GhostNet

, , , , , , , , ,

The Telegraph reports that a Canadian study produced by researchers asked to investigate cyberattacks on the office of the Dalai Lama reveals large-scale world-wide cyberattacks, all originating from China.

A vast Chinese cyber-espionage network, codenamed GhostNet, has penetrated sensitive ministries and embassies across 103 countries and infects at least a dozen new computers every week. …

The discovery of GhostNet is the latest sign of China’s determination to win a future “information war”. A ten-month investigation by the Munk Centre for International Studies in Toronto has revealed that GhostNet not only searches computers for information and taps their emails, but also turns them into giant listening devices.

Once a computer has been infected, hackers can turn on its web camera and microphones and record any conversations within range.

The study revealed that almost a third of the targets infected by GhostNet are “considered high-value and include computers located at ministries of foreign affairs, embassies, international organisations, news media and NGOs”. This global web of espionage has been constructed in the last two years.

Another report from Cambridge University said the sophisticated computer attacks had been “devastatingly effective” and that “few organisations, outside the defence and intelligence sector, could withstand such an attack”.

The report stopped short of accusing the Beijing government of responsibility for the network, but said the vast majority of cyber attacks originated from inside China.

—————————————-

The New York Times also headlined the report in its Technology section.

The researchers, who are based at the Munk Center for International Studies at the University of Toronto, had been asked by the office of the Dalai Lama, the exiled Tibetan leader whom China regularly denounces, to examine its computers for signs of malicious software, or malware.

Their sleuthing opened a window into a broader operation that, in less than two years, has infiltrated at least 1,295 computers in 103 countries, including many belonging to embassies, foreign ministries and other government offices, as well as the Dalai Lama’s Tibetan exile centers in India, Brussels, London and New York.

The researchers, who have a record of detecting computer espionage, said they believed that in addition to the spying on the Dalai Lama, the system, which they called GhostNet, was focused on the governments of South Asian and Southeast Asian countries.

Intelligence analysts say many governments, including those of China, Russia and the United States, and other parties use sophisticated computer programs to covertly gather information.

The newly reported spying operation is by far the largest to come to light in terms of countries affected.

This is also believed to be the first time researchers have been able to expose the workings of a computer system used in an intrusion of this magnitude.

Still going strong, the operation continues to invade and monitor more than a dozen new computers a week, the researchers said in their report, “Tracking ‘GhostNet’: Investigating a Cyber Espionage Network.” They said they had found no evidence that United States government offices had been infiltrated, although a NATO computer was monitored by the spies for half a day and computers of the Indian Embassy in Washington were infiltrated.

The malware is remarkable both for its sweep — in computer jargon, it has not been merely “phishing” for random consumers’ information, but “whaling” for particular important targets — and for its Big Brother-style capacities. It can, for example, turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room. The investigators say they do not know if this facet has been employed.

The researchers were able to monitor the commands given to infected computers and to see the names of documents retrieved by the spies, but in most cases the contents of the stolen files have not been determined. Working with the Tibetans, however, the researchers found that specific correspondence had been stolen and that the intruders had gained control of the electronic mail server computers of the Dalai Lama’s organization.

The electronic spy game has had at least some real-world impact, they said. For example, they said, after an e-mail invitation was sent by the Dalai Lama’s office to a foreign diplomat, the Chinese government made a call to the diplomat discouraging a visit. And a woman working for a group making Internet contacts between Tibetan exiles and Chinese citizens was stopped by Chinese intelligence officers on her way back to Tibet, shown transcripts of her online conversations and warned to stop her political activities.

The Toronto researchers said they had notified international law enforcement agencies of the spying operation, which in their view exposed basic shortcomings in the legal structure of cyberspace.

By some curious coincidence, the web-site offering the actual report as inaccessible today.

19 Mar 2009

Samsung Finds New Things to Do with Sheep

, , , , ,

Samsung promotes its new LED TV using a flock of sheep, some shepherds, some border collies and some LEDs on a hill-side in Wales.

2:45 The Baaa-Studs:”Extreme Shepherding”

From Terrierman via Karen L. Myers.

Your are browsing
the Archives of Never Yet Melted in the 'Technology' Category.
/div>








Feeds
Entries (RSS)
Comments (RSS)
Feed Shark