Category: technology | 技術 | 기술 | テクノロジー

It’s hard to explain to someone who didn’t live through it how transformation technology has been. When I was a child a computer was something mysterious. My Dad has managed to work his way up from the shop floor of the shipyard where he worked and into the planning office.

One evening he broad home some computer paper. I was fascinated by the the way the paper hinged on perforations and had tear off side edges that allowed it to be pulled through the printer with plastic sprockets connecting through holes in the paper.

My Dad used to compile and print off work orders using an ICL mainframe computer that was timeshared by all the shipyards that were part of British Shipbuilders.

I used the paper for years for notes and my childhood drawings. It didn’t make me a computer whiz. I never had a computer when I was at school. My school didn’t have a computer lab. I got to use Windows machines a few times in a regional computer labs. I still use what I learned in Excel spreadsheets now.

My experience with computers started with work and eventually bought my own secondhand Mac. Cut and paste completely changed the way I wrote. I got to use internal email working for Corning and internet connectivity when I went to university. One of my friends had a CompuServe account and I was there when he first met his Mexican wife on an online chatroom, years before Tinder.

Leaving college I set up a Yahoo! email address. I only needed to check my email address once a week, which was fortunate as internet access was expensive. I used to go to Liverpool’s cyber cafe with a friend every Saturday and showed him how to use the internet. I would bring any messages that I needed to send pre-written on a floppy disk that also held my CV.

That is a world away from the technology we enjoy now, where we are enveloped by smartphones and constant connectivity. In some ways the rate of change feels as if it has slowed down compared to the last few decades.

  • Salam Pax & mesh networks

    Today I talk about two things blogger Salam Pax and mesh networks, the latest thing in wireless networking.

    First off, a bit of history. The first film based on a weblog is in the pipeline. Many of you may have read in the news last year about Salam Pax, apparently someone blogging in Baghdad during the last gulf war. The blog despite doubts over its authenticity was turned into a book. Now the film rights of the book have been taken up. Coverage here from the BBC Online. Salam Pax was the pseudonym of Salam Abdulmunem.

    Friends and journalists who went to Network+InterOp the networking and communications show in Las Vegas have provided some mixed feedback.

    – Vendors dwarved the amount of customers at the show. This is being touted as an indication that business customers are not there to buy. I am inclined to think that it is much more of a cultural shift in organisations, when your job could disappear abroad, how can you justify a week long company shopping trip in Las Vegas when you can get the information off the web or by reading journals? Shows have been more of the business culture in the US than in Europe, with the exception of a few events like drupa and CeBIT in Germany

    – Lots of people where showing cool technology that will never see the light of day because computer users are in business and the home move at a slower basis than technology advances

    – Mesh networks had a higher profile. Mesh is one of them buzzwords that many people have been kicking around for a good while. One way of looking at it is that it allows a number of wireless devices be they a laptop with a wireless card or an airport hub to act as one network. This would allow wireless hotspots to be grown and managed more easily in businesses or in the home. I expect more of a push around this in the next few years, though it would struggle to be used with present technology to distribute high quality video around the home. More wireless related content here.

  • Apologies and Connection

     Since my last post there have been lots of interesting things happening like the media being surprised that systematic torture has been occuring in Iraq. I’ve got some news for you its war, that means that its dirty, bloody and thoroughly unpleasant – try reading the works of Wilfred Owen or watching the Battle of Algiers to get a sense of how nasty it can get.

    On RTE radio one this morning, they had an expert comment about some CIA torture manuals that had been found. The main themes were that you used peoples fear against themselves – rather than torturing them, use the threat of torture because people had a greater capacity to withstand pain than they realised. This approach makes sense given established behavioural bias towards risk aversion. Risk aversion is one of the key cues used in behavioural science, it doesn’t surprise me that it manifests itself in this scenario as well.

    Sony has launched its Connect service, a rival to Apple’s iTunes Music Service. According to the Washington Post the service is ‘unworthy’ of the corporation who gave us the Walkman(TM). If it gets the kiss of death from Walter Mossberg at the Wall Street Journal you can bet your bottom dollar that there will be more salarymen falling on their swords than a Kurosawa samurai film. As the New Yorker put it: “someone whose judgment can ratify years of effort or sink the show.” More media related content here

    Lastly owe those of you who read this blog regularly an apology. I have not been contributing here much because I am in the middle of selling my house and moving closer in to London. Any of you who have dealt with British estate agents will have felt my pain. More news on the woes of house buying in the future.

  • Symbiot – Mutually Assured Disruption

    Symbiot a Texas based Internet security company has announced a new technology that allows companies to ‘strike back’ at cyber attackers. Symbiot is looking to become a sort of ‘Smith & Wesson’ or Winchester of the ‘world wild web’, this may not be a good idea.

    Imagine giving bank staff access to machine guns. Then imagine telling them that you are going to export their jobs to Mumbai or a 14 year-old kid upsets them and you end up with a Falling Down type scenario. Further imagine that the bank employee kills a whole pile of bystanders.

    This is the real-world equivalent of what could happen on the Internet. Hackers and script kiddies use slave machines to mount an attack whilst being concealing their own identities.

    ISPs and POPs (the internet equivalent of bus companies and roadways) could end up casualties, whilst the real perps get away scot free. In fact, this infrastructure disruption could encourage hackers to seek out and provoke a Symbiot powered response as a ‘denial of service attack by proxy’ on a particular network provider.

    In the real world this already happens with SWATing. A false call is made to the local police station of whoever is to be SWATed. Claims are made of sounds of gunshots, yelling or even hostages and the local police SWAT team rolls out on the unsuspecting victim. This is all relatively easily done through caller ID spoofing and other phone phreaking techniques. There is a clear analogue between this and hackers using IP spoofing or even machine hijackign to trigger a response.

    Now, imagine if one of Symbiot’s killer boxes was hacked and got into the hands of someone who really knew how to do it?

    While the Dept of Homeland Security worries about the risk of radical Islamic hackers, its time they should start looking a little bit closer to home….

    You can read my contribution to AlwaysOn about Symbiot. More security related content here.

  • Are we too complex?

    Are we too complex is a post that I originally wrote on the now defunct Alwayson Network regarding the thoughts of Dan Geer on complexity in technology.

    Dan’s ideas are interesting because they make sense to the man in the street. For instance the more complex you make something, the more likely it is to go wrong. This makes sense whether it is a sophisticated mechanical device or a piece of software. I looped his thinking into my own because I believe there is a ‘sweet spot’ for technology sophistication and usability. Classic examples of that sweet spot would be Videoplus remote controls, pre-Symbian Nokia phones, Palm Vx and the original iPod. They’re largely intuitive, they do one thing really well and they just work. By comparison, most PC software and operating systems probably don’t.

    Geer considers this primarily from an information security point of view. But he also realises that computer experience is an important part of security.

    Dan points out that our ability to use computers as individuals is not increasing as the same rate as computing power and storage. For the past seven years I surfed the web. listened to music and churned out documents on behalf of my clients. The only difference is now that I use a more powerful Unix based workstation laptop (my Apple iBook) to do the same thing. What’s the point? I am not more efficient or effective.