cahwyguy: (Default)

Here are some technology news chum items that have caught my eye of late:

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

This has been a busy busy week, and I haven’t had a chance to work on clearing out the news chum until now. This first collection is all computer related:

  • Going Phishing. Hopefully, you’re all cyber-aware. You know not to trust links in email you receive. You’ve been trained to look at where a URL goes before you click on it. You know not to click on links in email; you’ll copy the link and paste it into your browser bar. You know not to trust sites that aren’t the well-known version. But https://аррӏе.com is safe, right? Right? RIGHT? Actually, no. It may look like it reads “apple”, but that’s actually a bunch of Cyrillic characters: A (а), Er (р), Er (р), Palochka (ӏ), Ie (е). The security certificate is real enough, but all it confirms is that you have a secure connection to аррӏе.com – which tells you nothing about whether you’re connected to a legitimate site or not. This is what is called a homograph attack. It is something that can fool the best people, even if you hover over and check the link before browsing — unless you’re using IE or Edge or Safari. Ars Technica has even more information, but the short and skinny is: If you use Chrome, make sure you’re at Chrome 58 or later; if you use Firefox, enter “about:config” in the address bar, agree to the displayed warning, and then enter “punycode” in the search box to bring up a line that reads network.IDN_show_punycode. Next, double-click the word “false” to change it to “true.” From then on, Firefox will display the “dumb ascii” characters and not the deceptive, encoded ones.  I’ve done that, and now I see xn--80ak6aa92e.com when I hover over the link.
  • Secure Coding. I grew up programming in Fortran, PL/I, Algol 68, RSTS/E Basic, and C. Except for perhaps Fortran and C, the rest are mostly dead. Today, kids program in C++ and Java — but they aren’t necessarily writing better programs. But following good standards can help. Here’s a link to a discussion on how to do secure coding in C++.
  • iPod without iTunes. If you are like me (and fewer are), you use your iPod for all your music (and you plan on adding more this Record Store Day). But do you backup your iPod? I do — via iTunes to my M: drive, and I back that up on my X: and W: drives and on a backup iPod. But most don’t — and most abhor iTunes. Here’s how to backup your iPod without using iTunes. I’ll not that I’ve used copytrans in the past (especially before I just kept everything in iTunes), and I’d recommend it.
  • Never Too Late. As I’m typing this, iTunes is playing “Never Too Late” (to tell the Truth) from Scottsboro Boys. If you’re like me, and like to tell the truth, you’ll be happy to know that Snopes is now embeddable.  Here’s an example of an embedded article:
  • Decluttering Apps. If you’re like us, you need to declutter. The NY Times recently had a review of a number of apps that will help you do just that.
  • Pushy Microsoft. Microsoft is continuing to push people to subscribe to Office 365. The latest is restricting the ability to use Skype for Business and One-Drive if you are using a Microsoft Office Standalone Office product. You’ll see more and more products insisting on the subscription model: Adobe, Quicken, Microsoft, ….

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

Continuing to clear the news chum, here are a bunch of articles all related to cybersecurity:

  • NIST Cybersecurity Framework is Changing. NIST is getting ready to release an update to their Cybersecurity Framework (and other updates are planned: eventually, the IPD of 800-53rev5 will be out for review, and then an update to 800-37). A key change in the new framework is measurement: The first, which should really be the starting point for any comprehensive cyber risk management program, is an entirely new section about measuring the performance and maturity of organizations’ cyber risk programs. It also discusses the need and complexity of correlating those metrics to business objectives and outcomes. That means measuring both how organizations are reducing risk to the business and identifying the benefits to the business resulting from good cybersecurity, such as how many new customers the organization has gained and/or how much more revenue was brought in. Another significant change in the framework is the addition of recommendations surrounding supply-chain risk management. Finally, the access-control category has changed within the framework. It was renamed to identity management and access control. The change adds more focus on making sure identities and credentials are managed from the time they are created to the time they are deactivated.
  • Minimal Cybersecurity Requirements. Although some of us have known about this for a while, the world is growing increasingly aware of NIST SP 800-171. The new mandates take effect Dec. 31 this year and apply to contractors for the Department of Defense, National Aeronautics and Space Administration (NASA) and the General Services Administration. While some manufacturers are accustomed to working with federal agencies on classified projects, these regulations are meant to safeguard sensitive information in unclassified material, particularly as the threat of cybersecurity breaches grows.  Basically, they apply to any federal contractor that handles what is called Controlled Unclassified Information.
  • Encryption and Protection. Protection is good. Just ask porn site Pornhub, home to things like thumbzilla and youporn. They’ve gone to always on encryption, meaning that although your ISP knows you’re going to pornhub, they don’t know what you’re looking at. Others are turning to VPNs, and here’s a good summary of how to use one.  Lastly, for those worried about your ISP seeing where you go, one thing you should do is not use the ISP’s DNS. I use openDNS: 208.67.222.222 and 208.67.220.220.
  • Verizon and Spyware. Note that if you use Verizon Wireless, they may be pre-installing spyware on your phone.
  • JavaScript Popups. Google is making some changes to eliminate those popup dialogs that don’t let you leave. Such popups are occasionally useful as alerts, but their fix sounds reasonable.
  • Congrats to North Hollywood High. They won a national cybersecurity competition. Disclosure: My employer helped sponsor the team, although I was not involved.
  • Printer Cartridges. Lastly, an interesting court case that could dictate how much you pay for ink. This week, oral arguments were heard in the case of Impression Products, Inc. v. Lexmark International, Inc., and according to the well-regarded SCOTUSblog, it seems that the justices are having a tough time figuring out how to view this difficult legal tangle themselves. At its most basic, the case is a dispute over Lexmark’s patent rights regarding refilling printer cartridges. Impression Products is a small business with about 25 employees. It specializes in buying used printer cartridges and re-manufacturing them. In 2012, Lexmark decided to add Impression to an already existing lawsuit against other re-manufacturers. While the other defendants eventually settled, Impressin has stuck it out and the case has made it to the highest court in the land. The question is: Does the manufacturer give up rights to something when you physically purchase it? Can Lexmark dictate what you can do with your printer cartridge? Can HP dictate you can’t open your computer and modify it? Big key questions.

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

XKCD EditorsA recent XKCD on editors reminded me that I’ve been accumulating a number of articles on computer history I should clear out, because I’m a computing dinosaur.

  • With respect to the xkcd, there’s nothing new under the sun. I remember the days at UCLA when there was a pitched battle between the supporters of the Rand window editor (“e”, formally “ned”), and the vi editor (for those clueless, vim is a later reimplementation of vi, and of course, vi was the visual version of ex, which competed with the ed editor on Unix). Then there were the TECO stalwarts that came from the DEC world (I used TECO on RSTS/E), the editors such as TSO and URSA on the IBM 360/91 (later 370/3033), and the battles between emacs and vi stalwarts.
  • At the same time we were dealing with URSA and TSO, we were printing on a IBM 1403 Lineprinter. This wasn’t a dot matrix or a laser printer, kids: this used a chain of type and printed super fast. You could even play music, if you did your boldface right. IEEE Spectrum has a fascinating article on how the 1403 was able to print so fast, including the fact that it didn’t press the type against the paper — it pressed the paper (from behind) against the type.
  • Back in those days, we didn’t program in C++ or Java or even Ada. It was FORTRAN and COBOL and Algol and… Guess what? Folks are still using those languages. I had a CSSF submittal this year that was programmed in FORTRAN, and you can make a slew of money in banking if you can program in COBOL. All the old-time COBOL programmers are retiring (sometimes feet-first); and these newfangled kids don’t want to learn it. [As a PS: Dan Berry at one time had a cartoon that showed a 1950s housewife labeled COBOL, a 1950s engineer labeled FORTRAN, and a baby labeled PL/I…. and the milkman walking down the driveway labeled ALGOL. The caption: “Funny dear, he doesn’t look like me.” Does anyone have a scan of that cartoon?]
  • Jumping up to the 1980s: The news these days are filled with items on the death of support of Windows Vista and the first version of Windows 10. But there’s another milestone: Windows 3.1. Twenty years have passed, and we’re still living with many of the notions 3.1 introduced (it was the first stable and popular Windows version, cementing the fact that you should never trust even numbered Windows variants, remembering that Windows 10 is really Windows 9, but they screwed things up with 95 and 98)
  • Turning to the hardware: Chips used to be simple: instructions sets, memory mapping and such. Intel is starting to change all that, with multiple processor instruction sets on a single chip. One of Intel’s changes is a mix-and-match heterogeneous design where different types of cores can be put in a single chip package. Under the new design, it’ll be possible to mix different architectures on a single chip. Chip packages could also have cores made using different manufacturing processes. Now ask yourself: with hardware this complex, how do we know it is correctly implemented?

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

Observation StewOver the past few weeks, I’ve accumulated quite a bit of news chum (that is, links and articles that I found interesting) that refuse to theme or create a longer post. So let’s just clear the chum, and for fun, let’s see if we can build a chain connecting one article to the other. To start the screw, so to speak, let’s begin with…

  • High Tech Condoms. I don’t know where I’m going on this, but I know what’s coming, excuse me, cumming. I mean, this brings the Internet of Things to its logical climax. I mean, it’s thrust — what it pounds into you — is that not everything needs to be connected. I’m talking, of course, about the i.Con — the First Internet Connected Condom. I’m sure that you, like me, is asking — but why? According to the article: The i.Con tracks speed, “average thrust velocity,” duration, skin temperature, girth, calories burned (no joke) and frequency of sessions. Most importantly for many, no doubt, will be how a wearer stacks up to the average and “best” performers — though a sexual partner will likely have an insight or two about that. Statistics are tracked via an i.Con app. The i.Con is also supposed to be able to sense sexually transmitted diseases [but what if the technology gets a virus?].  The ring will come with a one-year warranty and have a micro-USB charging port to provide up to eight hours of juice after a single hour of being plugged in. Supposedly “all data will be kept anonymous, but users will have the option to share their recent data with friends, or, indeed the world.”
  • Security of Medical Data. Of course, we all know our medical data is secure, right? Right? RIGHT? Well, not really. I found an interesting article this week on Medjack, a medical trojan. The problem is that the proliferation of literally insecurable medical systems running orphaned operating systems with thousands of know, unpatchable defects provides a soft target for identity thieves looked to pillage your health records. One trojan, Medjack, enters healthcare facilities by penetrating these badly secured diagnostic and administrative systems and then fans out across the network, cracking patient record systems. These records are used for tax fraud and identity theft, and to steal narcotics prescriptions that can be filled from online pharmacies and then resold on the black market.  Security firm Trapx says that “every time” they visit a healthcare facility, they find Medjack infections running rampant on the network, using exploits designed to take over Windows 2000 systems to seize control of the creaking, non-upgradeable systems that are inevitably found in these facilities.
  • Google Maps Data. Speaking of data, have you ever wondered how Google Maps gets its accurate traffic data. Of course, the answer is from you.  The Google Maps app on Android and iOS constantly send back real-time traffic data to Google. The data received from any particular smartphone is then compared to data received from other smartphones in the same area, and the higher the number of Google Maps users in an area, the more accurate the traffic prediction. Using the historical data it has compiled over the years and traffic data from mobile devices using the Google Maps app, the company is able to create models for traffic predictions for different periods. For example, the modelling techniques would be able to predict that certain roads would experience more traffic during rains than other times of the year. Google also takes traffic reports from transportation departments, road sensors, and private data providers to keep its information up to date. The accuracy of location data is unmatched only because of its users, since the billion Google Maps users on the road act as sensors for the app, which make the service as precise as possible.
  • Bus Disposal. One way to avoid traffic is to take the bus. But have you ever wondered what happens with buses when they die? Here’s an interesting article on what happens to Muni Buses in San Francisco when they are retired. Some, of course, are scrapped. Others are reincarnated as mobile showers for the homeless, airport shuttles and odd uses all across the Bay Area — even after accruing more than 400,000 miles on the road apiece. That’s due to the ingenuity of the San Francisco Municipal Transportation Agency’s 300 or so mechanics. This all occurs in Muni’s Islais Creek Yard, a bus yard in San Francisco’s south side, that serves as a staging area for buses that are set to be sold, scrapped or otherwise discarded. One of the more interesting conversions, after the bus was stripped of useful parts, was for the nonprofit Lava Mae, which converted four old Muni buses into mobile showers for San Francisco’s homeless residents.
  • A Flight of Angels. Of course, talk of buses takes us to other forms of transit such as trains. One unique train that existed in Los Angeles is coming back to life, again. It appears that Angels Flight, a tiny funicular in downtown LA, will be running again by Labor Day. A nonprofit has been in charge of the attraction for more than a decade, but a new private operator, ACS Infrastructure Development, Inc., is taking over for the next 30 years.  The funicular is over 100 years old, and has been inoperative since 2013 due to an accident.
  • Clintons on Broadway. Of course, talk of trains takes us to subways, and no where are subways more popular than in New York. However, I doubt that either Barack Obama or Hillary Clinton take the subway when they go to Broadway. Since losing the election, Hillary has been regularly attending Broadway shows, usually to a very receptive crowd. At least four times since November. At each theater appearance, Mrs. Clinton is greeted as a vanquished hero — standing ovations, selfies, shouted adulation. Mrs. Clinton has been attending Broadway shows for years, often when she has had a personal connection to an artist, a producer, or to a show’s subject matter. As for Obama, he was seen on Broadway taking his daughter, Malia, to “The Price”. The daddy-daughter duo headed backstage after the play — a new revival of the Arthur Miller classic — and met with the cast, including Mark Ruffalo, Danny DeVito, Tony Shalhoub and Jessica Hecht.  Contrast this with Trump and Pence. Since the election, only Pence has been to Broadway — to see Hamilton, and we all know what happened there.
  • Sushi. If you’re going to a show, naturally  you have dinner first? How about sushi? Here’s an interesting history of Sushi in the United States. Although there were a few restaurants experimenting with raw fish in 1963 in New York, Los Angeles was the first American home of authentic Japanese sushi. In 1966, a Japanese businessman named Noritoshi Kanai brought a sushi chef and his wife from Japan, and opened a nigiri sushi bar with them inside a Japanese restaurant known as Kawafuku in LA’s Little Tokyo. The restaurant was popular, but only with Japanese immigrants, not with American clientele. However, as more sushi spots opened in Little Tokyo, word got back to Japan that there was money to be made in America. Young chefs, tired of the rigorous and restrictive traditional culture of sushi making in Japan, struck out on their own in LA. The first sushi bar outside of the Little Tokyo neighborhood popped up in 1970, next to the 20th Century Fox studio. And then came Shōgun, … and you can predict the rest.
  • … and Beer. If you are having sushi, you are likely having beer, wine, or saki. These beverages come in bottles of colored glass, and have you wondered how glass gets its color? Here’s an infographic explaining how different chemicals result in different glass colors.
  • … on a Table. Additionally, you are likely sitting at a table to eat that sushi and drink your beverage. Speaking of tables, here’s a collection of interesting periodic tables.
  • Plus Size Fashions. To finish off the chain, if you eat too much at that table, you get fat. We know a lot about size acceptance for women, but what about men (and us CBGs — chubby bearded guys). Here’s an interesting article on plus-size fashion… for men.

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

Today’s news chum post looks at a number of things from the past (some of which are being brought back):

P.S.: While working on this post, I was reading my FB Pages feed, and I discovered that Orange Empire Railway Museum (FB) is bringing back my buddy Thomas and his friends in April (April 1-2, 8-9). This was a surprise to me; upon investigation, I discovered that OERM is now your only place to see Thomas in SoCal, and that he’ll be back as usual in November as well. We can’t make it to volunteer in April as our schedule is too booked up (you’ll see why in my theatre post tomorrow), but you should if you’re into the Really Useful Engine. We’ll be there as usual in November.

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

In another tab I’m working on my final news chum stew of the year (look for it shortly), when I realized I had a sufficient set of articles for a themed post — specifically one looking at some unexpected impacts of technology:

  • Self-Driving Cars and Organ Donation. Slashdot had an interesting piece on the impact of self-driving cars: It will significantly impact the availability of organs for donation. The basic thesis is as follows: A primary source of organs in good shape for donations is auto accidents, where the victims have indicated they are organ donors. Self-driving cars will reduce the number of auto accidents, and hence the number of healthy donors. We’ll be left with those that die in hospitals, where donors tend to be less healthy.
  • The Amazon Echo and Privacy . I recently was gifted with an Amazon Echo Dot. I’ve installed it, even though I’m not quite sure what it is good for, especially as I don’t do streaming music. But there are interesting privacy implications (independent of the insecurity of the Internet of Things): there is now a murder case out there where the question has been raised of requesting the audio captured by the Amazon Dot as evidence. So, for those that have the device, don’t talk about committing crimes where it can overhear you.
  • Streaming Media and Extras. There are those that believe the move to streaming media is good — you’ve got your music and video everywhere. That’s good, right? Right? I don’t necessarily subscribe to that, given my iPod Classic is nearing 40,000 songs, but I have streaming quality as they are all MP3s or AACs. An article from Vox looks at the problem with respect to video, and concludes TV on DVD is increasingly important. They provide significantly higher video quality than Internet transmission can support, and provide video extras (commentary, outtakes, alternate audio tracks, superior audio quality) that streaming can’t support. Plus, you own the content, as opposed to leasing it (which is why I still like my iPod Classic). That reminds me: I still need to order Lou Grant, now that it is available. Yes, there are series that are still just being re-released.
  • The Internet Kills Typography. Slashdot has another interesting discussion: this time, on how the Internet has killed the curly quote (e.g., “ and ”, in favor of the straight quotation marks). Deeper in the discussion, the larger point is made that the Internet is killing typography in general: people don’t think about the differences between inter-letter spacing (do you know the difference between “ ” (en-space), “ ” (em-space), “ ” (thin space), “‌” (zero-width non-joiner), ” ” (no-break space), “” (soft-hyphen), and ” ” (normal space)? Did you ever write “␣” for space?); often the distinction between the various hyphens are lost, and even the difference between the -, –, and — is being lost (that’s hyphen, en-dash, and em-dash). I remember the days when one got curly quotes by using “ and ”, and depended on programs like troff to fix things up. Is it better these days? I don’t know.

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

Well, sorry to say (from my point of view), but it looks like Donald Trump has won the electoral college vote. We won’t know for sure until the votes are counted by the House in January, but I’m sure that election won’t be hacked.

Yup, sure.

Unlike, say, how the election that got us Trump was hacked. We may never know whether what the Russians did was sufficient to change votes, but we know how they did it, and some of the ways the influence occured. So, let’s see if you can be smarter than a Democrat. Note that I’m not saying “Democrats” in general, but some specific Democrats in Hillary’s organization.

How did they basically do it? Social engineering. Read the New York Times account of the hack. Podesta was phished, and the starting place was a purported message from Google indicating an account had been hacked, and a password needed to be changed.  That, combined with a warning message that mistyped “illegitimate” as “legitimate”, and the damage was done.

See, what people forget is that the weakest link in the security chain is the human link. It is incredibly easy to do a social engineering attack. Our nature is such that we want to be helpful, and we fall for it. Here’s an example: During our recent security conference, one of the banquet staff found a USB drive that someone left behind, and he asked us to return it to its owner. We promptly tossed it. What would you do? Many people would put it in their computer to find the owner — and potentially be hacked. Or they would just announce it and hand it to the owner, letting them be hacked. One never knows what changes were made to that drive when it was out of your sight (this, by the way, is a good reason to use encrypted USB drives).

What about other attacks? Those ads you see on webpages? They can insert malware into your router without you knowing it. They could bring in ransomware? My malware dectector has frequently intercepted malicious ads on non-malicious sites. Sites you go to every day. These sites often don’t have control of their ad networks.

By the way, you do have regular backups, right? Not always connected to your computer? Not in the cloud? Could you survive the sudden loss of your data?

As they say, fool me once, shame on you. Fool me twice, and…. well, we’ve just seen the fool get elected. Let’s not be fooled again.

P.S.: And what should you do about the fool? The answer is not to use your computer to sign a petition or send an email. The answer is to take time and write your congresscritters and senators, and as many other congressional people as you can, a hand-written letter. Legibly. This shows that the issue is important for you to take the time. Send it to their local office, or call. Insist that Congress hold Trump to the exact same standards of ethics, no conflicts of interest, and highest quality of minimally-partisan appointments to which they held Obama. Different Presidents should not have different standards. And, just like with Obama and Bill Clinton, they should investigate the littlest impropriety or questionable action by the President or any member of his administration. All Presidents and his staff should be held to the same standards.

PS: And if you don’t hold with that position, then please explain why Trump should not be held to the same standard. Party shouldn’t make a difference in how we expect the President to behave, so you must have some other reason. Our President should be the role model for the country, someone that our children can look up to see how a leader behaves.

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

Observation StewLabor Day weekend is less than a week away. Here’s some tasty news chum to get you through the week:

  • Relaxen und vatch das blinkenlights! Back in the 1960s, you knew it was a computer if it had loads and loads of blinking lights. In fact, a popular meme (mimeographed educational memo exaggerated) going around read: “ACHTUNG! Alles touristen und non-technischen looken peepers! Das machine control is nicht fur gerfinger-poken und mittengrabben. Oderwise is easy schnappen der springenwerk, blowen fuse, und poppencorken mit spitzensparken. Der machine is diggen by experten only. Is nicht fur geverken by das dummkopfen. Das rubbernecken sightseenen keepen das cotten picken hands in das pockets, so relaxen und watchen das blinkenlights.” I mention this because the Lost in Space computer prop has recently been reconstructed. What caught my eye for this article was (a) that the Lost in Space computer was later used as the Batcomputer, and (b) that the TV shows of the 1960s used surplus, 1950s-era Burroughs B205s whenever they needed something cool and blinkenlighty.
  • The Nodpod. Ever attempt to fall asleep on an airplane or vanpool? Your head droops forward and back as your neck gets sore. There’s a proposed solution. The nodpod. The NodPod, currently seeking funding on Kickstarter, claims to provide a more comfortable, upright snooze by holding your head at a 90 degree angle. The cushioned sling attaches to your headrest (without blocking the screen of the person sitting behind you) and can be adjusted to keep your noggin snug in place.
  • Lint in our Oceans. We’ve all seen lint in the lint trap, and worried about how dryers are destroying our clothes through friction. Washers have the same problem, especially for clothes made of plastic — and polyester is plastic. Microfibers wash off, go into the oceans, and harm sealife. The linked article purports to solve the problem through a magic ball that captures polyester microfibers. Potentially interesting.
  • Scary Math. Does math scare you? How about mathemagic involving the (horrors) number of the beast (not his better half, 333, or the neighbor of the beast, 667). I’m talking about Belphegor’s Prime, a supposedly sinister numeric palindrome that has a NUMBER of odd qualities. Or at least that’s what one mathematic trickster would have you believe. The number known as Belphegor’s Prime is exactly, 1,000,000,000,000,066,600,000,000,000,001. For those without the fortitude to stare directly at the infernal number, that’s a one, followed by 13 zeroes, followed by the traditional Number of the Beast, 666, followed by yet another 13 zeroes, and a trailing one. Learn all about it here.
  • Kosher Frozen Custard. If you’ve ever been to St. Louis, you likely know about Ted Drewe’s Frozen Custard — a classic on Route 66. Did you know it was Kosher? Here’s the story of how that came to be.
  • Daugs in Northridge. IHOP has been on the move in recent years: it vacated its long-time location on Reseda Blvd for the former Rosies at Tampa and Nordhoff. So what is happening with the former IHOP? It is becoming Daug House, a restaurant for craft hot dogs. Dog Haus emphasizes community engagement and support through the outreach programs which connects with organizations around the area, such as schools, churches, nonprofit organizations, and little leagues. The menu includes all beef skinless Haus dogs, hand-crafted Haus sausages, a proprietary grind of chuck and brisket Haus burgers, sliders, sides and desserts. While we’re on the valley, here is Eater LA’s list of great Valley restaurants, almost all of which are clustered around Ventura Blvd, because we all know that for the foodie crowd, there is no life in the valley north of US 101.

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=fringeuserpic=toshibaIf you haven’t figured it out yet by reading my blog, we’re in the midst of the Hollywood Fringe Festival (FB), meaning almost 300 shows and events spread over Hollywood and West Hollywood during the month of June. It is impossible to figure out the best way to schedule the shows you want to see in the time you have.

Or is it.

Now I’m not an actor, director, producer, or anything connected with the theatre industry, other than an audience member. I am, however, a computer scientist. I’m a software engineer, and I know how to draw up specifications for problems to be solved. Scheduling the Fringe is a solvable problem: after all, I had kids at the California State Science Fair doing something similar with school assignments.

So here’s my challenge to you: I’m going to lay out the problem as I see it. Can you develop an app or a web page that can solve the problem in a usable fashion? No pay involved other than the glory of the challenge, but I will pass any good results on to the folks at the Fringe to consider next year.

Here’s the problem:

  • You have a database of shows and events. Each show has webpage link, a title, a venue, a ticket price, a running time, and some set of performance times.
  • You have a database of venues, each with a street address (which you can likely use a Google interface to get GPS coordinates and walk time).
  • You have a list of shows and events that someone is interested in, together with what we’ll call an interest level: 0 – no interest to 3 – must see.  This could be an added parameter on the current Favorites list (go to the website, create a user, and then you can save favorites), or it might be entered in some other way.
  • You have a list of times for which the person is available, including some times marked a “meal breaks”. For example, I might be available weekends between 11am and 11pm, with a 1 hour dinner break after 5pm. You get to determine the most user friendly way to specify this.  Perhaps this could interface with Google Calendar?
  • You have a desired dollar amount they want to spend on tickets.

Given these inputs, produce a best fit schedule, that includes as many of the highest priority shows as possible, then as many of the next priority tier down, and so on for priorities 1-3. You need to take into account walking time between venues, or if the distance between venues exceeds the walking time by 15 minutes, driving and parking time (parking can take up to 15 minutes if you aren’t lucky). You need to take into account meal breaks. Allocate 10 minutes before a show to allow time to check in and get seated. Make sure the total cost does not exceed what the user has indicated.

Ideally, this tool might even connect to the ticketing system (including purchasing Fringe buttons) such that once a schedule is set, it can be ticketed. There might be the need to adjust if a show is sold out of tickets. Ideally, whatever it ticketed could then be saved to Google Calendar or whatever the Mac folks use.

For now, build the databases as you see fit. If you need, I can talk to the Fringe folks and get you information on the JSON/XML API to interface with their site.  Ideally, this should be something usable by folks used to normal websites (i.e., not a complicated interface).

I think this is a solvable problem, and might actually be a good assignment for a class as an example of a real world problem. Feel free to post questions here, and either I’ll answer them based on my experience, or I’ll pass them to the Fringe for resolution.

OK, Go….

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=toshibaTechnology is sometimes straight-forward. Sometimes, however, it befuddles you and doesn’t do what you want. Here’s are some articles about some useful things to know, in advance:

  • The 7-10 Split. You’re on Windows 7. You’re not sure if you want to move to Windows 10. First, you should know  that some updates from Microsoft can bork your Windows 7 installation, especially if you have an ASUS motherboard. Assuming you survive that, next comes the update question: Move to Windows 10 or not. Here’s one way to lock in that free upgrade, and still stay on Windows 7. Of course, it involves moving to Windows 10 and then backing it out. Of course, you might not have a choice. It appears that Microsoft is forcing people to move to Windows 10 by scheduling the updates without telling them. Forewarded is forearmed. Watch closely to see how to avoid it. Further, the article confirms why Microsoft is pushing Windows 10 so hard, and why it is free. The answer: It is that old adage: if you get it for free, you are not the customer, you are the product. From the article: “When Microsoft created Windows 10, it tied in numerous monitoring and data collection tools. The operating system is capable of gathering your search history, web usage, Windows Store usage, details of what applications you use, voice recordings, emails, geographic information and just about anything else that is on your PC. This information is gathered in part for improving Windows-based services, but it is also used for market research and advertising purposes. Because each user on Windows 10 increases the amount of advertising information available to Microsoft, which in turn enables Microsoft to earn more revenue from selling this data, it is not surprising that Microsoft wants everyone to use its new OS.” In a related note, Microsoft is adding more ads to the Windows 10 Start screen that you can’t remove.
  • Booting from USB. If you get hit by malware, you might need to boot from a USB drive. The problem is: it’s not always that easy. Here’s how to boot from a USB drive. It is not as easy as it was in the old days, when you could boot from a floppy (or in some cases, a CD). Today’s PCs come with a lot of protection—which is good—but it can get in the way. Somewhere in your BIOS setup screen, you’ll almost certainly find a Secure Boot option. If you can’t boot from a flash drive, turn it off. UEFI can also be a problem. Finally, most of today’s PCs boot immediately from the internal hard drive or SSD, without looking for bootable external media first. You have to do something special to make them look, and what you have to do depends on your PC.
  • When “Buy Now” Isn’t. When you go to Amazon or iTunes and click “Buy Now”, I bet you think you’re actually buying something. That’s what most people think. The problem is: “Buy Now” sometimes doesn’t buy anything at all. As a recent study shows, when it came to physical goods, the shoppers pretty much knew exactly what they thought they were getting. But when it came to digital goods, there was a violent mismatch between what the customers thought they were buying (something they could resell, lend, or give away) and what the small print said they were getting (an extremely limited copyright license that required them to use their media in conjunction with special restrictive players that prohibited all these activities).  In short: people are buying things because they have mistaken beliefs about what they’re getting, and if they knew better, they wouldn’t buy those things on those terms.

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=cyborgOver lunch, let’s continue the clearing of the accumulated links. This collection of links all relates to technology in some way:

  • Safe Exchanges. Have you ever purchased something over Craigslist, but then been worried about meeting the other person in a safe place to exchange the items. If so, did you know that many cities have established safe exchange zones, where the exchanges can take place under a security camera in a public place.  You can find the safe exchange location near you by clicking here.
  • Google Keyboard Updates. Google is updating its Android keyboard again. For example, one of the most useful changes is a fine cursor control: just tap and hold on the space bar and you can slide the cursor to where you want it to go. Suggestions are also smarter, as you can touch and drag away one that you don’t like to the trash. This can cut down on those typos that got saved into Google’s memory. There’s a one handed mode, and a 9-key layout for entering numbers.
  • Extending Gmail. Another Google related article: 5 Chrome extensions that enhance Gmail.
  • Cables: Keep or Toss. Here’s a good explanation of all those cables you find around the house. I disagree a bit with his recommendations on what to keep or toss. For example, I’ll keep 30-pin Apple connection cables, but that’s simply because we have 3 iPod Classics in this house. I also would tend to keep VGA, but that’s simply because the ACSAC projectors use VGA. We also still tend to use RCA/Composite cables, but that’s because we haven’t gone to digital TVs.
  • Hacking Airplanes. The aviation industry is waking up to the need for cybersecurity. About damn time.
  • Ransomware. Ransomware is now the biggest cybersecurity threat. It certainly is a large worry for me, especially when I see a lot of disk activity or a file goes missing. Here are some good tips to stop ransomware in its tracks. I particularly like the advice to backup to an external drive that does not remain connected to your system. That’s what I’ve been doing of late.

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

Observation StewFirst and foremost: to those who observe: May you have a happy Pesach (Passover). May your seder move you in ways that matzah never will. Here’s some accumulated news chum for the week for your Pesach discussions. I promise you they’ve only been thickened with potato starch:

  • Seders for Christians. If you are like me, you probably we brought up on the belief that Jesus’ Last Supper was a Passover seder. After all, it was a meal with a large group, and Passover occurs around the time of Easter, right? But then again, I’m Jewish. What do I know? But we all should have been suspicious of the “Take this bread” comment.  But as a result of this misbelief, Christian groups have been holding their own seders to remember the Last Supper, and Jews have often invited Christian friends to their seders. The Coffee Shop Rabbi has a nice informative piece that sets the record straight: To Christian Friends Coming to Seder. Well worth reading.
  • Expect to See This on “Wait Wait Don’t Tell Me”: Do you ever read an article online and go: “We’ll see this on Wait Wait?” Here’s an article destined for the show; I could easily see this in the “Bluff the Listener Game”. It is a story about the next advance in the Internet of Things. Here’s the quote describing the item from Slashdot: “Do you worry that your significant other is having mid-day romps in your bedroom while you’re stuck at work banging out TPS reports? There’s an app for that, and a smart mattress with built-in sensors to detect when between-the-sheet activities are taking place, with or without your participation. It’s part of what a mattress company in Spain is calling its “lover detection system.” You can’t make this stuff up. Or maybe you can. You might seriously question whether or not the so-called Smarttress from Durmet is a real thing or an attempt at a viral marketing stunt. By all accounts, it certainly looks real. There are two dozen ultrasonic sensors embedded in the springs of the mattress. These tell-all sensors detect the speed and intensity of motion, how long the mattress has been active, and the history of encounters. That data is used to create a 3D map in real time, which you can view on your mobile device with an app for either iOS or Android devices.
  • Expect to See This on “Planet Money”: Then again, there are those articles that you know will show up on Planet Money from NPR, especially after they have already done a podcast on the subject. Hot on the heels of that podcast, which was about how Argentina racked up great debt, and then refused to pay it leaving bondholders in the lurch. Most eventually settled for pennies on the dollar (or whatever the Argentinian equivalent is). Today brings news that, in order to get the black mark of bond default off their record, Argentina is paying off the remaining bondholders in full. So, two questions: (1) If you were a bondholder who settled for bubkis, how would you feel? (2) Given this history, would you lend this money country, or invest in a pension fund that does?
  • Diversity and Hollywood. In the recent past, I’ve highlighted some very interesting podcasts that have increase my understanding of diversity, including some excellent episodes of both Startup and of Reply All. Here’s another interesting question on diversity: Why does Hollywood keep casting whites in Asian roles? Performance art (theatre, movies, TV) clearly has a diversity problem: both on-stage/before-the-camera and in the unseen creative and production roles. If this country is truly a melting pot, then our creative results should reflect that. But here’s a question as a result: As a result of this, one culture’s expression may become popular with all. How does one balance broad acceptance with cultural approbation? For example, I saw a friend posting about a Color Vibe run. I saw it, and instantly thought of the Holi Hindu color festival. Think about the first item in this chum, about Christians picking up the Seder custom. Cultural approbation? It even occurs at the Seder: look how the idea of the Orange on the Seder Plate was adopted and changed by the male majority.
  • Cybersecurity Chum. Here are a few cybersecurity items to scare you:
  • Development Chum. Two development related articles: Boyle Heights — a community in Los Angeles that was home to the first synagogue and has a vibrant hispanic life — is battling the attempts to gentrify the community and change its nature. If it happened to DTLA (excuse me, Downtown Los Angeles), it can happen to you. Up in the Bay Area, there has been more success: although the area around the original Mel’s Drive In is being converted to housing, Mel’s will remain.
  • Behind the Scenes. Two interesting articles that take us behind the scenes. The first looks at the dying life of the film projectionist in the UK. The second takes us behind the scenes of Medieval Times, the faux knights-and-damsels pageant. Both are extremely interesting reads.
  • Drugs and Brains. Our last article is something I’ve reported on before: how common allergy drugs can create problems for the brain. This is of particular concern: I”m a regular user of benedryl, and have other drugs that affect the head but help the migraines.

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

Observation StewIt’s Saturday, and you know what that means: Time to clean out the accumulating links and see what sort of stew it makes:

  • Risks of the Internet of Things. Working in cybersecurity, I’m well aware of the risks of the IOT: that these untrusted unprotected devices could be a stepping stone into a private network for attacks. But there’s an even larger functionality risk, demonstrated this week by Nest’s announcement that they will no longer support the Revolv hub: The manufacturer can render your expensive connected appliance useless by simply shutting down the server.  Just imagine it: refrigerators and HVAC equipment that no longer works because they can’t check in to their home bases. TVs and audio equipment that fail because they can’t sync. Cars that become doorstops when their underlying site goes down.
  • Expressing Your Love. Steve Julian is a long time host on public radio here in Los Angeles. He’s been fighting a losing battle — on his terms — with brain tumors. LA Observed had an interesting article on how the digital community is coming out to support Steve and keep his spirits up. We often don’t realize the value of the community we build on places like Facebook, Livejournal, Dreamwidth, and other such social sites.
  • Drug Schedules. With all the talk of new rules for Hydrocodone and Oxy, I’ve been worried about impacts on the T3 I use for migraines. As such, I found this description of what the Federal Drug Schedule is and how it is determined fascinating. I was relieved to see that Oxy was in a different category than T3. Of course, most people are reading it about pot, but I’m not most people.
  • The New Costco Card. Costco will be changing our credit cards from Amex to CitiVisa. In the process, they are moving to a card with outstanding deals. This might entice me to use the card at gas stations, although I’m sure that the gas rebate is less than the discount I get for the private gas company cards (which are charged like cash).
  • Yiddish Roots of Hollywood/Angel’s Flying. With my daughter’s love of Yiddish, article on the subject catch my eye. Here’s an exploration of Hollywood’s Yiddish roots. If that doesn’t interest you, read about how the Angels flew to Anaheim.
  • Celiac Disease and DNA. It appears they are finding more and more information about the root causes of Celiac Disease. This time, they’ve identified more of the trigger DNA sequences.
  • Darwin and Drives. Thumb drives, that is. It appears that surveys show that a majority of people, when they find a thumb drive lying in the street, will plug it into their computer to find out who owns it. They do, and — blam — they are pwned. Leave the investigation of drives to the trained professionals.
  • Porn Economics. Here’s a detailed article exploring the economics of porn, including the fact that most porn sites are run by one company, and that the search terms they choose insidiously propagate particular attitudes and preferences designed to denigrate. It is a fascinating read if only for that access: the tremendous amount of data these sites collect from you. Our society and our electronics used to be somewhat anonymous: your iPod didn’t report your music preference to Apple, that clerk in the adult store didn’t collect names and preferences when cash was used, payphones weren’t tied to individuals. Welcome to the world of big data, and all hail our ubiquitious all-knowing all-collecting overlords.
  • Moving to Encryption. WordPress has moved to encryption by default of all wordpress.com websites. They’ve also moved to encrypting all domain names they host. This is something I need to do one of these days (once I figure out how), both for tasnorthridge-motas.org (which is homed at enomcentral but really on wordpress.com) and cahighways.org (which is homed on enomcentral, but hosted on Westhost).

If you didn’t see the earlier chum this week, they were on food and controversial subjects.

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=cardboard-safeIn advance of the silliness tomorrow, here’s some serious cyber-related news chum:

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

Observation StewBefore I work on the writeup from last night’s show, I want to clear out the accumulated news chum links. I don’t have the time to put them in any particular theme or order, but I’ll try to give some idea why I thought they were of interest.

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

Observation StewIt’s been a couple of weeks since we’ve made some news chum stew, and I’m hungry for a nice heaping bowl. Please join me, and let’s discuss some of these:

  • Inclusion and Integration. Let’s start with an article I chose just for the graphic, which is appropriate for the Oscars tonight and #OscarsSoWhite . I had seen others use this graphic before with respect to diversity discussions, and I realized that it is also wonderful to explain security system engineering, and how security truly needs to be included in the engineering discussion, not just considered in a separate area.
  • Food and Health. Here are two articles related to food and health.The first explores how the proton-pump inhibator heartburn meds (such as omeprazole, which I take) may be associated with a higher dementia risk. This is of concern to me; it is why I’m trying to wean down on the meds (I’m at every other day). Specifically, a new study links the widely used PPIs — which include Nexium, Prevacid and Prilosec — to an increased risk for cognitive decline, though researchers caution the study has limitations, and does not show a definite cause. PPIs have recently been linked to kidney disease, heart disease, and deficiencies of B12 and other vitamins. While patients have reported side effects of the drugs, not taking them often results in stomach pains and worse heartburn as the drug leaves their systems.

    The second highlights a fascinating finding about pasta: Reheating your pasta makes it healthier for you. When pasta is cooled down, your body digests it differently, causing fewer calories to be absorbed and a smaller blood glucose peak. And reheating it is even better – it reduces the rise in blood glucose levels by a whopping 50 percent.

  • Cruz and Gluten Free. It seems society just wants to hate and bully. We’ve all seen various people, shapes, and trends become scapegoats for society’s extended mockery. Recently, Ted Cruz marched into the frey by declaring the military shouldn’t provide gluten-free meals. This promped a lovely editorial in HuffPost asking people to stop making fun of the gluten-free diet (which was the real article that prompted this item). Yes, I know there are many folks doing it because the diet is trendy and they believe it will help them. The problem is that if people start feeling that folks only do it for trendy reasons, then they won’t be careful in making things truly gluten free. That can create significant health problems for those that are Celiac and truly must eat gluten free.
  • Kitchens and Shopping. If you’re a cook, you’ve probably gone shopping at those high end kitchen supply stores. Have you gone to a restaurant supply store. It’s quite fun. We’ve gotten a few things there that we use every day. Here’s a good article on what you should be buying at a restaurant supply store. I particularly recommend the cutting board advice: get a really large one you can sit over your sink. You can then rinse and cut without the water going over your counters, and scrape the cuttings right into the disposal. They also have colored boards, so you can segregate vegetable from meat boards.
  • Humor and Jews. This article got an incredible amount of shares when I posted it on FB: Mad’s Al Jaffe explaining how Mad helped make American Humor Jewish, bringing in Yiddish along the way.
  • Calculators and Caller ID. Recently, an app on my Android Phone informed me it was using Caller ID, and I needed to go into its settings if I didn’t want that. The app, PowerCalc, and yes — it is integrating CallerID to make money for its authors. Needless to say, I want to find a different calculator app now.
  • Cars and Satellites. Here’s a real interesting one. I work in El Segundo, and regularly drive now Nash Street. I’ve never thought about why it was named what it was. However, a posting in an LA History group on Facebook provided some fascinating history. Evidently, what is now the Boeing Satellite Facility at Imperial Highways and Hughes Way used to be the Nash-Kelvinator Assembly Plant. Thus: Nash Street.
  • Names and Processors. A number of years ago, picking a processor was easy. You went for the latest x86 and clock speed. Then came Pentium and Celeron and Atom, and now there are Cores and iX and more. Here’s the first cogent explanation I’ve found of Intel Processor naming. This will be a big help next time I go processor shopping. I wonder how they differ architecture-wise, in particular in memory mapping and privilege rings — things us cybersecurity folks care about.
  • Tuna and Pianos. Get it? Piano Tuna? Nevermind, I’m here all week. You may have seen the recent Android commercial where they play one song on a regular piano, and one song on a piano where every key makes the same note. You might have wondered whether they made a square piano to do it, in order to have all the strings the same length (remember: a piano has the same number of strings as a harp; it is just that they are buried in a box and hit with a hammer). Here’s a Scientific American article on what they did, and exploring if you could make all strings sound the same just through tuning.
  • A, B, C, D, E, and F. If you are old enough, you remember the days before “forever” stamps, when postage changed so frequently they issued lettered stamps worth make up postage between the old rate and the new rate. One wonders if they would issue negative postage stamps now, given that stamp prices are set to go down 2c in April. That’s right. Down. From 49c to 47c. I’d wait to buy that “forever” postage.
  • Maps and Places. We’ve all heard about it, but is it really done? Atlas Obscura explores the legend of fictitious place names on maps. Can they really be used to copyright a map?
  • Restaurants and the San Fernando Valley. A couple of articles on restaurants and the valley. The first explores 118 Degrees, a new raw vegan GF restaurant. The second is supposedly the essential valley restaurants, although I find some a bit trendy for my taste (and as usual, then tend to think only of the Boulevard, instead of the Northern valley). This becomes clear when they mention Lum Ka Naad’s outpost on the boulevard, instead of mentioning the original location near CSUN (which is about a mile from where I live). PS. While we’re talking about the valley, here’s an obit of interest: Rabbi Gordon of Chabad in the Valley has passed away. Z”L.
  • Malls and ShoppingTowns . In the news recently was an article noting how the Beverly Center mall near Cedars Sinai is getting a makeover. I remember this area well: I remember when the mall was built in the 1970s (drove by it on the way to WBT). It replaced the beloved Beverly Playland. The redevelopment is part of a trend of mall redesign, where developers take what were indoor malls and make them outdoor strolling areas. Think “the Grove” or “Americana at Brand”. What goes around, comes around, I guess. I remember when this was done at places like Fallbrook; I also remember when outdoor malls were turned into indoor malls (Panorama Mall; Sherman Oaks Fashion Center). They are about to do a similar transformation on the Westside Pavillion (which folks remember used to be a little lovely outdoor shopping center with a Vons and May Company). Should be interesting to watch.

Lastly, I’d like to highlight a few “GoFundMe”s of interest, related to folks I know. Orlando de la Paz was the scenic painter at the Colony; he recently had a stroke and is raising support funds. Jolie Mason worked with me at SDC; she’s now running the LA Radio Reading Service, a group that is raising funds for studio upgrades. Bruce Kimmel, a producer out here in LA, is raising money for an LA Themed Musical, which will premiere at LACC around May 13 for two weeks.  The family of one of my counselors from camp days is raising funds for his care; he’s dealing with a brain tumor and the prognosis isn’t good. The LA Theatre Community is raising funds for its legal fight against Actors Equity; they’ve already raised 75K. Lastly, the Men of TAS are raising funds to improve the Social Hall Kitchen; we’d love it if you could help.

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=compusaurWorking more on the document I worked on yesterday brought up even more memories than the SYSABEND Dump. So, I went out to the garage and found my copy of OCC4CCC.HACKLIB. I’m betting most folks won’t even get these references. This is what passed for computer humor in the 1970s:

***

Hail 360 Child of Evil
Mary Shaw, Datamation, 4-1-1971
Hail 360, Child of Evil, for Thy misdeeds we curse Thee. Verily, do we curse and condemn Thee; We call down the Wrath of the Heavens upon Thee.

Know, Three Sickly, that we hate Thee with a Pure and White-Hot passion. May all the Microseconds of Thine Existance be eons in Misery. As Thou pushest about the Bits of Thy Programs, may the 1-bits cause chills and may the 0-bits itch, and may Thou be in continual Torment. As Thou miscomputest the problems of Thy Users may every Man’s hand be turned against Thee. May children cast Card Chad at Thee and call Thee cursed.

May Thy insulation all evaporate and Thy ROS become writeable; and may a User write his FORTRAN program all over it.

May Thy printers Rewind; and Thy tapes Unwind; and Thy memory banks grow Senile; and Thy drums be Out of Round; and Thy high-speed channel be Multiplexed with Thy reader/punch; and may Thy Channel Programs loop.

May Thy bits all have three states. May OS have 100 Releases, and may each release have 5000 APARS. May each APAR have 100 PTFs, and may each PTF be punched Off-Register on Warped Cards. May each PTF have 100 Hex patches, and may each patch grow scar tissue.

May each Release require ten SYSGENs, and cost a Shift, and may each Shift be Billed at Prime Rates.

May Thy Wait State ABEND; may Thy SVC’s get protection violations; may Thy SPOOL overflow, may Thy DATA UNIT cut in and out. May Thy Adder drop its seventh Bit, and may Thy Multiplier compute Cube Roots. May Thy Move-Characters instruction complement every Third Bit. May Thy Floating-Point registers be where Thy Fixed-Point registers should be.

A Pox upon Thee and upon Thy kin: upon Thy mod 44’s and upon Thy mod 91’s and upon Thy mod 67’s. Yea, upon Thy children and Thy children’s children, even unto the seventh Generation of Hardware.

Yea, 360, know that Thou shall be sorely afflicted. From this time forth shall Thy Peripherals become independent Processors and shall Thou be synchronized with the low-speed printer. And Thy Cores shall be as dust within Thee and in Sorrow shall Thou lament Thy lot.

***

PSALM X’17’

IBM is my Shepherd; I shall not interact.
He giveth me dumps of the System Nucleus,
He maketh me Subtract in HEXADECIMAL.
He restoreth my Registers.
He leadeth me in the paths of Ambiguity for His Manual’s sake.
Yea, though I walk through the Valley of the Shadow of the Program Check, I will fear no ABEND; for OS/MVT is with me.
Thy MESSAGES and thy CODES they comfort me.
Thou preparest a Table before me in the Presence of mine Consultants.
Thou allowest me to Chain my CCW’s;
The Line Printer runneth over.
Surely the Operators will chase me all the days of my life,
and I shall Execute in KEY Zero forever.

***

BATTLE HYMN OF THE PUBLIC

Mine eyes have seen the glory of the coming of the NIC,
They were done upon the NETWORK, would be quicker with a BIC.
The mumblejumble and jargon are enough to make you sick.
And time goes marching on…

Glory, Glory, I’m a User
Glory, Glory, I’m a User
Glory, Glory, I’m a User
upon the ARPANET.

I started with a TTY and a manual on my knee.
They preached the TELNET gospel in a numbered RFC.
What with IMPs and TIPs and HOSTS and Hacks I learned the litany,
That Bits go marching on.

Glory, Glory, I’m a User
Glory, Glory, I’m a User
Glory, Glory, I’m a User
upon the ARPANET.

I was told it was so easy, I could hack it in a day,
But a User is a Loser if She’s 15 hops away.
The Bits clogged up the buffers; caused a terrible delay,
And time goes marching on…

Glory, Glory, I’m a User
Glory, Glory, I’m a User
Glory, Glory, I’m a User
upon the ARPANET.

Now I’ve come to face my sponsor and this stuff is hardly hacked,
If it isn’t done by Friday I’ll be tortured, whipped, and racked.
The brave new world surrounds me, but I think the deck is stacked
But I’ll keep typing on…

Glory, Glory, I’m a User
Glory, Glory, I’m a User
Glory, Glory, I’m a User
upon the ARPANET.

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

Observation StewFor some, this is the start of a 3 day weekend; for others, just the normal weekend craziness. Whichever it is, it’s been a busy week. I’ve been accumulating a lot of articles of interest, but none of them have themed into groups of three, or proved to be the start of a single-subject rant. So let’s toss them into the crock-pot of discussion, and see if we can at least come up with a thread to connect each to the next:

Lastly, I’m sure you think I’m crazy in the head for trying to thread all these disparate articles together. Speaking of crazy in the head: how’s this for a headline: “Doctors dismissed his pain as migraines. Then they said he had 24 hours to live.” Did that get your attention? It got mine. The connected article was about something I mentioned last week: undetected subdural hematomas. Scary.

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

cahwyguy: (Default)

userpic=cyborgIt’s been a busy week both at work and at home. Articles have been accumulating, but there are a few theme groupings to get out of the way before we get into the stew. So, for an appetizer, here’s a collection of interesting articles dealing with computer related news chum:

  • Microsoft Continues the Push to Win10. Microsoft is continuing its push to get everyone to upgrade to Windows 10 (ref: “I Think I’ll Wait to Wash the Windows“). The latest salvo is a warning from Microsoft that Windows 7 is unsafe. What do they mean by that? Here’s the answer, from the horses, umm, mouth:

    Speaking to Windows Weekly, Microsoft Marketing chief Chris Capossela explained that users who choose Windows 7 do so “at your own risk, at your own peril” and he revealed Microsoft has concerns about its future software and hardware compatibility, security and more. “We do worry when people are running an operating system that’s 10 years old that the next printer they buy isn’t going to work well, or they buy a new game, they buy Fallout 4, a very popular game, and it doesn’t work on a bunch of older machines,” Capossela stated.

    The real meaning came out in his next sentence, where he stressed it is “so incredibly important to try to end the fragmentation of the Windows install base” and to get users to a “safer place”. Translation: They want everyone on Windows 10 so they can control the ecosystem and have that captive market like Apple has.

  • When You Need to Upgrade Windows. There is a time that you really must upgrade your windows: If you are running the original Windows 8, not Windows 8.1.  If you don’t upgrade original Windows 8 to 8.1 or 10, security patches stop this week. Security patches are critical. The problem is that Microsoft doesn’t make the upgrade easy, hiding it in the Windows Store. Here’s how to install the Windows 8.1 upgrade. To help you more, here’s a tutorial.
  • Deprecating Old Internet Explorer. Here’s another push to get you to upgrade: Microsoft has stopped support of older versions of IE except the latest for each supported OS. Beginning next Tuesday, January 12, Microsoft will officially retire Internet Explorer versions 8, 9, and 10 for most Windows operating systems, according to a Microsoft support page. Internet Explorer 11 will be the only officially supported version of the browser for Windows 7, 8.1, and 10. The only exception will be Windows Vista users, who will stick with Internet Explorer 9. Vista’s mainstream support ended more than a year before IE11 rolled out. The unpopular OS is almost up for retirement anyway. It reaches the end of its extended support phase in April 2017. After that, Vista will be unsupported just like Windows XP.
  • Lastpass Upgrade. This week, Lastpass announced an upgrade to Version 4.0. Even though Password Managers have some risk, I still recommend them. They move you to using longer and more complex passwords, but store them in such a way that they can’t be easily exploited. There are visual candy upgrades, but the most important thing is a new feature: Emergency Access. This lets users designate trusted family, friends or colleagues to have access to their password vault in the case of an emergency. They’ve also improved the Sharing Center. The new LastPass Sharing Center is one central location that allows users to easily manage and share passwords in a secure, encrypted way. Whether partners need to share logins for the mortgage and paying bills, or aging parents need to share important logins with their family, the Sharing Center keeps the passwords in sync for everyone. Users can manage who has access to shared accounts and have the option to remove access at any point.  Alas, I’m still waiting for them to update my Firefox plug in.
  • Facebook News Feed. Here’s a really interesting, but long, article on how the Facebook news feed algorithm works and how you can manipulate it. I still miss the days of Livejournal, where I could easily catch up chronologically with what all my friends were doing. I can see Facebook’s problem with doing that as the number of status updates and shares, combined with the number of friends, has grown exponentially. Really an interesting read.
  • Internet of Things. Do you really need that connected refrigerator? Here are two great articles that make clear the cybersecurity risks of the Internet of Things.

    The first talks about how as the IoT grows, security is being left in the dust. It is like the early days of the Internet. At its fundamental level, the Internet of Things (IoT) are devices that connect to the internet. They can be anything from data-guzzling devices that monitor your physical activity, smart thermostats that monitor the outside air and adjust your home temperature accordingly, or appliances that can think on their own and order groceries while you’re at work. The problem: all too often, device manufacturers have the same problem: they’re thinking too much about the product, and not enough about security. Once an adversary gets a toehold in your network onto an IoT device, it can then exploit its trusted access to do things even more nefarious.

    Like what, you ask. Here’s where the second article comes into play. Consider ransomware in the IoT. Since anything with a computer for a brain and an Internet connection is vulnerable to a virus, hackers with lofty ambitions can go after a wide range of devices. Conjure up that laundry list of “Internet of Things” gadgets: smartphones, fitness bands, smartwatches, fridges and ovens, smart locks, thermostats. Imagine your phone refusing to work when you need it, your refrigerator threatening to defrost your food, your house refusing to heat or cool, your smart locks refusing to let you into your house… or letting someone else in. As opposed to disabling attacks, the ransomware attack threat is only going to continue to grow… especially as it can lie latent until triggered.

 

This entry was originally posted on Observations Along The Road (on cahighways.org) as this entry by cahwyguy. Although you can comment on DW, please make comments on original post at the Wordpress blog using the link below; you can sign in with your LJ, FB, or a myriad of other accounts. There are currently comments on the Wordpress blog. PS: If you see share buttons above, note that they do not work outside of the Wordpress blog.

===> Click Here To Comment <==
(Click Here to Comment)

Profile

cahwyguy: (Default)
cahwyguy

May 2025

S M T W T F S
    1 23
4 5678910
11121314151617
18192021222324
2526 2728293031

Syndicate

RSS Atom

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags