While Nelson is credited with coining the term “hypertext, Vannevar Bush is responsible for inventing the concept, which he described as “instant cross referencing.”
[kml_flashembed movie="http://www.youtube.com/v/Q9kAW8qeays" width="425" height="350" wmode="transparent" /]
As usual, we tread in the path of giants.
Fox News aired a report in 2006 that described how the FBI can turn on the mic on a cellphone and eavesdrop — even if the phone is turned off.
[kml_flashembed movie="http://www.youtube.com/v/O61YfvPZGJs" width="425" height="350" wmode="transparent" /]
Today’s Word of the Day, government Trojan, describes efforts by various governments to covertly survail traffic of all kinds to and from suspect hard drives, including VoIP, cellphones and email.
These kinds of measures are only likely to increase as groups of all stripes turn to the Web to organize and communicate about activity the government wants to monitor. I find the “analog hacks” used here intriguing. VoIP or cellphone conversations and email messages may be encrypted during transmission but if an agency can record a target on the microphone or by using a keylogger, even quantum encryptography could be sidestepped.
One of our newest definitions explains OpenID:
“OpenID is a decentralized single sign-on authentication system for the Internet. The goal of the OpenID initiative is to allow users to log in at websites around the Internet with one ID instead of having to create multiple unique accounts. OpenID was developed using the open source software model to be an interoperable protocol independent from any single organization. (Continued…)”
Activating and using an OpenID is quite easy — I was able to sign up for TravelWiki, for instance, using one from Yahoo!. Activation and setup took about a minute. I’ve embedded three videos below that explain more about how OpenID works and how to use it. Enjoy!
The video below explains more about how to use an OpenID to login, in this case to votay.com:
[kml_flashembed movie="http://www.youtube.com/v/wN2DG95V8Gk" width="425" height="350" wmode="transparent" /]
Here’s another one that explains how to use OpenID with WordPress:
[kml_flashembed movie="http://www.youtube.com/v/Uu_MAUOdZVo" width="425" height="350" wmode="transparent" /]
Dave provides a short, clear explanation of OpenID using a whiteboard here:
[kml_flashembed movie="http://www.youtube.com/v/xcmY8Pk-qEk" width="425" height="350" wmode="transparent" /]
And finally, in a Google TechTalk, Simon Willison (co-creator of the Django Web framework) discusses the implications of OpenID and explores the best practices required to take advantage of the new technology while avoiding the potential security pitfalls. This one’s a bit long but excellent.
[kml_flashembed movie="http://www.youtube.com/v/DslTkwON1Bk" width="425" height="350" wmode="transparent" /]
CommonCraft.com is already well known in the blogosphere and social media world for creating brilliant, lucid short videos that explain tricky concepts.
The two-person team that make up CommonCraft (Sachi and Lee LeFever) put it simply: they solve explanation problems.
I love that tagline. It’s rather similar sort of thing we try to do here at WhatIs.com. To that point, I’ve embedded three of CommonCraft’s previously released videos on our site, each of which explore and explain a different social media technology:
The newest addition to the mix is a video explaining what Twitter is and how it works.
As you may know, Twitter is a popular microblogging service that launched almost exactly one year ago at the SXSW Music Festival in Austin, Texas. While we’ve blogged about it right afterwards. Due in no small part to the high percentage of geeks and “digerati” at the festival who had the opportunity to try it out and start networking with each other, Twitter really took off. Twitter is now a leader in the “social messaging” category that includes Pownce and Jaiku, spanning the gap between our online and offline worlds. Each allows users to update a microblogging service using SMS messages, a Web interface or a desktop application. (Twitter relies on third party apps for the last based upon its APIs. Try Snitter if you have Adobe Air installed.)
CommonCraft’s video sheds worthwhile additional insight. Watch it below:
[kml_flashembed movie="http://www.youtube.com/v/ddO9idmax0o" width="425" height="350" wmode="transparent" /]
There’s plenty of interesting activity going on out there, too. Just check out this mashup of Twitter, Google Maps and live election results for intriguing insights into the 2008 presidential primary season.
And if you’d like to find/follow me on Twitter, head over to http://twitter.com/digiphile.
Joe Tucci (Chairman of the Board at EMC) tells Bob and Joe to get rid of some tapes.
[kml_flashembed movie="http://www.youtube.com/v/n-kCkz5IJxg" width="425" height="350" wmode="transparent" /]
Who knew storage guys were so much fun?
Simply put, it’s doing in your homework. Just look at this sample M&A due diligence checklist.
In IT and the law, of course, the term “due diligence” has considerably more precise meanings. WhatIs.com’s definition for due diligence states it as:
…the process of systematically researching and verifying the accuracy of a statement. In everyday language, due diligence is synonymous with “the degree of effort required by law or industry standard.”
The term originated in the business world, where due diligence is required to validate financial statements. The goal of the process is to ensure that all stakeholders associated with a financial endeavor have the information they need to assess risk accurately.
When due diligence involves the offering of securities for purchase, as in an IPO (initial public offering), specific corporate officers are responsible for the proper completion of the process…
As is the case with so many other things in life, context matters. In general, due diligence includes the careful identification and evaluation of data sources, identification of potential risks and any other issues relevant to the statement or scenario in question.
Civil litigation and real estate law are even more specific, as you’ll read in our definition.
IT, as ever, is its own beast.
[Cartoon Credit: ScienceCartoonsPlus.com]
Due diligence can also be applied to careful testing of data or network security, disaster recovery preparedness, or any other critical infrastructure asset.
Failure to meet proper due diligence in these areas could leave the organization or client in question open to data breaches or malware infections.
In this sense, completing due diligence can be taken to be completing the steps that are “industry standard” in a particular area, like penetration testing or other code validation. Software companies that do not meet these goals may be liable for zero-day attacks, customer data breaches or other losses of mission-critical functions that could have been prevented with more stringent preparation.
It’s might be fair to say, for instance, that if TJX had had a better IT audit that mandated a switch to WAP instead of WEP security, one of the biggest data breaches in history might have prevented.
Or maybe not. Either way, the relevant IT guys probably should have done better due diligence before transmitting customer information over a wireless network protected only by weak encryption.
Any DB that doesn’t do due diligence testing to ensure that a database is recoverable from a major hardware of instance failure is similarly negligent.
There are plenty of examples out there. AstuteDiligence.com hosts a list of more general due diligence horror stories, with specific company and individual names redacted. There are some classic scenarios listed — the acquisition of a software company based upon a flashy demo, good PR and a well-designed website that turns out to be a maker of vaporware.
CFO Magazine ran a feature story back in ’04 about companies that installed safeguards against merger surprises after due diligence failures.
In many circumstances, of course, due diligence works quite well, as Jan Stafford reported in a story about how a bank’s senior systems architect, sought and found a virtualization technology to help facilitate hardware consolidation and operating expenses low during system upgrades.
As Joseph Bankoff, a partner in the intellectual property and technology practice at law firm King & Spalding in Atlanta put it in a 2006 Infoworld article on the topic, “Due diligence is going in and digging a hole in the ground and seeing if there’s oil, instead of taking someone’s word on it.”
After all, you wouldn’t like it if someone else drank your milkshake.
Many people derisively refer to Valentine’s Day as a “Hallmark” holiday, invented and popularized by commercialized interests in the greeting card, floral and chocolate industries.
Valentine’s Day was named after two Christian martyrs named (wait for it) “Valentine.” According to Wikipedia, Valentine’s Day became associated with romantic love in the circle of Geoffrey Chaucer in the Middle Ages. Lovers have been expressing their love for one another on that day ever since.
Geeks can have special challenges, of course. Bonding with your laptop or server cluster can be a little lonely. Your iTouch is sexy… just not in that way. What to do? If you’re feeling lonely, stressed out over expressing your love or have an unrequited geeky crush, fear not! The interwebs are your friend! [Tetris Heart from Mitch at 4colorrebellion.com]
If the target of your affections has a sense of humor, fill out this “Declaration of Romantic Intent.”
If you have a crush on a fellow photographer, follow this helpful howto from Wired and turn your flickr crush into real romance.
The Road to Know Where has a ton of templates you can use to put together an electronic Valentine Day card, including a Silverlight “Share the Love” ecard builder.
Your Mom’s Basement gets pretty specific about how to meet a girl and navigate the pitfalls of romance. If you’re spending time in your mom’s basement, can we assume you need the advice?
Finally, if you just need a laugh, Josh Frolinger put together a hilarious list of geek Valentine’s Day videos. My favorites?
Computer Camp Love:
[kml_flashembed movie="http://www.youtube.com/v/0svZJtyDDOc" width="425" height="350" wmode="transparent" /]
Internet Love Song:
[kml_flashembed movie="http://www.youtube.com/v/4gSJpeZslqo" width="425" height="350" wmode="transparent" /]
Finite Simple Group (of Order Two)
[kml_flashembed movie="http://www.youtube.com/v/BipvGD-LCjU" width="425" height="350" wmode="transparent" /]
(This last betrays my own geeky love for collegiate acappella, bringing me back to the glory days of singing under the arches and then networking some PCs together to play Marathon. Nothing says loving like a good fragging. )
Hey Sweetie! I got you a little something for Valentine’s Day:
Yes, February 14th has rolled around again and if you’ve got (or want) a sweetie, you’d be well advised to show you care. And I found the perfect thing: Ironicsans.com has a lovely selection of valentines featuring our real heart-throbs: Scientists! In addition to the dreamy Carl Sagan *sigh!* there’s Darwin: “I select you, naturally!” Lots more on the blog as well as some excellent reader suggestions in the comments (e.g. Charles Richter: “I’m all shook up over you!”)
Ironic Sans began life as an idea for a font name. Until that dream is realized, photographer David Friedman is using it as the name for his blog.
Oooooh… New ones include Pavlov and Stephen Hawking. Decisions, decisions…
~ Ivy Wigmore
There’s no question that living in Cambridge and writing about technology has its benefits. The city is swimming in startups, geeky events and plugged-in discussions.
Last month, I was lucky enough to score an invitation to a Q&A session with two distinguished MIT physicists focused upon the theoretical underpinnings of teleportation , followed by a roundtable discussion that brought in with “Jumper” director Doug Liman and Anakin Skywalker himself, Hayden Christiansen. The movie will be in wide release tomorrow, so I thought it would be timely to offer a comment or two concerning this confluence of fact and fiction.
You know you’re in a special place when professors receive enthusiastic applause comparable to the reception given to a Hollywood director and bonafide heart throb movie star. That being said, Hayden was clearly the focus of considerable adoration, expressed at his entrance and in more than one invitation to dates and afterparties.
Serious students of quantum physics are going have to employ the classic “willing suspension of disbelief” to fully embrace this picture. In other words, when questioned, both Dr. Edward Farhi and Dr. Max Tegmark kindly but firmly ruled out the possibility of human teleportation any time in the near future. The current state of this branch of science is exciting, however, given that experiments have successfully teleported the properties of photons over a distance. This sort of quantum teleportation relies on “quantum entanglement“, whereby the properties of two particles can be tied together even when they are far apart, a phenomenon Einstein called “spooky action at a distance.”
I managed to capture the presentations of Professor Tegmark and Farhi on the physics of teleportation on my webcam and stream it on uStream. My apologies: The quality of both the audio and video is regrettably poor. Still, I’m happy to share.
Jumper’s plot relies on a staple of science fiction, however, not fact: genetic mutation. In other words, some evolved version of CERN‘s large hadron collider or a hitherto undiscovered means of stabilizing worm holes powered by cold fusion is not at at the heart of the film. Some people are born with the ability to teleport from one place to another. Off to the races.
Mr. Liman’s direction of Swingers, Go and the Bourne Identity , however, recommends taking a chance on his vision of the moral and ethical challenges presented to someone with the power to teleport at will. I found his willingness to research what the event would actually look and sound like was impressive, particularly the collapse of air into the vacuum left by the removal of a body. He said he fell in love with the script when he read that the first action of the character upon discovering his power was to rob a bank.
For more coverage of the event, check out:
- Doug Overbye’s “Quantum Teleporting, Yes; The Rest is Movie Magic” in the New York Times
- Jess K’s hilarious blog post, Hayden Christensen Comes to MIT, Looks Pretty, for some perspective from a current MIT student
- Sharon Gaudin’s “Teleportation: The leap from fact to fiction in new movie Jumper“
- Jim Rapoza’s “Hollywood Jumps to MIT” at Emerging Tech
Following is the trailer, if you’ve somehow missed it theaters, on TV or elsewhere on the Web.
[kml_flashembed movie="http://www.youtube.com/v/uS8u4MDq7Ow" width="425" height="350" wmode="transparent" /]
If you’re looking for some geeky fun on Valentine’s Day, just google “movie: jumper [your zipcode]” and enjoy.
UPDATE: I’ve gotten some anecdotal feedback that “Jumper” isn’t exactly Citizen Kane. RottenTomatoes.com has delivered a dire rating of 15% while imdb.com users are being considerably kinder with a rating of 6.4/10. That being said, the film raking in $27.2 million at the box office this past weekend, so tastes may be for forgiving out and about.
Crack channel features writer Yuval Shavit doesn’t just understand how to write an IT service-level agreement or maintaining performance after a database consolidation — this man also knows funny.
To whit, after his observation that a search for “VoWiFi ” wasn’t turning up VoWLAN resulted in a discussion of the cryptic “ambiguity-to-humor ratio” found in email, Yuval submitted a definition last weekend that explains how to determine just how funny a bit of techie humor actually is in virtual life. Enjoy!
In enterprises, the Latent Amusement-Muddlement Equation (LAME) is used
to compute how amusing a joke is in comparison to how much it will
muddle a situation due to ambiguities in the joke. Positive values
correspond to jokes that are not amusing enough to justify the confusion
they cause, whereas negative values are amusing enough. While this may
be counter-intuitive to those who think a positive value should yield a
positive joke, a common mnemonic is to remember, “if it’s positively
LAME, don’t say it.”
For instance, if you are car pooling to a meeting but running late, and
the driver frantically asks whether he should take a left at an
intersection, yelling out “right!” in such a way as to make the driver
think he should take a right turn — instead of the correct left turn —
is generally regarded as having a positive LAME vale.
Computing LAME is simple but subjective.
LAME = ( [2A*M]^3 + 20N ) – ( [L/1000]^3 + e^[C/100] )
L = Laughter, in terms of milliseconds
A = Anger, in terms of how many minutes it will take for the other
person to calm down
M = Magnitude (of the anger), a value between 0 and 1.0 (inclusive), 1.0
being most angry
N = coNfusion caused by the joke
C = Chuckling, in terms of milliseconds
Thanks, Yuval. I’ll make sure to shoot down any poorly-phrased comedic quips from the channel editors at lunch next week as evidence of a low lameness quotient (LQ).
Cyanide and Happiness has many excellent examples of this phenomenon. (Caution — some of these stick figure comics are NSFW.) Some work, some don’t.
Microsoft’s new viral comic campaign, Heroes Happen, has a bit of that element as well.
And, of course, icanhascheezburger.com, now one of the most popular blogs online, has oodles of LOLcats that range from the sublimely funny to completely random to groaningly punny.
P.S. While the LAME quotient has many applications, IT purists may note that it’s an MP3 converter used with the popular open source audio editing software Audacity, among others. Old school techies may recall the term lamer as well, though any similarity is purely coincidental.