Yellow Arrows

Not really sure how to classify Yellowarrow, although their home page provides this handy definition:

YELLOWARROW [NOUN] A COLLECTIVE SYMBOL FOR PERSONAL COMMUNICATION. [VERB] TO LEAVE AND DISCOVER MESSAGES POINTING OUT WHAT COUNTS.

The about section helps explain it some more. Basically, people take the yellow arrow stickers and apply them somewhere that means something to them. Then they text message the unique ID from the arrow sticker & a short message to the project’s number. Other people finding the arrow can send the ID, prefixed with a ‘?’, to the same number to receive back the short message associated with the arrow they are looking at.

I looked in the gallery for arrows that had been placed in bay area cities, but found only San Francisco and Berkeley represented, and with only 13 arrows total. London didn’t even have any (though there are other non-US cities represented). Check it out, and if you’re so inclined why not join and get some arrows of your own to apply wherever you like.

Oakland to Pittsburgh

A long flight, with a change in Chicago, gets me to Pittsburgh for a meeting. The flight to Chicago was clear skies all the way, and the views over the mountains, as well as the final approach over night time Chicago were amazing. I snapped a lot of shots during the first part of the flight. It was a tough choice selecting the one on the right from the collection.

The second leg was not so good… first the flight was packed. Next there was no space left for my luggage, so United’s cabin crew insisted on checking it rather than asking the people storing their coats and laptops in the overhead bins to move them (or, for that matter, getting the people who had not stowed their luggage the correct way around to fix that). Then they decided not to place these checked hand luggage bags in the hold of the plane we were on, but instead send it on the next one – arriving several hours later. We had to wait until the carousel stopped delivering bags, and then ask an agent in Pittsburgh to even discover this. And there was no apology for it; in fact, it sounded as though it was a perfectly normal.

Downtown Pittsburgh, where the Courtyard by Marriott I am staying in is located, seems to be quiet at night (it was after 10pm when I finally got here). It was cold too, but not anywhere near as cold as I was expecting. Not far from the hotel is a large Christmas tree in the centre of an outdoor ice rink. Everything else seemed to be closed or closing, so not much chance to get a feel for the city tonight, and I fly home tomorrow afternoon. Maybe another time I’ll get to spend some time here and check out the area.

Update: Now United can’t confirm whether or not the bag even made it on the next flight. And they cannot contact anybody at Pittsburgh airport or the courier services that they use to deliver “delayed” baggage. Guess it won’t be here for the morning. In fact, they cannot even state with certainty what time the plane it was meant to be on arrived – it says it landed a little early at 11:36pm in one place, but in another it says it arrived late at 12:20am! If they can’t keep track of the arrival times of their planes, what hope is there that they can keep track of a small carry-on bag?

MacOS Backups

A hard disc failure at work (luckily the OS drive and not the data one), made me think a bit about backing up my MacOS drive in the PowerBook G4 I am using more and more. The most critical data on there, my photo collection, is backed up onto DVD and also (mostly) cloned on my Windows XP box. But there are an increasing number of little utility apps and documents that, while not going to be the end of the world to lose, would be annoying.

Hardware

So, while in Fry’s Electronics picking up a replacement drive for my work machine, I picked up a new Western Digital 250 GB drive kit (for $109 after the mail in rebate) I then picked up a Metal Gear Box (with a “light bar”) to put it in. This is a dual USB 2.0 and Firewire/IEEE1394 external IDE drive box, which meant in theory that I should have been able to use it on both my PowerBook and my Windows XP box.

Sadly, WinXP would not talk to the drive once a MacOS extended partition had been created on it. I could create a number of FAT32 & NTFS partitions which MacOS X would see, but they were not useful for my backup needs, so the drive has now become a backup drive and an external storage drive for the PowerBook – I’ll get another one for the WinXP system perhaps. None of that is the fault of the enclosure though – it works perfectly on both systems.

Software

While in Fry’s I had been debating getting one of the pre-assembled USB/Firewire drives because they came with backup software. In the end I went with the enclosure and drive because of the price (around half the price of the equivalent size pre-assembled drive units). Back home I found an excellent donation-ware backup solution for MacOS X: Carbon Copy Cloner. I have made a complete clone of my laptop’s internal HD onto the firewire drive, and then tried one sync operation to update it. All seems to be working well.

Recovery, if I ever need it, should be trivial too since the external drive is bootable; I just boot off of the external drive and sync back to the internal drive. Let’s hope I never have to test that theory though 🙂

Factory of the Future?

MSNBC is running a story about a possible Factory of the Future? where the product is essentially ideas, or intellectual property. The core theme in the article is a discussion of Microsoft alum Nathan Myhrvold’s new company, Intellectual Ventures, which appears to be a company of patent lawyers out to build a library of patents.

Some of these seem to be coming from brainstorming sessions with groups of scientists, others are being bought. The real question is how will they be used in the future. Given the backers he has (including the likes of Microsoft, Intel, Sony, Nokia, eBay and Google), one can only wonder about how much trouble smaller companies will be in should they attract the attention of one of these monsters.

Government Wi-Fi Security

An excellent article over at Wi-Fi Networking News discusses a report on USA Today’s website that claims reporters from Federal Computer Week found wireless networks on government property that were not properly secured. Glenn Fleishman does an excellent job of explaining why 802.1X alone is not better than WEP (it is a comparison of apples and oranges), as well as putting down the notion that T-Mobile’s move to support WPA encryption with 802.1X authentication is necessarily more secure.

That said, I would be concerned about the possibility of unauthorised wireless access points in the network, whether at a government site or just a regular company. It is far too easy to plug in a $40 access point and open a hole in the network. Using 802.1X on the wired connections, as suggested in the Wi-Fi Networking News article, is not a bad solution to this. It can also prevent people plugging their personal laptops or other devices into the network, which in a secure environment is essential.

Newer enterprise solutions also include rogue AP detection features to help a network administrator monitor the wireless environment looking for potential problems. Wireless setups should include something to allow continual monitoring of the wireless traffic, and if something is detected that does not match the known networks an alert should be issued so that somebody can check out what the new wireless device is. It could simply be an access point that has been reset to factory defaults and is now offering totally open access to the network.

Election Technology

I decided not to comment on the political aspects of the latest US Presidential election in my blog, but one thing that has been bugging me for the last few days is the poor quality of the technology that they use to collect and count the votes in what is their most important election.

Firstly, there were all the debates about the lack of a paper trail on the fully electronic machines. I don’t even know why this was a debate. It seems to me to be obvious that a paper receipt should be printed. It is odd that nobody debated this for ATMs or lottery ticket machines, but when it comes to something as important as voting there is a question about the need for a receipt.

Next, a couple of my colleagues voted using the optical scanner machines. They did get a paper receipt, but not one that verified that the machine had read their selections correctly! The California lottery terminals work on a similar scheme (you fill in the circles with a pen and machine ‘sees’ those marks), but the lottery folks felt the need to not only print your selected numbers on the receipt, but also to remind you to check them before leaving the store. Why was this basic step missed from the optical scan voting machines?

Then, today I read an article at Wired about machines in North Carolina losing votes because they could not hold as many votes as the manufacturer (UniLect) claimed. So, why did the machine not stop accepting votes when the limit was reached? My ATM manages to stop trying to hand out cash when it runs out; the same ATM will tell me that it is unable to issue a receipt when it runs out of paper too. How come this basic resource monitoring was not part of the machine’s design? That’s not the end of it though. Why was the machine not tested by the county officials before the election? Surely, testing the maximum number of votes it can hold is one of the acceptance tests?

Don’t get me wrong, I think that fully electronic voting machines are the way forward, but I also recognise that there needs to be a proper audit trail and proper controls over who has access to the machines and the software that they run. A number of web sites (e.g. http://www.thudfactor.com/voterfraud/) have shown how easy it is to rig an election using an electronic machine. What was not stated so clearly was that it is also possible to design one that with appropriate testing, and a proper audit trail, can do the job fairly. Here’s my simple list of requirements:

  • A printed duplicate receipt with details of the selections made, and a transaction number. One copy goes to the voter, the other is kept in the machine, much like a cash register in a store.
  • The software needs to be separate from the data that describes the choices that can be made. This means that the software company cannot know in advance what the choices will be, nor the order in which they will be displayed.
  • The machines need to be thoroughly tested before every election, using the exact software that they will be running on the day, and the exact data set that they will be using. If they contain a real time clock, it should also be set to the same date and time as the start of the election (to avoid the possibility that the software will change its behaviour based on time & date information).
  • The machines should have votes entered into them until they stop accepting votes. Also, they should stop accepting votes if the receipt paper runs out or anybody tries to tamper with the machine during the election.
  • Finally, at the end of the testing the paper copies of all the votes should be counted to see whether they match the electronic count.

The advantages of electronic voting are obvious – touch screens that can display information in a number of languages as well as walk the voter through the election one choice at a time, rather than presenting them with a form to fill in, should make it much less likely that the voter will accidentally make the wrong choice. It is up to the software industry to make them demonstrably reliable so that the voters will trust them. Maybe this is one case where importing a machine might be a good idea too (that way the manufacturer will be less likely to have an interest in the result of the elections it will be used it, something that was clearly not the case with at least one US manufacturer).

Comments?

More Phishing Problems

Yet more reasons to switch from Windoze to anything else. The Register is reporting that MessageLabs has intercepted a small number of phishing emails containing a sophisticated new attack that does not require the recipient to click on any links.

The attack exploits another hole in Windoze to install scripts on the box so that the next time the user logs into their online banking the information will be stolen.

Interestingly, there is also a statistic at the end from MessageLabs claiming that they detect between 80 and 100 new phishing web sites every day. I noted last month that I had seen a sudden increase in the number arriving in my inbox; this seems to be another problem that is on the rise. Something needs to happen to improve the security of Windoze, and soon.

Halloween Photos

PumpkinOn halloween night I was out with my girlfriend’s family (including three young kids) on a trick or treat mission in the Ingleside area of San Francisco. While they collected candy, stickers and even helium-filled balloons, I was snapping shots of the amazing work that some people had put into their halloween decorations. I had not planned on taking the photos, so I had no tripod – just a very steady hand and my trusty Canon S100 digital camera.

The residents of the Ingleside neighbourhood really got into the whole halloween thing; most of the houses had at least some decorations. Many had inflatable decorations and lights everywhere. There was even an animatronic black cat on one (perfectly manicured) lawn. Jack-o-lanterns everywhere of course, and at one house the two-headed owner answered the door to hand out the candy (to those kids brave enough to ask once they saw him!). The house to the left though gets my vote for the overall best decoration (click the photo for a popup larger version).

Macs do Star Wars dirty work

In Macs do Star Wars dirty work on the BBC’s news site, the work of Lowry Digital Images [a company that does not seem to have a web presence?] in scanning and cleaning the Star Wars films ready for use in digital form on the DVD set is described. Lowry took the original Star Wars film spools and scanned them all for the DVD set. So what? Well, old film, especially old film that has been handled a lot, is covered in dirt and scratches that scanners will see. Additionally, older sci-fi movies with complex special effects that were created using layers of film tend to be grainier and softer focus than we are used to with today’s CG effects.

Lowry Digital Images uses a bank of 600 dual CPU Mac G5 boxes to clean up the frames once the film has been scanned at very high resolution. Each frame occupies 70MB (and there are around 180,000 frames in each Star Wars movie). This calls for a lot of storage, but Lowry has 400TB online.

In addition to the story at the BBC, there is an article about John D. Lowry, and one specifically about the Star Wars work on the Apple website – both worth reading (the Star Wars one even has some before and after stills and a QuickTime 360 degree look inside the CPU room).