• Home
  • About

A Runner's Story

A Runner's Story

Category Archives: Geek Horror

Tech Debt

19 Saturday Nov 2022

Posted by Ed Mahoney in Geek Horror

≈ 5 Comments

Musk borrowed $13B to buy Twitter for a total of $44B, but that’s not what tech debt is. Software developers use the term in various ways, referring to either features or bugs or unsupported software and systems. I think it’s a relevant term to understand in the debate on how Musk is killing Twitter.

I would argue the $13B in debt, while hemorrhaging advertisers, will be enough to kill Twitter. Ultimately. Musk has already publicly stated that bankruptcy is a possibility. But that just leads to all the half-way plausible stories of why he actually acquired the platform. It’s safe to say no one buys a media platform nowadays to make money. The irony there is that section 230 would say Twitter is not a media firm, it’s a technology firm. Right.

I’ve followed some of what Karen Swisher has been saying on Twitter. To the point above on whether Musk is trying to purposely destroy Twitter’s revenue model, she says to follow the money. The second largest investor with Musk is Saudi Prince Alwaleed bin Talal and his Kingdom Holding Company. There’s likely a good story there.

Swisher also suggested though that the employee exodus is not that critical. That Twitter can simply run on autopilot for awhile. This is where I take issue. Maybe for a short while, but you have to appreciate the impact of tech dept. It’s the entropy in the software ecosystem. In terms of features, if you’re not releasing new features, you’re dying. Regarding bugs and system currency, doing nothing quickly leads to unsupportable code. At a certain point of running deprecated software, you can’t release new features. And fall behind just a little bit on applying SW patches leads to breaches.

It’s hard to imagine Twitter could die overnight with 400M users. Especially if Musk doesn’t care about revenue. And to be honest, I sort of buy into that line of thinking. It’s possible he’s so out of touch with humanity that he doesn’t realize how he is driving employees away. It’s more likely he’s purposely downsizing. He believes the platform will remain relevant enough for him to own a global megaphone. I don’t think it’s going to work out. He’s underestimated the uber entropy exacted by tech debt. And without sufficient staffing, twitter is going to drown in tech debt.

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Cozy Bear vs Fancy Bear

20 Sunday Dec 2020

Posted by Ed Mahoney in cyber war, Geek Horror, Novel

≈ 3 Comments

I would be remiss to let this SolarWinds story go without commenting and self-promoting my cyberwar series.  These opportunities don’t come around every day.  Well, actually there is a story just about every day, but few on par with the colorful intrigue of SolarWinds, FireEye, and Cozy Bear.

My favorite aspect to this story is how it more resembles cyberwar than cybercrime.  Experts are downplaying the cyberwar facets, but espionage is on the war spectrum.  I focused my novels on cyberwar to respond to what I perceived as a dearth of stories because most books published on the topic are on cybercrime.  The difference is that cyberwar is acted out by nation states and, North Korea’s Lazarus notwithstanding, for non-financial reasons.

Remember when you used to read stories of thieves stealing money from banks?  Two decades deep into the 4th generation of the industrial revolution (4IR), data is the new currency.  Steam power dramatically increased productivity three hundred years ago in 1IR as the industrial revolution launched a still-accelerating advance in technology.  Steam locomotives shrunk distance in terms of time travel.

Electricity further accelerated productivity, making the work day longer, in 2IR.  The 3rd industrial revolution commenced in the fifties, around the time white collar workers exceeded blue collar workers in the US work force.  Compute tech put the world on an exponential growth rate in the Information Age.  

Data networking, namely the Internet, and everything since from AI to blockchain has established a digital economy that drives 4IR.  We have complete industries now that exist only online.  But our success is our weakness.  The leading, most advanced economies of the world have more to lose in a cyberwar than the digital have-nots.  And that’s why so many people believe the next world war will be digital.  It’s where we are vulnerable, our Achilles heel.

Here’s the promo part.  If you are curious enough to read up on all this tech, but find it all just a bit too dry for your taste – read my books.  Read fiction.  I wrote my cyberwar series partly as a cybersecurity primer, so you’ll learn something.  But I chose a fictional format to make the content entertaining.  You don’t need a text book when you’ve got Cyber War I and Full Spectrum Cyberwar on your shelf.

You’ll discover that my stories are fairly prescient.  The first made Iran the bad guys and had attacks like this supply chain malware that compromise a large segment of the economy.  The second story focused on Russia and might spook you just how closely it mirrors current events.

The Russian threat actors in Full Spectrum work for the GRU – Russia’s Military Intelligence.  I considered writing about the SVR, Russia’s Foreign Intelligence agency behind the SolarWinds hack.  I find one of their code names more literary – Cozy Bear.  The GRU is nicknamed Fancy Bear, which is still cool; Bear of course stands for Russia.

I felt forced to use Fancy Bear because it’s more plausible they would launch the type of attacks in my story.  Cozy Bear is more about intel gathering.  This is why some experts are suggesting this isn’t a cyberwar attack.  Cozy Bear doesn’t destroy systems.  They just listen to our secrets.  That doesn’t make for as fun a story as the mayhem in Full Spectrum.  Sometimes I choose plausibility when deciding my storyline.  Other times I take extreme liberties for a good story.

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

the day TCP died

05 Saturday Dec 2020

Posted by Ed Mahoney in Geek Horror

≈ 2 Comments

Tags

Lumen, Vcinity

Like the road to a car, TCP was the transport to my digital footprint; traffic lights and all. Maybe I couldn’t get rid of my digital DNA, perhaps all I needed to do was delete the digital path known as the transport layer. If voyeurs can’t stream what I did last night, did last night ever happen?

Everything turned out fine the next day. If my friends and co-workers viewed the previous night’s events, they didn’t say anything about it. But that’s what got me thinking about killing off TCP. Born in the 80s, TCP had been the dominant digital communications transport my entire career. Novell had its day in the sun, as did Microsoft, but mostly only on local area networks. Cisco collapsed the backbone into IP packets routed over TCP and it’s been all the TCP/IP stack ever since. For decades.

The problem with TCP is latency. TCP Rate = Maximum Segment Size / Round Trip Time. Round Trip Time (RTT) is latency. Measured in nano or micro seconds on a computer but over the WAN, measured in milliseconds (ms). Latency is mostly distance. The medium matters; air is faster than glass, glass is faster than copper, but theoretically, bits travel at the speed of light, so a satellite hop (round trip) is about a quarter second, or 250ms. Note in the algorithm above that this distance metric is in the denominator of measuring TCP throughput, so the farther the distance, the lower the throughput – by design.

The last significant improvement to the TCP spec was in 1984, where version 4 was developed to mitigate the effects of congestive collapse on the network. Given that rate of innovation, TCP needs to just die. And I think TCP did die this week. It’s being replaced by the Remote Direct Memory Access (RDMA) protocol. The RoCEv2 (pronounced Rocky v2 for RDMA over Converged Ethernet version two) protocol can transport RDMA frames over an IP header and UDP, but Vcinity has a proprietary implementation where they encapsulate the RDMA frames in an IP header for WAN routing and add their own algorithms for flow control and packet loss recovery. The result is an order of magnitude improvement over TCP in throughput.

Think about that. In tech, an order of magnitude improvement generally equates to disruptive technology. A product killer. TCP’s days are numbered.

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Go Bag

23 Sunday Aug 2020

Posted by Ed Mahoney in covid-noir, Geek Horror

≈ 4 Comments

A Go Bag is an emergency-preparedness bag that you pack in advance, but hope you never need.  That description, definition, is plagiarized directly from wikihow.com, where you can learn how to make your own go-bag.  Their advice on what food to pack is ridiculous.  I’ve done enough backpacking to know.  You don’t buy a can of tuna.  You buy these Bumble Bee tuna lunch packs. Depending on your vices, Starbucks Via Instant Coffee is also brilliant.

I watched Sean Penn advise America on TV the other day that we should all have a go-bag ready as part of our pandemic preparedness. He said smart Californians already know this, for when the big-one hits. With all the backpacking, hiking the 500-mile Colorado Trail with A Lo Hawk, aka La Plata, the international travel as an IT hit man, and the Covid-regulated, guest-living I’ve been doing this year, with all that, it’s fair to say I invented living out of a go-bag.

I could tell you how much experience I’ve gained over the years, but honestly, I think most of my efficiency gains are the result of improved tech. I recall the strap to my computer bag breaking as I climbed the stairs to the second deck of a ferry, crossing Sydney Harbour to Manly Beach. It was a quality bag, but no match for the stresses of my network cables and scores of 3.5 inch floppy disks needed for emergency reinstalls of the prevalent operating systems of the day. It’s crushing weight nearly broke my foot. I now carry a billion times more data, at a fraction of the weight, in the form factor of a USB drive.

Nowadays, I carry two MacBook Airs, one work, one personal, an iPad, some adapters and USB drives, and a copy of my latest novel to gift to whomever I chat up on the flight. My current laptop bag has survived under this improved load the last fifteen years. My back is doing better as well.

I’ve been shuffling back and forth between Colorado and Texas all year and virtually living out of a go-bag. While I’ve expanded my real estate on the remote end of that passage, stocking clothes and toiletries, I can sometimes travel with just the laptop bag. I can leave behind most tangible materials, even most of my data is in the cloud, but I find that I still need to carry compute resources – the requisites to stay connected.

But I must say, I feel stealthy when I travel. I have a bit of an imagination and sometimes pretend I’m a spy as I travel through airports. I fancied myself Harrison Ford in Blade Runner during this recent jaunt through ATX. Maybe that makes me weird, but what goes through your head when you travel? Got a go-bag ready for when you have to self-isolate?

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

We are the Media

11 Thursday Jun 2020

Posted by Ed Mahoney in Geek Horror, Politics

≈ 3 Comments

social media

“The Vietnam War was lost on television” is a phrase attributed to Marshall McLuhan.  We still trusted our news media back then.  More importantly, we were all watching the same channel.  When Walter Cronkite reported on the war casualties, we all had the same numbers.  McLuhan’s point is expressed by another of his phrases, “the medium is the message.”

Today’s medium is social media.  Streaming is interesting, but social media is the game-changer.  I could brush broader strokes and say the Internet, but social media is the medium that allows us to self-publish, and that’s powerful – just ask the President.

I find it ironic, if not pathetic, there is such pervasive sentiment bashing the Media.  Fox News plays to the lowest denominator while MSNBC promotes Antifa.  Zuckerberg should take more responsibility.  We love to blame others.

On the receiving side, we curate our messages by accepting certain friends and blocking others.  On the publishing side, we share posts that appeal to us.  That’s self-publishing.  That makes us the Media.  And we’re bad at it.  It’s fair to say the etiquette is still forming, but until then, stop blaming section 230.  We’re all publishers.  We’re all content distributors.  Own it.

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

The Morning After

14 Saturday Mar 2020

Posted by Ed Mahoney in Geek Horror

≈ 1 Comment

Tags

coronavirus, MyHairGrowsLikeAWeed, NoTrafficOnMopac

IMG_4203

Not enough is being written about this story.  I just paid less for a gallon of gasoline than I did my senior year of high school.  Maybe not adjusted for inflation, but this is a running blog.  Go to economist.com if you have higher math expectations.

I also ventured out to the grocer – HEB on FM620.  I was hesitant after all the stories I heard yesterday about zombie hoards butchering one another over diet coke and almond milk. I’m paraphrasing my brother-in-law from his recent experience at the HEB in Northwest Hills.

The shelves were half empty but the masses were absent.  They likely ran out of real estate to store more goods.  I felt almost guilty with some of my purchases.  I tried to make good decisions.  In the end, I hoarded Malbec and after-shower conditioner.  I love how Texas grocers sell wine.  I’ll weather this storm.

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Digital Tracking

24 Friday Jan 2020

Posted by Ed Mahoney in Geek Horror, Novel

≈ Leave a comment

Tags

JV

 

JV2

Just when you thought you were safe, talking to people…

It’s possible to pair public information about yourself with private information about yourself – to de-anonymize the data with a strong level of confidence.  And if you can do this yourself, so can others, to your personal data.  If anyone can find some studies that prove me right, post links in the comments.  Otherwise, it makes for a better story if you simply assume I’m right, as you read the rest of this blog post.

As evidence, I offer you this graphic of my pages-read stat from Amazon.  It shows two pages read on Tuesday and three read on Thursday.  First thing about those numbers is that they are atypical.

Typically, my pages-read stats are zero for longer stretches of time.  Then, when they are not at zero, they hover around 25 or around 100.  Apparently, Kindle Unlimited readers average 25 pages read in a day, on the days they read.  Maybe some also average 100 pages read, or maybe there’s yet another reason for that lesser cluster.  I don’t know.

I do know who that reader is, because I talked to him on both those days.  He told me what he read.  Good ‘ole HUMINT.  The benefit of my super low stats, is that I can easily correlate what he told me with what I see in my stats.  I know that every move on this trend line is my collaborator reading my book.  Imagine the fun I could have.

I could post his progress online, in this blog, for the digital world to see.  I’m correlating two sources of his digital footprint, one gathered from a public conversation, the other obtained from somewhere else his tracks are being published, seemingly anonymously – Amazon Books.

I was able to de-anonymize my Amazon author stats out of the law of small numbers, in my case, typically zero, then only two and three, and because the reader told me he was reading pages.  Because I know these stats are his, I can assume pages read in subsequent days where I don’t talk to him, will be his.  Net, net, I will know his reading pace.  I’ll know if he finishes the book, with further correlation with what I know to be the book length.

I don’t think he’s overly concerned.  I showed him what I was doing.  His response?  “Privacy is a thing of the past.”

 

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Cybersecurity is Complex

19 Monday Aug 2019

Posted by Ed Mahoney in Geek Horror

≈ Leave a comment

Cyber War

Is that true?  Is security really any more complex than other IT disciplines?  More so than virtualization?  Or AI?  No, it’s not.  It is different.

I ask this question of myself, as much as whatever audience reads my blog, because I’ve encountered this for so long at different companies where security is a subset of a larger portfolio of products.  The argument is that security is too complex for sellers.  Subsequently, additional skills are needed to assist the seller to close the deal.  That part might be true, but sellers should have the confidence to begin a security discussion on their own.

I found this argument especially ironic when I returned to work for a telco.  In my mind, telcos invented security.  I was a firewall admin in 1994 when some AT&T gentlemen, Cheswick and Bellovin, published Firewalls and Internet Security: Repelling the Wily Hacker.  As a firewall admin, that was my bible.  I can speak first hand just how deep the security skills are at telcos.  Still, the sellers there, as much as anywhere else, tell me they find security complex.

There are two reasons sellers perceive this.  One is the specifics around deploying a security policy.  The other is culture.

A telco seller slinging circuits encounters many complexities in the turn-up of his or her set of products.  Very often they are coordinating the activation of an MPLS circuit – which they might call IP VPN.  A product name that drives some security people nuts and could be a topic for another blog.  Back to point, the seller might attach a managed firewall deal with the circuit, and have it provisioned to include an intrusion prevention system.

The complexities associated with tuning firewalls and intrusion prevention systems could be true for the security policies with other security tech, but FWs and IPS are examples I’m most familiar with.  Ideally, the implementation process will take three weeks.  Could just as easily take three months though, after the turn-up of the circuit, before the seller can commence billing on the deal.  Why is that?  Security must be more complex.

The issue is that customers don’t always understand their environment.  They don’t know all the valid applications communicating to and from their premises and the Internet.  Implementing a security policy that blocks all traffic not explicitly allowed is a discovery process.  For the seller managing the customer relationship, having to explain why the IPS pattern-matched their nightly data backup routine as a DoS attack, security is complex.

I’m theorizing more on the culture aspect, but I believe it’s equally responsible for the perception of security complexity.  There are two types of security experts.  Chris, who served in the military in Signals Intelligence, advanced to special forces, then transitioned to the commercial sector with a stint at the NSA before joining a major MSSP, represents a formidable talent.  The Colonel Flag type, he could tell you, but then he’d have to kill you.

The other type is Jen.  Her office bookshelf is stacked with technical journals and her Goodreads bookshelf is also ninety percent nonfiction.  She dresses in khakis and a white button-down.  The Cult-of-the-Dead Cow Type can recite the baud rate of every modem she ever used for her CompuServe subscription before the Internet was a thing.

Chris and Jen might not attend RSA, but they never miss BlackHat or DefCon.  They learned their tech the same as everyone else, on the job.  But they spend extra cycles reading SANs security newsletters, and listening to podcasts like Security Now and Colorado=Security.

Chris and Jen belong to a community.  You see this in some other industries, but it’s rare for other IT disciplines.  Even the programmers’ groups on Reddit are half made of these security experts.  Disaster Recovery experts don’t meet up on weekends to shoot guns at the range.

This community isn’t impossible to join.  Chris and Jen drink beer and are as socially inclusive as database architects.  But security is more than just a job to them.  A career might be the correct word, I feel there might be a better one.  There’s a reason Chris and Jen are experts.

Since I’m taking liberties with stereotypes, let me say that Sellers listen to podcasts more than any other humans.  Consider listening to one of the two I linked above.  You’ll find the content engaging.  And be comfortable starting a security conversation with your clients.  Let them know you have Chris and Jen on your team to take the discussion further.  It’s not hard.

 

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

512

07 Friday Jun 2019

Posted by Ed Mahoney in Geek Horror

≈ 2 Comments

Tags

CenturyLink, IgniteYourSecurity, PaloAltoNetworks

ignite (1)

I’m sitting in an ATX bar drinking 512 IPA near gate 23, listening to live music.  If that makes you jealous, I won’t get home before midnight.  But what a week.

I was a booth babe for my company at the Palo Alto Networks Ignite 2019 User Conference.  It was a cool setup because it was less booth and more coffee shop slash drinks after five.  If that wasn’t enough to draw people in, and it was, I was signing promotional copies of Full Spectrum Cyberwar.

If it confuses you that I would be both working for my firm and at the same time self-promoting my book, I can explain the joint-marketing/co-branding concept to you in one word – LinkedIn.  If you need more words, my original content drew people into the booth.  My authenticity with a signed book increases customers and potential customers’ commitment to my firm.  It also lubed the conversational skids.  That helps my firm and for me, hopefully, a percentage of them will buy my first or future-3rd book.

tomo

The vendor took care of me and my crew with an over-abundance of high-quality meals near the Austin Convention Center.  And when it was all done, I met my friend and neighbor, Steve Wolfe, also working in Austin at the time, and my brother-in-law Steve Collier, at Tomos for the best sushi on Parmer Lane.

I’m exhausted and won’t get home before midnight, but I’m drinking 512 IPA, listening to live music, and I’m good.

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Left Handed

13 Monday Aug 2018

Posted by Ed Mahoney in Geek Horror

≈ Leave a comment

Tags

taste of telluride, wedding venues

Left-Handers-Day

This is getting creepy.  Am I the only one Facebook notified that today is International Left-hander’s Day?  On the other hand, this exceptional profile accuracy renews my faith in the omnipotence of their algorithms.  If their AI knows I’m left-handed, then they should be able to resolve this Russia thing.

As much as I appreciate the recognition, I can’t pretend to understand the value having this day brings to me.  No doubt, extensive lobbying went into making this day available to us lefties worldwide.  Not sure I’d give my right hand to keep it, but I wouldn’t give it back.

I will say this.  In fact, I’ll let my future son-in-law say it for me – visually – captured here as I was spying down on the city of Telluride.  Whether you’re AI, or a bot, or some photo-opportunist, I know that you know that I know you’re watching me.

St Sophia

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

hashtag deletefacebook

24 Saturday Mar 2018

Posted by Ed Mahoney in Geek Horror, Politics

≈ 2 Comments

Tags

hybrid media

Delete-FaceBook-Account

Sure, go ahead.  Delete Facebook.  Or better yet, just add the hashtag and don’t do it.  I chuckle over the irony when people post their intentions to take a pause from their social networking addiction.  Seems to me like they rarely make it past three weeks.

I don’t care if Facebook lost billions in market cap in this latest brouhaha over consumer privacy.  Like anyone else, cry me a river.  I also have little doubt their market cap will return before year end.  Just like every major corporate hack, Target, Sony, Heartland, their stock takes a dip and recovers in less than a year.  And while I don’t care about Facebook, if forced to pick sides, I’ll stand by Zuckerberg.  As culpable as they are for their own inactions, just like with prostitutes and drug users, the politico positioning is to punish the victims.  And it’s pretty clear why.

The reason is clear when I read the op-eds in the Saturday morning papers.  Editors can finally take a departure from their vigilant stance as Trump apologists by directing their angst against Facebook.  There is no collusion and Zuckerberg is responsible for the Russian election meddling.  No better misdirection than an unloved corporate scapegoat.

I don’t think anything will come of this but the one thing I could get behind is if this leads Zuckerberg to stop pushing the lies about Facebook not being a media company.  Talk about some brazen bullshit.  They direct 20% of this country’s advertising dollars.  That’s the real story for me because I know Americans won’t change their privacy concerns and habits from this.

Even if you delete or pause your facebook account, you won’t stop looking for a free digital lunch elsewhere.  Facebook has two billion users, they aren’t going away from this.  Social Networking might lose this battle but technology will win the war.  Remember John Henry in his epic battle against the jack hammer?  Spoiler alert.  Tech wins.

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Virtual Currency

18 Sunday Feb 2018

Posted by Ed Mahoney in Geek Horror, Novel

≈ 3 Comments

Tags

bitcoin, coinbase, ripple

bitcoin image

Pretty sure I blogged late last year on my plans to buy Bitcoin.  I finally got around to doing that a couple of weeks ago.  I don’t care to start conducting transactions with virtual currencies.  This story is the best of many I’ve read that details exactly why virtual currencies aren’t really a thing yet, and won’t be for some time.  Perhaps not until quantum computing becomes pervasive.  I’m doing this for the experience.  To be able to relate accurate details in my next novel.  I referenced a bitcoin transaction in my last book but I glossed over the details.  One can’t write a tech thriller on cyberwar without speaking to virtual currencies.

I won’t go into too much detail here on my experience.  I think I’ll mostly provide links to some of the best stories I’ve discovered, and you can click on them if you’re interested.  I actually repeated a number of stories from my ten years of blogs in my last novel, and I will again.  So writing this post is more about building my reference library of content for book two than anything else.  Some of this will be useful to you if you are considering purchasing a virtual currency.

Since my goal isn’t becoming rich, I only purchased $100 of Bitcoin.  I wanted to invest just $5, and that’s an option, but there are transaction charges, and it occurred to me it’s more easy to do the math on $100.  It’s quick for me to understand the $2.99 cost of buying my $100 of Bitcoin is basically 3%.  I’ll incur similar future transaction charges and they would all be much more from a percentage perspective for only $5.

My first step was to read the Internet to understand how to begin trading Bitcoin.  I discovered I needed to register at an Exchange.  I settled on Gemini because it seemed the most professional to me.  It’s run by those Winklevoss twins whom successfully sued Mark Zuckerberg for a substantial share of Facebook.  After registering nearly two months ago, the Winklevoss twins still have not completed verification of my identity.  They did contact me once to inform me that my drivers license photo was too blurry and that I should resend it.  I did.  Nothing but chirping crickets since.  Seeing this as a red flag for future customer service interactions, I signed up with Coinbase – which is probably the most popular exchange.  Took a couple of days for verification, mostly because I did it over the weekend.  Go with Coinbase.

My research indicated that one should not leave their virtual currency sitting with an online exchange, given the history of these places having their reserves constantly hacked.  North Korea’s Icarus has made attacking exchanges their specialty of late.  Icarus is the modern day Bonnie and Clyde.

So I purchased a digital wallet.  I think I blogged on this already too.  I received the Nano Ledger S as a Christmas gift.  It’s pretty cool.  Cost about $79.  Another reason why purchasing only $5 would have been stupid.  The idea is one can transfer their Bitcoin from an exchange onto the digital wallet to avoid being hacked.  It’s mostly offline and connects to your computer via USB when you use it.  Transferring Bitcoin is essentially a copy/paste process.  Very easy to understand YouTube video here on how to do that between the Nano and Coinbase.

If I’m honest, using digital currencies is fairly complex.  But for a techie, sort of fun.  I created an account for myself at Bitsane too because I want to trade my Bitcoin for Ripple – another virtual currency that banks are starting to use.  Even more complexity as one cannot directly buy it.  Rather, you have to exchange Bitcoin for Ripple.  Yet more complexity.

There is nothing simple about trading Bitcoin.  It’s not something one can easily do from their 401K account.  But I’m a writer and my genre of tech thriller encumbers me to actually know what I’m talking about.  Fiction allows me to take some liberties, but readers of tech are interested in detail like this.

My Bitcoin stash is currently worth $130, after a single week.  $10 of that came from purchasing it from a recommendation, which you can do too from this link.  It will give you a quick 10% return on $100 transaction.  You and I will both get $10.  Seems like a better business model than actually trading Bitcoin.

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

WIX is the Website for Authors

20 Saturday Jan 2018

Posted by Ed Mahoney in Geek Horror, Novel

≈ Leave a comment

Tags

GoDaddy, Lobo Media Ltd., website builder

wix-logo

My friends think I’m technical.  I suppose compared to many of them, I am.  I would argue that ten years in personnel management killed my skills at the command line, but it’s all relative.  I just built a website for my novel.  I probably sound like a techie having just done that, but hear me out.

This morning, I built a decent web site for a book I published over a year ago.  Okay, so maybe I am technical, but lazy?  No, I tried to build a website earlier, it just sucked so badly I never really launched it.  Ultimately I deleted it.  And this is the point of my post, where I share my writing experience for other aspiring self publishers.  I built that first website with GoDaddy.  GoDaddy leverages WordPress for their platform.  Software that competes with Microsoft for the highest number of known vulnerabilities.  It’s so kludgy to use, I’m at a loss for words.  I could never get it to look how I wanted.  I couldn’t even use my own fonts.  That’s a big deal to me because I like to use a stencil font to give a military air to my book.  Think MASH.  I’d show you but this blog is on WordPress so I can’t.

It was my 15 year old daughter who talked me into using WIX.  I’m a happy camper.  Took me less than an hour to have everything looking how I wanted.  Much less than that to launch it but then I  tweaked things for over half that time because I was having fun.  WIX even provides simple-to-use email subscription forms.  Everything was so easy, a writer could do it.  I’m not just being funny there.  My experience meeting other writers is the majority of them are barely technical enough to format fonts in a Word document.  They refer to the people who publish ebooks as ebook coders, like it’s actually software development to publish a book in electronic format.  I’ll admit, it did take me about twenty hours of YouTube videos to learn Adobe InDesign, but seriously, it’s not coding.

So, if you are an author.  One of those writers who is just savvy enough to download Scrivener but not clever enough to integrate file sharing with DropBox, then Wix is for you.  Trust me, stay away from GoDaddy, it’s a POS.  That’s “Piece of Shit” for you non techies who shy away from acronyms and can’t RTFM.

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Color Mode

25 Saturday Feb 2017

Posted by Ed Mahoney in Geek Horror, Novel

≈ Leave a comment

Tags

CMYK, Cyber War I, Indie publishing, RGB

rgb-vs-cmyk

This is a bit geeky but I want to share some of my lessons learned as a survivor of the indie publishing process.  This mistake cost me some money because I bought a handful of books to sell on consignment at a local bookstore before discovering this problem.  The issue was some of the text in my book was a lighter shade of black than the rest of the text.  I had two shades of black.  Turns out, there are maybe 1004 shades of black.

RGB represents the three primary colors of red, green and blue.  Computers and TVs, essentially all monitors, output color in RGB because they are working with light.  Think the colors of the rainbow.  All the colors of the rainbow combined are white.  You see the white in the middle of the RGB Venn diagram above.  Conversely, when there is zero light, a monitor screen is black.  RGB is represented by 0 to 255 values for red, green and blue respectively.  Based on what I just said, 0,0,0 is black and 255,255,255 is white.  Microsoft Word outputs fonts in RGB because it assumes it is outputting to your computer screen.  Your printer converts RGB fonts to CMYK as you print.

Which brings us to CMYK or Cyan, Magenta, Yellow and Key.  Key means black because the last letter in black is “k” and “b” might lead you to think blue. Your printer isn’t dealing in light like a monitor, it’s working with ink.  Think a box of crayons.  You were told in elementary school that all the colors of the rainbow make white, but you could never get all your colors to come out as white no matter how big your box of crayons.  CMYK is represented by values from 0 to 100.  Hence, the Venn diagram above yields black for the 0,0,0,100 combination of C, M, Y and K.  Black and White are on opposite ends of the spectrum for RGB vs CMYK.  And they use a different amount of pixels, 256 vs 101 per color setting.  Make sense?

When I had to use Adobe InDesign for my book layout and create print and ebook formats for my publisher, I didn’t know that this graphics package was preparing my fonts for a printer and converting MS Word fonts from RGB to CMYK.  This alone would not have been an issue had it converted everything to the same color mode.  For some reason my MS Word fonts had two different values for black.  Or at least they converted to two discrete values.  One was a default setting for black that InDesign calls Black, for which the CMYK values are 0,0,0,100.  Or maybe 100,100,100,100.  I forget but think both sets of values are equal.  The second default setting was called Registration.  Its CMYK values are various numbers for each of the four settings.  The result is a lighter shade of black.

My publisher, Ingram Spark, which is really a distributor as I have my own publishing firm, Lobo Media, returns an electronic proof to me to look for issues with my print uploads.  Had I actually printed it, I might have noticed the color disparity.  I only reviewed them online though, and guess what?  The CMYK values don’t contain nearly as many pixels as RGB, think 100 vs 255 as printing is at less resolution than display monitors, so I could not discern the disparity on my screen.  It shows up in ink on paper, but not on a monitor.

I think the lesson here is to print out at least part of your proof to look for printing errors.  I’m blogging this because it was a topic of discussion at my book signing Thursday night.  I signed and gave away my leftover copies that contained the misprint.  They are totally readable, but flawed.  While Karen was walking around assuring everyone that the kinky sexual preferences of the book’s protagonist were entirely fiction, I was having conversations on color mode.

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Going Dark

25 Thursday Feb 2016

Posted by Ed Mahoney in cyber war, Geek Horror, Running

≈ 1 Comment

Tags

Apple, cryptanalysis, cryptography, FBI, scytale, Simon Singh, steganography, The Code Book

scytale 2

FBI Director James Comey testified to Congress today that encryption will end law enforcement’s ability to perform their job.  He suggests that the FBI’s primary tool is court orders to search for information, and he makes the general assumption that data is never accessible once encrypted.  To paraphrase, encryption leads to information “going dark” for the purpose of public safety.  As if encryption is game over for the FBI.  This reminds me of a famous quote (famous misquote actually as I don’t believe this is true) attributed to the Commissioner of U.S. Patent and Trademark office Charles Duell when he purportedly quipped, “Everything that can be invented has been invented.”  Comey seems like a decent guy but suggesting that the FBI requires clear text access to American’s data because the court order process is predicated on this is disingenuous.  The FBI has an obligation to keep up with technology.

I stated in my previous blog on this topic that cryptography and cryptanalysis have been playing a cat and mouse game throughout world history.  So let’s review that, because I believe government is obligated to defeat encryption technologically rather than by  eroding America’s privacy laws.  To be fair, I recognize they are currently playing catch-up.  Consider that cyber crime is nearly a half trillion dollar market.  Security products and services are well under $100B market.  Meaning we are applying $100B to the good side and cyber criminals are making $500B.  So I can sympathize with Comey.  The bad guys are winning.

Understand the etymology of these terms.  We began by covering up secrets.  For example, Histaiaeus, in the 5th century BC, wrote his message for Miletus to revolt against the Persian King on his messenger’s shaven head.  He then waited for his messenger’s hair to grow back before sending him on his way.  This was before instant messaging.  A similar technique was used in the latest version of Mad Max.  “Steganos” is Greek for “covered” while “graphein” is the Greek term “to write”, hence steganography means “covered writing.”  So steganography was the art of covering up a message.  It goes without saying, one didn’t necessarily have to be a rocket scientist to be a code breaker back in the day.

The art of secrecy evolved to hiding the meaning of the message, rather than simply covering up the message itself – with the understanding the message will likely be discovered eventually.  The Greek term for “hidden” is “kryptos”; hence we use the term “cryptography” which we now practice with encryption.  The picture above is of a 5th century Spartan Scytale that transposed the position of letters to hide the meaning of the otherwise open message.

Technology advanced and today one does have to be a rocket scientist to be a code breaker.  Bill Gates was quoted by Representative Bob Goodlatte (wonder if he owns shares in Starbucks?) in today’s Congressional Hearing as suggesting Quantum Computing will soon be powerful enough to break any encryption.  I don’t know about that but point is technology does eventually catch up in this cat and mouse game.  Consider the plight of Mary, Queen of Scots.

On trial for treason, her prosecutor, Sir Francis Walsingham was also England’s Spymaster.  Sir Walsingham first captured Mary’s correspondance, which she hid inside the hollow bungs that sealed barrels of beer.  This was steganography.  But Mary was clever and further used a cypher to hide the meaning of her correspondence.  Sir Walsingham engaged Thomas Phelippes to perform the requisite cryptanalysis and ultimately succeeded in proving Mary’s guilt.  The rest is history.  Point being, Cryptanalysis was on par with the cryptography of the time.  Fast forward to WWII where the British successfully decoded the German’s Enigma with the use of early computing technology.  So Bill Gates might actually know what he’s talking about.

I’m in the cyber security industry and agree with Comey that the bad guys are winning.  For now.  Still, I’m not willing to surrender any more rights to privacy than have already been suspended post 9-11.  Technology will catch up.

 

 

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Secrets

23 Tuesday Feb 2016

Posted by Ed Mahoney in cyber war, Geek Horror

≈ Leave a comment

Tags

Apple, FBI, privacy, security

secret

I understand everyone believes there should be a balance between security and privacy.  Seems sensible.  Bill Gates came out today in favor of the FBI over Apple, but then he’s been making business decisions counter to consumer needs for decades.  I myself am so impassionately middle of the road on most topics that I wonder sometimes if I’m not actually dead.  It’s great when everyone can win a trophy but you cannot avoid the reality that there are winners and losers.  I believe the current Apple/FBI debate is one of those binary scenarios.  It’s as difficult for me as anyone else to plant my flag when I want both privacy and security.  The following example though helps clarify my position.

The 4th Amendment provides both privacy protection, and presents the guidelines for the State to void those privacies given reasonable cause.  Assuming proper due process, the State wins.  This is a nice template for balance, but it doesn’t stop there.  The 5th Amendment protects us from self incrimination.  “I plead the 5th.”  Taken together, people must allow the State entry into their home for a warranted and reasonable search of evidence of a crime.  However, people are not obligated to point out where they hid the evidence.  “Oh, it’s under the seat cushion.”

There are two centuries of legal precedent supporting these Amendments to where most of us are fairly knowledgeable of the rules, without being actual lawyers.  Let me dumb this discussion down though even further.  Let me use the term secrets instead of privacy.  We all have secrets.  Not just our banking PIN code but family history and deep, dark fantasies.  I know that there are things I would never consider telling anyone, and I’m about as transparent as a person can possibly be.  Have you read my prostate chronicles?  I might be wavering a bit from the core Apple/FBI topic since not all secrets necessarily contain criminal content, but I believe the principle points remain intact.  I’m allowed to have secrets.

I’m not even that strong of a privacy advocate.  See above on my middle of the roadness.  For example, I don’t consider privacy an inalienable right.  We were born naked in a garden, so God wasn’t that big on personal privacy either.  Clearly, there was very little personal privacy when we were living together as tribes in caves.  But like anyone else in western civilization, I’ve grown accustomed to certain privileges and I do want privacy.  Even if I didn’t, the information age ascribes so much value to data integrity that encryption is paramount to how our society and economy function.  It’s not until I substitute the word privacy with the word secret that I begin to understand where I fall on this topic. The State can try to search but I can try to hide.  Tell me I’m wrong on this.

Cryptography and cryptanalysis have been a cat and mouse game played throughout millennia.  Technology plays the lead role.  I understand that if the State can decrypt my communications, they already have legal justification to do so.  My information is only as safe as my encryption is strong.  But if they can’t decrypt my data, I don’t have to hand them the keys.  That’s like showing them the evidence is hidden under the seat cushion.  And they can’t outlaw encryption.  That’s like saying I can’t have secrets.  Who doesn’t have secrets?

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

A Bad Apple

17 Wednesday Feb 2016

Posted by Ed Mahoney in cyber war, Geek Horror, Politics

≈ 1 Comment

Tags

all writs act, privacy, tim cook open letter

apple n worm

All you need to know in terms of Tim Cook vs the FBI is Donald Trump’s position on the matter.  Trump believes Apple is in the wrong and should be forced to provide the government with a backdoor hack into their iPhone.  Because he believes national security trumps personal privacy.  This is actually true – in China.  And Russia.  If you already take issue with this self-made celebrity, then you can assume Apple is right.

To be fair, and less political, personal privacy is a complex issue.  The U.S. Constitution references no protections for personal privacy.  The Bill of Rights however references numerous Amendments that allude to privacy.  Privacy of beliefs, privacy in your home, privacy of person and possessions against unreasonable search and seizure.  I think the list goes on but I’m not a lawyer and can’t defend any of them.  I do know Americans expect a certain degree of privacy and the government has the authority and corresponding legal process to transcend our privacy given sufficient warrant.  In this case, the FBI is leveraging the All Writs Act to demand that Apple engineer a new IOS version that disables the feature that would wipe the iPhone data after 10 unsuccessful login attempts.  This would allow the FBI to subsequently hack into the iPhone with a brute force password attack.

Precedent is set that allows the government to do this.  Shoot, there is even a recent case where the U.S. Attorney’s Office forced another smart phone manufacturer to unlock a screenlock.  But Apple is refusing to comply.  Tim Cook wrote an open letter explaining why.  He frames his argument from his customers’ perspective.  But just think about the consequences for his company.  Apple is being forced to weaken their product in a global market and their competitors are not being forced to do this.  They will immediately be at a competitive disadvantage in a global market for their most successful product.  Game over for the iPhone.

And recall, corporations are deemed people by the Supreme Court.  Apple will have all of the same assurances to privacy, to protection from self incrimination, to a right to earn a living.  They have every right to do business as any American as an individual.  They have the resources and will win this battle.

Why is it so hard to take a position on personal privacy vs State security?  The State has laws and legal precedent allowing them to violate your personal privacy.  We have laws and legal precedent allowing us to refuse, assuming we have the financial resources to fight.  But encryption just sort of breaks everything.  Encryption means, even if the government gets their way, they might not be technically able to have their way.  You can’t hand them the keys to your data if you’re dead.  Encryption puts the government in a real pickle.

This will be the data privacy fight of the new millennium.  This will be good.

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Trolling

18 Friday Dec 2015

Posted by Ed Mahoney in Geek Horror

≈ Leave a comment

Tags

1-9-90 rule, Black Friday, Cyber Monday, Internet TV, Marshall McLuhan, original content, trolls, Walter Cronkite, you've got mail

Internet-Troll-Pictures

What’s a troll?  Most people understand trolls come from Norse mythology and you probably picture one exacting a toll from anyone trying to cross its bridge.  So then, what is trolling?  The bridge toll metaphor extends to some asshat commenting ugly remarks on your social network.

trolls

Why do trolls do this?  I don’t know but there is extensive information on the psychology of this habit online if you google the topic.  Trump’s tweets border on trolling.  My goal here is to put you at ease with social networking, despite the trolls and seemingly dangerous personal privacy concerns.

internet-trolls-online-provocateurs-troll-ipredator-image

I see this message as important because the vitriolic rhetoric has been increasing lately on the social networks I participate in, and I don’t see the noise abating anytime soon.  Not with us entering the final throws of an election season.  And I don’t want my friends and family psyched out and tuning out.  I know you probably only want to see pictures of your grandkids.  It irritates you to get friend requests from friends of your kids whom you don’t know.  Do what I do.  Accept their requests out of politeness and then immediately unfollow them.  That way you will never see their posts.  They will still see yours’ but only if you actually post stuff and many of you don’t.  This is also important because social networking is not going away.

YOUVE-GOT-MAIL

My comfort level participating on the Internet might be partly my personality but I suspect it mostly stems from my job.  My I/T career put me online.  Before the Internet, I was on CompuServe.  Online communication is the company culture at IBM.  That was curious to me when I joined IBM in the early ’90s because I came from the phone company where we never answered email.  We were all about voice mail.  Now everyone is on email.  Remember “You’ve Got Mail” from 1998?  We’re way past that now and today we are all on Facebook.  1.55 billion of us at last count.  The Internet only has 3 billion users so that’s like saying half the world.  It’s nearly a quarter of the real world.

walter cronkite

Let me digress even further, although I promise this is relevant to my point.  Walter Cronkite is often associated with America losing the war in Vietnam.  The phrase, “the Vietnam War was lost on television” came from Marshall McLuhan.  It’s probably also fair to say that Carter lost the Hostage Crisis on television, to Ted Koppel.  And the first Gulf War was won on television with General Schwarzkopf and CNN.  And then came the Internet.  McLuhan’s other popular phrase is, “the medium is the message.”  I suspect you are way ahead of me by now and I probably don’t need to even say this, but the war on terror will be fought on Facebook.

We’ve all seen this war playing out on Facebook over the last couple of weeks.  The online social medium changes our experience from the television in our living room to our mobile device or desktop computer.  Facebook is just another channel like CBS News, but with one important difference.  It’s more immediately participatory.  What do I mean by that?  TV, then and mostly still, is a one-to-many broadcast.  Within a few years, by merging picture-in-picture (PIP) technology with the Internet, it will more closely resemble Facebook, which is a many-to-many broadcast.  A party line.  Know that the speed of the Internet adds velocity to the spread of ideas.  Including bad ones.

google-tv

So the Internet and social networking has extended your living room to a much wider audience.  To the entire world ostensibly although really just to your online contacts factored by some multiplier of your friends’ friends.  Unless of course your big game hunting photos go viral.  And this makes many of you uncomfortable.

Doesn’t matter how uncomfortable you are.  You have a role to play.  Let me explain the 1-9-90 rule.  It’s sometimes compared to the 80/20 pareto principle, although I would argue it’s much different because everyone participates in 1-9-90.  I first read about it as part of teacher education studies.  Let me start with that example.  In a classroom, there is one teacher producing all the content.  A handful, 9%, comment by raising their hand and asking questions.  The point of the teaching studies is that the remaining 90%, sitting contently and following the conversations, are still participating.  They learn by listening to the question and answer.  Maybe they listen in math class, but ask questions in social studies where they have more confidence on the content.

pinterest-content

Do you ever post content?  Are you the 1%?  The teacher?  Do you ever comment?  Are you the 9%, at least on some of your friend’s content if not to every post?  A like is the same as commenting.  I post content.  Much of it is via my blog and I leverage various social networks as distribution channels.  I think I prefer blogging for its ability to format text and pictures.  People quick at observational humor are good on Twitter.  I’d probably pay to subscribe to my sister-in-law’s tweets, she’s that clever.

Doesn’t matter if you aren’t the 1%.  Don’t feel obligated.  My focus is on the 90%.  The 9% are still contributing, perhaps even with original content.  This is where trolls tend to play, although trolls can be found in the 1% too.  I suspect most of them are too dull though to produce original thought.  They are nothing though if not confident and steadfast in their beliefs.  I try to avoid trolls but will find myself in heated debates with marginally more cordial but equally unyielding commenters.

I never actually care about winning a debate with the commenter though.  I don’t expect to change someone’s fundamental beliefs.  Not without hitting them over the head with a hammer.  My audience is always the 90%.  The much larger audience reading the comments.  Some are still forming their opinions.  That’s why they’re reading the comments.  They find it interesting.  And that’s why it’s important to remain respectful and if possible, write well-reasoned arguments.  But for the 90%, not the 9%.  Screw the 9%, they’re a bunch of asshats anyway.  I would know.

DontFeedTheTrolls

Sorry this post is so long.  I have the day off from work.  Do you see where I’m going with this?  You might not be an original content producer.  You might not even comment.  But you are being influenced by online commentary.  I can say that because you’re reading this.  I can even suggest you might be more influenced online than by your television because this year Cyber Monday might just exceed Black Friday purchases.  Don’t be a troll, but don’t get turned off by all the rhetoric either.  Understand that you’re a participant whether you comment or not.  The world is a stage and you’re on it.

 

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Auto Future

16 Wednesday Dec 2015

Posted by Ed Mahoney in Geek Horror

≈ 2 Comments

Tags

car sharing, Honda Odyssey, ride sharing

future-car-concept

It feels disingenuous to write about running considering I can’t remember the last time I ran.  A good two weeks ago for sure.  I could talk politics, my undergrad was poly-sci, but am a little burned out on that topic.  I’m hoping to be able to lay low on my political views until maybe the Iowa caucuses, when polls start to actually matter and he who shall not be named will begin to fade.  So let me tell you about my new car.  I mean my new used car.

We traded in our mini van for yet another mini van.  Same model – Honda Odyssey.  As unremarkable as that sounds, we bought one that isn’t much newer either, in terms of make.  It has half the miles and the annual service costs will be significantly cheaper.  That’s about it.  We bought used because I’m not certain I can afford a new car.  I could lease one but I’m not totally on board with that concept either.  I’ve yet to come to terms with paying for a car what I paid for my first house.  Am I the only one to feel this way?

We’ve always bought new cars in the past but I just can’t do it anymore.  Actually, I bought my last car used too, for Brittany.  I’m not all that convinced I even need a car.  Right about now you must be thinking I’m a cheap bastard, but I seriously don’t think I need a car.  The mini van is for Karen.  We only have one car.  I’ve been working from home for the last 7 years and most everything I need is within a 3 block radius.  My friends.  My doctor.  My chiropractor.  Restaurants.  Coffee shops.  The bottle shop.  And for anything I can’t walk to, I have wifi.  Suburbs are for suckers.  And car owners.

I’m beginning to sense this might sound like a rant that makes me appear poor.  And I understand the Facebook convention is to post content that makes me look rich and successful.  I invented social networking so don’t tell me what to post.  The average price for a new car costs more than a 4 year college degree, and everyone’s complaining about the price of college.  I’m telling you this is an issue.

For my part, I’m holding out for as long as I can to own a single car.  The bus picks up right outside my front door.  I’m a big Uber fan and occasionally I rent a car if the need arises.  Cheaper than a monthly car payment.  I understand there is a trend that forecasts people will stop buying cars.  Uber is termed ride sharing while short-term (as in hourly) car rentals is called car sharing.  It’s an urban thing.  I have a neighbor who lets me borrow her spare car when the need arises.  I’m at the forefront of car sharing.  And I score bonus points for minimizing my carbon footprint.  Am I alone on this?  Or am I just cheap?

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Unlimited

15 Tuesday Dec 2015

Posted by Ed Mahoney in Geek Horror

≈ 2 Comments

Tags

AT&T, price increase, unlimited data plan

data plan

I’m not happy about this.  Three of my five iPhones are under the grandfathered unlimited data plan, so my increase will actually be $15 per month rather than just $5.  But the lying marketing doesn’t stop there.

AT&T stopped offering unlimited data plans a couple of years after the initial iPhone launch, and that’s technically a price increase.  It’s why I pay more for my two other iPhones.  My perspective is of a single payment plan, not a single iPhone.

This is technology.  Prices are expected to go down, not up.  So bragging about their first (but not really their first) price increase in 7 years is bullshit.  Network bandwidth and speeds benefit from a phenomenon similar to Moore’s Law for CPUs.  Nielsen’s Law states that bandwidth doubles about every two years, with all else (like price) being equal.

internet-bandwidth-nielsens-law-1983-2914

I don’t know if there’s much I can do about this.  I suspect AT&T is still my cheapest option.  But I can blog my displeasure.  Any thoughts?  Should I switch my five iPhones?

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Cross Border Data Flow

06 Tuesday Oct 2015

Posted by Ed Mahoney in cyber war, Geek Horror

≈ 4 Comments

education-ukeulitigation

The U.S. completed their Trans-Pacific Partnership Trade Deal yesterday.  If signed by Congress, this will lower trade barriers to the import and export of physical goods.  How quaint in the Information Age.  Today, the European Union Court of Justice declared the U.S. Safe Harbor policy for demonstrating compliance with the EU Directive for Data Privacy to be invalid.  EU 1 : Pacific Rim 0.

I don’t know of the availability of any stats that show the value of global trade in information vs physical goods bought and sold, but I’m willing to guess data is at least more strategic if not already more valuable.  Explaining the details of the EU Data Privacy Directive, Safe Harbor, and this new ruling isn’t my objective here.  Much of it is very legal in nature and over my head.  My goal with my cyber security series is to offer a basic primer on topics I deem of interest.  At issue here is data privacy, specifically personally identifiable data or PI.

My 13 year old daughter is uncomfortable with the notion that data can never be fully erased with any certainty.  I don’t know why or how she developed this very specific concern, likely something to do with the proliferation of online photos.  She is totally aware of the EU’s Right to be Forgotten ruling wherein citizens can demand their online references be deleted by digital firms such as Google and Facebook.  Understand that the EU considers personal privacy to be a basic human right.

The irony here is in the arrogance of any U.S. citizens who think we invented personal privacy.  Indeed, the 4th Amendment of the U.S. Constitution states that, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”  Or stated more plainly, “Each man’s home is his castle.”  Well that was written over 200 years ago.  Post-911, the U.S. has conceded leadership on the personal privacy front to Europe.

I probably shouldn’t reveal what I really think because I suspect I’m on the wrong side of history here, but I will.  I don’t believe in personal privacy.  I want it to a degree but I certainly don’t think of it as a basic human right.  I can assure you there was little to no personal privacy when humans were living in caves.  Were Adam and Eve not born naked?  And yet I do like the 4th Amendment.  I believe we need a balance between personal privacy and the benefits that the sharing of personal information ascribes to a society – like security.  An example of that is the Patriot Act.  This latest EU ruling impacts a more commercial benefit, such as advertising.

I don’t think I’m alone on this one.  Anyone reading this is online and therefore highly likely also surrendering a large degree of their personal data privacy to social networks.  You’ve probably granted Facebook complete digital rights to more family photos than your parents ever collected in photo albums.  There are benefits to sharing.  And I don’t believe we ever, ever had complete personal privacy; so I don’t think of it as a basic human right.  No man is an island.  In the end, I imagine personal data privacy will be determined more by technological capabilities than regulation.  Your data is only as secure as your encryption.  I’m interested in comments.

Like this:

Like Loading...

Who Moved my Data Center?

30 Thursday Apr 2015

Posted by Ed Mahoney in Geek Horror

≈ Leave a comment

Tags

cloud, IBM, LoDo, Union Station

data center bookIn case you don’t know, the cloud is a data center.  Blaine Berger misses the opportunity to answer that key question for the billions of mobile users with this book, but he does speak to much more than arcane data centers.  This is a primer for any budding project manager.  In only 160 pages.  Everyone I work with, and the other 400,000 IBMers I’ve yet to virtually meet on a conference call, should read this book.

If we can substitute the term cloud for data center, and we can, Blaine references his experiences sailing through perfect storms.  Because I grew up in data centers, and should have been fired for numerous large scale outages, each story made me anxious.  I found myself wanting a bigger boat before Blaine would get too far into the details of each data center move.

Fortunately, Blaine applied effective humor to calm my nerves.  I wouldn’t say he used repetition per se, but his lessons built on themselves to where I definitely felt more wise by the end.  Everyone who works in I/T knows computers don’t work and that Murphy’s Law is simply a warmup for dealing with the complexities of installing networks.  This book advises you on how to be prepared.  It’s boy scout meets geek.

I attended Blaine’s book publishing party last night at the Lola Mexican Fish House.  It allowed me to network a little, which I rarely do.  Although I eventually ended up ensconced at a table with four retired IBMers.  Go figure.  As Blaine spoke to the crowd to thank everyone, he began by stating, “We are all authors now.”  The self-centered person I am, I took this as a personal dig toward my blogging.  But then I learned he’s been saying this for awhile and has written several other tech books.  And with scores of others in the room, it is possible he wasn’t merely talking to me.

I left the fish house for another restaurant, because I wanted to explore the Union Station area of Denver before going home.  I ate a small plate of lamb tartare at Colt & Gray with a glass of Coté du Rhone, while swarms of runners buzzed past.  Apparently no one runs alone in LoDo, they all belong to huge teams.  I did miss my evening run for this book affair, but it was worth it.  I took an Uber home after a 3 minute wait.  Enjoyable evening.

Like this:

Like Loading...

Broadband

21 Saturday Mar 2015

Posted by Ed Mahoney in Geek Horror

≈ 3 Comments

Tags

Marshall McLuhan, net neutrality

RG6 CableI recently blogged in favor of net neutrality.  To be clear, I don’t think regulation is the answer.  In fact, I believe regulation is as much the problem as greedy broadband providers; but I’m against the notion that cable operators charge additionally for content that doesn’t originate on their network.  Pick your poison.

Just when you think you might understand this net neutrality issue, and be honest, you don’t, not really; a story comes out the other day about content providers actually lobbying the broadband providers for guaranteed bandwidth.  The exact same thing, only the content providers are requesting this rather than the broadband providers forcing it on them.  Hmm. Net neutrality was designed to protect content providers from having to pay extra, but apparently some want to.  And make no mistake, these are content providers with deep pockets.  Sony.  HBO.  Showtime.  Note, they are also traditional TV content providers and not a Facebook or YouTube.

Clearly, some trend is underway to explain this.  It’s easy enough to assume these content producers are positioning themselves for the eventual transition of content delivery to the Internet.  That seems to be what’s behind all these related stories.  Marshall McLuhan professed that all new media are destined to subsume and extend all old media, and to use the old media as their content.  I’m fairly certain that if I understand what Marshall meant by this, then it would explain this transition of broadcast television to the Internet.  Not that I feel any dumber than the media companies.  They’ve been positioning themselves for decades with cable companies acquiring content companies and content companies merging with cable companies.  And then they split up.  I don’t think they have a clue how this will play out either.

But that’s their problem.  I thought I would provide some details here to help explain just how certain content could be expedited by your provider.  The original plan by the cable companies was to regulate the flow of Internet traffic.  They can do this by tagging the data packets as they flow through their network switching equipment and assigning more or less bandwidth to the data session.  I don’t know if they do this by leveraging the Quality of Service field of bits in the IP header, but there is an actual QoS field in IP headers, as well as in other transmission protocols, that can be modified for this purpose.  This is how VLANs and MPLS work, if you’re familiar with those transmission protocols.  They know the source and destination of each packet and they tag them to control their flow.  But the recent net neutrality regulations nixed that plan.

The story I linked above is about a proposal to provide media outlets whom are willing to pay, essentially a TV channel.  It would be a data service, Internet traffic rather than television signals, but carved out of a separate slice of bandwidth on the cable.  They term this capability a “managed service”.  It’s not clear yet if the regulators will allow it.  Nor is it clear the cable providers care to offer it.  But just how is this different?

A friend recently asked me to define broadband.  It’s worth understanding.  The term has a very specific meaning to network engineers; but about the time dial up was giving way to DSL and cable, network marketers co-opted the term to simply mean fast.  It didn’t help that the FCC further diluted the term by defining it as a specific data rate.  2 or 4 Mbps initially.  Just recently the FCC redefined it to mean 25 Mbps or faster.  They do this to regulate the providers to be more innovative; prompting their national deployment of faster speeds because regulated companies aren’t thought to be innovative.  That sentence made sense in my head, not sure it actually does now that I wrote it.  Regardless, I can assure you that speed does not define broadband.  Broadband is the transmission of multiple signals on a single medium.

Think of how your radio works.  Or broadcast TV.  Without detailing the entire electromagnetic spectrum, understand that FM radio and broadcast television operate in a frequency range from 30 to 300 MHz.  You might listen to radio station 93.7.  That’s a signal transmitted at 93.7 Mhz.  The allotted frequency would be somewhat bigger, perhaps from 93.6 to 93.8 – I don’t actually know, but a frequency range is provided to carry the signal.  In the open air, this is not considered broadband.  Multiplexing multiple channels onto a single wire would be broadband, and this is what cable providers do.  You de-multiplex the signals with a tuner or remote.  It might help to think of the opposite of broadband.  There is a term called narrowband, but in this context the opposite technology is called baseband.  That is what ethernet is.  A single medium with a single channel.  Sort of.  10Base T on cat 5 cable is 10 Mbps of bandwidth operating over 2 twisted pairs of wire in a 4 pair configuration in full duplex mode.  1000BaseT (1 Gbps) uses all four wire pairs.  This gets complicated but those 8 wires are considered a single medium and transport a single channel.  Take from this that if you have 5 computers in your house on ethernet, they each take turns to communicate.  Very fast turns, but they are sharing a single channel, and the more computers running on that ethernet, the slower your potential speed.

Broadband transmits multiple signals, or channels, on a single medium.  It generally consists of a different type of wire, coax rather than twisted pair (telephone wire).  While technology continues to increase the capacity of cable types, specific medium will always be superior in terms of potential bandwidth.  Ethernet over telephone wire doubled its use of wires from 4 (2 pair) to 8 (4 pair) as it increased its data rate from 10 Mbps to 100 Mbps to 1000 Mbps.  There is even a 10 Gbps version now.  Coax has also advanced, but switching to fiber to the home is what will be the medium of choice for gigabit data speeds.

Sony, HBO and Showtime are proposing their television channels be transmitted as data.  TV signals are mostly already transmitted as digital.  The difference is packaging them within the IP protocol, as all Internet traffic is transmitted.  Then you won’t need a TV tuner, simply your computer.  The point is that televisions are going away.  As analog gave way to digital, TVs will be vanquished by computer monitors or TV tuners replaced by computers, because their transmission methods are coalescing.

I took liberties with some of my technical explanations here so I wouldn’t copy paste this into any school essays, but hope this helps as a primer for understanding the very near future.  And by the way, Marshall McLuhan has some great quotes.  “The medium is the message.”  “Vietnam was lost in the living rooms of America, not on the battlefields of Vietnam.”  And, unrelated to media but a good one, “There are no passengers on spaceship Earth.  We are all crew.”  Good guy to read up on.

Like this:

Like Loading...

BYOE

04 Wednesday Mar 2015

Posted by Ed Mahoney in cyber war, Geek Horror, Politics

≈ 5 Comments

Tags

BYOD, compliance, email, hdr22@clintonemail.com, Hillary Clinton

email chainI’m not sure whether to file this one under Cyber War or Geek Horror.  The subject matter fits under Cyber War.  My goal with cyber war is to discuss topics of interest while sneaking in a bit of a computer security primer for friends and family.  But Hillary’s Bring Your Own Email to work story also smacks of tech gone horribly wrong.  And I don’t have enough stories in that genre.  I’ll classify this under both categories.

Hillary has yet to respond so it’s premature for me to comment, but this is a blog.  She might surprise us by stating other reasons once she does respond, but the general consensus at this point in time is that the Clintons are private people (no really, everyone is saying this on the air about the most public figures in America) and they have lessons learned from their share of lawsuits and subpoenas.  So I don’t question Hillary’s desire to set up an email server at home before beginning her tenure as Secretary of State to maintain a degree of privacy.  In fact, and I’m still struggling to digest this, it’s common practice for high-level politicos.  Apparently there’s a strong market for consultants to set up personal email servers for public figures.

I can even relate to Hillary, and so can you.  Does your employer support BYOD in the workplace?  You know, Bring Your Own Device to work?  Mine does.  If they didn’t, they would have to buy 450,000 $500 smart phones for us all.  Do the math on that.  This is a real trend.  You use your personal iPhone to access your company email.  You use your iPad to access company databases while sitting on your couch and also drafting your fantasy football team.  The tradeoff is that you install your company’s computing policy onto your phone.  That sets configuration specs such as the complexity of your password and how often you have to change it.  And we’re as okay with this as we are with granting Facebook complete copyright to our family photo library.

Do you think Hillary complied with State Department computing policies on her home email server?  The discussion to date is about her operating within the guidelines (at the time) of leveraging a personal email account for official business.  My point is there is so much more to comply with.  All of us working from home at the remote end of a VPN tunnel understand that we’re the weak link in the corporate security chain.  We have family members accessing our keyboard.  We allow guests on our wifi.  Shoot, I use my personal MacBook Pro as my primary work computer.  I also sacrifice half my CPU utilization to my company’s AV and computing policy auditing software.  Some people use their work computer to host their personal pictures, play their music, and send personal email.  I prefer to subject my personal MacBook Pro to crippling corporate security and compliance software in order to use a single device.  Before that, I used two devices.

No one is talking about this yet but my concern is that Hillary did none of this.  Maybe she ran AV software.  Well of course she did.  Computers don’t run for very long if you don’t.  Point is, how would we know?  How would the State Department I/T staff know?  And AV is just one small example.  There are many essential security practices that must be followed.  Once that home email server is compromised, it can then email malware to heads of state!  I’m trying to remain optimistic.  Maybe this server was supported by a special team of State Department I/T staff.  That’s not unusual at all for C-levels at large corporations.  But stories like this remind us not to be surprised when common sense is ignored by people who should know better.  Lost in this week’s news, General David Patraeus reached a plea agreement for sharing extremely confidential information with his biographer/lover.  Trust no one.

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Net Neutrality

26 Thursday Feb 2015

Posted by Ed Mahoney in Geek Horror

≈ Leave a comment

Tags

broadband, Cable, comcastfail, competition, FCC

fccThis isn’t complicated.  The broadband providers are lying.  They are spreading fear, uncertainty and doubt on innovation and privacy.  All lies.  I watched a clip of Mark Cuban recently warning against net neutrality that was so blatantly disingenuous it was comical.  He began by arguing for web traffic prioritization because the Internet won’t work otherwise.  “Bit are bits.”  He ended with a tangent into hacking.  He could not have tried harder to steer people from a real understanding of this topic.

First, cable companies are already regulated.  They were initially granted monopoly control over cable access to your home so their rates and service levels are regulated.  And because charging you $300 a month isn’t enough for them, they don’t want to be regulated over broadband too.  Broadband in this sense refers to your Internet access.  In their defense, their dilemma is that television is migrating to the Internet.  All content is moving to the Internet.  Bits are bits.  But they’re the geniuses who piled data on top of their regulated cable.  Right after they added voice.

My position is I pay for a specific data rate and I expect all content to be delivered at the full rate I’m subscribed to.  Likewise, content providers buy bandwidth from their provider.  Prioritization is a scheme to charge for bandwidth from content providers who are connected to another bandwidth provider’s network.  This is about double dipping.  It’s about greed.  I’m not a fan of regulation, but these guys are already regulated.  I expect the bandwidth I paid for.  In a few weeks, I’ll be switching providers, receiving 20 times my current 50 MB at half the price.  Start using my iCloud email now because I’ll be dropping my Comcast account soon.

Like this:

Like Loading...
← Older posts

Search this blog

Categories

Buy Full Spectrum Cyberwar at Amazon

Buy Cyber War I at Amazon

Buy on Amazon India for ₹99

Buy on Amazon U.K. for £2.27

English Edition on Amazon Germany

Buy on Amazon Brazil for R$11.29

Archives

Blog Stats

  • 134,402 hits

Girlfriend Cult

Recent Comments

georgeschools on Last Run of the Year
Anonymous on Last Run of the Year
asustainablesunrise on Christmas, for me…
asustainablesunrise on Craft Shopping for Christ…
georgeschools on Craft Shopping for Christ…

Recent Posts

  • A Runner’s Day January 7, 2023
  • Last Run of the Year December 31, 2022
  • Christmas, for me… December 26, 2022
  • Craft Shopping for Christmas December 10, 2022
  • A Slow, Late Fall Run November 25, 2022
  • November Runs November 20, 2022
  • Tech Debt November 19, 2022
  • The Runner’s Field of Battle November 13, 2022
  • Stealin’ from God October 24, 2022
  • A New Start October 23, 2022
  • Baby Margot Birthday October 9, 2022
  • The City of Flowers September 24, 2022
  • Dog Park by the Sea September 19, 2022
  • The Lane of Pain September 17, 2022
  • Run Rabbit Run August 28, 2022
  • Wild Horses August 21, 2022
  • The Day Running Died August 17, 2022
  • Boulder Marathon Training – Week One August 7, 2022
  • Mount Sanitas July 30, 2022
  • The Trail and Me July 23, 2022
  • Mount Zirkel Wilderness July 13, 2022
  • Full Team Hike July 4, 2022
  • Village to Village July 3, 2022
  • Beaver Creek July 2, 2022
  • Summer is Here June 12, 2022
  • Birthdays May 22, 2022
  • Fall River Road March 25, 2022
  • A Tale of Two Gerasimov’s March 11, 2022
  • The Hero February 26, 2022
  • Full Spectrum Cyberwar February 24, 2022
  • Run Nan, Run February 20, 2022
  • Running Sunrise to Sunset February 13, 2022
  • Cyberpunk Runner February 5, 2022
  • A Winter’s Run January 15, 2022
  • Turkmenistan January 2, 2022
  • Counting Families at Christmas December 26, 2021
  • Austin Boardwalk December 23, 2021
  • Like Christmas for the First Time December 19, 2021
  • Restoration November 27, 2021
  • India Kinks November 15, 2021
  • Run a Little, Write a Little November 6, 2021
  • Horizons October 30, 2021
  • The Vitality Kick and other Abnormal Obsessive Behaviors October 19, 2021
  • The Ten Week Plan October 11, 2021
  • Pearl Street Marathon October 10, 2021
  • Confidence Builder October 2, 2021
  • Margot Faye September 25, 2021
  • Due Day September 12, 2021
  • Beats per Minute September 6, 2021
  • Reality and Running September 5, 2021

Colorado=Security

Blogroll

  • Alohawk's Blog
  • Barbie's Blog
  • Boggy Creek Lumpster
  • George Schools Blog
  • I, Cringely
  • Prostate Chronicles
  • Shut Up + Run
  • Sustainable Sunrise
  • The Rogue Botanist

Web Sites

  • Amazon Author Page
  • Austin Marathon
  • Bolder Boulder
  • Brit's YouTube Songs
  • Colorado Marathon
  • Colorado Runner Magazine
  • Colorado Trail
  • Girlfriend Cult
  • Lobo Media Ltd
  • My YouTube Site
  • Race Pace Calculator
  • Shoes & Brews
  • Trail Runner Magazine
  • Zaremba Graphic & Web Solutions

Goodreads

Top Posts & Pages

  • Sucker Punch
  • Foot Fetish
  • 2011 Roadmap
  • Big Girl Pants
  • Wolf Mountain Trail

Top Clicks

  • edmahoney.files.wordpress…
  • edmahoney.files.wordpress…
  • runsignup.com/Race/UT/Kan…

RSS Feed

  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

  • Follow Following
    • A Runner's Story
    • Join 245 other followers
    • Already have a WordPress.com account? Log in now.
    • A Runner's Story
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

    %d bloggers like this: