Wednesday, December 12, 2007

Open Source and Free Software

Neither the Open Source movement nor the Free Software movement are strong enough to topple the commercial software industry. The progress on software projects developed by the community can be slow at times, and it can be difficult to keep up with commercial products. The people who work on community software must have jobs to generate income since it is difficult to profit from community software, thus they can dedicate only a limited amount of time to developing community software. Granted, some companies have employees who spend their working days developing community software, but those companies must also pay attention to their profits to stay in business. Therefore, the work done on community software by such companies is limited. Due to these limitations, community software will not replace commercial software as long as we live in a capitalistic society. Someday, I hope we all can live in ideal society, but today is not that day.

Wednesday, December 5, 2007

Family Internet Safety

Some of the advice to parents to help them protect their children from the perils of the internet is wrong - like advice on filtering and supervision.

Filters can be more harmful than helpful. Sometimes filters go too far and block sites that contain extremely helpful information. Having objectionable sites blocked is beneficial, but smart browsing is more useful than filtering.

As for supervision, putting the family computer in a place that is clearly visible and frequently passed by is helpful in encouraging users to avoid objectionable material, but reviewing the browser's history and talking to the parents of friends about the methods they have implemented to keep their kids safe to make sure your kids are safe is too much. All you can do with the browser's history is realize your kids have visited sites, but it doesn't tell you their reaction to the sites. The kids might have closed the window immediately, or the kids might have lingered on the site for a while. As for talking to the parents of your children's friends, what will you do if they don't do much to keep your kids safe? Will you tell your kids they can't go over to the homes of their friends because the parents of their friends don't filter the internet, even though their friends browse smartly? The solutions presented by filtering and supervision are best solved by properly teaching your kids smart browsing. As your kids learn to browse smartly, they will be prepared to avoid evil as they use the internet at locations outside of your control - including the homes of friends and the public library.

Tuesday, November 20, 2007

iPhone Wars

The hackers have made more headway in the war against locked iPhones. Now iPhone users can unlock their iPhones without rendering the phones unusable.

Apparently, the hackers have pledged to modify every new update Apple publishes so that the unlocked phones are never rendered useless again. But a security issue arises: how does one know the hackers aren't adding anything malicious to the updates? They could modify the updates to grant them access to the phones. How would one know? Anything that can affect your computer can affect your iPhone, like viruses and spyware. Is slightly better customer service worth the risk of an insecure phone?

In other news, the iPhone will be released in China at some point in the future. It makes me happy to know that people around the world are benefiting from the improvements of technology. On the other hand, many people in the world are unable to enjoy life as they go without adequate food and shelter.

More news on the iPhone:
http://www.wired.com/gadgets/miscellaneous/news/2007/11/iphone_china
http://www.itwire.com/content/view/15433/1103/1/0/

Monday, November 12, 2007

Global Competition

Global Competition

The world is flatter. This is good because those of us in the United States seem to be falling asleep. We aren't as competitive as we used to be. Many expect that they will be guaranteed a well paying job, but that isn't true - it never has been true. More so now than ever, we are involved in a global competition for jobs. We all must strive to perform better than each other if we want to be paid well. This will drive progress.

In an ideal world, we wouldn't compete with each other. Everyone would have a job they enjoy and that they can excel at without competing with others for it. But we don't live in an ideal world. We live in a world with naturally lazy people that try to satisfy their desires with the least amount of effort. If all those who choose to be lazy are allowed to do so, society would be severely hindered in its progress. Would the hunters and gathers have become anything more if they had succumbed to laziness? With the incentive of financial power, many are enticed to compete so they can fuel their natural desire for power. Progress is a natural side-effect of competition that benefits many. Compare our life today with life of hunters and gatherers: we can communicate with people all over the world; we live in comfortable buildings; we take food for granted; and we understand more about the world around us.

Everyone will have a job. The number of jobs that can be filled is infinite. When jobs are replaced by technology or outsourcing, more jobs are created. The computer replaced many jobs, but many jobs have been created by the computer: computer scientists, information technology departments, computer factories, and many more. Outsourcing will have the same effect. As jobs are shipped overseas, more jobs will be created at home. The limiting factors are entrepreneurship and education. Those who lag behind the changing environment risk difficulty in finding a job, but not all jobs can be outsourced: on-site construction, counseling, management, and many more. As Thomas Friedman pointed out, those with higher education move up in their jobs to care for the more difficult parts of the job as the menial parts of the job are sent to those who can accomplish them. For example, he pointed out an artist that concentrated on sketches as artists in India filled in the colors and shading. The artist concentrates on the creativity, and artists in India concentrate on completing the picture. The ideas will start at home, and their development will occur abroad. Much knowledge remains to be discovered; therefore, the levels that can be achieved are limitless.

In the end, the flattening of the world is beneficial for all. Those abroad now have higher paying jobs, and those with more education can concentrate their efforts on increasing knowledge and wisdom.

Persistence of Hierarchal Organization

The Library of Congress contained about 20.5 million books at the end of the year 2006 (http://www.loc.gov/about/reports/). If one person read one book per day, that person would finish reading every book in the Library of Congress about 56,126 years after beginning. It is impossible for one person to know everything in this life. Because one person will not know everything, groups of "followers" develop around the respective experts of various fields. If someone wants advice about something, he will seek out someone he knows that he considers the most knowledgeable about the subject.

Instead of replacing hierarchies, the flattening of the world will improve them as current experts are replaced with better experts. People don't have time to read hundreds of blogs to find answers. They prefer to read one blog that is correct and complete than dozens of blogs that contain only part of the information being sought, or that are inaccurate.

Tuesday, November 6, 2007

Software Patents

Lets say you alone develop and sell software that becomes wildly popular. As you dream of the things you will buy with your coming fortune, a software company develops software that does the same things your software does, except the company sells its software for less and does a better job marketing and maintaining the software. As your dreams of luxury begin to fade with the realization that the software company will inherit your coming fortune, you wish that you could stop the company from stealing your idea. Something exists to prevent others from stealing your idea, and it has been around for many years: patents.

I'm for software patents. If people cannot patent their software ideas, they will be less likely to research better methods without the ability to make money from their improvements.

Software patents not only help large companies, they also help small companies and individuals. If a small company develops a unique software program and patents it, they can profit from it while the larger companies must either pay royalties or find a better way to do the same thing - thus driving progress.

Software patents don't hurt those who don't patent their ideas. If someone can prove the idea existed before a big company came up with the idea, the big company will be unable to patent the idea.

In an ideal world, better algorithms will be shared without charging money, but we live in an imperfect world. We live in a capitalistic society, and we must follow the rules of that society if we are going to progress together. Too many people would take advantage of the system if everything was free, and society would not progress if everyone was a thief.

Saturday, October 27, 2007

Only Two iPhones Per Person

iPhone news: http://www.informationweek.com/blog/main/archives/2007/10/want_to_pay_cas.html

Apple has taken another step in combating the hackers. Now Apple sells only two iPhones to each person. Apple can restrict the distribution of its cell phones any way it wants as long as it follows the law.

Many people complain that Apple's actions are unfair. What is fair? Do people think fair means getting what they want? If a person doesn't like Apple's new policy, they should stop buying Apple's products: money speaks louder than words. But iPhone sales are doing well. The people have spoken: they like the iPhone more than they hate Apple's policies and methods of distribution.

Monday, October 22, 2007

Women in Computer Science

Women should be treated equally in the field of computer science, they should be encouraged to be mothers, and they should be encouraged to pursue a career in computer science if they so desire.

As long as women have the same opportunity as men to enter the field and be successful, nothing more should be done. Discrimination against women solely based on their gender is not just. But one must be careful in completely eliminating gender-based discrimination without careful consideration. Forcing equality between men and women can lead to problems worse than unjust discrimination. During the time the Equal Rights Amendment was publicly debated, good reasons were given against passing the Amendment. Although most of the reasons are unrelated to equality in the field of computer science, they hint that some undiscovered reasons may exist that we are unaware of.

Wednesday, October 17, 2007

Third-Party iPhone Application Development

Apple chose wisely to allow others to develop software for the iPhone. Not only can others profit from the popularity of the iPhone, fewer people will try to hack the iPhone to develop on it, thus making it more secure as the malicious hackers can no longer rely on the efforts of others to hack into the phone. But this decision will not make the iPhone completely secure: there will always be ways to break into it. Information on any electronic device will be completely secure only when the device is melted into an unusable mass.

Article on iPhone Development: http://www.informationweek.com/hardware/showArticle.jhtml?articleID=202403919&subSection=Macintosh+Platform

Monday, October 15, 2007

Computer Security

Hackers vs. IT Security

A strange war rages between information technology security guards and hackers. IT security guards do everything to keep hackers out, but hackers continue finding ways to cause damage. The war is like a sword fight with one guy spending the fight dodging the other guy's sword without using his own sword to strike back and stop his opponent. This epitome of a defensive strategy fails to stop the attack. There are some IT security guards in the world that pursue the hackers, but the chase can waste money. The guards could spend an incredible amount of time and money chasing the hackers, or they could spend less money on improving systems to keep hackers out.

For the number of hackers to be reduced, they must be pursued. The security guards should implement systems that can identify the hackers enough to prosecute them. The automation of the task will reduce the cost of the pursuit. The FBI should implement a nationwide monitoring system with the ability to trace a hacker the instant the FBI is notified of an attack. As soon as the hacker is traced, the FBI should find the hacker's home address, find out who in the home is the attacker, and arrest the culprit. To increase the effectiveness of prosecuting hackers, more states have more laws against hacking. The number of hackers will diminish as the threat of getting caught increases. Hackers would think twice before trying to get into a system without authorization if they believe they might be caught.


One of the difficulties of catching hackers is realizing they are attacking. They continue to find ways to circumvent the systems put in place to identify attacks. If a hacker is just stealing information, he can easily seem like a normal person. A hacker could break into someone's account and view all the files that person has access to. More security measures should be implemented to recognize such attacks.


Responsibility

Measures must be taken to save money, and preserve privacy and reputations by preventing hackers from penetrating computers. In IT security, the responsibility to secure systems lies with many people: the users, the programmers, the hardware designers, management, and the system administrators.

Users have a responsibility to secure their accounts. The impenetrable walls of a castle are useless if the gate is left open to invaders. They must not share their passwords with anyone, nor should they store them anywhere. Potential hackers are not limited to external people. Someone in the organization could also be a hacker. Internal hackers could easily search through unsecured documents for passwords. External hackers that penetrate the system could find passwords stored on computers and use them to avoid detection. Users must also choose passwords that are difficult to guess, excluding birthdays and names of relatives and pets.


Programmers have a responsibility to do their best to make the software they build secure. Programmers should do their best to secure the systems and programs they build. If a programmer carelessly develops software that can be penetrated, and his carelessness causes security problems for the system the software runs on, the programmer should be held responsible for his negligence.


Hardware designers have the same responsibility as programmers. They contribute to the construction of the impenetrable wall.


Management has the responsibility of assuring that clear security policies are developed and followed. Managers need to make sure that the wall is impenetrable and the gate is closed and locked.


System administrators have the responsibility of aiding management by verifying that the security policies are followed by all. They are also responsible for detecting intruders and updating software and hardware as information about security problems arise.


The responsibility for securing a computer system does not lie with one person alone: it lies with all those who use or manage the system. Everyone must do their best to keep the system secure.

Monday, October 8, 2007

Technology and Family History

Technology has had a very strong impact on family history. It has made family history easier and more efficient. The strongest asset technology has brought to family history is the ability to instantly communicate with people from all over the world and share information. The next strongest asset technology has brought is the ability to store vast amounts of information efficiently, and the ability to efficiently retrieve and search that data.

The utilization of technology can be improved. Deciphering the handwriting of other people can be difficult at times, not to mention tedious. Improvements in character recognition software can eliminate the difficulty and tedium. Users of PAF are encouraged to use multiple files to store their ancestral information, which requires switching between files and splitting files makes it difficult to link information between the files. It would be much more convenient to store all the data in one file. It can also be tedious to search through all the different databases and gather all the information on one's ancestors. In some databases, such work is inevitable. In other databases, the data is already organized into pedigrees. Increased convenience can be achieved if all the ancestors of a particular person can be downloaded into PAF with the click of a button.

Wednesday, October 3, 2007

Unlocked iPhones: Round 2

Find updated information about unlocked iPhones at InfoWorld: http://www.infoworld.com/article/07/09/27/New-update-breaks-hacked-iPhones_1.html

Apple is not guilty of any wrong-doing. Apple can do as it pleases if it doesn't violate its part of the service agreement. If you maintain the functionality of your iPhone by disabling automatic updates, you won't get the security fixes and your iPhone will be vulnerable to attack. Unlocked iPhones are ineligible for repair or replacement under warranty because the phone was modified to alter functionality.

It's worthless to unlock an iPhone. Unlocked iPhone owners can expect a long period of conflict with service outages as Apple and the hackers continue to battle with each other. It's worthless to suffer through the outages for slightly better customer service and a phone with a nifty interface.

In other news, LG has released a phone with a large touchscreen that works exclusively with Verizon. I would buy LG's phone, but I'm happy paying less than twenty dollars a month for a reliable pager.

News on LG's phone: http://www.infosyncworld.com/news/n/8405.html
Hackers fight back: http://www.theregister.co.uk/2007/10/03/iphone_update_response/

Wednesday, September 26, 2007

Deadly Defects

Engineers should make sure that everything they design and build does not have deadly defects. For example, a fuel system control processor with a deadly defect was on Flight 143 in 1983. The plane ran out of fuel before reaching its destination. Thankfully, the plane landed without killing anyone. Humans need help to accurately measure how much fuel is in the tanks, and that help must be trusted to give an accurate measurement so enough fuel is in the tanks for the plane to reach its destination. There are stories of a deadly defect in dialysis machines. Instead of moving the blood of the user through the machine and cleaning it, the machine would start cleaning itself and kill the user as it pumps solvent through the user's body. It is imperative that engineers eliminate deadly defects.

Friday, September 21, 2007

Technology and the Church

Technology has been a great help to the Church of Jesus Christ of Latter-day Saints, and it will continue to be a great help to the Church. Many people misunderstand and are frustrated with the speed that the Church is moving at in utilizing technology. But the cautious rate of change is wise to make sure everything is in order because moving too quickly could cause more problems than would be solved. There are problems with the software that the Church produces, but these problems are gradually being solved. It isn't unusual for software to have bugs. Perfectly bug-free software is nearly impossible to come by. Maybe there are more bugs in the Church's software than other programs, but would it be wise to spend the money to hire the quantity and quality of developers that it would take to improve the software? I don't think so. Software is a nice tool that can greatly help, but it would be unwise to invest money into something that merely supplements the mission of the Church as if it were critical to the Church's mission. The Gospel can be spread without technology. Temple work could be done without technology if needs be, and perfecting the Saints doesn't require technology either. But these missions can be aided by technology. It makes sense to me that the money should be focused more on the critical aspects of the Church's mission than the supplements that aid the accomplishment of the critical aspects.

Wednesday, September 19, 2007

Unlocked iPhones

Recently, an article was published on Wired about unlocked iPhones. You can read it here: http://www.wired.com/gadgets/mods/news/2007/09/unlocked_iphones

In the service agreement to buy an iPhone, there doesn't seem to be anything against reverse-engineering the phone, using the phone with other networks, or reselling the phone to other people. The hackers don't seem to be doing anything wrong (although I wouldn't consider my observations as authoritative: I have misinterpreted legal documents before). If the hackers cancel service between fourteen and thirty days after getting it, they do not have to pay the early termination fee and they have to keep the phone. Only the initial cost is more for an unlocked iPhone. The hackers will charge enough to recover the costs of the activation fees for AT&T and the cost of buying the phone plus any additional profit they make in auctioning the unlocked iPhone on eBay. If you want an unlocked iPhone, not only do you have to buy an unlocked phone (if you are unwilling to unlock it yourself), you have to pay the activation fees along with any other fees associated with connecting to a different network with an existing phone. Is the cost difference between a normal iPhone and an unlocked iPhone worth the marginal benefit of a "better" phone company?

Wednesday, September 12, 2007

The Effects of Technology on Society

I don't think technology has made people worse or better. I think technology helps expose the true character of all individuals. It has given a chance for those who would have remained in poverty to realize what they can become and become it. It shows the true character of individuals as information flows around the world about what people do with their time and about what decisions they make. Those who rise to the occasion rise, and those who don't rise to the occasion don't fail because they don't realize there is an occasion (as is the case in many instances without technology) but because they they don't want rise to it.

I'm not saying people cannot change, I'm saying that technology doesn't change people. Only one can change one's self.