What is it with summer time food ..

.. that you must wear to truly enjoy? I’m thinking:

  • Ribs
  • Corn on the Cob
  • S’Mores

.. what are you wearing for dinner tonight? 😛

Original Post: August 11, 2008

The Newspaper is Dead

Long live the newspaper!

Nope .. not like me at all. This is me:

  • While I appreciate the USA Today that finds its way to my hotel room door, I usually pass it by.
  • There are times at the gym that my Zune battery is dying or in the waiting room and my mail is caught up.
  • Those pretty pictures sometimes catch my eye and I skim through the articles.

The bulk of the time (even by an overly-optimistic 80/20 rule), the newspaper is irrelevant to me.

So, where is the value of the daily rag? Is it:

  • with older-than-50-somethings (for the record, I’m 50) as their primary source of news?
  • with folks who simply refuse to “connect”?
  • with folks who just like to get their hands dirty?

Besides hotels, who is buying enough newspapers to keep the industry alive?

In short, no one. Like all businesses facing the power of the Web, newspapers have to adapt, or become extinct.

One way to keep a profitable bottom line is to reduce staff .. but you need to reduce the right staff. With automation, you probably don’t need as many printers, but you need enough folks to run the machinery. This leaves assistants, sales people, managers, editorial staff and reporters .. the latter two being the most critical to maintain content quality.

I’m afraid to ask which groups the newspapers have cut .. there is a site called Newspaper Death Watch with all the latest stats (update to the 2008 version of this post).

As to evolution, the blogosphere is full of “me too” types. Now, I raise my hand: guilty as charged for a 1/3 of my content. Many bloggers just read news and other blogs and then post their opinions about them. In my defense, I post the link either as a supporting story, or I’ll make a glib comment and expect the reader to make the connections that are relevant to them.

However, the “me too” folks need something with which to start, and that something is a news story, captured by a reporter, edited by an editor and published in one form or another. Our news consumption would suffer greatly if we cannot retain / replace the news generated by the newspaper industry.

So .. the problem is not editorial or in content generation, it appears to be in deployment. Can the newspapers afford to race to an all-online model before they run out of dough?

SearchEngineLand posts a detailed commentary of the newspapers’ plight in “Can Newspapers Be Saved?” (2008 reference).

What do you think?

Original Post: August 18, 2008

Free Wi-Fi: Safety and Security be Darned!

You probably already know that Starbucks offers Wi-Fi free of charge at their locations. Some exceptions include ‘franchise’ stores like those at airports (which are typically belong to the food service provider that owns the relationship with the port).

There is a ton of free Wi-Fi out there; intentionally, or not. Access is available legitimately, or by “Wi-Fi Roguing” (stealing wireless Internet from unprotected networks) to private networks.

When looking (in advance, of course) use your search of choice; start with “WiFi zip code” in a search box; both Bing and Google will provide you a list.

So now you’ve found some Wi-Fi .. but you should be concerned that non-commercial / non-sponsored Wi-Fi may not be secure.

Free Wi-Fi at Starbucks, Panera Bread or some other gathering place, falls into the ‘sponsored’ category, as does your local coffee shop, community center, etc. I would expect sponsored Wi-Fi to be legitimate; safe from folks who might collect credentials. Since you really don’t know the operator, this is a risk, and your corporate IT may suggest / insist on the use of a Smart Card or secure proxy.

When roguing, you’re totally at risk when you connect to an unknown network; whether owned by random private individual whose condo is in range, or some punk with a laptop putting up a familiar (think: ‘linksys’, ‘netgear’ or “Free Public Wi-Fi”) SSID.

Hell, even commercial SSIDs run the risk of being spoofed. See “Wi-Fi Access Point or Account Credential Honeypot?” for a detailed walk-through of my observations in range of a (most likely legitimate) AT&T public Wi-Fi hotspot.

If in doubt, don’t connect.

Original Post: October 15, 2007

Wi-Fi Access Point or Account Credential Honeypot?

I shouldn’t have to say this as we all know better, but here it is: We need to exercise caution when connecting to ‘foreign’ Wi-Fi signals.

I’m no stranger to ‘roguing’, but I’ve recently become aware of significant security risks associated with connecting to unknown networks. Here is some food for thought:

WAPHoneyFreePublic20060818You’ve seen this image before, I’m sure. It’s a peer-to-peer (computer-to-computer, versus access point-to-computer) networking icon. You should NEVER (except under the circumstances when a known and trusted user is sharing their connection with you), connect to a wireless signal that has the peer-to-peer icon.

You may see these icons when looking for Wi-Fi signals in busy public places. They are broadcast because of an unusual feature of older Windows versions wireless network stack that causes a computer to broadcast the last-connected SSID when not connected to a wireless network.

I STRONGLY suggest you edit the advanced properties of your wireless network card to connect ‘to ‘Access point (infrastructure) networks only to filter them out.

WAPHoneyWiFiList20060818My flight was delayed at SeaTac the other day, so I did my usual “is there a wireless network in the building in the building that I trust" search. I have a T-Mobile account, and sometimes I get lucky. In this case, there wasn’t.

However, there was a seemingly-helpful AT&T access point in the building. Nothing against AT&T, it’s probably a legitimate hotspot. But their login page was interesting, offering a list of ‘other providers’ (presuming a reciprocal relationship with AT&T), on the left.

It’s a healthy list, but none of which I have an account. Ah, being helpful, there’s an ‘Other Provider’ link at the very bottom.

Once you find an Access Point, you should NEVER connect to a wireless network using your credentials from another wireless network (i.e., T-Mobile via xyzzy Wireless) unless you enter your credentials into your native wireless account logon page (I have seen services that do this, redirecting to a T-Mobile login page that ‘advises’ the local wireless the account credentials are valid).

You have no idea how your credentials are being used. If you post your credentials to a foreign wireless site, you have just given your login and provider information to an unknown party who might use it for illegitimate or illegal purposes, leaving you to hold the bag or pay the bills.

To finish this story, I filled out the login page like this (I didn’t log in, of course):


Let me point out that it would take a mediocre hacker about ten minutes to set up a page and host it on a laptop with a web server in an airport. In a busy public area, I’m confident a hacker could collect a pile of logins in just a few hours. Make the login experience compelling enough, including enough providers and data-hungry travelers will happily post their credentials rushing between planes. A polite "we cannot confirm your credentials at this time" message, and the traveler is none the wiser.

Be wireless-safe, people.

Original Post: August 18, 2006

The ULTIMATE Fashion Statement while Wi-Fi Roguing

Or, at the least, the apparel to demonstrate you’re able to connect.

wifi_shirt_anim20071009You remember wi-fi ‘roguging’?

It’s the fine art of connecting to wi-fi networks that aren’t yours.

Granted, not all connections to wireless networks are, shall we say, inappropriate, but here’s a cool way to detect a network without whipping out your laptop.

This shirt lights up when you’re within wi-fi range.

It doesn’t discern between secured and open networks .. you’ll have to sort that on your own.

ThinkGeek gives us the “WI-FI Detector Shirt

Original Post: October 9, 2007

Forbidden Lego Projects

Some look downright dangerous, actually. This is a video of a brick shooting gun on YouTube:

I’m hiding this post from Hunter, though: his last Lego project was an airplane that never quite got off the ground.

But .. what if it had fuel? 😉

Forbidden projects are said to be those projects the master builders work on ‘in the back room’.

Unlike the safe-and-sound master builder projects (did you see the cool Harry Potter model a few years ago?), these can run in the realm of, well, dangerous.

The MBs combine bricks, modified building techniques and in a pinch, household materials.

Previous projects include a catapult, ping-pong ball launcher and gun.

Don’t try this at home, folks. Well, unless you buy the book, of course.

Original Post: August 28, 2007

Integration Architecture and the Baggage (mis-) Handlers

This is a bit of a stream of consciousness post. No agenda; it’s just something I observed and extrapolated into (near-) relevancy.

There’s the plane.

Then, there’s the conveyor belt with a guy at each end; one who loads the incoming bags on the belt, and the other who grabs them from the belt and swings them onto the waiting trailer.

When the trailer fills (or the plane empties), the truck comes over and hauls it off to Baggage Claim.

It’s a dance. Can be amusing to watch, though. Beneath the grins, it’s a system rife with opportunity for error. Consider:

  • There’s only one door, so the physical world requires the guy on the plane to move further away from the door to fetch more bags.
  • If the belt gets ahead of the guy on the ground, the bags get to the ground, too. Sure, he can stop the belt, but if he does, the guy in the plane gets held up.
  • If the trailer is full, the belt must stop.
  • If the truck is busy, the trailer sits.

Once unloaded, it all happens in reverse.

The airline needs to turn (unload, reload and go) a plane quickly. You may assume outgoing bags are loaded onto a trailer at the terminal and delivered to the plane, even while incoming bags are still being handled. Consider:

  • What if you’re short handlers? Bags don’t move on / off planes, onto belts or into / out of trailers.
  • What if you’re short belts, or a belt is out of service? Bags don’t move on / off planes or in / out of trailers.
  • What if you’re short trailers? Bags get handled twice, and are left on the ground, either coming or going.
  • What if you’re short trucks? Bags sit on loaded trailers. Empty trailers sit where they don’t need to be.

Then, there’s the endpoints:

  • The plane is early: resources (handlers, trailers and trucks) are redirected, putting other arrivals / departures at risk.
  • The plane is late: resources (handlers, trailers and trucks) wait, or are redirected. Outgoing bags wait somewhere, along with the handlers, trailers and trucks.
  • The guys in Baggage Claim are behind; the loaded trailer sits, which holds up loading bags that need to be on an outgoing flight.

Each connection represents a potential choke point: a place where the process runs the risk of coming to a halt. Failure at any point will impact other parts of the system, causing delays.

I’m just so glad I pack light enough to carry on.

I didn’t write this to complain about baggage handlers. Rather, how about we imagine modeling this a data workflow? What would you do to protect against delays in the system?

Note there are components in place in this system to mitigate some of the risks of delaying the process:

  • Belts reduce the distance a handler must travel, increasing capacity and saving time. Time = money.
  • Using trailers rather than trucks (trailers can be left at endpoints) creates a buffer in which bags can be stored, for short term intervals.
  • Using trailers also reduces the number of trucks and drivers while increasing truck utilization. The accountants will enjoy maximum utilization of a capital expense.
  • Proper staffing of handlers at both the ends of belts and in Baggage Claim keeps things moving.

Some rough equivalents for a workflow architecture:

  • Bags: data, packaged in a mostly standardized form (the real world just sucks sometimes).
  • The plane baggage compartment: data / application silo in which users can create, manipulate and store data. The plane baggage compartment has a finite capacity.
  • Belts: FIFO queue (first-in-first-out queue) with finite capacity and known duration to offload data packets from the data / application silo.
  • Trailers: LIFO stack with finite capacity. A stack is essentially a LIFO queue, accepting data packets from the belt queue, but rather inefficiently: the last bag in is the first bag out by default. However, there can be exceptions: see Handlers, next.
  • Handlers: processes with finite capacity and the power to evaluate data packages (i.e., reading certain baggage tags for expedited handling). Premium tags are placed in a place in the trailer so they can be retrieved first by the handlers in Baggage Claim, rather than the standard LIFO treatment.
  • Baggage Claim: data / application silo that serves processed data back to users (or to other systems).

Use of components like queues and stacks can enable your workflow architecture to scale to Internet capacity. You should establish service-level agreements (SLAs) at each touchpoint to ensure you’re sending / receiving data in an acceptable timeframe and in the proper formats.

In past lives, I worked extensively as an Integration Architect. This was in the days before Windows Workflow Foundation and BizTalk. BizTalk 2004 was a godsend: in fact, I still have a current BizTalk 2006 implementation on a VPC with which I tinker when I feel the need to code. It’s not as sexy as a hot web application built in Silverlight or WPF, but it keeps me thinking of ways to add business value by integrating data trapped within cranky silos with other applications and end users.

A data model, application architecture or process workflow works the best when it’s modeled as close to the real-life process it represents. Once modeled, you can look closely at ways to improve it in an iterative fashion.

Original Post: October 2007

Live Rube Goldberg Machines

My Hunter is keen on all things Rube Goldberg.

These two involve:

  • A slinky
  • An umbrella
  • A vibrating cell phone
  • A chessboard
  • A dart board
  • A few bottles of wine

For what more could you ask?

Bayham & Tyers (a now-defunct company, but a still-living partnership) gives us two videos: “The Contraption” and "The Contraption II".

Now, at a far-higher production cost (I’m guessing) OK GO released a YouTube video of “This too shall pass”, another live-action Rube Golderg Machine.

Original Post: June 28, 2007; updated June 6, 2011

Do you fear change?

I think we all do.

Change for the better, change for the worse.

Change is change. You are the one who makes your change a failure or a success.

How do I deal with change? Well, being a pragmatist, I:

  • am a rabid fan (and defender) of the truth: categorizing and assessing feelings and facts
  • talk about it (my uplines might say: a lot)
  • document (like a fiend) and present compelling arguments

Am I confronted with change? Why, yes; yes I am. How am I going to deal with it? Well:

  • I will state the truth
  • I will email (I’m not in the office all that much these daze)
  • I have documented and the presentations are ready.

Is my impending change good or bad? Well, it ‘is’. I’ll work with the hand I am dealt (note: pragmatism) and survive.

So, how do you deal with change?

Original Post: March 16, 2007

Language is a lousy way to express emotion

I’m serious. Language is a lousy way to express emotion.

So much of expressing emotion is nuance: the tilt of the head (or raising an eyebrow, if you’re that fancy), a knowing glance, a comfortable silence.

We are, in many cases forced to express emotion verbally; using clumsy language, consisting of words.

It’s insane of us humans to think that we can express such deep feelings in such a crude way. I am starting to think of it as trying to hone crystal with river rock.

Granted, we are not all similarly afflicted: poets have managed to instill emotion using only words. That said, do you think there are a number of first-draft poets out there? Of course, poets draw on the collective consciousness and baseline knowledge of how people feel when describing a situation.

Musicians? Maybe.

Screenwriters? Not applicable. They have images and music and story-leading-up-to-the-moment.

Playwrights? See ‘screenwriters’, above, sans the music.

You get my drift. Disagree, if you must: I’m feeling frisky lately (it’s Spring!) and I’m ready for a debate.

Original Post: September 28, 2006

%d bloggers like this: