About Scott C. Lemon

I'm a techno futurist, interested in all aspects of humanity, sociology, community, identity, and technology. While we are all approaching the Singularity, I'm just having fun effecting the outcomes of the future!

What is the true cost?

I am always a bit skeptical when I read articles like this.  Yes
… it’s all marketing speak.  How can anyone know until they
actually experience the migration/upgrade process?  I’m not being
“pro-Vista”, nor “anti-Linux” … I’m working to be
“pro-realistic”.  I believe that there are multiple points that
Jack is not addressing here.

First, I am curious about the “in-place” migration to Vista, vs. the
“in-place” migration to Linux?  Is there even an “in-place”
migration to Linux?  I have to admit that I have not looked into
this in detail, however I can almost promise you that we will see an
in-place migration tool, that will allow any user or company to migrate
to Vista with minimal (yes – minimal!) pain.  Will there be some
problems?  Of course.  But lets now compare that to a
migration to Linux from Windows.  Could I go to a Windows user,
and perform a clean “in-place” migration, and have them productive when
it completes?  I have my doubts here.

Second, I have to admit that hardware evolution is against Jack and
Novell.  As people upgrade hardware – which they will – they are
going to get that Windows Vista license, instead of the older Windows
XP license … and they will migrate.  And it will be almost
painless.  The cost of the “upgrade” of the OS will be hidden in
the cost of the new hardware.

To me, the mentality is still all wrong.  To continue to fight
against something only continues to strengthen it.  Even Novell
employees heard the old saying “embrace, extend, extinguish”. 
Its all about creating more powerful abstractions … there is much
more value in Mono, then Linux … IMHO.  There is much more value
in the applications then the OS.  There is even more value in the
services hosted in the Internet … enabling the use of the Internet Platform for business.

To fight these fights, and make these claims, is just old school
thinking and behavior.  Microsoft knows this, and the real Open
Source community knows this.

Novell: Vista will drive users to Linux. Jack Messman claims that the cost of moving to Windows Vista will prompt users to consider moving to desktop Linux. [CNET News.com]

Will it make a difference?

I missed this announcement, and although I applaud the efforts of
Honda, I really have to wonder if it will make much of a
difference? Airbags for motorcycles? The two points that
caught my attention is that it is intended from accidents up to 31 mph
… and that really is not too fast. Remember that if you are
hitting a moving object, and it is coming towards you, then you have to
add the two speeds of the
vehicles together. So in a head-on collision, if you are going 25
mph, then the other vehicle can not be going over 6 mph? And the
article also mention that this solution is intended for straight-angle
– or head-on – collisions. Again … I like the idea and applaud
the efforts … I’m just not sure that it will assist much in teh
majority of accidents. I know that the one person it saves will
make the whole thing worth it.

Honda debuts motorcycle airbag.
Blog: Honda Motor on Thursday took the wraps off its first airbag
designed to protect motorcyclists in the event of a crash. … [CNET News.com]

Mother, Father … and other mother?

So as the world evolves, so will the requirements for tracking identity
and digital identity. It’s no longer enough to have attributes
for “mother” and “father” … now we have to account for the
possibility of multiple parents! This article talks about some
research going on where an embryo will be created with genes from two
mothers. So a child born of this type of research will have to be
able to list their mother and father … and other mother. As we
continue to explore digital identity, I hope that people realize that
the old ways of thinking about identity are long gone.

This reminds be of some foresight used by the authors of HumanML
… the Human Markup Language. When I was reading through their
schema I was surprised to see that they have already accounted for the
possibility that someone has had a gender-change operation! They
already define the attributes for ‘gender’, along with ‘gender at
birth’! Yep … they might not be the same.

The ironic issue is that this might not be enough … what if they
change their gender numerous times? May we live in interesting
times. The world of identity is going to be rocked.

The cloned baby with two mothers. Daily Mail Sep 9 2005 8:10AM GMT [Moreover Technologies – moreover…]

Tagging in Radio Userland

This is my first post using my new tagging tool within the Radio Userland

blogging application, using Mozilla. It really has been quite an
adventure in learning Javascript at a much deeper level … for
me. Radio has a WYSIWYG editor within it’s web interface that can
be used for writing posts, and there are two flavors (of course):
one for IE and one for Mozilla.

What I wanted to do is add a new toolbar button in the WYSIWYG editor
to allow me to enter a list of comma-delimited words, and have those
words converted to the proper HTML for tags … like the tags at the
bottom of this post. What an adventure!

I was actually able to get the code written and working for IE first
… but not exactly what I wanted. I wanted to have the tags
‘inserted’ at the cursor position, but could only get ‘append’
working. So the tags would always end up at the end of the
post. I then worked on the Mozilla version of this, and got
everything working perfectly! There was already some sample code
on how to do an ‘insert’ in Mozilla. Well … if I could do it in
Mozilla, then I had to find how to get the same functionality in
IE. The problem is that the Mozilla code (of course) would not work
with IE. In the end, it was three simple lines of Javascript!

win = document.getElementById(“idEdit”);
var sel = win.document.selection.createRange();
sel.pasteHTML(insertNode);

First, get the iFrame object that the user is typing in, then get the
selection range, then simply paste the HTML/text into that
selection. Simple! In fact much easier than the Mozilla
code that I was looking at. Of course, finding those three lines
was a real pain … until I found this great article at WebReference.
WebReference has always been an incredible site for reading and
learning about HTML, CSS, and Javascript. They came though again
with this article which finally gave me the details to resolve this
issue. Now I’m on to adding toolbar buttons to ease the way that
I insert images into a post. We’ll see how quick that goes …

What hacks and trojans are really about

Few people seem to understand what all of these viruses and malware are really about.  Yes, there is a certain amount of spam that you get that is designed to then barrage you with pop-up ads … as though you would say “Wow, what a great ad!  I’m glad I get these pop-ups … I’ll have to go and spend money with these folks!

One of the real business models behind all of this – the real people doing business in this space – are the ones that use large numbers of compromised computers at business and homes to launch DDOS (Distributed Denial Of Service) Attacks.  These attacks are used for good ol’ conventional extortion.  It becomes a very simple case of “Pay me, or your Internet presence will be shut down!”  The person who controls the compromised machines can easily “task” them to attack various web sites, at various times, and for various amounts of time.  Reading this article, you can begin to get the idea that large scale “Internet vandelism” can quickly grow into a profitable – yet illegal – business.  I recently read another article where a California 20-year-old had over 400,000 machines under his control as a massively distributed “botnet” that he could divide up and control as a virtual military force.  Yes … 400,000 machines!

A while back I had one of my Linux boxes compromised through a hole in a Open Source PHP application.  The attackers were able to install and execute a small script that pulled down and ran a larger script.  That one actually attached to an IRC server and waited for additional commands.  I found that they then sent a command to download a DDOS script, and would then begin to run it from time to time attacking various sites.  I discovered this whole scenario when I noticed that my DSL line would get swamped from time to time and isolated the traffic to that Linux box.  I actually had some fun before cleaning everything up.  I did patch the hole, but I modified the DDOS script to simply log information about the command and the target, but not actually generate the traffic.  It was fun to review the log and see that my box was being controlled by a compromised machine in South America, and that I was being to used – at one point – to attack an on-line gambling site.

This got me thinking a lot about what we don’t know that we don’t know about the whole world of the Internet, spam, viruses, and malware.  In addition, it reinforces the levels of indirection that can easily be created to hide the identity of the controller.  But not forever!

Hackers Admit to Wave of Attacks. With their ringleader on the run, two cybervandals own up to using an army of compromised PCs to take down sites for commercial gain. By Kevin Poulsen. [Wired News]

[tags: ]

Outsourced Identity Theft

I know that this type of identity theft is why so many people are working on identity solutions.  I believe that these types of incidents are going to be on the raise for a while.  What is interesting to me is that I am not sure that this can prevented except through the use of harsh penalties.

What we have is a company who specializes in outsourcing various work, and number of companies who have entrusted their customers – and their identity data – to this outsourcing entity.  Within the outsourcing entity, there are employees – or this one employee – who saw the opportunity to compromise the system from the inside!

While I was working at Novell, we often saw the hacker/security breach reports that floated around, and in almost all of the cases that I could remember the biggest breaches were from the inside!  We can do everything that we want to protect the identities of others, however when we have someone within our company – within our community or context – that is committed to exploiting our identity for their own purposes, there is little we can do.  This becomes a fundamental breakdown within that community … and for significant violations in the past there were severe punishments.  This truly gets at the roots of the meaning of being fired!

Indian call center worker arrested. In a new case of alleged data theft, Indian police have arrested a call center employee in the outsourcing hub of Gurgaon. [CNET News.com]

[tags: ]

Next GoBinder Beta Build?

Today we are working hard to complete the next beta build of GoBinder 2006.  It’s taken a number of weeks to get it completed, however I think that it is well worth the wait.  The engineers have been doing a lot of work on performance, bug fixes, and a lot of enhancements.  Things are really getting a lot more solid.  If we get a good build today, then we go into code lock-down for a week or so to clean-up and fix any last major bugs before doing a public release.

We’ll also be releasing a new version of the GoBinder SDK which allows you to easily create new plug-ins for GoBinder, Backpack, or the new version of Plan Plus.  I’m working on several new sample plug-ins for doing peer-to-peer sharing, chat, and some RSS/Blogging tools.  I’ve got numerous other ideas … but can only do so much right now.

I’ll post later today, or Monday, when we will release the next beta on the Agilix Forums … it ought to be within the next week.

[tags: ]

How many dimensions?

I really like reading an article like this.  These researchers are pushing the limits of our thoughts, and introduce new ideas that cause our brains to go ‘huh’?  In looking to create new theories that would explain our observations of the universe, these researchers are positing that there could be numerous more dimensions that exist in the universe … and that they are too “small” for our senses to detect them!

I really like this type of thought because it challenges the traditional thinking that we have been trained to think.  It forces to re-evaluate the facts that we are very primitive biological sensory machines, and that in reality it takes very little to fool us.  Additionally, we fall into the traps of “conventional wisdom” which only limits what we believe is possible!  Why only three dimensions?  Why only six?

I believe that over the next decade we are going to begin to “see” that there is much more to the universe that we thought!

Dark matter highlights extra dimensions. University of Oxford scientists say extra spatial dimensions can be inferred from the perplexing behavior of dark matter, which behaves differently in small galaxies and large clusters of galaxies.

Three extra dimensions are altering the effects … [KurzweilAI.net Accelerating Intelligence News]

[tags: ]

Playing with Virtual Earth

I have to admit that I really like Google Maps.  It’s an impressive web application, and has completely altered how I use maps – and send map information – to friends, family, and coworkers.  It’s now so easy to quickly locate something on Google maps, get the link, and send it.

As of yesterday I started to experiment more with Microsoft’s Virtual Earth, and I now think that I found something I like even better than Google Maps!  I was listening to the Virtual Earth podcast from Where 2.0 and Stephen talked about the features that are there … many of which I hadn’t realized.

First, if you put in a query, it will display the results contained in the map you are viewing.  As you pan the map, the query results update.  You can use the compass for “game-panning” by clicking your mouse on the compass and holding the mouse button down.  You can also use the Tools->Scratchpad to drag and drop locations that you want to keep.  It’s then easy to e-mail these to a friend.

I’m going to continue to use both, and comment on which I like better.  I also am going to start to experiment with the developer APIs.  I have some ideas of some data that I want to place on a map.

[tags: ]