The Identity of Mr. Mouse

In most of the conversations about “digital identity” we want to stick
to us humans.  How we make our lives better, easier, more secure,
more private.  There are a couple of flaws that I continue to see
in the process and thinking that, IMHO, are only going to grow and
continue to impart new pressures on our thoughts.

  • Most of the planning is being done by “old people” who have a lot invested in legacy “identity” systems.

As  part of the more “mature” component of the computer industry,
I can say that the conversations that I hear about identity are often
oriented towards solutions for people who have not had their identity
gathered and managed for them from birth.  As I wrote in my
earlier post about Tracking Identity … Cradle to Grave,
there is a whole new generation of children on this planet who will
have their identity accumulated – and available – in whole new
ways.  I believe that the digital identity management solutions
ought to consider a focus on younger generations, rather that how to
deal with legacy Internet 1.0 humans.

My analogy in this is thinking about digital music collections. 
For many people my age or older, the thought of digitizing their music
collection is a monumental task … having to find ways to encode audio
for record albums!  But for the average teen today, there is no
problem … all of their music is already digital as MP3s, or maybe
they have some CDs … which are easily ripped.  With the next
generation of humans, few will know anything but digital music, aquired
via the Internet.

If we focus all of our time looking for ways to solve the “legacy
human” problems, I’m not sure that we’ll do justice for the 2.0 and 3.0
humans coming after us.

So what is the other issue?

  • We keep thinking about humans like us … not the humans, or non-humans, of the future.

I read this article this morning on CNN:  Mice grow human cells after injections
… wow, very cool.  More work that is leading to the potential of
some very interesting life forms.  And this is only the
beginning.  Yes, I fully understand that these experiments are not
creating human-like entities today.  But this is only today. 
Where are we going to be in 10 years?

For those of you who have not read Accelerando I would suggest that
you do.  Much of the content of this book is one possible
extrapolation forward of the current day research that we are
doing.  There is already a considerable amount of thought around mind uploading, and even the personal identity of uploads
I started to really think about the issues of “identity of uploads”,
and even “rights of uploads” … since these are going to be the issues
facing our society in the coming years.  (What is considered the ‘murder’ of an upload?)  It’s not about if … but when.

In the CNN article about the mice, they claim that 0.1 percent of the
brain is based on human cells.  When this number increases, what
will emerge?  If not in mice (since the brain cavity might not be
able to contain enough cumulative neurons to cause emergent behaviors)
then in what strange hybrid entity might we see human-like behaviors
emerge?  When they do, will we be able to integrate these new
entities into society?  If not in physical meat-space, but in the
Internet, new forms of consious life emerge … will the various
digital identity systems being designed today take into account how to
verify their identity, and track their attributes?  Are we even thinking about these coming events?

I have another post that I want to write eventually … about the fact
that “Uploads don’t have fingerprints” … not in the same sense as we
do!

Microsoft Research and Mesh Networking

I have been following the work that Microsoft is doing in their Windows Peer To Peer Networking
This is actually some very impressive technology that allows for a
distributed set of users to create peer-to-peer groups for exchanging
data and information.  I’m working on some applications (actually
plug-ins for GoBinder) that are going to exploit this
technology.  Microsoft has put together a Peer To Peer SDK allowing you to perform name-to-IP name resolution (PNRP
– a serverless DNS technology), along with graphing and grouping APIs
for the transfer of data between the peers.  It’s all very
impressive stuff … and is in all Windows XP SP2 machines … and will
be in all Vista machines.  The bottom line … this is going to
drastically alter how ad-hoc groups of users on Windows machines will
be able to locate each other, communicate, and collaborate.

Today, I found yet another amazing technology out of Microsoft Research
For years I have been tracking the “wireless mesh networking”
space.  This is where each node in a wireless network is a
repeater/relay for any other node that is within range.  With true
mesh technologies I can communicate with other users, even if they are
beyond the reach of my wireless signal, if there are one or more nodes
between us that are part of the “mesh” network.  Mesh networks are
the next big thing … even the cellular carriers are talking about
adding emergency mesh capabilities into cell phones.

What I found today is that Microsoft Research
has code available today that will allow you to experiment with some
pretty advanced mesh networking using your Windows XP machine! 
The Microsoft Research Networking Research Group has released their Mesh Networking software, and even an Mesh Networking Academic Resource Toolkit
I’ve started to go through the documentation, and so far this is a very
impressive solution.  They have embraced and extended some of the
standards that are currently being developed:

We implement ad-hoc routing and link quality measurement in a module that we
call the Mesh Connectivity Layer (MCL). Architecturally, MCL is a loadable
Microsoft Windows driver. It implements a virtual network adapter, so that to
the rest of the system the ad-hoc network appears as an additional (virtual)
network link. MCL routes using a modified version of DSR (an IETF protocol) that
we call Link Quality Source Routing (LQSR). We have modified DSR extensively to
improve its behavior, most significantly to support link quality metrics.

The MCL driver implements an interposition layer between layer 2 (the link
layer) and layer 3 (the network layer). To higher layer software, MCL appears to
be just another Ethernet link, albeit a virtual link. To lower layer software,
MCL appears to be just another protocol running over the physical link.

I am really impressed to see this work this far along.  I have
been waiting for years to see mesh networking hit the masses … and
this is now getting close.  I’m now going to upgrade some of my
wearable computers to Windows XP just to experiment with this!

How portable are these lie detectors?

When I read something like this, I start to wonder just how portable a system like this can be made?

Brain imaging ready to detect terrorists, say neuroscientists.
Brain-imaging techniques that reveal when a person is lying are now
reliable enough to identify criminals, with 99% accuracy, claim
University of Pennsylvania School of Medicine researchers.

When someone lies, their brain inhibits them from telli… [KurzweilAI.net Accelerating Intelligence News]

Tracking Identity … Cradle to Grave

It is only a matter of time before this is going on almost
everywhere.  It seems today that most of our government tracked
actions are recorded … but in many different and separate
databases.  This appears to be an effort for the Dutch citizens to
see a unification of their identity information for a variety of
sociological benefits.  Yes … I know that many people are
cringing at this.  To me it only makes sense that it’s going ot
occur … it’s inevitable.

Dutch Treat: Personal Database.
Starting in 2007, every baby born in the Netherlands will receive a
Citizens Service Number and will have an electronic dossier opened in a
central database. This will allow Dutch authorities to track each
citizen from cradle to grave. [Wired News]

More advances with RNA

It was recently at Accelerating Change 2005
that I heard Ray Kurzweil talk about more advances in RNA Interference
This is a powerful process where we can now alter the expression of
various genes using RNA.  This article demonstrates yet another
powerful use of RNA in our continuing exploration of genetics. 
Just imagine where we are going to be in the next five to ten years!

Purdue scientists treat cancer with RNA nanotechnology. PhysOrg.com Sep 14 2005 7:02PM GMT [Moreover Technologies – moreover…]

Phil Windley’s CTO Breakfast

This morning was the November/December CTO Breakfast that Phil Windley
put
together. The breakfast started with a question about hiring good
talent. One of the employees from Canyon Bridge
said they have been looking to hire some good engineers, and have been
finding that few can answer some very simple questions. The
example that they gave was about reversing the order of a linked list.

There was a lot of talk about how to alter the hiring process, and also what types of questions people ask: What do you do outside of work? What Open Source projects do you work on?
There was also a lot of talk about how to gather names. Examples
were leverage your existing employees to get the names of “known good”
co-workers. The problem with this approach is that you can
quickly run out of references.

The conversation went on for a long time before it finally went over to the CP80
issue. CP80 is the “Clean Port 80” initiative to create laws
which forbid certain types of content to be delivered over port 80 …
the standard port used by web browsers. It again becomes an
interesting way to attempt to legislate morality. In the end, it
will not be technically possible, but could give lawyers a way to go
after the producers of “unacceptable” content. Yeah …
“unacceptable” to who? ([tags: ])

The conversation at one point moved to downloading content from the
Internet, and the subject of Digital Rights Management (DRM). 
Several sites were mentioned where you could get free content –  Pandora (which is a very cool streaming site – part of the Music Genome Project), and one of my favorites Epitonic. ([tags: ])

There was a brief exploration of the whole area of Wikis and the
inability of the “average” user to use “yet another markup
language”.  I have to admit that it truly aggrevates me that the
various Wiki platforms have subtle differences … and most do not
provide WYSIWYG editors.  and we spent some time discussing the
fact that there is a not a really good – Open Source – AJAX/WYSIWYG
editor.  I mentioned the fact that my parents can use Microsoft
Word, but that having to learn a whole symbology wasn’t going to
happen.  It reminded me of a great Podcast by Robert Lefkowitz @ OSCON 2005 … I’ll have to blog about that one!  ([tags: ])

Phil Burnes through out comments about Flock … a very cool Mozilla-based project, I brought up a very cool article that a friend sent me from Make
Magazine
… it was about Mologogo
… which is a very cool mash-up of Cellular phones with GPS and Google
Maps giving you a very cheap “real-time” geopositioning/geolocation
system.  We wrapped up on one of my favorite subjects … wearable
computers.  We didn’t spend a lot of time on it … I’ll have to
bring some of my toys to one of the next breakfasts!  ([tags: ])

On the way out, Phil brought up a good point.  His gatherings
bring together an incredible group of people with diverse interests and
experience.  It is the level of experience of some of the people
that really brings a great spin to the whole conversation.  We
ended up going almost 2.5 hours … and it was a great conversation the
whole time … and we could have gone longer!  I’ll look forward
to January!

Jabra BT250v

Every now and then you buy a product that really just works.  I recently bought a Bluetooth headset for my cell phone – a Jabra BT250v
– and I have to admit that I am truly happy with this product. 
I’ve always used a headset, but the wired type.  When I upgraded
cell phones and bought a Nokia 6820
one of the features that I wanted was Bluetooth for a wireless
headset.  But I stuck with wired headsets for a year or two.

After destoying the wired headset for the second time by jerking the
headset out of my ear or catching the wire on various things, and
having to untangle the wire one too many times, I broke down and bought
the Jabra.  It is now something that I would not go without. 
The sound quality it great, it has a ‘vibrate’
feature so that I have now turned off the ring on my phone, and the
buttons on the earpiece allow me to answer a call, and change the
volume.

I have had two problems with it over the last month that I have had the
device.  The first I was warned about … if I am outside and
there is any wind, the people I am talking to immediately complain
about the wind noise.  I have learned to mute the phone, or warn
people that I am talking with.  The second was that one time the
headset locked up and would no longer communicate with my phone. 
The on-line support indicated that I would have to ‘reset’ the Jabra,
and that meant re-inserting it into the charging base … which was at
home.  That did piss me off.

One other thing that I have learned is that every now and then it will
‘disconnect’ from my cell phone, for example if I set down the phone
and walk away with the Jabra on my ear, or hooked in the neck of my
shirt.  Its easy to ‘reconnect’ by simply clicking the button on
the Jabra.  Likewise, if I switch my phone to speakerphone, and
then back to ‘normal’ the Jabra will be disconnected.  One quick
click on the Jabra button and it reconnects.  I have to say it is
one of the best investments I have made related to my cell phone. 
A very nice design, and very easy to use.

The Gigapxl Project

I just listened to a great podcast from ITConversations that was a
presentation at Pop!Tech 2005.  It was a wonderful talk by Graham
Flint about the Gigapxl Project
This is some amazing work where they are now taking pictures at extreme
resolutions – close to 4 Gigapixels!  That is close to 4000
Megapixels … a LOT more than the digital cameras that you can buy
today.  They are using some highly custom cameras to be able to
take pictures with incredible resolutions, built out of old U2 spy
plane parts.  These are still “film” cameras, but he also
discusses the work on fully digital versions of these cameras being
built.

In his talk he mentions some interesting things that they find when
they are able to zoom in on these extremely detailed images.  He
talks about this image of paragliders
on the coast of California.  When his wife was reviewing the
image, she found people watching with binoculars and telescopes … but
they were looking down
… not up!  When they followed the track of the people’s vision,
they found that below the paragliders was a nudist beach!  When
they put this particular image in a museum, the resolution was so good
that they had to mask the faces and heads of the nudists!  This
opens a whole new conversation about privacy … and continues to beg
the question “Is there such thing as privacy?”

The site has got a lot of very cool images, and examples of the
abilitty to zoom.  They even had a cityscape of my hometown of Pittsburgh, Pennsylvania

I’ll have to check which podcast had the Q&A, however they did
bring up the questions of privacy.  In this image of  PETCO Park
he talks about the fact that they have detailed images of ~15,000
people … and how would you ever get a release from all of these
people?  As a friend and I talked about this, it means that a
single photo of a demonstration or rally might give details images of
the people attending.  Uh … what are you doing in that hotel room on the 15th floor?

It is truly some amazing work, and the podcast was a great
listen.  I’ve attached the link to this post … we’ll see if it
works for you!

You mean what I say publicly can’t be used against me?

I love this article … and I’m almost amused at the perspective presented in this article – Blogger Blocked at U.S. Border
A Canadian citizen was blocked from coming into the U.S. from Toronto
when U.S. border guards found references in his blog to being based in
New York. The blogger seems to be surprised that someone would hold him
accountable for what he wrote!

“One of them, a very sharp guy in fact, started to read every single post on
my blog. And it didn’t take long until he shocked me: ‘So you live in New York,
right? That’s what you’ve written in your [blog].'”

Derakhshan did, in fact, write that he was based out of New York—mostly
because it sounded “sexier” than saying he was based out of Toronto, he said.

But between his offhand blog comment and the fact that he was carrying a
Newsweek magazine sent to him at a New York address, the guards found grounds to
refuse his entry into the United States, for at least the next six months.

According to U.S. policy, as a Canadian citizen Derakhshan may be legally
entitled to stay in the United States for up to six months.

Canadian citizens entering the United States as visitors for business do not
require either a passport or a visa, although visitors are required to satisfy
border guards of their citizenship, according to the U.S. Customs and Border
Protection’s site.

“It was obvious the guy was trying to find an excuse not to let me in, and he
found something,” Derakhshan told Ziff Davis Internet News. “He found that I
said in the blog that I said I’m based in New York now. He said being based in
New York is illegal.”

Uh … excuse me, but it seems to me that Mr. Derakhshan made the
choice to be irresponsible with his writing … he publicly claimed to
be in violation of the law.  The “sharp guy” realized that not
only was this Canadian carrying a magazine with an address to him in
the U.S., but he outright claimed to be “based” in New York … in
direct violation of the law!

So what is the big deal?  You got what you asked for.  You were more interested in “looking good” (“Derakhshan did, in fact, write that he was based out of New York—mostly
because it sounded “sexier” than saying he was based out of Toronto, he said.”) and are now surprised at the consequences of your actions and words.

It is always amazing to me when people want to act surprised when they
get caught in their inauthenticities.  I remember being taught to
be very careful what I say … and to understand the consequences of
telling lies.  It appears that either he really was based in New
York illegally, or that his claims to look good have simply caught up
with him.

In either case, I love the idea of the border guards using Google!

Adding a secondary IP address on Fedora Core

Every now and then I find another thing in Linux – or a particular
distribution – that really impresses me.  Tonight was one of those
times.  My home network is connected through a Fedora Core Linux
box, to a wireless link to my communications shed up on the mountain
above my house.  The shed then has a ~6 mile wireless link to my
office up at the Heber City Airport.

I have actually overlaid two different IP subnets on the wireless
network, one being the small subnet provided by my DSL provider, and
then other being a 10.x.x.x subnet that I created for a set of hosts
that I use for testing.  When I set up my Fedora Core Linux box as
a home gateway, I gave it a public IP address that is part of the fixed
range through my DSL modem.  So I can get in and out of my house
just fine, but was unable to access anything on the 10.x.x.x network
from my house.

To resolve this, I had to bind a second address to the same NIC card
… something that I had done with other operatings systems in the
past, but never with Linux.  After a quick search on Google, I
found a couple of articles that outlined a manual method of configuring
this, and then realized that I ought to look at the GUI config tools
that are a part of the Fedora distribution.  I opened the Network
Configuration tool, and simply clicked the “add” button … chose the
ethernet card, and provided address information.  I was impressed
that the tool added the new binding perfectly!  I clicked the
“activate” button, and up came the secondary IP address.

In a matter of 10 minutes I had the secondary binding working, and now
have a host that is connected to both the public IP address range, and
my private 10.x.x.x network through the same ethernet card.  Yeah
… I know … simple stuff.  But I had to comment how impressed I
was that the config tools managed this in such an intuitive way!

[tags: ]