Random thoughts
Thursday, March 25, 2010
Perl foreach loop and dynamic scoping
Looping over a list of two values in Perl with for or foreach would seem trivial. What if the code suddenly appears stuck at the first value? That's exactly what happened with the Perl script below:
Even with use strict and warnings turned on, the script runs without warnings, but rather than printing http and https in sequence, it prints http twice!
As it turns out, after much debugging (the sample code is stripped down from a larger script which actually does something useful) and collectively scratching heads, this is indeed the documented behavior:
Lessons learned:
my $PROTOCOL = 'http';
for $PROTOCOL (qw(http https)) {
dosomething();
}
sub dosomething {
print "$PROTOCOL\n";
}
Even with use strict and warnings turned on, the script runs without warnings, but rather than printing http and https in sequence, it prints http twice!
As it turns out, after much debugging (the sample code is stripped down from a larger script which actually does something useful) and collectively scratching heads, this is indeed the documented behavior:
The foreach loop defaults to scoping its index variable dynamically in the manner of local. However, if the index variable is prefixed with the keyword my, or if there is already a lexical by that name in scope, then a new lexical is created instead.
Lessons learned:
- After a decade of hacking Perl code, there's always something new to learn (and use strict doesn't stop the programmer from getting the scoping wrong).
- Reading the documentation (sometimes) helps.
Labels: perl, technology
Tuesday, September 29, 2009
Internet Summit Austria 2009
Today I attended the Internet Summit Austria 2009 held by the Internet Service Providers Austria association at the Austrian Academy of Sciences. The motto of the event was “We are Internet”, referring to the fact that the Internet is created by people and used by people.
ISPA chairman Andreas Koman opened the session with statistics about Internet use in Austria and an overview of current developments and challenges.
Claudia Bandion-Ortner, minister of justice, admitted her preference for paper files and reminded the audience that the Internet is not an area unregulated by law. There are legal issues specific to information technology, such as data theft and violation of data privacy rights. While fraudsters and other criminals use the Internet, most crimes are media neutral. One area that is closely linked to the Internet, though, is child pornography. Bandion-Ortner referred to the controversial German pilot for blocking access to illegal sites. Needless to say, the same filter technology could be used for censoring access to legitimate information or enforcing intellectual property rights.
Volker Grassmuck delivered a keynote about the reformation of intellectual property law in the digital age. Established “common sense” can block creativity and innovation. Some ideas worked well although most people would have assumed they wouldn’t:
On net neutrality Grassmuck mentioned a speech by FCC chairman Julius Genachowski and a refined view on the issue, with net neutrality but with network management to handle congestion or spam and with provisions for law enforcement, and transparency which would allow blocking or throttling certain types of traffic as long as customers are made aware.
There is no one solution that satisfies the needs of content producers, consumers and intermediaries. Working models will require a combination of an agreement between creative professionals and society, markets, free licenses, public subsidies and a “cultural flat rate”.
One of the conference gifts was, ironically, a USB stick with a locked down installation of Firefox using the Tor network to ensure privacy.
The keynote was followed by a lively discussion about intellectual property rights, including but not limited to compensation for the creator of content. The composer Johanna Doderer and the author Gerhard Ruiss pointed out that they want to maintain control over what happens with their works and reminded the audience that creative professionals are typically paid by how often their works sell. Georg Hitzenberger of Play.fm and Bettina Kann of the Austrian National Library outlined some of the challenges with obtaining rights for use in digital media and making content available. For example, the digital Web archive maintained by the Austrian National Library has unreasonably strict access requirements in selected locations only, one person at a time. Franz Schmidbauer touched on legal aspects and the adequacy of intellectual property rights enforcement.
MEP Eva Lichtenberger made an interesting comment about giving young people the ability to purchase digital media without requiring a credit card, quoting the large amounts spent on ringtones where suitable payment solutions are offered by telecom providers.
After the lunch break, Peter A. Gloor gave an entertaining presentation about “Coolhunting by Swarm Creativity” (that’s a lot of buzzwords for a title), explaining how their system combines different inputs–the wisdom of the crowd in the form of the Web, the wisdom of the swarms in the dynamics of fora and blogs, the knowledge in news and Wikipedia–to understand networks, trends and content. “Experts are right – in 50% of the cases. You never know which 50% you have.” swarmcreativity.net and ickn.org have good information about the concepts and the Condor software for non-commercial use.
Two panel discussions about social networks and business on the Internet concluded the agenda.
ISPA chairman Andreas Koman opened the session with statistics about Internet use in Austria and an overview of current developments and challenges.
Claudia Bandion-Ortner, minister of justice, admitted her preference for paper files and reminded the audience that the Internet is not an area unregulated by law. There are legal issues specific to information technology, such as data theft and violation of data privacy rights. While fraudsters and other criminals use the Internet, most crimes are media neutral. One area that is closely linked to the Internet, though, is child pornography. Bandion-Ortner referred to the controversial German pilot for blocking access to illegal sites. Needless to say, the same filter technology could be used for censoring access to legitimate information or enforcing intellectual property rights.
Volker Grassmuck delivered a keynote about the reformation of intellectual property law in the digital age. Established “common sense” can block creativity and innovation. Some ideas worked well although most people would have assumed they wouldn’t:
- Shared space pioneered by Hans Moderman–“If you treat people like idiots, they will behave like idiots.”
- Shared code with the Free Software Foundation (FSF)
- Shared profits with the micro-payments of the Grameen bank– “People behave in a trustworthy way when they are trusted.”
On net neutrality Grassmuck mentioned a speech by FCC chairman Julius Genachowski and a refined view on the issue, with net neutrality but with network management to handle congestion or spam and with provisions for law enforcement, and transparency which would allow blocking or throttling certain types of traffic as long as customers are made aware.
There is no one solution that satisfies the needs of content producers, consumers and intermediaries. Working models will require a combination of an agreement between creative professionals and society, markets, free licenses, public subsidies and a “cultural flat rate”.
One of the conference gifts was, ironically, a USB stick with a locked down installation of Firefox using the Tor network to ensure privacy.
The keynote was followed by a lively discussion about intellectual property rights, including but not limited to compensation for the creator of content. The composer Johanna Doderer and the author Gerhard Ruiss pointed out that they want to maintain control over what happens with their works and reminded the audience that creative professionals are typically paid by how often their works sell. Georg Hitzenberger of Play.fm and Bettina Kann of the Austrian National Library outlined some of the challenges with obtaining rights for use in digital media and making content available. For example, the digital Web archive maintained by the Austrian National Library has unreasonably strict access requirements in selected locations only, one person at a time. Franz Schmidbauer touched on legal aspects and the adequacy of intellectual property rights enforcement.
MEP Eva Lichtenberger made an interesting comment about giving young people the ability to purchase digital media without requiring a credit card, quoting the large amounts spent on ringtones where suitable payment solutions are offered by telecom providers.
After the lunch break, Peter A. Gloor gave an entertaining presentation about “Coolhunting by Swarm Creativity” (that’s a lot of buzzwords for a title), explaining how their system combines different inputs–the wisdom of the crowd in the form of the Web, the wisdom of the swarms in the dynamics of fora and blogs, the knowledge in news and Wikipedia–to understand networks, trends and content. “Experts are right – in 50% of the cases. You never know which 50% you have.” swarmcreativity.net and ickn.org have good information about the concepts and the Condor software for non-commercial use.
Two panel discussions about social networks and business on the Internet concluded the agenda.
Labels: austria, events, technology, web2.0
Tuesday, August 11, 2009
Security, privacy, and an inconvenience
Redirects are often discussed only in the context of search engine optimization (SEO). Here is a good example how redirects affect users as well, and why it is important to choose your redirects wisely.
The Central Intelligence Agency (CIA) in 2006 began serving its Website encrypted in an effort to improve security and privacy of the communication.
This is a clear case for a 301 redirect from the unencrypted URL http://www.cia.gov/page to the equivalent encrypted URL https://www.cia.gov/page. Instead, except for the homepage and very few other pages, all requests get redirected to a splash page informing visitors about the site changes:
Not only is this a bad idea for search since all those links out there on various sites now transfer link weight to a splash page which is marked as non-indexable. It is also an inconvenience to users who need to navigate to the specific content or go back to the previous page and try again with an edited link.
Even the old URL for the World Factbook, arguably one of the most popular resources on the site, no longer goes to the desired World Factbook homepage directly.
The CIA press release states: “We believe the inconveniences of implementing SSL for the entire website will be offset by increased visitor confidence that they are, in fact, connected to the CIA website and that their visits are secure and confidential.”
The effort to increased security and privacy is commendable, and encrypting all communication with the agency certainly isn't a bad idea. Doing so without the inconveniences would be even better though, and perfectly feasible, too.
The Central Intelligence Agency (CIA) in 2006 began serving its Website encrypted in an effort to improve security and privacy of the communication.
This is a clear case for a 301 redirect from the unencrypted URL http://www.cia.gov/page to the equivalent encrypted URL https://www.cia.gov/page. Instead, except for the homepage and very few other pages, all requests get redirected to a splash page informing visitors about the site changes:
Not only is this a bad idea for search since all those links out there on various sites now transfer link weight to a splash page which is marked as non-indexable. It is also an inconvenience to users who need to navigate to the specific content or go back to the previous page and try again with an edited link.
Even the old URL for the World Factbook, arguably one of the most popular resources on the site, no longer goes to the desired World Factbook homepage directly.
The CIA press release states: “We believe the inconveniences of implementing SSL for the entire website will be offset by increased visitor confidence that they are, in fact, connected to the CIA website and that their visits are secure and confidential.”
The effort to increased security and privacy is commendable, and encrypting all communication with the agency certainly isn't a bad idea. Doing so without the inconveniences would be even better though, and perfectly feasible, too.
Labels: networking, seo, technology
Monday, June 29, 2009
The return of the curvy cucumber
For two decades, the European Union carefully regulated the size and shape of fruit. Often this has been quoted, and rightly so, as an example of the over-regulation by the commission.
Announced in November 2008, the return of the curvy cucumber will become effective on July 1, 2009. Now all those cucumbers and carrots will be “allowed” to grow in all shapes and sizes again (not that they cared too much about EC directives anyway).
Standards usually make life convenient. Just imagine what driving a rental car would be like if manufacturers implemented their own concept of speed and steering controls (too bad that other controls like air condition and radio aren't standardized and often not self-explanatory). Or withdrawing money from the bank without standardized bank cards and ATMs. Or connecting to networks if they weren't all using the same protocols.
Regulating the size and shape of fruit and vegetables, on the other hand, doesn't make life more convenient unless you like to see the cucumbers lined up nicely in the fridge. To me, this is mostly an indication of an unhealthy desire to control everything, including Mother Nature. More than two decades ago, the movement which eventually became the Green party started questioning large technology projects, be it nuclear power plants or ecologically questionable hydropower plants. Many of the environmental and energy related issues still need to be addressed. But, at least we have the curvy cucumber back.
Announced in November 2008, the return of the curvy cucumber will become effective on July 1, 2009. Now all those cucumbers and carrots will be “allowed” to grow in all shapes and sizes again (not that they cared too much about EC directives anyway).
Standards usually make life convenient. Just imagine what driving a rental car would be like if manufacturers implemented their own concept of speed and steering controls (too bad that other controls like air condition and radio aren't standardized and often not self-explanatory). Or withdrawing money from the bank without standardized bank cards and ATMs. Or connecting to networks if they weren't all using the same protocols.
Regulating the size and shape of fruit and vegetables, on the other hand, doesn't make life more convenient unless you like to see the cucumbers lined up nicely in the fridge. To me, this is mostly an indication of an unhealthy desire to control everything, including Mother Nature. More than two decades ago, the movement which eventually became the Green party started questioning large technology projects, be it nuclear power plants or ecologically questionable hydropower plants. Many of the environmental and energy related issues still need to be addressed. But, at least we have the curvy cucumber back.
Labels: business, technology
Wednesday, June 24, 2009
Disagreeing with Jakob Nielsen on security—Password masking makes logins more secure
When it comes to usability, disagreeing with Jakob Nielsen is usually not an option. After all, he has been called king, czar, guru or Web usability for a reason, and his Alertbox offers invaluable advise most of the time.
Disagreeing with Jakob Nielsen on security is easier, especially when he advocates to remove password masking as a means to improve usability and claims that this doesn't lower security.
While not offering a high degree of protection, the password masking does a pretty good job for most situations. Certainly, a determined and skilled criminal would be able to observe which keys are pressed, or use other attack vectors to intercept my Web interactions. I am often surrounded by trustworthy people who still shouldn't know my passwords, don't care about my passwords and even politely turn their eyes away while I am logging in. Whether showing someone a Website or doing a demo to a larger audience, accessing protected areas of a site in a semi-public environment like a desk-sharing area at work or logging in from a mobile device, those little stars or dots protect my passwords well from becoming exposed.
Security and usability should not be conflicting objectives; in fact usability is an important aspect for any security system, or users will work around usability issues and use it in unintended ways, like copying and pasting passwords from a text file as Nielsen mentions. An extra checkbox to enable password masking just adds complexity to the user interface and may confuse users more than not being able to see their password.
Typing passwords on mobile devices (or foreign keyboards, for that matter) can be challenging. Some smartphones like the iPhone or the Nokia N95 show the letter as typed but then quickly replacing it with an asterisk, which is a reasonable compromise.
Instead of cluttering Web forms with additional checkboxes, web developers should demand that browsers and mobile devices provide an option to remove password masking when desired by the user. This would maintain the current level of security by not exposing the passwords to people looking over users' shoulders and address the usability issue for those who have difficulty typing their password and would benefit from visual feedback.
Until then, use this JavaScript bookmarklet to unmask password fields as needed:
(all on one line, or simply drag the Unmask passwords bookmarklet link to your bookmarks).
PS. More ways to reveal passwords in a controlled manner can be found in Martin Brinkmann's blog post Reveal your saved Passwords in Firefox.
Disagreeing with Jakob Nielsen on security is easier, especially when he advocates to remove password masking as a means to improve usability and claims that this doesn't lower security.
While not offering a high degree of protection, the password masking does a pretty good job for most situations. Certainly, a determined and skilled criminal would be able to observe which keys are pressed, or use other attack vectors to intercept my Web interactions. I am often surrounded by trustworthy people who still shouldn't know my passwords, don't care about my passwords and even politely turn their eyes away while I am logging in. Whether showing someone a Website or doing a demo to a larger audience, accessing protected areas of a site in a semi-public environment like a desk-sharing area at work or logging in from a mobile device, those little stars or dots protect my passwords well from becoming exposed.
Security and usability should not be conflicting objectives; in fact usability is an important aspect for any security system, or users will work around usability issues and use it in unintended ways, like copying and pasting passwords from a text file as Nielsen mentions. An extra checkbox to enable password masking just adds complexity to the user interface and may confuse users more than not being able to see their password.
Typing passwords on mobile devices (or foreign keyboards, for that matter) can be challenging. Some smartphones like the iPhone or the Nokia N95 show the letter as typed but then quickly replacing it with an asterisk, which is a reasonable compromise.
Instead of cluttering Web forms with additional checkboxes, web developers should demand that browsers and mobile devices provide an option to remove password masking when desired by the user. This would maintain the current level of security by not exposing the passwords to people looking over users' shoulders and address the usability issue for those who have difficulty typing their password and would benefit from visual feedback.
Until then, use this JavaScript bookmarklet to unmask password fields as needed:
for(var i=0;(var a=document.getElementsByTagName("input")[i]);i++){
if(a.getAttribute("type").indexOf("password")!=-1){
a.type="text"
}
}
window.focus();
(all on one line, or simply drag the Unmask passwords bookmarklet link to your bookmarks).
PS. More ways to reveal passwords in a controlled manner can be found in Martin Brinkmann's blog post Reveal your saved Passwords in Firefox.
Labels: technology, usability, webdevelopment
Monday, February 23, 2009
Amazon.com: User experience delivering value
While shopping on Amazon the other day, I noticed a subtle yet still noticeable hint that I had bought the very same article already in October 2007.
At first glance, the notice would appear to drive customers away from buying; however Amazon.com has a long-standing reputation for innovation in online commerce and good customer service (although I have been less satisfied with their handling of e-mail correspondence lately) so this didn't come as a complete surprise.
Good user experience design is all about delivering value to the customer, and to the business too:
Links:
At first glance, the notice would appear to drive customers away from buying; however Amazon.com has a long-standing reputation for innovation in online commerce and good customer service (although I have been less satisfied with their handling of e-mail correspondence lately) so this didn't come as a complete surprise.
Good user experience design is all about delivering value to the customer, and to the business too:
- The customer may have bought the product earlier and order another copy as a present, which was actually the case for me.
- Some products, such as blank CDs/DVDs, lend themselves to repetitive orders. Knowing that this is the same product ordered before is reassuring to the customer, which means more business with fewer clicks.
- In the unlikely case that a customer accidentally orders the same product twice, chances are that she would return the product for a refund, incurring shipping and handling cost for the business; therefore not shipping the product in the first place is not only the most customer friendly, but also the most cost effective solution.
Links:
Labels: business, ibm, kudos, technology
Saturday, January 31, 2009
Google: This site may harm your computer
Google generally does a pretty good job warning users about suspicious Web sites assumed to contain malware, but their algorithm seems to have gone overboard now. This morning every search result shows a warning that the site may harm my computer:
Labels: google, technology
Wednesday, December 31, 2008
0101001011101010111
Google search nicely reminded me that digital storage is still all about ones and zeros:
Labels: ibm, technology
Tuesday, October 7, 2008
Jamming at the InnovationJam™ 2008
Want to explore how organizations can transform themselves into truly global enterprises of the future? Ready to collaborate with technology and business thought-leaders?
Join the InnovationJam™ 2008.
Labels: business, innovation, technology
Wednesday, September 3, 2008
Google Chrome first impressions
Does the world need another Web browser? Probably not, most people are reasonably happy with Firefox (or SeaMonkey), Safari and Internet Explorer, and a wide range of less known specialized browsers.
But then of course it's hard to ignore a new browser when it's launched by Google. Matt Cutts quickly blogged about the Google Chrome announcement and conspiracy theories, and the search engine guessing feature in particular caught my interest.
www.ibm.com has supported OpenSearch for years and it's good to see a browser finally making good use of the OpenSearch description and providing access to custom search engines using keyboard navigation. With the OpenSearch definition for IBM Search enabled, typing ibm.com Green IT selects IBM Search as the preferred engine for that search:
The same can be achieved in Firefox with keywords, albeit not as easily.
Rendering of XML content including RSS news feeds leaves much to be desired. Hopefully Google will add full XML rendering support and integrate a feed reader soon.
Incognito browsing is another neat idea, it won't help much to preserve your privacy but could be useful for testing when you don't want all the test pages to clutter your browser history.
One prerequisite for me using Chrome is support by RoboForm which keeps track of all my accounts and passwords. RoboForm does not work with Safari but hopefully with Chrome being open source will support this browser. Web development tools that work with Chrome will be the other deal breaker.
In the meantime I will continue to experiment with Chrome and see what else Google's latest brainchild has to offer.
But then of course it's hard to ignore a new browser when it's launched by Google. Matt Cutts quickly blogged about the Google Chrome announcement and conspiracy theories, and the search engine guessing feature in particular caught my interest.
www.ibm.com has supported OpenSearch for years and it's good to see a browser finally making good use of the OpenSearch description and providing access to custom search engines using keyboard navigation. With the OpenSearch definition for IBM Search enabled, typing ibm.com Green IT selects IBM Search as the preferred engine for that search:
The same can be achieved in Firefox with keywords, albeit not as easily.
Rendering of XML content including RSS news feeds leaves much to be desired. Hopefully Google will add full XML rendering support and integrate a feed reader soon.
Incognito browsing is another neat idea, it won't help much to preserve your privacy but could be useful for testing when you don't want all the test pages to clutter your browser history.
One prerequisite for me using Chrome is support by RoboForm which keeps track of all my accounts and passwords. RoboForm does not work with Safari but hopefully with Chrome being open source will support this browser. Web development tools that work with Chrome will be the other deal breaker.
In the meantime I will continue to experiment with Chrome and see what else Google's latest brainchild has to offer.
Labels: technology, webdevelopment
Thursday, July 10, 2008
Microsoft DNS patch KB951748 secures Internet access too well
The latest Microsoft DNS patch improves security too well. The update appears to be incompatible with Check Point's hugely popular ZoneAlarm firewall and possibly other firewall products, and results in complete loss of Internet access.
After a lengthy failed attempt to diagnose a family member's “my Internet no longer works” problem over the phone I saw the BugTraq alert “Microsoft DNS patch KB951748 incompatible with Zonealarm” late at night. Sure enough, uninstalling the update nicely resolved the problem.
The other possible workaround, turning off the firewall completely, would be more risky than living with the spoofing vulnerability until this incompatibilty gets fixed.
After a lengthy failed attempt to diagnose a family member's “my Internet no longer works” problem over the phone I saw the BugTraq alert “Microsoft DNS patch KB951748 incompatible with Zonealarm” late at night. Sure enough, uninstalling the update nicely resolved the problem.
The other possible workaround, turning off the firewall completely, would be more risky than living with the spoofing vulnerability until this incompatibilty gets fixed.
Labels: technology, windows
Tuesday, July 8, 2008
What do all the numbers mean?
Who the heck is Charlie O'Donnell? I don't know, but somehow (more precisely, from Ed Costello's bookmarks on del.icio.us) I stumbled upon his blog post An experiment: Who's really out there and how do you measure influence?
When Feedburner reports 2686 readers, does that mean 2686 folks actually read the blog, or once subscribed to it and never came back? So Charlie is running an experiment to determine who's actually reading, how people find out about the blog etc. and as an aside get really popular. This is social marketing at its best, so let's pass on the word and see just how popular we can get this.
Link to the post: http://www.thisisgoingtobebig.com/2008/07/an-experiment-w.html
When Feedburner reports 2686 readers, does that mean 2686 folks actually read the blog, or once subscribed to it and never came back? So Charlie is running an experiment to determine who's actually reading, how people find out about the blog etc. and as an aside get really popular. This is social marketing at its best, so let's pass on the word and see just how popular we can get this.
Link to the post: http://www.thisisgoingtobebig.com/2008/07/an-experiment-w.html
Labels: metrics, technology
Friday, June 20, 2008
Firefox 3
The Mozilla project released Firefox 3 on June 17 with an attempt to set the world record in software downloads per day.
While I consider raw traffic numbers only mildly useful and the hunt for traffic records somewhat old-fashioned (when IBM did run the Olympics Websites we would report record traffic numbers, and with the technology available back then the numbers were impressive, but that was in the 1990ies) I gladly did my part to set the world record. I mean, how often do you get a chance to be part of a world record, even if your contribution is only 1/8290545.
I even installed Firefox 3 :-) and for most parts have been satisfied with the result. The only complaint I have is that the installation overwrote the previously installed Firefox 2 despite placing the new version in a different directory, and sure enough some extensions were considered incompatible and therefore disabled.
Multiple Internet Explorer versions can coexist on the same machine thanks to the wonderful Multiple IE installer, can we please get an easy and automated way to run multiple versions of Firefox without fiddling with profiles?
While I consider raw traffic numbers only mildly useful and the hunt for traffic records somewhat old-fashioned (when IBM did run the Olympics Websites we would report record traffic numbers, and with the technology available back then the numbers were impressive, but that was in the 1990ies) I gladly did my part to set the world record. I mean, how often do you get a chance to be part of a world record, even if your contribution is only 1/8290545.
I even installed Firefox 3 :-) and for most parts have been satisfied with the result. The only complaint I have is that the installation overwrote the previously installed Firefox 2 despite placing the new version in a different directory, and sure enough some extensions were considered incompatible and therefore disabled.
Multiple Internet Explorer versions can coexist on the same machine thanks to the wonderful Multiple IE installer, can we please get an easy and automated way to run multiple versions of Firefox without fiddling with profiles?
Labels: technology, webdevelopment, windows
Thursday, April 24, 2008
PowerPoint: No comma, please
A colleague recently showed me a strange problem with Microsoft Office: When inserting a hyperlink in a PowerPoint presentation, one of the available options is linking to another page in the same document:
This seemed to work nicely for most slides but not for the particular slide he was trying to link to, and PowerPoint would not even show a preview in the hyperlink dialog box:
The programmer in me quickly scanned through the slide looking for “suspicious” elements, the only thing that caught my attention though was an innocent looking comma.
Turns out the comma is indeed the culprit, and the bug is well-documented in the Microsoft knowledge base: The hyperlink to a slide does not work when a comma is contained in the title of a slide presentation in PowerPoint.
Removing the comma, placing the hyperlink and then adding the comma back does seem to do the trick. Or, just don't use a comma.
This seemed to work nicely for most slides but not for the particular slide he was trying to link to, and PowerPoint would not even show a preview in the hyperlink dialog box:
The programmer in me quickly scanned through the slide looking for “suspicious” elements, the only thing that caught my attention though was an innocent looking comma.
Turns out the comma is indeed the culprit, and the bug is well-documented in the Microsoft knowledge base: The hyperlink to a slide does not work when a comma is contained in the title of a slide presentation in PowerPoint.
Removing the comma, placing the hyperlink and then adding the comma back does seem to do the trick. Or, just don't use a comma.
Labels: technology, windows
Friday, April 18, 2008
VPS, PDC, DVB, EPG—Why can VCRs not just work?
Video cassette recorders (VCR) have a long-standing reputation for being difficult to use (searching for VCR and usability returns some 90,000 results on Google).
In the early days setting the timer right may have been challenging, and too often the program would change or fall behind and the tape would contain a different program, or a cut off film. Then came the Video Programming System (VPS) and ShowView, which made programming VCRs easy and greatly increased the likelihood of recording the desired program, and later Programme Delivery Control (PDC).
Everything seemed fine until last year when a decision was made to discontinue analog TV broadcasting in Austria and switching to Digial Video Broadcasting (DVB-T). The television system had maintained backwards compatibility with the great many enhancements over the years, from black-and-white to color, from mono to stereo and dual channel audio. This time, however, new equipment would be needed in the form of DVB-T receivers, and of course that means one for each TV set and recorder.
Our first attempt with a twin receiver bought on EBay was a dismal failure. The device seemed malfunctioning and vendor support was non-existent (more precisely, we were unable to locate the vendor, which seemed to have gone out of business). We happily lived for a few weeks without television.
Eventually we got a nice Sony HXD-870 HD/DVD recorder with built-in DVB-T tuner and at first were quite happy. Setting up the device was easy (except for the fact it did not recognize Austria as a country) and we were back to receiving and recording TV programs.
Although the new recorder supports VPS/PDC it does so only from analog sources, which are no longer available, but not from the digital signal despite the fact that the VPS signal is sent digitally as well. The new Electronic Program Guide (EPG) is convenient, but there is no way to tell the recorder to start when the program starts. Instead you can manually tweak the time range to increase the likelihood of recording the full program.
If that wasn't bad enough already, when we switched to daylight savings time, or summer time as it's called here, the program guide appeared to be off by one hour and so were all recordings. There is a timezone menu but toggling daylight savings time on and off did not seem to make any difference.
The Sony support Website was less than helpful. The only firmware upgrade was for the UK version of the recorder and fixed an unrelated problem that we hadn't encountered.
Fortunately a kind soul owning the same device came to rescue and shared instructions how to overcome this bug by switching to a different time zone and then rebooting the recorder. We have since been running on Helsinki time and had mixed success in recording programs.
With all the advances in technology and three-letter acronym features, we are essentially back to the functionality in the early days of video recording, manually setting times and hoping for the program to stay on schedule.
Why can VCRs not just work?
In the early days setting the timer right may have been challenging, and too often the program would change or fall behind and the tape would contain a different program, or a cut off film. Then came the Video Programming System (VPS) and ShowView, which made programming VCRs easy and greatly increased the likelihood of recording the desired program, and later Programme Delivery Control (PDC).
Everything seemed fine until last year when a decision was made to discontinue analog TV broadcasting in Austria and switching to Digial Video Broadcasting (DVB-T). The television system had maintained backwards compatibility with the great many enhancements over the years, from black-and-white to color, from mono to stereo and dual channel audio. This time, however, new equipment would be needed in the form of DVB-T receivers, and of course that means one for each TV set and recorder.
Our first attempt with a twin receiver bought on EBay was a dismal failure. The device seemed malfunctioning and vendor support was non-existent (more precisely, we were unable to locate the vendor, which seemed to have gone out of business). We happily lived for a few weeks without television.
Eventually we got a nice Sony HXD-870 HD/DVD recorder with built-in DVB-T tuner and at first were quite happy. Setting up the device was easy (except for the fact it did not recognize Austria as a country) and we were back to receiving and recording TV programs.
Although the new recorder supports VPS/PDC it does so only from analog sources, which are no longer available, but not from the digital signal despite the fact that the VPS signal is sent digitally as well. The new Electronic Program Guide (EPG) is convenient, but there is no way to tell the recorder to start when the program starts. Instead you can manually tweak the time range to increase the likelihood of recording the full program.
If that wasn't bad enough already, when we switched to daylight savings time, or summer time as it's called here, the program guide appeared to be off by one hour and so were all recordings. There is a timezone menu but toggling daylight savings time on and off did not seem to make any difference.
The Sony support Website was less than helpful. The only firmware upgrade was for the UK version of the recorder and fixed an unrelated problem that we hadn't encountered.
Fortunately a kind soul owning the same device came to rescue and shared instructions how to overcome this bug by switching to a different time zone and then rebooting the recorder. We have since been running on Helsinki time and had mixed success in recording programs.
With all the advances in technology and three-letter acronym features, we are essentially back to the functionality in the early days of video recording, manually setting times and hoping for the program to stay on schedule.
Why can VCRs not just work?
Labels: technology, usability
Monday, March 24, 2008
Goodbye, Indy!
Time has come to say Goodbye to my Silicon Graphics Indy workstation. It has been a difficult relationship for years, and I finally offered my Indy on EBay.
Introduced in 1993, the Indy for a long time was the workstation to have, powerful and good looking, too. When EuNet, PING and Computerwelt offered a fully equipped Indy workstation as the reward for the best Austrian Website, my good friend Peter Wansch and I submitted The WWW Entertainment Package, a collection of classic board games ported to the Web from the like-named OS/2 games package that Peter had developed.
I had just learned the basics of writing CGI scripts and managed to get four games up and running. Although playing games over the Web was kind of slow in the pre-JavaScript, pre-AJAX era the gaming site was very well received and generated both lots of traffic and nice feedback from gamers around the world, too. We asked people to register for free access, we made it easy for them to vote and we spent a considerable amount of time answering e-mails and encouraging games to vote.
To make a long story short, we won. In hindsight, we had a pretty good Website that was actively used and would continue for years, but some other submissions were pretty slick, too. I guess we didn't just win for having the best product, we won because of good marketing.
The news reached me while participating at the WWW3 Conference in Darmstadt and while I had been hoping for this when it happened I could hardly believe it—we did it!
What followed then was a huge disappointment. We learned that we would not receive the machine at the official ceremony at Café Stein but only a few weeks later, and what's worse in a different configuration: The 5 GB harddisk that was originally advertised may seem small today but would have been perfectly adequate back then, what we got instead was a machine with a much smaller harddisk, barely sufficient to hold the base operating system and multimedia tools, and no CD-ROM drive to install software from.
Now the Indy came with great connectivity already, including Ethernet and ISDN ports, only my home office had neither and upgrading the machine with more memory, a larger harddisk and a CD-ROM drive (from Silicon Graphics only, others would not boot!) was too expensive an option. We could have sold the Indy, probably for a good price. Seriously though, if you got an Indy, would you sell it? (Don't answer, please.)
So for many years this marvel of technology has been putting on dust and remained unused. When I booted the Indy today it started up nicely, only issuing one warning message: “WARNING: clock gained 1856 days”
The auction has a few more days to go and already has six bids. It is about time that someone starts using this machine, and time for me to say Goodbye. It has been a difficult relationship, and yet I will miss this electric-blue colored pizza box.
PS. At the age of fifteen the Indy is still a modern computer. For some really old computers, have a look at the Old Computers online museum.
Introduced in 1993, the Indy for a long time was the workstation to have, powerful and good looking, too. When EuNet, PING and Computerwelt offered a fully equipped Indy workstation as the reward for the best Austrian Website, my good friend Peter Wansch and I submitted The WWW Entertainment Package, a collection of classic board games ported to the Web from the like-named OS/2 games package that Peter had developed.
I had just learned the basics of writing CGI scripts and managed to get four games up and running. Although playing games over the Web was kind of slow in the pre-JavaScript, pre-AJAX era the gaming site was very well received and generated both lots of traffic and nice feedback from gamers around the world, too. We asked people to register for free access, we made it easy for them to vote and we spent a considerable amount of time answering e-mails and encouraging games to vote.
To make a long story short, we won. In hindsight, we had a pretty good Website that was actively used and would continue for years, but some other submissions were pretty slick, too. I guess we didn't just win for having the best product, we won because of good marketing.
The news reached me while participating at the WWW3 Conference in Darmstadt and while I had been hoping for this when it happened I could hardly believe it—we did it!
What followed then was a huge disappointment. We learned that we would not receive the machine at the official ceremony at Café Stein but only a few weeks later, and what's worse in a different configuration: The 5 GB harddisk that was originally advertised may seem small today but would have been perfectly adequate back then, what we got instead was a machine with a much smaller harddisk, barely sufficient to hold the base operating system and multimedia tools, and no CD-ROM drive to install software from.
Filesystem Type kbytes use avail %use Mounted on
/dev/root efs 439704 408189 31515 93% /
Now the Indy came with great connectivity already, including Ethernet and ISDN ports, only my home office had neither and upgrading the machine with more memory, a larger harddisk and a CD-ROM drive (from Silicon Graphics only, others would not boot!) was too expensive an option. We could have sold the Indy, probably for a good price. Seriously though, if you got an Indy, would you sell it? (Don't answer, please.)
So for many years this marvel of technology has been putting on dust and remained unused. When I booted the Indy today it started up nicely, only issuing one warning message: “WARNING: clock gained 1856 days”
The auction has a few more days to go and already has six bids. It is about time that someone starts using this machine, and time for me to say Goodbye. It has been a difficult relationship, and yet I will miss this electric-blue colored pizza box.
PS. At the age of fifteen the Indy is still a modern computer. For some really old computers, have a look at the Old Computers online museum.
Labels: personal, technology
Monday, January 21, 2008
No wonder that this world blows itself up
While standing in line at the supermarket today, I overheard a lively discussion between the cashier and a customer who complained about not getting the discount price advertised on the rack.
This supermarket chain runs a fairly elaborate customer loyalty program, with some discounts applying only to members of the program. There used to be some problems in the past with keeping the signs and the computer systems in sync but not this time. There was no technical problem here, just an oversight on the customer's part.
The customer eventually agreed that the discount wasn't applicable, since she was not and did not want to join the customer loyalty program, and decided to return the tomatoes, mumbling something along the lines of "Everything is getting so much more complicated, no wonder that this world blows itself up."
Now I wouldn't consider the customer loyalty program a serious threat to the world, and actually enjoy the benefits offered, although it means knowingly giving up some privacy in exchange for discounts. (I will gladly post my grocery shopping list here too if someone is interested :-))
Scanner cash registers and storing membership information electronically on the ATM card are certainly vast improvements in usability and convenience over the old manual cash registers (I do remember checking my weekly grocery bill for errors back when I was a student, a rather slow process given the long list of just prices, but it was worth the effort more than once) and collecting discount coupons.
Those of us working in a technology industry should remember though that not everyone will want to or have the ability to adopt new technologies, and those who opt out must not be left behind.
Otherwise, this world will blow itself up ...
This supermarket chain runs a fairly elaborate customer loyalty program, with some discounts applying only to members of the program. There used to be some problems in the past with keeping the signs and the computer systems in sync but not this time. There was no technical problem here, just an oversight on the customer's part.
The customer eventually agreed that the discount wasn't applicable, since she was not and did not want to join the customer loyalty program, and decided to return the tomatoes, mumbling something along the lines of "Everything is getting so much more complicated, no wonder that this world blows itself up."
Now I wouldn't consider the customer loyalty program a serious threat to the world, and actually enjoy the benefits offered, although it means knowingly giving up some privacy in exchange for discounts. (I will gladly post my grocery shopping list here too if someone is interested :-))
Scanner cash registers and storing membership information electronically on the ATM card are certainly vast improvements in usability and convenience over the old manual cash registers (I do remember checking my weekly grocery bill for errors back when I was a student, a rather slow process given the long list of just prices, but it was worth the effort more than once) and collecting discount coupons.
Those of us working in a technology industry should remember though that not everyone will want to or have the ability to adopt new technologies, and those who opt out must not be left behind.
Otherwise, this world will blow itself up ...
Labels: technology, usability
Saturday, January 19, 2008
localhost considered harmful
Tavis Ormandy has posted a potential security exposure with DNS entries for "localhost" in zone files on Bugtraq. While the impact of this exposure seems minimal, I would rather err on the side of caution, and this should be fairly easy to fix.
"localhost" DNS records in a domain should not be confused with the ".localhost" TLD defined in RFC 2606 Reserved Top Level DNS Names, and should be configured on nameservers. I haven't been able to find a requirement in the RFCs to have a "localhost" entry in a domain, nor can I think of a compelling reason for keeping the entry as long as nameservers for a domain are properly configured to handle queries for "localhost.".
RFC 1912 Common DNS Errors explains how to configure the localhost and 0.0.127.in-addr.arpa zones:
and recommends to not define "localhost" with the domain name appended.
Thoughts on removing "localhost" from zones, anyone?
"localhost" DNS records in a domain should not be confused with the ".localhost" TLD defined in RFC 2606 Reserved Top Level DNS Names, and should be configured on nameservers. I haven't been able to find a requirement in the RFCs to have a "localhost" entry in a domain, nor can I think of a compelling reason for keeping the entry as long as nameservers for a domain are properly configured to handle queries for "localhost.".
RFC 1912 Common DNS Errors explains how to configure the localhost and 0.0.127.in-addr.arpa zones:
The "localhost" address is a "special" address which always refers to
the local host. It should contain the following line:
localhost. IN A 127.0.0.1
The "127.0" file should contain the line:
1 PTR localhost.
and recommends to not define "localhost" with the domain name appended.
Thoughts on removing "localhost" from zones, anyone?
Labels: security, technology
Monday, January 14, 2008
Blogger
Choosing a hosted service for blogging was a matter of a few minutes, and it didn't involve working through feature lists and comparison charts.
I started playing with Blogger and within minutes had a basic template and publishing to my Web server working. The template language looked sufficiently flexible, and the backing by search giant Google made this an attractive choice too.
WordPress would have been next on my review list. The hosted options are probably comparable, with WordPress offering some advanced features for a fee. Anita Campbell has published a great article about moving a blog from Blogger to WordPress, citing a number of good reasons why the latter is a much better option, although Blogger was “simple to set up and use”. Good enough for me.
One minor limitation I noticed is that Blogger only creates a single XML feed but no category feeds, which can be created easily using the rich Blogger data API.
The only complaint I have about Blogger is the incorrect rendering of ampersand and angle quotes:
They are represented correctly as entities in the XML feed, but rendered as plain characters in the HTML version. This looks like a bug that should be easy enough to fix.
I started playing with Blogger and within minutes had a basic template and publishing to my Web server working. The template language looked sufficiently flexible, and the backing by search giant Google made this an attractive choice too.
WordPress would have been next on my review list. The hosted options are probably comparable, with WordPress offering some advanced features for a fee. Anita Campbell has published a great article about moving a blog from Blogger to WordPress, citing a number of good reasons why the latter is a much better option, although Blogger was “simple to set up and use”. Good enough for me.
One minor limitation I noticed is that Blogger only creates a single XML feed but no category feeds, which can be created easily using the rich Blogger data API.
The only complaint I have about Blogger is the incorrect rendering of ampersand and angle quotes:
- Ampersand: &
- Angle bracket open: <
- Angle bracket close: >
They are represented correctly as entities in the XML feed, but rendered as plain characters in the HTML version. This looks like a bug that should be easy enough to fix.
Labels: google, technology
Sunday, January 13, 2008
IG-L
When we spent our summer vacation in Sicily in 2004, I often wondered why some road signs in Sicily listed detailed information about the relevant laws and even the specific section and paragraph of the act.
Since 2006, the immission control act Immissionsschutzgesetz-Luft (IG-L) has been enacted in Austria, which allows authorities to impose certain restrictions on production facilities, traffic, and outdoor combustion to reduce immissions when pollution thresholds are exceeded.
The act requires that immission control related speed limit must be signposted with reference to the act. On previous trips between Vienna and Salzburg I had complained about the unnecessary distraction by additional signs; after all I don't usually care why a speed limit has been put in place, although there is evidence that drivers are more likely to adhere to environmentally motivated speed limits (source: Luftreinhalteplan Stuttgart), and lower speeds generally mean lower emissions (source: Land Tirol: Tempo 100).
One set of road signs around Linz looks especially bizarre: a combination of lifting the 100 km/h speed limit and introducing a 100 km/h speed limit for immission control, and vice versa in the opposite direction.
Recently some of the roadsigns were replaced with large over-the-road displays which allow for dynamic speed limits depending on weather conditions, traffic flow and pollution levels, which is goodness. I wonder though how many drivers will have a clue what the big white letters IG-L next to the speed limit signs mean ...
Since 2006, the immission control act Immissionsschutzgesetz-Luft (IG-L) has been enacted in Austria, which allows authorities to impose certain restrictions on production facilities, traffic, and outdoor combustion to reduce immissions when pollution thresholds are exceeded.
The act requires that immission control related speed limit must be signposted with reference to the act. On previous trips between Vienna and Salzburg I had complained about the unnecessary distraction by additional signs; after all I don't usually care why a speed limit has been put in place, although there is evidence that drivers are more likely to adhere to environmentally motivated speed limits (source: Luftreinhalteplan Stuttgart), and lower speeds generally mean lower emissions (source: Land Tirol: Tempo 100).
One set of road signs around Linz looks especially bizarre: a combination of lifting the 100 km/h speed limit and introducing a 100 km/h speed limit for immission control, and vice versa in the opposite direction.
Recently some of the roadsigns were replaced with large over-the-road displays which allow for dynamic speed limits depending on weather conditions, traffic flow and pollution levels, which is goodness. I wonder though how many drivers will have a clue what the big white letters IG-L next to the speed limit signs mean ...
Labels: technology, travel