Robert X. Cringely

I was, uh, wrong: Chromecast does what Google claims

FallonChrome-225x300

A couple weeks ago when Google introduced its Chromecast HDMI dongle I wrote a column wondering whether it was really such a good product or simply good demoware? Now that I have my own Chromecast and have been playing with it for a few days I have to admit I was wrong. Chromecast appears to be every bit as good as Google claims. That’s not to say it’s perfect (more below) but pretty darned good.

What I really doubted was Google’s claim that the Chromecast could turn on your HDTV, switch the HDMI input, and throw content onto the big screen all in one seamless succession of events. It wasn’t that any of these tasks were especially difficult to do, but that to do them all on every HDTV would require more remote control capability than I knew existed in any current device.

Continue reading

Advice 5 cents: The role of mentoring in Silicon Valley

mentor

This past weekend I was invited to spend an hour talking about Silicon Valley business with a group of MBA students from Russia. They were on a junket to Palo Alto from the Moscow School of Management Skolkovo. I did my thing, insulting as many people and companies as possible, the students listened politely, and at the end there were a few questions, though not nearly as many as I had hoped for.

If you've ever heard one of my presentations the most fun tends to take place during the Q&A. That's because I can't know in advance what a group really cares about but in the Q&A they can tell me and sometimes we learn a thing or two. One question really surprised me and inspired this column: "In Silicon Valley," the MBA student asked, "it seems that mentoring is an important part of learning business and getting ahead, yet mentoring is unknown in Russia. How does it work when there is no obvious reward for the mentor? Why do people do it?"

Continue reading

Microsoft, Ballmer, and the end of the PC era

Steve-Ballmer2

So Steve Ballmer is leaving Microsoft a year from now: what kind of schedule is that? It’s one thing, I suppose, for a company to point out that it has a retirement policy or a succession plan, or even to just give the universe of potential Microsoft CEOs a heads-up that the job is coming open, but I don’t think that’s what this is about at all. It’s about the stock.

Like in baseball, when all else fails to get the team out of a slump, fire the manager. And sure enough, Microsoft shares are up eight percent as I write. Ballmer himself is $1 billion richer than he was yesterday. I wonder if he had cleaned out his desk this afternoon whether it would have been $2 billion?

Continue reading

Ashton Kutcher's Steve Jobs somehow misses the whole point

steveashton-300x237

While Mary Alyce and the boys were in Theater 7 this weekend watching Percy Jackson: Sea of Monsters ("Needs more monsters," says Fallon, age 7) I was in Theater 2 watching Jobs, the Ashton Kutcher film about Steve Jobs ("Has enough monsters," says Bob, age 60).

I know the Jobs story fairly well having, well, lived some of it, but people have been asking me about the film so I thought I should check it out. Critics have not been kind and Steve Wozniak said he wouldn't recommend it. I can see why.

Continue reading

Eisenhower, Snowden and the military industrial complex

eisenhower-farewell-300x207

Fifty-two years ago, three days before he left office and retired from Washington, U.S. President Dwight D. Eisenhower addressed the nation on television with what he called "a message of leave-taking and farewell, and to share a few final thoughts…"

This came to be called Eisenhower’s military-industrial complex speech and was unlike any other address by Eisenhower or, indeed, by any of his predecessors. You can read the entire speech (it isn’t very long) here, or even watch it here, but I’ve also included below what I believe to be the most important passage:

Continue reading

Fulfilling customer requirements is a weapon at IBM

homing missile

There are several new data points this week in the ongoing cratering of IBM as an IT vendor. The state of Pennsylvania cancelled an unemployment compensation system contract that was 42 months behind and $60 million over budget. Big Blue has been banned from the Australian state of Queensland after botching a $6.9 million SAP project that will now reportedly cost the people of Queensland $A1.2 billion to fix. That’s some botch.

Credit Suisse analyst Kulbinder Garcha says IBM has a cash flow problem and downgraded the stock. At IBM’s Systems & Technology Group, management announced to employees a one week mandatory furlough at the end of August or beginning of September. And finally, I’m told that there is now a filter on the IBM corporate e-mail system that flags any messages that contain the word Cringely. I’m flattered.

Continue reading

Is cyber insurance AAA for data or another back door?

Insurance

A few days ago I promised "tomorrow" a column about the future of data security. Then, just as the electrons were flowing on that DefCon column, I bought on eBay a 1978 GMC Royale motorhome in Bismarck, North Dakota that Channing and I have been trying to bring home ever since. We’ve so far broken down in Fargo, North Dakota (air suspension leak) and Brookings, South Dakota (ignition failure), but are now back on the road headed for California. We met Rick, the tow truck driver who used to be a rodeo bull rider, and Wayne Westerberg, the RV mechanic who gave up his Friday night to get us back on the road. Try Googling Wayne’s name for a surreal component to this adventure, which I’m sure is far from being over.

Back to data security. That DefCon column was about the simple days of hacking and cracking 20 years ago -- a time when the only person really making money from data security on the consumer side was probably John McAfee. So much has changed since then. Today billions are lost and stolen through thefts of both data and financial instruments. Data theft is being viewed as a military problem and the term cyber warfare is rampant (more about that in part three of this series, which I’ll write during our next breakdown). What we know for sure is that we can’t go home again: vulnerability will be part of the game as long as we as a culture choose to interact and do business online.

Continue reading

The origins of DefCon

hackers

This week we have the DefCon 20 and Black Hat computer security conferences in Las Vegas -- reasons enough for me to do 2-3 columns about computer security. These columns will be heading in a direction I don’t think you expect, but first please indulge my look back at the origin of these two conferences, which were started by the same guy, Jeff Moss, known 20 years ago as The Dark Tangent. Computer criminals and vigilantes today topple companies and governments, but 20 years ago it was just kids, or seemed to be. I should know, because I was there -- the only reporter to attend Def Con 1.

In those days there were no independent computer security research organizations. There were hackers, or more appropriately crackers, as they were known.

Continue reading

Google Chromecast -- Fabulous product or fabulous demo?

chromecast

Yesterday Google announced a product called Chromecast -- a $35 HDMI dongle that’s essentially YouTube’s answer to Apple TV. While the event was more Googlish than Applesque (the venue was too small, the screens were too small, the presenters weren’t polished, and as a result the laughs and applause didn’t come) the product itself was astonishing -- or appeared to be.

The press picked-up on the most obvious headline item in the announcement -- the $35 selling price which drops to $11 if you factor in three months of free Netflix per dongle even for existing Netflix customers (now sadly dropped). That’s like Google attaching an $8 bill to every Chromecast -- something Apple would never do.

Continue reading

So that’s how H-1B visa fraud is done!

nerd tablet geek surprise shock disbelief

Mark Surich was looking for a lawyer with Croatian connections to help with a family matter back in the old country. He Googled some candidate lawyers and in one search came up with this federal indictment. It makes very interesting reading and shows one way H-1B visa fraud can be conducted.

The lawyer under indictment is Marijan Cvjeticanin. Please understand that this is just an indictment, not a conviction. I’m not saying this guy is guilty of anything. My point here is to describe the crime of which he is accused, which I find very interesting. He could be innocent for all I know, but the crime, itself, is I think fairly common and worth understanding.

Continue reading

Georgia Tech’s $7,000 polyester masters in computer science

degree student

In case you missed it, the Rambling Wrecks of Georgia Tech will next year begin offering an online masters degree in computer science for a total price of just under $7,000 -- about 80 percent less than the current in-state tuition for an equivalent campus-based program. The degree program, offered in cooperation with AT&T and courseware company Udacity, will cost the same no matter where the students live, though two thirds are expected to live and work outside the USA. Time to complete the degree will vary but Georgia Tech thinks most students will require about three years to finish. The program is inspired, we’re told, by the current hiring crisis for computer science grads -- a crisis that anyone who reads this column knows does not exist.

Programmers in Bangalore will soon boast Georgia Tech degrees without even having a passport.

Continue reading

Edward Snowden is trying to be Daniel Ellsberg on Twitter

snowden

What are the differences between Edward Snowden, the NSA whistleblower, and Daniel Ellsberg, who released the Pentagon Papers back in 1971?

Not much, really, but the distinctions that do exist are key:

Continue reading

Doug Engelbart, visionary

Future Man Looking

To most people who recognize his name Doug Engelbart was the inventor of the computer mouse but he was much, much more than that. In addition to the mouse and the accompanying chord keyboard, Doug invented computer time sharing, network computing, graphical computing, the graphical user interface and (with apologies to Ted Nelson) hypertext links. And he invented all these things -- if by inventing we mean envisioning how they would work and work together to create the computing environments we know today -- while driving to work one day in 1950.

Doug had a vision of modern computing back in the day when many computers were still mechanical and user interfaces did not even exist. He saw in a flash not only the way we do things today but also the long list of tasks that had to be completed to get from there to here. Now that's vision.

Continue reading

IBM to customers: Your hand is staining my window

hand on window

A month ago I began hearing about impending layoffs at IBM, but what could I say beyond "layoffs are coming?" This time my first clues came not from American IBMers but from those working for Big Blue abroad. Big layoffs were coming, they feared, following an earnings shortfall that caused panic in Armonk with the prospect that IBM might after all miss its long-stated earnings target for 2015. Well the layoffs began hitting a couple weeks ago just before I went into an involuntary technical shutdown trying to move this rag from one host to another. So I, who like to be the first to break these stories, have to in this case write the second day lede: what does it all mean?

It means the IBM that many of us knew in the past is gone and the IBM of today has management that is, frankly, insane.

Continue reading

If it’s Ethernet versus Godzilla, then Godzilla is DOCSIS

ethernet fiber optic cable wire

Two weeks ago I was at the Computer History Museum to help observe the 40th anniversary of Ethernet. It was literally 40 years to the day since Bob Metcalfe drew his first sketches of what became the world’s dominant OSI Level 2 network technology. It was a fun and festive day that ended, believe it or not, with dancing. But some of the celebration didn’t make sense to me. Or, rather, it seemed to me that important parts of the discussion were missing.

When, for example, did 802.11 WiFi become a part of 802.3 Ethernet? That claim was made over and over during the day and helped power the argument that Ethernet is today a $100 billion business. Yeah, right.

Continue reading

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.