Okay, I’m back, still without cataract surgery but I have the fonts cranked-up on this notebook and my one working eye is still, well, working so I am, too. My next column will be about last week’s Internet DNS failure but right now I want to write about all these folks who have been asking to connect with me on Facebook, LinkedIn, and other social media. I’ll bet you have the same problems that I do.
Once you have enough connections (I have 2785 Facebook "friends" and 2552 "connections" on LinkedIn) you become a target for people trying to build their networks. In the beginning my philosophy about these things was to never ask anyone to be my friend or my connection but to always accept any friend or connection requests. I didn’t feel I was taking advantage of anyone yet my networks grew nicely, though I’d hardly met any of these people in real life.
Fifteen years after 9-11 it’s interesting to reflect on how much our lives have -- and haven’t -- changed as a result of that attack. One very obvious change for all of us since 9-11 is how much more connected we are to the world and to each other than we were back then. Politico has a great post quoting many of the people flying on Air Force One that day with President George W. Bush as his administration reacted to the unfolding events. Reading the story one thing that struck me was the lack of immediate information about the attacks available to the airborne White House. They had televisions with rabbit ear antennas and rarely more than a few minutes of TV coverage to watch at a time as they blasted around the midwest at mach 0.94.
Even Mary Alyce and I, sitting on our Wine Country hillside, were watching satellite TV that day. Today, of course, we all have news and social media coming-in through a wide variety of channels and nothing is very private for long.
I have a TV producer friend I worked with years ago who at some point landed as one of the many producers of American Idol when that singing show was a monster hit dominating U.S. television. She later told me an interesting story about Carrie Underwood, the country-western singer who won American Idol Season 4. That story can stand as a lesson applicable to far more than just TV talent shows. It’s especially useful for the purposes of this column for explaining IBM’s Watson technology and associated products.
You see the producers of American Idol Season 4 knew before the season was half over that Underwood would win. And, by the same token, I’m about to argue that IBM already knows that its Watson artificial intelligence technology has lost. In each case they chose not to tell us.
I wouldn’t normally be writing a column early on a Saturday but I just read that John Ellenby died and I think that’s really worth mentioning because Ellenby changed all our lives and especially mine.
If you don’t recognize his name, John Ellenby was a British computer engineer who came to Xerox PARC in the 1970s to manufacture the Xerox Alto, the first graphical workstation. He left Xerox in the late 1980s to found Grid Systems, makers of the Compass -- the first full-service laptop computer. In the 1990s he founded Agilis, which made arguably the first handheld mobile phone that wasn’t the size of a brick. Finally he set up a company in both New Zealand and San Francisco to do geographical mapping data before most of us even knew we needed it. The man pioneered four technology industry segments, putting him on the same level as Steve Jobs.
Twenty-one years ago, when we were shooting Triumph of the Nerds, the director, Paul Sen, introduced me to his cousin who was working at the time on a big Department of Transportation research program to build self-driving cars. Twenty-one years ago! Yet what goes around comes around and today there is nothing fresher than autonomous cars, artificial intelligence. You know, old stuff.
As you can see from this picture, driverless cars were tested by RCA and General Motors decades earlier, back in the 1950s.
Last week Moon Express, a contender for the Google Lunar X-Prize (GLXP), announced that the company had received interagency approval from the White House, Federal Aviation Administration (FAA), Department of State and other U.S. government agencies "for a maiden flight of its robotic spacecraft onto the Moon’s surface to make the first private landing on the Moon".
This heady announcement got a lot of press including this story I am linking to because it was in the New York Times, the USA’s so-called pape of record. If the Times writes "gets approval to put robotic lander on the Moon" it must be true. Only this story isn’t true. Yes, the FAA kinda-sorta gave Moon Express permission to land on the Moon. But by the same token, the FAA has no power to deny Moon Express -- or anyone -- the right to land on the Moon. It’s not in their jurisdiction.
Delta Airlines last night suffered a major power outage at its data center in Atlanta that led to a systemwide shutdown of its computer network, stranding airliners and canceling flights all over the world. You already know that. What you may not know, however, is the likely role in the crisis of IT outsourcing and offshoring.
Whatever the cause of the Delta Airlines power outage, data center recovery pretty much follows the same routine I used 30 years ago when I had a PDP-8 minicomputer living in my basement and heating my house. First you crawl around and find the power shut-off and turn off the power. I know there is no power but the point is that when power returns we don’t want a surge damaging equipment. Then you crawl around some more and turn off power to every individual device. Wait in the dark for power to be restored, either by the utility or a generator. Once power has been restored turn the main power switch back on then crawl back to every device, turning them back on in a specific order that follows your emergency plan. You do have an emergency plan, right? In the case of the PDP-8, toggle in the code to launch the boot PROM loader (yes, I have done this is complete darkness). Reboot all equipment and check for errors. Once everything is working well together then reconnect data to the outside world.
A few weeks ago I published a column here about online journalism. You may remember it from the picture of Jerry Seinfeld which I am using again here. While I have many readers in China, my work isn’t normally distributed there so I was surprised when a reader told me that column had been translated almost in its entirety and republished on a Chinese web site. How should I feel about this?
I might be flattered or I might be angry. Certainly the translation was not authorized by me and I received no payment for it. It goes far beyond the 250 word excerpt that is the day-to-day definition of Fair Use so it is a copyright violation. But the worst part, if Google Translate is to be believed, is that it doesn’t represent very well the ideas I was trying to present. Yet, having used my name and attributed the work to me, they are claiming this is what I wrote.
So Verizon is buying the heart of old Yahoo! I include the exclamation point because it was always there in the Yahoo! we knew back when the Internet was young. $4.83 billion in cash is a lot of cash, but for Verizon it’s a way of buying into the future while buying what to many of us seems to be the past.
So let’s get the business part out of the way: Verizon can see Yahoo! as a bargain because Yahoo! has nearly always been more profitable on a gross margin basis than Verizon, a phone company. Even Yahoo! in decline will pull Verizon up. But that’s not why I’m writing about Yahoo! I’m writing because a reader yesterday more or less suggested I do so. At the risk of my sounding like Donald Trump, the reader suggested I had been right all along about Yahoo!
SoftBank is buying ARM Holdings for $32 billion. Why would a company not presently in the semiconductor business spend 32 times sales to enter a new industry? By traditional measures it makes little sense. But for SoftBank it makes perfect sense, because here’s a company that has spent more than 30 years making high-risk bets on entering new businesses by apparently over-paying for assets. It’s the way they’ve always done it and it has nearly always worked. In this case SoftBank is paying a 43 percent premium over the recent ARM share price because that’s how much money it took to overcome the resistance of ARM management. And it’s just a guess on my part, but I’d say those very ARM managers are, for the most part, doomed. SoftBank isn’t buying ARM because Masayoshi Son is so impressed with ARM’s success: SoftBank is buying ARM because of what it can become.
The only way SoftBank can justify paying such a high price for ARM is if Mr. Son is about to change ARM’s business model.
A loyal reader of this column has come to me with a problem that I, in turn, am submitting to all of you. He sells downloadable software over the Internet but lately some customers have been ordering, paying, downloading, yet not requesting the required unlocking key to use their software. Money is piling-up in the reader’s PayPal account and he is starting to worry this is some kind of scam. But if it is, it’s a scam that’s new to me.
The first such order was placed on June 4th and there have been 20 such customers so far, though some of those customers have placed double orders so the total amount is $1,758. The reader is in the USA but the orders have come from Belgium, Norway, Switzerland, France, Germany, Austria, Sweden, Japan, and Israel. Nobody has requested an unlocking key and nobody has requested a refund.
In part one we learned about data and how it can be used to find knowledge or meaning. Part two explained the term Big Data and showed how it became an industry mainly in response to economic forces. This is part three, where it all has to fit together and make sense -- rueful, sometimes ironic, and occasionally frightening sense. You see our technological, business, and even social futures are being redefined right now by Big Data in ways we are only now coming to understand and may no longer be able to control.
Whether the analysis is done by a supercomputer or using a hand-written table compiled in 1665 from the Bills of Mortality, some aspects of Big Data have been with us far longer than we realize.
In Part one of this series of columns we learned about data and how computers can be used for finding meaning in large data sets. We even saw a hint of what we might call Big Data at Amazon.com in the mid-1990s, as that company stretched technology to observe and record in real time everything its tens of thousands of simultaneous users were doing. Pretty impressive, but not really Big Data, more like Bigish Data.
The real Big Data of that era was already being gathered by outfits like the U.S. National Security Agency (NSA) and the UK Government Communications Headquarters (GCHQ) -- spy operations that were recording digital communications even though they had no easy way to decode and find meaning in it. Government tape libraries were being filled to overflowing with meaningless gibberish.
Big Data is Big News, a Big Deal, and Big Business, but what is it, really? What does Big Data even mean? To those in the thick of it, Big Data is obvious and I’m stupid for even asking the question. But those in the thick of Big Data find most people stupid, don’t you? So just for a moment I’ll speak to those readers who are, like me, not in the thick of Big Data.
What does it mean? That’s what I am going to explore this week in what I am guessing will be three long columns.
Not very long ago I started answering questions on Quora, the question-and-answer site. My answers are mainly about aviation because that’s my great hobby and one of the few things besides high tech that I really know a lot about. But there was a question last week about Internet news coverage that I felt deserved better answers than it was getting.
So I contributed an answer that has been read, so far, only 388 times. I don’t like making a real effort that is so sparsely read. So here, with a little mild editing, is my answer to "What are the flaws in online journalism and media today?" And "How can they be addressed?"