Showing posts with label computers. Show all posts
Showing posts with label computers. Show all posts

2021-04-28

Do I make sense?

I’d had a video automatically transcribed. I presume all kinds of AI jiggery-pokery had gone into turning audio frequencies into text—it was clear that the transcription engine was aware that a lot of hemming and hawing could be deleted, on the other hand not-quite-silences could be extrapolated into what probably was being said. A few times this worked amazingly well, but all too often the resulting text was nonsense. I was going to blame this on the lack of deep understanding on the part of the transcription engine, but as I replayed and replayed the same five second clip, trying to hear what was being said, by myself, I came to wonder: Is this actually what my students hear when I lecture—words that may be grammatically correctly connected, but rarely make any sense?

2019-08-06

Who cares about categories anyway?

I’ve often wondered about the way books in the Amazon web shop get categorised, and this latest set of recommended reading suggests they have a very liberal attitude to contents.

2011-02-21

All in a day’s work


Getting my work done: Testing software on both Windows XP and Windows 7, and the Linux box in the middle to actually work on. Not visible in this picture is the Mac on the other table.

2010-10-14

Jobshead

My new 15" MacBook Pro has arrived! Somehow every Mac generation manages to be better-looking than the previous one. The touchpad is soft as silk and the screen so sharp.

The one blemish so far has been the step in the installation process where I was to transfer all the information from my old Mac: thanks to the still-living connector conspiracy the FireWire cable I’d borrowed from the office only fit the old Mac. The little manual implied that you could transfer wirelessly, but it wasn’t entirely obvious that I was supposed to press the little button “Use Ethernet” to get to another screen where I could select “Use wireless”, especially when the on-screen instructions exhorted me to press “Previous” in the case that I didn’t have a FireWire cable. Then it took all night and a bit to transfer all the data, but now it’s done and I’m happy as a lark with my new machine.


I take that back: it’s not just silky, the touchpad is like an antigravity surface and when I moved my fingers apart it scaled the contents of my browser window! At this rate I’ll have to buy an iPhone soon.

2010-09-26

Multicultural

Recently I had reason to register on a work-related web forum, so I went through the usual process of entering a handle, give my email address and then I got a CAPTCHA to ascertain that I was a real human. It gave me some pause, as half the characters I was required to enter were in Greek. Had I been on a Mac, it wouldn't have been much of a problem, but on my work Linux box I had no idea how to input the required text. Fortunately requesting a new challenge generated an ISO Latin-1-only string and I could proceed.

I wonder about the implementation of the CAPTCHA—did it really generate strings of random Unicode characters? Probably not, since the first half of the string was fully in Greek, and the latter fully in Latin characters, rather than a jumble of Chinese, Indic and Runic characters. So, if there was a restriction to certain character sets, why combine two different alphabets? Or was the implementation from a distant perspective of “Since these are all European characters, they can be generated on a European keyboard, right?” Or possibly just somebody being deliberately difficult. I know the kind, I am one of them…

2010-07-05

Special people for special baggage

Once we at the lab were going to an important conference to demonstrate some multimodal interaction and thus had to bring quite a bit of Fragile and Expensive Equipment with us. We packed it as carefully as we could, wrapping stuff in layers of our underwear, bubble wrap, foam peanuts and other soft items we could find. Then off we went to Arlanda and as we checked in we explained we had Fragile Things with us, so could they please be extra careful with them?
“Oh, then you must take it to Special Baggage around the corner there. Here’s some FRAGILE tape for you to mark your boxes with.”
We criss-crossed the box with red-and-black FRAGILE markings and then went around the corner to Special Baggage. Nobody there. We looked around a bit and went:
“Ho-hoo! Anybody heere?”
Presently a lady came out, looking very bored and continuing to look bored while she had us put our box on a conveyor belt and supplied it with the necessary bar codes.
Then she started the belt. We looked curiously as the box slowly moved towards a rubber curtain at one end of the room and then started parting the curtain so we could see beyond it. NOOOOOO!!! I threw myself towards the curtain and the π/4 incline beyond it. Too late, we could just watch in dismay as the box tumbled end over end down the seemingly infinite belt. The baggage lady barely bothered to look up at the commotion, but wore an expression of dull incomprehension: what were we going on about?

It was with some trepidation that we unpacked our precious box at our destination, but our careful wrapping had paid off and everything was in fact unharmed.

Now, many years later, I was again at Arlanda (I know, I know, but at least I’ve had planted 80 trees in Africa as an attempt at expiation) and, as usual, belatedly realised that my army knife had somehow returned to my pocket from the big bag that I had already checked in. What to do? Better put the knife in the backpack I had intended to carry on board and check it in. I return to the baggage drop and explain the situation and note I have fragile stuff in the backpack (the work laptop, some stuff supposedly couldn’t wait until after the vacation).
“Oh, then you should take it to Special Baggage over there.”
I take the backpack over to Special Baggage, where the guy at the counter x-rays it and notes I have a knife in the bag. Indeed. All contents of the bag are clearly visible on the display.

Off we fly and when we have arrived, refreshed ourselves and all that, I pick up the laptop to have a look at the latest messages. Oh, foo! The screen is cracked. Somewhat incensed I navigate a number of answering machines until I get hold of a person at SAS Baggage Handling. No, no, computers are not allowed in checked-in baggage, it’s all my own fault if anything got broken, and clearly their check-in staff has no responsibility to inform anyone of anything. Aargh!

Trains it is for the future!

2010-01-15

Discard this card

Sending out invitations for a conference, I went through the stack of business cards I’ve collected over the last twenty-odd years. There’s always a few that need to be pruned because email addresses are no longer valid or the persons have moved on to new lines of work. This year I was casting the net wide, looking for participants from all countries, and got to look at cards I don’t often consider, some of them old enough that they didn't have web addresses on them, some even so old they didn’t have email addresses on them.

I could see the cycles of IT booms and busts, some companies had hardly registered in computer history at all, some subsidiaries were brief footnotes in corporate histories from when the European market was thought to be larger than it ended up being, some did still exist, but my contacts were long gone. Web sites were nonexistent, or parked with domain name suppliers, or in some cases taken up by completely different companies who had quite independently, much later dreamt up what they thought was a witty and creative name. Then again, there were small companies who had weathered all upheavals, and still sat on email addresses with names reminiscent of dial-up connections and 2400 baud modems.

In the end I ended up with a small stack of cards whose historical value I briefly considered, but that I finally tossed in the recycling bag. Probably I will collect new cards at the conference, the little physical tokens still seem to be popular, even though I have long had electronic business cards to be Bluetoothed or IR-linked away.

2009-10-14

Coolth failure

Visiting my mother I had occasion to watch tv and it so happened that TV6 was running Johnny Mnemonic and I decided to watch. Commercial television, why hasn't it been outlawed yet? Commercial breaks chopping up the plot and I'm pretty sure they actually lost bits of the film, making it even more jarring. Even allowing for that, I was rather disappointed and even more so when I saw that William Gibson himself had written the screenplay, so no corporate script wrangler could be blamed for the results.

The main fault lies in the lack of cool. A major theme in Gibson's cyberpunk works is being cool, and Japanese vatgrown ninjas are the coolest of them all. The Yakuza are maximally inscrutable Orientals with infinite patience. In the original short story there is only one Yakuza assassin and that's because he's so utterly deadly on his own no more are needed—grenade launchers and assault guns are too crude and inelegant to be even contemplated. And Molly (in the film replaced by Jane with uncool shakes for copyright reasons!) shows her übercool by whipping the assassin's ass.

And that the data that Johnny is carrying happens to be the cure to all the world's woes? Please…

I briefly considered the point in having a person carry around data in their head, but to be sure, in many cases moving physical media around is faster than wire transfer and for stolen data it makes sense to hide the data inside the person. But the nosebleed effect of stuffing data in your head? It's not like the memory chip grows bigger with the data, you know…

Then of course, technology marches on and having information being faxed in 2021 made me laugh almost as much as the exhortation “Turn on your VCRs!”. The 320 GiB Johnny crams into his head were still upgraded a thousandfold from the “several hundred megabytes” he carried in the original story. And the virtual reality scenes? Too incoherent, but then Gibson never had a really coherent explanation of cyberspace anyway.

2009-08-27

Back online

Worn power cable
My laptops have to work for their keep and tend to get rather banged up with time. Now, the little LED ring on the charger plug did not light up when I plugged it in. Weird, I thought and jiggled it. No reaction. So I looked at the transformer block and indeed the wire insulation looked rather worn there. A bad connection? I jiggled the cable. Hmm, it's rather warmish, it's…actually emitting smoke! I quickly unplugged the lot. So, worn-through insulation and a consequent short-circuit. Nothing doing, scrap the transformer. Then on to eBay to find a replacement (try to buy a brand new one for an end-of-lifed model from Apple Store, not a chance). I located one in Hongkong, and bought it there and then for a quite small sum. Unfortunately this meant the delivery took some time, but today it arrived. I'm a bit suspicious: while there is an Apple logo on the box, the plastic doesn't feel quite Applish and there is no LED ring on the plug, so possibly it is a pirated copy, but it seems to work and my laptop is up and humming again. For the moment, until the disk gives out or something else burns.

2009-06-14

Not a bot

In high school we declared the computer room to be an independent country (mostly due to a contrived joke on my part, which we need not go further into) and as such we needed a national anthem. The then-current hit “Systems breaking down” fit the bill perfectly. It's been unavailable for long, but now has resurfaced on YouTube, and I just can't have too much 1980s synth pop on this blog.

2009-02-09

Not even running in circles

I was debugging an application somebody had created in framework X when I ran into a parameter I hadn't seen before so I wondered what it might do and what its legal values might be. I looked up the function in the manual. The entry for the function referred me to the separate manual for command line functions. I retrieved that manual and located the relevant chapter. It referred me to the man page for the function. I typed in man function and the man page referred me to the online help in the function. I typed function help and got the explanation that the parameter does, in fact, exist.

(Names redacted to protect me from the guilty, but their name ends with “pple”…)

2009-01-29

Discriminated against, again!

I decided I need an electronic ID. Can I get one? Sure, it doesn't cost anything, except…I have to run Windows, and I have to run Internet Exploder.

I feel very much like kicking someone.

2008-12-20

Technology is beautiful

I got this Christmas card from my friends at the Center for Parallel Computers.

Network cables coming out of a computing cluster.

2008-10-08

Films

Last week I managed to go the cinema twice in different constellations.

Porco Rosso could have been scripted by Richard Bach in its pæan to the joy and beauty of flying. The delicate drawing style of the Miyasaki studio is perfectly suited for the clean and elegant 1920s seaplanes and the characters' equally light and slim summer clothes, all set against the eternally sunlit blues of the Adriatic Sea and the Mediterranean sky. Yes, in a world like this even pigs have to fly. And I have to build more Macchi seaplanes.

Then WALL·E. Even though the rightful star was robbed of his role it is truly what I call a “holding-hands movie”—in several senses. We even find that by holding hands you can restore from backups you hadn't made. It is also a very Mac-friendly movie, EVE is clearly an iRobot (not the same as I, Robot) and apparently WALL·E runs some latter-day version of MacOS. That there are major plot inconsistencies is less of a problem. And of course the computer graphics are absolutely stunning, in particular when you don't even notice them unless you're knowledgeable enough to realise that every frame is the result of some really complex programming and extremely heavy computation.

2008-09-13

With determined steps towards the chasm

I have not been very productive at work lately. This is how it has gone:
It has been a fairly hot summer at times and the fans in my laptop got to sound squeakier and squeakier—worn out presumably. I got a repair ticket prepared at the company that does our hardware service and thought I'd drop off the laptop as I went on holidays. The last two weeks before this date the laptop in addition became very very slow, showing a beachball per keypress on average. Well, presumably this would be fixed during service.

So, I went on hols and dropped off the laptop at service. I also specifically requested they'd do a backup of the contents (separately priced option).

When I came back from holidays, the laptop had not been fixed. Call and remind them. A couple of days later I got a call that it was done. I went and picked it up. Yes, the fans were now smooth and silent. However, it was still very slow. Call service guys: “Thanks for the fans, but the laptop is running very slowly, didn't you notice that when you tested it?” “No, we just tested the fans.” “You could hardly have turned it on without noticing…” “You probably just need to reinstall the system.”

Hmm, that would be a major operation. Well, but why might it be running so slowly to begin with? Poke around console logs and error messages. Hmm, here's a weird message being emitted every ten seconds, but what does it mean? Google for relevant bits and find discussion on blogs: “The disk has been overheated, get a new one.” Oh, I can still read from the disk, but apparently it's going to get worse. OK, so I need a new disk. I'd better call the service guys again: “Hi, it seems I need to replace the hard disk, lucky that you have a fresh backup for me!” “Uhmm, eh, actually, no, we don't.” “What? But I asked for a backup and you said you keep them around for two to three weeks.” “Uh, eh, well, no, we wiped it, uh, yesterday. Probably we were running out of disk space.”

Effing brill! OK, now what? I'll have to do a backup of my own. Procure disk. Yeah, this has an earlier backup of mine on it, but I'll have to throw it away to fit in the new backup. (Simplification of the real reasons, but the result is the same.) Done. Now, to start the backup. *grind* *grind* *grind* Eventually it is clear that at this rate of performance it will take approximately two weeks to back up my hard disk, unless it breaks down finally first. Well, what to do? Grin and bear it. I wonder how the service guys managed to make a backup in less than a day. Yet another call gives only vague and clearly unworkable answers.

A consequence of the backup is that I can't lock up the laptop in the safe for the night, as the two-week estimate is based on uninterrupted transfer. Well, what to do? So this goes on for a week and a half, and then when I get in one morning I meet a grinning colleague: “Guess whose laptop got stolen in the burglary last night?” Of course… And while the burglars had been as cock-snookingly polite as to leave the external hard disk on the table, the interrupted backup had been corrupted and was unreadable.

*sigh* Now what? “Maybe you can take the little white one?” OK. Hmm, it seems hung somehow. “Yeah, it's a bit dodgy, you have to do a remote install on it to get it running.” Install. Install. Incompatibility. Re-install. When I finally am on the way to get things up and running, the dreaded lurgy strikes and I'm bedridden. Now I'm on my second week of coughing, missing deadlines left and right.

Life, don't talk to me about Life!

2008-08-17

Sittin' on the dock of the bay

A friend, dearly beloved not only by me but many others, turned forty yesterday and the circle of friends was quietly convened for a surprise party in the archipelago. Like champagne-toting ninjas all converged on the island cottage where the unsuspecting target was spending the day and suddenly burst into the living room, waving glasses and handing over presents. Food and drink was prepared and consumed.

A group like this, composed almost exclusively of programmers and system administrators, has its own special way of talking, not only in its choice of subjects, where the mere mention of a software version number causes meaning nods, but in the way humour is applied, in rapid slap-downs of Stupidity, egregious examples of incompetence, shortsightedness, and inefficiency displayed for the others for comment and mocking, Technical Solutions to Social Problems proposed and elaborated. With few words, tips and suggestions were traded and arcane knowledge was passed on, keeping the networks running smoothly yet a while, holding chaos at bay. I silently marvelled at this concentration of intimidatingly skilled and bright people, invisibly doing their part to keep civilization intact.

A contingent left with the last boat to the mainland, the rest continued talking yet a while, but well after midnight withdrew to berths on their boats. A final group of hardy and close friends stayed up talking and singing. My last memories are of ”Balladen om briggen Blue Bird av Hull” being sung some time around three in the morning as I lay in my sleeping bag in the loft.

A few hours later it was time for me to groggily get up and catch the first morning boat. All alone in the fresh dawn I walked the short distance through the fir copses down to the jetty, raised the semaphor to flag down the boat and sat down on the jetty to wait, squinting in the near-horizontal sunlight.

I reflected that I was on the north side of the island where the glacial ice sheets once had come and scoured the rocks smooth, on the south side the rocks would be more broken up as the ice had left the island there. So you should be able to tell compass directions by looking at how smooth the rocks are, much in the same manner as locating ant hills or where the boughs are densest on the trees.

Then came the boat that took me to the bus that took me into town.

2008-06-18

I was there


Why was I there?

The intrusion into my privacy, which privacy is dear to me, is one thing, though I suspect that I personally for the most part am insignificant, blond and paleskinned enough not to arouse the curiosity of data analysts, but at some point it is even more important to me that the proposed communications interception law is yet another step in a culture of fear. One can make—and certainly they are made—elaborate conspiracy theories about how this fear is nourished by shady characters in order to further their nefarious goals, but I do not think such conspiracies are necessary, Hanlon's razor applies here as elsewhere. Peter Englund has written about the internal logics of the situation, where the ability and possibility to eavesdrop on all communication necessitates that one does so. The reasons for this can then be made up afterwards. The reason currently in fashion is terrorism. In the previous century it would have been Bolshevism.

Lately I have been reading up on the origins of the Western European dictatorships of the 20th Century. It has struck me how the threat of Communism was used to get the influential people: the industrial magnates, the clergy, the army, to go along with the numerically very small movements of Phalangism, Fascism, Nazism, … One could perhaps argue that this external anti-Communism even abetted the totalitarian dictatorship of the Soviet Union by justifying the oppression as defence against infiltration by external enemies—but yet again, by the logic of the situation, an enemy would have been found if none had naturally presented itself. And thus these attempts to stem the awful plans of the enemy have caused the violent (or indirect) deaths of tens of millions of people throughout the 20th Century. The fending off of fear seems to be worse than the actual object of fear.

This is already happening again—or perhaps still, but now with a different label for the phenomenon to be feared. Certainly international terrorism has not yet managed to kill as many as the at least hundred thousand that are now dead in the War on Terror, and almost the same number of people have been imprisoned without trial, in many cases subject to torture even according to the rather lax standards of the US President.

This is why I oppose the eavesdropping law, as I see it as yet another attempt to play on fear, in such a way that the costs in all likelihood will greatly exceed the costs of any attack that may be perpetrated.

And finally, the law does of course nothing in the way of actually protecting Sweden against electronic threats. Should we be subject to a concerted cyber-attack, such as the one recently waged against Estonia, we will be caught with our trousers at just as inconvenient a height as before the enactment of the disputed law. So just whose security are we concerned with?

(Apparently I am very angry—my readability index is lower than ever.)

2008-06-07

I foresee ergonomics issues

My first idea when I got the opportunity to work with the VPL DataGlove was to create a virtual keyboard. My plan was that it should be able to edit all aspects of the keyboard layout—the precise keys, where they were located in space and to have nifty functions to edit the layout so that one didn't necessarily have to lay out each key individually. To my disappointment the position sensors on the glove had neither the resolution nor speed necessary for typing, nor did the software handle collision detection well for so many objects, so when I realised that even a numerical keypad would require keys several centimetres across that could be pressed only once every few seconds or so, I gave up the idea.

Now I'm sorely tempted by the Virtual Laser Keyboard. Just the thing—a perfectly “soft” keyboard with optical tracking and wireless connection to your computer/PDA/mobile phone. Unfortunately the specs only say state that it has a QWERTY layout, so the risk is that the keyboard layout is locked in ROM, rather than being configurable, which would be a pity.

Then of course, there is the issue of typing on an unyielding surface, which brings down speed and accuracy, but I still could imagine trying it out.