Oct 31, 2010 GMTOne of my favorite sayings has always been “You should eat your own dog food”. When applied to programming it quite simply means that you should use the code that you generate. I started saying this many years ago when I noticed that the Unix product managers at Digital Equipment Corporation were not using Unix in their day to day work. They had Microsoft Windows systems on their desktop, and would often go over to VMS to use “EDT” (the VMS text editor) for doing “real editing”. One product manager at a very high level even admitted to “hating Unix”, and when asked why they were the product manager of a product they hated said “Where else could I make this...
Paw Prints: Writings of the maddog
Oct 30, 2010 GMTRecently I was reading an article that was quoting Steve Jobs about how the Android phones from different manufacturers were all slightly different. He was pointing out that HTC and Motorola were putting on slightly different human interfaces and that this was crazy compared to his iPhone where all the phones were exactly the same. I started wondering what world Mr. Jobs lives in. Is it a world where every car is the same? Every house is the same? Do people shop around for different makes and models of things out of some type of twisted self-hate, or is it that people like to have choice in the way things look and work? As a software developer, I can appreciate the fact...
Oct 30, 2010 GMTReaders may have noticed that I have a theme lately regarding storage sizes, for example talking about disk drives and the TK50 tape drives. This was in anticipation of purchasing a new “laptop” computer, the first new one I have had in six years. More about that machine tomorrow. Recently I reached into the history museum of my mind and pulled out an old memory board from a VAX 11/780 that we used at Bell Laboratories in the time-frame of 1980. That VAX system used quarter- megabit integrated circuits on the memory boards for its main memory. Since the VAX used ECC correctable memory, it meant that each quarter megabyte of memory had eight chips for the actual data and a...
Oct 26, 2010 GMTUnix (and Linux) command line programs are like old friends. You get caught up in the day-to-day hustle of life and you may forget about them temporarily, but sooner or later you remember them and that warm feeling comes over you.... dd(1) is one of those programs that gives me a warm feeling. How simple dd(1) seems to most people, just reading in data at one end of the program and outputting the data at the other end, perhaps doing a little data blocking or unblocking and perhaps a little conversion. And of course a lot of us use dd(1) to clone disk drives and other “utility” tasks, because dd(1) is simple, fast and can work from a command line. Yet on two separate...
Oct 26, 2010 GMTThe TK50 was a cartridge tape and tape drive system launched by Digital Equipment Corporation in 1984. It was not the first cartridge tape that came out. 3M had developed a cartridge tape called “QIC” for “Quarter Inch Cartridge” in 1972, and our Unix systems supported that, but Digital also decided to create its own tape cartridge and drive, and of course it was deemed to be “proprietary”. For its day it was a competitive system: o it used a pocket-size tape cartridge (o.k....for a large, coat-sized pocket) o it used a “serpentine motion” which meant that it would write to the end of the tape, then shift the heads slightly and continue writing as the...
Sep 30, 2010 GMT"The Needs of the Many Must Outweigh the Needs of the Few..or the One." - Spock in “Star Trek: The Wrath of Khan” With those words Spock chose to die in order to save the rest of the crew. Philosophically whether you agree to what Spock said or not, an important part of the lesson was that Spock chose to act the way he did...he exercised choice. Sometimes developers inadvertantly do not offer as much choice to their customers as they should. For example, when we choose not to engineer and offer a clean upgrade path to a new version of a program or distribution. Many years ago I helped design a new "update" facility for Digital's Ultrix...
Sep 30, 2010 GMTI am the first person to admit that I am not an expert on security (o.k., there are probably several dozens of my friends who will gleefully “admit” that I am not an expert on security before I will), but I do know that storing passwords in clear-text is just not the way to go. Yet recent interactions with several web site management teams has shown me that apparently some people have not yet learned this simple principle. With all the reported incidents of identity theft due to records and data stolen you would hope that companies would treat passwords with more respect, yet I have one “social network” site email me information on my account each month where they...
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.