The Other American Idols

By | November 22, 2011

My wife’s in the other room watching American Idol, and while I’m amazed it’s been going so long, you gotta admire its emphasis on quality and professionalism. And no mention of money (isn’t there something vaguely obscene about a program like Are You Smarter Than A 5th Grader where avarice and greed are paraded before kids as incentives to learn?)

Anyway, while my wife’s watching idolatry on a production line, I’m trading emails with the guy who wrote my favorite software of the moment, SuperNoteCard and a composer whose music I discovered as pirate tapes on the streets of Bangkok 20 years ago: Tim Story.

His Glass Green was the soundtrack to a dark period of my life and I still can’t listen to those deceptively simple songs without being transported back to the night bus north to Sisatchanalai, pulling out of Morchit in the rain.

Anyway, I once confessed this to him in an email (after I’d tracked down the originals) and he was forgiving and very pleasant, so I’m proud to be one of the first to sign up for his new CD, Inlandish, not needing to listen to know it’s going to be well worth the money. (Yes, it could be on MP3, but who cares?)

The point? I hate it when I can’t even find an address on a website when I’m buying something. But that’s so old wave: The new world is when we can discover and communicate directly with our heroes, whether they write great software that makes us more creative, or music to inspire us. And it feels good to support them.

American Idol fulfills an important role: finding the hidden gems scattered across America. But maybe the Internet does something even better: helps us find artisans who may be less interested in becoming idols to just making enough to be happy, and making others happy in the process.

Backed Up? Or Cracked Up?

By | November 22, 2011

image

There’s quite a commotion online about a program called g-archiver that promises to back up your Gmail account, but in the process apparently harvests all users’ Gmail usernames and passwords, and mails them to a separate Gmail account.

This is indeed scary, although it’s possible that the person behind it wasn’t collecting the passwords for nefarious purposes. But it highlights some important issues that we tend to overlook in this Web 2.0, mashup age:

  • Your online email account is more vulnerable than an offline one (by which I mean, storing your old emails online, rather than downloading them to your computer and deleting the online copy.) In this sense, POP is good, IMAP and webmail bad.
  • If you give your username and password to third parties, i.e., those who access your account on your behalf, you need to be more rather than less careful than with the original service. For example, services like Plaxo allow you to access your other accounts but will inevitably require you to enter your username and password, which will be stored on their server.

On top of that, it’s intriguing to take a look at how legitimate this one program appears, and how little those websites helping in its distribution have vetted it. I found copies at Download.com (owned by CNET), despite a commenter pointing out it steals passwords, Shareware Junkies, BrotherSoft, Softpedia, ZDNet, Download3000, FreedownloadsCenter, the excellently named Safe Install and Filedudes.

Just out of interest, G-Archiver is apparently the work of a company called MateMedia, which registered the website hosting the software. An interview with the company’s president, Russ Mate, is here.

A message on the original blog post purporting to be from Mr. Mate says “MateMedia is a legitimate company and we are absolutely horrified that this has occurred”, and will be notifying any download sites hosting the software to “remove it immediately.”

That clearly hasn’t happened yet, but neither has the company removed it from its own website, at the time of writing. (Seeing the software alongside tools like FriendTools, which automates adding friends and comments for MySpace spammers, or TubeAdder, which does the same thing on YouTube, might give a prospective user pause for thought.)

My rules of thumb:

  • Never download software without visiting the author’s original site, and finding out who produced it. This applies to Facebook apps as well. (In G-Archiver’s case, there is no contact page.)
  • Think hard before you give your email password to any service, however legitimate. It’s not so much about losing your email password but about all the other passwords and personal data that a bad guy could access inside your email account.

As Web 2.0 involves more and more cross-pollination of information, so we need to be smarter about who we give our passwords to, and what information we store behind those passwords, both in email and in social networking accounts.

My Technology-free Lunch

By | November 22, 2011

At lunch today, it took me some time to realise what was different. It wasn’t just that my four lunch partners were all quite a bit older than me–15 years, at least, and I’m not as young as you think I am. It was, I realised, that in more than two hours of eating not one of us had answered a phone–or even received a phone call, or text message, or furtively checked our email. I’m not sure any of us were packing a BlackBerry. Maybe my companions weren’t even carrying cellphones. It was extraordinary.

I was going to ask, but I didn’t want to ruin the moment. Here were five men sitting around a table talking about stuff for about 120 minutes, and not one single interruption by technology or modern communications. They weren’t even in sight: Not one of us had put a phone on the table in the usual custom of staking out one’s corner of the table. It felt like a flashback to the early 1990s. And it was great.

A recent survey in the UK highlights how mad we’ve become:

Our liking for modern technology may be disrupting our sleep – and even our relationships, claims a UK survey.

The poll, by The Sleep Council, found that many people admitted checking texts, surfing the internet, or playing games in bed.

It suggests one in four people now regularly sleeps in a different bed from their partner, and many often go to bed at different times.

God I miss the old days.

(And no, it wasn’t a boozy lunch. No alcohol in sight.)

BBC NEWS | Health | Gadgets may cause lonely bedtimes

Babylon? Oh So 1999

By | November 22, 2011

image

I used to think that small programs that sat in your computer’s memory and could be accessed quickly by a keystroke were the future, but nowadays I’m not sure that’s true. At least, they’ve got to be real careful. If they’re not, they end up looking and behaving dangerously like adware.

An example that steers dangerously close is Babylon. Once a service with great promise, and still used by at least one of my friends, Babylon offers access to all sorts of online content — dictionaries, thesaurii, Wikipedia entries — just by highlighting a word in any application and hitting a couple of keys. A wonderful idea, and, with so much great reference material online, something that should by now have come into its own. But the experience falls short.

Install the software and you immediately get a pop-up suggesting you buy the product. It’s strange how out of sync that sort of behaviour is in today’s more demanding, less patient world. And while the information Babylon retrieves for you is impressively large, it’s probably too large to be useful. Nowadays we need surgical strikes on information, not carpet bombing.

Given it’s supposed to be a writer’s and browser’s tool, the occasional pop-up balloon from the system tray doesn’t help either. I don’t want programs blitzing me with reminders that the program is there, or that I am still using a trial version. This behaviour is, frankly, so 1999 it’s not funny.

Needless to say, I uninstalled the software within ten minutes. Or at least I tried to: Babylon has a few more tricks up its sleeve to make sure that isn’t as painless as installing it.

First off, there’s no uninstall shortcut in the Start menu, only the application that sits proudly alone outside a folder:

image

This approach–not putting a shortcut inside a folder along with an uninstall link–always strikes me as the refuge of the pompous and delusional. Microsoft does it; Adobe does it; Real does it. They could just about get away with it. Everyone else is kidding themselves.

So, it’s to the Add or Remove Programs folder, which, under XP, always takes so long to load it gives you time to wonder why you haven’t switched to a Mac already. And there, one finds two more surprises from Babylon:

Firstly, there are two entries, not one in the list:

image

Interesting. I don’t recall for a while coming across a program thinking it carried that kind of weight. More pumped up self-importance, I fear.

That’s not the end of the fun. Click on the first of these and instead of the usual confirmation box about uninstalling, you’re given one last chance to cough up:

image

I’m pretty sure that breaks all sorts of user design rules. It’s annoying: Why would someone who had gotten this far in uninstalling suddenly say to themselves “Doggone it! What was I thinking? Why don’t I just buy the thing instead?” By now I’m regretting even downloading Babylon to start with. All I wanted, for Chrissakes, was a decent Thesaurus.

The truth is that software has now learnt to fit better to the way we work, and not to intrude in the way that Babylon does. Look at browser widgets or the Mac’s Spotlight, or even Answers.com’s 1-Click Answers. Luckily, perhaps, Babylon’s lack of manners stands out because it’s just not how programs are written these days.

Fake Photos-A Thing of the Past?

By | November 22, 2011

image
image from WSJ.com

You may have already heard about the Chinese antelope that weren’t: This, from WSJ’s Jane Spencer and Juliet Ye:

Earlier this week, Xinhua, China’s state-run news agency, issued an unusual public apology for publishing a doctored photograph of Tibetan wildlife frolicking near a high-speed train.

The deception — uncovered by Chinese Internet users who sniffed out a Photoshop scam in the award-winning picture — has brought on a big debate about media ethics, China’s troubled relationship with Tibet, and how pregnant antelope react to noise.

The photographer and editor involved have since resigned. But this took two years to out; you look at the photo now and you just know that it’s not real. And this, of course, is not the first time photos have been doctored by news organisations that should know better (there’s Reutersgate, as it’s sometimes called, when Lebanese freelance photographer Adnan Hajj was caught allegedly duplicating flares, buildings and plumes of smoke for Reuters. More on photoshopping at Wikipedia). How can we avoid this?

One option is to be a bit more discerning about the pictures we see, whatever their provenance. Another is to turn to technology. Academics Jessica Fridrich, David Soukal and Jan Lukáš looked at

detection of a special type of digital forgery – the copy-move attack in which a part of the image is copied and pasted somewhere else in the image with the intent to cover an important image feature.

Their paper [PDF] investigated the problem of detecting the copy-move forgery and described what they called “an efficient and reliable detection method”. John Graham-Cumming, best known for his work on Bayesian spam filters, made it a reality with an algorithm that implements automatic detection of image alteration using copy/paste. (OK, he did it because he wanted to win money in a spot the ball competition, but it’s still good work.)

A guy called John Wiseman has made a few modifications to the code so it works faster, and has shown how it works well in detecting the alterations in Adnan’s photos:

image

image

The blue and red bits are where there are duplicated pixels. The code didn’t work very well on the Chinese antelope picture because that involves splicing two pictures together more than copy/move. But it’s worth a look.

Is this going to bring to an end Photoshopping? Probably not. But it might make us more skeptical, and if tools like this are readily available, more likely to run suspect photos through the wringer until we’re sure that what we see actually happened like that.

China Eats Crow Over Faked Photo Of Rare Antelope – WSJ.com