tag:blogger.com,1999:blog-10855941685020194962024-02-08T07:43:27.822-08:00FlipsideBrent Smithursthttp://www.blogger.com/profile/06328688685136307326noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-1085594168502019496.post-63350001305960828212008-04-10T17:16:00.000-07:002008-04-10T17:41:55.679-07:00Microsoft Clearflow as an example of over-engineeringMicrosoft announced plans to launch Clearflow, a web service that incorporates complex software models to help users avoid traffic jams. Read about it in various places, including <a href="http://www.nytimes.com/2008/04/10/technology/10maps.html">the New York Times</a>. My first thought when reading about it wasn't that it sounds like a cool technology, it was that it sounds like a ridiculously over-engineered solution to a problem.<br /><br /><span style="font-weight:bold;">The problem:</span><br /><br />Commuters don't have accurate data regarding current traffic situations on main and side streets.<br /><br /><span style="font-weight:bold;">The artificial intelligence researchers' solution:</span><br /><br />Form a team and spend 5 years building a predictive model for current traffic conditions based on four years of data and 16,500 trips covering 125,000 miles. The end result means that Clearflow combines live traffic data based on data from traffic sensors and combines that with predicted traffic events based on variables such as time of day, weather, current sporting events.<br /><br /><span style="font-weight:bold;">End result:</span><br /><br />Probably more accurate traffic information, but largely based on intelligent guesses.<br /><br /><span style="font-weight:bold;">My solution (I'm not an artificial intelligence researcher):</span><br /><br />Use real data, not predictive models. My GPS knows which road I'm on, the speed limit of that road, where the next intersection is, and how fast I'm traveling. Because my GPS knows that, the GPS satellite knows that. Because the GPS satellite knows that about me, it also knows it about other drivers on that same road or other roads. So, let's use all of that data to determine how fast traffic is <span style="font-style:italic;">actually</span> moving on a particular road (relative to the speed limits and intersections) and therefore determine whether traffic problems exist on that road <span style="font-style:italic;">right now</span>. Next step: automatically update the display on my GPS to suggest alternate routes that do not currently have similar traffic problems.<br /><br /><span style="font-weight:bold;">End result:</span><br /><br />Extremely accurate traffic information, using actual current data and no guesses.<br /><br />Perhaps I'm missing something obvious. Or perhaps this is an example of the adage, "to the man with a hammer, every problem looks like a nail". Thoughts? Counter-arguments? Anyone?Brent Smithursthttp://www.blogger.com/profile/06328688685136307326noreply@blogger.com0tag:blogger.com,1999:blog-1085594168502019496.post-61015579110885756862008-03-09T23:37:00.000-07:002008-03-10T00:00:29.204-07:00Connect the dotsI alluded to <a href="http://bsmithurst.blogspot.com/2008/03/apple-and-usual-suspects.html">The Usual Suspects' flashback sequence</a> previously, and I noted that the mainstream press haven't grasped the significance of this yet, but I didn't lay out how I see the dots connecting. And I'm not going to draw a map here. But think of how this all relates to the breakthrough mobile device and see if you can connect them yourself:<br /><br />Mac OS X. XCode. Cocoa. Core Data. Core Audio. Core Video. Core Animation.<br /><br />Yellow Box, Intel, <br /><br />iPod, iTunes, Apple TV, media distribution.<br /><br />PDA, Apple PDA (lack thereof), game console, portable gaming device (PSP), games.<br /><br />Apple stores, AT&T, Best Buy, Starbucks.<br /><br />Microsoft, Exchange, SQL, cloud computing.<br /><br />If that sounded like a random string of SEO buzzwords, then we don't connect the dots the same way. Or you don't follow Apple and/or the computer industry closely enough to know what some of those things mean. Or maybe I'm full of crap.<br /><br />I do know that if I had money to invest, I'd put it into AAPL now before everyone else connects the dots. Or, maybe they'll never connect the dots and AAPL won't explode until 1-2 quarters after June. We'll see. I'm betting on one or two analysts announcing a $225 or so target price this week and AAPL will accelerate. But I wouldn't put too much faith in analysts...Brent Smithursthttp://www.blogger.com/profile/06328688685136307326noreply@blogger.com0tag:blogger.com,1999:blog-1085594168502019496.post-57157366056918823402008-03-09T22:44:00.000-07:002008-03-09T23:22:04.550-07:00Apple and The Usual SuspectsYou know that scene at the end of The Usual Suspects when elements of the plot that were right in front of you the whole time are suddenly revealed right in front of you? That's how I felt when I watched Apple's iPhone SDK roadmap announcement on Thursday. As the event unfolded, I could suddenly see why Apple has been making the choices it has made for the past several years. I could suddenly see the strategy of this secretive company laid out perfectly clearly. Everything suddenly made sense.<br /><br />I haven't seen anything in the mainstream press yet to indicate that any publications or analysts understand what happened. There are a few bloggers who seem to get it. And most of the <a href="http://finance.google.com/group/google.finance.22144/browse_thread/thread/2260d72005217915">posters in this thread at Google Finance</a> seem to understand. I'm not sure where the big boys are right now, but they seem utterly clueless. Maybe because they truly are clueless about Apple; how anyone could follow Apple closely over the past five years or so and still come to the conclusion that the announcement was about iPhone software is beyond me. It defies belief. Some of the follow-up stories such as <a href="http://www.theglobeandmail.com/servlet/story/RTGAM.20080306.wrrim07/BNStory/Technology/home">RIM, Apple borrow from each other's playbook</a> are almost embarrassing in their lack of understanding.<br /><br />The one comment I've seen that perfectly sums it up is from "Ozman" at <a href="http://fakesteve.blogspot.com/2008/03/happy-now-bitches.html">Fake Steve's site:</a> <span style="font-style:italic;">That sound you just heard was over half the valley realizing that there pants are around their ankles, and Steve is already in his car on his way home.</span><br /><br />Remember that the iPhone SDK is not just for the iPhone, but the iPod (Touch) as well. Remember too that the iPhone is not a phone. It is a mobile computer that happens to have an "always on" data connection and it happens to be able to make and receive phone calls. You also need to understand that the iPhone/iPod Touch run the proven Mac OS X -- a computer platform. And that they are mobile computers. In your pocket. Did you hear <a href="http://en.wikipedia.org/wiki/John_Doerr">John Doerr</a> say that this will be a bigger platform than the personal computer?<br /><br />Apple has put in motion what may prove to be an unstoppable circular, recursive business model. This SDK was the missing piece (or at least one of the missing pieces because there may be more to come).<br /><br />If you don't know what I'm talking about, let me lay out some of it for you. Because it's recursive, I can start anywhere in my description. But it's getting late and I'll do that tomorrow. Sorry!Brent Smithursthttp://www.blogger.com/profile/06328688685136307326noreply@blogger.com0tag:blogger.com,1999:blog-1085594168502019496.post-49355988448488101532007-05-11T22:49:00.000-07:002007-05-11T23:36:43.470-07:00Possibly the most ridiculous lawsuit everLooks like <A HREF="http://www.uoregon.edu/~rbear/modest.html">Jonathan Swift</A> is alive and well, working for a law firm somewhere in California. How else to explain <A HREF="http://news.com.com/2100-1030_3-6183105.html">this article</A>, describing what is quite possibly the single most ridiculous lawsuit to ever receive this much media coverage.<br /><br />Unfortunately, I'm guessing these clowns are serious. The best thing about this is that there is a tiny little chance it will lead to a change in the flawed DMCA.<br /><br />If they succeed, I have several lucrative new business ideas that I will be pursuing with vigor!Brent Smithursthttp://www.blogger.com/profile/06328688685136307326noreply@blogger.com0tag:blogger.com,1999:blog-1085594168502019496.post-85048188166473856442007-05-08T22:25:00.000-07:002007-05-09T00:00:53.391-07:00The benefits of a Googleable name<A HREF="http://online.wsj.com/article/SB117856222924394753.html">Interesting article in the Wall Street Journal today</A> about the benefits of a unique, Googleable name. As someone who naturally possesses one of these types of names, I guess Kevin J. Delaney wouldn't consider me a nobody. So that's something.<br /><br /><A HREF="http://homepage.mac.com/smithurst/iblog/C2104396080/E1709523017/index.html">I wrote about names once before in my long-since abandoned blog</A>, which was started to commemorate my son's birth. I dropped that public blog due to lack of time (not coincidentally I started my current job right when RJ was born).<br /><br />Anyway, this kind of leads in to my Why Blog post that is still in draft mode because I can't find the time to finish it. Which you would find ironic if you read the draft, but I digress.<br /><br />To get back on topic, there are some key points that Delaney's article doesn't touch on. Significantly, Google results change over time and can expand dramatically. Searching for Smithurst resulted in me, <A HREF="http://stewartclan.ca/">KJ (my sister who is now a Stewart)</A>, Ben (appears to be a Unix guru from England who I have never met and am not related to), and Michael (a hockey player for the Norwegian national team) even just a few years ago. Now, the Smithursts around the world are crawling out of the woodwork. Still, it's better than "Smith" and always will be--try Googling my step-dad, David Smith, and let me know how you make out!<br /><br />I Google (and "MySpace") job applicants and often people I am developing a working relationship with--such as outside partners or whatever. In fact, I even have a barebones MySpace profile just so I can log in and have the ability to search better. From an employer's perspective, it is frustrating when Bob Jones applies for a job with you. Someone named Tilda Swindlehurst would be much preferred--unless no results come up for Tilda. Being in the technology industry, I would be very suspicious of a job applicant with an uncommon name who was not findable on Google...<br /><br />You might not want to be Googleable anyway. A huge disadvantage of an uncommon name is that anything you post online could come back to haunt you very easily. For example, I once was considering a resume that looked fairly good and definitely seemed interviewable. However, among other potential problems discovered online was the person's MySpace page. I wouldn't necessarily negatively judge someone by their MySpace page or what they do in their spare time, BUT this person's "About Me" basically indicated that they hated working and preferred to sit on the beach daydreaming. Not such a good impression for obvious reasons. No interview. Our HR department will probably kill me for sharing that story, but there you have it.<br /><br />It's pretty easy to find odd links to me online, but there's nothing I'm really embarrassed about. If I was in the job-market, I don't think there is anything out there that would hurt me. And, hey, I'm somebody! Abigail and Kevin would be proud...Brent Smithursthttp://www.blogger.com/profile/06328688685136307326noreply@blogger.com1tag:blogger.com,1999:blog-1085594168502019496.post-26527839824873917262007-04-25T21:00:00.000-07:002007-05-11T22:59:33.432-07:00My final comment on iPods and security (for now)Cara took a bit of flack on various blogs and on <a href="http://www.networkworld.com/news/2007/041807-ipod-readers-react.html">Network World's own forums</a> for her series of articles about iPods and security. Wherever you stand on the issue, or even if you couldn't care less, I find it interesting to see how naive many of those posters are. I wonder what people think the job of a journalist is.<br /><br />Where do people think that a journalist gets story ideas from? Could it sometimes be from insider information gleaned from press releases or perhaps gossip or tips from sources they have a relationship with?<br /><br />Where do people think that follow-up story ideas come from? Is it possible that if readers show an interest in a topic that a journalist might be compelled to write a follow-up to capitalize on that interest?<br /><br />How is opening up a topic for discussion "causing controversy" or "creating an issue"? If you disagree, then disagree - at least Network World has a forum and allows you to post your disagreement.<br /><br />While I think it is an interesting discussion point, I've already said all I have to say on this for now. If you disagree with me, that's perfectly okay. Feel free to post a comment!Brent Smithursthttp://www.blogger.com/profile/06328688685136307326noreply@blogger.com0tag:blogger.com,1999:blog-1085594168502019496.post-66898982676360476262007-04-11T00:09:00.000-07:002007-05-11T22:59:56.256-07:00Should Apple include security with iPods?I corresponded with Cara Garretson via email yesterday, after I read her <A HREF="http://www.networkworld.com/news/2007/040907-ipod-company-security.html">article</A> but before I wrote my previous post. She invited me to comment on a follow-up article she was considering: <i>should Apple include security with iPods?</i><br /><br />I actually received that message from her while driving home from the office, and the wheels have been turning ever since. Perhaps a bit too much so because now I'm not sure I understand which angle she is thinking of taking. It's a very good question, but I can spin it a number of ways. My questions in bold followed by my answers:<br /><OL><LI><STRONG>Should Apple include security features that make it less likely for an end-user's iPod to be infected by malware?</STRONG><br />Notwithstanding <A HREF="http://www.kaspersky.com/news?id=207575511">Kaspersky's recent claim</A> of an iPod virus, there is no real evidence that it is likely (or possible) for an iPod to be infected by malware. The problems with Kaspersky's claims are obvious -- not only is it a harmless "proof of concept" virus, but Linux must be installed on the iPod (something that no one outside of a few in the Slashdot crowd or MIT Media Lab is likely to do) in order for it to be vulnerable in the first place. Therefore, I would argue that Apple already does a good job of making it unlikely for an iPod to become infected; with 100 million iPods sold and zero vulnerabilities, it would be hard to argue differently.<br /></LI><br /><LI><STRONG>Should Apple include security features that make it less likely for an end-user to be tempted to use their iPod for evil?</STRONG><br />I don't know how this would be possible without restricting the user's ability to use the product correctly. One of the selling features of iPods is the fact that they can be used as a portable hard disk. Witness the explosion of portable applications designed to be launched from an iPod or datakey: common sense says there must be a market for these applications if so many vendors are creating them. Existence of a market proves there must be customer demand. Also, Mac OS X has promised the concept of portable home directories for years now and I believe this capability will be built in to iPods and OS X in the near future. So, I would say that this is not Apple's responsibility nor would it be desirable.<br /></LI><br /><LI><STRONG>Should Apple include security features that make it easier for IT staff to protect against end-users using iPods for evil?</STRONG><br />To me, this is the most legitimate angle. There are possibly arguments to be made that Apple should provide this somehow, and although I can think of a few scenarios to make this possible, there are many more questions raised. Would it be done in software? If so, would Apple charge for the software? How would the software be distributed? How would an IT person deploy, configure, monitor, and manage the software? Perhaps most importantly, what problem would Apple be solving by doing this? There are already software products in existence that could be used to block iPods (my company <A HREF="http://www.faronics.com">Faronics</A> makes one called <A HREF="http://www.faronics.com/html/DeviceFilterMac.asp">Device Filter Mac</A>); what could or should Apple bring to the table that doesn't already exist?<br /></LI><br /><LI><STRONG>Because Apple is responsible for 100 million iPods in existence, all of which could potentially be used for nefarious purposes, does Apple have a moral or legal responsibility to ensure iPods are used for good instead of evil?</STRONG><br />I don't believe it is Apple's responsibility to ensure iPods are used for good any more than I believe it is Honda's responsibility to ensure a Civic is never used as a getaway car. In both cases, the product is only a means of potentially enabling a type of behavior, but is not intended to encourage that behavior. Perhaps if there were no alternative security solutions available, Apple would have some minor responsibility here, but the truth is that the worldwide market for endpoint security products is larger than the worldwide market for iPod accessories. If a need exists, someone will fill that need and profit from it. Isn't that what free enterprise is all about? <br /></LI></OL>Brent Smithursthttp://www.blogger.com/profile/06328688685136307326noreply@blogger.com0tag:blogger.com,1999:blog-1085594168502019496.post-36255187250363593402007-04-10T21:34:00.000-07:002007-05-11T23:00:07.158-07:00iPods and SecurityCara Garretson at Network World published a great article today, titled <a href="http://www.networkworld.com/news/2007/040907-ipod-company-security.html">Can an iPod bring down your company?</a>. If you haven't read it already, I recommend it.<br /><br />Of course, where data theft is concerned, iPods are only a specific risk due to their ubiquity. There are many other ways to steal data aside from using an iPod. The fact that seemingly every employee or visitor to a company has an iPod possibly makes it more convenient for a someone to steal data out of opportunity, but it is doubtful that iPods themselves truly present a threat. Banning iPods (or controlling whether people can download data to them) may help to keep the honest (and perhaps technically illiterate) people honest, but would do very little to protect against dishonest people.<br /><br />Having said that, I do disagree with what Tom Scocca says on page 2 of the article: <I>"Controls targeted at these devices should be based not on the type of device, but on the risk that companies are willing to accept by allowing any type of external storage device into the environment."</I> I disagree with his assessment because the type of device certainly does matter! For example, iPods are charged by plugging them into a computer. (Yes, I realize there are alternative methods of charging iPods, but almost everyone charges them this way). Therefore, not only would it not be unusual for an employee to have an iPod plugged into his or her work computer (and therefore would not raise a red flag with a supervisor or co-worker), but merely having a large-capacity personal storage device plugged in may be enough to tempt that otherwise honest person into stealing information that they otherwise wouldn't have.<br /><br />A dishonest person or one who really wants a specific piece of data is probably going to get it even without an iPod. Email, FTP, data keys, memorization, camera phones, print-outs, or whatever all put data at risk. If someone can see your data, it is at risk. If someone can't see your data but can access it (for example, an encrypted file can be located but not opened or viewed), it is at risk. David Jordan sums it up nicely at the end of page 2: <I>"We have to rely on our trusted employees."</I> Very true, even if his assumption, that because users agrees to an AUP when they logon they are therefore trustworthy, is assinine.<br /><br />When speaking of "data" or "information" theft in these scenarios, a couple of seemingly obvious things are typically overlooked by the analysts. They never seem to mention the risk of a person stealing actual software itself. They never seem to mention the productivity loss caused by an employee doing personal work on the company's machine. They never seem to mention the risk of an employee simply downloading files from the Internet all day and copying them to his or her device when they leave for the day. They never seem to mention one of the most obvious risks of all -- that of an employee copying data <I>from</I> the device <I>to</I> the computer and therefore putting the company at risk of security vulnerabilities, lost productivity, liability due to unlicensed software being installed, and much more.<br /><br />And its not just the analysts who miss the point -- Cara's story is based on or inspired by a press release put out on April 6 by a company that just so happens to sell end-point security software designed to protect against the iPod threat. It was a brilliant piece of PR that garnered a lot of attention. But the press release does miss the point: of course end-point security is a good thing, particularly these days when not a week goes by without a news story of yet another company suffering a major data breach, but it is foolhardy to think that data breaches will be completely stopped by implementing such a solution. According to the company's press release, <I>"the company now believes that the use of iPods for "Pod Slurping" could be one of the biggest "Pocket Fraud" assets for rogue employees to store a variety of confidential data and should be banned until proper policy enforcement capabilities are in place.</I> Well, yeah, of course they believe that! But note the "rogue employees" comment; you're not going to stop a rogue employee this way, but perhaps you will succeed in stopping the otherwise honest employee from making a mistake. You are very likely to succeed in turning off your own employees if you jump to irrational conclusions and don't think it through.<br /><br />The decision to ban iPods or implement a security solution is one that many organizations should consider, but it is a decision that must be made carefully after weighing the social and monetary costs and benefits; it should not be made irrationally based on an interested party's press release!Brent Smithursthttp://www.blogger.com/profile/06328688685136307326noreply@blogger.com2