Author Archives: lkeyes70

Keyboard Contrariness

I finally decided that I can’t stand the bouncy keyboard on my Dell Inspiron laptop 8500. Especially after the unit has been on a while, the keyboard will jump all over the place. After going through diagnostics from the Dell web site, and finding out that the laptop was a year out of warranty, I called the tech support people, and they gave me two choices: 1. Send the unit back to Dell, for repair of the keyboard, for $199.00 or 2. order a keyboard from the spare parts department for $19.95. I went with #2. We’ll see how it goes when the keyboard arrives.

The machine is two years old. Just about the “average” life of a laptop.

Meeting Costs

With the mileage reimbursement rate now up to 48.5 cents per mile. it may be of interest to walk through a cost analysis to see if videoconferencing can be justified. Here is a scenario:

Assume a monthly management meeting for an organization with 7 field offices and a central office. The seven field office managers travel to the Central Office for a meeting each month. The meeting takes about six hours. The Executive Director and staff are already at the Central Office and have no travel time. The seven field office people travel anywhere from 20-132 miles to get to the Central Office. Travel time and distance calculations were taken from Google Maps link.

We figure a total of 544 miles driven one-way, and a total of 13 person/hours driven.

We’re assuming that everyone drives their own vehicle, and is compensated at the 48.5 cent/mile rate for travel, and their hourly rate for their travel time.

The total mileage cost is $263.85

The total compensation rate for the hours traveled is $426.53

Total one-way travel cost is $690.37

Double the cost for the round trip $1380.74

And we haven’t even held our meeting yet! By the time we figure in a six hour meeting with everyone’s hourly rate figured in… $229.69 x 6 = 1378.13, the travel costs exceed the hourly costs for participation during the meeting.

Total calculated costs: 1380.75+1378.13 = $2758.88

Don’t like these numbers? Download the spreadsheet.

Choosing the platform before choosing the programmer

Would you settle on a brush and then go look for a painter that could use it? Or would you rather find a good painter and then let him use the brushes he sees fit for the task. Put like that, I’d wager few would argue for the former. But when it comes to technology, it happens all the time.

Interesting discussion with lots of comments.

From 37signals a group that has produced several web-based applications for a to-do list, and project management.

I find myself coming down in the middle of this question. Wearing my “network manager” hat, I’m in favor of as much standardization as possible, using development tools and operating system platforms which are well understood, and have support beyond that of a single local person. Wearing my “programmer” hat, I agree more strongly with the “good painter” idea. One thing I would always ask a programmer is: “What sorts of third-party tools and libraries have you developed/bought/learned that will leverage your ability to program in [insert programming language here…] ?”

The difference in productivity between an “outstanding” programmer and a merely competent one can be staggering. If you are paying by the hour, then you could be talking about a factor of 10 in cost difference…building an application for for hundreds instead of thousands, or thousands vs. tens of thousands.

Further down in the discussion there is a mention of passion…of inducing a person to not only be enthusiastic about your problem, but even passionate. I would settle for competence and enthusiasm over passion and incompetence any day.

Link

The Dark Side of Yahoo

 In an opinion piece available today in the NYT, Tina Rosenberg describes how American companies are fawning over the Chinese market to the extent that they will sell their grandmothers to get a piece of the action.  Yahoo is particularly egregious. An excerpt:

In April 2004, a few weeks before the 15th anniversary of Beijing’s massacre of protesters in Tiananmen Square, the top-ranking staff members of The Contemporary Business News in Hunan were called into a meeting. An editor read a message from the Communist Party’s propaganda department warning that protests or media coverage of the anniversary would not be tolerated as June 4 approached. Though the message was routine, the reporters were warned not to take notes.

But Shi Tao, one of the journalists, did. He e-mailed them to a Chinese dissident in America, who posted them on the Web. A few months later, Mr. Shi was arrested. This April, he was given 10 years in prison, a sentence the judge called lenient, for disseminating state secrets abroad.

How did the police find Mr. Shi? His newly published verdict states that the prosecution relied in part on information given to the government by Mr. Shi’s e-mail provider, Yahoo.

and further….

American companies like Microsoft and Cisco have all sold China security tools and firewalls that China has turned into political controls. The companies argue that it is not their fault if China misuses standard politically neutral technology. They are right, but many foreign Internet companies in China have gone beyond neutrality. Some, including Yahoo, signed a pledge of “self-discipline” in 2002, promising to follow China’s censorship laws. Many Internet portals actively censor their Chinese Web sites.

Snitching on a client to totalitarian police is still another category of bad behavior, a move that should shrivel the keyboard fingers of Yahoo users everywhere. Since Chinese legal verdicts so rarely come to light, it is unclear how commonly this occurs. It has always been easy to imagine China’s government asking Internet companies for the e-mail of, say, a foreign businessman competing against a Chinese business or government entity. Now it is easy to imagine Yahoo complying.

The company admits it linked the e-mail to Mr. Shi’s telephone for the police. Its only comment has been a brief declaration that its local subsidiaries must obey local laws, regulations and customs. But according to the verdict, the Yahoo subsidiary that turned in Mr. Shi is in Hong Kong. It has no more obligation to obey China’s security laws than does Yahoo in Sunnyvale, Calif.

Having spent many billable hours removing the Yahoo instant messenger from people’s computers,  I think Yahoo is a internet parasite. What value does it add exactly?  And now, behind the smiley faces and pop-up ads, Yahoo contributes openly to the gulag.   

The Six Dumbest Ideas in Computer Security

My favorite is “Enumerating Badness”

Why is “Enumerating Badness” a dumb idea? It’s a dumb idea because sometime around 1992 the amount of Badness in the Internet began to vastly outweigh the amount of Goodness. For every harmless, legitimate, application, there are dozens or hundreds of pieces of malware, worm tests, exploits, or viral code. Examine a typical antivirus package and you’ll see it knows about 75,000+ viruses that might infect your machine. Compare that to the legitimate 30 or so apps that I’ve installed on my machine, and you can see it’s rather dumb to try to track 75,000 pieces of Badness when even a simpleton could track 30 pieces of Goodness. In fact, if I were to simply track the 30 pieces of Goodness on my machine, and allow nothing else to run, I would have simultaneously solved the following problems:

* Spyware
* Viruses
* Remote Control Trojans
* Exploits that involve executing pre-installed code that you don’t use regularly


Link

Microsoft Small Business Server 2003

Microsoft Small Business Server is the Microsoft answer to Linux; a small-scale server for a single-server network environment…ideally an organization’s first dedicated server. Pricing is in the $499.00 range for a total of five users. The system includes Windows 2003 server, SQL Server, Exchange Server, and a host of ancillary server and service products all designed, (that is, restricted) to work on a single machine.  There is an upper limit of the number of connections. 

The programs come on five CDs.  By booting the first CD, you go into a typical Windows 2003 server setup routine, and you end up with a Windows 2003 server, which then runs several scripts to install additional software, including Active Directory, and Exchange.

Once installation is complete, you receive a screen with a “to-do” list which suggests other bits of SBS to install, and and which discusses security issues, and how to solve problems that arose during the installation.

 

 

 

 

 I installed this on an older Dell workstation with a 40 gigabyte hard drive and a 2.8Mhz processor, and 512K of RAM.    

 

How citizens’ groups destroy themselves

How citizens’ groups destroy themselves

One largely overlooked cause of low levels of citizen involvement is the internal dynamics of all-volunteer groups. Lack of attention to what can go wrong inside a group means countless grassroots initiatives wither and die without achieving anything. The problem is quite simply that many citizens groups drive away their most able members. In a typical arc, a new member will step forth to work with others on some public issue, last for a relatively short time, then disappear back into private life, never to be heard from again. A glimmer of green then nothing. What causes grassroots rot?

Found in the NonProfit OneLine News