Banner
Highway 61 revisited

As I sit here with a Cesária Évora CD on in the house, I have an update to the car AV system...

Patterns In Randomness: The Bob Dylan Edition

The human brain is very good — quite excellent, really — at finding patterns. We delight in...

Web Page Mistakes And The 'Lazy Thumbnail'

I don’t understand, sometimes, how people put together their web pages. Who really thinks that...

Anti-theft?

The navigation system in my car has an anti-theft feature that’s interesting, in that it...

User picture.
picture for Michael Whitepicture for Gerhard Adam
Barry LeibaRSS Feed of this column.

I’m a computer software researcher, and I'm currently working independently on Internet Messaging Technology. I retired at the end of February... Read More »

Blogroll

Colonial Williamsburg is basically a theme park about colonial days in America, the time in the 18th century before and around the establishment of the United States. It can be somewhat kitschy[1], but it can also provide a good bit of education about U.S. history.

I spent last week in Boston, attending the Open Mobile Alliance meeting. Whenever one goes to meetings, one does the dance of the business card exchange. Because it was my first OMA meeting, I had more of it going on than usual, as I met a lot of people for the first time. So I’ve collected a batch of 2-inch × 3.5-inch cards, which I then have to copy information from and put it into my address book. And there’s no hope of reading these things without my reading glasses.

They’re inconvenient, to be sure, but they do work, and we’re used to them. Everyone has them.

In the 360 blog (sub-heading, “12 tables, 24 chairs, and plenty of chalk”), blogger Ξ (Xi) recently wrote about “Ethiopian Multiplication” (and followed it up with a series of interesting posts on different ways to multiply, here, here, here, and

John Levine notes that using secure branding can be an effective way to combat phishing. “Secure“ branding, in this sense, means using trusted authorities to verify the credentials of a web site or email sender, and then displaying branding information, such as a logo, in a trusted area of the application window, done in a way that would be hard to attack.

John is certain right, in principle, but the difficulty is that principle doesn’t necessarily translate into reality, for a number of reasons.

In 2007, I had a series in my personal blog about technology in Star Trek. I remembered that series the other day, when I read an article in New Scientist about the science in Battlestar Galactica.[1]

The New Scientist article focuses on human physiology and psychology, and on gravity and g-forces. It doesn’t look at power, speed, computers, astronomical issues, or any of a number of other things that would have been fun to see covered. Oh, well.

In his “Practical Security” column in the May/June issue of IEEE Internet Computing magazine, Stephen Farrell talks about strength of cipher-suites, and the fact that the overall strength is not simply measured by the key length of which the user is aware. It’s a useful thing to understand if you’re responsible for implementing encryption, and it’s something that we often get wrong, using strong asymmetric encryption up front, but weaker symmetric encryption behind it, or the other way around.