Loving Tablets and Chromebooks: Sure, Like Going to the Dentist

December 29, 2022

Might smartphones make some devices irrelevant? We learn from The Register that “Tablet, Chromebook Shipments Come Crashing Down.” The article examines IDC’s report of third-quarter shipments. It states a mere 38.6 million tablets were shipped between July 01 and September 30, a decline of almost 9% since the previous year. Only Huawei grew its sales as demand escalated in China and Russia, where sanctions barred the way for Western tech. Writer Paul Kunert reports:

“Apple saw sales decline 1.1 percent to 14.5 million, according to IDC estimates. Samsung was down 4 percent to 7.1 million, Amazon fell 8.1 percent to 4.3 million, Lenovo shipments dropped 36.6 percent to 2.7 million, and Huawei grew 2 percent to 2.4 million. In its results filed late last week, Apple said iPad sales to end users were up 21 percent to $8.3 billion in Q4 of its fiscal ’22 ended 30 September despite supply constraints. IDC tracks sales into the channel, hence the difference in the figures. Chromebook shipments fell at a far faster rate, down 34.4 percent year-on-year to 4.3 million devices. This was the fifth straight decline for this sector of the PC industry. The downward trajectory began in the US, which accounted for 70 percent of global shipments. … IDC placed Acer as market leader with shipments of 1 million, albeit down 23.8 percent on a year ago. Dell shrank 19.9 percent to 900,000 units, HP was down 26.8 percent to 800,000, Lenovo plunged 54.8 percent to 700,000, and Samsung was down 37 percent to 300,000.”

Researchers point out Chromebook sales spiked during the pandemic as students connected from home, so its decline is simply a return to normal levels. As for the rest, a tough economy was likely at play. Apparently one can endure a slightly smaller small screen when fuel and groceries are difficult to afford.

The Arnold IT team has a different set of conclusions:

  1. Tablets and Chromebooks are like wearing clothing two sizes to small. Think discomfort.
  2. The promoters of tablets and Chromebooks are likely to use laptops to do “real” work.
  3. Tablets and Chromebooks make routine tasks difficult; for example, keeping an Internet connection in Buenos Aires during the World Cup Parade and finding a dongle in Hermanus.

Money and power allow some outfits to sell unusual stuff. Why not advertise these products on cable at 3 am?

Cynthia Murrell, December 29, 2022

Cyber Security: Is It Time for a Brazen Bull?

December 28, 2022

The cyber security industry has weathered Covid, mergers, acquisitions, system failures, and — excuse the lousy pun — solar winds. The flow of exploits with increasingly poetic names continues; for example, Azov, Zerobot, Killnet, etc. However, the cyber defense systems suffer from what one might call a slight misalignment. Bad actors find ways to compromise [a] humans to get user names and passwords, [b] exploit what is now the industry standard for excellence (MVP or minimal viable product, good enough engineering, and close-enough-for-horseshows technology), any gizmo or process connected to something connected to a public-facing network. The list of “bad” actors is a lengthy one. It includes bird-owning individuals in the UK, assorted government agencies hostile to the US, students in computer science class or hanging out in a coffee shop, and double agents with computing know how.

To add to the pain of cyber security, there are organizations which do great marketing but less great systems. “What’s in a PR Statement: LastPass Breach Explained” discusses a serious problem which underscores a number of issues.

LastPass is a product with a past reaching backwards more than a decade. The software made it easier for a user to keep track of what user name and password was whipped up to log into an online service or software. Over the years, PC Magazine found the password manager excellent. (Software can be excellent? Who knew?) Wikipedia has a list of “issues” the security software faced over the years. You can find that information here. More amusing is security expert Steve Gibson’s positive review of LastPass. Should you have the time, you can read about that expert’s conclusions in 2010 here.

But what does the PR statement article say? Here are a couple of snippets from the cited December 26, 2022, essay:

Snippet 1: Right before the holiday season, LastPass published an update on their breach. As people have speculated, this timing was likely not coincidental but rather intentional to keep the news coverage low. …Their statement is also full of omissions, half-truths and outright lies.

Harsh.

Snippet 2: Again, it seems that LastPass attempts to minimize the risk of litigation (hence alerting businesses) while also trying to prevent a public outcry (so not notifying the general public). Priorities…

My take on LastPass is that the company is doing what other cyber security firms do: Manage information about problems.

Let’s talk about cyber security on a larger stage. How does a global scale sound?

First, security is defined by [a] what bad actors have been discovered to do and [b] marketing. A breach occurs. A fix — ideally one enabled by artificial intelligence and chock full of predictive analytics — is created and marketed. Does the fix work? How about those Exchange Server exploits or those 24×7 phishing attacks? The point for me is that cyber security seems to be reactive; that is, dictated by what bad actors do.

Second, the “fix” is verified by whom and what? In the US there are Federal cyber groups. There are state cyber groups. There are cyber associations. There are specialty labs in fun places like Quantico. For a LastPass incident, which cowpoke moves the cow along? The point: Bureaucracy, friction, artificial barriers, time, expertise, money, and more.

Third, technical layoffs and time mean that cyber crime may be an attractive business opportunity for some.

Considering these three points, I want to hazard several observations:

  1. Cyber security may be an oxymoron
  2. Bad actors have the advantages granted by good enough software and systems, tools, talent, and time
  3. Users and customers who purchase security may be faced with a continual flow of surprises

What’s the fix? May I suggest that we consider bringing back the Bull of Phalaris aka the brazen bull.

The “bull” is fabricated of a suitable metal; for example, bronze. The inside of the bull is hollow. A trapdoor allows access to the interior space. When the trapdoor is closed, there is an opening from the interior to the bull’s nose. The malefactor — let’s say a venture firm’s managing director who is rolling up cyber security companies with flawed software — is placed inside the bull. A fire is built beneath the bull and the shouts and possible other noises are emitted from the opening in the bull’s head.

The use of the brazen bull for software developers pumping out “good enough” cyber security solutions can be an option as well. Once law enforcement snags the head of a notorious hacking gang, the bull will be pressed into duty. Keep in mind that Microsoft blamed 1,000 cyber warriors working in a country hostile to the US for the SolarWinds’ misstep. This would necessitate more bulls which would provide meaningful work to some.

I would advocate that marketer types who sell cyber security systems which don’t work be included in the list of individuals who can experience the thrill of the brazen bull.

My thought is that the use of the brazen bull with clips released as short videos would capture some attention.

What’s is going on now is not getting through? More robust measures are necessary. No bull.

Stephen E Arnold, December 28, 2022

Want Clicks? Put War Videos on TikTok

December 20, 2022

Here is another story about the importance of click-throughs to social media companies, repercussions be damned. BBC News reports, “Russian Mercenary Videos ‘Top 1 Bn Views’ on TikTok.” The mercenary band in these videos, known as the Wagner Group, is helping Russia fight its war against Ukraine. Writer Alexandra Fouché cites a recent report from NewsGuard as she reveals:

“NewsGuard said it had identified 160 videos on the short-video platform that ‘allude to, show, or glorify acts of violence’ by the mercenary group, founded by Yevgeny Prigozhin, a close ally of President Vladimir Putin. Fourteen of those videos showed full or partial footage of the apparent killing of former Russian mercenary Yevgeny Nuzhin which saw high engagement within days of being uploaded last month, it said.”

That brutal murder, which was performed with a sledgehammer, was viewed over 900,000 times on TikTok before ByteDance took it down. Nuzhin was apparently killed because he switched sides and denounced the Wagner Group. Sadly but surely, there are many viewers who would seek out such footage; why blame TikTok for its spread? The article continues:

“NewsGuard found that TikTok’s algorithm appeared to push users towards violent Wagner Group content. When an analyst searched for the term ‘Wagner’, TikTok’s search bar suggested searches for ‘Wagner execution’ and ‘Wagner sledgehammer’. The same search in Russian resulted in the suggestions ‘Wagner PMC’, ‘Wagner sledgehammer’ and ‘Wagner orchestra’. Wagner refers to its fighters as ‘musicians’. NewsGuard also found that videos could be found on TikTok showing another Wagner murder involving an army deserter in Syria in 2017 and that they had reached millions of users.

The online analysis group said it had also identified other music videos on the platform that advocated violence against Ukrainians, including calls to kill Ukrainians claiming they were ‘Nazis’.

Funny, when I searched Google for “Wagner,” the first three results my filter bubble turned up were composer Richard Wagner’s Wikipedia page, Wagner paint sprayer’s home page, and Staten Island’s Wagner College. Some actual news articles about the Wagner Group followed, but nary a violence glorification video in sight. TikTok certainly knows how to generate clicks. But what about China’s “reeducation” camps? The Chinese company is not circulating videos of those, is it? It seems the platform can be somewhat selective, after all.

Cynthia Murrell, December 20, 2022

Over the Holidays Learn Algospeak

December 19, 2022

Internet content has evolved its own set of coded words and emojis called algospeak. Though often discernable from context, the meanings behind these terms and symbols can easily escape the uninitiated. Lifehacker supplies a list of such terms in, “All the Social Media ‘Algospeak’ You Don’t Understand.” But wait, you might ask, what is wrong with clarity and accurate wording? Writer Sarah Showfety explains:

“If you’ve ever created content for internet consumption, you know the number one rule: Don’t upset the algorithm. Modern-day social media algorithms are like the Wizard of Oz—cloaked, all-powerful puppeteers who can seemingly perform miracles for the right creators, instantly propelling their content in front of millions of eyeballs. But they are as fickle as they are promising, often trapping content in a dungeon of 53 views for no discernible reason. While the inner machinations of algorithms are largely unknown, being blackballed by one can suppress your content and seal your doom—and one of the quickest ways to do that is to use language that could be flagged as a violation of the platform’s content guidelines or terms of service. So internet content creators have developed a growing glossary of terms designed to circumvent automated brand safety filters. This evolving lexicon of euphemisms, abbreviations, deliberate misspellings, symbol insertions and emojis known as ‘algospeak’ is used to disguise sensitive and potentially problematic words having to do with polarizing political topics, controversial global events, cultural taboos, death, drugs, and just plain sex.”

Ah yes, the almighty algorithm. Readers may want to bookmark the post in case of future confusion. A few of the PG-rated euphemisms include “bink in lio” for “link in bio,” “swimmers” for vaccinated people, and the sunflower emoji to symbolize Ukraine. Showfety points out one entry is particularly unfortunate, at least for this charismatic kid who suddenly found himself famous for his love of maize: “Corn” is algospeak for “porn.” Really? We don’t make these choices, we just try to keep you informed, dear reader.

Cynthia Murrell, December 19, 2022

Google to Microsoft: We Are Trying to Be Helpful

December 16, 2022

Ah, those fun loving alleged monopolies are in the news again. Microsoft — famous in some circles for its interesting approach to security issues — allegedly has an Internet Explorer security problem. Wait! I thought the whole wide world was using Microsoft Edge, the new and improved solution to Web access.

According to “CVE-2022-41128: Type Confusion in Internet Explorer’s JScript9 Engine,” Internet Explorer after decades of continuous improvement and its replacement has a security vulnerability. Are you still using Internet Explorer? The answer may be, “Sure you are.”

With Internet Explorer following Bob down the trail of Microsoft’s most impressive software, the Redmond crowd the Microsoft Office application uses bits and pieces of Internet Explorer. Thrilling, right?

Google explains the Microsoft issue this way:

The JIT compiler generates code that will perform a type check on the variable q at the entry of the boom function. The JIT compiler wrongly assumes the type will not change throughout the rest of the function. This assumption is broken when q is changed from d (an Int32Array) to e (an Object). When executing q[0] = 0x42424242, the compiled code still thinks it is dealing with the previous Int32Array and uses the corresponding offsets. In reality, it is writing to wherever e.e points to in the case of a 32-bit process or e.d in the case of a 64-bit process. Based on the patch, the bug seems to lie within a flawed check in GlobOpt::OptArraySrc, one of the optimization phases. GlobOpt::OptArraySrc calls ShouldExpectConventionalArrayIndexValue and based on its return value will (in some cases wrongly) skip some code.

Got that.

The main idea is that Google is calling attention to the future great online game company’s approach to software engineering. In a word or two, “Poor to poorer.”

My view of the helpful announcement is that Microsoft Certified Professionals will have to explain this problem. Google’s sales team will happily point out this and other flaws in the Microsoft approach to enterprise software.

If you can’t trust a Web browser or remove flawed code from a widely used app, what’s the fix?

Ready for the answer: “Helpful cyber security revelations that make the online ad giant look like a friendly, fluffy Googzilla. Being helpful is the optimal way to conduct business.

Stephen E Arnold, December 16, 2022

Rainbow Narcotics? Just a Coincidence? Nope, Marketing Plain and Simple

December 9, 2022

Does anyone remember how the tobacco companies had ads and mascots that appealed to kids but claimed more than once their target demographic wasn’t children? It was a bald-faced lie as big as the former claim that smoking does not negatively affect health. The Daily Caller has a whopper of a story about fentanyl: “Drug Cartel Operative Claims Rainbow Fentanyl Was Not Created To ‘Make Kids Addicts.’”

A Mexican drug cartel operative told Insider that rainbow-colored fentanyl is not meant to make kids addicts. The fentanyl pills have the same colors and shapes as popular candies such as Smarties, Sweet Tarts, and more. The cartel operative said the bright colors are meant to warn adults the pills contain fentanyl:

“‘We know that some of the dealers in the US started mixing cocaine with ‘fenta’ without letting their buyers know, and that is very dangerous,’ the operative told Insider. The colorful drug form was created ‘to make it look different than coke or white heroin,’ a Sinaloa cartel drug cook explained, according to Insider. ‘Also we mix some of the heroin with fentanyl to make it more powerful, but we mark it, to let the buyer know that this one has ‘fenta,’’ the operative added. ‘Whatever happens when it’s taken from our hands, it’s not our problem.’”

Ann Milgram, the Administrator of the Drug Enforcement Administration (DEA), pushes back against the cartels by stating the opposite. She claims that rainbow fentanyl is a deliberate attempt to target American kids.

The same cartel operative says they cook clean “fenta” and clearly label it with “el arco del iris” (rainbow).

Right. And Joe Camel was as friendly as Chuck E. Cheese, McGruff the Crime Dog, Smokey the Bear, and Ronald McDonald.

Whitney Grace, December 9, 2022

Can Clever Smart Software Identify Misinformation?

December 8, 2022

My view is, “Nope.” What will marketers say? My thought is, “Anything, anything at all.”

Navigate to “Physicists Create a Wormhole Using a Quantum Computer.” Read it. Now click on “The Death of Quanta Magazine” and read the essay about the Wormhole write up. Here’s the question: “Can you identify the misinformation in each essay?” The $64 dollar question is: “Can smart software flag and tag the misinformation?”

My hunch is that most humans, even the highly intelligent ones reading my article about these two essays, will have a difficult time identifying factoids, hypotheses, and baloney. Now is smart software from one of the allegedly open source outfits or a rapacious but user friendly commercial service able to handle this task?

Let’s look at one passage from the “The Death of Quanta Magazine”; to wit:

While the article correctly points out that one needs negative energy to make a wormhole traversable, and that negative energy does not exist, and that the experiment merely simulated a negative energy pulse, the video has no such qualms. It directly stated that the experiment created a negative energy shockwave and used it to transmit qubits through the wormhole. For me the worst part of the video was at 11:53, where they showed a graph with a bright point labeled “negative energy peak” on it. The problem is that this is not a plot of data, it’s just a drawing, with no connection to the experiment. Lay people will think they are seeing actual data, so this is straightforward disinformation.

Several observations:

  • An article and a video. The combo suggests that presumably intelligent people writing about what is allegedly a scientific presentation are chasing the ethos of TikTok and YouTube. Interesting but didn’t Newton get along with a pen and paper?
  • Fancy lingo. Yep, holograms, sci-fi sounding jargon like negative energy, and obligatory static graphs.
  • Experts. Wow. Experts offered up without much context. Impressive indeed.
  • Meta-commentary. I love it when articles comment on other articles. Great fun.

The problem is that smart software may struggle with the nuances in the two articles. Quanta will do an article about that soon I expect.

Content marketing, pseudo tech baloney, and clicks. Yeah.

Stephen E Arnold, December 8, 2022

Is There a Horse Named Intel PR?

November 25, 2022

I noted the information in “Intel Introduces Real-Time Deepfake Detector.” I like the real time angle. The subtitle caught my attention:

Intel’s deepfake detector analyzes ‘blood flow’ in video pixels to return results in milliseconds with 96% accuracy.

Milliseconds.

I am not saying that Intel’s FakeCatcher does not work on a small, curated video, maybe several.

But like smart cyber security technology, a system works because it recognizes what it knows about. What happens when a bad actor (maybe a disaffected computer science student at a forward leaning university cooks up a novel exploit? In my experience, the smart cyber security system looks dumb.

And what about the interesting four percent error rate? A four percent error rate. So if Intel is monitoring in real time the 500 hours of video uploaded to the Googley YouTube, the system incorrectly identifies only 20 hours of video per minute. What if those misidentified videos were discussing somewhat tricky subjects like missiles striking Poland or a statement about a world leader? Not even the whiz kids who fall in love with chatbots bandy about 96 percent accuracy. Well, maybe a whiz kid who thinks a chatbot is alive may go for the 100 percent thing. Researchers often have a different approach to data; namely, outputting results that are not reproducible or just copied and pasted from other documents. Efficiency is good. So is PR.

Let’s take a step back.

What about the cost of a system to handle, analyze, and identify a fake? I think most US television programming is in the business of institutionalized fakery. I can hear the rejoinder, “We are talking about a certain type of video?” That’s okay for the researchers, not okay for me.

The Intel PR item (which may itself be horse feathers or its close cousin content marketing) says:

Intel’s real-time platform uses FakeCatcher, a detector designed by Demir in collaboration with Umur Ciftci from the State University of New York at Binghamton. Using Intel hardware and software, it runs on a server and interfaces through a web-based platform. On the software side, an orchestra of specialist tools form the optimized FakeCatcher architecture.

Ah, ha. Academic computer razzle dazzle. I am not sure if the Intel news release is in the same league as the computer scientist in Louisville, Kentucky, who has published the ways to determine if I am living in a simulation. (See this IFL Science write up.) It is possible that the Intel claim is in some ways similar: Academics and big companies in search of buzz.

Intel’s announcement is really important. How do I know? I learned:

Deepfake videos are a growing threat.

This is news? I think it is a horse named “PR.”

Stephen E Arnold, November 25, 2022

The iPhone Is Magic

November 23, 2022

I believe everything I read about the Apple iPhone. My knowledge junk bun includes such items as:

  1. Apple has a secret $275 billion deal with China. China is, of course, one of some governmental officials’ favorite countries. See this write up for details.
  2. Apple cares about user privacy. Well, maybe there are/were some issues. See this Forbes’ article for details.
  3. Apple has a monopoly-like position. But monopolies are good for everyone! See the Market Realist article for more insights.

I had these thoughts in mind right after I read this magical — possibly cream puff confection of a story — article called “Woman Who Lost iPhone at Sea Finds It Washed up 460 Days Later in Mint Condition.” The article states:

Clare Atfield, 39, dropped her iPhone in the ocean and never expected to see it again, until an incredible 460 days later. On top of it, the device was in perfect working condition

The article added:

But a year later on November 7, she was contacted by a local dog walker who claimed to have found it on the beach, not far from where she originally lost it… “The gentleman who found it and I were both just in shock that it still worked,” she admitted. The paddle boarder was stunned there wasn’t much damage to the phone considering it was lost at sea for a long time.

What’s this tell me?

  1. By golly iPhones in free protective cases are okay after being submerged in salt water for more than one year
  2. The protective case kept the water from obliterating the information on non digital documents
  3. Content marketing is alive and well when the magical iPhone is involved.

Yes, I believe everything about Apple: No secret deals, no violations of user privacy for ads or any other thing, and no monopoly position. I also believe the iPhone survivability story in the estimable “Daily Star.”

Don’t believe me? Just check with a tooth fairy. I loved the “mint condition” point too.

Stephen E Arnold, November 23, 2022

AI: Black Boxes ‘R Us

November 23, 2022

Humans design and make AI. Because humans design and make AI, we should know how they work. For some reason, humans do not know how AI works. Motherboard on Vice explains that, “Scientists Increasingly Can’t Explain How AI Works.” AI researchers are worried that AI developers focus too much on the end results of an algorithm than how and why it arrives at said results.

In other words, developers cannot explain how an AI algorithm works. AI algorithms are built from layers and layers of deep neural networks (DNNs). These networks are designed to replicate human neural pathways. They are almost like real neural pathways, because neurologists are unaware of how the entire brain works and AI developers do not know how AI algorithms work. AI developers are concerned with the inputs and outputs, but the in-between is the mythical black box. Because AI developers do not worry about how they receive the outputs, they cannot explain why they receive biased, polluted results.

“‘If all we have is a ‘black box’, it is impossible to understand causes of failure and improve system safety,’ Roman V. Yampolskiy, a professor of computer science at the University of Louisville, wrote in his paper titled “Unexplainability and Incomprehensibility of Artificial Intelligence.” ‘Additionally, if we grow accustomed to accepting AI’s answers without an explanation, essentially treating it as an Oracle system, we would not be able to tell if it begins providing wrong or manipulative answers.’”

It sounds like the Schrödinger’s cat of black boxes.

Developers’ results are driven by tight deadlines and small budgets so they concentrate on accuracy over explainability. Algorithms are also (supposedly) more accurate than humans, so it is easy to rely on them. Making the algorithms less biased is another black box, especially when the Internet is skewed one way:

“Debiasing the datasets that AI systems are trained on is near impossible in a society whose Internet reflects inherent, continuous human bias. Besides using smaller datasets, in which developers can have more control in deciding what appears in them, experts say a solution is to design with bias in mind, rather than feign impartiality.”

Couldn’t training an algorithm be like teaching a pet to do tricks with positive reinforcement? What would an algorithm consider a treat? But did a guy named Gödel bring up incompleteness? Clicks, clicks, and more clicks.

Whitney Grace, November 23, 2022

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta