Sweating The Computer Stuff

I have not been in the state of mind to write a blog for a little while now. You can blame technology for this. I finally got a new computer. I ended up spending a lot of time getting the new machine up and running. I found myself in a frame of mind not conducive to writing anything.

My old laptop computer has had a few issues with it for a long time, but I tried to manage without a replacement for as long as I could. One of the buttons on the touchpad has been sticky for a while, which sometimes led to unexpected responses when it was pressed. The plastic casing of the computer had cracked and separated an even longer while back – at the location on the side where the power cord got plugged in, to the extent that the connector for the power cord inside the computer was not firmly connected to anything within the computer itself. When the lid of the computer was lifted to the certain level, the broken plastic on the bottom of the computer would separate, and the connector would become free to move. The only way to ensure that the connector was stable was to push the top and the bottom elements of the casing together and to try to keep them together using some force. The engineer in me had to try to come up with a solution to the problem. Super-strong adhesives would not work since the force pulling the broken pieces apart was too much. I was using a sticky tape instead as a temporary solution, and had been trying to limit the actions of opening and closing of the lid of the computer. That careful approach had its limits, and mitigated the issue for only so long. It was time for a new computer!

I got a new laptop computer with much more memory than I had before, with the hope that it would make it easier for me to support multitasking, and also speed up running of my photo editing app, a piece of software that is a complete memory hog. I also upgraded to a Solid State Drive (SSD) instead of the traditional Hard Disk Drive (HDD) in order to eliminate a moving part in the computer.

Laptop technology has advanced significantly since my last upgrade about 6 to 7 years ago. The newer units are far more compact (smaller in overall size for the same screen size), significantly thinner, and much lighter. This is in spite of the fact that the new machines are much more capable than the older ones. The core chipset technology has advanced significantly.

The effort involved in bringing up the new machine to a configuration of familiarity to me, so that I could do all the stuff that I used to do on the old machine, was what disrupted my past week completely. This process should not have taken a lot of time. But one of the key apps on the old machine that I use for image processing would not install on the new one. I spent a few days trying to get past this issue, even spending a significant amount of time with representatives of the company that made the app – on the phone and on my computer – trying to figure out what was going on. I even gave the company reps temporary access to my computer for hours on end. (I was very nervous for the duration of the remote sessions when they were running.) In the end, they were unsuccessful in figuring out what was going on. And, in the end, they also dropped the ball on solving the problem. They had promised a call back from their experts within 24 hours. A few days have passed since then…. But, fortunately, I had also been trying to troubleshoot the problem on my own, and finally found out the source of the issues I was having. It was due to the existence of a use case that they were not likely to see too often – one that they were not familiar with. But shame of them for not following up! If they had stayed on the case, the information that I have found could have been helpful to them in the future. Too bad that they gave up!

Changing gear……
Changing topics…..

We went out to pick fruits at a farm last weekend. It was my first such experience. It was a fun couple of hours. The fruits available on this farm for picking at this time of year were nectarines, peaches, and blackberries. It turned out to be a very pleasant day to be outside. It was good exercise to walk across the fields to the locations of the best pickings. I was quite surprised by how engaging the process of trying to find good fruit to pick actually turned out to be. One becomes adept at making out the level of ripeness of the hanging fruit. And, of course, you are sampling some of the fruit you have just picked as you go along. There we a lot of families out there having fun. In the end we ended up picking more fruit than we really needed.

The farm had other activities to keep the families engaged, including places to pet the animals, and a flower garden where people could cut flowers for themselves.

It was a good day!

We were also able to go to the canal for our Sunday walk last weekend. It was good to be out again after a short break. We went to a familiar section of the trail – between Sycamore Landing and Rileys Lock. The parking lot was unusually full because of the people who had come to see the garden of sunflowers next to the lot.There are very few flowers along the trail itself at this point in the season in this section of the towpath. There were the dying Wild Sweet William that I had seen in full bloom while biking a couple of weeks back. The underbrush is also very thick at this time, with the various tall grasses and shrubs pushing up against you from the sides in the sections of the trail that have not been cleared out yet. It is green everywhere.I did see some leftover Bee Balm, Coneflower and Touch-Me-Nots. There seemed to be fewer than usual birds around. We noticed the occasional cardinal. The woodpeckers were scarce.

There was the one Zebra Swallowtail that we saw feeding. It did not seem to notice us.

Fortunately, there were very few gnats, probably because it was a unusually cool and cloudy morning.

It is possible that the reader will get the impression that the experience of the towpath must have been diminished because of what I have written above. Banish the thought! That certainly was not the case. There is nothing like being out in the quiet of the woods to rebuild one’s spirits – in order to carry you through the rest of the week. Thus it was last weekend!

Apple and Privacy

Privacy is something that none of us who live in the digital connected world really have.  While we would like to believe that we are safe from prying eyes by using the tools provided by the different vendors who design security solutions that incorporate into our systems, I think that this ship has sailed.  The moment you decided to be a part of the Internet, be it on the social media, or be it for simple browsing, or e-mail, or chatting, you created a door into your device, and a means for your information to become available to the snoops, and also for folks who want to misuse your device. The security solutions I mentioned before can barely keep up with the hacking world in this regard. And it only takes one mistake to open the backdoor into your system! The best you can do is try to limit the damage.

There are all kinds of snoops.  There are the ones trying to get at your confidential information to do something bad to you. There are those who are trying to misuse your personal information for other illicit purposes. There are those who are trying to legally or illegally gain some commercial advantage, trying to sell things to you by learning more about you from your computer.  And then there is the government that might suspect you of doing something illegal on your computer.

Why has it been so easy for people to get into our private systems?  For one thing, most of the systems that we work with have fundamental software design flaws that can be exploited.   Next, whenever you are connected into the Internet, you have an address at which you can be reached.  Then, for reasons of convenience, and for supporting required functionalities, systems also include means for others to get access to your working environment for legitimate purposes.  (For example, remote login capability exists for debugging purposes.)

Once you have an identity on the network, there are ways for people to try to access your system for both legitimate and nefarious purposes.  Every time you visit a website you are executing code from the website on your computer.  Websites leave cookies on your computer regularly when you browse them.  And sometimes you give outsiders access inadvertently by going to a website that interacts with your computer in a malicious manner.  Once you have have hit the wrong button on the browser screen, or in an e-mail, or even opened a malicious application file that you downloaded, you could be at the mercy of the entity on the the other side of the communication link established.

And then there are many of us who are willing to give up our privacy willingly in return for something  that we want.  It happens all the time when you give your information to companies like Facebook, or Google, or LinkedIn or Microsoft, to name a few.  It happens when you make a purchase at any online shopping  site like Amazon or even an Expedia.  And then the systems that these organizations use for storing all this information are not foolproof.  Personal information for millions of people have been stolen from the records of more than one government agency.

Your digital communications are themselves not safe from snooping.  Communications from your smart phone can be intercepted by fake cell towers, and communications through an ISP can be snooped upon directly.  Both the bad guys and the good guys take advantage of this approach.

There are rules and regulations meant to address many of the above scenarios to try to protect your privacy, but in many cases rules cannot keep up with either the technologies nor the human ingenuity when it comes to creating problems and creating chaos. Then there are the human tendencies that make us disregard the speed-bumps in the  processes that are meant to make us slow down and think for a minute.  We make mistakes that allow our privacy to be compromised. When was the last time one read a EULA?   When was the last time one read and reacted to the privacy statement (mandated by law) they received from their financial organization?  Do we accept and store all cookies offered up when browsing a website?

Tim Cook at Apple has decided that the privacy of the owner of a device must be protected at all costs.  In this case, he is talking about access to the contents of a device by a third party that has your device in their hands and wants to look into its contents without asking you.  They want to make it extremely difficult, if not impossible, to do something like this. Recently Apple introduced the concept of having all the contents of the device encrypted, and limiting access to the decryption key to the the owner of the device (i.e., even Apple does not know what it is).  In order to be able to use the key, the user has to first get access to his or her device with a password.  If somebody tries to hack the password too many times, the device stops working completely.  The system is “bricked“.  The only way to break the system is to guess the password without too many attempts.  Apple does not have a back door in its current software that lets it bypass this security.

This is where government access to a device becomes the topic of discussion.  What the FBI has asked Apple to do is to hack into their own system so that they can read the contents of another person’s smartphone.  Apple is refusing in spite of being under a court order.  They are in a difficult place. If they attempt to break their own system and are successful, it could indicate that others could also find a way to hack into their supposedly super-secure system.  They designed the system to work this way for a reason!

Is Apple justified in refusing to cooperate with the FBI?  Under ideal conditions I would say that they are not, since once you become a part of a society and its systems and use it to your benefit, you have some responsibilities to the system also.  But we also know that the system is not infallible, and can easily be manipulated and misused (as shown by Edward Snowden).   And the tendency for misuse is somehow inbuilt into the system because of human nature and can perhaps never be fixed.

Where should the line be drawn with regards to trying to protect privacy under these circumstances? It is certainly a dilemma…