Introduction About Site Map

XML
RSS 2 Feed RSS 2 Feed
Navigation

Main Page | Blog Index

Archive for the ‘General’ Category

Think, Let the PDA Do the Rest

The post is addressed to readers who are not using a PDA yet. I would like to briefly describe the advantages of life management that is assisted by pocket-sized computing.

The acquisition of a first PDA, may it be a Palm, a Pocket PC or a Zaurus (there are many more), involves transformation of long-standing habits. It is an evolving process — an adaptation if you like — of what you have become accustomed to since childhood. Tasks are being managed and flagged by a machines rather than the brain. Then again, many of us use notes to manage and organise our lives, so the transition may be primarily a ‘digitisation’ of existing information management.

The key idea of using a PDA properly is this: program your tasks as you see fit, then obey in accordance with reminders from the PDA. It is as if the PDA commands its user what to do and when, relying on and benefiting from cyclic events and ensuring that nothing is ever forgotten or becomes a mental burden. The mind is left available to think and expand its horizons rather than record information. Let us face it, machines do a better job at registering without ever ‘forgetting’. It has been their very basic nature, since the early days of computers.

SD Card

All your knowledge (and far more) in less than 1 gram

I can think of many advantages of using a PDA when compared with paper-based ‘life organisation’:

  • Automatic archival
  • Easy search
  • Easier re-use of data
  • Natural hierarchical abilities (not linear lists)
  • Less clutter (e.g. no crossed-out items)
  • Cyclic behaviour simplified, e.g. annual birthday notifications
  • Vocal reminders/alarms
  • Simple backups and duplication to prevent data loss
  • Collaborative exchange of data, e.g. Wi-Fi, synchronisation, IR port

I could think of a few more, but these should be enough to convince you why the popular Hipster PDA (famous paper-based equivalent) can never be matched. It better fits technology paranoids.

Undoing Selection/Deselection

Thinking dentistA long time ago I mentioned top software design/usability bugs. It occurred to me yesterday that there is yet another common deficiency, which is the inability to undo selection and deselection of files, entries and the like. This should become a very fundamental functionality in my opinion.

How many times in the past did you use the CTRL or SHIFT keys to establish and highlight a collection of files? One wrong click and the entire selection is gone, leading to a habit whereby files are handled in subsets, i.e. in smaller batches. In all operating systems I have come across, a selection of files, for example, forms a newline-separated list of the files with their full path. All of this is stored in the clipboard, so implementation of an undo stack should be trivial and incur no efficiency penalty.

Under Zombie Attack

Devil

UNDER the quiet exterior of schestowitz.com, which continues to serve pages reasonably fast, there are actually many problems. For the past two weeks, zombie attacks have been launched against the site. As more Windows machines get infected around the world, the number of attacks surges, approaching tens of thousands per day at the moment. This is much beyond the scale that I am used to or can afford. This gives us yet another reason to hate that unsecure, ‘hijackable’ O/S that is permitted to attack reliable and resilient Linux servers.

I have tried a variety of method to combat the scary scale of these attacks, which get worse by the hour. If anybody knows some good solutions, please send me your advice as soon as possible, before the server collapses. Here are a few valid tools apart from the ad-hoc methods I have been using thus far:

The only glaring issue with the above are that they require ownership or power over the Web server. I have contacted my hosts last night as we might have to collaborate on this. It is not only my sites that get penalised, but also other eCommerce sites that depend on QoS for their income.

UPDATE (5:30AM): Can Apache be configured to block requests based on referring URL (with regex)? I could exclude .to fairly cleanly. Please reply by E-mail if you can assist.

UPDATE (10:50AM): I have been told about modsecurity.org, but I still need root access to my host’s machines.

UPDATE (11:30AM): I have also been told about Patch-o-Matic netfilter/iptables.

UPDATE (11:40AM): The following Apache rule might work, but it is yet untested:

RewriteEngine On
RewriteCond %{HTTP_REFERER} .to/
RewriteRule .* - [F]

More details in a separate post to be published shortly.

Research Demonstrations

AT this moment I am delivering a series of 4 one-to-one demos to prospective Ph.D. students. This occupies my morning and afternoon and I must admit that I quite enjoy it. I still remember the day when it was me whose ‘role’ was a student awaiting interviews and seeing some astounding demos. Once you grow to fit the very same shoes that you admired, it all seems somewhat worthless nonetheless. That, I suppose, is simply the way of life as the nature of progression. Below is a presentation that I primarily use to reflect on work that I do at present. I re-use this internal talk from earlier this year:

Early 2005 Presentation – Ph.D. Students Talks

MIAS IRC presentation
Presentation from April this year
UCL, London

Cyborg Name Generator

FOR the sake of some short comical relief, use this neat on-line tool to generate cyborg-like images from your first name.

Shown below is the image that got bound to “Roy”.

Cyborg name for Roy

Other fun tools worth mentioning:

Bowling and Spinning

Roy bowls

The least hideous photo snatched by my sister
(against my will, I am urged to point out)

SINCE I rarely post items about my personal life, I decided to make an exception today. On my very recent vacation, I taught myself a valuable lesson in bowling — a lesson that cost me an entire game that was filled with gutter balls and oddities. It was a game of exploration and experimentation.

I decided that I wanted to master ball curling, thus hitting the pins much like the pros while spinning the ball elegantly. This ended up far more successfully than I had imagined and I would like to share tips based on my amateur experience.

  • Firstly, I count my steps (approximately 4) as I walk backwards to identify a good starting position, ensuring that I throw as my left foot stomps forward
  • I approach the track by treading across the left side rather close to the gutter. This turns out to be helpful as I am right-handed, hence I must spin to the left
  • Bending of the wrist gives the ball its spin. The grip with the ball is rather steady when the wrist is perpendicular with respect to the forearm. I was once told that by a childhood friend who played in the leagues.
  • The ball must be thrown in a sharp angle so that it nearly collapses onto the right gutter. Otherwise, it may spin to the left too early.
  • To give the ball little time to travel before it changes direction, the throw must be fast. The speed also gives extra power, which is crucial.

My main problems were often too much of a spin or reluctance to let the ball approach the gutters. It is simply adverse to instincts. Ultimately, I managed to consistently hit the pins at almost 30 degrees (towards the end of the track) and I had almost no gutter balls. As bowling is very repetitive, I need more experience. Nonetheless, I hit a few admirable strikes and spares that day, all of which involved a sharp spin and very powerful impact.

Up until a week ago I hit the pins by chucking the ball straight down the middle. At the age of 16 or thereabouts I hit 140+ at my best. Without hitting the pins diagonally it is rather hard to achieve high scores. I look at my transition to the spin as a form of long-term ‘investment’. I also find it much more rewarding to practice and for others to observe.

Forking Applications

Double-headed arrow

DEVIATING from the a development branch, thus staying away from the regular updates cycle, is a step which is bound to have its problems, e.g. security and missed out extensions. I am fully aware of these issues and I made mistakes in the past nonetheless, particularly with Web applications. I am rather confident and comfortable with my choices to extend applications, but one must remember the pitfalls, as well as the very few advantages.

Rather than simply downloading pre-installed and/or pre-configured packages like Gallery, WordPress, a VPN client or PHP-Nuke, one can add a wee bit of ‘individuality’ to them. For example, with actual words and vocabularies that do not suit your way of speaking, you can instill some personality within the software — a beauty to be found most commonly in Open Source software. It gives a feeling of ownership, a sense of personal contribution.

Linux users are often inclined to hack software and customise it, maybe because they can. With some Linux distributions like Gentoo, people struggle to compile individual components and some have the odd habit of re-compiling the Linux kernel. Again, it gives an utterly unnecessary sense of achievement. That free platform, however, unlike other platforms, can be claimed to be one where very little intervention should be involved. With 5-CD installations, for instance, all the necessary software is in place, is well-integrated and simply works without any apparent conflicts. Somebody else took care of all the nasty installations and then burned some ISO to be distributed and put as-is on other people’s computers. So, we perceive a situation where there is a great deal of freedom, but at the same time that freedom is unneeded or even discouraged.

Change to existing packages is risky. It can bring an application to a fragile state. Attempts to exploit vulnerable (usually non-existent if the owner is fortunate) components are being re-directed to an unpleasant page at server level on this domain. I hope these can successfully deter a determined hacker. The only ones to come across such a page would be those attempting to sabotage (hence the rel="nofollow" in the link above).

When forking and choosing to no longer follow a development cycle, there is always some possibility of ‘flushing’ self-made components and starting fresh with similar, even identical data and an application belonging to the current generation, hence incorporating state-of-the-art technologies. Upgrades usually mean some loss of personal changes which are better off never lost. This may lead to feelings of regret due to waste. It also means hours of conversions, not to mention the laborious process that is involved in updates and getting accustomed to new interfaces. As it stands, I continue to fork, but do so cautiously.

Retrieval statistics: 21 queries taking a total of 0.341 seconds • Please report low bandwidth using the feedback form
Original styles created by Ian Main (all acknowledgements) • PHP scripts and styles later modified by Roy Schestowitz • Help yourself to a GPL'd copy
|— Proudly powered by W o r d P r e s s — based on a heavily-hacked version 1.2.1 (Mingus) installation —|