I am a pretty constant guy. I've repaired and used my computers well after it was cheaper to buy new, much better ones, and the same thing applies to my smartphone, which has now the venerable age of four years (yeah, it was sarcasm. My Nokia phone still worked for a week on a single charge after 8 years of use). Anyway, my problem is not actually the phone as it is the battery, which is "spent" and for which I need to buy a new one. Good luck finding anything for four year old hardware!

Ridiculously, the problem only occurs in a specific situation which I am going to detail next. For the rest of the usage, the battery, as it is, is good enough. I can talk, I can read books, I can watch movies, I can use WiFi. But when I am turning on Mobile Data, it first lags, then freezes, then restarts and keeps restarting until it gets to 0% charge in a matter of minutes. The only solution to stop this is to remove the battery or plug in the charger.

So what is going on here? When you turn on Mobile Data, all the apps you have installed are trying to access the Internet - some want to load data, some to load ads, some to check for updates - the problem is that they are all doing it at the same time. The phone is trying to use too much power and it fails in ways no one had predicted (or bothered to fix). Funny that it doesn't happen with the Wifi, which is probably more optimized for power use. The solution, then, it to prevent the apps for using the internet on mobile connections.

For me, the worst was Google Play Store and Google Services, together with Facebook, Twitter, WhatsUp and TripAdvisor, but also some unexpected applications that have nothing to do with Internet use, such as Alarm Clock or Office Suite. This also has unexpected secondary benefits: stops you from going to Facebook or Twitter in places without Wifi, which are usually transit zones or transportation vehicles. Instead, read a book.

Probably a little known fact. I am sharing it here for posterity. Win-P and "Connect a wireless display".

... and I don't mean something like injecting ads; I mean they modify the images you download and the pages that you read. They do that without telling you, under the umbrella of "improving your browsing experience". Let me give you some examples.

Today I copied two image files on a server: a JPEG and a PNG file. When downloaded via a normal network connection, I was getting the original file, about 50KB in size. When downloaded via 3G the image was different! In the jpeg case the file was smaller by a few hundred bytes and in the case of the PNG the file was actually bigger than the original. What was worse, the metadata information in those photos, like the software used to compress it, for example, was completely lost.

I couldn't believe my eyes. I strongly believe that what you ask for from the Internet you should get. This may not have been obvious for someone downloading the images in order to see them, but I was actually conducting a test that depended on the exact size of the file I was downloading. This practice seems to be widespread, but when Googling for it very few links pop up, showing that people mostly have no idea that it happens. In this operator's case, they seem to only change images, but people on the Internet tell stories of bundling CSS and Javascript files inside HTML files, or removing comments from either of them.

The morality of this is dubious at best, in my view it should be illegal, however things are worse than that: this behavior breaks functionality in existing sites. How can you possibly guarantee that your application works as expected when mobile operators (and I guess any ISP) can change your content arbitrarily and without the possibility to opt out? It's like that joke with the boyscout explaining at camp that little old ladies are hardier than one might think, as they squirm and shout and hit you when you try to cross them the street and the instructor soon finds out that it never occurred to the boy that he should first make sure they want to get to the other side.

Here are some links regarding this, just to make sure people can find them more easily:

Mobile operators altering (and breaking) web content
Should mobile operators be free to modify content they deliver?
Mobile Proxy Cache content modification by O2
O2 UK mobile users - your operator is breaking this site for you.
Prevent mobile website image compression over 3G
Get rid of image compression on O2′s network
ByteMobile Adaptive Traffic Management

From the last link you can see that they are caching and modifying even movies, through practices like giving you a lower rate movie or caching a version with a lower resolution. They do this in the name of delivering you video content compressed with a format and codec that your device can safely open.

A solution for this? Encryption. Using HTTPS prevents access to the content from a third party. HTTPS is becoming more and more used, as the hardware requirements for its implementation become less restrictive and with the many revelations about government scrutiny of Internet communications. However, you might be interested to know that mobile operators are feeling threatened by it. Articles from their point of view decry the "threat" of encryption and the solutions against it! The terrible impact of encryption is seen as an impediment in their rightful "content and delivery optimization techiques".

Things are getting even worse. Remember the concept of network neutrality? It is a very hot topic today and a very important political and economic fight is being fought right now to protect the transparency of the Internet. However, if you look further, you see that nobody considers the practice of "optimization" as something net neutrality should protect. In December 2010, the US Federal Communications Commission set three basic rules for net neutrality:

  • Transparency. Fixed and mobile broadband providers must disclose the network management practices, performance characteristics, and terms and conditions of their broadband services;
  • No blocking. Fixed broadband providers may not block lawful content, applications, services, or non-harmful devices; mobile broadband providers may not block lawful websites, or block applications that compete with their voice or video telephony services; and
  • No unreasonable discrimination. Fixed broadband providers may not unreasonably discriminate in transmitting lawful network traffic.

So they are primarily focusing on blocking and throttling, but not on preserving the integrity of the transmitted data!

Right now there is a battle raging on that few of us are aware of. It is for one thing only, and that is control over the Internet, control over communications between people, whether it is a discussion about a two tiered Internet, one free and one paid, or a ban instituted by a government or another on sites that are considered bad for you. It started as it usually does, with governments and corporations trying to get as much of the pie as possible. Only something was different: the Internet is so basic, so flexible, that the companies regulating its use and owning the hardware it runs on cannot control its flow or its direction. And as great strides have been made by intelligence and commercial entities alike to control the content and to track the use, equally great strides have been made by individuals to conceal the use and escape monitoring and censorship. The biggest and most touted mechanism that allows anonymity on the Internet is called TOR, The Onion Router, and its concept is simple: encrypt all communications and randomly route requests through the TOR nodes so that the origin of the access is next to impossible to find. There are other, less known methods of doing this, but TOR is the most used and the most known. It is mostly used as a proxy to anonymize normal Internet access, though, and very few people are actually using TOR to access TOR services only.

I am here to tell you that, first, TOR is not enough and, second, that no other software will ever be enough for this kind of use. You see, the TOR nodes I was talking about are people using TOR on their computers and allowing other people to access the "normal" Internet through them. A lot of the TOR exit nodes that are the border of the anonymous TOR world and the transparent Internet, are actually heavily monitored by everyone interested, if not actually ran by them from the beginning. Like in an old example where the FBI was running an IP anonymizing proxy, those exit points are the weak spot of the TOR network. Another flaw is the fact that it works as a proxy for normal IP protocols. Some software (Bittorrent, for example) is openly sending the originating IP in their data, so it doesn't matter if you go through TOR to download stuff, your IP is still there for the world to see. Since you cannot trust all software than runs on your computer, you cannot completely trust using TOR as a proxy for anonymous Internet access.

The solution, I believe, is to implement the anonymizing and encryption features in the Internet itself. Make it so that there is no address for any of its users, or if it is, it is something temporary that you assigned for a connection or another and can be easily recreated and changed. Do it in such a manner that no one will be able to control the DNS servers and the naming schemes, so that you can call your web site whatever you want and not have to pay for it and be able to host it without broadcasting to the world where you are. The problems in implementing this are major, but not insurmountable. One of them is that encryption and complicated routing are significantly decreasing access time. However, given the speed of Internet today, that is not really a big problem anymore.

My thesis is that if freedom of speech, true freedom of speech, is implemented in a technical way, unbiased by any other rule than that you are free to communicate without fear, then no amount of intimidation will be able to break it. As always when human politics have encroached in the territory of personal freedom, the only solution is usually technical, at least since Gutenberg made his printing press and probably way before that.

I am myself not skilled enough to think of all the aspects of such a new protocol for the Internet. Also I am pretty sure that opposition will be huge against any attempt to do it. But what about if we, technical people, get together and make this work? Borrowing parts from the enormously successful TOR, Bittorrent, Bitcoin, we can architect freedom rather than just talk about it in the context of some war or another. Think about it the next time when, in your free country, you get arrested for saying what you believe in or sharing what you know or trying to access a site and finding that it is not there anymore, not for you at least.

One of my responsibilities is to create an email newsletter for some friends of mine. In order to do that I scour the Internet using Google Alert, RSS feeds and other nefarious means like that. The job consists of opening each page, copy pasting the URL, the title and then finding the most effective way to express the content of the page, which is often one of the first paragraphs. And what do I get when doing that? A sort of weird marketing spam that is as annoying as it is (in my view) pointless.

Here is what happens: first you go to a page using a normal URL, let's say you googled it. Once it loads you look at the address bar and see what is called a hash added to the URL, probably used to identify your visits for marketing purposes. Example NewScientist: mouse over the link to see the actual URL, then click on it to see what actually happens. I have tracked this to the AddThis scripts, when configured with the parameter data_track_addressbar:true. So in case you wondered if the site you are visiting chose to add that ugly hash there, yes it has!

Another thing that happens: You select a paragraph of a page, you copy it, you paste it in your email only to see added stuff to the text, like "See more - some URL". Check it out at Astro Bob's. Try copying something from the blog and pasting it into Notepad. The crappy string at the end is added by ShareThis, usually by its WordPress plugin. This time it was their fault, as they added some crap in the plugin. All Astro Bob has to do [hint! hint!] is to disable the feature.

Now all that remains is to understand why. According to marketing reports, the sharing of information on the Net via copy&paste is more than 80%. So they want people to be able to control what happens with the information they publish, and it is a reasonable goal, but this is not the solution. Instead, what users will do is either get annoyed with the spam they have to clear from URLs and pasted text or, and that should concern the site owners, not copy from them at all. And if you thought having your information disseminated on the Internet without your knowledge and/or consent was bad, wait until nobody cares about it at all.

I have to admit that after using the iPad a little, I got to enjoy it and find some uses for it. Most enlightening was using it with a cover. Without it, the iPad is just a thing to make your hands tire; with a cover one can place it somewhere, watch a movie, hold it in a myriad of ways and alternate the muscles needed to support it, if any. I still hate Apple and everything it stands for, but I'll admit that I stopped disliking my iPad.

I was thinking the other day what would my father do with a device such as that? His job at the moment is a translator, that even without it, he would like to comment on things and write content. So I have experimented by writing a blog post on the iPad (see previous post) to see how it holds for data entry.

My conclusion is mixed, but it borders on the positive. The first thing to notice is that, since I was writing English, the autocomplete was very helpful. I doubt that it would have been as easy to write in Romanian, for example. Then, the solution for writing on the iPad was not the split keyboard (keys too small and cumbersome use), but placing the device on my belly (in it's cover that allows for this) and typing with two fingers. The writing went pretty fast, but my hands soon got tired. I had to pause at regular intervals. That is not something bad when creating, though.

Of course, there have been problems with stuff like punctuation or writing non letter characters. Writing about code on the iPad would have been suicidal, I think. Also, I was a little put off by the fact that the blog post entry did not look too good on the iPad browser (the interface on the right, like labels, was inaccessible). I know this is a Google issue and they should fix their Blogger interface to fully support devices like the iPad, but also an Apple issue, since that interface works in every desktop browser and it should have worked in Safari as well (btw, have you seen how cool and cross browser is my blog even on the iPad? :) ).

Bottom line: I really would have wanted to say using a keyboard is so much better, but with my incredibly bad typing I have to always backspace and fix words, while in the iPad autocomplete enabled, one "key" at a time writing style, this was a non issue. My hands got tired though, even if I found a relatively comfortable position and in the end I had to Publish the post from the desktop just because I also needed to set the labels for the post. Overall, a usable experience.

I have a pretty bad opinion of Apple products: expensive pretentious gadgets that impose all kinds of restrictions upon the user. So bad, in fact, that I delayed saying anything about the iPad I got from work until I was certain I wasn't completely biased. I mean, so many people using iStuff can't be wrong; it had to be me.

But today the bubble just burst. I lost so much time searching for simple apps that open one type of file or another, only to be reminded again and again that Apple doesn't support that kind of file. Why does Apple need to support anything? I just want the app that opens it. The "there's an app for that" meme doesn't seem to apply to most of what I want!

Basically, what I desire is to have access to the files I copy to the pad with the best software available for those files. I don't want to use iTunes, I don't want to split my files based on type and most, most of all, I want to either use paid or free applications, not something in between, like a diseased mutant.

Oh, maybe you didn't know about the "freemium" ecosystem on the iPad. You go to their AppStore application (a software so bad that it forgets the options you chose if you change the search string) and you select if you want applications for IPad and/or IPhone, free and/or paid, based on user rating and category, etc. You see something free that you like, you install it, only a button away, then you start using it. It may be a game or a utility and at first it is all well. And when you want to get a better weapon, continue to the next level, finish the workflow a utility is supposed to support, you get a "buy the full version". This is called "freemium", a disgusting offspring of shareware applications that makes that look benign.

You have the option to "jailbreak" your iPad. There is an app for that (hee hee), many in fact, that hack your Apple jewel and turn it into something that you have full access to. You get a Linux like command line, a place where you can get a lot of the software you want and need, all a button away. Apple does not like that. At every step of the way they will try to fix their broken machine in order to stay broken. So no, my naive friend, the iPad doesn't work like a computer not because they couldn't do it, but because Apple forced this on you. If I didn't give the pad to my wife, I would have jailbroken it for the principle alone.

But why? would somebody ask. What has Apple to gain from maiming their own device, creating crappy applications for a small tablet that costs as much as a decent laptop? It is all because of the AppStore, of course. If they can make a zillion assholes sell you useless junk that my 386 computer did better in the day, they can share a bit of the profit. So not only they rip you off with their cheap device made by labouring children that barely get something to eat, they keep getting money off of you, a trickle at a time. And, because you don't have complete access to the machine, they can force whatever software they want, unsecured, crap, cheap, but one that you can't hack, can't crack and can't use until, yes, you pay them.

Today I searched for an hour for an iPad application that would read .lit files. Yes, the Microsoft ebook format. There are CHM readers, why can't there be LIT readers? Apparently the "Steve" way is to convert the lit files to .epub (on the computer that I have to have in order to use the pad) and then copy them (with iTunes, not directly) in the ebook reader sandbox. If it happens for me to have a movie or some text files and maybe a picture in the same folder, I cannot access it with the epub reader, I have to move everything in its place.

Luckily I found something that even slightly resembles what I need: FileApp it is called, it allows for me to copy files to my Pad via FTP. I can open them, and that means they get copied where the program that uses them needs them (even if they are 4Gb of DVD image). Not a perfect solution, obviously. And you still need applications that can open the files you own without having to convert them.

I hope Windows Surface will be a huge hit, something that would sweep this crap away. Apple can buy Facebook and go to hell together to rot. When Android will be what Linux is today and Windows will be.. well, Windows, and the iPads will be relegated to the bottom, with all the other mini game consoles, then I will be content.

When I was a child I watched with huge eyes movies like Hackers, enjoying the shenanigans of computer rebels fighting the stupid law enforcement and the "evil" hackers. Of course, there was also Angelina Jolie. Even then I knew that my pleasure was a guilty one: no way could the police be that stupid, no way it would be that easy to penetrate all kinds of systems and produce effects so flashy. A while after that I watched Skeet Ulrich in the movie Operation Takedown, which was a more realistic hacker movie (and one I think Skeet did a great job in). It depicted how Kevin Mitnick has been apprehended by the authorities. I really loved that movie, although it had a lot of eye rolling moments.

Fast forward to now, reading Ghost in the Wires, Kevin Mitnick's book about himself, practically a hacking autobiography, and I loved this book every bit as much as I liked those movies as a kid. Not only I couldn't leave the book out of my hands once I started reading it, but was shocked to see that reality is not that far away from what was depicted in hacking movies. It was also interesting to read how the script of Operation Takedown came to be, which Kevin considers defamatory and mostly untrue.

Long story short, Mitnick is a smart kid with a great memory, an absent father and no real friends. He starts dabbling with radio and telephones and manages to get access to phone systems way before computers where personal or connected to each other. He's a kid, though, and he gets caught a few times. Nobody seems to understand he does it just for the fun of it and he can't seem to understand why nobody gets him. In the end, pushed by the desire to challenge himself, but also by authorities baiting him all the time, he becomes a life long hacker and eventually gets caught.

A shocking part of the book is how easy it is to penetrate any system, not by whatever technical wizardry, but by simply tricking people into giving you information and access. Called "social engineering" it was Mitnick's strongest point and at several times in the book, when the technology would not allow him to enter one system or another, he would just abandon the tech stuff and go with tricking people. Already having knowledge on how to manipulate phone systems made that a lot easier, as well.

Another, less shocking, but utterly disappointing part is about authorities. Just as they are now about file sharing and whatever "crisis" they are in, law enforcement agencies are basing their entire existence on pure power of coercion, ignoring the rules that they themselves are enforcing and being motivated only by keeping that power in their hands. Technical morons, they only seem to be getting into the action when their pride is affected. In this book Kevin Mitnick dances around security personnel, local cops, FBI, NSA several steps ahead of them, but they only seem to really mind when newspapers start publishing articles that makes law enforcement look bad. And once they have him, caught only with the help of other hackers, they are using all the dirty tricks in the book to bring Mitnick to his knees. Nothing has changed from then to now, just look at cases like Gary McKinnon's. Intimidation is a bully's greatest strength. That's sad.

I would have to say that the most unexpected thing was the tone of the book, which is almost exuberant. Mitnick has not become a bitter and paranoid man after countless personal betrayals and authority abuse and he is not angry at all. If anything, the guy is happy to have lived as the lead actor in the "Myth of Kevin Mitnick", which has grown way bigger than the real person. There is a scene when he gets outside of a building and there are hundreds of fans there, shouting, and he looks behind to see if there is a celebrity around.

Bottom line: this is a book you can't miss. It is easy to read to the point of instantly addictive, it is well written with enough juicy technical details to keep one interested and, most of all, makes you feel good, even in the horrible moments of his detention. It makes one wonder, did Mitnick socially engineer himself into remaining an open and cool guy in the face of adversity? Or is it he had this strength all along and that is his most powerful "magic"?

Who needs time consuming trips to other countries when you can have it all here, on Siderite's blog, embedded in a blog post? Of course, if you would like the real deal (Hmpf!) don't hesitate to contact me. I can guarantee very good prices and the total trustworthiness of the people there. (Both Silverlight and Photosynth have been somewhat discontinued since the time I wrote this)

You can('t) access the same Photosynth by clicking on this link: Villa in Kyparissi, Greece on Photosynth.

Now, before you start thinking I've gone into tourism marketing, let me explain the technology, what is Photosynth and how to use it.

Photosynth is a Microsoft Research baby and one of the things that they should be terribly proud of, even if not many people have heard of it. I blame this on bad marketing and the stubbornness on using Silverlight only. If you are to read the Wikipedia article, the technology works in two steps. The first step is photo analysis with an algorithm similar to Scale-invariant feature transform for feature extraction. By analyzing subtle differences in the relationships between the features (angle, distance, etc.), the program identifies the 3D position of each feature, as well as the position and angle at which each photograph was taken. This process is known scientifically as Bundle adjustment. You can see it in action if you go to the villa and chose to see the point cloud. The second step is, obviously, navigating the data through the Photosynth viewer.

Now, how does one use it? Surprisingly simple. First take a bunch of photos that overlap themselves. You can use multiple cameras, multiple view angles and times of day, which of course does complicate matters, but the algorithm should be able to run smoothly. Then download the Photosynth software from their site (make sure you have an account there as well) and feed the photos to it. Wait a while (depending on how many photos and their quality) and you are done. I especially liked the option to find the place in the synth on Bing maps and select the angle of one picture in order for it to determine the real location of the objects in the photos. It will also use geographic information embedded in the pictures, if available.

There are, of course, problems. One of the major ones is that it is all done through the Photosynth site. You cannot save it on your HDD and explore it offline. Also, it is not possible to refine the synthing process manually. If your pictures are not good enough, that's it. You will notice, for example, that none of the images rotated to 90 degrees were joined to any others or that there is no correlation between the images of the house outside and those inside. One cannot remove or block pictures in the synth, either. Being all closely connected to the Silverlight viewer also reduces the visibility of the product to the outside world even if, let's face it, I have edited the Photosynth by adding highlights and geographic position and I have navigated it all in the Chrome browser, not Internet Explorer, so if you refuse to install Silverlight to see it, it's a personal problem.

I hope I have opened your eyes to this very nice and free technology and if you are interested in a vacation to the place, just leave me a message on the chat or in a comment. If you have read to this point, you also get a 10% discount, courtesy of yours truly :)

Don't worry, it's ok now, my years old computer that I can't get myself to replace. The experience has been very educational and I want to share it with you. Here is what happened: the computer that I keep always on started making strange clanking sounds; they came from the HDD. I got a little concerned, but I didn't have the time to address the problem right then. The computer seemed to work fine so I continued (btw, don't you do that in the same situation :) ) to work on it. Finally the computer reset itself and it wouldn't boot. Or, better said, it would boot for a second and restart. I checked the hard drive cables, I removed and cleaned the processor cooler, I vacuumed the power source. Nothing worked. I took the IDE drive from an older Duron computer and tried to boot with that one. It didn't work either, but then again, I had no guarantee that the old drive was functional.

I was really upset. I had an exam to take, all my data was lost, I had a full schedule for days and, being the end of the month, not enough cash to buy a computer right away. And I needed bank loan formalities like I needed an anal probe. But, I thought, maybe I can take the hard drive at work and copy the data, or at least part of it. And it worked. In fact, the drive worked so well at work that I began to doubt that the HDD had any problems. What could it be? I did have a feeling that it might be from the processor cooler that I had removed to clean. After years of use, the thermoconducting gel that transferred heat from the CPU to the metal radiator was only a dusty crust. I decided to buy a cooler or at least some gel.

Of course, any computer shop that was near my work did not have coolers for my old Athlon processor, so I bought gel and then (to be sure) also a cooler for a more recent processor type. I went home, saw that the radiator was way too large for the processor so I removed the fan from the new cooler and placed it (using ingeniously twisted wires) on the old radiator, then applied it with new gel on the processor. And the computer began to work with no drives attached to it. However, attaching the drive would make it reset itself again.

The culprit was, I assumed, either the motherboard (oh no!) or the power source. I removed the old power source from the Duron computer and replaced it on the Athlon computer. And it worked! With wires and thermoconducting gel I brought my baby back to life. I was better than MacGyver! However, the new source would make a really high pitch sound when I turned the computer off and a loud fan noise when I turned it on. I had no intention of buying a new power source for an old computer, I just wanted to make it work.

So I went to my office and borrowed three power sources that had been replaced with newer models. Went back home... none of them worked. As computer parts go, the power source is both the most solicited and the less standard item. There are unlimited ways a power source can fail and the effects on the computer are always surprising. All three displayed some (different) sort of partial functionality. I was considering opening them up and making a Frankensteinian source from them. I know nothing of electronics, but how hard can it be (vision: me burned to a crisp by an electrical fire after having my heart stop due to electric shock). However, I did remember that the source in the Athlon computer was not the original source. I had replaced it with a newer model a while ago and I had kept the old one. I rummaged through my stuff and found the old power source. It worked, it had a somewhat loud fan, but not that loud and it didn't make any electrical high pitched noises. Saved!

I was congratulating myself on repairing the computer using only the things in my house (all but the new cooler) when I remembered that I had an old 500Gb external drive that wouldn't work unless you applied power from the computer power source to the internal drive in the box. And so I did that (using wires again, because the adapter from the old power port to the new got lost somewhere) and backed up all the data from the drive that I thought died. Now I have a backup!

And if I am here, why not borrow a voltmeter and try to figure out how to wire up this external drive so I can use it without all the wires sticking out of it? So the story continues, as this is what I intend to do. I am a guy, tinkering is in my DNA, and it is so satisfying. Also, it helps seeing the uncomprehending look on my wife's face and the horror in her eyes when she sees more wires. It's fun! :)

I am not working with barcodes or anything, but I think this new technology is kind of cool. Something that acts like a barcode, encodes more information and it is several times smaller. More than that, it can be read from multiple angles and from a distance of up to 20 meters!

I can imagine multiple applications, but what I specifically think could be great is augmented reality. It would start with markers that would tag objects from computer detection, but then it would probably transform into a communication system, if the codes are dynamic. And I am not talking about replacing IR or bluetooth here, but couldn't one imagine a programmable bokode that would change the tag of an object? Think picture frames. Or TV images. Something that would tag a dynamic object like a video screen.

I was browsing the HanselMinutes site for interesting podcasts to listen to while going to work and I found one entitled Windows Home Server. First I thought it was one of those Home versions, like Windows XP Home which ended up being total crap. But a home server? So I got curious and listened to it.

Apparently Windows Home Server is meant to act as a central point to your data, providing easy backup solutions and storage management well above what RAID can do. Also, there is a central console that you can use to manage and also connect to the computers in your home. I found interesting enough the way they plan to combine Microsoft Passport with a dynamic DNS for your computer, allowing you to connect to your home via browser, waking up computers that are shut down and accessing them as well.

But the most interesting technology seems to be the Windows Home Server Drive Extender, a technology that takes all drives available of any type and adds all of the storage to a single namespace that you can access. You select which part of the data will be duplicated, which means the server will choose multiple drives to store your important data, leaving downloaded movies and music alone and saving space. Even more interesting is that the server backup system itself uniquely stores clusters. So, in my understanding, if you have 10 computers with Windows XP on it, all the common files will have the same clusters and will only be stored once!

This technology seems more useful and powerful than Windows Vista and considering it is based on the Windows Server 2003 technology which itself was based on Windows Server 2000, the minimum requirements are really low, like an old 1Ghz computer.

A while ago I wrote this entry about an innovation in sound technology that will probably change the way we think of sound.

Today I am presenting a video technology I witnessed at the mall! Yes, the mall, that dreaded place of overpriced junk and overdressed bimbos. Overpriced, too! :) Anyway, I was watching this Pepsi commercial on a big TV like device, where a can of Pepsi was rotating showing its full cylindrical glory. Only that it felt out of focus. My eyes were kind of sore watching it. Immediately the image changed to a ball that came towards the screen and then... went through the screen!

It worked from almost every angle, without being a holographic thing in the middle of the air, but more of an optical illusion. Thinking of the faithful thousands of people reading this blog every day, I remembered the little link on the side of the device: www.x3d.com, with their device called MultiView.

The image is not as clear as one would want. It's like continuously vibrating or something like that, but the optical illusion is great! I saw people passing by the device and trying to put their hand through the "flying" objects.

Here are a few links from Wikipedia about the subject:
Volumetric Display

Enough with this! Geeks are not supposed to move, even use their hands to push something so small as a mouse. Moving a mouse all day builds muscle and you know that is bad! So check out the OCZ Neural Impulse Actuator at work. A head band, a wire, no movement. Geeky! I want one of those!

I've told a lot of people about this, but forgot to blog about it. Shame on me, because this revolutionary concept can change the way we think of sound.

Audio Spotlight enters the category of directional sound systems, more precisely it creates sound from ultrasound. The result is that you can direct a single speaker towards a certain area, and only people in the area can hear the sound.

There are drawbacks, as obstacles getting in the way of the sound beam block the sound from reaching further on. There are limitations to the frequency response and the dispersion pattern. I also don't know if the system can create loud sounds as this would probably need high power ultrasound and I don't know how healthy that would be.

But, even so, the idea is marvelous. As you can see from the animation from the Audio Spotlight site, you can attach a sound to a picture in a gallery, and the sound will only be heard by the people in from of the picture. Imagine that in a museum. Or think about having a restaurant with audio spotlight above the tables, playing whatever music they want and not bothering the other people. Combine it with some form of sound barrier between tables and you get a classy private place with no walls and a lot of people. Or think of a disco where you can separate the sound of each instrument and play it in a slightly offset area so people can dance to the music equalized however they like it. Or even a club where people can hear the music loud on the dance floor and really weak at tables, so they can talk.

This invention comes (of course) from MIT, more precisely from Dr. Joseph Pompei while he was a student at the MIT Media Lab, himself son of another distinguished doctor, Dr. Francesco Pompei.

However, with great power comes... ah, forget Spiderman! Anyway, there are voices expressing concern on the evil use of such technology. Like this link here, expressing the opinions of Barry Blesser, one of the most respected names in digital audio.

Now, I guess that the best invention ever would be directional earplugs! :)