Elixis Technology

Las Vegas IT

The Train That Breaks Itself

Elizabeth Technology February 15, 2024

If you’ve paid any attention to big tech in the last several years, you’ll probably know that Apple is on the verge of switching to USB-C for phones. It’s easier and more accessible for the average EU citizen to acquire than Apple’s lightning chargers. It’s not just Apple that’s being forced to change for the sake of the customer – the shareholder system at large is constantly at odds with the end user’s rights to buy a complete, sturdy product that wasn’t designed to break a few months down the road so that an official BrandProduct shop can charge over the market rate to fix it. Thanks to the EU’s legal interventions, Apple (and many others) cannot continue to sell a product that only they can make chargers and power supplies for, that only they can update, that they can choose to brick whenever they feel like the user needs to move on to the next phone, etc.

The Newag train scandal is particularly egregious given this context!

Big parts of Europe rely heavily on trains for both passenger and freight transit, and trains are expensive to make and repair; once the state has invested money into infrastructure and the trains themselves, they won’t simply be switching brands on a whim. This already gives the company a massive amount of leverage over their contractors.

 Newag is one such train company. Allegedly, as Apple did, Newag figured that regular repair and maintenance were good places to squeeze a bit more money out of the customer, and set up a bit of code within the train’s computer brain that would cause it to error and stop working if anyone but a Newag shop touched it to fix it. Keep in mind train repair shops are already incredibly niche, and repairs to trains come out of taxpayer money – to be thriftier by going to an independent shop is an obligation when the money isn’t your own. Worse, even if the shop didn’t need to fix anything in the train’s computer, Newag’s trains are GPS-enabled, and if the train spent too long at an independent train-repair station, it would still mysteriously stop working.

Of course, Newag denies this heavily – they even went as far as trying to sue the company that discovered this quirk, Dragon Sector, into shutting up about it. Then, they suggested it was the result of cybercriminals and not Newag itself, which could make sense if this were ransomware stopping the train entirely and not just when the train didn’t stop at a Newag shop or get it’s special unlock code. The odds are stacking up against the company, as the evidence is too clearly pointing towards predatory practices for them to get out of an investigation.

Sources:

https://arstechnica.com/tech-policy/2023/12/manufacturer-deliberately-bricked-trains-repaired-by-competitors-hackers-find/

Online Investment In Dud Projects

Elizabeth Technology February 13, 2024

During the 2010s, a number of huge enterprises got investor money, started a project, maintained it with great success until the investors started wanting their money back, and then the service of the project started absolutely sucking – if it actually managed to live through the ‘you must turn a profit’ phase of its growth, which many did not.

The internet had a hand in this. By giving a large crowd of people a place to say they’d definitely use any service that does X, investors can see demand for a product that doesn’t yet exist, which makes a return seem easier to achieve. A secondary effect is that they don’t have to understand what the service does, they just have to know that customers want it – a formidable barrier for innovators of times past is now an escalator for inventors who can simply dazzle a crowd with buzzwords and get demand out of them. Customer/investor hybridizing sites like IndieGoGo and Kickstarter were notorious for this until they also changed their terms of service.  

Smaller Ones

More attainable goals on crowdfunding websites are not less likely to run into issues than their larger funding counterparts, they’re just smaller. The stakes are usually lower, but often still painful if they fail. After all, if you pay 1,500$ to get an extra special package of products and services for a startup that goes belly-up before anything goes out the door, you’re out the money, even if it probably didn’t bankrupt you. IndieGoGo and Kickstarter generally can’t recoup that loss for you if the side taking the money didn’t formally announce a failure or otherwise initiate a refund.

Unfortunately, it can be hard to tell when a project is going to fail, especially if you tried to get in early. While some projects can raise red flags on first sight (unrealistic wholesale/retail product pricing ratios, overemphasis on a personality to sell the product, or unrealistic production means for example), many others look fine. The best way to avoid spending money with nothing to show for it is to look at other examples of failed projects and see if you spot any uncomfortable similarities.

Early NFT projects, for example, were totally uncharted. The product itself was so new that nobody knew what signs of scams or failure would look like. A number of NFT projects promised access to something of value (a game, a cartoon, a virtual world/networking site, etc.) for the purchase of the NFT, but once they were fully funded, a bunch of them would rug-pull their investors and bounce with the money. Some didn’t bounce (by which I mean they stayed in contact with NFT buyers), but still failed to produce anything. The Bored Apes project at least managed to make a couple episodes of the cartoon they promised, but because the show was pitched and directed by people specializing in tech, not animation, it didn’t exactly come out like Rick and Morty.

But say you wouldn’t have fallen for the NFT hype – it doesn’t have to look like a bad investment to be one. In a more recent, more material example, James Somerton’s film production company sucked up a ton of money (achieving nearly 10x its initial goal for fundraising) and then had huge wait times for the films promised, and the person in charge – James himself – was quiet for months, only rarely updating with news about the delays. James, a video essayist, was really well-liked up until a couple of months ago when some terrible news about his content came out, so his backers were extra lenient. They made excuses for him, and many possibly forgot they’d contributed to his project at all because of the length of the wait. Now, it seems unlikely he’ll get anything out the door at all because of recent controversies, and that money is probably not going to be refunded.

Similarly, video game projects from first time game-makers have a high chance of failure, oftentimes because they don’t know the true scale of the work required before they start developing it and promise more than they can deliver. Internet personalities will sometimes have an idea for a game that is far beyond the skill of the studio they partnered with to make it (which happened to the Yogscast group on Youtube) or become so invested in what they already had built beforehand that they won’t let anyone else touch it (which happened to the game Yandere Simulator). For beginners, starting wrong and having to tear down and rebuild is okay when it’s a private project, but when it’s someone else’s money, the idea of ‘losing’ progress makes them more likely to double down on a road that won’t produce a good finished product. Failed games that ‘should’ have been simple to make instead spent months in development hell with nothing to show for it.

Why Even Bother Talking About It?

As the next generation sidles up to the plate, it’s important to make sure they actually know what they’re doing when they whip out a credit card to buy or ‘invest’ in something. A lot of kids raised on electronics don’t understand the fundamentals behind the internet. Think about it – what does playing RoBlox have to do with learning how to type in a professional voice? Does buying skins from Fortnite tell kids that digital assets are only worth the joy they bring? Does watching Cocomelon on Youtube teach kids about online safety or that adults can lie to them? Just granting access to the tools necessary to learn important lessons isn’t the same as teaching, and can have disastrous consequences when they learn something the hard way. Without actual, guided teaching about spotting scams, these kids learn only what is necessary to have fun online, lose their data, get scammed, get viruses, and suffer for an assumed level of knowledge that they don’t actually have because they were only taught how to click and tap on things. It’s worth talking about. It’s worth teaching. It’s necessary. It probably always will be.

Identifying Buzzwords In Online Hype

Elizabeth Technology February 8, 2024

What is a buzzword? Oxford defines it as a word or phrase, often a bit of jargon, that’s fashionable at a particular time, or in a particular context. It’s the word that tabloids slap into titles in hopes of getting clicks, the term used even where it doesn’t apply because it’s exciting. Spotting buzzwords used as a selling point is not easy. The buzzword in question is often popular only because it’s relevant somewhere, and it can be tough to tell who’s using it correctly!

One tell is if the person using it fails to define the word. Instead, if they seem to repeat themselves about how the tool is used rather than what the word means, it’s an orange flag! The people selling a product may not necessarily understand the technology fully, but they should have a rough idea of how it works, at least well enough to explain why what they’re selling is different from what’s already on the market.

NFTs, for example, fail this test. Almost anything can be made into an NFT, which is non-fungible because it comes with a unique ‘serial code’ on ‘the blockchain’, not because of some immutable property of the item being made unfungible. Nobody who sells them wants to tell you this because it makes it obvious how fragile their value is. The thing’s name alone is confusing, it’s description even moreso, which surely helped bury the lede on how truly useless the average NFT is.

In the health influencer circles, the buzzword of the day has moved on from ‘toxins’ to ‘inflammation’, because the public caught up; in tech circles on social media, it’s gone from cryptocurrency to AI. Once the public catches on, the companies using the word right are able to keep using it, but the companies who aren’t are caught out and have to move on to a new word.

Word In Motion

Secondly, how is the buzzword actually being applied? How is the technology or technique being used to improve the product? What technological advancement had to be made for this new never-before-seen item to work? Was such an advancement made, even in secret? If they can’t even say they have a new process being kept a secret, there is a chance that it’s a Juicero. The Juicero product was a “juice press” that simply squeezed juice out of a proprietary bag, one which could be squeezed by human hands to almost the same effect. There wasn’t anything new about it, it was cobbled together out of products that already existed and failed to be more than the sum of its parts. All the slick marketing and health buzzwords in the world couldn’t have saved it once that came out.

If they do say it’s a secret, but no other expert in the field can figure out how they did it, it’s possible it’s a Theranos situation, where nobody could fully explain how the product worked because it didn’t work. Same for the dozen or so ‘mechanical gill’ products that promise to turn water into breathable air for humans in a product the size of a pair of bicycle handles, which is not currently chemically possible. If it looks and sounds too sci-fi to be true, it probably is. If it’s promising to cure every ailment you have, it likely won’t. If you can’t figure out where the value is stored in the investment, it’s probably not a good investment in the first place!

Tulips and Stanley Cups

Elizabeth Technology February 6, 2024

In the 1630s Netherlands, tulips became the next hot commodity. They’re very pretty, super easy to garden with, and easy to transport thanks to their bulbous root structure. They were also fashionably new to the region at the time. It’s a classic tale of speculative bubbles, where huge amounts of land and sacks of money were traded for individual bulbs right up until the market crashed in 1637. The crash wasn’t as bad as you might think given the cost of investing – those rumors came from an author who wrote about it in 1841, perhaps confusing satirical writings into his book, where manuscript data suggests it was mostly just another trendy item with some big outliers that made the news. It happens today, too! People spent millions on NFTs, and then the market crashed, but the average person buying ‘less valuable’ pictures of cartoon apes with hats and glasses could recover, and the market at large was fine.

Even so, the more realistic tales of the tulip craze are a great window into human psychology. Tulips are pretty; people like pretty things; they will brag about the exclusivity of the pretty things they bought; they will spend a lot of money to signal that they can afford pretty things that last a while; I can buy these things and then resell them for more than they’re strictly worth; I must keep interest in the product high or else my investment will lose its value.

Why the Cup?

NFTs were always worthless. Come on, a picture? Just on the blockchain? But some items fit into this tulip niche where supply is not limited except by an unexpected surge in demand. Most recently, the Stanley Cup!

It is what it says it is – it’s an insulated cup. Much like the original tulip, it’s useful and it comes in pretty colors. Even more like the tulip, it’s being bought and resold at absurd prices, and less savvy investors are taking it as a sign that they can buy a pallet of cups and then resell them at an absurd price.

Images of eBay listings going for hundreds of dollars echo the tulip craze: the thriftier folk looking to get in on the trend may stake out their local Target or Walmart to get a good price on the cup as soon as it comes in, and only a narrow band of people who have money to burn will ‘invest’ in limited edition versions at the eye-watering prices being used to drum up interest in articles. Some take it a step further and collect all of the individual colors of the cup they can find or order, putting up shelves to display dozens of the product theoretically made to reduce the number of disposable cups that someone needs to use and buy. Much like tulips, the visibility of the consumption is part of its allure. The ability to collect, the need to use, the casual display of the cup on a counter, just barely in the video, the showstopping framing of the cup as it’s unboxed or washed with a handful of other cups. The durability of the powder coating, the durability of the straw, the durability of the sliding mechanism, the durability of the label – sure, you could buy some lame local flowers Yeti tumblers, or you could buy the cup that’s on the Tonight Show! The cup for the busiest bees! The brand is truly central to the craze. On TikTok, there’s even a video of a person laminating the (disposable barcode) label so she could tape it back onto the cup without fearing it would tear.

It’s about spending more money than is strictly necessary to obtain a product that has cheaper substitutes, the fact that the tulip is a tulip and not that it’s red or striped, the fact that the Stanley is heavy and powder-coated and Stanley brand, not the fact that it’s good at what it does. You can tell this is the case because the Yeti product is almost identical, but gets sneered at, and – if it’s just for cool beverages – the Hydroflask/Nalgene trend already had this cycle of hype and hypedeath on social media amongst teenagers a couple of years ago. Unlike Hydroflasks, the Stanley’s variety of colors is creating little pockets of scarcity that aren’t actually there, and may keep this craze around for longer as the urge to collect the hot item of the month is never actually satisfied until the buyer has all the colors.

The insanity will one day end, and who knows what resellers or collectors will do with the cups at that point. Just like tulips, the product couldn’t have gotten a foothold if it wasn’t at least decent enough to carry around and look at, and just like tulips, there will likely remain a niche community awaiting the return of the cup madness with fifty different cups on their wall. Remember Hydroflasks? We’ll see it again. It’ll come back around.

The Future Of Microtrends

Hot commodity items find their way into thrift stores and onto secondhand seller sites moments after the first comment on an influencer video declares them overrated. The product is demanded, the product runs out, the company makes more, and then it’s over. This need to be seen and recognized as in-the-loop on TikTok and Instagram leads to people obsessively buying things and then discarding them after they are no longer hot. Companies love this – they get a little better at artificially creating runs on a product every time it happens. The best thing to do is simply not partake in a trend that revolves around buying something. Recipes, dances, and DIY costumes are all plenty of fun and don’t involve buying overpriced fast-fashion or a second-third-fourth reusable cup. Just step away a second. Do you want the product because it’s good and you’ll use it, or because it’s good and it’s trendy?

Sources: https://www.history.com/news/tulip-mania-financial-crash-holland

Why Is Everyone So Disappointed in the CyberTruck?

Elizabeth Technology February 1, 2024

Safety Concerns

You’ve seen the body. You’ve probably seen the interior dash. If this thing gets into an accident, it will win over any other vehicle or passengers, including its own. It is a return to the old steel-body cars but worse, with small crumple zones and a 3 mm thick steel plate for a shell. It’s undeniably sturdy. The car itself could survive a lot, which sounds cool and futuristic for a car that one day might not need passengers, but anything inside of it is subjected to its design in the event of a crash.

Secondly, pinch points! One video of the CyberTruck’s motor-driven hood-closing mechanism shows it cleaving through a carrot without stopping (Out Of Spec Reviews on TikTok and Youtube). There is no pinch detection in the front, which wouldn’t be a problem if it weren’t motorized! Isn’t this the car of the future? Why is there no pinch detection? Human fingers are tougher than carrots, yes, which is why when it comes to safety demos, you don’t want it to cut through the carrot to demonstrate that it definitely won’t hurt your precious fingies. The guy in that video then put his fingers further down into the seam (so the sharp point at the window area wouldn’t break the skin) and the trunk simply shut over them, leaving him stuck. He couldn’t reach the button on the front that would tell the truck he wanted to open it again. It didn’t break anything, but getting unstuck alone would have been painful. At least there is a phone app allowing you to remotely free yourself, but without proper pinch protection, it’s at best capable of trapping someone, at worst capable of biting off fingers, if it’s someone with the keys but not the app.

One major and one minor complaint for safety seems about right for a major deviation from the norm for cars, and the pinch detection should be relatively easy to include in later models – that’s not all people are concerned about, though.

Electronics

While stringing electronics together seems to make sense, it’s actually not a great idea! We stopped making Christmas string lights that way because of the massive inconvenience of finding a dead bulb when the strand went out, because you had to find it to get the whole string working again. Unfortunately, from consumer complaints online, it seems like this philosophy is working similarly for the Cybertruck, alongside another major issue – dead screens!

Dead Screen errors on these Cybertrucks make it impossible to drive thanks to the huge amount of functionalities relying on the screen as a controller. In fairness to Tesla, most cars with screens instead of proper center consoles with buttons have that problem, so this isn’t Tesla-specific, but when your car is called The Cybertruck, some level of advancement beyond the competition is expected. The truck of the future shouldn’t be so much like the Disney Park Star Wars zone in both appearance, wait to access, and functionality.

 Lastly, the battery life. This is the biggest sticking point, which sucks because it’s tough to tell who is reporting reliably and who’s just pointing and laughing at the car because they don’t like the brand. Trucks are, generally speaking, meant for hauling stuff. The design of the Cybertruck’s truck bed is already straining supporter goodwill given how little it holds, but the truck has a front trunk to boost its storage space, so as long as what you’re hauling can be split into two separate loads, this isn’t such a huge point of contention. A lot of people don’t buy trucks out of a need to haul stuff every weekend, after all. What really has fans ticked off is the inconsistent range of the battery under load! The car itself is heavy, but so is every electric vehicle. Unlike that screen thing above, the Tesla sells itself on being the better electric car, so to not beat Ford and Rivian’s range while hauling or towing makes its marketing feel like it was fudging its numbers. Especially in the cold! Electronics run out of juice faster in the cold thanks to a number of chemical processes slowing down under the hood – the Cybertruck, according to early reports from consumers, can’t hit 80% of its expected range in the cold if it’s hauling too. Those are not ideal conditions, obviously, but if we’re going to keep getting freak snowstorms as far south as Texas, car manufacturers must adapt, or at least do some additional testing in the cold to avoid stranding customers who took ‘470 miles in ideal conditions’ as simply ‘470 miles’, full stop.

All in all, the Cybertruck is simply another electric truck. It looks cool, it’s made (perhaps too) tough, and it suffers many of the same issues as its competitors. For fans who were used to Tesla leading the way, this is a let down.

Optical Memory

Elizabeth Technology January 30, 2024

Optical storage is defined by IBM as any storage medium that uses a laser to read and write the information. The use of lasers means that more information can be packed into a smaller space than magnetic tape could manage (at the time)! Better quality and longer media time are natural results. A laser burns information into the surface of the media, and then the reading laser, which is less powerful, can decipher these burnt areas into usable data. The surface is usually some sort of metal or dye sandwiched between protective layers of plastic that burns easily, producing ‘pits’ or less reflective areas for the laser to read.

This is why fingerprints and scratches can pose such a problem for reading data; even though you aren’t damaging the actual data storage, like you would be if you scratched a hard drive disk, fingerprints prevent the laser from being able to read the data. Scratch up the plastic layer above the dye, and the data’s as good as destroyed.

Destroying data can be even more complete than that, even. Shredding the disc in a capable paper shredder (ONLY IF IT SAYS IT CAN SHRED DISCS) destroys the data, as does microwaving the disc (don’t do that – most discs contain some amount of metal, and that can damage your microwave badly enough to be dangerous).

CDs

“Burning a CD” replaced “making a mix tape” when both CDs and downloadable music were available to teenagers, and for good reason. The amount of content may be roughly the same, but the quality is significantly higher.

Most CDs are CD-Rs – disks that can only be written on once but can be read until the end of time. A CD-ROM is just a CD-R that’s been used! The average CD-R has room for about an album’s worth of music, and maybe a hidden track or two, about 75-80 minutes depending on the manufacturer of the disc. Alternatively, if you’d like to store data instead of high-quality audio, you’ll get about 700 MB of data onto a single disc.

To burn a CD, you’d need an optical drive that’s capable of also lasering information into the disc, which wasn’t always the standard. The laser will burn the information into the metal-dye mix behind the plastic coating the outside of the disc, which permanently changes how reflective those sections are. This makes it possible to visually tell what has and hasn’t been used on a disc yet, and CD-Rs can be burnt in multiple sessions! Data is typically burnt from the center outwards.

But everybody knows about CD-Rs. What about CD-RWs, their much fussier brethren?

CD-RW

The primary difference between a  CD-R and a CD-RW is the dye used in the layers that the optical drives can read. CD-RWs are burnt less deeply than CD-Rs, but as a result, they take a more sensitive reader. Early disc readers sometimes can’t read more modern CD-RWs as a result!

To reuse the disc, one has to blank it first (the same drive that can write a CD-RW in the first place should also be able to blank it), which takes time. After it’s been wiped, new data can be put onto the disc again. CD-RWs wear out quicker than other memory media as a result of their medium. That wafer-thin dye layer can only handle being rearranged so many times before it loses the ability to actually hold the data. It’s pretty unlikely that the average user could hit that re-write limit, but it’s more possible than, say, a hard drive, which has a re-write life about 100 times longer than the re-write life of a CD-RW.

DVDs

DVDs store significantly more data than CDs do, even though they take up about the same space. Where a CD can hold about 700 MB, a DVD can hold up to 4.7 GB. This is enough for most movies, but if the movie is especially long or has a lot of other extra features, it has to be double layered, which can store up to 9 GB. Why can it hold so much more in the same space?

The long answer is that there are a number of small differences that ultimately lead to a DVD having more burnable space, including a closer ‘laser spiral’ (the track a laser burns, like the grooves in a vinyl record), as well as smaller readable pockets. It all adds up into more data storage, but a more expensive product as well.

DVD +R DL

That double-layering mentioned earlier isn’t present on every disc. Sometime in the later 2000s, double layer discs hit the market at about the same price as single layer discs (although that changed over time). The first layer that the laser can read is made of a semi-transparent dye, so the laser can penetrate it to reach the other layer.

Most modern DVD drives can read dual layer, but if your computer is especially old, it would be wise to check its specs first – DVD readers programmed before their release might not understand the second layer, and readers that can read them might not be able to write to them. DLs are a great invention, it’s just a struggle to find good disc readers when everything is switching to digital.

Compatibility

CD players aren’t usually also able to play DVDs. CDs came first, and the reader would have to be forwards compatible. Obviously, this would have taken a time machine to actually assemble. Picture expecting a record player to read a CD! The gap between the two is almost that large. Nowadays, the manufacturing standard seems to be a DVD player with CD compatibility tacked on. You should double check before you buy a disc reader to be sure it can do everything you want it to, but it’s less common to see CD-Only tech when a DVD reader is only slightly more expensive to create, and can work backwards.

FlexPlay Self-Destructing Entertainment

Remember FlexPlay self-destructing entertainment? The disc that was meant to simulate a rental and could have generated literal tons of trash per family, per year? The self-destructing medium that the disc was coated in turned very dark red to thwart the disc reader’s lasers! The pits aren’t directly on the surface of the DVD, they’re under a couple of layers of plastic. All FlexPlay had to do was sandwich an additional layer of dye between the plastic and the metal/dye that’s being inscribed upon. When that dye obscures the data below it, it’s as good as gone! The laser can no longer get through to the information and read it. Even Blu-Ray tech was thwarted by the dye.

Blu-Ray

Blu-Ray discs have higher visual quality than DVDs because they hold even more information. The blue-ray technology enables the pits to be even closer together, so more optical data can be crammed into the same space. Blue light has a shorter wavelength than red light, which shrinks the necessary pit size! A single-layer Blu-Ray disc can hold up to 25 GB of information! Blu-Ray discs are most commonly used for entertainment media rather than storage. Disc readers have to be specifically compatible with that blue laser technology, rather than just programmed for it. An ordinary DVD player may be able to play a CD, but it wouldn’t be able to fully read a pit in a Blu-Ray disc before that pit’s passed the reader.

Right now, the state of the art is Blu-Ray: most good Blu-Ray readers are backwards compatible with DVDs and CDs. However, many companies still sell ordinary DVDs alongside their Blu-ray releases due to cost. If you have a DVD player, you can probably hold off on upgrading, at least for a little while longer.

Sources:

https://www.britannica.com/technology/optical-storage

https://www.dell.com/support/kbdoc/en-us/000149930/what-are-the-different-cd-and-dvd-media-formats-available

http://www.osta.org/technology/cdqa13.htm

https://www.scientificamerican.com/article/whats-a-dvd-and-how-does/

https://kodakdigitizing.com/blogs/news/cd-vs-dvd-how-are-they-different

http://recordhead.biz/difference-blu-ray-dvd/

https://www.dell.com/support/kbdoc/en-us/000147805/guide-to-optical-disk-drives-and-optical-discs

Magnetic Memory

Elizabeth Technology January 25, 2024

Magnetic Tape

The most well-known version of tape-based magnetic storage is the kind used for media. When tape-based recording was first introduced, it revolutionized the talk show and DJ-ing scene of the time (mostly post WWII) because it enabled shows to be recorded and played later, rather than live in front of the audience. Music recording tech already existed of course, but it required physical interaction from the DJ, so it wasn’t as hands-off as tapes were.

The second-most well-known version is the kind used for computer memory! Data is stored on the tape in the form of little magnetic ‘dots’ that the computer can read as bits. Before each pocket of data dots is a data marker that tells the computer how long that pocket should be, so it knows when one set of data ends and the next begins. The polarity of the dot determines it’s bit value, and the computer can then read all these dots as binary code.

This method of data storage was a massive breakthrough, and other mediums continue to use the format even today! Tapes are still in use for big stuff – parts of IBM’s library rely on modern tapes, which can now store terabytes of information at a higher density than disks and flash drives alike. Other memory types relying on magnetic domains include hard disks and drums, to name a couple. All that separates them is material and know-how: the better the magnetizing material on the outside, the smaller the domains can get. The better the insulation between the domains and regular old entropy, the more stable the data is!

Carousel Memory

Carousel memory was an attempt at shrinking the space that magnetic tape took, but to the extreme. Instead of one very long piece of magnetic tape on a bobbin, the carousel memory system uses several smaller reels of tape arranged in a carousel pattern around the central read mechanism. To get to the right info is as simple as selecting the right reel! This has some issues with it, as you might imagine. Moving parts add complications and an increased risk of mechanical failure to any device, but a device carrying thin, delicate magnetic tape on it is an especially bad place to start.

However, it wasn’t all bad. Carousel memory was actually quite fast for the time because it didn’t have to rewind or fast-forward as much to get to the right area of code. It could skip feet of tape at a time! This advantage declined as tape tech improved, but it still helped companies trying to squeeze the most life from their machines. The bobbins and individual ribbons were all replaceable, so the tape wasn’t worthless if it got torn or damaged. The carousel itself was also replaceable, so the many moving parts weren’t as much of a curse as they’d be on, say, the first hard disks, which had irreplaceable heads.

Core Rope Memory

Core rope memory featured magnetic gromets, or ‘cores’ on metal ‘ropes’, and then those ropes were woven into fabric the computer could read. In ROM (read-only memory) format, if a wire went through the core, it was a ‘one’, or a ‘yes’. If it didn’t, it was a ‘zero’, or a ‘no’. In this way, the fabric is physically coded into binary that the computer can use. ROMd Core-Rope memory involved quite a bit of complicated weaving and un-weaving to get the cores in the right spots.

Core rope memory was chosen over tape memory for the Apollo missions, mainly for weight purposes. Tape was great, but not nearly dense or hardy enough for the mission yet, and neither were the other similar core modules available to NASA. A read-only core-rope memory module could store as many as 192 bits per core, where erasable core memory could only manage one bit per core. Where each core on the final module depended on reading the wires to determine the bit’s state, the erasable model (core memory) read the core’s magnetic state to determine the bit state, not the threads going through it. The final module sent up to get to the moon was a total of 70-ish pounds and read fairly quickly. Tape, core memory, or hard disks available at the time couldn’t have gotten to the same weight or speed.

Core-rope memory has its place. It’s very sturdy, and since it relies on the cores to act as bits, it’s possible to visually identify bugs before the memory’s even used, unlike core memory. Both are sometimes called ‘software crystallized as hardware’ because of the core system. It isn’t seen much today, since it is still incredibly bulky, but at the time of its use it was revolutionary.

Core Memory

Core memory is the older sibling of core rope memory, and it stores less. However, the people who got to work with it call it one of the most reliable forms of memory out there! Core memory works much the same as core rope memory, where the bits are stored in cores.

However, the formats are different. If core rope memory is like a binary-encoded scarf, core memory is more like a rug. Thin threads made of conductive material are woven into a grid pattern, with cores suspended on where the threads cross each other. The computer understands these threads as address lines, so asking for a specific bit to be read is as simple as locating the X and Y address of the core. A third set of lines, the sense lines, runs through each core on the diagonal, and this is the thread that does the actual reading.

When asked to, the computer sends a current down the sense threads and sees if the cores flip their magnetic polarity or not. If it doesn’t, it was a zero. If it does, it was a one, and it has been flipped to zero by the reading process. This method is known as ‘destructive reading’ as a result, however, the computer compensates for this by flipping the bit back to where it was after the reading. Due to its magnetic nature, the core then keeps this info even after power to it is cut!

This link here is an excellent, interactive diagram of the system.

Even though this improved the bit-to-space-taken ratio, core memory still aged out of the market. With the price of bits decreasing rapidly, core memory got smaller and smaller, but the nature of its assembly means it was almost always done by hand – all competitors had to do was match the size and win out on labor. Soon, its main market was taken over by semi-conductor chips, which are still used today.

Magnetic Bubbles

Magnetic memory has had strange branches grow off the central tree of progress, and magnetic bubble memory is one of those strange shoots. One guy (who later developed other forms of memory under AT&T) developed bubble memory. Bubble memory never took off in the same way other magnetic memory styles did, although it was revolutionary for its compact size – before the next big leap in technology, people were thinking this was the big leap. It was effectively shock proof! Unfortunately, better DRAM chips took off shortly after it hit the market and crushed bubble memory with improved efficiency.

Anyway, bubble memory worked by moving the bit to-be-read to the edge of the chip via magnets. The magnetic charge itself is what’s moving the bits, much in the same way electrons move along a wire when charge is applied, so nothing is actually, physically moving within the chip! It was cool tech, and it did reduce space, it just didn’t hold up to semi-conductor memory chips. They saw a spike in use with a shortage, but they were so fiddly that as soon as DRAM chips were available again, they went out of style.

Semi-Conductor DRAM – Honorable Mention

DRAM chips are a lot like core memory, in that the device is reading  the state of a physical object to determine what the bit readout is. In Semi-conductor chips, that physical object is a tiny capacitor, hooked up to a tiny transistor, on semiconductive metal-oxide material. Instead of determining magnetic state, the device is instead checking if the capacitor’s discharged or not. No charge = 0, yes charge = 1. These chips aren’t technically magnetic, but since they’ve killed so many of the other options, here they are!

DRAM stands for Dynamic Random-Access Memory, and it means that the memory can be accessed randomly instead of linearly. As long as the computer knows where the data’s stored, it’s able to pull it without pulling other files first. They’re still being sold today!

Magnetic Disk (Hard Disk Drive)

Hard drives work more like tape than core memory. A Hard drive is a platter (or a stack of platters) with a read-write head hovering above it. When you want to save data, the hard drive head magnetizes areas in binary to represent that information. When you want to read or recover that data, the head interprets these areas as bits in binary, where the polarity of the magnetized zone is either a zero or a one.

The zones of magnetization are incredibly tiny, which makes hard drives one of the more demanding memory forms out there, both now and back then.

Early hard drives could suffer from ‘de-magnetization’, where a magnetic disk’s domains were too close and gradually drew each other out of position, slowly erasing the information on the disk. This meant that the disks had to be bigger to hold the data (like everything else at the time) until better materials for data storage came along. Even though they held more capacity at launch, they were passed over for smaller and more stable stuff like tapes and core memory. The very early drives developed by IBM were huge. Like, washing machine huge. They didn’t respond to requests for data very quickly, either, which further pushed reliance on tape and core technology.

Over time, hard disks improved dramatically. Instead of magnetic zones being arranged end-to-end, storing them vertically next to each other created even denser data storage, enough to outcompete other forms of media storage entirely. Especially small hard drives also come with a second layer of non-magnetizable material between the first layer and a third layer of reverse-magnetized ‘reinforcement’ which keeps the data aligned right. This enables even more data capacity to be crammed into the disks!

Some time in the 80s, hard drives finally became feasible to use in personal computers, and since then they’ve been the standard. SSDs, which don’t have any moving parts whatsoever, are beginning to gain ground in the market, but they can’t be truly, irrevocably erased like hard drives can due to different storage techniques. Hard drives are going to stick around a while, especially for the medical and military industries, as a result!

Sources:

https://spectrum.ieee.org/tech-history/space-age/software-as-hardware-apollos-rope-memory

https://www.apolloartifacts.com/2008/01/rope-memory-mod.html

https://electronics.howstuffworks.com/vcr.htm

https://www.apolloartifacts.com/2008/01/rope-memory-mod.html

http://www.righto.com/2019/07/software-woven-into-wire-core-rope-and.html

https://www.computerhistory.org/revolution/memory-storage/8/253

https://nationalmaglab.org/education/magnet-academy/watch-play/interactive/magnetic-core-memory-tutorial

https://www.rohm.com/electronics-basics/memory/what-is-semiconductor-memory

https://cs.stanford.edu/people/nick/how-hard-drive-works/

https://psap.library.illinois.edu/collection-id-guide/audiotape

https://www.engadget.com/2014-04-30-sony-185tb-data-tape.html?guce_referrer=aHR0cHM6Ly9lbi53aWtpcGVkaWEub3JnLw&guce_referrer_sig=AQAAAC5GC2YOKsvhOs9l4Z2Dt1oHX3-YxjPyJC60qfkq6_6h8zyckkBK9V9JJC9vce3rCmcgyehT-RB6aORBfzB9b5oiBoF1Fbic_3653XVM8fsUTHHnTgxKx4piCeEl65Lp54bkbMcebEEddwlq-EDnAcM7zuv49TXYHcgq9lmnrBln

https://en.wikipedia.org/wiki/Carousel_memory (all primary sources regarding carousel memory are in Swedish)

Internet Of Things Items Can Create Vulnerability

Elizabeth Technology January 23, 2024

Internet of Things items are convenient, otherwise they wouldn’t be selling. At least not next to regular, non-wifi-enabled items. They don’t even have to be connected to the internet, and they should stay that way!

An Internet of Things item, or an IoT item, is a device that has a WiFi- or network-enabled computer in it to make the consumer’s use of it easier. This includes things like WiFi-enabled/networked washing and drying machines, ovens, fridges, mini-fridges, coffee makers, lamps, embedded lights, etc. anything can be an IoT item, if it’s got WiFi capability.

Network Entry Point

Internet of Things items, when connected to WiFi, represent a weak link in the chain. They’re poorly protected, they’re designed to favor user friendliness over all else, and they’re usually always on. You likely don’t unplug your fridge or washing machine when you go to bed – that computer may sleep, but it’s not off. You probably don’t disconnect the internet when you go to bed, either. Some devices take advantage of this, and only schedule updates for late at night so you don’t notice any service interruptions. Unfortunately, their strengths are their weaknesses, and an always-open port is a dream for hackers.

Outdated Password Policies

Internet of Things items are rarely password protected, and if they are, many users don’t bother actually changing the password from the factory default. This makes them excellent places to start probing for weaknesses in the network!

Assuming someone’s hacking into a place to ding it with ransomware, there are a number of worthy targets: corporate offices, nuclear facilities, hospitals, etc. are all staffed by people, and people like their coffee. A well-meaning coworker bringing in an internet-enabled coffee machine for his coworkers is suddenly the source of a critical network vulnerability, an open port in an otherwise well-defended network!

If the coffee machine, or vending machine, or the lights are IoT items, they need to be air-gapped from the networks supplying critical data within the center (or cut off from the network completely), the same way outside computers are. The devices are simply unable to protect themselves in the same way a PC or phone is – there’s no way to download a suitable antivirus. If something gets past a firewall, and that password’s still default or nonexistent, there’s effectively no second layer of protection for IoT devices.

Malware

For example, hacking into a fridge is not nearly as hard as hacking into an old PC. Even great antivirus can struggle with traffic coming from inside the network, and IoT devices are often missed in security checkups. After all, when McAfee or Norton or Kaspersky recommends you scan your computer, are they offering to scan your lightbulbs as well?

Once they’re in, the entire network is vulnerable. Ransomware events with no obvious cause, malware that’s suddenly deleted all the files on a server, stolen data and stolen WiFi – all of it’s possible with IoT devices. There’s more to gain than just bots for the botnet, which is why hackers keep going after these IoT items.

IoT devices are also much easier to overwhelm to gain access, even with firewalls and effective load balancing. DoSing an IoT item can be as simple as scanning it. No, really. A team in the UK found that they could shut down turbines in a wind farm by scanning them. The computers inside weren’t equipped to handle both a network scan and their other computing duties at the same time. Many user devices are in the same spot or worse!

Security

Besides turbines, items like cameras and door locks probably shouldn’t be connected to the internet just yet. A terrifying string of hacks let strangers view doorbell and baby monitoring cameras, for example, because the cameras themselves were difficult to defend even though the network was protected by a router. This is terrible for obvious reasons and class action suits were filed soon after. It even happened accidentally; Nest users would occasionally end up viewing other people’s cameras accidentally, a bug in the system that was only fixed after complaints were made. A consistent pattern is forming, here: security patches are only issued after vulnerabilities are discovered by the consumer! Any other type of programming wouldn’t get away with this without some public outcry – you shouldn’t have to become a victim of a security flaw to get it fixed.

And then there’s things that physically interact with the security features of a house, like electronic locks. There’s nothing wrong in theory with a password lock. However, electronics are not inherently more secure than physical locks, and adding in WiFi only gives lockpickers another ‘in’. Hacking the lock could lead to being locked out of your own home, or worse. Besides, a regular lock will never unlock itself because its battery died, or because you sat down on the fob while getting on your bike or into your car. If you do want a password lock, it’s better to get one that’s not network enabled.

We aren’t quite at the point where hacked self-driving cars are a legitimate issue, although the danger is growing on the horizon. Cars are also poorly protected, computer wise.

BotNets

The fridge doesn’t need a quadcore processor and 8 GB of RAM to tell you that it’s at the wrong temperature, or that the door’s been left open and you should check the milk. The voice-controlled lightbulbs only need enough power to cycle through colors. IoT items are weak. However, that doesn’t mean they can’t be used for things like Botnets, even if your main PC wards off botnet software.

Botnets are networks of illegitimately linked computers used to do things like DDoSing, brute-forcing passwords, and all other kinds of shenanigans that a single computer can’t do alone. By combining the computing ability of literally thousands of devices, a hacker can turn a fridge into part of a supercomputer. No one ant can sustain an attack on another colony, but an entire swarm of ants can!

This is another reason tech experts are worried about IoT items becoming widely used. Their basic vulnerabilities give skilled hackers the ability to ding well-protected sites and fish for passwords even if the network they’re targeting doesn’t have any IoT items on them. It’s a network of weaponizable computers just waiting to be exploited. Remember, password protect your devices!

Source:

https://eandt.theiet.org/content/articles/2019/06/how-to-hack-an-iot-device/

https://cisomag.eccouncil.org/10-iot-security-incidents-that-make-you-feel-less-secure/

https://www.courtlistener.com/docket/16630199/1/orange-v-ring-llc/

Food Content That was Never Really Food Content

Elizabeth Technology January 18, 2024

Fake Recipes

The final frontier of Chat GPT on social media seems to be mindless content generation just for the sake of having something to put ads in. Human imagination is being harnessed by machine imagination. Fake recipes are a part of this.

It’s not only the robots, either. Have you ever tried a recipe you saw on Facebook or TikTok only to discover it didn’t work at all like it said it would? Some are so bad they come out inedible. The demand for clicks used to lead to people and companies shoving recipes out the door before they’re strictly ready and foolproofed, but now they’re lucky if something comes out edible.

Robotic Cooking

While content generators like Chat GPT can convincingly talk like people, they have no clue what “gluten” is or what it does. There is a deeper conversation to be had about what that means for art and writing, but for recipes, it just means the robot is scraping up as much information as it can and simply mimicking the shapes it sees in the shadows on the wall for you. It doesn’t know why people knead dough for bread, only that they do in every recipe for it. As such, creative choices within a recipe are due to hallucinations and not an understanding of the underlying principles. It tries to sound human; most humans write something like ‘cream the butter and sugar together, and then add the eggs’ for cakes; it tells you to ‘cream the butter, sugar, and eggs together’ as a result. Someone copies and pastes this somewhere it won’t be challenged, like Facebook, or a mysteriously fresh blog that talks like it’s been online for years and has hundreds of followers. Eventually that page is able to make ad revenue or take sponsorship deals.

Despite the lack of understanding, this rarely results in something that is totally inedible, especially as Chat GPT gets better and better at maintaining a ‘train of thought’ and connecting the beginning of it’s work to the end. That’s assuming anyone even bothers to make what it suggests. Quite a few content aggregator pages simply push generated or incomplete content out because they know their readers won’t bother. Why paint the back of the movie set? While the AI’s work is derivative, it can often achieve mediocrity just by the law of averages. Humans don’t even need to write the fake recipe anymore.

Unrealistic Expectations

Misusing Chat GPT in these scenarios is almost more common than using it ‘correctly’ and adding a disclaimer that it was involved. Noting that AI was involved in written content tends to push some potential viewers away. They don’t want to read fake recipes because they know Chat GPT isn’t a chef, just like they don’t want to read generated books or look at generated photography because it wasn’t made by a human writer or a human photographer. How do you whip up something convincing enough to sell with ads? You give it the trappings of a real recipe, with pictures and a blurb “from the cook” ahead of the recipe itself, just like the humans do.

 Copyrighted work is annoying to work around, so many organizations selling recipe books or posting to recipe websites will often take their own pictures of a finished product. There’s still some manipulation – perhaps a single cookie will be perfectly centered on a cooling rack, or maybe the colors of a gingerbread house will be boosted in edit just a bit – but the picture itself was taken of the thing that was made. The evidence of the recipe working is in the image of the final product. Thus, recipes with pictures are generally trusted to be recipes that work.

Content farms will buy a picture and let you assume it’s the finished product. Worse ones will just steal one.

All it takes is an afternoon with Chat GPT and some Google Image searches, and voila, it looks like this random Instagram page knows what it’s doing when it comes to food. Beautiful, polished pictures of dishes with ‘their recipes’ beneath them blend in with the hundreds or thousands of other pages doing the same. Again, people usually aren’t making the recipe – with the sheer quantity of recipes shared online, nobody could possibly test everything that comes across their dashboard. When some unsuspecting follower does make a recipe, they tend to assume they did something wrong when it looks nothing like the picture. After all, that Instagram page looks coherent enough with its ‘borrowed’ photos!

Stunt Food

That’s not to say humans aren’t also making clickbait. Stunt food, as coined by TikTok, is food made as a stunt. It’s often made by humans just because it’s sheer ridiculousness can’t be cobbled together by Chat GPT’s knowledge of ‘real’ recipes. It uses a number of brightly colored ingredients, there’s usually some bizarre step where you have to soak Cheetos or something else you’d never normally do, and it’s often somehow disturbing. This is because that gets comments and controversy, both of which can be converted into money. There are no recipes for Pringles mashed potatoes created for flavor.

Or, if you see right through those ones, there are still stunt foods trying to grab your attention in a slightly more legit way, although they’re often overly expensive or ask you to run through several dozen steps to get to an end product. Wagyu beef fat candles, for instance, require Wagyu beef fat – but the thing that chefs love about Wagyu beef is not the fat itself, but the marbling, so condensing the tallow into a candle does nothing for the flavor that some good quality meat from a cheaper cow couldn’t do. It’s a byproduct that restaurants use as a novelty, not something that a home chef is meant to make for the sake of the candle itself. Less expensive but still time consuming are the Hundred Hour Brownies, which were rated well but largely considered not worth the effort by the people who successfully recreated the viral dish.

On the milder side of the stunt food spectrum, there are things like window cookies – yes, you can put a Jolly Rancher into a cookie with a hole cut out of it and melt it to get a stained glass effect that is totally edible, but the resulting cookie is pretty difficult to eat because the hard candy re-solidifies just as hard as it started. Even though it’s completely recreatable by even a beginner home chef, it’s better as edible decoration. Low-end stunt food looks good in photos, tastes middling IRL.

Find Someone You Like

Not all bad recipes come from generators and content farms! Even the best chefs in the world make mistakes or forget to clarify. Some recipes that work in Carolina stop working in Colorado thanks to barometric differences, and it’s not the Carolinan’s fault. The reason we’re seeing all of these weird recipes today is because there are only so many ways to make white sandwich bread, or chocolate chip cookies, or brownies – rather than risk sinking into an ocean of similar recipes, making 100 hour brownies or garlic white sandwich bread gives a blog more traction, and makes their success a bit more likely in the face of the surrounding content flood.

Legally Writing From a Copyrighted Base

Elizabeth Technology January 16, 2024

You can’t profit off of fanfiction. Or can you?

Fanfiction, fiction written about fiction by the fans of said fiction, has existed for as long as fiction itself. Many folktales could be considered fanfiction. If someone besides Aesop comes up with a fable using Aesop’s characters, that’s in the general spirit of fanfiction.

Fanfiction straddles a border between the right to be creative and draw inspiration, and the right to own one’s own creations under copyright. For a long time online, it was a fight simply to allow fanfiction to exist where others could read it, works crafted simply for the love of the original series and the other members of the fanbase. Ann Rice was famously litigious around any fanfiction of her Interview With a Vampire series. Remnants of this period are unfortunately few, but when you see something like “I don’t own these characters and don’t make profit off of this work, please don’t sue me”, you’re seeing a response to the environment created in the wake of overly strict copyright enforcement.

Today, fanfiction is allowed simply to exist on the open web, but its creators are not allowed to draw profit from it. Larger websites like Archive of Our Own are strictly nonprofit, and explicitly forbid their authors from using their works to promote their Patreons because this could be interpreted as profiting off the work, which is still a legal minefield.

Little Tweaks

However, that’s not to say that fanfiction can’t be used to make money, full stop. Outside of its obvious usefulness as practice for totally independent works, a completed fanfiction is in itself a work of art. In the right hands, a pre-existing work of fiction can be molded into something totally different, while only retaining the core characters. There’s a trope within fandom spaces of the “Coffee Shop AU” – AU stands for Alternate Universe, as in an alternate universe where it makes sense for Scully of X Files fame to be working in a coffee shop, and see Mulder as one of the regulars. Or, hey, what if SpongeBob was in Star Wars as Luke, and Squidward was Darth Vader? The SpongeBob Star Wars AU? What would they get up to? The limits of fanfiction are nonexistent – the only limit is the human imagination. If someone were to slightly tweak the names, the setting is already completely different. It would become a different work of fiction, one that could be sold without violating copyright laws.

This has already happened, in fact – at least two separate books that imagine Rey and Kylo Ren from Star Wars getting together under better circumstances have been published by separate authors, free and clear of copyright issues. While the source material was the same, and they both in theory feature a character similar to Rey and a character similar to Kylo Ren, the two are wildly different from both the source and each other. Every fanfiction is, barring actual plagiarism, because even mainstays such as the Coffee Shop AU are interpreted totally differently by each individual writer taking a crack at it.

Many of these writers found a fanbase because they were able to publish their fanfiction for free on websites designed for the purpose. People could access their work, for free, because publishing it was necessarily free. The author was able to connect to people who were looking for something to read because they love a particular show or book series, and out of that, build something familiar but new. This system, where completed works can be uploaded for public comment, couldn’t have existed just a decade prior – the copyright system is a bit of a mess, but at least fanfiction’s right to exist at all in public is being defended. If it wasn’t, many great writers would never try to publish anything at all for a lack of practice or reassurance that there are people willing to read what they write.