Category Archives: IT

Real life in virtuality

The other night I was pondering the setting (as you might have read in the previous blog) on RPG’s and the setting of a dream within a dream. The idea took another turn as I was considering the interaction of reality with virtuality, and in this a game based on a 1 exabyte setting, an online multiplayer game based on virtuality. A game where players fight each other, they create alliances and they conquer. To get this done, we either create a world that is believable, or we turn it around and let the world create our reality. 

And as I was pondering this, I remember a game called ‘Virus’, in this shooter the game created the levels depending on your hard-drive, that was when the cogs clicked together. 

The new game an entire exabyte of challenges.

The world where we are thrown into is not unlike TRON, but in this setting we become citizens of a cloud environment, we are kidnapped and as we scape we end up getting left to our own devices. So as such we see a challenge, but consider a cloud environment, one that has a dozen Fortune 500 companies, thousands of mid sized companies and a lot more small companies. So will you take on a large player, or do you start small? A game with settings unlike we have ever seen and it is a game that develops further as more players sink into a company, a game without a timeline, but with time as either an ally or an enemy. A stage we have (as far as I know) never seen before and as the cloud evolves, so does the world and the enemies we face. So consider creating a cloud environment for that event and turning it into a game, we are always looking for a challenge, so why not become the infecting part and take over companies, corporations and grow in that way and this is the game with a difference, it is hard core only, one life! You can restart as often as you want, but one defeated you start at square one, until you have complete control of your first company, corporation or enterprise. So as we see and as we get into one cloud, it will be close to an all out war with anyone you face, that is unless you can strike an alliance, and alliances require all parties to see the benefit of one another. The nice part here is that this might (or might not) be the stage where we either love it or hate it. You see this will not appeal to all, there is no doubt it is, yet how can we create the challenge of such a game? We appeal to the player and we set the event that the player will embrace. An approach where the benefit of both sledgehammer and scalpel are seen, and the creation of an environment where both can thrive. And that is the challenge, creating the environment where everything piece of hardware is shown as something, where every router and its components are shown as challenges, I wonder if it can be done.

The question
Yes, I do ask myself the question if it is feasible, if it is even remotely possible. You see, we all have Monday morning quarterbacks in one end, but the other end is also taken. Usually by some manager that has a new plan every Monday morning, but it never pans out to be possible, achievable or even deeply contemplated. I see that, I always question my own thoughts, you see the person who does not question their own thoughts ends up drawing castles in the sky, and then expects a dot matrix printer to print a 1200 DPI photograph. We must question ourselves at all times, especially when we caress our creative side. 

So is my idea a castle in the sky? Perhaps it is, there is no doubt on that. Yet for every 8-10 failures, that one idea will push through and become a real winner. In 1997 I opted and idea to my bosses to use a marketing strategy that used websites as the central core for reaching out to others, my bosses laughed, stating that there was no business model for something that delusional, and stupid me, I listened, 4 years before Facebook, I had the idea for a digital marketing path and it was ignored, silly stupid me, as such I am putting ALL my ideas on the public domain, some will find ground, some will not, perhaps most will not, yet in this I am setting the stage for some to take the idea and push it into a direction that I am currently unable to pursue, for a few reasons, but I digress.

We can try to literally translate a cloud, or we can set the inventory of any given cloud and create a converted one that boggles the mind. Consider that a company has a server, users, computers, routers, Cloud Connectors, Data Center Interconnect Platforms, Mobile Internet Routers and a few other devices, and the larger the company becomes, the larger the hardware and that is before the cloud, in the cloud we see all kind of other issues and to map these out we need a different set of rules, a different set of limits to add to the game, to give some version of ‘reality’ to the game, a set of spawning rules (I hate spawning in games) or to set a better stage, if a cloud is represented in elements (see image) now consider that each company has larger or smaller elements of all, how diverse will be the challenge a gamer has, even as the gamer goes from place to place, he is still in one cloud and there is the larger cloud security to content with. Perhaps the game is a fools errant, yet I believe that if gaming is the edge of technology, the only way we get beyond what we have now, is to push the stage of a new game towards and beyond the horizon of what we now can see. Sony gave us the console to do it, so let’s push into a realm we have never seen before, it is the only way to keep gaming at the height of any system, if we do not do that, we are hopelessly lost.

So where is your virtual gaming life? In a new version of an existing game, or in a stage of gaming we haven’t seen yet? I have nothing against the next iteration in gaming, I played Tombraider, 1, 2 and 3 and never regretted that, yet even there, we saw evolution of gaming. That part was less and less visible in some other franchises and that is a sad part, because only those who push gaming beyond the limits will show a game worthy of conquering. We have all kind of views on this, some hate them, some love them and that is OK. I was never a GTA fan, but a lot are, some hate Watchdogs 2, I loved it (3 as well). Some love Breakpoint, me not that much. That is fine, I always state that those claiming to create a game that appeals to all, will create a game that pleases none, so if I am not part of any equation, that is fine by me. Others, will serve the game I like. 

This is how it should be and in all this creativity will push limits and creativity will open up other doors, such is life and we need to push as many doors as we can if we are to make life better all around us, the iterators never will, they are part of the margin spreadsheet, sailing a safe course to last longer, it will never ever go their way. Nintendo is perhaps one of the shiniest examples. It pushed the Wii, which was a decent success, then the WiiU, an abysmal failure, yet it resulted in the Nintendo Switch, an absolute home run in gaming and there we see that failings will optionally turn to wins, an iterator will never see that, only the innovator will get there. Nintendo at present is close to 75,000,000 switch consoles sold, that implies 2 Nintendo’s for every Xbox, so where is their ‘most powerful system in the world’ now? Iterators always have a good story, but they do not yield results, we will get another ‘We’re not driven by how many consoles we sell, it is the same all over, the losers will say the numbers are shallow, but when they are in pole position, it is everything. A brand gone to the dogs, largely because they ignored the voice of the gamer, I saw that almost a decade ago. And now we see a new world rising, one run by Sone ind Nintendo, it is fine by me, although I needed Microsoft to keep Sony on their toes, this idea will soon be a bust. So the best I can do is to set a stage of creativity and hope that some will Create more and more Sony exclusive games, those who do will be able to use my gaming IP free of charge, I do have commercial needs (income) for my 5G IP, such is life and I do like to enjoy a good meal.

So is my cloud game a bust? Perhaps it is, but for now I will try to envision more and more of that approach, consider a complete created cloud, one where you travel and set the premise of ruling the cloud, yet not alone, it is too big making alliances more and more important, a stage that several have attempted, some a lot more successful then others, I merely want to add to the success rate, or at least attempt to do so. It is the price of creativity and its push to innovation, only the successful continue that battle stronger, the failures continue too, but on a smaller scale, and that is fine, every person will fail at some point, it is what they do next that matters, because Steve Jobs had its successes, but he also had the NeXT computer. We recognise success, but we fail to recognise the failures and where they lead to, it is the flaw in many of us. And this is a larger stage, so how can we set that stage, when people keep on pushing Microsoft and their Blue solution. So as ZDnet reported “Microsoft acknowledged it was a service update targeting an internal validation test ring that caused a crash in Azure AD backend services. “A latent code defect in the Azure AD backend service Safe Deployment Process (SDP) system caused this to deploy directly into our production environment, by passing our normal validation process,” officials said”, a lot of bla bla and yada yada, yet the flaw is not merely within Microsoft, it is the same approach that is replicated again and again. So as we see mentions of Active Directory, we also see ‘a validation ring that doesn’t include customer data’, as well as ‘the SDP didn’t correctly target the validation ring due to a defect and all rings were targeted concurrently causing service availability to degrade’, so how long until there are more and more failures and the rollback merely adds to the problem? This is what I saw when I considered the NSA approach towards Trust Zero, the idea is good, but larger players will screw up making any rollback a much larger issues over the whole field. This is part of the idea to make the cloud a game, we could optionally see something we never noticed before, because thousands of gamers will kick the one part everyone ignored. 

Whether we see the issue in reality, or merely virtual. We need to look with different kind of glasses, I see that because 20 years ago I listened to the wrong people, those relying on bullet points, memo’s and ego. There is no space for that in gaming, or in innovative design, I wonder when Microsoft will figure that part out, they are now in 3rd position, what happens when they become deal last (behind Amazon), will they blame metrics or will it be a Covid set of variables? No matter what they will rely on, they are in a stage where they are losing more and more slices of business cake, they are losing slices in a time where they should have had the entire pie, as I personally see it stupidity, greed driven short sightedness and ego driven conviction made them lose field after field, and now they are in a ratchet state, they have no ability to get close to Amazon and at the same time there is every chance that Google could catch up with them. When that happens, Microsoft will be holding a losing hand in the both the cloud and the gaming field and as their surface solution falls short, we see them handing over slices of that pie to Apple, a three sided losing streak, it is a rare but slightly satisfying field. Why do I think that Microsoft will fail? ZDnet stated it best with “There is still no publicly available data on Azure sales. Azure is the part of Microsoft’s cloud business that most rhymes with AWS, but is buried in the commercial cloud”. In a lifetime of working in IT, I have learned that when commercial driven players rely on ‘no publicly available data’, it tends to be because someone is too close, they are too far behind, or the results create questions, and as I personally see it, Microsoft does all three, Google is too close, they are too far behind with Amazon and the Exchange server issues call in question issues with the Microsoft cloud as a whole. As we saw (from 2019 onwards) more and more hacks towards clouds, there is every notion that together with one source claiming that 90% of clouds are in danger, Microsoft has a lot is problems coming their way, I do not know if this is completely fair on Microsoft, as all three have issues, but the replicated approach Microsoft has (Active Directory anyone?), we see a larger issue, if hacks can be transposed from one system to the other, Microsoft hacks might be seen as lucrative (from the organised crime point of view), it makes the NSA approach more and more essential, yet I personally feel that any rollback has hidden flaws and flaws are a problem, especially in a cloud where one flaw transfers to a whole number of corporations. I will be the first to agree that my view is speculative, because it is, but to see that part you need to grasp back to 2003 where the people got “Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard”, this needs to happen only once on the cloud and the mess is almost complete and I believe that a rollback will make it happen. So how do you feel about ‘due to a defect and all rings were targeted concurrently’ now?

So perhaps my idea for a cloud game has a few additional benefits, apart from it being an interesting approach to a new game. 

Have a great day

Leave a comment

Filed under Gaming, IT, Science

Belated brilliance

Some of us know what I am talking about, when we first see it, we think ‘nice’, nothing negative, just a plain nice. We liked the story, the girls loved Jude Law, the men were all over Jennifer Jason Leigh (virtually). The story was good, there was nothing bad about the whole thing, but now 20 years later some are realising just how brilliant David Cronenberg really was at that moment, our computers are catching on, our approach to virtual reality is catching on and suddenly what was once nice, is now regarded as the Koh-i-nor diamond. I am off course referring to eXistenZ the movie. We can take it apart from any angle, but consider the side we can now use on the PS5? What if we create an RPG that is a dream within a dream?

Not unlike the book the Talisman, consider a map, the normal game map set to a normal grid (whatever you call normal). Now we see a second map, that map has relative places in the same place (not the same place), but you are placed in wherever the temple, or resting place was. So in map one we have something resembling Japan, whilst Map 2 is more like New Zealand, as such map one is 50% larger, yet in relative places we see similar places and the resting places is an option to travel between the worlds, both worlds having duties, quests and achievements, but if you are a Shaman in one, you are an artisan in the other, a ying to every yang. Now that we have the power systems (like a PS5), we should use that to fuel gaming imagination, not merely a more buggy and textured killing game, but a sandbox game with several sandboxes, optionally they have very different kinds of sand in that box. Optionally there aren’t 2 worlds, but three or four, the opportunity offered will be staggering. 

Now consider that no game designer has ever considered creating such a leap, well, apart from serious Intel computers, the power was not there before, so why do we see more Assassin’s Creed 2022 LEAKS, with references to Africa, why more of the same whilst the last two games are still buggy? Why more existing IP, and what makes for the massive absence of new gaming IP? The creativity is out there, some of it is 20 years old and never considered for gaming, all whilst that movie was all about virtual gaming. What allows for an iterative mind to exist in a world that relies on true innovation? I mentioned that before, when you try to make a game that appeals to all, you end up with a product that pleases none, I would think that some game makers would have learned that small truth by now. I created (in my mind) in the last three months close to half a dozen games and if I can do it, why not these self proclaimed experts? 

I will let you decide, but if you get jumpy and overly exited when you see the next Assassins Creed, like a teenage boy seeing his first photo model topless shall we say. In a stage when we can be exploring life as a tailor, designing cloths for her naked body, I reckon you got exited for the wrong deal. By the way, according to some ladies that same formula works with Daniel Craig too, so he should be happy for now. 

For me, these ideas came to me as my mind was arranging books and movies, rearranging ideas in all novel ways to make connections that were not there before, so why aren’t others able to do just that?

And if you think gaming is a mess, consider that I completed the concept of a stealth systems to deploy a solution giving the Iranian navy a unique view of the Sea of Dammam (the view from the bottom), so what gives? Northrop Grumman lost idea’s and is relying on the Next Generation Interceptor program to stay alive a little longer? Well, if software iteration x.53 is anything to go by, it will not last long. Iteration was the game of financial stability, it is now the deterrent of innovative leaps ahead, it was the one part that the weapons industry had in common with the gaming world. Innovation was everything, and that is falling away more and more. 

So even as the Wall Street Journal gave us in 2018 “a payload adapter—that failed to operate properly in space”, it is interesting wording, apart from the silly notion that more than one thing went wrong, so as I gave two maps with different scaling, what else causes a person to be in a different place when he falls asleep? The person who never really knew where he (or she) was and that is important in gaming, because there we do not sleep, we merely pass time, so what happens when location and time are triggers? What if one life is set to time, but the other one is depending on a sun and a moon? In a real stage where we have two worlds where both work in a different premise, understanding that premise is essential if you want to efficiently win the game, that has been a cornerstone setting in RPG games for a long time, so why not change that stage, the technology is now powerful enough.

Leave a comment

Filed under Gaming, IT, movies, Science

SET trust = 0.

Yup, we all have a stage when there is no trust, there is no confidence and we wonder the why part. In this, I had questions, so I asked the agency, but they did’t know, then I asked the FBI, I asked Langley and I asked Commander Andrew Richardson, they all gave the same story, there is No Such Agency, so I Googled them and Yes! There they were, complete with phone number (+1 301-677-2300) and all, yup, we got them, so now we get to their story (at https://breakingdefense-com.cdn.ampproject.org/c/s/breakingdefense.com/2021/04/nsa-about-to-release-unclassified-5g-security-guidance/amp/).

Via the BBC, we get ‘NSA About To Release Unclassified 5G Security Guidance’ and I started to read, the article makes a lot of sense. Which gave me “Noble’s speech highlighted the importance of zero-trust architecture in 5G networks”, and it got me thinking, the approach makes a lot of sense, just like SE-LINUX, the setting of ‘no-trust’ makes sense, especially in a world where Microsoft keeps on fumbling the ball, not merely their exchange servers, but the (what I personally see as greed driven) push towards Azure, it comes with all kinds of triggers and dangers, especially as they are ready to cater to as many people as possible, the no-trust rule is pretty much the only one that makes sense at present. I have written about the dangers more than enough. So when we are given “it’s reasonable to expect that future NSA 5G security recommendations will emphasise zero trust as a key component”, I believe that the approach has a lot of benefits, especially when such a setting can be added to anti viral and Google apps, it could increase safety to well over 34% overnight, and option never achieved before and we should all applaud such a benefit. There are a few thoughts on “NSA has characterised zero trust as “a security model, a set of system design principles, and a coordinated cybersecurity and system management strategy.” It’s a “data-center centric” approach to security, which assumes the worst — that an organisation is already breached or will be breached.” A choice that is logical and sets the cleaning directly at servers and ISP’s, and they are the backbone in some cases to close to 75% of all connections, so to set a barricade on those places makes sense, there is no debating, the choice of calling themselves No Such Agency wasn’t their best idea, but this is a game changer. 

I have been critical of the US government in all kinds of ways for years and on a few topics, yet I have to admit that this is an excellent approach to prevent things going from bad to worse, moreover, there is every chance that it will make things better for a lot of us overnight as such a system deploys, it will have a trickle down effect, making more and more systems secure. 

That one thing
Yup there is always one thing and we see the dangers when we consider Solarwinds and Microsoft (their mail server), the one part is when we rely on rollbacks and we see rollback after rollback creating a hole and optionally a backdoor, the most dangerous system is the one deemed to be safe, ask Microsoft, or their exchange server. When you believe all is safe, that is when the most damage can be made. And as the article looks at 4 parts, we see ‘Improved network resiliency and redundancy’, yes it makes sense, but rollback efforts are possibly out of that equation and when we get some people tinkering there, there is a chance that the solarwinds paradox returns, yet this time with a dangerous seal of approval by the No Such Agency, it will be the one part all criminal minds are hoping for, in this I personally hope they fail, but these buggers can be resilient, tenacious and creative, the triangle that even the Bermuda Triangle fears and that is saying something.

Leave a comment

Filed under IT, Military, Science

Feel free to lose control

Yup, we all have that. You, me, pretty much everyone. Even the Catholic cleric in [censored], should you doubt that, ask any choir boy there. So when the BBC gave us ‘Facebook sued for ‘losing control’ of users’ data’, I merely shrugged and went ‘Meh’. You see, it is not about “the case against the technology giant, expected to last for at least three years, will argue a “loss of control” over users’ personal data warrants individual compensation”, which is hypocrite on a few levels, we see people handing over data and fact to complete strangers in Facebook and plenty of other social media paths. We laugh at “Coolum resident Essena O’Neill, 19, said she was paid up to $2,000 for the posts, which show her posing with products and often in revealing positions. With more than 600,000 followers on Instagram and 260,000 on YouTube, Ms O’Neill has deleted many of her original photos and re-captioned others with more honest descriptions” (ABC, 2015). We also get (two weeks ago) ““I accidentally posted a picture on Instagram of my wine glass and I was naked,” she said whilst nervously laughing. Then, she went on to explain that you could actually see her naked body in the reflection of the wine glass”, is anyone buying this? Social media has been used on a huge number of settings revealing ‘accidentally’ facts that normally do not get to see the light of day, and in all this we are given ““loss of control” over users’ personal data”? Go cry me a river! In the mean time, did anyone see Alexander Nix, Julian Wheatland, Rebekah Mercer, or Steve Bannon in the dock of a courtroom in any of the hit countries? In this the quote “harvesting of Facebook users’ personal information by third-party apps was at the centre of the Cambridge Analytica privacy scandal” applies, a third party app, was there any documented agreement, or documented acceptance of the harvesting of personal data? I do not see Microsoft in the dock in court over their exchange failure that had hit 250,000 businesses, so why not? And when we see “Cambridge Analytica’s app on Facebook had harvested the data of people who interacted with it – and that of friends who had not given consent” did anyone consider putting the board of directors of Cambridge Analytica in prison? I wonder how far we have strayed from the flock of convictions to go after the money and not the transgressors. I do get it, it is a rule or Torts, the mere “go where the money is” is not a wrong setting, but in this setting all the blame on Facebook seems wrong. They are not without fault, I get that, but to see a reference to Journalist Peter Jukes giving us “leading the action, claims his data was compromised”, so how was his data compromised? What evidence is there? In turn I have equal issues with “The Information Commissioner’s Office investigation into these issues, which included seizing and interrogating Cambridge Analytica’s servers, found no evidence that any UK or EU users’ data was transferred by [app developer] Dr [Aleksandr] Kogan to Cambridge Analytica”, I wonder how far backup investigation went, in turn the setting of ‘no evidence that any UK or EU users’ data was transferred’ is almost preposterous, the data was collected, as such it went somewhere, the fact that the Information Commissioner’s Office couldn’t find that part is mere icing on the cake of Cambridge Analytica. In addition, when we see “Mr Jukes told BBC News it was not about “where the data went” but rather “that Facebook didn’t care”. “They didn’t look after it,” he said.” Can this be proven? ‘Didn’t care’ is subjective and presumptive, we can agree that security measures failed, yet ‘They didn’t look after it’ is equally unproven, and these people are not going after the people of Cambridge Analytica as THEY transgressed on the data. As such as we look at Eton boy Alexander Nix, in the setting of “Nix agreed to a disqualifying undertaking prohibiting him from running U.K. limited companies for seven years after permitting companies to offer potentially unethical services, while denying any wrongdoing”, he got a mere slap on the hand, with a mandatory 7 year vacation all whilst we are told ‘denying any wrongdoing’, in addition there is “agreeing to delete previously obtained data”, a 2019 agreement, so where was the data all this time? Let’s be clear, Facebook has made blunders, huge ones, yet in light of the fact that Microsoft gets a mere fine and the issues is closed after that, why keep on going after Facebook? When we see ZDNet give us ‘Microsoft Exchange Server attacks: ‘They’re being hacked faster than we can count’, says security company’ two weeks ago (at https://www.zdnet.com/article/microsoft-exchange-server-attacks-theyre-being-hacked-faster-than-we-can-count-says-security-company/), what gives, why are they not being sued for setting a dangerous precedence on corporate information? We go after Huawei without evidence, we ignore alleged criminals and their app transgressions with our data, but it is fine to go after Facebook whilst ignoring the massive flaw that is Microsoft? So what gives?

So yes, we can lose control all we like, but if we hamper the courts with empty cases that are set on emotion, all whilst people like Alexander Nix, Julian Wheatland, Rebekah Mercer, and Steve Bannon are allowed to return to positions and try again? And what about Cambridge Analytica? As it was soon thereafter acquired by? The only reason I see to acquire Cambridge Analytica is because of hardware, because of software and because of data, so who is looking into that, preferably all before we lose time slapping Facebook around? I see very little after 2018, but perhaps Peter Jukes is too busy to see were his alleged compromised data optionally went. 

So whilst we giggle on statements like “I accidentally posted a picture on Instagram of my wine glass and I was naked”, we see a setting where a large group of people are using social media for all kind of things, the limelight most of all and in this we need to separate the real issues from the fictive cash cows. In this, did you wonder if the people are realising that Wired gave us a mere hour ago “collaboration platforms like Discord and Slack have taken up intimate positions in our lives, helping maintain personal ties despite physical isolation. But their increasingly integral role has also made them a powerful avenue for delivering malware to unwitting victims—sometimes in unexpected ways” (at https://www.wired.com/story/malware-discord-slack-links/) and that is a mere tip of the iceberg, a massively large one. How many apps are a gateway to YOUR system? So when we take notice of “hackers have integrated Discord into their malware for remote control of their code running on infected machines, and even to steal data from victims”, as such in that case it is not the nude reflection shot that matters, it is the wineglass porn that some people decided not to post that is out there for everyone to see. Consider the words by Stephen Fry on 2014, when he said “The best way to prevent nude pictures online, is to never pose nude”, or something according to those lines and he is right, the best social media is the boring one, where you just say hi and connect to relatives. But the limelight is for some just too appealing and to give everyone the lowdown on all your needs and that is what players like Cambridge Analytica were banking on. As such, when we add that light, that spotlight, what data of Peter Jukes was transgressed on and in light of the Exchange server issues, the Cisco issues and the larger stage of interconnecting apps, can it even be proven that it was Facebook? 

I’ll buy popcorn for that court case, it should be fun.

Leave a comment

Filed under IT, Law, Media, Science

If not, then; else, return;

How cryptic is that? It was a sentence that I used in the 80’s, I sounded clever and cryptic at the same time, yet it was not for that, it was the stage where some had no idea how some things worked in IT programming (Clipper), the use of Boolean variables wasn’t alien to them, but it was close to the unknown and just now, the idea hit that in all these stages of ‘showing’ things, I wonder how many have shown the stage of choices, Boolean choices?

A stage overlooked for such a long time and why was it overlooked? The people who need it are in a stage of wondering things out, now for the most it does not matter, but what happens when the dataset you are looking at is a few million cases?

As such as you look at this small triangle, can you answer the 4 results? And this is a setting with merely 3 variables, and merely 2 Booleans used. When that list grows in variables and Booleans, it becomes a larger scene of people wondering if they missed anything, wouldn’t it be nice to see an answer there? In an age of dashboard people whose Business intelligence setting is absent of a degree in advanced mathematics, statistics is the best we can hope for, at least in this setting someone can give them a better tool? What do you think?

When we look at the stage of larger datasets, do you think such a tool is less needed or more needed? And when IT makes these people the 14th export, will they agree with the assessment?

I will leave it up to you, gee, another day another set of ideas added, in an age where marketing hands iteration over and calls it innovation. I wonder how many software solutions have this option at present.

Leave a comment

Filed under IT, Science

Is it real?

Yes, that is the question we all ask at times, in my case it is something my mind is working out, or at least trying to work out. The idea that my mind is forming is “Is it the image of a vision, or is it a vision of an image”, one is highly useful, the other a little less so. The mind is using all kinds of ideas to collaborate in this, as such, I wonder what is. The first is a jigsaw, consider a jigsaw, even as the image is different, the pieces are often less so different, one could argue that hundreds of jigsaws have interchangeable pieces, we merely do not consider them as the image is different and for the most, how many jigsaws have you ever owned? With this in the back of the mind what happens when we have data snippets, a data template, with several connectors, the specific id of the data and then we have the connector which indicates where the data comes from, both with date and time stamps. But like any jigsaw, what if we have hundreds of jigsaws and the pieces are interchangeable? What is the data system is a loom that holds all the data, but the loom reflects on the image of the tapestry, what happens, when we see all the looms, all the tapestries and we identify the fibres as the individual users? What happens when we create new tapestries that are founded on the users? We think it is meaning less and useless, but is it? What if data centres have the ability to make new frameworks, to stage a setting that identifies the user and their actions? We talk about doing this, we claim to make such efforts, but are we? You see, as IBM completed its first Quantum computer, and it has now a grasp on shallow circuits, the stage comes closer to having Ann actual AI in play, not the one that IT marketing claims to have, and salespeople states is in play, but an actual AI that can look into the matter, as this comes into play we will need a new foundation of data and a new setting to store and retrieve data, everything that is now is done for the convenience of revenue, a hierarchic system decades old, even if the carriers of such systems are in denial, the thinking requires us to thwart their silliness and think of the data of tomorrow, because the data of today will not suffice, no matter how blue Microsoft Italy claims it is, it just won’t do, we need tomorrows thinking cap on and we need to start considering that an actual new data system requires us to go back to square one and throw out all we have, it is the only way.

In this, we need to see data as blood cells, billions individual snippets of data, with a shell, connectors and a core. All that data in veins (computers) and it needs to be able to move from place to place. To be used by the body where the specific need is, an if bioteq goes to places we have not considered, data will move too and for now the systems are not ready, they are nowhere near ready and as such my mind was spinning in silence as it is considering a new data setup. A stage we will all need to address in the next 3-5 years, and if the energy stage evolves we need to set a different path on a few levels and there we will need a new data setup as well, it is merely part of a larger system and data is at the centre of that, as such if we want smaller systems, some might listen to Microsoft and their blue (Azure) system, but a smurf like that will only serve what Microsoft wants it to smurf, we need to look beyond that, beyond what makers consider of use, and consider what the user actually needs.

Consider an app, a really useful app when you are in real estate, there is Trulia, it is great for all the right reasons, but it made connections, as it has. So what happens when the user of this app wants another view around the apartment or house that is not defined by Yelp? What happens when we want another voice? For now we need to take a collection of steps hoping that it will show results, but in the new setting with the new snippets, there is a larger option to see a loom of connections in that location, around that place we investigate and more important, there is a lot more that Trulia envisioned, why? Because it was not their mission statement to look at sports bars, grocery stores and so on, they rely on the Yelp link and some want a local link, some want the local link that the local newspapers give. That level of freedom requires a new thinking of data, it requires a completely new form of data model and in 5G and later in 6G it will be everything, because in 4G it was ‘Wherever I am’, in 5G it will become ‘Whenever I want it, and the user always wants it now. In that place some blue data system by laundry detergent Soft with Micro just does not cut it. It needs actual nextgen data and such a system is not here yet. So if I speculate on 6G (pure speculation mind you), it will become ‘However I need it’ and when you consider that, the data systems of today and those claiming it has the data system of tomorrow, they are nowhere near ready, and that is fine. It is not their fault (optionally we can blame their board of directors), but we are looking at a new edge of technology and that is not always a clear stage, as such my mind was mulling a few things over and this is the initial setting my mind is looking at. 

So, as such we need to think what we actually need in 5 years, because if the apps we create are our future, the need to ponder what data we embrace matters whether we have any future at all.

Well, have a great easter and plenty of chocolate eggs.

Leave a comment

Filed under IT, Science

The joke is on us (all)

Reuters gave light (again) to an article that I wrote earlier, 2 days ago (at https://lawlordtobe.com/2021/03/30/an-almost-funny-thing/) I wrote ‘An almost funny thing’, I got it from the BBC and I feel certain that some official people were already already on the ball, being a mere 2 years late. I reckon that some figured out that the growing cash flow these people ended up with will count against certain players, if not a lot more. Some people might have gotten additional considerations with “In the OSI model, we see layers 3-7 (layer 8 is the user). So as some have seen the issues from Cisco, Microsoft and optionally Zoom, we see a link of issues from layer 3 through to layer 7 ALL setting a dangerous stage. Individually there is no real blame and their lawyers will happily confirm that, but when we see security flaw upon security flaw, there is a larger stage of danger and we need to take notice” and that is the tip of the iceberg. So when Reuters gives us ‘Ransomware tops U.S. cyber priorities, Homeland secretary says’ this morning, we might not get the entire field in view and that is not on Reuters. And as Alejandro Mayorkas gives us “ransomware was “a particularly egregious type of malicious cyber activity” and listed it as the first of several top priorities that his department would tackle in the online sphere” we are not getting the entire story and we are happily giving the Department of Homeland Security that as they have other consideration as well. Yet I personally believe (speculatively) that some programmers working in specific places got handed libraries to make more, but also got a setting where they created software that opened a backdoor, so that all parties have an excuse and any investigation will end up going nowhere. You see there are plenty of real option givers that start as ‘Top 9 Python Frameworks For Game Development’, and that is where it starts. Consider the following scenario: as some developers become better they seemingly need shortcuts and would you believe it, some knows someone on the darkweb and they will hand the developer an option, two actually, one is free, the other one is $19.99, but is ‘presented’ as a lot more secure and it has documentation, that is all that they need and as the library is linked, the trap is set. The game maker does the right thing and enhances his program with either version (both have the flaw), and now, with a passive backdoor is passive (gaming is required), it passes through a whole range of systems and as the game is offered free with ‘in-app purchases’ the people behind the screens suddenly have 100K+ stations for all kinds of use. So whilst some are trivialising “No one really knows the size of the dark web, but most estimates put it at around 5% of the total internet. Again, not all the dark web is used for illicit purposes despite its ominous-sounding name”, we see, ohh not all is illicit, but consider that this software would be in the open internet if it was all on the up and up. The indie developer (many companies of one) has that ‘special feeling’ as he was introduced and others were not, but they all were and some were offered similar links in the end all linking to the same package, and that is the game, so when we we see greed driven idiots like Epic games (and a few others) setting the stage to avoid the Google and Apple store, we will see a much larger shift, one that gives free reign to criminal minded people to infect a massive amount of systems. So when you think that players like DHS is ready for these assaults, the people will soon learn the hard way that they were not and from there it will go from bad to worse.

And this is not about Epic games, even as some will herald “Cesium will be available for free for all creators on the Unreal Engine Marketplace. It’s an open-source plugin for the engine that unlocks global 3D data and geospatial technology. This means that games that use it will be able to discover in real time the location of a player in a given 3D space, using accurate real-world 3D content captured from cameras, sensors, drones, and smart machines” (source: venture beat), we think it is all for the good of us, and it is not, it is good for the pockets of Epic Games, but what happens when other elements get a hold of the saved data linked to geospatial technology? What happens, when foundational advantages that were (for the most) in the hands of players like CIA and GCHQ; what happens when cyber criminals get THAT level of precise data and THOSE cluster data groups? Did you think of that? So whilst some laugh away “games that use it will be able to discover in real time the location of a player in a given 3D space, using accurate real-world 3D content captured from cameras, sensors, drones, and smart machines”, the data will go a lot further, it will optionally end up not merely showing those systems, but the locations of all systems they link to as well. It is a hidden version of what I called the ‘Hop+1’ intrusion malware (thought up by yours truly) that made much of the CIA counter software close to useless, someone took that idea and made a corporate version with some version of a backdoor, in that stage the internet will end up being as dangerous as walking the dog (not the ‘M’ word), in a minefield. Letting the dog have a shit will be the last thing you did that day for a very long time to come.

As such, some might applaud the DHS (they actually did nothing wrong) as we see “a DHS official said the reference was to underground forums that help cybercriminals franchise out their malicious campaigns.” Yet under these situations, finding blame is close to impossible and the mistrusting developers end up helping cyber criminals in the process, and that is if there is ever any prosecutable connection found. 4 stages not directly linked will make prosecution close to impossible. So how is that for size? And whilst we take notice of “He said the agency would “quarterback” the U.S. government’s digital defences and serve as a “trusted interlocutor” between business executives and public servants” we see that their heart is in the right place, but the people they are hunting are heartless, devious, better funded and technologically more up to speed. It is a race many politically governmental intelligence organisations cannot win, not now, and optionally not ever. What a fine mess some corporations got us into.

Leave a comment

Filed under Gaming, IT, Law, Military, Politics, Science

And so it begins

To be honest, yesterday was a little whack. I came up with the foundation of a new Star Trek movie (a story covering two movies), but I will not set it here as it is founded on Star Trek materials already in existence and as such, it is not mine, that and the fact that the people at Paramount should be ahead of me, if I can come up with the goods and they cannot, you can draw your own conclusions on that. The second part was a new idea on something that might be seen as either a sequel or a prequel. I am not much of a horror fan, never was but I sometimes go see one. There was Poltergeist, the Relic, Grave Encounters (one and two), and then it happened. The idea got into me and these movies gave way to the paving of the idea, they are important (somehow). I remembered a ride in a Dutch theme park named ‘the Efteling’, the ride is called ‘Villa Volta’ and it refers to a legend called ‘de Bokkenrijders’ (the Goat riders). The story goes back to a book written in 1779, the book and the gang actually referred back to 

  • Gabriël Brühl – sentenced to death by hanging, 10 September 1743.
  • Geerling Daniels – died of two self-inflicted stab wounds, 28 January 1751.
  • Joseph Kirchhoffs – sentenced to death by hanging, 11 May 1772.
  • Joannes Arnold van de Wal (“Nolleke van Geleen”) – sentenced to death by hanging, 21 September 1789.

When we consider these parts, we see the foundation of an excellent horror movie, one with references to the past, consider that the area ‘the Kempen’ was not the most illuminated one and also largely absent of lighting, we see a larger stage, with the robbing of churches, people and devil worship that the stage for something nicely haunting can be made. A stage that includes parochial corruption, envy based corruption and superstition all whilst there was an actual danger of cutthroat robbers does tend to lend a hand in setting nerves on fire as we contemplate what is behind the three doors, it might help to realise that it is not the doors leading to the living room, the street or the cupboard door to the bed (people slept in cupboards in those days). A stage that was determined not by law (even as they claimed it) but by fear and by the hands of the church, yes, those were the days.

So as I was setting the field to all kinds of creativity, the US government changes the timeline I had in mind initially (at https://lawlordtobe.com/2020/12/03/trillion-dollar-musk/  where I wrote ‘Trillion dollar Musk’, the stage where I predicted “I stated before that in the next 3-4 years his value will increase to roughly $1.2 trillion dollars, or in a less shorthand version $1,200,000,000,000, yes that is where he is heading and he already has most of the IP in his possession to do so”, now we see that Reuter gives us ‘Biden proposal: $174 billion for EVs, new funds for renewable power’, a stage where we are told “The White House said the new EV funds will result in more U.S. production of EV components and batteries and fund new consumer rebates and tax incentives “to buy American-made EVs, while ensuring that these vehicles are affordable for all families and manufactured by workers with good jobs” and that is the beginning for Elon Musk to chisel in stone the setting that gets him a trillion dollar plus member and he already has most of the IP to do so, the little he is missing was in one of my articles and likely his team already has the stage in place to get started, I reckon (speculatively) that Elon Musk and his Musk-wares will optionally be a household name within the decade, equalling, optionally surpassing Google, Apple and Microsoft in the process. It is the power of innovation and the sooner the iterative flaccid minds take notice, the better the world becomes. 

And so it begins, the stage for a new technology driven economy comes into play and when 5G deploys all over the world, the old people (Arvind Krishna, Satya Nadella, Larry Ellison et al) see what happens next, they will race, they will cry needs and they will object to all kinds of things, but the world is changing and unfortunately for them, Elon Musk seemingly has the goods.

It will not make changes overnight but it will make larger changes. He will not do it alone, there are larger players who will be part of all this, but not the three mentioned and if they do not adjust the need of their shareholders to actual innovative jumps they will become obsolete. Yes and it includes Microsoft, who has the good fortune to be reduced to a user facilitator. The innovative will also push us into directions we are not completely ready for, but that is the foundation of innovation. You see Ren Zhengfei was initially part of that, but the Wall Street players saw what they were missing out on and their anti-Huawei rhetoric is playing against them, now the US will miss out on a lot more, the question is will the change of direction go towards the EU, or will there be another direction? I actually do not know, but to cater to these changes proper 5G was required and in the speed section, we see (according to statista.com) that Saudi Arabia is at the head of that speed setting, yet both Canada and Australia have more than the minimum speed requirement (America does not), as such they do have a larger advantage at present and that matter, because the developer that fits the bill will have an easy mark raking in revenue in whatever direction innovation pushes. I cannot tell what direction it is in, because I simply do not know, but the earlier step (the Elon Musk deal) will also push domotics and smart devices and they are optionally now all driven by Musk technology. 

So here in the beginning of new technology, we see players, but not the players that hoped to be in charge and that drives them to all kind of directions, it is THEIR personal horror story, and they fear to be non-essential, the rich fear that as much as a direct loss of wealth, because when their status as essential captain of industry goes, so do their automatic revenue renewal programs, and it seems like we get to see the impact of those changes earlier than I expected.

Leave a comment

Filed under Finance, IT, Politics, Science

An almost funny thing

I saw an article at the BBC and I will get to that in a moment, but it reminded me of a situation that happened in 2010. I needed a new laptop and I was looking in a shop at their Collection of laptops. A man came to me and was trying to convince me just how amazing this laptop was. My inner demon was grinning, I get it, the man was enthusiastic, he was giving the numbers, but in all this, did he realise what he was saying? I am not doubting the man’s skills, he was doing a good job, I was however in IT and had been there for 30 years, so I have pretty much seen it all, and there it was, my little demon, on my right shoulder calling me ‘pussy’. So as the man stated ‘this laptop has a one terabyte hard-drive, can you even imagine ho much that is?’, I could not resist and my response was ‘Yup, that would fit roughly 10% of my porn collection’, his jaw dropped to the ground, his eyes almost popped, the demon inside me stated ‘Nice!’ Actually, it was not quite true, it would only fit a rough 0.32114%. It was the impact of the shock factor. You see, there is a hidden agenda there, when you (appropriately) use the technique, you get to see the real salesperson and that was what I needed. He was thrown, but he recomposed and continued giving me the goods on the laptop, I bought that laptop roughly 132 seconds later.

So today I saw ‘The Rise of extortionware’ (at https://www.bbc.com/news/technology-56570862), here I notice “where hackers embarrass victims into paying a ransom”, it is not new, it is not even novel. I will also give you the second game after the people involved get arrested, they will demand anonymity and any bleeding heart judge will comply. I state that these people will be handed the limelight so that the people that faced ransomware attacks can take their frustration out of these people. But that remains wishful thinking. So next we get “Experts say the trend towards ransoming sensitive private information could affect companies not just operationally but through reputation damage. It comes as hackers bragged after discovering an IT Director’s secret porn collection.” I have the question was it a private or a company computer? You see, sone focus on the boobies, just what the advertisers on Twitter hope for, they want the click bitches, it makes them money. It is time that we set the larger stage, you see the entire mess would be smaller if Cisco and Microsoft had done a proper job. OK, I apologise, Cisco does a proper job, but some things slip through and in combination with Microsoft exchange servers it is not slipping through, it is a cyber hole the size an iceberg created on the Titanic and we need to set a much larger stage. So when we see “Thanks God for [named IT Director]. While he was [masturbating] we downloaded several hundred gigabytes of private information about his company’s customers. God bless his hairy palms, Amen!”, it seemingly answers that he might keep it on a corporate computer, or he uses his private computer for company stuff. Yet in that same light the hacker should not be allowed any anonymity, we all get to see who the hacker is. If there is something to be learned it is see with “Hackers are now actually searching the data for information that can be weaponised. If they find anything that is incriminating or embarrassing, they’ll use it to leverage a larger pay-out. These incidents are no longer simply cyber-attacks about data, they are full-out extortion attempts” There are two sides

  1. The station of ALWAYS ONLINE needs to change, there needs to be an evolving gateway of anti hack procedures and a stage of evolving anti hack routers and monitoring software. You think that Zoom is an option?
    Tom’s Guide gave us less than 2 weeks ago “More than a dozen security and privacy problems have been found in Zoom”, as well as “Zoom’s ease of use has made it easy for troublemakers to “bomb” open Zoom meetings. Information-security professionals say Zoom’s security has had a lot of holes, although most have been fixed over the past few year”, so whilst you contemplate ‘most have been fixed’, consider that not all are fixed and that is where the problem goes from somewhat to enormous. Well over 20% of the workforce works at home, has zoom meetings and that is how cyber criminals get the upper hand (as well as through disgruntled employees), a change in mindset is only a first station.
  2. Remember that Australian? (Julian Assange) We were told that soon there would be some leaks on issues on banks (Wall Street) then it suddenly became silent, now some will say that it is a bluff, but in light of the meltdown in 2008, I am not so certain, I reckon that some have ways to show the hackers who they are and they profit by not doing that. Can I prove this? Absolutely not. It is speculation, but when you look at the timeline, my speculation makes sense. 
  3. The third side is optionally the second side as the second side might not be a real side. When we see “Hackers are now actually searching the data for information that can be weaponised. If they find anything that is incriminating or embarrassing, they’ll use it to leverage a larger pay-out. These incidents are no longer simply cyber-attacks about data, they are full-out extortion attempts”, the underlying station is ‘information that can be weaponised’ and the IT sector is helping them.

How did I get there? The cloud is not as secure as some state, and the salespeople need to take notice. Business Insider gave us about 6 months ago “70% of Companies Storing Data With Cloud Companies Hacked or Breached”, see the link we are now slowly getting presented? 

In the OSI model, we see layers 3-7 (layer 8 is the user). So as some have seen the issues from Cisco, Microsoft and optionally Zoom, we see a link of issues from layer 3 through to layer 7 ALL setting a dangerous stage. Individually there is no real blame and their lawyers will happily confirm that, but when we see security flaw upon security flaw, there is a larger stage of dangers and we need to take notice. And here the dangers become a lot more interesting when we consider the Guardian yesterday when we saw “Intelligence value of SolarWinds hacking of then acting secretary Chad Wolf is not publicly known”, what else is not publicly known? How many media outlets ignored the Cisco matter, how come ZDNet is one of the few giving us “it’s not releasing patches for some of the affected devices that reached end of life” less than 8 weeks ago. Again I say Cisco did the right thing by informing its customers close to immediately, yet when we see “More than 247,000 Microsoft Exchange servers are yet to be patched against the CVE-2020-0688 post-auth remote code execution (RCE) vulnerability impacting all Exchange Server versions under support” (source: bleepingcomputers.com) as far as I can see, a lot of the media ignored it, but they will shout and repeat the dangers of Huawei, without being shown actual evidence, and I state here, that unless we make larger changes, the extortion path will evolve and become a lot larger. With 70% of cloud systems getting hacked or breached, a large chunk of the Fortune 500 will pay too much to keep quiet and who gets to pay for that? There is a rough 99.867765% chance that its board members will not, it might be speculatively, so please prove me wrong.

A stage where the needs of the consumers changes in a stage where the corporations are not ready to adjust and all whilst the IT salespeople have that golden calf that does everything and make you coffee as well. Adjustments are needed, massive adjustments are needed and we need to make them now before the cybercriminals are in control of our IT needs and that is not mere speculation, when you see flaw after flaw and too little is done as too many are the victim of its impact is a serious breach and it has been going on for some time, but now it is seemingly out in the light and too many are doing too little and as we laugh at “God bless his hairy palms, Amen!” Consider that stage, and now consider that they invade a financial institution, these are clever criminals, they do not empty your account, they merely take $1, perhaps $1 every other month, this implies that they are looking at a $16,000,000 every two months. And this is merely one bank, one in a thousand banks, some a lot bigger than the Australian Commonwealth bank and lets face it, the fact that layer 3 to layer 7 is leaky in hundreds of thousands of customers, do you really think that banks are off-limits? Do you really think that this is a simple hick-up or that the scenery is changing this quickly by people claiming that it will be fixed in no-time? 

We need massive changes and we need them a lot sooner than we think.

1 Comment

Filed under IT, Law, Media, Science

River of choices

We all have these moments where we contemplate things, you me, we all do. When I am in that stage I tend to play a game to clear my mind, let my subconscious work out what I cannot voice, most of us have a mechanic of sorts to work through this, and I am not different. As I was considering a game, I returned to Dragon-quest builder, on Switch, the second game. I never finished it, mainly because some of the quirks got to me. Let me be clear, I was talking about quirks, not bugs or glitches, although we can argue on glitches. I got the demo which gave us much of the first world and it enticed me, it was fun to play and the word fun os overbearingly important. A bad game is a bad game, a fun game is for the most never ever a bad game. It might not be a great game, some are optionally not good games either, but fun works out the kinks in your armour every single time, so now that I have worked through the kinks, I am going back to the game. You see, I have issues to work through, issues on the RPG my mind devised (and put online in these articles), yet I need to make sure it is about the game, there is no hatred towards Bethesda, lets be clear if you have a program (or a few) what would you do if you were offered eight point five billion? I would do the same. I have a natural disgust towards Microsoft, but that is on different grounds. 

So as I was playing Dragon-quest Builders, my mind worked out a few more settings in the RPG. The stage where you either build a house, or buy a house, a house is for most our most powerful possession, so let’s make it a house of power, a house of family and where you set it has benefits, no matter where you set it. Consider that Bethesda’s Oblivion, in your game you could own a house in Anvil, Bravil, Bruma, Cheydinhal, Chorrel, Imperial City docks, Leyawin and Skingrad. So how many friends do you have who have 8 houses? But what happens when the house becomes a stage of power? Not merely houses that have more or less (and therefor more affordable) power, but different kinds of power. To coin a phrase, in Greek terms, what if the house in Leyawin is blessed by Hades, as such a necromancer would have bigger abilities over time and more powerful as he is in his house more often, as such the child born there would have increasing benefits. But in this RPG there is no Hades, but the idea still sticks, and it was not done before, so enjoy adding that part in your Playstation exclusive RPG.

Yet it does not end there, houses is one part in ones life, the setting is what is added and it is important to be unique, or at least not as much as a copy of true originals as some others are. The houses are just the beginning, as we get into the game, the house itself will optionally be the giver of quests, which does not mean that all houses should be owned, you can at each time only own one and the quests will not come until the next generation is there (born in the house). There is also the stage where one third is some form of copy, so if there are 7 houses (random number), the 21 quests will be there, but 7 will optionally be a revisitation. It allows for replayability of a game, giving it a much larger stage to play, in all the game requires at least one replay as we have three generation and 5 arcane houses, and 5 mundane houses (still working on that), as such you cannot play them all in one play-through, as such there is the evolution of towns over three generations, so the game will be much larger, I had some sort of version in my initial view of Elder Scrolls VII: Restoration, but as they are now Microsoft, I can incorporate the few dozen ideas I had there to fit this RPG, so you have a lot more coming your way.

Consider a game with 5 main quest lines and dozens of side-quests. A station of consideration and in that river, we must make choices, if we listen to marketing we get the vile ‘This should be enough’ and ‘what if we copy that idea, it is easier to replicate’, and that is not false, but that is why the top 10 of best Ubisoft games are 1994 or older, that is 26 years ago. Personally that list is fine, but I would have places AC Origins in there at some point. Ghost Recon Breakpoint had 52%, Ghost Recon Wildlands 69%, games that should have been 85% plus games didn’t make it, why is that? A game that tries to appeal to all, will in fact please none. A lesson that Ubisoft never learned. And that is where I am not going, as such I am relying on a different course, to envision a different RPG that pleases all RPG lovers and if some want to take a leap there they are welcome. Yet some will not like it, they rely on racing games, FIFA and other games and they are welcome there, I wish them the best fun they can handle, and some are totally nuts about FIFA, I am more of an NHL player myself. We all have fantasies and mine is to be an NHL goalie (as sports go). So as I am taking a view on the mundane quests, the economic stage of the island, I want to set a larger stage of bartering, we al needs stuff and let’s face it, cola caps make for lousy food, so how to go about it? We can return to the age of Rome and get paid in salt, but I reckon that in most villages the need for hides and tools will outweigh the need for jewellery (but not always), so as I look into the stage of artisan quest lines I leave you with the thoughts I had. Do not consider out of the box thinking, throw that limitation overboard and make the consideration if my thought had to fit in a box, what shape would that box have?

It is just a thought to entertain.

Leave a comment

Filed under Gaming, IT