Category Archives: IT

An almost funny thing

I saw an article at the BBC and I will get to that in a moment, but it reminded me of a situation that happened in 2010. I needed a new laptop and I was looking in a shop at their Collection of laptops. A man came to me and was trying to convince me just how amazing this laptop was. My inner demon was grinning, I get it, the man was enthusiastic, he was giving the numbers, but in all this, did he realise what he was saying? I am not doubting the man’s skills, he was doing a good job, I was however in IT and had been there for 30 years, so I have pretty much seen it all, and there it was, my little demon, on my right shoulder calling me ‘pussy’. So as the man stated ‘this laptop has a one terabyte hard-drive, can you even imagine ho much that is?’, I could not resist and my response was ‘Yup, that would fit roughly 10% of my porn collection’, his jaw dropped to the ground, his eyes almost popped, the demon inside me stated ‘Nice!’ Actually, it was not quite true, it would only fit a rough 0.32114%. It was the impact of the shock factor. You see, there is a hidden agenda there, when you (appropriately) use the technique, you get to see the real salesperson and that was what I needed. He was thrown, but he recomposed and continued giving me the goods on the laptop, I bought that laptop roughly 132 seconds later.

So today I saw ‘The Rise of extortionware’ (at https://www.bbc.com/news/technology-56570862), here I notice “where hackers embarrass victims into paying a ransom”, it is not new, it is not even novel. I will also give you the second game after the people involved get arrested, they will demand anonymity and any bleeding heart judge will comply. I state that these people will be handed the limelight so that the people that faced ransomware attacks can take their frustration out of these people. But that remains wishful thinking. So next we get “Experts say the trend towards ransoming sensitive private information could affect companies not just operationally but through reputation damage. It comes as hackers bragged after discovering an IT Director’s secret porn collection.” I have the question was it a private or a company computer? You see, sone focus on the boobies, just what the advertisers on Twitter hope for, they want the click bitches, it makes them money. It is time that we set the larger stage, you see the entire mess would be smaller if Cisco and Microsoft had done a proper job. OK, I apologise, Cisco does a proper job, but some things slip through and in combination with Microsoft exchange servers it is not slipping through, it is a cyber hole the size an iceberg created on the Titanic and we need to set a much larger stage. So when we see “Thanks God for [named IT Director]. While he was [masturbating] we downloaded several hundred gigabytes of private information about his company’s customers. God bless his hairy palms, Amen!”, it seemingly answers that he might keep it on a corporate computer, or he uses his private computer for company stuff. Yet in that same light the hacker should not be allowed any anonymity, we all get to see who the hacker is. If there is something to be learned it is see with “Hackers are now actually searching the data for information that can be weaponised. If they find anything that is incriminating or embarrassing, they’ll use it to leverage a larger pay-out. These incidents are no longer simply cyber-attacks about data, they are full-out extortion attempts” There are two sides

  1. The station of ALWAYS ONLINE needs to change, there needs to be an evolving gateway of anti hack procedures and a stage of evolving anti hack routers and monitoring software. You think that Zoom is an option?
    Tom’s Guide gave us less than 2 weeks ago “More than a dozen security and privacy problems have been found in Zoom”, as well as “Zoom’s ease of use has made it easy for troublemakers to “bomb” open Zoom meetings. Information-security professionals say Zoom’s security has had a lot of holes, although most have been fixed over the past few year”, so whilst you contemplate ‘most have been fixed’, consider that not all are fixed and that is where the problem goes from somewhat to enormous. Well over 20% of the workforce works at home, has zoom meetings and that is how cyber criminals get the upper hand (as well as through disgruntled employees), a change in mindset is only a first station.
  2. Remember that Australian? (Julian Assange) We were told that soon there would be some leaks on issues on banks (Wall Street) then it suddenly became silent, now some will say that it is a bluff, but in light of the meltdown in 2008, I am not so certain, I reckon that some have ways to show the hackers who they are and they profit by not doing that. Can I prove this? Absolutely not. It is speculation, but when you look at the timeline, my speculation makes sense. 
  3. The third side is optionally the second side as the second side might not be a real side. When we see “Hackers are now actually searching the data for information that can be weaponised. If they find anything that is incriminating or embarrassing, they’ll use it to leverage a larger pay-out. These incidents are no longer simply cyber-attacks about data, they are full-out extortion attempts”, the underlying station is ‘information that can be weaponised’ and the IT sector is helping them.

How did I get there? The cloud is not as secure as some state, and the salespeople need to take notice. Business Insider gave us about 6 months ago “70% of Companies Storing Data With Cloud Companies Hacked or Breached”, see the link we are now slowly getting presented? 

In the OSI model, we see layers 3-7 (layer 8 is the user). So as some have seen the issues from Cisco, Microsoft and optionally Zoom, we see a link of issues from layer 3 through to layer 7 ALL setting a dangerous stage. Individually there is no real blame and their lawyers will happily confirm that, but when we see security flaw upon security flaw, there is a larger stage of dangers and we need to take notice. And here the dangers become a lot more interesting when we consider the Guardian yesterday when we saw “Intelligence value of SolarWinds hacking of then acting secretary Chad Wolf is not publicly known”, what else is not publicly known? How many media outlets ignored the Cisco matter, how come ZDNet is one of the few giving us “it’s not releasing patches for some of the affected devices that reached end of life” less than 8 weeks ago. Again I say Cisco did the right thing by informing its customers close to immediately, yet when we see “More than 247,000 Microsoft Exchange servers are yet to be patched against the CVE-2020-0688 post-auth remote code execution (RCE) vulnerability impacting all Exchange Server versions under support” (source: bleepingcomputers.com) as far as I can see, a lot of the media ignored it, but they will shout and repeat the dangers of Huawei, without being shown actual evidence, and I state here, that unless we make larger changes, the extortion path will evolve and become a lot larger. With 70% of cloud systems getting hacked or breached, a large chunk of the Fortune 500 will pay too much to keep quiet and who gets to pay for that? There is a rough 99.867765% chance that its board members will not, it might be speculatively, so please prove me wrong.

A stage where the needs of the consumers changes in a stage where the corporations are not ready to adjust and all whilst the IT salespeople have that golden calf that does everything and make you coffee as well. Adjustments are needed, massive adjustments are needed and we need to make them now before the cybercriminals are in control of our IT needs and that is not mere speculation, when you see flaw after flaw and too little is done as too many are the victim of its impact is a serious breach and it has been going on for some time, but now it is seemingly out in the light and too many are doing too little and as we laugh at “God bless his hairy palms, Amen!” Consider that stage, and now consider that they invade a financial institution, these are clever criminals, they do not empty your account, they merely take $1, perhaps $1 every other month, this implies that they are looking at a $16,000,000 every two months. And this is merely one bank, one in a thousand banks, some a lot bigger than the Australian Commonwealth bank and lets face it, the fact that layer 3 to layer 7 is leaky in hundreds of thousands of customers, do you really think that banks are off-limits? Do you really think that this is a simple hick-up or that the scenery is changing this quickly by people claiming that it will be fixed in no-time? 

We need massive changes and we need them a lot sooner than we think.

1 Comment

Filed under IT, Law, Media, Science

River of choices

We all have these moments where we contemplate things, you me, we all do. When I am in that stage I tend to play a game to clear my mind, let my subconscious work out what I cannot voice, most of us have a mechanic of sorts to work through this, and I am not different. As I was considering a game, I returned to Dragon-quest builder, on Switch, the second game. I never finished it, mainly because some of the quirks got to me. Let me be clear, I was talking about quirks, not bugs or glitches, although we can argue on glitches. I got the demo which gave us much of the first world and it enticed me, it was fun to play and the word fun os overbearingly important. A bad game is a bad game, a fun game is for the most never ever a bad game. It might not be a great game, some are optionally not good games either, but fun works out the kinks in your armour every single time, so now that I have worked through the kinks, I am going back to the game. You see, I have issues to work through, issues on the RPG my mind devised (and put online in these articles), yet I need to make sure it is about the game, there is no hatred towards Bethesda, lets be clear if you have a program (or a few) what would you do if you were offered eight point five billion? I would do the same. I have a natural disgust towards Microsoft, but that is on different grounds. 

So as I was playing Dragon-quest Builders, my mind worked out a few more settings in the RPG. The stage where you either build a house, or buy a house, a house is for most our most powerful possession, so let’s make it a house of power, a house of family and where you set it has benefits, no matter where you set it. Consider that Bethesda’s Oblivion, in your game you could own a house in Anvil, Bravil, Bruma, Cheydinhal, Chorrel, Imperial City docks, Leyawin and Skingrad. So how many friends do you have who have 8 houses? But what happens when the house becomes a stage of power? Not merely houses that have more or less (and therefor more affordable) power, but different kinds of power. To coin a phrase, in Greek terms, what if the house in Leyawin is blessed by Hades, as such a necromancer would have bigger abilities over time and more powerful as he is in his house more often, as such the child born there would have increasing benefits. But in this RPG there is no Hades, but the idea still sticks, and it was not done before, so enjoy adding that part in your Playstation exclusive RPG.

Yet it does not end there, houses is one part in ones life, the setting is what is added and it is important to be unique, or at least not as much as a copy of true originals as some others are. The houses are just the beginning, as we get into the game, the house itself will optionally be the giver of quests, which does not mean that all houses should be owned, you can at each time only own one and the quests will not come until the next generation is there (born in the house). There is also the stage where one third is some form of copy, so if there are 7 houses (random number), the 21 quests will be there, but 7 will optionally be a revisitation. It allows for replayability of a game, giving it a much larger stage to play, in all the game requires at least one replay as we have three generation and 5 arcane houses, and 5 mundane houses (still working on that), as such you cannot play them all in one play-through, as such there is the evolution of towns over three generations, so the game will be much larger, I had some sort of version in my initial view of Elder Scrolls VII: Restoration, but as they are now Microsoft, I can incorporate the few dozen ideas I had there to fit this RPG, so you have a lot more coming your way.

Consider a game with 5 main quest lines and dozens of side-quests. A station of consideration and in that river, we must make choices, if we listen to marketing we get the vile ‘This should be enough’ and ‘what if we copy that idea, it is easier to replicate’, and that is not false, but that is why the top 10 of best Ubisoft games are 1994 or older, that is 26 years ago. Personally that list is fine, but I would have places AC Origins in there at some point. Ghost Recon Breakpoint had 52%, Ghost Recon Wildlands 69%, games that should have been 85% plus games didn’t make it, why is that? A game that tries to appeal to all, will in fact please none. A lesson that Ubisoft never learned. And that is where I am not going, as such I am relying on a different course, to envision a different RPG that pleases all RPG lovers and if some want to take a leap there they are welcome. Yet some will not like it, they rely on racing games, FIFA and other games and they are welcome there, I wish them the best fun they can handle, and some are totally nuts about FIFA, I am more of an NHL player myself. We all have fantasies and mine is to be an NHL goalie (as sports go). So as I am taking a view on the mundane quests, the economic stage of the island, I want to set a larger stage of bartering, we al needs stuff and let’s face it, cola caps make for lousy food, so how to go about it? We can return to the age of Rome and get paid in salt, but I reckon that in most villages the need for hides and tools will outweigh the need for jewellery (but not always), so as I look into the stage of artisan quest lines I leave you with the thoughts I had. Do not consider out of the box thinking, throw that limitation overboard and make the consideration if my thought had to fit in a box, what shape would that box have?

It is just a thought to entertain.

Leave a comment

Filed under Gaming, IT

Somniare atque in posterum

It was a weird dream, even as nothing really weird seem to happen, the dream was weird. It was my first day at Sony, I was given a cubicle. A man spoke to me ‘We liked how you responded to your previous boss’, even as I have no idea who or what response they were talking about. There was a start package on what seemed to be my desk. There was a new watch in 4 parts. It seemed an almost identical fit to the Apple watch, but it was something we had to put together. There was the housing, the band, the battery and the electronics. It was an employee watch. The electronics were specific Sony, the rest generic. The watch kept us informed, seems to keep the company informed of our every action and it was the lifeline of the employee. A future I predicted in 2013, but not to this degree. Patents fuelled to generalisation, to set parts into a stage of some sort of jigsaw combining and partial usage made no difference, the patents caught it all. From mass produced straps (mine seemed like a transparent cheap looking plastic, but tough and resilient. The housing was a generic product, like it was made to fit a million users and the electronics were specific, it gave the Sony display, time, messages, internal (departmental) information. It is a future we are heading for, instant access and companies having instant access to us, it is not a Sony thing, it will be a global corporate thing. The question is not how it will happen, because it will, when it will happen is also not the question, the issue will son become, how complete will this digital transformation be? The introduction will be clear, the stage will be set, but I wonder how it reflects on us. I see generic housing’s to become almost a fashion statement, some will be smooth metallic, some will be titanium, some will be silver, or even gold but they will all house the generic watch given to us on day one. The corporate mobile tether that can reach us from 4G and beyond. 

A stage where managers can be contacted at home, a zoom conference from their Sony Bravia, all as the need of their global bosses require. A sort of time management per cycle, every cycle. 

I didn’t see much beyond that, but the setting threw me, not what was shown to me, but how casual I looked at the watch, like it was in use everywhere, a technology in a stage where it is the one corporate-employee link that all larger corporations rely on. A new stage of technology that we all accept, those who do not will not remain in any workforce for long. A set service that most corporations will rely on, the larger have their own solution, the others use a cloud based SAAS setting and in this day, with cloud transgressions set to 90%, the larger stage is not where we work, but how secure we can work. In all this, some technologies, the law and politics are running behind all the matter that is being hurdled against us. So whilst we are shown on how ‘New German IT law raises hurdles for Huawei’ to set the hurdle for one, but not the other we see “A key question with any cloud computing service is: “where is the data stored or processed?” It is a key question because location is not fixed in the cloud. Unlike a fixed server in your office or at a data centre in Australia, data in the cloud could potentially be located anywhere in the World and even in multiple data centres in multiple copies worldwide. In fact, a cloud service provider may not even know where the data is residing”, with a reference to “Some exceptions to this rule are provided, for instance, when the controller itself can guarantee that the recipient will comply with the data protection rules” and that is a larger stage where we see personal data in clouds where organised crime uses a system like their personal highway to information and the law doesn’t have a clue what to do to protect people, although they had time to figure out how to stop Huawei. Thi stage is about to explode in all our faces. Whilst we see marketing give the clarion call to ‘AI’, a stage that at present does not exist. The marketeers are feeding the legal minds in a stage that is disjointed. As I personally see it, the law is steered by the greed driven to stop some and clear their way to more profit, all whilst the changes will impact billions and no one is looking into the flaw that we ourselves create.And it is happening in a stage where Times Daily reports ‘Nokia to cut up to 10,000 jobs to ramp up R&D in 5G race’, an article (at https://www.timesdaily.com/business/nokia-to-cut-up-to-10-000-jobs-to-ramp-up-r-d-in-5g/article_5c02981a-a87e-5a02-8bcd-3efac378852f.html) that gives a larger premise. If you have to fire 10% of staff (10.000 jobs) to ramp up Research and development in 5G, how far behind are you?

All this, whilst Huawei is already far beyond that point, how desperate have people become? You need not accept my words, but the numbers by Statista shows that Saudi Arabia (one player that embraced the Huawei solution) is at present over 700% faster than the US, it is the number one 5G place to be, so how far behind will we all be in 2022? If the watches are seemingly the place to be, how many developers will divert to a place like Saudi Arabia to make that part a reality much quicker, all that whilst the EU and the US are nowhere near ready, so how long until others realise the bag of goods we are offered by those not able to deliver, will we hold THEM to account any day soon?

Leave a comment

Filed under IT, Science

In your face space

It happens, something is staring me right in the face and I lay it beside me. It happens, it happens to us all. This trip started in 1992 (I believe), at a consumer electronic show in Amsterdam (RAI) we got to see the first Mini Disc, the first thought I had that it would be a great digital system for computers, it was roughly 4% of a Bernoulli disk whilst being able to store 600% of what a Bernoulli could store. The idea was rejected by Sony, too incompatible they claimed, nowadays we know more, it would have been a great option, it would have pushed players like Apple to the limit 5 years ahead of the curve. Yesterday I was confronted with that thought as my DVD was acting up (the disc, not the player). Now consider the new players, the new way to watch TV. All whilst the telecom companies want you to use more and more bandwidth, the more they can harvest, the more dependent you get to become.

What if we take that away? Consider this Compact Flash, one card, not 26 discs, merely one card and it is not even the start, in a time and place where collections are complete book cases and we can replace it in almost all cases with one card per TV series. The fans have a perfect copy per card and there is still the option to upgrade over time, in the age where 4K will define new boundaries, the retail side also needs to adhere, a setting where we can drive innovation, not merely follow it. Battlestar Galactica, Smallville, Babylon 5, Teen Wolf, Games of Thrones, Harry Potter, Lord of the Rings, the Hobbit, Dexter, Midsomer Murders, the Star Wars saga and so on, one card per setting and the technology is already here to set the stage to a much larger degree to meet the customer beyond halfway, a customer that can watch their series in perfection, one card that can last a lifetime. I reckon that players will have larger settings, they have the space, open up any blue-ray or 4K player, most of it is space and adding a CF, or SD card reader (optionally both) is the easiest thing to do. Not walking back and forth to the player getting the next disc, merely one card and all seasons are there. Yes, newer series will likely go per season, but at present there are hundreds of series all well above a dozen discs, and the fans have needs, they want that card on their mobile, on the road and the card can take a lot more than any disc could, so what stopped a player like Sony? Another ‘too incompatible’ mention, or the fear of piracy? Piracy is already there, the disc allows for newer protection and even in store upgrades. Go to any store where you buy movies or TV-series, now consider a box (like GoT) and that box will be able to contain a dozen of your favourite series, now consider the space it is taking up and consider that one card could have all seasons and you keep it in your placer at all time, to be able to play it at your hearts content. So why is that solution not here now? Consider all the telecom players trying to be clever with their 5G, all whilst it is just not ready and do you really want your bandwidth to depend on your 5G router? Consider that IT Pro gave us a week ago “as they promote Kubernetes as the secret ingredient for closing the gap between 5G’s promises and 5G problems. Kubernetes does indeed have some potential to make 5G actually work well. That said, it’s not necessarily the holy grail of edge computing and telco networking that it is sometimes made out to be” (at https://www.itprotoday.com/hybrid-cloud/can-kubernetes-solve-5g-problems-partly-not-soon), there we are told “They make promises like “5G networks will one day offer peak data rates of up to 10 Gbps” and “5G’s hyper-fast speeds will revolutionise the way we live.” If you read statements like those carefully, you’ll notice that they’re predicated on theoretical future developments, not what 5G is actually delivering to the typical user today. That’s because, to date, 5G network implementations haven’t been all that impressive. They turn out to be slower than 4G in many cases, not to mention less reliable. 5G, in other words, has become “a bad joke.”” A setting I have been mentioning for close to two years and the joke gets to be worse, at present Saudi Arabia has a 5G network that is well over 700% faster than anything the US can offer, their BS marketing drive is that bad and it will get worse, as such do we want to rely on congestion, or do we want an option where we can watch what we love unhindered, optionally in a better setting than now? So whilst we take notice of “it won’t address all 5G problems, and it will take a long time–several years, most likely–before Kubernetes is a full-fledged 5G solution, which I predicted a few times in the last two years, I made no mention of Kubernetes, I merely observed the greed driven stupidity of some and watch these ships wreck left right and center. So whilst American politicians are blaming China for their own lack of innovation, I created the setting of a 7th device that can push innovation and change. And when we consider that innovation drives creativity, I wonder what someone else can come up with tomorrow, I already set the design of a new device for IOS and Android, that is how I roll. All whilst Microsoft is pushing Forza on your mobile, I came up with two new pieces of hardware, yup, I feel decently good, especially as we see Microsoft falter again and again and now it get to pull the wool over the eyes of Apple and Sony too (life can be satisfying). Did I figure out everything? No, I did not, but if I had done so I would make life for 1,000 researchers at Microsoft impossible and that is not fair either, oh wait, I really do not care about that, sorry!

All this in a day, so what is stoping these moguls of achieving true innovation? #JustAsking

Leave a comment

Filed under IT, movies, Science

Egg timer anyone?

It was a mere 12 hours ago when I gave the previous story, where the AP gave us “Attackers are finding it harder and harder to gain access via traditional methods, as vendors like Microsoft and Apple have hardened the security of the operating systems considerably over the last years”, yet less then an hour ago we see the BBC give us ‘European Banking Authority hit by Microsoft Exchange hack’, I am guessing that the AP was looking out for the needs of Microsoft, the timeline is too weird. Even as we see “The EU body said personal data may have been accessed from its servers. And it had pulled its entire email system offline while it assessed the damage. “The EBA is working to identify what, if any, data was accessed,” it said”, I wonder what and for how long was in the mix. You see, we might look at ““Everyone running these servers – government, private sector, academia – needs to act now to patch them,” White House press secretary Jan Psaki said. Microsoft believes a Chinese state-sponsored attacker called Hafnium is behind the hack.” No matter what or who Hafnium is, no one is looking towards Microsoft, no one is looking how the weakness was there in the first place. And if we accept ‘Microsoft believes a Chinese state-sponsored attacker called Hafnium is behind the hack’, the setting of time changes, it takes time to ascertain who did this, that is logical. Yet 12 hours after the AP story? This is direction, this is intent, the coincidences are too weird and I never give credence to coincidence. It is another setting of filtered information. First the Washington Post, then several others and now Associated Press, the stage is changing and some players are speculatively raking it in before it all implodes on itself. 

Yes, I admit and I agree that this is very ‘conspiracy theory’ yet consider the timeline, it is the one true linear path they cannot change, the directors can merely arrange their story according to the timeline, that is as good as they can make it. So when we look at the tweet from the NSC, we see “Patching and mitigation is not remediation if the servers have already been compromised”, yet there is a lack of investigation how for so long servers could be compromised, when one patch creates a new problem it is not a patch, but service level agreements and marketing need to report a patch and the problem remains, or optionally gets to be worse. Can we also optionally agree that if the Microsoft engineers can be circumvented Microsoft has a much larger problem and that is where you want to keep your data? When we see patch after patch, but no real solution, where can you put your faith?

The BBC article gives a nice list (at https://www.bbc.com/news/technology-56321567) on ‘Who has been attacked?’, yet the larger question on why Microsoft are leaking as a sieve is not dealt with, and even as we would like to guess, the fact is that there are too many patches, the setting is slowly becoming that Microsoft products are too unsecured to be considered for corporate needs and a shift to Unix/Linux might be essential to consider over time. Feel free to do it after you lost all your IP, but that is up to you. And in al this, how long has this be known? I cannot counter the accusations of that person named Hafnium, but it does imply that the situation was out there for a lot longer than we can be comfortable with. I leave that thought up to you.

Leave a comment

Filed under IT, Media, Science

The wide net

We all have the idea to go phishing, we want trout, we want salmon and we use the biggest net possible to get at least one. So when AP gave us ‘Casting a wide intrusion net: Dozens burned with single hack’ (at https://apnews.com/article/donald-trump-politics-europe-eastern-europe-new-zealand-f318ba1ffc971eb17371456b015206a5), not only was I not surprised, I had been warning people about this for a few years, that setting is apparently upon us now (or at least some are admitting it now). There we see “Nimble, highly skilled criminal hackers believed to operate out of Eastern Europe hacked dozens of companies and government agencies on at least four continents by breaking into a single product they all used” this does not surprise me, this happened in the late 80’s as well when someone used Aston Tate’s DB3 to introduce a virus, it is simple find something they all use and hamper its function, a basic strategy that an Italian (Julius Caesar) introduced 2000 years ago, there he hampered the roads and not servers but you get the idea, the classics still work.

When we are given “The Accellion casualties have kept piling up, meanwhile, with many being extorted by the Russian-speaking Clop cybercriminal gang, which threat researchers believe may have bought pilfered data from the hackers. Their threat: Pay up or we leak your sensitive data online, be it proprietary documents from Canadian aircraft maker Bombardier or lawyer-client communications from Jones Day.” It might seem rash but the people relied on others to keep their data safe and whilst we see more and more that they cannot contain the bacon the clients are suffering, this is not a simple station and we get it, but package solutions tend to come with flaws and that has been a truth for 20 years, so why are you all crying now? It is the final part that has more bearing “Members of Congress are already dismayed by the supply-chain hack of the Texas network management software company SolarWinds that allowed suspected Russian state-backed hackers to tiptoe unnoticed — apparently intent solely on intelligence-gathering — for more than half a year through the networks of at least nine government agencies and more than 100 companies and think tanks. Only in December was the SolarWinds hacking campaign discovered by the cybersecurity firm FireEye. France suffered a similar hack, blamed by its cybersecurity agency on Russian military operatives, that also gamed the supply chain. They slipped malware into an update of network management software from a firm called Centreon, letting them quietly root around victim networks from 2017 to 2020.” This is important because of what happened in the last two years, remember how ‘stupid’ American people started to blame Huawei for all the bad whilst offering absolutely no supporting evidence? Huawei does not need to bother to aid whichever government there was, silly software developers are doing that for them, we see an abundance of intrusion problems that include SolarWinds, Accellion and Cisco. A stage where thousands of systems are at risk, but no, the ‘silly’ people kept on blaming Huawei. Even I knew better and as Sony gave me the idea for an intrusion method called ‘Plus One’ (a viable way to drive the Pentagon nuts) with an alternative direction that I call ‘Vee One’, but that one has a few hiccups I reckon. Then I got creative and saw a new parameter in play. One that is based on a little part I read in a Cisco manual, the text “When You Add A Hard Disk To A Virtual Machine(VM), you can create a new virtual disk, add an existing virtual disk, or add a mapped Storage Area Network (SAN) Logical UnitNumber (LUN). In most cases, you can accept the default device node. For a hard-disk, a non default device node is useful to control the boot order or have different Small Computer System Interface (SCSI) controller types. For example, you might want to boot from an LSI Logic controller and use a Bus-logic Controller With bus sharing turned onto share a data disk with another VM.” You see that small text indicates that there is a nice workaround in Cisco CMX and it opens up a lot more than they bargained for, that in conjunction with the share issues thy were already facing gives out a whole new meaning to the phrase ‘Copy me I want to travel’, n’est pas? (for the French victims)

It is a much larger stage, most laws aren’t ready for this, prosecuting the guilty parties is close to impossible and any quick fix they make will only make things harder, the setting was and has for always been the makers of software, time constraints and lack of deep testing makes for a lousy solution and in most cases these players have a pushy marketing department (example: Ubisoft), and yes ‘You be soft!’ because the small tidbit that AP gives us with “Attackers are finding it harder and harder to gain access via traditional methods, as vendors like Microsoft and Apple have hardened the security of the operating systems considerably over the last years” yet it is a small stage and not a correct one. Weaknesses in Azure, issues with advertising in apps and a larger stage of programming, we see it clearest in .NET, but it goes way beyond that, for example “The problem of memory leaks is not uncommon in any technology. Simply put, the framework doesn’t release the memory that it no longer needs. .NET is frequently criticised for memory leaks and memory-related issues. Although .NET has a garbage collector for this sort of problem, engineers still have to invest additional efforts into proper resource management. And the leaks keep on growing as the application scales.” (source: Altexsoft) and it shows the smallest part, if there is a leak in one place, there will be in other places too and the leaks are not the real problem, getting it to semi-crash and taking over its right on a network are a quick way into any system, I saw the example with an accounting program (censored name), I got the program to crash (took about 20 seconds) and I ended up with the administrator rights to the entire mainframe from ANY location running that software. I get it, there will always be a bug in any place and the makers were quick to fix it, but for a few weeks there was an entrance point that took minimum efforts and that setting is only increasing with routers and cloud systems, these companies rely on marketeers that are ready to push for the investors sake and leave the client swimming in a swamp, I have seen it more than once and it will happen again, and this setting has been going on since 1989 and over the next 3-4 years it will grow to 150%, the push to billions and to quickly get to billions will be overwhelming for too many players all whilst the law will not be able to protect the victims, they will merely point at torts law, even though that you are the victim, most contracts are offered as an ‘as is’ solution and for the most software makers can avoid prosecution for the longest time, long enough for the hackers to get away with your data and sell it, what a lovely system you bought. Oh and before I forget, organised crime is way ahead of me, so for some it will already be too late.

Leave a comment

Filed under IT, Law, Media, Science

Science in art, deception through science

Just as I got past the first female night-horse (read: nightmare) I got into another one. I am not sure why, but for some reason it matters, in this there is a CIA wet work operative played by Graham McTavish, there is a spotter with him, he minds the listening system. They are watching a man seemingly talking to himself, but it is too much of a one sided conversation, the sniper (McTavish) changes the scope to thermal, now he sees a shimmer, one he had seen before, it was digital cloaking. He signals the spotter, who starts changing the dials on a small box and after several seconds he nods, he listens. He says ‘the other person is whispering Greek’, and he listens, they are looking at an almost surreal setting, it is almost 30 seconds until the spotter states ‘I cannot be here’ McTavish looks around, the man is absolutely pale with fear “I cannot be here” he states again, puts his sidearms in his mouth and pulls the trigger. The sniper gets out fast, they were both using suppressors, as such there was too little sound to set the alarm off. He grabs all the gear and he gets out as quickly a possible, all whilst sending the alert signal.

The scene was weird, I do not remember seeing it on TV or in the movies, but it got me thinking on communication, and soon thereafter encryption, do not ask why, I have no idea, but the slithers of one, connected to the idea of another. To show this here is an image

As you can see, it is in foundation a sudoku setting, an 81 figure number (nine times nine), yet the stage is to some degree predictable, every number used once, per square and no number the same in a row or column, even as there are only nine combinations, there is a larger stage for encryption systems to work on, but what if we look at killer sudoku?

As you see in the image, the stage becomes a little different, we get a combination of puzzles and it is that combination that could give reality to a new encryption method. A stage where the sudoku itself is merely part of the puzzle, it is the other part that gets us the encryption. Is it a 2H box, a 2V box and so on, but in that stage it becomes a lot harder to figure out the numbers. The shapes can be anything, a letter, numbers, any combination. The numbers are numbers but there are ways to encrypting that too, and as every level is larger the computer undoing the cypher will take more and more time, all whilst there is an optional setting to reset that setting, a solution in apps that makes any high end encrypted system a much larger option for diplomatic staff to keep encrypted data with them, without them knowing what they are carrying, or anyone for that matter. If they are not part of it, they are merely the vessel that the channel carries.

Or in humorous terms (an ode to Danny Kaye) “The pellet with the poison’s in the vessel with the pestle; the chalice from the palace has the brew that is true!”, as such the issue is not the servant, that person has no idea what they are carrying, a new stage where 2-3 apps set a larger stage and with the security out of the way (thanks to Microsoft and Epic) anyone can be a courier. Yes, when you (optionally) saw ‘Microsoft sides with Epic in its fight with Apple, promises a more open MS Store’ with the text “Microsoft filed a declaration in support of Epic’s request for an injunction against Apple’s plan to remove its access to iOS development tools. The company said in the filing that the Unreal Engine is “critical technology for numerous game creators,” and that taking away Epic’s ability to support it on iOS and MacOS devices “will harm game creators and gamers.”” Most people do not see the larger picture, all this was merely a way for Epic to shun its duties, duties that allow smaller players to avoid larger costs, yet once greed sets in there is a larger stage and they paved the way for organised crime to take much larger steps for people to be tempted to quick cash only to learn at a much larger stage that they became mules. It is that stage that also allows for a new encryption systems, with people having 1-2 apps, that the person with the third app will be able to capture what they need, sometimes it will be with the persons consent, but not always, and that is where we are at. The rich taking what they want and not wanting to be held responsible, no matter what damage they are at the head of, what a world we live in, it seems that my nightmares are a much more pleasant place to be soon enough.

Leave a comment

Filed under IT, Military, Science

A repetition of events

This is speculative, this is my view on the matter and it might be very very wrong, yet I see events take place and I have seen it all before, this is not a first. It has happened and it will happen again yet to be true I never expected Apple to be part of that equation. No matter how we consider the stage, no matter how we thing it will be alright. As I personally see it, it will not.

My insight started well over 30 years ago with a Dutch Company called ‘Infotheek’, an IT company when IT was a mere myth, it was rising and in that air it started to believe its own marketing. I saw some service person air anecdote after anecdote but never really managing anything, merely pushing the expectations of its boss unto the staff member on his watch and anyone not meeting presented and assumed expectations, that person was done away. They started buying companies and keeping the few stars that a company had and the rest, you guessed it, over time they were done away. It was slow enough not to raise flags, but the centre core was that they were purchasing revenue. I saw a pretty amazing sales star walking away from that. Even if I never realised it at the time, his name was Oscar, he had a sales routine and a calculator and he was doing tricks with the calculator and he was good, he really was. I never understood him, all I saw was some slick suited person with expensive sunglasses, but I was in services and happy to be there giving technical support. It was the golden age of Tulip Computers and I was aiding those users. Yet I saw Infotheek buying company after company, I saw people go faster and faster and it was my first view on ‘buying revenue’ but there were more later, when it became more common ground. These thoughts went through my mind as I took notice of ‘Apple buys a company every three to four weeks’ (source: BBC). The stage is similar, the problem is what path are they taking? Are they buying revenue “Apple recently delivered its largest quarter by revenue of all time, bringing in $111.4bn (£78.7bn) in the first-quarter of its fiscal year 2021”? Or perhaps it is a stage here they are accumulating cost to lower tax brackets? Are they merely looking for a cheap way to get the real jewels in a company, get the revenue and do away the rest? In this we need to consider the number one part, they are not doing anything illegal, yet the stage remains that the bought companies have a population of X, when within 2 years the population goes to X-45%, and when you see that this involves 100 companies, how many people will become unemployed? Even if we see “Most often, Apple buys smaller technology firms and then incorporates their innovations into its own products” we see a half truth, it is not the whole story. Yes, we accept that sometimes it is straight revenue like “Apple’s largest acquisition in the last decade was its $3bn purchase of Beats Electronics, the headphone maker founded by rapper and producer Dr Dre” and there is nothing wrong with that, but there is a larger risk that some people lose the foresight (or is that hindsight) that the Apple egg becomes like an actual egg, a hard outer exterior, but behind that it is space, empty space, not all of it is the joke (sorry read yoke) of the matter. A larger stage and in this case not some presented larger Dutch IT firm, but an actual behemoth that I set somewhere between $1,000,000,000 and $1,500,000,000 when that comes crashing down what will the impact be? And any firm that I in the stage of buying revenue is always heading for disaster and when it becomes someone buying another firm almost every month for 6 years that crash is close to a given.

You see, on paper it all looks nice, but incorporating new companies, re-schooling staff, educating staff on a new set of ideologies is a much larger task and the stage is alway in motion, the stage of confirming and checking whether the new people are on track of becoming images of the old people is a setting that takes time and when you buy a company every month the pyramid becomes unstable a lot faster than anyone realises and when that happens, good luck with finding support and services to your Apple product. In this there is one given, the sales people tend to forget about the services required and when they learn that their sales pipeline is stuffed because they forgot to give trust the larger stage of corporate valour it all goes pear shape rather fast.

In this I am speculating on the past, perhaps Apple will be fine. Perhaps I am all wrong and my experience does not count. So basically I could be wrong, however GeekWire gives us ‘Chromebooks outsold Macs worldwide in 2020, cutting into Windows market share’ (at https://www.geekwire.com/2021/chromebooks-outsold-macs-worldwide-2020-cutting-windows-market-share/) a week ago. This does not mean that I am suddenly right. A 6 year tactic is not the stage that is seen in one article over one year that is optionally the weirdest year of the century. 

One does not imply the other but we need to take notice of both, especially in a stage where the 5G future is more and more likely to be a cloud based one and we cannot deny that the Chromebook is a pure cloud based solution. It is up to us all but when we consider that we need to realise that we too are wage slaves and service slaves and whatever hinders or threatens us will threaten all, a small truth that goes back to the age of Gaius Julius Caesar and for those who remember his name from the history books as a politician and a ruler, he was a general first, so he knows a few things, come to think of it, he set in motion some of the tactics that are till used 2 millennia later, all set before he became Dictator Perpetuo, think of that before we dismiss all of the facts and in this there are more facts, some are hidden in the story, it will be your puzzle of the day. In this I give you one small clue ‘Is Iteration in similarity the same as iteration and does that warrant consideration of the title iteration?

Have a great day!

Leave a comment

Filed under Finance, IT

The stage moves on

Yes, today I got the news I was happy about. There was of course the news on Diablo IV coming. But the one bit of news I did not know about hit me about 56.3 minutes ago (roughly). Diablo 2 will be coming to us in a remastered version, as such is there something like too much Diablo? And even as it makes me happy, it shows that some are in a larger stage to resurrect the great old games in a new jacket. I have been stating this for almost a year, and now as Diablo 2, Mass Effect 1, 2 and 3 are coming, the good old days of gaming is coming back. There are always reservations, in the stage where we live Mass Effect for years, we will be faced with a game where we go through the motions, yet there are hundred of thousand of gamers who missed out on that and for them I am happy. This stage is not the same for Diablo 2, yes the story is clear but the game was a lot more than the story and that will still satisfy. Even as some wasted time on a relaunch of Bullfrog games, the good games could still be coming. There is Nightdive Studios who is working on System Shock and there are a few others that will bring good gaming back to systems and consoles. It is all the stage and with the $138 billion projected for gaming this year alone. Everyone wants a slice of that pie and some will not care how they get it. 

Even as we all applaud the effort and the choices, we are still in a holding pattern on the games that will redefine gaming on the next generation of consoles. Some are hoping that Ratchet and Clank will bring it this June, most are eagerly awaiting Horizon Forbidden West to bring the goods.  Others are expecting that God of war, who redefined what the PS4 could achieve will see a similar setting when God of War: Ragnarok hits the PS5. A few (like me) hope that Gotham Knights will bring the cheese to the mouse, we are all victims of our own needs and Batman is my obsession, it has been since I was a little fellow staring at Adam West and Burt Ward, it took a while for my mind to grasp special effects, but that was life in innocence, or as some members of the Dark Brotherhood would state ‘it’s life’s greatest illusion’, we can offer no choice, the door was right. And as we accept that illusion we look towards the games that are still to come. 

I am not going to add links to all these great teasers, trailers and spoilers, because in my mind they tend to be all spoilers. Whenever it is a video that does not come from the actual makers, I tend to avoid it, merely for the dangers of seeing or hearing too much. Just like someone stating that in God of War: Ragnarok you will have to find armour 42 made by the smith Anthonius Stark (don’t worry, I made that up myself right now), we all have our ideas on teasers and real parts, even as I hope that Bethesda will add two achievements to their new Elder Scrolls game it will not be a teaser or spoiler towards the actual game. The first one is ‘You stole someone’s sweat-roll’ the other one is ‘He took an arrow to his knee’, those who played Skyrim will know what that is about and optionally giggle for a moment. 

There are dozens of examples and most gamers have their own thoughts on the passing of time whilst gaming. For me it is creation, it is what made me design The Elder Scrolls VII: Restoration (was 6, now 7). I did this in 2013, almost a year after finishing the game on Xbox 360 and PS3. We all have our ways of dealing with time and it seems that stories and creation are mine. So as I look and re-evaluate the stage of almost 5 seasons of Keno Diastima, I need to consider if 5 seasons are optional 3 seasons, a season with more bang for the buck, that is of-course one path. I am still considering on rewriting ‘How to assassinate a politician’, we all need hobbies, don’t we?

It also keeps my mind of my 5G IP, which is now in a wait state, a setting that is not good for the nerves, let me tell you, as such recreating the works I do have is not the worst way to pass the time. Some might consider that the stage is moving on, I merely consider that the stage was never standing still and you either keep up or you are part of those left behind, no matter whether the stage is one you devised yourself or one that others placed in front of you. As such some will point at DARPA with their disruptioneering division. I say hire a politician, they are experts in “have the potential to disrupt current understanding and/or approaches”, their input have had drastic influence in the stage for both the Lockheed Martin F-35 Lightning II as well as the USS Zumwalt, and I say (oversimplifying the problem whenever I can) disruptioneering achieved.

The stage moves on, but it is us that defines the stage, not others, others only define the stage when they invite us to it and we are willing to be the tool (read: participant) of the stage we want to be on for either money, fame, continuity or passing the time.

1 Comment

Filed under Gaming, IT, Military, Politics

It’s good to be evil

It is the the phase that gave life and fame to Dungeon Keeper 2, it was not used by the first game that was released in 1997, but the fame of the first game was not less, it was a time when games were still in its infancy and good ideas were wasted all over the place. Both the first and second dungeon keeper were amazing games, as was an earlier release by Bullfrog named Magic Carpet. Still the IP was used later on by EA to set Dungeon Keeper in a stage of micro transactions and there EA screwed up the IP for life. A stage set to ‘maximise’ earnings became the downfall of EA. Yet the original games are still revered by a lot of people, as such wouldn’t it be nice if EA cleaned up its act? In the last week we got ‘EA now owns Codemasters and its many, many racing games’, ‘Here’s why Glu is an excellent strategic fit for EA’, as well as ‘The Silence After EA’s Anthem 2.0 Decision is Concerning’, you see Glu could be a good buy, yet in all this it only sets out the stage if there is an option to get a return on investment towards the $2,100,000,000 spend on this. The investigation (at https://www.gamesindustry.biz/articles/2021-02-22-heres-why-glu-is-an-excellent-strategic-fit-for-ea) is quite good. It shows a part that I never considered and that does not matter, yet what is important is “The acquisition helps EA address a weakness by acquiring a suite of high-grossing titles that are very female-friendly and have large, loyal audiences. Plus, Glu’s expertise with these genres means that EA is gaining a lot more knowledge and insight into this demographic, which we expect will translate into enhancements for future Sims games.” It is important, because we see an element that is mostly ignored “have large, loyal audiences” is nice, but only if you treat them right and that is where EA loses the wheels on their wagons, not once, but multiple times. As I see it greed driven executives tend to destroy signs of loyalty. And there the shoe becomes a larger stage of concern. You see we can accept that we can either do right by loyalty or create it, the first tends to be easy, muzzle the greed driven executive is a first, creating it requires the greed driven executive to leave the room permanently and EA does not seem to be able to do this. 

In this, there are a few options, consider the stage we saw when we were offered Magic Carpet. So what happens when that game is relaunched in an upgraded version, one that would play wildly on a Nintendo Switch. Elements of the game can remain in place but the game needs alteration as to not infringe on the IP of Bullfrog (now EA), I feel justified as EA ignored it old IP for well over a decade and the ones they did not ignore was clobbered towards the stone age. 

As such Magic Carpet could be a much larger sandbox game. A map of Iraq extending to the Mediterranean Sea, with parts of Saudi Arabia and Iran. A stage where the power of your castle and the magic carpet comes from growth, a stage where we can learn new tricks and new abilities are found all over the map. You see the old systems could never do this, the computers were not powerful enough, but the Switch might make a new setting true, its controllers will have one for movement, one for fighting. A stage grown to the new systems. As such we can grow the fortress, and as abilities are acquired we can do more, go further and unlock more. As such the game takes a rather new turn.

The same can be done with Dungeon keeper, but that will have to take a massive adjustment, the stage of Dungeon keeper is too set. Still the idea was awesome. Consider the stage of Silent Hill, but now you are not the player, you are pyramid head, a stage where we consider the games were you play the antagonist. Pyramid Head is one of the more famous ones, yet consider that station with the man Dirk Garthwaite who became wrecker (a Marvel character), what if we can reshape such a person to our personal taste? We are all getting overwhelmed with the Norse gods through TV series and games, yet that same setting might come from Greek, Egyptian, Hindu, Inca or Aztec deities. All options to consider in the stage of making a game, yet how many still embrace the good old slogan ‘It’s good to be evil’?

I am asking because some sources give us ‘Global game revenue to reach $29bn by 2021’, all whilst a country like Australia only set their notch on $140 million, which amounts to 0.4%, not a lot to write home about is it? If loyalty is indeed key and when we see EA (and a few others) bungle the cake, how come they still end up with a large slice of that pie? As I see it, it should be relatively easy to take it from them with a better product and a better product is key in gaining loyalty. EA might have paid $2.1 billion for that database, but that will not stop competitors Nintendo and optionally Amazon to take over that cake. These two players are driven to loyalty and they can have it if they play their cards right. 

Leave a comment

Filed under Gaming, IT