Categories
Internet

The Ultimate Human Supercomputer

For most of my life there’s been a list known as the TOP500. The list of the fastest computers in the world. The fastest today is K computer, built by Fujitsu. We refer to them as “computers”, but in reality they are large rooms filled with servers that operate in coordination with one and other to solve a problem. They are individual nodes that work together.

I think this ranking is becoming increasingly irrelevant. Peak Tflops isn’t necessarily what matters anymore in terms of solving problems. I propose that the internet itself is the fastest and most powerful computer in terms of it’s ability to solve complicated problems. We haven’t figured out how to fully utilize it, we don’t even know it’s capacity or how to optimize it yet. But we know it has amazing potential already.

A photographer during the Vancouver riots (loosing in hockey is a real first world problem isn’t it?) photographed an anonymous kissing couple. In less than 24hrs they were identified. Someone requested help identifying the source of some amazing Nazi era photographs on a Tuesday morning. By Tuesday evening the photographer and the back story were coming into focus. There are no algorithms for these problems.

Things like tagging photos, status updates, tweets, wiki’s, and the ability to index, search, sort them in near real-time is at it’s infancy. We’ve barely got the technology to handle data at this magnitude, much less optimize, and realize it’s full potential. Already it can solve things that you can’t brute force using a supercomputer. At some point we’ll be able to question this “machine” and it will know who most likely would know and who shouldn’t be bothered even seeing the question. This isn’t artificial intelligence, this is computer network assisted human intelligence collaboration.

The internet likely won’t solve π to a trillion places anytime soon, if ever. We’ll leave that dull task to a “simplistic” supercomputer. But it’s important to not underestimate the power of the collective human brain. It’s already able to solve very obscure and complicated questions with ease and can be used without a degree in computer science. It’s only 2011. Just 10 years ago we couldn’t solve the above questions nearly as quickly, or perhaps at all if the person(s) with an answer wasn’t online. Imagine what 2021 will bring.

Categories
In The News Internet

The Web As We Know It Is Being Threatened

From Scientific American:

The Web as we know it, however, is being threatened in different ways. Some of its most successful inhabitants have begun to chip away at its principles. Large social-networking sites are walling off information posted by their users from the rest of the Web. Wireless Internet providers are being tempted to slow traffic to sites with which they have not made deals. Governments—totalitarian and democratic alike—are monitoring people’s online habits, endangering important human rights.

If we, the Web’s users, allow these and other trends to proceed unchecked, the Web could be broken into fragmented islands. We could lose the freedom to connect with whichever Web sites we want. The ill effects could extend to smartphones and pads, which are also portals to the extensive information that the Web provides.

– Tim Berners-Lee

The same web we credit with promoting freedom and taking down dictatorships is under attack itself. Will the web in 10 years still have the power to shift political power?

Tim Berners-Lee may know a thing or two about the web.

Categories
Internet Networking

$7.5M For 666,624 IPv4 Addresses

I’ve mentioned the pending IPv4 shortage before. The latest news is Nortel Networks IPv4 block being sold:

Nortel Networks Corp. is doing its bit to alleviate the Internet space crunch, selling 666,624 IP addresses to Microsoft Corp. for $7.5 million.

So cost per IP address is:

$7.5 M / 666,624 = $11.25

$7.5 M sounds higher than it really is. To put this in perspective, a typical web host leases dedicated IP’s for customers who want an IP rather than name based hosting. This is necessary for things like SSL certificates. They will typically charge $1-2/month per IP address meaning they make anywhere from $12-$24/yearly revenue per IP. When you look at it that way, $11.25 really doesn’t seem that outrageous. It’s a decent investment considering an IPv4 address will be normal for at least another 2-4 years (likely more).

Microsoft has played in the business services role in many respects from webmail to hosting (I think that’s now part of Office Live). As they ramp up their cloud offering they will need to offer IPv4 compatible SSL services on customer domains. I think this will pay off pretty quickly.

However, I don’t think we’ll see to many IPv4 purchases like this, the market is still somewhat limited in my opinion.

Categories
Internet Networking

Final IPv4 Unicast Address Allocations

For better or worse this really is a momentous moment for the internet. The full letter from the IETF Chair is as follows (copied for posterity):

You have probably already heard the news, but just to make sure no one is left out of the loop, I am posting this note.

The last five /8 IPv4 address blocks were assigned today.

Two /8s were recently allocated to APNIC, which triggered the implementation of the Exhaustion Phase set out in the Global Policy for the Allocation of the Remaining IPv4 Address Space. Today in Miami, Florida in a very nice ceremony, this policy was implemented, and each RIR received one of the final /8 address blocks. As of now, there are no more unallocated IPv4 unicast /8s in the IANA pool. The current status of the IPv4 address space can be seen in the IANA IPv4 Address Space Registry at:

http://www.iana.org/assignments/ipv4-address-space/ipv4-address-space.xhtml

We have all known that this day was coming for a long time. In preparation, the IETF developed IPv6. IPv6 is ready, and it has been ready for a long time. This milestone simply increases the urgency for IPv6 deployment. The explosive growth of the Internet can only continue with the bigger address space offered by IPv6.

The depletion of the IANA IPv4 address pool is not a crisis. Next week the Internet will not be significantly different that it was a week ago. There will not be any notable short-term effects caused by the empty IANA IPv4 address pool.

There is no crisis, but there is a need for action so that the Internet can continue to grow. The transition to IPv6 requires the attention of many actors. However, our parents, spouses, and children will be largely unaware of the transition. They will continue to be amazed of the endless possibilities offered by the growing Internet. For them, this milestone will remain insignificant.

To the universal deployment of IPv6,
Russ

Who knew we’d eventually run out (Vint Cerf says himself he never imagined how much would be needed). It’s crazy when you think about it. It’s important however to remember however that the distribution is hardly efficient and lots of companies own way more IPv4 space than they will ever actually use.

I’ve pretty much gotten through my software stack IPv6 wise, but have yet to begun network and configuration to support it. Hopefully soon enough I’ll have everything running dual stack.

Categories
Internet Networking

Undersea Cable Map

Undersea Cable Map

Cable Map is an awesome website that shows known under sea cables on an interactive map (powered by Bing). It shows that there are actually many under sea cables. I mentioned a few months ago that most intercontinental data travels through undersea cables.

I should note that the locations on the map are approximate for security reasons. Because their damage could cost millions and disrupt worldwide communications only their operators and select contractors know where they actually come ashore.

The image above links to a big static version of the map just in case the site someday goes dark.

Categories
Internet Mozilla Security

Protecting Photo Privacy Via Browsers

Browsers can do more to protect users from inadvertently violating their own privacy. The NY Times today had an article about a topic that has been discussed in various circles several times now. The existence of geotagging data in photos. Many cameras, in particular smart phones like the iPhone can tag photos with GPS data. This is pretty handy for various purposes including organizing photos at a later date, iPhoto for example does a pretty nice job of it. Most photo applications however don’t make this information very visible, as a result many users don’t even know it exists, others simply forget.

What the problem looks like

The data, embedded in a photo looks something like this:

GPSLatitude                    : 57.64911
GPSLongitude                   : 10.40744
GPSPosition                    : 57.64911 10.40744

Which I could map.

Proposal

I propose that browsers need to have a content policy for when users upload images that can better protect them from uploading information they may not even realize. Here’s what I’m imagining:

The first time a user attempts to upload a photo that has EXIF or XMP data containing location they are prompted if they want it stripped from the image they are uploading. The original file remains unharmed, just the uploaded version won’t have the data. They can also choose to have the browser remember their preference to prevent being prompted in the future. They can revise their choice in the preferences window later if they want. This isn’t to different from how popups are handled. I thnk that per-site policy might be too confusing and not warranted, but perhaps I’m wrong.

Warning users about hidden information they may be revealing is a worthwhile effort. It’s only a matter of time before someone uses a “contest” or some other form of social engineering to solicit pictures that may reveal location data for users. Evildoers always find creative ways to exploit people.

Caveat

There are a notable caveat to this approach. The most notable is that flash uploaders would bypass this security measure though individual uploaders could do it themselves, or Adobe could do it, but I don’t think that’s enough of a turnoff to this approach. The same caveat applied to “private browsing” in browsers.

Prior Work

As far as I know no browser actually implements a security feature like this yet. There are a few Firefox Add-ons like Exif Viewer and FxIF (both written in pure JavaScript) that look at EXIF data but nothing that intercepts uploads.

Who Can Do It First?

I’m curious who can do it first. By add-on (seems like it should be possible at least in Firefox), and dare I say include in a browser itself? If this were earlier in the year I would have added this to the Summer of Code ideas list. Instead I’m just throwing it into the wind until 2011 rolls around.

Categories
In The News Internet

The Myth Of The “Internet Generation”

I’m glad to see more evidence dispelling the myth that there is a generation that is so tuned into the Internet they put others to shame. There’s no such thing as “digital natives” or an “Internet generation”. There were no “automotive natives”, “electric natives”, “movable type natives”, or any other “[insert technical revolution] natives” in human history.

I do suspect the results will be slightly different in the US where social and cultural differences tend to result in more online usage and less social interaction than in Europe, but that is still immaterial.

The idea that any skills can become almost innate is silly at best. Growing up with something doesn’t make you more functional with it. Human language is a very specialized skill. Equating language to using a search engine, managing files on your computer is hardly sensible. Language is so specialized science suggests there are parts of our brain that have evolved specifically for language. By contrast we don’t have a part of our brain for computer or internet skills.

From the article:

More surprising yet, these supposedly gifted netizens are not even particularly adept at getting the most out of the Internet. “They can play around,” says Rolf Schulmeister, an educational researcher from Hamburg who specializes in the use of digital media in the classroom. “They know how to start up programs, and they know where to get music and films. But only a minority is really good at using it.”

It’s not really surprising. People learn to do what the need and want to do. They also know how to shop in stores, and watch movies in theaters. That doesn’t mean they know how to produce products and movies. They don’t even become experts in products they buy or movies they watch. They became consumers over a new medium and nothing more. They couldn’t tell you what format the YouTube video they watched is in, and they likely don’t know what format it’s in at the theater either. They don’t know the technology behind their favorite websites, and they don’t know what goes into running a store. They just consume. That’s what consumers do.

A special segment with an interest in it will specialize in it and learn. Those people generally become Computer Science majors. Others will choose things like medicine, geology, marketing, economics and basket weaving to gain a thorough understanding of and eventually use for gainful employment. None of these fields had “natives” either despite having their own renaissance periods.

So lets stop with this “Internet Generation” stuff.

Categories
Internet Security

DNSSEC Root Key

Bruce Schneier pointed out that DNSSEC root key has been divided among seven people for security:

Part of ICANN’s security scheme is the Domain Name System Security, a security protocol that ensures Web sites are registered and “signed” (this is the security measure built into the Web that ensures when you go to a URL you arrive at a real site and not an identical pirate site). Most major servers are a part of DNSSEC, as it’s known, and during a major international attack, the system might sever connections between important servers to contain the damage.

A minimum of five of the seven keyholders – one each from Britain, the U.S., Burkina Faso, Trinidad and Tobago, Canada, China, and the Czech Republic – would have to converge at a U.S. base with their keys to restart the system and connect eveything once again.

Based on this key signing video it looks like they are using smart cards and an AEP Keyper HSM for this critical task. Schneier suspects it implements the Shamir’s Secret Sharing algorithm.

Considering how much our economy and our lives rely on the Internet these days, DNS is becoming a more and more critical part of our society. This is a very big event. No precaution is too great to ensure security of such critical infrastructure.

Categories
Internet Networking

Internet Under The Sea

Most people these days seem to insist that all telecom (phone, internet in particular) go overseas by way of satellites. This however is far from the truth. There are actually many trans-oceanic cables and they provide most of the capacity. Mail Online has a great article about what goes into keeping the continents connected.

It’s a whole secret industry, partly for security reasons who in a low-key way keep critical communication between entire continents moving. Most people aren’t even looking at the water, they look up at the sky.

Categories
Around The Web Internet Open Source

Developing A Thick Skin Is Bullshit

From Sarah Lacy’s TechCrunch post Conan O’Brien’s Love/Hate Relationship with the Internet is a very interesting insight from Coco:

O’Brien said the biggest thing that held him back from both writing and performing was a fear of being criticized because he’s incredibly sensitive. He punched a big hole in one of the biggest clichés in fame—that you just have to develop a thick skin. He says he’s still just as sensitive and criticism still hurts just as much. The secret is to just keep going anyway, because you will get criticized no matter how brilliant you are.

This is clearly something that’s gotten more pronounced in a Web age, but there may be a silver lining to that. In a time when every video, photo, blog post and Tweet can easily be trashed by others, people learn that criticism is inevitable early on.

The sensitivity to criticism I suspect is a motivator to O’Brien himself and I’m certain to others. It’s hard for it to not have an impact, even on the most jaded of individuals.

I think that has become true for anyone in any industry, not just night show hosts. To quote a movie title “We Live In Public” thanks largely to the Internet.

I learned long ago to take criticism and praise with a grain of salt. Neither are always genuine or accurate, especially on the Internet. Anonymity does make people more aggressive, but it also sometimes makes them more honest. Most people have a hard time giving criticism to you’re face even when asked to do so. It’s almost too easy when you can type it from a distance. Praise can have many false motivators that can often be hard to detect online.

It’s never “fun” to get a really nasty or critical blog comment, email, article, blog post written etc. about you or something you’ve done. This is especially true if you’ve dedicated a lot of time and effort. Regardless at some point you need to ask yourself: Is there any truth to this? Can I do something better? Once you’ve done that, it’s time to move on and plow forward. You won’t always be able to learn something, but that’s OK.

From my experience being a web developer, writing code that’s open source, and blogging means you’re going to get feedback, welcome or not. With certainty 100% of it will not be positive. Some will be negative, some will just be vile. Some however will be constructive. It’s to your advantage to use it.

Criticism and debate are a critical part of academia. Given programming’s still strong ties to academia, perhaps more so than many other industries may be why it seems so natural to accept for me and at least some of my peers. It’s like being graded in school. Or perhaps it’s because I started at about 14 or 15 years old as a developer. I got used to this sort of thing pretty early on during my formative teen years and it’s more natural for me. I guess I’m not really a true part of the trophy kids generation despite falling into the age group.