Weblog on the Internet and public policy, journalism, virtual community, and more from David Brake, a Canadian academic, consultant and journalist

Archive for the 'Tech Policy Issues' Category | back to home

16 May 2007

Just for a change neither of them have to do with terrorism. Eszter brought to my attention a feature in Popular Photography (US) about parents whose innocent (to them) pictures of their children were treated as suspicious by photo developers and resulted in their being criminally prosecuted. You can read the self-published story of a grandmother who fell foul of this culture of suspicion here.

The other story I heard on the radio this morning (listen to it here). Because (it seems) of arrest targets UK police have, a 13 year old child who shoplifted a single roll of candy worth around 40p was taken to the police station, cautioned, fingerprinted and had his DNA taken and stored.

I am not too worried about building up a DNA database per se but I am a little concerned that the fact that someone’s DNA turns up in the database could be taken by future employers or others as evidence of criminality itself, if one day it were to become public.

27 November 2006

The exemplary chaps at MySociety.org, a group of mostly volunteer developers producing e-democracy-related web apps has managed to get the prime minister to support (or at least host) an online petition system (see BBC news coverage). Among the petitions launched so far is one which asks him not to replace the Trident nuclear weapons system. I encourage you to sign it – though note that these petitions are for UK residents only.

I oppose the replacement of Trident both on economic grounds and in the interests of encouraging others to abandon their own nuclear arsenals. Nation states who would use nukes against us would surely be deterred by the US and the international consequences of their use, while terrorists are not deterred by nuclear weapons and couldn’t in any case be targetted by them.

It seems to me that this decision comes at a crucial point in history where by deciding to turn away from nuclear weapons we could help turn the rest of the world in a new direction (and save billions that could be used to tackle important issues like climate change).

If you have some more time after signing that petition, please also sign this petition asking for a free vote and a full debate in parliament or visit The Big Trident Debate which has its own similar petition and discussion spaces.

11 November 2006

Thanks to a house move I have been trapped on dialup at home – at least for the next week or so – and I have been reminded about just how painful using the Internet is when you have to do it at less than 10Kb/s. All Internet users are definitely not equal in their ability to get things done. It has taken me 20 minutes just to check my email and read a minimal number of pages very slowly. By contrast once my broadband is installed, £5/$10 a month will get me a scorching fast (up to) 8Mbps (because it is bundled with my satellite TV). I can hardly wait!

13 September 2006

Just found out that the reason my wife’s PC wouldn’t connect to the Internet is that I had entered the WEP password wrongly. But Intel’s software reported a good connection to my router! Would it have been so hard to code in a “physical connection good but password is wrong please try again” dialog box? Billions of blue blistering barnacles!

Later And to compound the annoyance, I nearly thought my connection had broken again but then I realised that if you fix the password on one user account it doesn’t fix it on any of the others. Mightn’t it be a good idea to allow administrators to change all the passwords for wireless access to a given point at the same time?

29 August 2006

After spending much time with a friendly but unable-to-help Dell technician I seem to have figured out the problem with my wife’s laptop myself (or at least found a way around it). It seems that for some reason her wireless driver crashes the whole system when trying to handle WPA encryption but it can handle WEP encryption fine. So we’re using that now. Not too elegant, but if it works don’t mess with it as I said earlier!

26 August 2006

I just finished writing this post on the LSE group weblog which looks at the low number of Wikipedians editing non-English language articles and the dangers this presents to the credibility of Wikipedia (such as it is). I also tied it in with the recent announcement that the OLPC consortium would be bundling selected Wikipedia articles with its $100 laptops. Take a look at it and see what you think. Have a look at some of the other recent articles there too for that matter – most of them are also written by me (I will start adding bylines from now on).

6 June 2006
Filed under:Email discoveries,Spam at9:08 am

It turns out that if you have a GMail address named johndoe@gmail.com, email to johndoe+amazon@gmail.com and johndoe+ebay@gmail.com will also reach you. So follow these directions and you can see whether and by whom your gmail email has been sold on to spammers. If it has been you can simply create a filter that removes any email sent to the new johndoe+ebay@gmail.com address. Of course smart spammers would remove the + part by hand. Also note that a large-ish proportion of email signup forms don’t let you use an address with a “+” in it.

P.S. You may not know that Gmail also (at last!) allows you to create groups in your contacts lists like every other email application in existence (ie you can set up “friends” as an address in your gmail book which sends to John Doe and Jane Doe). It took them far too long to implement this feature…

11 May 2006

David Tebbutt, an old friend, posts hopefully that ‘social software’ (wikis, blogs etc) could reduce the amount of ‘occupational spam’* we get. Alas, groupware apps like Lotus Notes and intranet messageboards were also supposed to free us from corporate email spam and in theory they could. But simply introducing the software is only the beginning. The main problems are organizational and psychological. 1) it is much harder to change people’s habits than it is to add a bit of software 2) for better or worse people feel an email to someone will at least get glanced at while other means of electronic communication (internal wikis etc) because they are not “pushed” may never get looked at and 3) having lots of communication options can lead to confusion. People think “does this belong on the project’s wiki? On the intranet? On my blog? Oh sod it I will email it to the people who need to know.”
Organizations can cut down on email spam but they need to start with a change to the organizational culture and lead from the top (with bosses participating in the online spaces they want their employees to use) rather than installing software and hoping for the best. If I had had more space in my book – Dealing with Email – that is what I would have stressed. I am sure that David knows this as well of course but I am afraid that reading this article business leaders will just see ‘social software’ as a quick fix. Unfortunately, as I said, we have been down that road before…

* Emails cc:ed to lots of people who don’t need to see them, personal email like items for sale circulated around an organization, announcements of fire drills etc.

20 March 2006

One of the New York Times’s most emailed articles is, surprisingly, one about early 20th century music history, and in particular an archive of wax cylinders now available free online so we can all hear the kind of things our grandparents or great grandparents liked to listen to (well not my grandfather – he was strictly a classical music guy!).

While I am on the subject of new links, may I remind you that you can see a categorised selection of my bookmarks here – 529 of them now and the number is growing all the time. To see every weblog post I made tagged with “Useful web resources” click on the link above this text or just click here. My “Broadband content” category includes audio and video-related postings…

21 January 2006
Filed under:Email discoveries,Privacy,Spam at1:13 pm

Ever get an email from a stranger and wanted to know where they were? Or wanted to complain about a particular piece of spam? Here’s a guide that spells out how to trace an email (and how to then complain to the originator’s internet provider if appropriate).

? Previous PageNext Page ?