Blunder Dome Sighting  
privacy 
 
 
 

Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.



Click for Blog Feed
Blog Feed

Recent Items
 
Republishing before Silence
 
Command Line Utilities: What Would Purr Do?
 
Retiring InfoNuovo.com
 
Confirmable Experience: What a Wideness Gains
 
Confirmable Experience: Consider the Real World
 
Cybersmith: IE 8.0 Mitigation #1: Site-wide Compat...
 
DMware: OK, What's CMIS Exactly?
 
Document Interoperability: The Web Lesson
 
Cybersmith: The IE 8.0 Disruption
 
Cybersmith: The Confirmability of Confirmable Expe...

This page is powered by Blogger. Isn't yours?
  

Locations of visitors to this site
visits to Orcmid's Lair pages

The nfoCentrale Blog Conclave
 
Millennia Antica: The Kiln Sitter's Diary
 
nfoWorks: Pursuing Harmony
 
Numbering Peano
 
Orcmid's Lair
 
Orcmid's Live Hideout
 
Prof. von Clueless in the Blunder Dome
 
Spanner Wingnut's Muddleware Lab (experimental)

nfoCentrale Associated Sites
 
DMA: The Document Management Alliance
 
DMware: Document Management Interoperability Exchange
 
Millennia Antica Pottery
 
The Miser Project
 
nfoCentrale: the Anchor Site
 
nfoWare: Information Processing Technology
 
nfoWorks: Tools for Document Interoperability
 
NuovoDoc: Design for Document System Interoperability
 
ODMA Interoperability Exchange
 
Orcmid's Lair
 
TROST: Open-System Trustworthiness

2005-05-14

 

Service Research: Focusing on Requirements for Technology, not the Technology

ACM News Service: Research in Development.  A possible new angle on addressing the problem-space vs. solution-space situation comes to mind as I look at the the discussion of service economies and exploration of services science described in this blurb.  Michael Fitzgerald's May 2005 Technology Review article may not remain on-line for long, so it is worth snagging for its deeper and important context. 

IBM provides mammoth research investments and there is a shift expected in the subject matter, reflecting changes in the business of IBM and other major corporations shifts strongly to a service orientation:

  • Until the packaged software business was “unbundled” from mainframe tie-ins in 1965 (with software often either tightly-bundled or freely distributed among user communities) as the result of an IBM-US consent decree, there was little interest in software as intellectual property: the copyright office did not accept software and software was considered basically un-patentable.  This was also the beginning of a tilt in the company’s research from hardware-focused toward software-focused.  This began the computer-science era for IBM Research.
  • Now the business of IBM is dominated by services (illustrated by the 2002 acquisition of PriceWaterhouseCoopers Consulting), reflecting a tilt in the overall economy as well.  One might now look to IBM’s research capacity as poised to delineate service science in the way it fostered computer science before.
  • The recognition of a hardware-software-services continuum is leading to some re-prioritizing of IBM research.  Because IBM has succeeded in shifting its business from boxes to services, it and other companies are very interested in whether there is a contribution that can be made in service science.
  • One difficulty in identifying benefits of service-research investment stems from how development work on services tends to wind up as part of a process, not a product.

It is becoming startling for me to see how much of what I dig into around trustworthiness of computing systems lies in the delivery of services and the use of technology as instruments of the larger business operation and the mission-related services of the business.  Although this article is not about trustworthiness as such, pretty much all service business has a trust dimension, and I am interested in what can be found in this area.

Resources Identified in the Article:

  • Center for Excellence in Service at the University of Maryland School of Business
  • Center for Open Innovation at the University of California, Berkeley, Haas School of Business
  • Elements of service business found in the IBM Autonomic Computing initiative
  • Work of IBM cognitive scientist Paul Maglio and colleague Rob Barrett looking outside the HCI to the business: what customers do with technology, what IBM consultants understand about what customers want, how the technology effects people
  • Business anthropologists such as Jeanette Blomberg are now in the picture at IBM Research, which has been looking into the coevolution of technology and business innovation and how much it involves people.  (Randy Trigg has a nice bibliography that reveals the power of an ethnographic perspective.)
  • WebFountain is a set of processes for data aggregation and analysis that came out of the research into customer service departments
  • The Center for Business Optimization is looking at the tightening of business operations, including refactoring for risk reduction.
  • The On Demand Information Services program farms out the talent of the research staff, and it is growing revenues dramatically, even though it is a small piece of the services business thus far.

I notice that there is a strong operations research, quantitative, and analytical component in the featured offerings, and this seems to be the foundation and point of departure into services science at IBM.

This could take me pretty far afield from my developing interest in process patterns (as opposed to design patterns as they have become so narrowly construed), but I will keep one eye glancing in this direction for more concrete material.


[updated 2005-05-14T22:08Z: There was just one type too many and I couldn't stand it [;<).]

2005-05-12

 

TiddlyWiki: Ohmygosh, I'm in Love.

TiddlyWiki - a reusable non-linear personal web notebookTed Leung just altered my life.  What have I been craving, praying for, putting off, and living miserably without he just ushered into my hands, along with a dose of GTD the TiddlyWiki Way too. “All your tasks are belong to you” indeed.

Here it is, a micro-content blog/wiki/hyper-thingie and my very favorite list of requirements:

  • Completely Dis-intermediated – it runs in a web page anywhere a browser can use it
  • Completely lightweight – HTML, CSS, and JavaScript – the whole thing is built in a single web page; There’s even Wiki on a [USB] Stick.  Criminetlies.
  • Pure Web information model: no database engines, no server requirement, permanent publishable formats. Is it REST, is it AJAX?  I dunno but I’m gonna love it.
  • My favorite open-source license: BSD – essential for operating in mixed company without guilt
  • The only “platform-dependence” seems to be the ability to have a hierarchical file/URL system and an appropriately-standards-compliant browser. 
  • There is a server-side version, and I really need to find out about that.
    • One, TiddlyWikiRemote, publishes to a server-side into an RSS feed!
    • Aasted Sorenson’s MyWiki experiment does server side into a file, and provides user login
    • IEWiki is bent to be specific to Internet Explorer and it lives as a Windows .hta file on a local machine – verrrry interessssting.
  • It’s kinda purty too.  Cool way of showing history.  Tastes great. Less filling.

OK Ted, here’s the deal.  I know cats are a problem and Vicki would really like to spend time with Julie and the kids so how about we bring dinner to you?  We love Bainbridge Island anyhow.  I figure August.  I owe you, guy.

I shall now lapse into a fit of weeping incoherence.  Ah, be there baby.  Be there for poppa. Make my dreams come true.  OK, deep breath. Right click for download, right?

I wonder how it works with WebDAV or, dare I speak the incantation, FrontPage Extensions?
Could this be a way of operating my content off of a CD-ROM without installing or preempting a local web server?
Be still my pulse-throbbing brain ...

 

3I: Individualized Interactive Instruction

ACM News Service: Innovative Instruction.  A program for real-time interaction between professors and students, connected by wireless in the classroom, is being hailed as a way of altering the reluctance of students to ask and answer questions.  In the blurb, it is difficult to tell whether anonymity is crucial to the technique or not.

From the account in Daniel Miller’s 2005-05-10 Daily Bruin article, it seems very clear that, how much I think learning to interact without self-consciousness is an important student skill, including willingness to make mistakes, that’s not how things work in reality.  And the use of an anonymous forum, at least in “town hall” settings, not only works to elicit participation, but there is serious engagement and participation.

The article does not provide any clue about the nature of 3I other than it is an open-source package similar to the Educational Testing Service’s expensive Discourse package.  Greater provision for customization is claimed for 3I.

In an interview on use of technology as a tool for achieving teaching goals, Electrical Engineering Professor William J. Kaiser explains how valuable the opening up of student feedback is for his own assessment of how the material is landing and what may need to be put in to convey a concept he wants to enliven and impart to the students. It is about closing gaps “between what the students understand and the instructor’s perception of that comprehension.”

Here’s the dynamic that pleases Kaiser:

“We refer to the protocol as individualized, interactive instruction (3I). This method is still based on an instructor teaching—because that’s very, very good for students —we just add a networked component so that communication with the lecturer becomes a two-way street. It works in the following manner: I, as an instructor, present material. I then present a problem that all the students can see, via the interface, on their personal wireless notebook screens. They then begin solving a problem, and I’m able to see the responses, in real time, of every student—every keystroke that’s entered is revealed. I don’t know which student is providing which response; from my perspective, they’re simply a list of numbers and this preserves the anonymous nature.

“It provides an incredible degree of insight. As students respond to a problem, I’m able to see characteristic errors that the entire class is making, and   I can review material to address a particular weakness . I’ve found that in typically just one problem cycle of about 10 minutes, a given weakness can be completely eliminated. In a typical 3I session, I’ll work through 6 different problem types, starting from very simple to very complex. At the beginning, students might have only two-thirds success on the initial problem, and at the end of the session, virtually all students are solving the hardest problem.”

I would love to find out exactly what this program does, but I can’t find it anywhere.  For free, open-source software, it is remarkably well hidden.  (I did find D3E though, and I am holding onto that link so I don't lose it one more time [;<).

2005-05-11

 

Three Defects We Can Do Without: Memory Leaks, Buffer Overflows, and Unclosed Files

ACM News Service: Silver Bullets for Little Monsters: Making Software More Trustworthy.  David Larsen and Keith Miller identify available solutions to three defects, suggesting that it is no longer necessary to tolerate these any longer.  Oh, OK: These aren’t infallible, but they can improve the situation dramatically.

A number of tools are mentioned, including Microsoft’s Slam, a C program static analyzer that authenticates the program against rules stated in its Specification Language for Interface Checking.  Now wouldn’t that be just SLIC.

The link to the article in the 2005–04 issue of IEEE IT Professional is directly to an Adobe Acrobat PDF.  (I hate it when that happens. You’ll have to condition your browser and firewall security to get the kind of access you want.  I only crashed my browser once before getting it to work.) You may find it easier to work from the free-article page or the table-of-contents of the publication after the free-download promotion ends.

The abstract resonates for me:

Despite the legions of ideas about how to improve software quality, much commercial software remains un-trustworthy. In this article, the authors make the case for at least taking small steps toward improved quality by using silver bullets “corrective actions or methods” to at least eliminate some common problems, the “little monsters” of the title.

I am left wondering why these particular problems aren’t greatly reduced by disciplined structural constraints on programs, ones that are easy to confirm.  This would make confirmation that memory (and pointers) are released, that buffer-filling code is properly defended, and that resources are released subject to relatively simple inspection and well-crafted dynamic testing.  Edge cases must still be addressed with regard to unexpected data and resource acquisition/retention problems, but I’d think it very worthwhile to combine structural constraints with confirmation techniques.  I’m also wondering what hackers use to discover those defects as prospective avenues for security exploits. 

With that inquiry in mind, I discovered additional gold in the article:

  • Trust gradualism: The notion of choosing carefully and eliminating (or seriously reducing) the incidence of a couple of pesky cases with existing silver-enough-bullets
  • Tracing of “software trustworthiness” back through David Parnas (1990) to F. Lockwood Morris (1973) and John McCarthy to what seems to be an unsatisfactory conclusion around what constitutes a catastrophic outcome.  I suspect that an affirmative approach may serve us better but I will relish going to the sources that are provided here.
  • Simple practices that would go a long way and that have seen little adoption (or are at least kept obscure):
    • a minimum standard for software testing
    • third-party assessment of software quality
    • good-faith negotiation about achieving “good-enough” software
  • Reminder that the 10 provisions of Cem Kaner’s August 2003 Software Customer Bill of Rights bear on trustworthiness too, including
    • disclosure of know defects
    • freedom to make public criticism, publication of benchmark studies, and other statutory fair usage
    • and [two more I would add], disclosure of all external communications (with user permission required) and assured access of users to their own data (which means to me that data formats are disclosed or that exporting is assured, and that applies to data for which custody is not on the customer’s system)
  • The little monsters approach: “If developers aren’t completely candid about known defects, perhaps they can eliminate particular types of defects and then declare that such defects are absent from their software.”
  • Choice of three of the 12 pesky critters that Valdis Berzins says are amenable to promising automated methods, with a stack of references, industry examples, and available products for those three.

This paper is a keeper for students of this subject.  From my perspective on TROSTing, I would say that declaring the absence of any sort of defect is problematic (as Knuth has famously remarked, and Edsger Dijkstra seemed to begrudge the point as well).  It strikes me that it is more appropriate to assert diligence in application of current art, specifying which measures were applied to mitigate the prospect of various understood defects, and certifying that.  Declaring perfection strikes me as foolhardy, especially since the user who stumbles on a defect will not care which category it falls in, if any.  Demonstrating diligence I can see as do-able at the current level of art.

2005-05-09

 

Windows Genuine Advantage: So, did I fail the test or did the test fail?

Microsoft Monitor: Microsoft's Windows Genuine Clarification.  What I want to know is, what do I do when the test fails, not when I fail the test?

The download page for the beta-2 of the Microsoft AntiSpyware tool took me through that game in March and I never got it to work.  (The beta-2 didn’t work either, but that’s a different problem.)  Mostly, I could never figure out how to condition my software firewall and my browser, plus flip my running Tablet PC on its back so I could read the Windows XP OEM product key off the sticker all while watching different links, web pages, and whatnots fail to come up properly much faster than I could read the jillion pop-ups from my firewall.  I also treasure this “You should practice the 3P’s every day in every way, but you don’t need it with us” treatment by Microsoft sites.  (Oh great, the “1–2–3 Protect Your PC” link on the Executive E-mail page is broken. Figures.)

I only entered my product key twice and I don’t think it ever took.  I didn’t get a report, I just kept being bounced back to an earlier page in the sequence.  Oh, and there was a polite suggestion that if I was having difficulty, maybe I’d like to fess up and take the link to the page that is ready to arrange my having a legitimate copy of Windows.  That sucks.

I don’t know what that’s about, but I didn’t like it.  I don’t recall being taken through activation with this machine either, but all of my other experiences with Windows XP have been with clean installs from  retail disks.  Blocco, my Tablet PC, is my only OEM-provisioned XP machine.

And if I have a counterfeit OEM install, I don’t want no freakin’ amnesty for me, I want those guys out of business.  What I have to do to reinstall XP means really buy a new machine and rebuild on it, because of the lock-in of OEM drivers and whatnot and no Windows CD-ROM, just an OEM restore CD.  The lost cost to me in the value of my time and attention for reworking the computer with a “legitimate” copy of Windows (I have enough of those on my MSDN Professional and Universal DVDs, guys) is way more than what the computer is worth, especially one with a counterfeit sticker, if that were the actual case.

And I’m more pissed that every failure of the validation test is taken as prima facie evidence that the user is running an unlicensed system.  Is there no provision for the test failing with a valid system?  I should go see if it has gotten any better.  Am I going to have to go through this every time I run Windows Update or download some freebie add-on? That’ll suck too.

Oh, Never Mind.  OK, I went back through the drill on the AntiSpyware beta-2 download page, and it went through the Genuine Advantage check without a hitch and no-questions-asked, leading me directly to the download page after some mad browser page-shifting.  The download also worked fine (though I don’t know that it will install any more successfully than the last time).  So, uh, I guess the last time did succeed, I just couldn’t tell.  Well, uh, oh.  Still, …

Keywords: Microsoft® Windows Genuine Advantage Potentially Sucks Declares Indignant Geezer Geek

2005-05-08

 

Hark, Is That a Pattern I See Before Me?

ACM News Service: Conceptual Data Modeling Patterns—Representation and Validation.  I am going nutty over design patterns.  I keep thinking that I know what they are (a bad starting premise).  What I keep running into leaves me baffled and a touch cranky.  I have to dig deeper into this to understand what is really going on here,  So this post is a marker for that and more to come as I puzzle my way through the pattern language about pattern language. 

I was hoping a view in terms of conceptual data modeling might provide the higher levels of abstraction that I find missing in other materials, so I seized on this Technews blurb and its discussion of Danesh Batra’s “Conceptual Data Modeling Patterns: Representation and Validation,” Journal of Database Management 16, 2 (April 2005), 84-106.  The intriguing part for me is that the abstract on the publisher’s site is well-crafted and interesting.  The Technews blurb, on the other hand, is salted with statements about patterns that inspire me to scream and throw things. 

Maybe the problem is that the names of the patterns, discussed in the blurb, don’t sound anywhere abstract enough in contrast with the publication abstract’s observation that “This paper teases out underlying structures that tend to occur frequently in these books and provides patterns at an abstract and more useful level of granularity.”

It could all be a matter of point-of-view and the question is, am I willing to spend the $18 USD that is required for downloading the paper.  Maybe.  Maybe not.  I will look for an academic-student source first.


I’ve now looked at the paper and it is useful for my investigations:

  • I am not so sure about the heavy emphasis on cognitive-science observations about pattern-matching, so there is something for me to digest and learn from. 
  • I think the idea of empirically verifying patterns is quite interesting. 
  • There is good discussion of abstraction level and granularity, and something not directly addressed which is the meta-nature of patterns (except variations on patterns are promoted).
  • There’s also a challenge with regard to coverage by a set of patterns, and the ontological precepts that may involve. 
  • The patterns are fun, and the oft-repeated over-simplified recursion (e.g., bill-of-materials) pattern is identified here. 
  •  I now understand why the names reported in the blurb were disturbing, and this is exacerbated by using UML for the conceptual modeling.  I think this approach trips up the author, too, who seems to think that the generalization structure doesn’t apply to the relational model.  This relates to my concern that we too easily consider that patterns in information systems must be evident in a specific way, as when cutting fabric for a garment.
  • There’s a nice bibliography with earliest references in 1970 (E.F. Codd, of course) and 1972 (Newell & Simon on cognitive models).

Searching for the Paper: Well, Google Scholar lists it, but none of the academically-licensed services that I have available carry the Journal of Database Management.  I’m going to try the $18 option, not speant on GreatSchools.net, and see what this is about. 

The Idea Group Publisher site says they are providing a one-time view in a pop-up from which I may print the article.  I want an electronic copy so I can have it indexed and filed as dissertation-bibliography backup, and I think I can arrange that.  What concerns me is what happens if I trip on a firewall or browser privacy/security setting.  We’ll know momentarily.

Slightly Later: Well, it is just a PDF download.  Once I conditioned my software firewall to allow MIME-type integrated objects from this site, it was a matter of downloading rather than opening the file.  I wonder what has them assert that only a printable view will be provided.  Oh.  Mums the word.

 
Construction Structure (Hard Hat Area) You are navigating Orcmid's Lair.

template created 2004-06-17-20:01 -0700 (pdt) by orcmid
$$Author: Orcmid $
$$Date: 10-04-30 22:33 $
$$Revision: 21 $