March 04, 2013

Skype Service and Customer Service Fails Big Time

My wife has family in South Korea.  She likes to talk with them, and online phone services have become the norm for doing so.  However, the people that she talks to are not always available online.  For this, she used to use Yahoo Voice to call the landline/mobile number of those family members.  Occasionally, she'd load up a few dollars on the Voice service and use it to make first contact.  

Unfortunately, Yahoo ended their Yahoo Voice calling service.  I suggested to her that Skype offers these same services, and I put $10 in Skype credit on her account.  She loaded in the phone numbers of her family members, and tried to make contact.  Well, it connected to someone in South Korea - the language was right (so the country code was correct), but the phone number she was connected to was different than the one she called.

I attempted to connect to Skype's customer service via online chat.  I probably should have known better.  Here's all the things that went wrong on this call:
  1. The first CSR I was connected to immediately hung up.
  2. I was reconnected to that same CSR, and it took them 3 minutes to acknowledge my presence.
  3. The CSR did not understand my problem.
  4. The CSR continually used cut and paste 'feel good' customer service speak to communicate.  While attempting to make me feel cared for and understood - they only lent to the feeling that I was talking to a brick wall.
  5. The CSR could not help me and transferred me to another CSR
  6. This first half of the call took 12 minutes.
  7. The second half of the call with a different CSR had problem number 4 as well.
  8. The second CSR told me that since I had initiated the calls that I would not get a credit.  (Thus #3 again).
  9. After 22 minutes, I hung up the call with the CSR.  35 cents was not worth my time and frustration with the idiots on the other end of the call.

This is customer service done WRONG!  I hope that I save you from making the mistake of trying to use Skype to landline/mobile for overseas numbers.  I hope I save you from even making a deposit with their service.  Their website says they will not refund deposited funds after any of the funds have been used.  I have lost $10.  I hope you do not.


January 16, 2013

Science Writers, Please Evolve

Just today I saw two articles that stated claims that 'something' evolved to be able to do 'something else'. It's been bothering me for some time, but I don't think I've ever written about it. In the first story, the claim was that bats evolved to be able to repair DNA radiation damage from flight. In the second, that human fists had evolved to allow humans to make fists for punching other people. This makes it sound as if a group of homo erectus got together and agreed to only mate with people with a good right hook. This is hardly an accurate concept.

Both of these are fundamentally wrong statements. In fact, I find the statements downright misleading. It mixes the mindset of intelligent design with that of evolution. We, and our counterpart life forms, do not evolve toward a purpose. Instead, it is right to think that we evolve BECAUSE of specific environmental changes. E.g. Bats have evolved to the point where they repair DNA radiation damage experienced in flight. Humans have evolved fist-making hands most likely due to the survival advantage offered by being able to punch someone in the face.

It may be a nit picking argument, but I think it would serve the greater good if evolution were properly characterized by statements that indicate its actual mechanism rather than set in the minds of the reader that we, or anyone else, evolve toward a specific purpose. The only purpose evident in the function of evolution is survival. Thus, it is really only right to say that 'something' evolved to be able to survive its environment.

No one knows why my branch of the evolutionary tree has evolved to be so pedantic.

- Recovered from a missing draft using BlogPress from my iPad



- Posted using BlogPress from my iPad

October 19, 2012

Copyright Alert System to turn everyone into copyright cops?

The forthcoming Copyright Alert System ( Verge article on Copyright Alert System ) has a few kinks in it from the get-go, as well as some basic misunderstandings of technical constraints of the majority of end-users.
I'm not familiar with the technology that CAS will utilize to identify targets for ISP warnings, but the first potential problems will come at the identification stage. Unless the most egregious users are identified prior to warning letters going out, the ISPs should expect a large backlash from its installed base.
The system expects ISP customers to become copyright cops as part of their responsibility for having an Internet connection. This is an unreasonable expectation for unqualified, nontechnical, users of their service. Relying on the general populace to become learned about Internet technology as well as legal experts on identifying potential infringing content is a giant leap in expectations beyond just asking someone to pay their bill on time. Explain this all to my mother who still thinks her Operating System is Internet Explorer and who just learned last month about right-click menus.
That's just part of the problem with the system. Next up is the access control problem. When Verizon installed FiOS in my house, they put in a WiFi router with WEP security. Even with WPA (of the pass-key variety), cracking into my WiFi will take my neighbors less than an hour, and there's tons of tutorials on how to do it. While I may have secured my network further, others won't have been as fortunate. After just one CAS letter, my next door neighbor will likely be piggybacking on my less savvy neighbors. This can't be controlled, not with today's technology, and not without significant expenditure. Maybe it's time for me to hang out a 'will secure your wifi for food' shingle.
The one thing that really irritates me is the $35 charge they intend to foster on people who ask for account reviews - putting the onus on the accused to pay for their own defense. Maybe it's the legal eagle in my blood that says this flies in the face of what Americans consider fair and due process. I can see this being the first part of this agreement to make it fall all to hell.
Good luck, ISPs, I don't think you know what kind of failure you're setting yourself up for.
- Posted using BlogPress from my iPad

Location:- 0628 Massachusetts Av Nw,Washington D.C.,United States

October 18, 2012

Fear of Failure?

Fear drives a lot of things in life, but there is especially one fear that is ironic in its nature - the fear of failure. Being afraid of failing at something puts me in the 'frozen' mode. I am so afraid of doing something wrong that I don't take those first steps necessary to succeed, action itself. Like that last sentence, for example. It's terrible in its structure, and normally I would have erased it and started over. (I didn't only because I am self conscious about it due to the subject at hand). My Randomblings have become less rambling over the years, and turned into the Infrequent writings of Rich instead. Part of that is due to fear. Fear of saying the wrong thing, afraid of saying it the wrong way, or just being wrong in general.

This post has been sitting on my iPad for months waiting for me to finish my thoughts on this subject. Point more than proven......

- Posted using BlogPress from my iPad


- Posted using BlogPress from my iPad

May 19, 2012

Facebook's Real Value

This week, many people in the IT Industry have been asking "Where is FaceBook's value", trying to figure out why the company might have such a huge valuation on the stock market (where it's IPO valued the company at over 100 Billion Dollars(!)).

There's two ways to look at Facebook, with regards to its customers.  The first is the adage: "You're not the customer, you're the product".  That is, everyone signed on to Facebook is actually part of the social media empire's product line - that it turns around and sells to advertisers.  Arguably, it is the largest collection of personal taste and demographics information in the world.  I'm not one with the advertising industry, and I have no idea how long it might take to collect the amount of demo data that they have, or how much it can be sold for - but as a data set - it is of reasonable quality.  With that said, advertisers should be aware that people game the system.  That is, more than one account, relationships between people that aren't based on real relationships, but are instead people who are gaming the Facebook friend system for points in some Zynga game, and that people have a tendency to click on buttons on the web JUST to get free stuff.

Personally, my 'like' of Tide laundry soap was more likely based on a coupon giveaway than any real desire or care for the actual product.  About half of my 'friends' are actually just friends because I needed more Cityville neighbors, and I probably have 3 Facebook profiles.  Maybe I'm not indicative of the whole data set, or perhaps I am - but it certainly plays into the quality of the data, even if it doesn't eventually lead to wrong conclusions on the part of advertisers.  Oh yeah - just so you know, I've never clicked on a Facebook ad.  I don't even look to the right side of the screen.

So, what's the benefit of Facebook from the other side?  Well - Facebook has slowly and stealthily become something of an Internet authentication authority.  Signing up for membership on some new website?  It's likely made easier by a button that says 'Sign on with Facebook' on that site.  Why re-enter all of your demographic data when you can just authorize the site to go and get it?  The user convenience of a central authentication portal is pretty powerful, and Facebook has made it oh-so-easy for developers to integrate their 3rd party authentication into their websites.

There may even be a business model in it for Facebook eventually - perhaps charge people for strongly authenticated Facebook identities (ones that use OTP token devices) and extend the service to places like banks, utilities or bill-pay services.  Or, start charging web developers for Facebook integration - frankly, I'm surprised they haven't started doing that already - although free is the fastest way to build your userbase.

Eventually, Facebook is going to have to figure out how to turn a profit that's big enough to hold it's stock price afloat.  What are your thoughts on how they will monetize their application platform?

April 27, 2012

Politics is ugly

The Republican primary isn't even over yet - but Republican allies (womensrights@obamasaliar.com) are sending cell phone text message SPAM to anyone they can get their hands on (phone number-wise).  I hope and pray that this won't catch on - but I'm afraid that it will.  Will my cellphone now be bombarded with pointless text message spam about who said what?  (Today's message is: Subject: Dems on Women Obama ally Hillary Rosen criticizes stay at home mom's like Ann Romney. Listen 312-569-0397).

Who cares what Hillary Rosen said about a billionaire's wife?  I mean, really!?! Seriously?!  and you need to send this to my cell phone, interrupt my day with political posturing?

Text messages on my cell phone are normally limited to two things - my son needs something and can't get a-hold of me, or someone at work needs something and wants to tell me something important.  The stupid phone beeps at me, and demands my attention - so I have to drag it out of my pocket to see what it says - because it's usually important.  It was the last communication medium I had left that I could rely on being something important rather than be more junk about politics or someone wanting to sell me a car warranty.  I suppose those messages will be next, though.

I would go so far as to say this is 'dirty politics' - smear campaigns are insulting and stupid - and my GOD, man, it isn't even MAY, much less voting season.

March 01, 2012

Life Movements

March 1st, 2012 - Refinanced the house yesterday - Got a very good deal from an awesome lender. If you're ever in the need for a good lender, talk to Mike Lyons @ Embrace Home Loans. He hooked me up with 3 loans over the past year as we bought and refinanced property. He's a good worker, and is always there to answer questions - and he'll go out of his way to find answers when he doesn't know them. I emailed him at 11:30 one evening, and he answered within a minute. Other times, he'd reply "I'm at dinner, but I'll get back to you later this evening.." - hardest working man in the home mortgage industry. Seriously - no jokes here.

Shaved off the beard last night for spring. Baby face me has a double chin again - time to hit the exer-bikes and the Zumba routines on the Wii.

Turned the water on at the house and the back deck water attachment at the house came loose. I had to turn the spigot off again. We crawled under the back deck and got spider webs all over ourselves trying to figure out what happened. Looks like it's attached to an extension of the water line in a rubber hose attachment, and the connection came loose - maybe expansion/contraction from the winter. I'll have to climb under there with my gardening clothes this weekend.

I've got to cut out 2 6'x6' areas for the garden this weekend - it's going to be a lot of digging, but the neighbor has a roto-tiller he said I could use to get it started. We planted seedlings for lettuce and cabbage and they're already sprouting like mad 5 days later. The race is ON!


February 05, 2012

Might and Magic - The Encrypted Files

Back in 1986/1987, I owned a Commodore 64 computer.  I love to play the video games of the day, especially the dungeons/adventure based games of the era.  One of these games was Might and Magic.  The game came in 4 disks, which you loaded in depending on where you were in the world.  The game was loaded from Disk 1, and once the game got going, you might switch to another disk when asked.  As you might imagine, that meant there was a relatively large amount of content for the day.  

After playing the game for a while I bored of following the game - as it was a very long adventure and became sort of repetitive.  However, I wanted to see later aspects of the game, and get the feeling of power that larger and better weapons and armor might give me over the challenges within the game.  It was at this point that the aspect of the game changed for me.  No longer was it a role-playing game based in the middle ages; now it was a computer-based game - me against the original programmers.  I wanted to edit my character files on the disk to see if I could change the items in my inventory to something a bit more favorable.

I started up a disk editor.  On the Commodore 64, diskettes were broken into track and sector, and the file system was serial in nature.  Starting at track 18 (from what I recall) and sector 00, the first two bytes of the track and sector pointed to the next track and sector in the sequence.  Starting up and looking at this first track, everything seemed normal, and I began analyzing the disk contents.  When I followed the link to the next sector, however, I got a bit of a surprise.  There was a word that had begun on the last few bytes of the sector I had just left, but the word did not continue on in this sector.

I started looking around the disk for plain text content, and I couldn't find any except on that first sector!  The whole disk was encrypted!  I checked the other three disks and they too were encrypted. Well, this was a new challenge for me - I'd never seen a program that encrypted the disk contents as a method of protection.  I had wanted to edit my game characters, but I wasn't goingg to be able to do that if I couldn't read the contents in the first place. Luckily for me, I had done many cryptograms when I was younger, so I was familiar with both the Caesar shift cipher as well as replacement alphabets.  

I made the assumption that the computer would have to use some type of formula to easily translate the disk contents, and I had some known plaintext to work with due to the string content that bled from one sector to the next.  One of my character names had ended mid-word at the first sector, so I made the assumption that it must continue into the second sector. Having some math background and being obsessed with the new challenge, I quickly got to work, figuring out what the shift would need to be for my name to continue uninterrupted.  I came up with a value fairly quickly, and went about testing it on the new sector's contents.  

Plaintext quickly became apparent throughout the sector's encrypted bytes!  I had done it - I'd figured out the proper byte shift with just one incomplete word of known plaintext.  Pleased with myself, I continued on to the third sector....but alas, it wasn't going to be so simple.  The shift value was no longer presenting me with any known text.   While most of the file contents were gobbledy-gook, on sector 2 of the file, I had at least been able to make out some plain words (names of my party characters).  Lucky for me, I had another plaintext that had only partially translated at the end of sector 2, so I figured out the shift value that would get me the plaintext continuation into sector 3.  It worked!

So, now I had two different shift values for two different sectors.  I continued on to the fourth sector and accomplished the same, but I ran out of luck when it came to the fifth (IIRC).  No more known plain text bordered the two sectors.  I'd either have to guess at 255 values for shift and try them all, or come up with another way.  At this point, I figured that the shift values had to follow some kind of pattern for the computer to be able to figure out what the next shift value would be.  

I got out some more graph paper.  It occured to me that the value would have to have some constraints, to be able to have values between 1 and 255 - and I had just finished a trigonometry class, so the sin() wave was looking like a good bet to me.  I plotted the 3 shift values I had, and plotted 0 for the first track and sector.  I used the sector value itself for the x variable and set about plotting a formula that would give me the known values. I tested the formula on subsequent sectors and sat up for hours working on it.

Into the next day (after little sleep) I had cracked at least part of the puzzle.  I don't recall what happened that led me to use more than sin() waves.  I do know that in the end, there were three parts to the formula, and that the equation used track, sector and disk number to determine the shift offset.  I had decrypted the disk and determined the encryption algorithm, based on sin(), tan() and a constant based on one of those values.  

I modified a disk editor program to decrypt the disk as it edited it, and re-encrypt when writing the modified values back to the disk.  I manually edit my character's inventory to have item numbers that I did not already possess, and started up the game.  Success!!!!

I never played Might and Magic again after that weekend.  The game had become boring - especially compared to the game I had just played - battling not the trolls and wizards of lore, but battling the developers who relied upon in-house encryption to protect their secrets.  I will never forget that weekend and the dozens of pieces of graph paper that littered my floor amongst the empty bags of chips and soda cans.

January 30, 2012

Weekend Messing Around with CityVille/FaceBook

Load-Divs bookmarklet 1 - javascript: {divs=document.getElementsByClassName("UIActionLinks_bottom"); i =-1; punder=0; }
Open Next Div - bookmarklet 2 - javascript: {i=i+1;if(divs(i).parentElement.children(1).children(1).text == "CityVille") {button_me=divs(i).getElementsByTagName("button")(0); if(button_me.name == "like") {button_me.click(); elem_me=divs(i).getElementsByTagName("a"); if(punder) punder.close(); punder=window.open(elem_me(0),'myscript','width=400,height=500',left='-400'); punder.blur();} }}


The left=-400 doesn't work like I wanted it to - it can be left out...it's a fragment of 'try this' that is left over from playing.

January 24, 2012

Natural Rights vs Granted Rights

In Colorado, a woman being charged with fraud has been compelled by a judge to decrypt her hard drive. The woman, in arguing against this action claimed that the Fifth Amendment protected her from self-incrimination. The judge found against the woman, stating that since she had already admitted to the existence of the electronic documents, she could be forced to produce them.



As expected, I believe that there's some room for improvement on both sides of this case. I believe the judge is incorrect in his judgement that a person can be compelled to produce any evidence, even though I understand why he could come to this conclusion based on current case law (which I believe to be flawed). I also believe the defendant is wrong on several counts. One obvious count being that she has even openly discussed the case at all [she admitted to the existence of the documents!].



The Bill of Rights are not meant to be a list of rights that are given by men to men. The Declaration of Independence and the Bill of Rights are linked by a core concept - a concept that we are 'endowed by [our] creator with certain unalienable rights'. The Bill of Rights embody into law that those natural rights, which we possess by our very existence, shall not be infringed by government.



In declaring independence from England, the United States of America stated that they had the right to abolish government which deprived them of these natural rights and form a new government to protect them from that deprivation. We would do well to remember this during the execution of our own government over ourselves, as we protect individual rights, we protect the rights of ourselves.



Take the First Amendment (as this lady should have). It states that we have freedom of speech (and as been held up many times - freedom of something also can mean freedom FROM something - thus the right to remain silent). This is not a right that was handed from the government to the individual. It is an ability, a natural extension of the person-hood, that the government may not take away. A person can not or should not be compelled to speak. I personally would go so far as to say that the government has no right to compel a person to act in any way, shape or form - which leads to a discussion about the right to sit-in on public by-ways.



This ability to remain silent is a very simple right to utilize - just shut your mouth. The government has certain guidelines whereby they can hold you against your will for the purpose of investigation and non-interference, but they have guidelines - and you can sit in a holding cell while they rummage through your belongings. This is definitely the tactic to take in any criminal investigation. Note that the fifth amendment also applies here, in that the government may not deprive you of 'liberty' without due process of law.



The right against self-incrimination was and is an extension of the right of freedom of speech. Reading through history, it seems to me that the point was to ensure the spoilage of evidence obtained through coercive measures.



In this particular case, where the government knows that there is evidence against the defendant, and they are attempting to 'force' her to produce access to that evidence, I think they're mistaken in what they claim can be done. To compel her to produce the necessary information, they would have to lock her up forever. At some point in that time, she will likely forcefully or absentmindedly forget the information she's been asked to produce, and there would be no route to obtain the information. She could claim immediately that she no longer remembers what the key to the information is. Depending upon password complexity and the amount of time between when she's used it last, it may even be a believable claim. How can locking someone up forever to compel them to provide detailed evidence be proper due process?



The government should utilize the woman's previous statements as evidence of the documents. A jury should be directed what assumptions they should make regarding the fact that she does not wish to produce them -- allowing negative connotations toward what they think the documents might contain. There is already case law that allows for these assumptions.



To go further than this? I think we've begun a slippery slope..