Tag Archive for Michigan

Kid Got Lost Inside a Computer

Kid Got Lost Inside a ComputerThe Next Web has a great little anecdote about a 10-year-old kid who got lost inside a computer at Michigan State University in the 1950s. The story goes like this:

In 1950, I was 10 years old, visiting the Michigan State University campus. The computer was on the ground floor, turned off, with the door open. It was perhaps half the size of a gym, with many rows of cabinets taller than me. I wandered up and down the rows looking at the vacuum tubes until I got bored. By then I couldn’t see the door and didn’t remember how to get back out. I was literally “lost in the computer”. So I continued wandering, eventually found the open door back out, and left.

Magnetic Core Plane for ILLIAC II Memoryrb-

That was the time when computers less powerful than your current phone were bigger than most homes.

Related articles
  • UNIVAC: the first mass-produced commercial computer (infographic) (royal.pingdom.com)
  • History and Generations (thetakenyoutake.wordpress.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Amazing Video of Michigan at Night from Space

Amazing Video of Michigan at Night from SpaceThe crew of Expedition 30 onboard the International Space Station took this amazing NASA video of Michigan. The video begins looking northeast over Texas, where cities like San Antonio, Houston, and the Dallas/Fort Worth area can be seen.

Continuing northeast over the Great Plains states, cities like Oklahoma City, Kansas City, and St. Louis can be easily distinguished. The pass continues over the familiar shape of Michigan, with Chicago and Detroit visible. As the ISS continues northeast, the Aurora Borealis can be seen over Canada.

 

The sequence of shots was taken on January 30, 2012, from 06:13:36 to 06:23:09 GMT, on an ISS pass from northern Mexico to northwest New Brunswick.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Neil Young and Bill Ford

Neil Young and Bill FordBill Ford, executive chairman of Dearborn, Michigan-based Ford Motor Company (F), was recently approached by audiophile Neil Young to build Hi-Fi digital audio into Ford cars according to Mother Nature News.  “Three months ago, Neil Young came to see me with a music proposal for cars,” Ford told the New York Times’ Jim Motavalli during the Detroit Auto Show. “Today’s digital MP3 format is horrible,” he quotes Young as saying. “The only truly good format is the vinyl LP —you can hear my fingers bearing down on the frets.

Ford Motor CompanyThe Rock and Roll Hall of Famer releases his archival material in Blu-ray and wanted Ford to put music-friendly Blu-ray players in cars, but it’s a hard sell according to the article. “We looked into at Young’s stuff but it wasn’t that user-friendly,” said Ford. “We decided it was a music format that only real purists would know about.

MNN reports that if you want the definitive version of Neil Young Archives, Vol. 1: 1963-1972 you have to cough up $349 for the 11-disc Blu-ray box. The CDs are just $100, and probably good enough for mere mortals. CNET says don’t waste your money:

The Blu-ray features ultrahigh resolution 24-bit /192 kHz stereo sound, which you can play over some newer AV receivers, but I’m not so sure that any high-end electronics can access the superduper-sounding PCM track … Don’t buy the Blu-ray box for the sound; the DVDs are fine.

Neil YoungCNN reported a year ago that Apple (AAPL) has talked with record executives about making high-def files compatible with iPods, and there’s probably a market for that among the same kind of people who pay a premium for “virgin vinyl” records.

rb-

While I enjoy Brother Neil’s music, I already own After The Gold Rush, Live Rust, Rust Never Sleeps and Freedom in four formats, vinyl, cassette, CD, and some of the tunes on iPod why would I want another one? How good is it going to sound in the car while I’m driving down US-23 at 75 MPH? Sorry Neil not for me.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Detroit Safest Online City Again

Detroit Safest Online City AgainNorton, the anti-virus arm of Symantec (SYMC) teamed up with research firm Sperling’s BestPlaces to rank US cities based on a number of cybercrime risks and they found Detroit the safest online city for 2012. I wrote about Detroit’s 2011 ranking here.

DetroitBert Sperling, lead researcher for the analysis said, “By looking at data from consumer lifestyle habits as well as cybercrime data provided by Symantec, … we’re able to provide a holistic view of the various factors that put a person at potential risk.

The Huff Post reports that the study looked at the prevalence of Internet use in addition to the types of risks users face online. Consumer statistics include the number of PCs, use of smartphones, the use of social networks, e-commerce, and accessing potentially unsecured Wi-Fi hotspots. BestPlaces also looked at the following cybercrime data: bot-infected computers located within a specific city, attempted malware infections, spamming IP addresses found within a specific city, and web attacks originating within a specific city.

Wi=FiSymantec says Detroit had low scores in the number of Wi-Fi hotspots, potentially risky online consumer behavior, and PC expenditures. Other low-ranked cities include Tulsa and El Paso.

Users are at most risk for cybercrime in the following cities:

1. Washington
2. Seattle
3. San Francisco
4. Atlanta
5. Boston

SymantecWith the explosion of smartphones, tablets, and laptops in recent years, and the rise of apps and social networking sites, our online and offline lives are blending together in ways that we’ve never before experienced,” said Marian Merritt, Norton Internet Safety Advocate. “…this analysis highlights the potentially risky factors we face each time we go online. By taking a few simple precautions now, people can make sure they stay protected against online threats.”

Greg Donewar, manager of the National White Collar Crime Center told Huff Post,… over the past year, we’ve seen a considerable increase in cybercrime attacks, and whether a person lives in the riskiest online city or the safest, consumers everywhere need to be aware of the inherent dangers of online activity.

rb-

Forbes says that cyber-crime is a $37 billion crime that affects 1 in 25 Americans. Take these steps to protect yourself online:

Create better passwords. Avoid passwords like password, 123456, qwerty, abc123, or monkey, these are the top most common passwords (I have been writing about weak passwords for since 2010). Forbes says your first line of protection against cybercrime is to make sure all of your passwords follow these rules of thumb:

  • At least eight characters
  • A mix of these four types of characters: upper case letters, lower case letters, numbers, and special characters
  • Not a name, slang word, or any word in the dictionary
  • Don’t keep the same password; change it every six months
  • Have uniquely different passwords (not just slight variations of the same password) for every account and site

Monitor your financial accounts. If you shop online, use online banking, or have any personal or financial information available online, you are at risk of finance-related crimes like identity theft and fraud which Huff Post says costs the average victim $631 in out-of-pocket costs. Forbes says that one of the easiest ways to protect yourself is to monitor your credit to detect any red flags early. They recommend users set up spending limit alerts on credit cards and checking accounts to keep tabs on your balances. Automatically monitoring for suspicious activity and fraudulent accounts helps catch costly identity theft and fraud immediately.

Lockdown your smartphone. If you use your smartphone to shop, spend, socialize, and surf, your phone’s sensitive information essentially becomes a one-stop shop for cybercriminals. Forbes says if stolen or exposed to thieves, your smartphone can compromise your personal and financial information anytime and anywhere. Here’s a quick five-minute checklist from Forbes on how to properly secure your mobile phone:

  • Password-protect your phone with a complex and unique password, and set your phone so it auto-locks and never saves any passwords.
  • Enable a service with remote tracking. You can also set your phone to automatically wipe your data if your phone password is inputted incorrectly several times.
  • Turn Bluetooth off if you’re not using it. Thieves can pair their Bluetooth device with yours and hack personal information.
  • Be careful on public Wi-Fi networks where thieves can remotely access your data undetected. Only connect your phone to secure networks.
  • Before downloading any apps to your phone, always do a quick search to make sure it comes from a legitimate site or publisher. Check user reviews on sites like appWatchdog for complaints.
Related articles
  • Why you should password-protect your smartphone (ctv.ca)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Romney Defeats Gingrich in US SPAM Primaries

Romney Defeats Gingrich in US Spam PrimariesJust in time to get rid of all the annoying political ads on TV and radio leading up to the Michigan primary, GOP presidential wannabe Mitt Romney has been crowned King of political spam. His high-profile run as the leader for the 2012 nomination for the US presidential election has made him popular with spammers.

Mitt Romney is also the favorite politician of spammers. He is used to tout knockoff drugs and dubious bargains in junk e-mail according to a Bitdefender analysis of 8 million unsolicited messages spread in January.

Mitt RomneyRomney is mentioned in 45% of SPAM messages that reference US politics, ahead of second-placed Republican Newt Gingrich, who scored 33%. Romney’s name was most often used in scam messages that advertise low-interest loans or free credit score analysis while Gingrich was mentioned in junk mail promoting miraculous energy-saving devices that almost certainly don’t exist. The article says most of these offerings actually redirect the unwary user to survey site scams or knockoff drugs for sexual dysfunctions.

U.S. Republican hopeful Ron Paul came third in the BitDefender spammers’ list, with 12.2%. The most popular politician outside the Republican race that caught the spammers’ attention this year was Bill Clinton, with 4%.

BitDefender logoWinning Most-Mentioned Politician in Bitdefender’s spam survey is probably not an honor that many politicians want,” said Bitdefender E-Threats Analyst Bogdan Botezatu, who coordinated the spam study. “And I don’t think we’ll see spammers suddenly turning into political pundits. But the results could tell us which politicians spammers think are most likely to get a reaction from random e-mail readers. Spammers are, ultimately, after money and they’re essentially making a bet on popularity when they favor one politician’s name over another.”

The author says spam messages often use names of celebrities or politicians in fragments of news items in trying to give credibility to the message and to trick anti-spam filters that look for the percentage of links versus other words in the message.

Republican partyIn the BitDefender overall analysis of spam not filtered to include only political references – the Republican politicians were handily beat by celebrities including Jay Leno, Eva Longoria, Kobe Bryant, and even political commentator Rush Limbaugh.

rb-
I wrote about spammers hijacking celebrities ‘ identities to spread spam. In the past, Jay Leno and Heidi Klum have been called the most dangerous celebs on the web.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.