Monday, February 28, 2011

It Takes Two to Tango

It takes two to Tango, but it takes three to develop good software. The user, programmer, and middle management execute an intricate dance where all are happy, or at least one is not. Users want reliability and new features, but not overwhelming changes. Programmers want their software to be useful and different, but don't want to fix bugs. Middle management wants to be profitable, but not look bad for missing deadlines. If you release too many features too quickly, or if the software is buggy it won't be financially successful. If you spend too much time fixing bugs you will miss deadlines. If you try to capture a different market with a major GUI change then you tick off your current user base. Windows Vista is an excellent example of this process failing. Vista missed 3 ship deadlines and was not well liked by Windows users. In contrast Windows 7 was released on time and is now the best selling operating system ever. Huge companies can step on their dance partner's toes occasionally, but dancing well is imperative for the success of a small company.

Wednesday, February 16, 2011

1337 H4x0rz

Real hacking is an art. A black art, but still an art. No one can sit down at a computer and say to their self "I wonder what Pixar is working on in their data center right now?" and then break in and poke around. It would be a trivial task if you could traipse around a network knocking on doors until one opened, but important networks aren't like that today. IT professionals and programmers have learned through hard experience and public embarrassment that they can't trust anyone on their networks. If a network is valuable it is highly secured. Our networks have become an extension of us. Misbehavior on a network can lead to very real consequences. The most recent wave of copyright infringement lawsuits have shown that it is possible for file sharers to leave digital footprints that can be traced right to their real front doors. If a hacker is determined and educated in computer architecture and network communication, they will eventually find a weak spot and penetrate the network defenses. It won't be done overnight, or probably in a few weeks, but it can be done. Once they are in they can do whatever they want until they are detected; if they ever are detected. There will always be a need for security professionals to help keep our networks safe. This need will only increase as the earth becomes more connected and people move more and more personal information online.

Tuesday, February 8, 2011

Your Private Moon Tour

Man hasn't returned to the moon since the Apollo 17 mission in 1972. That isn't about to change, but the first private vehicle could be going in 2013. This private exploration--if successful--will demonstrate that any resources available on the moon can be available to corporations with enough money. A whole new economy will emerge for moon goods or perhaps services like moon tours. Imagine that! Renting a lunar rover to go check out that crater you saw in a telescope. These ideas are all somewhere in the future, but doors are beginning to open now which will make it real tomorrow.