The MacBook Air looks pretty cool, but unless they have made some major progress in software I am not real interested.
Technology
The Attack of The Apple Computer Sycophants
Yesterday I wrote a post I called P.C.’s Versus Apple Computers that has generated a ton of feedback. While I didn’t write it for the purpose of generating controversy I can’t say that I am surprised by it either. The opening paragraph is a good description of a segment of supporters of Apple Computers:
A long, long time ago in a galaxy far, far away I was a devoted member of the Apple Computer cult. I was a dyed-in-the-wool Kool-aid drinking guarantor of the superiority of Apple computers versus a P.C. At that time I couldn’t stand to use a P.C. It was an affront against my sensibilities.
The post wasn’t ever intended to be a discussion of the technical merits of operating systems. Had I wanted to compare Linux versus Windows versus Mac OS I would have done so, but I didn’t and I don’t care. You want to find that, go seek out Slashdot, Linuxworld or MacNN.
Anyhoo, I thought that I’d share some comments from some of the keyboard banging monkeys whose toes I stepped on.
Here are two from the post:
At 11/12/2007 12:42:00 AM, Mstr. E. Anderson said…Ya know, I have absolutely no doubt that after 10 years of drinking MS Koolaid you feel that a PC with Windows as an OS is better–even though you just hint at why but don’t actually make any explanations.
More power to ya! Believe whatever you want.
Just one thing: P.C.= Personal Computer. Dell makes PCs. Apple makes PCs. Dell’s PCs run Windows (or you can get some form of Linux). Apple’s PCs run the Mac OS (and can also run Windows, many flavors of Linux, and other OSes).
So your article is NOT “P.C.’s Versus Apple Computers.” If you wanted to discuss that you would discuss hardware from Dell, Gateway, Lenovo, HP, Sony, and Apple. But you didn’t do that.
Your discussion was MS Windows vs. Apple Mac OS.
Respectfully, your total lack of understanding of the difference between hardware and OSes makes your entire “random thought” nothing more than Microsoft FUD.
Mstr E. Anderson,
Read the comment above. You’re right. Bill Gates is paying me hundreds of thousands of dollars to spread MS FUD and propaganda. Jobs and company just don’t pay as well which is why I didn’t praise them.
and
At 11/12/2007 01:30:00 AM, said…
This blog defines randomness in all it’s vapid glory. You may just as well have posted with a headline “Concrete Versus Wood fence Posts” In fact you could have just left it at the title and forgotten about the rest – there’s just nothing there; no explanation, no insight, no nothing….
Web waster.
To my dear anonymous,
You’re anger is displaced. You spent 2.5 hours actively surfing through my archives. What’s that say about you.
Perhaps I’ll update this later on and share more feedback. We’ll have to see what happens.
Big Brother In The Office
I find this sort of thing to be very troubling. I understand why companies try to protect themselves and I cannot say that I disagree with it….in concept. But there is a line that can be crossed and that bothers me.
“What I’m looking for is not so much someone sending out something intentional or volumes of info” inappropriately leaving the hospital, she says. “I’m looking at, is this a legitimate recipient?” Maybe an e-mail address was mistyped, for example, or one too many people was copied in on a spreadsheet with patient account numbers.
Such careful oversight is becoming more common. Many organizations, fearful that inside information can slip out through innumerable digital avenues, now govern precisely what employees can or cannot put into e-mails, instant messages, Web postings and even offline documents. But employers can’t hold their workers’ hands all the time — so they’re increasingly turning to software that tries to do it for them.
Offices have had strong computer controls for years, from inbound protections like antivirus programs to filtering technologies that block porn or Web e-mail sites. This new generation of software sticks its nose into even more of what people do all day.
For example, one communications-control vendor, Orchestria Corp., says its software could have prevented the CEO of Whole Foods Market Inc. from posting the rival-denigrating comments on Internet message boards that he later came to regret.
How so? Because Orchestria’s software can be set to notice when certain keywords — a competitor’s name, for example — are entered in documents or Web forms. The software can be set to block such actions or simply warn users that they’re breaking company policy.
This fine-grained, automated monitoring is moving beyond highly regulated industries like health care and financial services thanks to a spate of new rules from government and the credit-card industry. Organizations also fear customer-account data breaches, insider thefts and other public-relations nightmares.
“The driver is ethics and reputation,” says Joe Fantuzzi, CEO of Workshare Inc., whose software analyzes data-leakage risks. “Whether I’m regulated or not, I need to be seen as an ethical corporation. That affects my stock price, that affects whether customers are retained — whether there’s a leak or not.”
These messaging-compliance technologies are still young. The Radicati Group, a technology research firm, estimates the market will ring up $670 million worldwide this year and more than triple in size by 2011.
Radicati analyst Masha Khmartseva says the technologies have some problems, including a tendency to mistakenly block or hold up too many items even if nothing in them flouts corporate policies. If an innocuous message is erroneously deemed sensitive and routed through an encryption server, the recipient has to spend extra time logging in to that server to retrieve the message.
Also, systems that warn employees if it appears they are about to send something possibly untoward — say, the name of a product under development to a recipient outside the company — can produce an annoying stream of pop-up messages, Khmartseva notes.
But get used to it.
“Very soon, everything is going to be controlled,” Khmartseva said. “At least that’s the idea. We’ll see how it’s going to happen.”
Many of you are reading this blog from your office. It is quite likely that in many of those offices someone is receiving a report about your internet usage. They know where you went, when and for how long you were there.
As I mentioned above, I understand why companies want to protect themselves. I recognize their need to control information output and their desire to try and prevent employees from wasting time. Yet, there needs to be some understanding on behalf of the employee. Not everyone is trying to rob from the company. Not everyone is stealing time.
Email Aggravates Me
I have a love/hate relationship with email. I love knowing that I can reach out and click someone. I am still amazed that in a matter of seconds I can contact someone on the other side of the world and receive a response. Instant gratification. It is pretty cool.
However, it is also pretty aggravating. Instant gratification has wreaked havoc upon my ability to be patient. If I don’t hear back from someone with a reasonable amount of time I start to wonder if they received my email.
Maybe it was caught in their spam filter. Maybe my ISP went down and it wasn’t delivered. Or maybe I sent it to the wrong address. Often times it is none of those things. Email has become so prevalent a lot of people take their time to respond. The rules of the blog dictate honesty so here is my reaction to that, it aggravates me.
Last night I received a response from an email I had sent out three weeks ago. The person who sent it hasn’t been out of town. They weren’t trapped beneath a heavy object or held captive. I know because they have sent out emails to a group that I am included on. All it would have taken to mollify me would have been a short response saying that they were busy and would get back to me.
But if that is the worst thing that happens to me I suppose that I can consider myself quite lucky.
Field Test: GPS phones for kids
Want to know where your children are at. Try this:
No. No. No. You have told your tween a thousand times. You will not allow him or her to have a cell phone. Your mobile bills are high enough without adding $200 a month to let her text her friends all weekend about “Shear Genius.”But wait. Would you reconsider if the phone not only let you speak to your wandering offspring at will but also told you exactly where they were at any moment? The power to do that is at hand. All it takes is the right GPS-enabled phones and the right service plan.
Already every Disney Mobile phone is equipped to be used as a tracking device, as are most of the handsets offered by Verizon Wireless and Sprint.
The kid-finding phones on the market today plot your child’s whereabouts on a map on your phone’s screen or on your computer, offering up city, street name and sometimes landmarks such as an airport or a mall. GPS is typically accurate to within a few yards, whether your kid is at the end of the block or running away to New York City.