A view of the world from my own unique perspective

Archive for the ‘Technology’ Category

The Porch

One of the longstanding criticisms of social media is that there seems to be a dearth of critical thinking, both in the posts and and in the comments. I agree, and after wasting many hours browsing my Facebook news feed, I now understand why.

At the risk of sounding polarizing, I’ve noticed that most posts fall into one of two categories: they either appeal to our intellect, or to our emotions. Unfortunately, it’s not a 50/50 split – the vast majority of what I see is designed to elicit an emotional response, rather than convey information. Whether it’s tugging at our heartstrings, appealing to our nurturing instincts, or evoking a sense of nostalgia, when we are emotionally engaged, our critical thinking skills seem to fade away.

Here is a recent post from my Facebook news feed:

Front Porch

This is a lovely photo, with a heartfelt sentiment. For those of us of a certain age, it’s obvious that this photo takes a direct aim at our collective sense of nostalgia. In a society where everyone is staring incessantly at their phone, and few of us even know the names of our neighbours, who wouldn’t long for a return to a simpler time, free of these modern, inward-looking distractions? Neighbours walking down the street would see you sitting on your porch, and then stop by to chat, while you offer them a glass of lemonade. This is also a magnificent porch, large enough for a family and a few neighbours, in a serene, pastoral setting. This photo, to me, symbolizes Norman Rockwell’s America – a happier, stress-free time, when people understood the importance of forging relationships. However, before you are tempted to like or share this photo, let’s examine it with a critical eye.

First, let’s look at the obvious errors in the description. This isn’t a front porch, it’s a backyard porch. A front porch would have a walkway adjacent to it. In order to see your neighbours, it should be also visible from the road. This porch looks like it’s in someone’s backyard. Personally, I wouldn’t recommend walking onto someone’s property and suddenly appearing unannounced at their back porch… in fact, in some states, this might even get you shot!

Next, let’s examine the statement itself, which employs a Field Of Dreams sentiment “If you build it, they will come“. It’s a lovely intention, but building more porches will not change society. In fact, a little research will uncover the events that led to changes in residential architecture and the disappearance of porches.


The Gradual Disappearance of the Front Porch

Cars: According to Renee Kahn, author of the book Preserving Porches, cars are to blame for the demise of front porches “The front porch was no longer an idyllic setting where one could relax and commune with nature” for the “exhaust fumes and the noise of a steady stream of cars and trucks had rendered it inhospitable and unhealthy.

Air Conditioning: Danielle Keperling, in an article entitled Historic Porches: Their Evolution, History and Significance, suggests that the air conditioner was a catalyst of their decline, especially in the southern states, since one no longer needed to go outdoors in order to stay cool on a sweltering day.

Vintage Radio

Radio: The front porch used to be the focal point of the evening’s entertainment for many families. After the radio became commonplace, family members could entertain themselves indoors, listening to a wide variety of radio programmes.

Vintage Television-720

Television: The increasing popularity of television sealed the demise of the front porch, by shifting the entertainment indoors. According to the book Swinging in Place: Porch Life in Southern Culture, Americans watch about 1,000 hours of television each year, and combined with air conditioning, the family’s evening entertainment is now firmly entrenched in the living room.

These technologies eventually influenced the architecture. After the entertainment moved indoors, people no longer needed a a house with a front porch, and fewer home builders were including them. Technology not only moved the family indoors, but also changed the way we interact from person-person to person-machine. House designs were merely a response to this technological and social change.

Home Theatre-720

Even if we could resurrect the front porch, it won’t change anything. In addition to television and radio, we now have DVDs, home theatres, video games and computers to keep us indoors and interacting with machines instead of people. During the past two generations, our neighbourhood networking has also deteriorated to the point where many of us aren’t well-acquainted (or in some cases, don’t even know) the people on our street, or even our our next-door neighbours. This makes serendipitous foot traffic highly unlikely.

The porch photo is still a lovely sentiment, but it’s just not going to happen. Technology has changed moved our entertainment indoors, changed the way we interact with our neighbours and ultimately, influenced house design. Unless we can rid ourselves of these distractions and spend more time interacting with people face-to-face, then the front porch will remain a wistful memory.




The Apollo Code Redundancy Speculation

About 12-15 years ago, some friends and I were discussing Moore’s Law, but from a slightly different angle. While we’ve enjoyed exponential increases in computer memory memory and storage space over the past couple of decades, we were nevertheless impressed by the programmers of the early personal computers. They were able to write useful programs and very enjoyable games that were less than 64K in size. I don’t think that any of today’s programmers would have the talent or resourcefulness to do something like that now – packing that much functionality into such a small space requires not only proficiency in a low-level programming language, but also an intimate knowledge of the computer hardware itself (along with its limitations and idiosyncrasies).

Mission Control Console

Apollo Mission Control Center

One of us then took the comparison a step further and said “What about the Apollo engineers during the 1960s? They had even less memory, and their code had to send men to the moon and back!”. Another friend added “Did you know that 90% of the computer code used during the Apollo missions was redundant? Only 10% of the the code was needed to run the computer – the rest was used for error checking and to ensure that the computers never crashed”.

Windows BSODI can usually identify an urban legend or a hoax fairly quickly, but this one – despite the lack of references or source material – actually sounded plausible. The thought of a computer miscalculation, crash, or the Apollo equivalent of the dreaded Microsoft Windows BSoD (Blue Screen of Death) would be simply terrifying! It seemed reasonable to me that the Apollo engineers would add as much extra error-trapping code as necessary to ensure that the onboard computers never crashed.

So I filed that story away in the back of my mind as something that would likely remain one of life’s great mysteries.


Fast forward to July, 2017. I was attending the American Mensa Annual Gathering, and deciding which lecture to see next. There are typically 6-7 simultaneous lecture streams, and naturally, I think they’re all interesting; it’s exceedingly difficult to settle on just one. For the 10:30 a.m. slot, I finally decided to go with the one billed as “A Behind-The-Scenes Look at the Apollo Moon Landing“. The lecturer was Martha Lemasters, who was a member of IBM’s Launch Support Team as a PR writer during the Apollo missions (IBM was a NASA contractor). After the end of the Apollo program, she worked on the Skylab and Soyuz programs.

Lemasters Lecture

Martha Lemasters’ Mensa lecture.

Lemasters had also written a book about her time at IBM, called The Step: One Woman’s Journey to Finding her Own Happiness and Success During the Apollo Space Program. Her engaging, 75-minute presentation included numerous facts and trivia about NASA and the Apollo missions, stories about her job and the working conditions, excerpts from her book, and a slide presentation filled with photos that I had never seen before. The room full of Mensa members enjoyed themselves thoroughly. Lemasters is a natural storyteller, and she effortlessly took the audience with her on a journey back in time, to a challenging, fast-paced working environment, but also one that may seem insufferably chauvinistic by today’s standards. For example: women were not allowed to wear dresses on the launch platform because it would be too much of a distraction for their male coworkers. Of course, that’s not quite how NASA phrased it – they said that dresses were a “safety hazard” because a distracted male working on an elevated platform might drop a wrench and injure someone working below.

Personally, I found this directive puzzling: IBM employs only intelligent, educated, ambitious, disciplined and professional people – the best of the best. Surely these men wouldn’t be reduced to salivating teenagers at the sight of a woman in a dress.

Lemasters finished her presentation with a Q&A session, which was an unexpected surprise and a wonderful opportunity – a chance to speak with someone who actually worked on the Apollo mission and who was embedded with its engineers. As she pointed out during her lecture “There aren’t too many Apollo veterans left”. I raised my hand, recited my friend’s claim about the redundant computer code, and asked her if this was actually true.

Unfortunately, she didn’t know the answer. Now most presenters, when faced with a similar question, would simply say that they don’t know, and then move on. However, she then did something that really impressed me. She replied that she didn’t know the answer herself, since she didn’t work directly with the computer systems. However, she added that she still keeps in touch with many of the engineers on the Apollo project, and that if I’d like to write down my question and give her my e-mail address, she’ll forward my question to them.

Well, this was much more than I could have hoped for! I never thought that the redundant code story would ever be verified, and now my question was about to be forwarded right to the source – engineers and programmers who actually worked on Apollo 11 (the first moon landing)!

A few days later, I received e-mail messages from Martha Lemasters, and two former Apollo Mission veterans, James Handley and Kenneth Clark (both of whom Lemasters described as “geniuses”). They not only answered my question, but were kind enough to send several e-mail messages over the next few days, containing an incredible amount of detail. I was impressed with the amount of information they provided, and also astounded that they were able to recall these technical details so vividly after almost half a century.


James Handley was in charge of the design and programming effort for the SLCC (Saturn Ground Computer Launch Checkout System) in Huntsville, Alabama, and then transferred to the Kennedy Space Center in Florida, to oversee the installation and maintenance of the software. Using one the first IBM 360 mainframe computers, Handley and his team developed the SIRS (Saturn Information Management System), a workload management system. He also headed the NASA Flight Crew Training Directorate contract. Handley eventually managed a staff of 90, and was responsible for all Saturn programming efforts, the facility computer, and all new business activities. Later in his career, Handley worked on the design, development and installation of the Space Shuttle Ground Checkout System.

Kenneth Clark summarized his role in the Apollo / Saturn project as follows: “I was a programmer and launch team member for IBM’s part of the project at the KSC (Kennedy Space Center). My earliest job was writing programs to check out the Saturn IB & V launch vehicles. I later became a member of the launch team and the ‘go to’ guy for anything bad that happened to the software in the Ground Launch Computers (RCA 110As). Later I was the leader of the design / development team for the Space Shuttle Launch Processing System.”

NASA Code Redundancy – The Real Story

Here is their response, pieced together from our e-mail conversations:

The Launch Vehicle Digital Computer (LVDC), made by IBM in Owego NY, was called a Triple Modular Redundant (TMR) computer. That meant that the guidance equations (or code) were simultaneously being solved by three different circuits then compared and voted on so if there was a single point failure in the computer, two answers would agree and the third would be discarded. This was done to achieve the close to the 100% reliability desired. So this meant the computer was like three computers plus circuits to compare. On the issue of code redundancy I think there was only one set of code in the computer and the TMR logic all operated on that set of code. Therefore the code itself was not replicated, although I think there were checks and balances in the code also but I don’t think the 10% vs 90% is true.

The term “code redundant” implies that there is code that recomputes a value for which the answer is known, in order to verify correctness. There were two Apollo Guidance Computers in the spacecraft. One in the Command Module and one in the Lunar Module. I doubt there was any of that in the flight computers and know for a fact there was none in the ground computers. The Launch Vehicle Digital Computer used Triple Modular Redundancy (TMR) logic, but I don’t believe the code was replicated. The Saturn Ground Launch Computers were not TMR. However the Mobile Launcher Computer did contain redundant set of code which was switched to if the primary memory encountered a parity error, or if there was a no instruction alarm during execution.

On the subject of error checking, not even close to 90% of the code would be allocated to that task. The amount of memory in any of the computers made it absolutely impossible for there to be much if any code in the computers to be used for error checking. During the Apollo era memory was big, bulky, and most of all, heavy. They just couldn’t afford to launch much of it. Having redundant code would require redundant memory. The error checking that existed was to determine if an operation requested or commanded by a program completed successfully. There were some checks even in the Lunar Lander to report on unexpected errors. An example of this was the Lunar Module program alarms minutes into the landing sequence (Error codes 1201 & 1202).

The memory used in the computers was mostly magnetic core. Here are some examples of the memory sizes used in the computers:

  • Saturn Ground Launch Computers (RCA 110A) – 32 K 24-bit words + 1 parity bit
  • Instrument Unit Launch Vehicle Digital Computer – 32 K 28-bit words including 2 parity bits
  • Apollo Guidance Computers — 2048 K words of erasable magnetic core memory and 36 K 16-bit words of read-only core rope memory.
Apollo Guidance Computer

Apollo Guidance Computer

The Space Shuttle Program carried redundancy to the ultimate level. The computers on the Space Shuttle were AP-101s manufactured in Owego by IBM. They were called the Space Shuttle General Purpose Computers or GPCs for short. There were five GPCs on board the Space Shuttle. During launch, four of the GPCs were executing 100% redundant code programmed by IBM Houston. Each output from this “Redundant Set” was voted by hardware logic. If one of the computers came up with a different answer it was voted out by the hardware. The fifth computer was running software programmed by MIT Labs. The backup flight computer could take over if the “Redundant Set” experienced multiple failures or some other failure took out the “Redundant Set”.

There you have it, right from the source. An urban legend debunked with a mixture of curiosity, serendipity and the graciousness of some people who actually worked on NASA’s Apollo mission. Thank you so much Martha Lemasters, Kenneth Clark and James Handley!



The Hidden Life Lesson In The Shawshank Redemption

So oftentimes it happens that we live our lives in chains, and we never even know we have the key.” – The Eagles, Already Gone


I thought that The Shawshank Redemption was an outstanding movie – not just for the story or the acting, but for the subtle, yet profound message that it delivered to the audience.

I wanted to discuss this allegory a little further, so I decided to take an informal poll among my friends. Most of them have seen The Shawshank Redemption – some multiple times – and all of them told me that they enjoyed it immensely. However, when I asked them what they got out of the movie, no one extracted the same life lesson that I did. However, I saw this as a good thing; I could now argue that The Shawshank Redemption is a work of art, since art affects different people in different ways.


If you’ve never seen The Shawshank Redemption, then stop reading this blog post and watch it now. Get what you can from it and then come back. If you’ve already seen the film, then I’d like to encourage you to watch it one more time – but first allow me to tell you what I gained from it, after viewing it from (what else) The Bob Angle.

As I’m sure you recall, one of the characters, Brooks Hatlen, is released from prison after completing his sentence. Unfortunately, after being in prison for 50 years, he is unable to adjust to society again and eventually commits suicide by hanging himself.

Before his sentence Brooks was able to function fairly well in society… except, of course, for his inability to stay on the right side of the law. So what happened to his ability to cope? The answer is: Brooks’ universe shrank. While he was serving his sentence, his universe slowly started to contract, and eventually the prison walls functioned as the boundaries of his new existence. For all intents and purposes, there was nothing – or at least nothing attainable by Brooks – beyond those walls. Once his sentence was over and he was forcibly pushed past those boundaries and into the universe that we inhabit, life became too much for him to bear.

The lesson, as I see it, is this: The more boundaries there are in your life, the smaller your universe becomes. While you may be content living a circumscribed existence, you will not be able to see and enjoy all that life has to offer.

At this point, you may be thinking “I’m sorry, but this doesn’t apply to me. I’m not living inside a prison, real or self-imposed. I function well in society and there are no boundaries whatsoever in my life!

Are you sure? I’d like to propose to you that your universe is also shrinking. Not through any physical constraints such as the prison walls in the movie, but by barriers that you have unwittingly created yourself. Most of us have invisible boundaries in our lives, and we aren’t even aware of the limitations that they are imposing on us. Let me give you a few examples:


The Transportation Universe

First of all, I must admit that I am also susceptible to these boundaries. Before I bought my first car, I used to take the bus everywhere, and began to know most of the bus routes in the city. Shortly after getting my car, I was driving to the grocery store and, without even thinking about it, I took the same route as the bus (which wasn’t the fastest or most direct way to get there). Midway through my journey I suddenly exclaimed out loud “What am I doing? Why am I driving on this street? I have a car now – I can drive on any street I like!


Years of riding the bus had made me assume that the only way to get from Point A to Point B was by travelling along the bus routes. All of the other roads in the city were purged from my consciousness. My transportation universe had shrunk, and I hadn’t even noticed.


The Employment Universe

internal-applicantsYears ago, I had a contract job working at a government ministry. One day, my manager confided to me that he wasn’t really happy in his job, but couldn’t identify another position within the ministry where he would be happy. So I helpfully suggested that he should consider extending his search to the private sector, which was where I was working previously. He had been working in the Ministry for so long that his employment universe was limited not only to the public sector, but to a single ministry within it. It never occurred to him to look beyond it.


The Culinary Universe

When you go grocery shopping, how many items are on your list? Probably 20-30. During an average month, that list may vary and you might buy 40-50 different items. If you buy groceries fro your entire family, then you might buy 80 different items each month. How many items do you think an average-sized supermarket stocks? The answer I found online is: 50,000 different SKUs. You can choose from 50,000 different items, yet you buy only 50-80 different items each month, and likely the same ones month after month. Even if you bought 100 different items each month, that’s still only 0.2% of the store’s inventory. Think about that for a second – when you walk into a supermarket, you are deliberately ignoring 99.8% of the merchandise. Nobody is forcing you to do it. This, too, is your own self-imposed limitation.



The Digital Universe

If you’re a software developer and you want to spruce up your application, the best way to do this is to ask for suggestions from someone outside your company – preferably, someone who’s never used the software before. In my experience, the best and most innovative ideas come from new employees. This sounds counter-intuitive, but it actually makes perfect sense.

I’ve written software, and after a while, you become so intimately familiar with the code that it feels as though you’re actually living inside the application. Each screen is a different room. However, just like Brooks Hatlen, the software slowly begins to impose its own barriers. Over time, my ideas become less grandiose and are eventually limited to minor enhancements or bug fixes. I no longer consider radical changes or bold, new directions. The code has become my prison, yet I am blissfully unaware of it.

New employees (or new users) have no such boundaries, and aren’t afraid to ask “Why don’t we do it this way?” or “Wouldn’t this approach be more intuitive?“.

Back in 2006, Microsoft developers were considering making the Windows Vista startup sound mandatory. Predictably, users were not too enthused with this loss of control. However, Steve Ball, Microsoft’s Group Program Manager for Vista, was unrepentant. When asked why he was imposing his will on the users, he explained that the startup sound was actually “A spiritual side of the branding experience. A short, brief, positive confirmation that your machine is now conscious and ready to react. You can turn on your Vista machine, go eat some cereal, while your machine is cold booting and then this gentle sound will come out telling you that you can log in.


What Ball didn’t consider were the myriad real-world situations in which any sound is not desirable. For example, if you’re studying for an exam in your university library, the last thing you need is to have your train of thought broken by a Windows startup sound every time a student turns on their laptop. This is obvious to everyone, except the Windows Vista developers, since their universe has become constrained.


The Twitterverse

Finally, there’s Twitter, which irks me because of its 140-character limit. Now, you’re probably thinking “Wait a minute – that’s Twitter’s limitation, not mine!” Actually it is our limitation because of our tacit acceptance of this limit. When we’re composing a tweet and we’re approaching 140 characters, we never think that there’s something wrong with the design of Twitter – we just assume that our thoughts need to be edited. In my opinion, there shouldn’t be a limit on the complexity of our thoughts and ideas. We shouldn’t have to force them to fit inside a ridiculously small container. Yet we do, and we don’t question it.

Imagine that you are an art gallery curator, and that your gallery has recently acquired an previously-unknown Old Master, discovered (sans frame) at a garage sale. When the painting arrives, you realize that it’s larger than you thought, and that the frame you selected for it is too small. What do you do? Buy a larger frame, or take a pair of scissors to the painting to ensure that it fits inside your container?


The Shawshank Redemption is a remarkable movie, because it illustrated (to me, anyway) that we are all, to varying degrees, living a circumscribed existence. These invisible boundaries have placed you inside a prison of your own construction, yet until this moment, you were probably blissfully unaware of it. Now, by making you aware of just a few of these constraints, you now have a choice: you can continue accepting or even ignoring these limitations, or you can identify and break down your boundaries, break out of your own personal Shawshank State Penitentiary, and start flourishing in your new, unbounded universe.


A Record Library In The Palm Of Your Hand

As part of my ongoing effort to practise mindfulness (formerly known as stopping to smell the proverbial roses), I often take time to look around and ponder the many advances in technology – not inter-generational transformations, but ones that have occurred during my own lifetime. Since change happens slowly and often imperceptibly, we may not always be aware of the dramatic advances that have occurred since our childhood.

I’m sure that most of your are familiar with Moore’s Law: In 1965, Gordon Moore, the co-founder of Intel, predicted that the number of transistors on an integrated circuit would double every two years. As it turns out, Moore’s forecast has been fairly accurate since 1965, and has also been applied to digital storage capacity. Moore’s Law is often quoted in computer magazines when a columnist tries to predict what computers may be capable of in the not-too-distant future.


256gb-usb-driveA few weeks ago, I was browsing through Amazon.com, and saw some USB thumb drives that had a capacity of 256GB. I suppose I shouldn’t be surprised by this, since I’ve known about Moore’s Law since the 1980s, but I was still stunned by the exponential increases in digital storage capacity.

When I was in university during the mid-1980s, I volunteered at the campus radio station. During my first year I was a disc jockey, and I had my own two-hour, weekly show. Back then, they were still playing vinyl LPs and singles, since compact discs – which had just been released – were still prohibitively expensive.

The radio station’s record library was a sight to behold – it took up an entire (fairly large) room. The other, more senior disc jockeys told me that this library contained approximately 5,000 LPs, which was larger than the libraries at most commercial radio stations. Unfortunately, I don’t have any pictures of it, but here is a similarly-sized record library:


As a teenager, I felt as if I had died and gone to music heaven; everything I could think of was in that room. There were more albums than I could possibly listen to, and new music arrived almost weekly. Unfortunately, no one – not the disc jockeys or even the station management – was allowed to borrow any of the albums or remove them from the building. However, there was one exception: if we were supplying the music for a campus pub event, then the DJs would carry two or three milk cartons full of LPs to the pub and back.

At the time, it seemed like there was more music than I could possibly listen to in a lifetime, but how much music was in that record library? If I listened to one album per day, it would take me over 13.5 years to listen to those 5,000 albums.

Today, of course, most of us listen to our music as MP3 files, and the size of our music collection is often expressed in megabytes (or gigabytes), instead of the number of albums we own. This got me thinking… if I were able to digitize the campus radio station’s entire record library, how much disk space would I need?

In order to simplify the calculations, I’ll have to start with a couple of assumptions:

  • Songs vary greatly in length, so rather than use the average number of songs (10-12) on a typical LP, I decided that a more accurate measurement would be the actual playing time of an LP. According to this source, a typical LP contains between 18-21 minutes of music per side, or 36-42 minutes per disk.
  • I encode my MP3s at a variable bit rate, averaging 128-136 kbps, which works out to just under one megabyte per minute of music. So let’s round up and assume that each megabyte of an MP3 file contains exactly one minute of music.

Therefore, the size of a typical vinyl record will be between 36-42 megabytes. The average value in this range is 39 MB, but I want to be really conservative in my calculations so I’m going to assume that every LP in the station’s record library contained a full 42 minutes of music. Therefore, each album (digitized as a 128 kpbs MP3) will be 42 megabytes.

Multiply 42 MB by the 5,000 albums in the record library, and we get: 42 x 5,000 = 210,000 megabytes or 210 gigabytes.


How Much is a Gigabyte?

This may seem like a ridiculously easy question: a gigabyte is one billion bytes, isn’t it? Well, yes and no… it depends on whom you ask. When you buy hard drives or USB drives, the manufacturers advertise 1 MB or 1 GB as exactly one million or 1 billion characters of storage, respectively. This seems logical, for those of us who grew up with the metric system, but to computer geeks, this isn’t quite accurate. In the computer world, the kilo or “k” prefix is actually 1,024 bytes (two to the tenth power), and not 1,000. This may not seem like much of a difference, but watch what happens when we start scaling upwards:

One megabyte is: 1024 x 1024 = 1,048,576 characters
One gigabtye is: 1024 x 1024 x 1024 = 1,073,741,824 characters
210 gigabytes is: 225,485,783,040 characters

Therefore, the radio station’s music library – that entire room full of vinyl albums – can easily fit onto one of those 256 GB USB drives… with room for an additional 704 albums!

Finally, if that isn’t enough to boggle your mind, consider this: thumb drives aren’t the only available format – there are now SD cards and MicroSD cards with the same 256GB capacity. Behold:


Music that once filled every nook and cranny of an entire (fairly large) room now fits not only in your hand, but on the tip of your finger. This isn’t a comparison from an antiquated 1950s textbook; this colossal miniaturization happened during our lifetime, and is still continuing.

Financial planners try to impress us with what they call “the magic of compound interest” (which I don’t think is particularly magical at all – it’s just simple math). Now compare the annual growth of compound interest to the technological advances predicted by Moore’s Law, and after a couple of decades, you will also be astounded.

This is one example of mindfulness. Incredible things are happening all around us; it’s easy to be awed by your own existence by simply pausing and paying attention.



The Return Of The Scarlet Letter

When I was in university, one of the books in my American Literature course was The Scarlet Letter, by Nathaniel Hawthorne. I enjoyed it, but until recently, I didn’t recognize the brilliance of the novel or see just how prescient Nathaniel Hawthorne was.

I’m sure that you’re familiar with The Scarlet Letter, since it’s on just about every English teacher’s reading list, but if it’s been a while since you’ve read it, allow me to refresh your memory.

Scarlet Letter Book CoverThe story takes place in Boston, in 1642. At the time, the city’s citizens were known as Puritans. The Puritans were a group of Protestants who felt that the Church of England had not distanced itself enough from the Church of Rome, and hence wanted to purify the Church of England by ridding it of all traces of Roman Catholicism. They demanded a very strict code of conduct, and by today’s standards they would be considered fundamentalists, or even extremists.

The book’s main character, Hester Prynne, has been charged with committing adultery. After being found guilty, her punishment is prison time, and afterwards, being required to wear a scarlet letter “A” prominently on her dress. This sentence was considered especially light, since adulterers under Puritan law are usually branded or put to death. Although it isn’t stated explicitly in the book, the “A” stands for adulteress, and wearing it in public is meant to shame Hester in front of the townspeople. Since Hester has refused to name the man involved, she must bear this shame alone.

During this course, we discussed the meaning of the letter “A”. The obvious interpretation was that it stood for adulteress, but our professor encouraged us to dig deeper and come up with additional meanings. We reasoned that it could also stand for angel, since Prynne always maintained a regal bearing, and able because Prynne demonstrated that was able to live life on her own terms, without the assistance of a man. Our professor then added his own personal interpretation: America. The letter, or at least the laws that led to its display on Hester Prynne’s dress, symbolized American culture at the time.

As I was making my way through the book, I thought that this tale was just a quaint glimpse into a long-forgotten Puritanical existence. I was glad that our modern, progressive society, now largely free of its ecclesiastical manacles, no longer behaves so sanctimoniously, and that we were now well beyond such pettiness and overt derision.

As it turns out, I spoke too soon… during the past generation, I’ve noticed a resurgence of these Puritanical practices in our society. I am now witnessing what I am going to call “The Return of the Scarlet Letter”. Much like a neighbourhood of anti-vaxxers, suddenly faced with a new outbreak of a long-vanquished disease, many people are now behaving in a manner from which I assumed we had all evolved. This unabashed schadenfreude – something I thought was beneath us as a society – is returning with a vengeance, thanks to social media.

With each passing year, it appears that we are becoming more like our judgmental 17th century predecessors. Allow me to share some of my observations:


A Sign Of The Crimes

The first “signs” of a behavioural shift began before the advent of social media. From time to time, I would read an article about a judge who meted out an unconventional punishment to a petty thief or a misbehaving teenager. In lieu of a criminal record or jail time, the guilty party would have to stand in public beside a large sign that described their transgression.

Shaming Sign 2


Before long, parents started mimicking these judges and delivering a similar punishment to their errant teenagers.

Shaming Sign 3


Shaming via E-Mail Forwarding

I then noticed that e-mail was no longer being used solely as a business and communication tool. It was now wielded as a weapon and used to ridicule others. Some infamous early examples were Claire Swire, Peter Chung, Lucy Gao and Aleksey Vayner.


Social Media As A Catalyst

The increase in the prevalence of online shaming coincided with the rise in popularity of social media. While social media has certainly altered – for better or for worse – the way we communicate, I believe that the anonymity of online communication allows us to revert to the holier-than-thou mindsets of those 17th century Puritans. We can become openly disapproving of others because no one can trace our comments back to us. Unlike the targets of our derision, our reputations won’t be damaged by our disparaging comments.

Soon, web sites dedicated solely to embarrassing others began to appear.

People Of Wal-Mart: There is a web site called People Of Wal-Mart that displays photos of Wal-Mart shoppers. Visitors are free to upload photos themselves and add them to the collection. I will admit that some of these photos are humourous – like the above photo of the suspicious loose candy, entitled Looks Legit”. However, as I’m sure you know, these are generally photos of people who are inappropriately dressed, who are behaving poorly, or who have substandard parenting skills. Essentially, these socially-challenged souls are put on display so that we can mock them. If that isn’t gratifying enough for us, there is now a rating system (1-10 stars) and a user comments section, so that visitors – under the identity cloak of online user names – can ridicule them even further.

Airline Passenger Shaming: If you behave poorly or selfishly on airplane, don’t be surprised if your photograph appears on the Passenger Shaming Facebook group or Instagram album. If your behaviour is particularly egregious, it may even be described in detail in newspaper articles.

Airline Passenger Shaming 1


Ashley Madison Web Site Hack

Ashley Madison CoverThese days, web sites get hacked all the time, but the Ashley Madison data breach in July 2015 was different. There were no ransom requests or any attempts at monetary gain. Its user data was made public because the hacker(s) objected to its line of business, and wanted to “out” all of Ashley Madison’s customers as part of a moral crusade against the company. Over 60 gigabytes of customer information were made public, including names, address, phone numbers and e-mail addresses.


The Police Are Now Participating

More recently (as of October 2015), the practice of public shaming is being adopted by a police department in West Virginia. Anyone caught soliciting a prostitute in the city of Huntington will have his photograph displayed on a billboard, visible from one of the city’s busiest streets.

Police Shaming 1a


Fat Shaming

In November 2015, someone from an organization called Overweight Haters Ltd. began handing out insulting cards to overweight passengers on the London subway. The cards read, in part, “It’s really not glandular, it’s your gluttony. Our organisation hates and resents fat people. We object to the enormous amount of food resources you consume while half the world starves.“.

In January 2016, after the release of Star Wars: The Force Awakens, Carrie Fisher became the target of body shaming because she no longer looked like she did in the original 1977 Star Wars movie.


What Is The New Scarlet Letter?

Scarlet Letter 1aIn my American Literature class, we suggested that Hester Prynne’s letter “A” – in addition to adulteress – might also mean angel, able and America. I think that the letter “A” is still apt when in today’s age of social media shaming. It continues to stand for adultery (as evidenced by the Ashley Madison data breach and the police billboard displaying the names of “johns”), and I would now like to propose some additional meanings:

  • Amoral: Behaviour publicized by the West Virginia police billboard, and the miscreants forced to hold signs in public describing their transgressions.
  • Airplane: An obvious one, abundantly illustrated in the Passenger Shaming Facebook group.
  • Anonymous: The anonymity of the Internet means that it is far easier for us to shame someone in cyberspace than to confront that person face-to-face.
  • Ashley: Given their motive, I’m sure that the Ashley Madison hackers would love to see every Ashley Madison customer forced to wear a large, embroidered letter “A” on their clothes, just like Hester Prynne.



The Puritans did have a harsh and antiquated form of punishment for moral crimes, but I will say this in their defense: at least Hester Prynne was limited to the scorn of her town’s inhabitants, and only of those whom she encountered in person. Today’s shaming targets are not as fortunate. Jessie Jackson is quoted as saying “The only time you should look down on a person is when you are helping them get up”, and I agree with him. Not only have we lowered ourselves to the disdainful, judgmental behaviour of the Puritans, but now thanks to the Internet, our shaming no longer has any geographical boundaries. Those who have been targeted now have to face coast-to-coast, or even global, consternation.

If it’s been a while since you’ve read The Scarlet Letter, then I urge you to re-read it. As you do, think about how you use social media and ask yourself how much our attitudes and behaviour have really evolved. Surely, we’re more enlightened and more sophisticated than the Puritans; let’s not allow these new forms of communication drag us back into the 17th century.

The No Drone Zone

On January 26, 2015, a quadcopter crashed onto the White House lawn, causing a lockdown, and renewing fears about the President’s safety. Of course, the media gleefully referred to it as a drone and included in their articles, dramatic and mildly sensationalist statements such as “this was believed to be the first time that a drone has penetrated the White House perimeter.”

Used with permission from the TPM websites, a service of TPM Media LLC.” All rights not expressly granted herein are hereby reserved.

Used with permission from the TPM websites, a service of TPM Media LLC.” All rights not expressly granted herein are hereby reserved.

As it turns out, there was nothing nefarious about the incident at all. A man called the Secret Service to admit that he was using his quadcopter recreationally, and didn’t mean for it to fly over the White House grounds.

Nevertheless, this incident has started (or perhaps rekindled) a discussion on the implementation of flying boundaries for drones. Since most drones contain a GPS, a popular solution is to load a map into the drone’s memory, and then define a number of “no fly zones”. When the drone reaches the border of one of thee zones, it will go no farther, or perhaps even fly in the opposite direction. Obviously, the entire White House property would be one of these zones, along with all restricted airspace and any other sensitive locations.

This initiative is already underway. In fact, the general public is now invited to submit locations to this No Drone Zone list by entering their address here.

At first glance, this sounds like an excellent idea, with many obvious advantages:

  • If your neighbour owns a drone and you’re worried that he might be flying it over your property and spying on you (or just simply annoy you), then you merely have to enter the GPS coordinates for each corner of your property to define the entire area as off-limits.
  • If you are a celebrity or a public figure and you’re worried that some enterprising paparazzo might fly a drone over your backyard or cottage, or maneuver a drone up the side of your high-rise condo while taking photographs or videos, then the No Drone Zone is exactly what you need.

I also like this idea, in principle, and the web site does have a FAQ that addresses many user concerns – but I also foresee a number of logistical problems that will limit its usefulness and widespread implementation. In other words, in its present form, I just don’t think it’s going to fly.

  • Let’s suppose that you’ve just bought a new house. If the previous owners set up a no-fly zone on their property, it is unlikely that they will remember to disable it. All of the activities associated with selling a house and moving its contents to a new location will likely take precedence. That means you, as a new homeowner, will have to apply to have the no-fly zone removed, and provide proof that you own the property. According to the web site’s FAQ, if you want to keep the no-fly zone in place while being allowed to fly your own drone, a fee will be charged, and you’ll have to install a piece of software in your drone.
  • No Current Business Registrations. According to the FAQ, the no-fly zone applies only to residential properties, although they promise to include businesses in the near future. As a business owner, this means that (for the time being) there is nothing to stop your competitors from flying a drone up the side of your building and taking pictures of your office and of anything visible from the windows – storyboards, marketing posters, clothing designs, engineering projects, mock-ups, prototypes or computer screens.
  • The web site FAQ states that since participation in their programme is voluntary, they can’t guarantee that establishing a no-fly zone will prevent all drones from flying over your property.
  • Drone owners must update the database regularly, and there is no incentive to do this. Most people will install Windows security updates regularly because it will protect their computer against viruses and hackers. However, I think it’s less likely that people will voluntarily update software that will impose further restrictions on their device.
  • Finally, in the United States, where one’s freedom is not only cherished but also fiercely protected, it’s unlikely that people are going to opt in to anything that limits where their drone can fly. I predict that they will be more apt to buy their drones from manufacturers who are not participating in this programme.


As promising as this initiative seems, I just can’t see a large-scale adoption. Mainly because it assumes that we are all team players who are willing to make a few small sacrifices for the common good, and who won’t act in our own self-interest. If this plan is going to work, then in my opinion, the implementation needs to be wide-ranging and far more draconian:

  • Participation by all manufacturers must be mandatory.
  • Database updates will be done wirelessly and automatically.
  • Databases will have an expiry date, after which the drone will cease to function (i.e. become “bricked”) unless the latest database version has been installed.
  • An annual license fee may be charged for recreational users, and will most certainly be implemented for any commercial use of a drone, such as a pre-paid pizza delivery service.
  • All drones and quadcopters must be registered, and the owner’s personal information must be verified before it can be activated.
  • All drones and quadcopters must have an equivalent of a MAC address, so that any airspace breaches can be traced to the owner.
  • All drones and quadcopters must have the ability to be disabled remotely.
  • Photographs and videos will be either saved to an internal SD card, or transmitted to a central database (tied to the user’s account) so that there is a record of any potential unlawful activity.

And you thought that George Orwell painted a depressing portrait of a future surveillance society… I’m not particularly enamoured by my predictions either, but this is what I see.

Yes, there will undoubtedly be a hue and cry from many enthusiasts about unnecessary government interference in what they consider a harmless hobby, but I anticipate restrictions like these in the not-too-distant future, as drones and quadcopters become more popular. They are just toys now, but in my opinion, these toys will be regulated, controlled and tracked like nothing we’ve ever seen before.

Yes, it will be interesting to see whether the No Drone Zone (in its present form) takes off or stalls.

How The Altair 8800 Changed Our Lives

Fellow Toastmasters and welcome guests,

By a show of hands, how many of your have heard of The Butterfly Effect? This is the theory that small changes in one part of the world can have significant and unexpected effects elsewhere. The example usually cited in that a butterfly flapping its wings in China, may eventually cause the formation of a storm somewhere else in the world. This speech is an example of The Butterfly Effect. I’m going to show you something that seems inconsequential, and then connect the dots and show you how it changed the world and transformed our lives.

Last month I attended the World of Commodore show. Among the many computers on display was an Altair 8800, from the early 1970s.

WoC Altair 8800

To the uninitiated, this looks like a very primitive and unimpressive machine, and certainly one that is easy to overlook. However it has an impressive history and pedigree. In fact, one could argue that this machine was the one that launched the personal computer revolution, and by extension, changed our world completely.

Altair 8800Altair 8800 Open Cover

The Altair 8800 was created by a company called Micro Instrumentation Telemetry Systems (MITS) and was introduced to the public in January 1975. It was available as a kit for $395 or fully-assembled for $650. Only 2,000 of these machines were produced. The initial version of this machine had a whopping 256 bytes of memory, and no monitor or keyboard. Its display was a series of front panel LEDs, and it was programmed using the switches below the LEDs. Some time later, MITS did offer memory expansion cards in three sizes: 1K, 2K and 3K. If you bought all three, then your Altair would have a total memory of 7K.

Altair 8800 Front Panel 1

To program the Altair, you first set your program’s starting memory location, which is typically zero. The eight LEDs circled above represent the eight bits of that memory location, or byte. Then you move these eight switches below them up or down to set each of the eight bits for that byte. When all eight switches have been set, their combined value is saved to the memory location by pressing one of the switches on the bottom row. Then you repeat the process for the next memory location. I’m sure that you can imagine how much fun programming was back in the mid-1970s.

Ed RobertsPopular Electronics Altair Cover

The founder and CEO of MITS was a man named Ed Roberts, and he developed the Altair 8800 computer, which was sold to consumers as a kit. Interest in the machine really took off when it was featured on the cover of the January 1975 issue of Popular Electronics.

Gates and AllenTwo people who happened to read this issue were Bill Gates and Paul Allen, the future co-founders of Microsoft. They wrote a letter to Ed Roberts and said that they were working on a computer language called BASIC, for the 8080 processor – the same processor that the Altair used – and asked if he would like to see a demonstration. Ed Roberts was interested, so Gates and Allen flew to the MITS office in New Mexico to meet him. The meeting went well, and Roberts hired both Allen and Gates to develop a BASIC language interpreter for the Altair.

The Altair soon became popular with hobbyists and computer clubs, including the Homebrew Computer Club in Silicon Valley. The Homebrew Computer Club held their first meetings in a Menlo Park garage, and later, as the club grew larger, at Stanford University’s Linear Accelerator Center auditorium.

Homebrew Computer Club

The members would attend these meetings to demonstrate the various computer and electronic projects they were working on.

One of Homebrew’s members was a young man named Steve Wozniak, and Wozniak was quite impressed with the Altair. In fact, he was so taken with this machine, that he was inspired to begin working on a new project. Here is a short, edited excerpt from his autobiography, iWoz (pg. 153-156), in which he describes the excitement that he felt during the Homebrew Computer Club meeting in March, 1975:

Steve WozniakAbout thirty people showed up for this first meeting in that garage in Menlo Park. They were talking about some microprocessor kit being up for sale, and they all seemed excited about it. Someone there was holding up the magazine Popular Electronics, which had a picture of a computer on the front of it. It was called the Altair… These people were really Altair enthusiasts. That night, I checked out the microprocessor data sheet, and then I realized what the Altair was… it was almost exactly like the Cream Soda Computer I’d designed five years before… it was as if my whole life has been leading up to this point. That night, this whole vision of a kind of personal computer just popped into my head. All at once, just like that“.

Wozniak immediately started work on his own computer design, which included a keyboard and a video screen, instead of LEDs and switches.

Apple I No CaseWoz Jobs

When it was completed, he demonstrated it to the other club members. Wozniak then showed it to his friend Steve Jobs, who saw it not merely as a hobbyist’s project, but as something that could be marketed to a much larger group of people. This computer eventually became the Apple I computer.

Apple I BoxApple I Case

The Apple I soon evolved into the a more polished Apple II, which (arguably) launched the personal computer industry – and our lives haven’t been the same since.

Apple II