Categories
Writing

A Child’s Tale

Recovered from the Wayback Machine.

The purple dot lived in a land of yellow dots. Though rich of hue, it was mocked by the other dots, which caused the purple dot great sadness.

The purple dot tried to change. It sat outside in the sun for days on end, hoping to bleach itself; however, all that happened was a bad case of sunburn, so that the purple dot was blistered as well as being purple. The yellow dots laughed even harder at the poor purple dot.

One day, the Fairy Dot Mother appeared to the purple dot, saying “Purple dot, I’ve watched your sadness over the years. What can I do to help you?”

The purple dot was overcome with joy and jumped and spun about with glee. “Fairy Dot Mother”, it said. “Please, please take away my rich hue. Please make me as yellow as the other dots!”

The Fairy Dot Mother replied, “I’m sorry Purple, but your color is part of you, an inherent part of what makes you what you are. I cannot change that.”

Seeing the sadness that came over the purple dot’s face, Fairy Dot Mother hastened to add “I cannot change you…but I can give you what you wish – a home where you are surrounded by by dots the same color as you. I can send you to the Land of Purple Dots”.

“Oh, yes, please, Fairy Dot Mother!”, the purple dot shouted. “Please send me as soon as possible!”

And without a wink or a blink or the smallest tick-tock of the clock, the Fairy Dot Mother waved her wand and poof! the purple dot was in the Land of Purple Dots.

At first the purple dot was very happy, surrounded by others that were the same hue as it. No longer being laughed at. No longer standing out. No longer teased for being different, for being…

…unique.

Being unique.

Over time the purple dot found that it wasn’t so very happy being in the Land of Purple Dots as it originally thought it would be. Where before the purple dot stood out, noticeable and special – now it was just one of the crowd. And the crowd was of such a sameness. The purple dot found itself getting bored. It found that it missed the yellow dots. It missed them a lot.

At the same time, the yellow dots were finding that they missed the purple dot. Where before they thought that Purple Dot was disruptive, frightening in its difference, not pure sunny yellow like themselves; now, they realized that the purple dot added a dimension to their lives. A richness. A contrast. They regretted that they didn’t accept the purple dot for what it was and value it for it’s uniqueness.

One day, the Fairy Dot Mother appeared to the purple dot and asked “Little one, are you now happy?”

The purple dot replied, “No Fairy Dot Mother, I’m sorry, but I’m not.”

“Where before I was unique and special, now I find that I’m one of many that look and act no different then myself.” The purple dot hesitated, and then said “I miss the yellow dots.”

The Fairy Dot Mother, being wise in the way of dots, was not surprised at the purple dot’s discovery. “So Purple dot, does this mean you want to return to the yellow dots?”

The purple dot was at first surprised, and then overjoyed at the thought that it could return home. “Yes, Fairy Dot Mother!” It said. “Please return me to the yellow dots!”

And with a wink and a wiggle and a motion of a feather falling to the earth, the Fairy Dot Mother waved her wand, and the purple dot suddenly appeared amidst a sea of yellow dots, causing a great deal of shock and surprise to all involved.

When the yellow dots realized that the purple dot was back, they fell on it with joy and rolled over it with excitement. They told the purple dot they would never tease it again. And the purple dot was content.

Of course, not everything was always perfect for the purple dot within the land of yellow dots. But purple dot now knew that the best things in life are never very easy. Especially the best things that are different.

Categories
Weblogging

Jan 18 2002

Spent the day hiking in the hills north of San Francisco. Nice being away from computer for most of the day. Tomorrow, I’ll try to avoid ALL day. Just cuz there’s a phone, doesn’t mean I have to hook my computer up. Get online. Post.

However, I did want to drop one quick note: Fishrush has pulled the plug on his weblog. I hope my teasing wasn’t a contributing factor. I know that he’ll be missed.

-earlier-

ccomplished a lot this week, including giving Radio 8.0 a bit of a work out with the Burningbird Alter Ego weblog. Changed the template, added posts, deleted posts, did my best to break it – including some things I probably wasn’t supposed to do. As you can see, the weblog even has the same Burningbird distinctive look – early college dorm. I told Dave at the Alter Ego, he done good. Same to the rest of his crew.

Another shock to Dave: I agree with you. Ditto, ditto, and ditto. (And in the distance, the faint sound of one hand clapping…)

As a treat, I and Golden Girl are off and running into the wilds, touring the countryside, seeing how she does on the open road. GG can sure pile it on for a compact. We’ll see how she does on the freeways. Zoom zoom zoom!

All this is my way of saying that you have a small break from both the Burningbird and Burningbird Alter Ego weblogs, lucky buggers. In case you’re wondering where I’m going so you can avoid the highways, I’ve decided to fill GG up, see where the wind is blowing, and then follow it. So unless you’re a long long distance away, you’re not safe anywhere. Now’s a good time to check out public transportation.

After all, if we’re not here to have fun, why bother? <edit />

And while you’re creating those items, a wee bit of music to fill the quiet.

P.S. Jonathon’s kicking butt at Userland’s Buzz Sheet. Blog on, Jonathon! Give Mr. Scoble a run for the top. And who the hell is George Scriban? (Note to Userland folks – need a way to get to the person’s weblog from this page, not their referrers.) <edit />

Categories
Writing

Lots of writing

Lot’s of writing lately. Most of it has been focused on the books (RDF and Unix Power Tools, both for O’Reilly), but I have been making time to write new articles for the BurningBird Network (long overdue).

Some of the articles are technical; some are not. Of the non-technical articles, I’m writing about hiking trails in San Francisco (finally, content for NetJetter), going to Universal Studios in LaLa Land (“One Ticket, Please”), and one for the dog lovers in the crowd, “Walking Among the Dog People”. In this latter article, I’ll introduce you to Arial the Black Lab and the Shmoozing Red Dobie.

As for the technical articles, be forewarned: I am a technical anarchist. I believe, strongly, that chaos is an essential element of innovation. Yes, there are times when standards and global agreement are essential; however, there are also times when any form of organizational control inhibits rather than enhances growth. So RDF and RSS 1.0 and open source, yes; UDDI and RSS 0.93 and Passport, no. And there can be no controller within a cloud.

In the 1950’s, our reach exceeded our technical capabilities. Today, our technical capabilities are exceeding our reach; we put a half-egg with a screen attached to it on the cover of Time and call it innovation.

Blogicon item – Mike at Keep Trying mentions that we need a verb that will encompass both writing and reading blogs. We could extend to blog to mean both read and write a weblog. What think? Other suggestions?

<edit > I forgot to mention that the articles discussed above will go live January 25th. As a form of discipline (discipline, what’s that?), I’m going to a semi-monthly publishing schedule at Burning Bird Network – publishing new content (and there will be new content) on the second and fourth Friday of every month. This will, hopefully, keep the spider webs from forming over my content. </edit>

<edit> Jonathon caught my ba-a-a-d use of markup. To mark newly added content, use opening and closing <edit> </edit> tags; for removing content, replace it with the empty tag: <edit />
</edit>

Categories
Technology

Love and Kisses, Bill

Love and Kisses, Bill

[1/17/2002 11:52:40 AM | Shelley Powers] Bill Gates sent an email (copy at the Register) about how the company is going to have to get tougher on security. I stole a copy of it from the Register to present here, along with my own crystal ball interpretation (not actual fact, you understand) of how the memo looked with edits (which I’ll probably get in trouble for and have to pull so read quickly):


From: Bill Gates
Sent: Tuesday, January 15, 2002 5:22 PM
To: Microsoft and Subsidiaries: All FTE
Subject: Trustworthy computing whatever you do, don’t leak this to the press 😉

Every few years I have sent out a memo talking about the highest priority for Microsoft that keep getting leaked to the press. Two years ago, it was the kickoff of our .NET strategy. Before that, it was several memos about the importance of the Internet to our future and the ways we could make the Internet truly useful for people, which got leaked to the press (hint) . Over the last year it has become clear that ensuring .NET is a platform for Trustworthy Computing is more important than any other part of our work. If we don’t do this, people simply won’t be willing — or able — to take advantage of all the other great work we do. Trustworthy Computing is the highest priority for all the work we are doing. We must lead the industry to a whole new level of Trustworthiness in computing. And whatever we do, we must not leak this to the press (hint, hint).

When we started work on Microsoft .NET more than two years ago, we set a new direction for the company — and articulated a new way to think about our software — and found a new way to charge people lots of money. Rather than developing standalone applications and Web sites, today we’re moving towards smart clients with rich user interfaces interacting with Web services. We’re driving attempting to ownthe XML Web services standards so that systems from all vendors can share information, while working to make Windows the best client and server for this new era , and our foot firmly planted on Linux’s neck.

There is a lot of excitement about what this architecture makes possible. It allows the dreams about e-business that have been hyped over the last few years to become a reality. It enables people to collaborate in new ways, including how they read, communicate, share annotations, analyze information and meet. It provides us a new way to make a shit-load of money..

However, even more important than any of these new capabilities is the fact that it is designed from the ground up to deliver Trustworthy Computing. And if you don’t leak this line to the press, you’re all fired. What I mean by this is that customers will always be able to rely on these systems to be available and to secure their information.Big Bill is watching you….and your little doggie, too. Trustworthy Computing is computing that is as available, reliable and secure as electricity, water services and telephony. And don’t anyone mention Enron in the same breath with electricity, okay?

Today, in the developed world, we do not worry about electricity and water services being available. With telephony, we rely both on its availability and its security for conducting highly confidential business transactions without worrying that information about who we call or what we say will be compromised. Computing falls well short of this, ranging from the individual user who isn’t willing to add a new application because it might destabilize their system, to a corporation that moves slowly to embrace e-business because today’s platforms don’t make the grade. And they’re not buying Windows XP because they heard it’s buggy as hell..

The events of last year — from September’s terrorist attacks to a number of malicious and highly publicized computer viruses — reminded every one of us how important it is to ensure the integrity and security of our critical infrastructure, whether it’s the airlines or computer systems. Computing is already an important part of many people’s lives. Within ten years, it will be an integral and indispensable part of almost everything we do. Microsoft and the computer industry will only succeed in that world if CIOs, consumers and everyone else sees that Microsoft has created a platform for Trustworthy Computing. Me: I didn’t need to add anything to this one for it to creep me out.

Every week there are reports of newly discovered security problems in all kinds of software, from individual applications and services to Windows, Linux, Unix and other platforms. We have done a great job of having teams work around the clock to deliver security fixes for any problems that arise. Our responsiveness has been unmatched no one else creates such buggy software — but as an industry leader we can and must do better. Our new design approaches need to dramatically reduce the number of such issues that come up in the software that Microsoft, its partners and its customers create. We need to make it automatic for customers to get the benefits of these fixes. We must scare people into letting us in to their systems.. Eventually, our software should be so fundamentally securepervasive that customers can’t hide from it never even worry about it.

No Trustworthy Computing platform exists today. It is only in the context of the basic redesign we have done around .NET that we can achieve this. The key design decisions we made around .NET include the advances we need to deliver on this vision. Visual Studio .NET is the first multi-language tool that is optimized for the creation of secure code, so it is a key foundation element. We want people to feel that they have to have .NET or their computers will turn to green goo.

I’ve spent the past few months working with Craig Mundie’s group and others across the company to define what achieving Trustworthy Computing will entail, and to focus our efforts on building trust into every one of our products and services. Key aspects include:

Availability: Our products should always be available when our customers need them. System outages should become a thing of the past because of a software architecture that supports redundancy and automatic recovery. Self-management should allow for service resumption without user intervention in almost every case.

Security: The data our software and services store on behalf of our customers should be protected from harm and used or modified only in appropriate ways to be decided by us, of course. Security models should be easy for developers to understand and build into their applications using our tools and technologies, of course.

Privacy: Users should be in control of how their data is used * giggle, snort *. Policies for information use should be clear to the user represented by a sharp and quick eyed lawyer. Users should be kept out of in control of when and if they receive information to make best use of their time. It should be easy for users to specify appropriate use of their information including controlling the use of email they send.

Trustworthiness is a much broader concept than security, and winning our customers’ trust involves more than just fixing bugs and achieving “five-nines” availability. It’s a fundamental challenge that spans the entire computing ecosystem, from individual chips all the way to global Internet services. It’s about smart software, services and industry-wide cooperation. It’s about us achieving world domination, which we won’t if people keep hearing about these damn security leaks..

There are many changes Microsoft needs to make as a company to ensure and keep our customers’ trust at every level – from the way we develop software, to our support efforts, to our operational and business practices. As software has become ever more complex, interdependent and interconnected, our reputation as a company has in turn become more vulnerable. We’re getting hammered boys and girls, and this is really tweaking my nose. Flaws in a single Microsoft product, service or policy not only affect the quality of our platform and services overall, but also our customers’ view of us as a company. Which kind of sucks at this time.

In recent months, we’ve stepped up programs and services that help us create better software and increase security for our customers. Last fall, we launched the Strategic Technology Protection Program, making software like IIS and Windows .NET Server secure by default, and educating our customers on how to get — and stay — secure. Ooo. That sound’s good. Make sure you leak that one. The error-reporting features built into Office XP and Windows XP are giving us a clear view of how to raise the level of reliability. We know what our customers are doing at all times now.. The Office team is focused on training and processes that will anticipate and prevent security problems. In December, the Visual Studio .NET team conducted a comprehensive review of every aspect of their product for potential security issues. We will be looking for scapegoats conducting similarly intensive reviews in the Windows division and throughout the company in the coming months.

At the same time, we’re in the process of brainwashing training all our developers in the latest secure coding techniques. We’ve also published books like “Writing Secure Code,” by Michael Howard and David LeBlanc, which includes subliminal messages that open source is evil gives all developers the tools they need to build secure software from the ground up. In addition, we must have even more highly trained sales, service and support people, along with offerings such as security assessments and broad security solutions. I encourage everyone at Microsoft to look at what we’ve done so far and think about how they can contribute.

But we need to go much further if we’re going to own the world.

In the past, we’ve made our software and services more required by compelling for users by adding new features and functionality, and by making our platform richly proprietaryextensible. We’ve done a terrific job at that, but all those great features won’t matter unless customers buy trust our software. So now, when we face a choice between adding features and resolving security issues, we need to choose making money security. Our products should emphasize security right out of the box, and we must constantly refine and improve that security as threats evolve. A good example of this is the changes we made in Outlook to avoid email borne viruses. If we discover a risk that a feature could compromise someone’s privacy, that problem gets solved first. If there is any way we can better protect our butts important data and minimize downtime, we should focus on this. These principles should apply at every stage of the development cycle of every kind of software we create, from operating systems and desktop applications to global Web services.

Going forward, we must develop technologies and policies that help businesses better manage ever larger networks of PCs, servers and other intelligent devices, knowing that their critical business systems are safe from harm and safely in out grasping little hands. Systems will have to become self-managing and inherently resilient and ours, all ours. We need to prepare now for the kind of software that will make this happen, and we must be the kind of company that people can rely on to deliver it or else.

This priority touches on all the software work we do. By delivering on Trustworthy Computing , customers will get dramatically more value out of our advances than they have in the past. The challenge here is one that Microsoft is uniquely suited to solve. This is for internal use only, you understand. Whatever you do, don’t leak this to the press 😉 * wink *

Bill The First

Categories
Weblogging

Sneak peek at Radio

I thought I would sneak a peek at Radio 8.0 while Dave was at InfoWorld, but he caught me.

Aside from one REALLY unfortunate mistake, made because I got a little too adventurous a little too quickly, Radio 8.0 is very usable. And the one mistake was more my recklessness than the tool. Just playing around, going “Hmmm. If I did this, what would happen?”

Fortune favors the brave and the reckless – but not in marriage, in a car, or on a computer.