technology

What is a socio-technical system?

From “Why a Socio-Technical System?“:

You have divined by now that a socio-technical system is a mixture of people and technology. It is, in fact, a much more complex mixture. Below, we outline many of the items that may be found in an STS. In the notes, we will make the case that many of the individual items of a socio-technical system are difficult to distinguish from each other because of their close inter-relationships.

Socio-technical systems include:

Hardware Mainframes, workstations, peripheral, connecting networks. This is the classic meaning of technology. It is hard to imagine a socio-technical system without some hardware component (though we welcome suggestions). In our above examples, the hardware is the microcomputers and their connecting wires, hubs, routers, etc.

Software Operating systems, utilities, application programs, specialized code. It is getting increasingly hard to tell the difference between software and hardware, but we expect that software is likely to be an integral part of any socio-technical system. Software (and by implication, hardware too) often incorporates social rules and organizational procedures as part of its design (e.g. optimize these parameters, ask for these data, store the data in these formats, etc.). Thus, software can serve as a stand-in for some of the factors listed below, and the incorporation of social rules into the technology can make these rules harder to see and harder to change. In the examples above, much of the software is likely to change from the emergency room to the elementary school. The software that does not change (e.g. the operating system) may have been designed more with one socio-technical system in mind (e.g. Unix was designed with an academic socio-technical system in mind). The re-use of this software in a different socio-technical system may cause problems of mismatch.

Physical surroundings. Buildings also influence and embody social rules, and their design can effect the ways that a technology is used. The manager’s office that is protected by a secretary’s office is one example; the large office suite with no walls is another. The physical environment of the military supplier and the elementary school are likely to be quite different, and some security issues may be handled by this physical environment rather than by the technology. Moving a technology that assumes one physical environment into a different environment one may cause mismatch problems.

People Individuals, groups, roles (support, training, management, line personnel, engineer, etc.), agencies. Note that we list here not just people (e.g. Mr. Jones) but roles (Mr. Jones, head of quality assurance), groups (Management staff in Quality Assurance) and agencies (The Department of Defense). In addition to his role as head of quality assurance, Mr. Jones may also have other roles (e.g. a teacher, a professional electrical engineer, etc.). The person in charge of the microcomputers in our example above may have very different roles in the different socio-technical systems, and these different roles will bring with them different responsibilities and ethical issues. Software and hardware designed assuming the kind of support one would find in a university environment may not match well with an elementary school or emergency room environment.

Procedures both official and actual, management models, reporting relationships, documentation requirements, data flow, rules & norms. Procedures describe the way things are done in an organization (or at least the official line regarding how they ought to be done). Both the official rules and their actual implementation are important in understanding a socio-technical system. In addition, there are norms about how things are done that allow organizations to work. These norms may not be specified (indeed, it might be counter-productive to specify them). But those who understand them know how to, for instance, make complaints, get a questionable part passed, and find answers to technical questions. Procedures are prime candidates to be encoded in software design.

Laws and regulations. These also are procedures like those above, but they carry special societal sanctions if the violators are caught. They might be laws regarding the protection of privacy, or regulations about the testing of chips in military use. These societal laws and regulations might be in conflict with internal procedures and rules. For instance, some companies have implicit expectations that employees will share (and probably copy) commercial software. Obviously these illegal expectations cannot be made explicit, but they can be made known.

Data and data structures. What data are collected, how they are archived, to whom they are made available, and the formats in which they are stored are all decisions that go into the design of a socio-technical system. Data archiving in an emergency room it will be quite different from that in an insurance company, and will be subject to different ethical issues too.

What is a socio-technical system? Read More »

DRM Workaround #18: HP printer cartridges

From “Cartridge Expiration Date Workarounds“:

In light of the lawsuit against Hewlett-Packard over the expiration date of their cartridges, two ways to fix the problem:

1) Remove and reinsert the battery of the printer’s memory chip

2) Preemptive: Change the parameters of the printer driver

Search for hp*.ini … In it there is a parameter something like pencheck. It is set to 0100. … Set it to 0000 in the file and save the file and REBOOT.

DRM Workaround #18: HP printer cartridges Read More »

More distribution channels = more viewers

From “NBC: iPod Boosts Prime Time“:

NBC’s “The Office” delivered a 5.1-its highest ratings ever-last Thursday among adults 18 to 49, a bump the network credits in large part to the show’s popularity as an iPod download. …

Such a connection between podcast success and broadcast ratings success is particularly significant because the NBC data is among the first available evidence of what network executives have been gambling on when striking their new media deals-that the new video platforms are additive because they provide more entry points into a show for consumers. …

NBC is confident that the iPod exposure contributed to the rise. …

The iTunes offering is bringing new audiences to the show that would not otherwise have watched, said Frederick Huntsberry, president of NBCU Television Distribution. “Consumers have choices, and we are not reaching all consumers with one technology,” he said.

ITunes is one way to bring fresh eyeballs to the network, he said, in particular the younger demo that uses video iPods. …

Yet ABC has also seen a ratings increase for its iTunes shows. To date since their debut on iTunes in October, both “Lost” and “Desperate Housewives” are up versus the same period last year. …

That growth and the knowledge that iTunes distribution possibly grew and certainly did not cannibalize ratings gave the ABC Disney Television Group the confidence to add another round of iTunes programs last week …

More distribution channels = more viewers Read More »

Create web sites with PONUR

From “Dive Into Mark“:

Web Content Accessibility Guidelines 2.0 working draft from April 24, 2002. Only 3 weeks old!

The overall goal is to create Web content that is Perceivable, Operable, Navigable, and Understandable by the broadest possible range of users and compatible with their wide range of assistive technologies, now and in the future.

  1. Perceivable. Ensure that all content can be presented in form(s) that can be perceived by any user – except those aspects of the content that cannot be expressed in words.
  2. Operable. Ensure that the interface elements in the content are operable by any user.
  3. Orientation/Navigation. Facilitate content orientation and navigation
  4. Comprehendible. Make it as easy as possible to understand the content and controls.
  5. Technology Robust. Use Web technologies that maximize the ability of the content to work with current and future accessibility technologies and user agents.

I like that: perceivable, operable, navigable, understandable, and robust. That deserves to become a new acronym, PONUR

Create web sites with PONUR Read More »

Which wires match the mouse test?

From Computerworld’s “Q&A: A lost interview with ENIAC co-inventor J. Presper Eckert“:

What’s the zaniest thing you did while developing ENIAC?

The mouse cage was pretty funny. We knew mice would eat the insulation off the wires, so we got samples of all the wires that were available and put them in a cage with a bunch of mice to see which insulation they did not like. We only used wire that passed the mouse test.

Which wires match the mouse test? Read More »

Edward R. Murrow on the business of news

From Edward R. Murrow’s 15 October 1958 speech to the Radio-Television News Directors Association:

One of the basic troubles with radio and television news is that both instruments have grown up as an incompatible combination of show business, advertising and news. Each of the three is a rather bizarre and demanding profession. And when you get all three under one roof, the dust never settles. The top management of the networks with a few notable exceptions, has been trained in advertising, research, sales or show business. But by the nature of the coporate structure, they also make the final and crucial decisions having to do with news and public affairs. Frequently they have neither the time nor the competence to do this. It is not easy for the same small group of men to decide whether to buy a new station for millions of dollars, build a new building, alter the rate card, buy a new Western, sell a soap opera, decide what defensive line to take in connection with the latest Congressional inquiry, how much money to spend on promoting a new program, what additions or deletions should be made in the existing covey or clutch of vice-presidents, and at the same time– frequently on the same long day–to give mature, thoughtful consideration to the manifold problems that confront those who are charged with the responsibility for news and public affairs.

Edward R. Murrow on the business of news Read More »

New technologies & the urge to control

From David L. Hudson, Jr.’s “Update on the Internet and the First Amendment“:

For example, as First Amendment scholar Rodney
Smolla explains, when Gutenberg developed the printing press
circa 1450, the Archbishop of Mainz created a censorship body,
and the Venice Inquisition issued a list of banned books.

The expansion of printing led English officials to pass
restrictive licensing laws that allowed the crown to impose
prior restraints on publication. When movies were first introduced
in the early 20th century, the United States government
argued for tight censorship controls because it was believed that
movies would easily influence children.

New technologies & the urge to control Read More »

My new book – Hacking Knoppix – available now

Knoppix is one of the great innovations in open source software in the last few years. Everyone that sees it wants to use it, since it is that rarest of software tools: the true Swiss Army Knife, capable of use by unsophisticated, experienced, and wizardly users, able to perform any of several hundred (if not thousand) tasks in an efficient and powerful way. Best of all, it’s super easy to employ, ultra-portable, and platform- and hardware-agnostic.

Knoppix camps on your system without canceling out your regular installation or messing with your files. And it’s really fun to play with. Hacking Knoppix provides all kinds of ways to customize Knoppix for your particular needs, plus the scoop on various Knoppix distros. Learn to build a Knoppix first-aid kit for repairing cranky Windows and rescuing precious data, or create your own Live CD. In short, Hacking Knoppix will transform your ordinary powerless Knoppix-curious individual into a fearsome Knoppix ninja, able to right wrongs, recover data, and vanquish the forces of ignorance and Windows usage once and for all.

Our approach in Hacking Knoppix is smart, detailed, and fun. We know our stuff, and we want our readers to understand and enjoy all the outrageously cool things that Knoppix makes possible. If a topic is kind of hard to understand, we’ll explain it so that lesser experienced readers get it and more experienced readers still learn something new; if a point needs in-depth explanation, we’ll give it in an interesting fashion; and if it needs a splash of humor to relieve the tedium, we’ll slip in something humorous, like a banana peel in front of Bill Gates.

  • Knoppix is an innovative Linux distribution that does not require installation, making it ideal to use for a rescue system, demonstration purposes, or many other applications
  • Shows hack-hungry fans how to fully customize Knoppix and Knoppix-based distributions
  • Readers will learn to create two different Knoppix-based live CDs, one for children and one for Windows recovery
  • Teaches readers to use Knoppix to work from a strange computer, rescue a Windows computer that won’t boot, repair and recover data from other machines, and more
  • Includes Knoppix Light 4.0 on a ready-to-use, bootable live CD

Read sample excerpts, including Unraveling the Knoppix Toolkit Maze (1.7 MB PDF), the complete Table of Contents (135 kb PDF) & the Index (254 kb PDF).

Buy Hacking Knoppix from Amazon!

My new book – Hacking Knoppix – available now Read More »

kanso and shizen and presentations

From Garr Reynolds’ “Gates, Jobs, & the Zen aesthetic“:

A key tenet of the Zen aesthetic is kanso or simplicity. In the kanso concept beauty, grace, and visual elegance are achieved by elimination and omission. Says artist, designer and architect, Dr. Koichi Kawana, “Simplicity means the achievement of maximum effect with minimum means.” …

The aesthetic concept of naturalness or shizen “prohibits the use of elaborate designs and over refinement” according to Kawana. Restraint, then, is a beautiful thing. … Restraint is hard. Complication and elaboration are easy…and are common. …

The Zen aesthetic values include (but are not limited to):

  • Simplicity
  • Subtlety
  • Elegance
  • Suggestive rather than the descriptive or obvious
  • Naturalness (i.e., nothing artificial or forced)
  • Empty space (or negative space)
  • Stillness, Tranquility
  • Eliminating the non-essential

kanso and shizen and presentations Read More »

Robot on the run

From The Age:

Scientists running a pioneering experiment with “living robots” which think for themselves said they were amazed to find one escaping from the centre where it “lives”.

The small unit, called Gaak, was one of 12 taking part in a “survival of the fittest” test at the Magna science centre in Rotherham, South Yorkshire, which has been running since March.

Gaak made its bid for freedom yesterday after it had been taken out of the arena where hundreds of visitors watch the machines learning as they do daily battle for minor repairs.

Professor Noel Sharkey said he turned his back on the drone and returned 15 minutes later to find it had forced its way out of the small make-shift paddock it was being kept in.

He later found it had travelled down an access slope, through the front door of the centre and was eventually discovered at the main entrance to the car park when a visitor nearly flattened it with his car. …

And he added: “But there’s no need to worry, as although they can escape they are perfectly harmless and won’t be taking over just yet.”

Robot on the run Read More »

Still accessible after 1000 years

From BBC News:

In fact, it turns out that images stored electronically just 15 years ago are already becoming difficult to access. The Domesday Project, a multimedia archive of British life in 1986 designed as a digital counterpart to the original Domesday Book compiled by monks in 1086, was stored on laser discs.

The equipment needed to view the images on these discs is already very rare, yet the Domesday book, written on paper, is still accessible more than 1,000 years after it was produced.

Still accessible after 1000 years Read More »

Cybercrime more profitable than drug trafficing

From Reuters’ “Cybercrime yields more cash than drugs: expert“:

Global cybercrime generated a higher turnover than drug trafficking in 2004 and is set to grow even further with the wider use of technology in developing countries, a top expert said on Monday.

No country is immune from cybercrime, which includes corporate espionage, child pornography, stock manipulation, extortion and piracy, said Valerie McNiven, who advises the U.S. Treasury on cybercrime.

“Last year was the first year that proceeds from cybercrime were greater than proceeds from the sale of illegal drugs, and that was, I believe, over $105 billion,” McNiven told Reuters.

“Cybercrime is moving at such a high speed that law enforcement cannot catch up with it.”

For example, Web sites used by fraudsters for “phishing” — the practice of tricking computer users into revealing their bank details and other personal data — only stayed on the Internet for a maximum of 48 hours, she said. …

Developing countries which lack the virtual financial systems available elsewhere are easier prey for cybercrime perpetrators, who are often idle youths looking for quick gain.

“When you have identity thefts or corruption and manipulation of information there (developing countries), it becomes almost more important because … their systems start getting compromised from the get-go,” she said.

Cybercrime more profitable than drug trafficing Read More »

Tim O’Reilly’s definition of open source

From Tim O’Reilly’s “Lessons from open source software development”, Communications of the ACM 41 (4): 33-7:

Open source is a term that has recently gained currency as a way to describe the tradition of open standards, shared source code, and collaborative development behind software such as the Linux and FreeBSD operating systems, the Apache Web server, the Perl, Tcl, and Python languages, and much of the Internet infrastructure, including Bind (The Berkley Internet Name Daemon servers that run the Domain Name System), the Sendmail mail server, and many other programs. … [But] open source … means more than the source code is available. The source must be available for redistribution without restriction and without charge, and the license must permit the creation of modifications and derivative works, and must allow those derivatives to be redistributed under the same terms as the original work.

Tim O’Reilly’s definition of open source Read More »

A brief history of backdoors

From Network Magazine:

Ken Thompson, a designer of the Unix OS, explained his magic password, a password that once allowed him to log in as any user on any Unix system, during his award acceptance speech at the Association for Computing Machinery (ACM) meeting in 1984. Thompson had included a backdoor in the password checking function that gets included in the login program. The backdoor would get installed in new versions of the Unix system because the compiler had Trojan Horse code that propagated the backdoor code to new versions of the compiler. Thompson’s magic password is the best known, and most complex in distribution, backdoor code.

A brief history of backdoors Read More »

The innovation of the margin

From InfoWorld:

In chapter 4 of Klaus Kaasgaard’s Software Design and Usability, Xerox’s Palo Alto Research Center (PARC) alumnus Austin Henderson says that “one of the most brilliant inventions of the paper bureaucracy was the idea of the margin.” There was always space for unofficial data, which traveled with the official data, and everybody knew about the relationship between the two.

The innovation of the margin Read More »

Greetings from beyond

From PCWorld.com:

Imagine receiving a new e-mail from an old friend that begins, ‘By the time you read this, I will have passed on.’

It could happen, as a result of a new Internet service called TimelessMail.com . Through this new service (which costs $12 to $24 annually), subscribers create and store e-mail messages containing their final adieu to friends and family. After a subscriber has bought the farm, his or her messages are forwarded to the intended recipients following a verification of Social Security Administration death records. …

Greetings from beyond Read More »

Practical considerations of teleportation

From IBM:

A teleportation machine would be like a fax machine, except that it would work on 3-dimensional objects as well as documents, it would produce an exact copy rather than an approximate facsimile, and it would destroy the original in the process of scanning it. A few science fiction writers consider teleporters that preserve the original, and the plot gets complicated when the original and teleported versions of the same person meet; but the more common kind of teleporter destroys the original, functioning as a super transportation device, not as a perfect replicator of souls and bodies.

Practical considerations of teleportation Read More »