In one of those conversations a person made a comment about how some Baby Boomers don’t understand technology, and while it turned out to be a bit tongue-in-cheek (the person followed up by speculating that the person being clueless was actually a ghost from the 18th Century misunderstanding modern copyright law). Anyway, it reminded my that I keep meaning to follow up on the post I wrote three years ago about the cavalier way some people use terms such as “Baby Boomer” and “Millenial.”
Some folks want to list anyone who is over the age of, say, 35, as a Baby Boomer. I’m seen just as many older folks insist that everyone under 30 is a Millenial. Which makes any commentary about the social and economic issues faced by people who grew up in different time periods meaningless.
The term Baby Boom originally referred to the significant uptick in the birth rate when World War II came to an end and when the world economy recovered from the Great Depression. Contrary to over-simplified understandings of history, those two events weren’t the same—the U.S. domestic economy was noticeably improving before the U.S. even entered the war, and the birthrate started picking up during the war itself (though not as dramatically as it did a few years later). So some sociologist and economists tagged the beggining of the Baby Boom in 1945, while others in 1942 or ’43.
Similarly, the birthrate’s rate of increase started slowing down in the U.S. (though not dropping) in the mid-fifties. Later, when social scientists started talking about the Baby Boom generation, many of them placed much importance upon the attitudes and expectations of that cohort based on their formative years being in the 1950s, where, in the U.S. at least, there was an exuberant economic boom and no war. I was in my late teens when I first started reading articles about the Baby Boom generation, and those articles defined is as people born between about 1942 and 1955. Which meant that my mother and father were both Baby Boomers.
Which is one of the reasons I sometimes have a negative visceral reaction to the more current definition, which is people born between 1946 and 1965. Because that makes me a Baby Boomer… and because I spent years thinking of my parents as Baby Boomers and that just seems wrong. Also, I was born after the 50s ended, and by the time my formative years were going, the U.S. was at war in Viet Nam and the Civil Rights movement was causing many to feel that the world was changing for the worse. So I think my assumptions about life are a bit different than those who grew up in the 50s.
The chart that I reproduce above shows only one of the many possible definitions of generational groups. I believe for broad discussions about economics, sociology, politics, and the like that it is useful to make some generalizations about the broad societal conditions that people of different ages grew up under. A lot of people of my mother’s generation (The Silent Generation, people born between 1925 and 1945) supposedly don’t understand computers and modern technology. My mom has very strong feelings about several parts of Quantum Mechanics (word to the wise: if you don’t want to find yourself cowering in a corner, saying you are sorry and will never stray again, do not mention Erwin Schrödinger or his thought experiment about a cat and an atomic trigger within earshot of my mom, okay?). Once, when her computer had been misbehav ing for several months she told me that the reason she hadn’t called me was because none of the errors had risen to the level fo “kernal panic” and she had been able to get everything working again on her own.
Let me repeat that: my 76-year-old mother knows what a kernel panic is and is able to solve a lot of her computer and related problems on her own. So, just because they are a member of the generation before the Baby Boomers doesn’t mean they don’t understand technology.By most definitions, I am a Baby Boomer. I was programming computers (with punch-card version of Fortran) in 1976 at the age of 15 when most people thought that computers would always be either the size of a large room or a small building. The first personal computer I owned I soldered together myself in 1982 (and I didn’t actually own it, because at that time I couldn’t afford the $99 for the basic kit nor the $49.95 for the 16 kilobyte memory expansion kit that made it useful; the father of a friend bought the kits and I did the soldering and assembly and got to use the machine for two months out of the deal). My current day job official title includes the word “principal” and I am expected to be able to understand all functions from the Physical Layer through the Application Layer with the ability to write specifications for sub-layers such as the Data Access, Business Logic, and Presentation.
And no one should be surprised that most of Generation X (whose original name was Gen X Atari Wave) understands technology, but I’ve noticed that a lot of member of both Gen Y (the original Millenials) and Gen Z don’t really understand how the technology works. They both understand many of the implications of the internet, but to varying degrees, they don’t understand how those things actually work, because it’s no longer necessary to understand things happening below the Presentation layer to use the technology. This isn’t a bad thing, per se. Just as you don’t need to know how to machine a piston in order to operate a car, you don’t need to understand all of that other stuff in order to be active on social media.
Unfortunately, that means that you have situations such as the one that started one of the comment threads I mentioned above: folks who don’t understand what a hyperlink on a web page actually is, will get upset and file a DCMA take down notice on someone who is linking to someone else’s publicly accessible page. But a hyperlink isn’t content, it’s a pointer.
For much of my life, the cliche was that older people didn’t know how to work new technological devices, and that the answer was to find a child who could fix things for you. Some of those “children”—the leading edge of Gen X—are 50 years old now. And some are now shaking their heads looking at the younger people who are much better at knowing how to make things go viral, for instance, but may not even know what HTML is.
* “All generalizations are dangerous, even this one.” ― Alexandre Dumas-fils
Then, when I left college, I got hired by a company that made messaging software intended to run on 16-bit MS-DOS machines with Intel Processors, and since I was doing so much work in WordPerfect and could buy what at the time was a very good Packard-Bell desktop at a (somewhat) reasonable price (only the equivalent of three months’ rent instead of six) because of the company discount, I left the Apple ecosystem for some years. Eventually I moved into Windows, when it came out.
One of the realities of working in all those Wintel machines was that every time I had to upgrade to a new machine, it was a bit of a nightmare. It always took at least a year after moving to the new machine before I finally had everything on it working as I liked. Usually it was because there were always programs that simply didn’t work with the new version of Windows and/or the new hardware. So I got used to the pattern of spending at least a year getting the desktop organized to my liking with all the programs working in harmony, about two more years of using the machine with everything being fine, then a year or so of rising frustration as the machine became slower as some programs were updated, and often simply not supporting the new technologies that the equipment or software I was using expected. Then giving in and buying a new machine, where I would trade the frustration of the slowness and incompatibilities for the frustration of finding much of my existing software wouldn’t work on the new machine.
Another frustration that came in was that my mother started using a home computer, but her machines were always hand-me-downs from another relative. And she had the bad habit for years of clicking on any link that was included in any of the chain emails she received from friends and family (not to mention buying discs of very dubious software from racks on stores). So we got into the habit that every time my husband and I went to visit, my husband would come equipped with a bunch of discs of anti-malware and anti-adware programs, and he would spend more than a day trying to remove all the viruses and such from her machine to get it working again.
Then one summer day my husband called me from his place of work, where he spent his time refurbishing old computers, and proposed that we purchase an iMac he was in the process of repairing, and switching Mom over for her birthday. This required me to also purchase a really crappy (it had a broken hinge) old Mac laptop that would run the same version of Mac OS because, as my hubby correctly predicted, for the first couple of months Mom called every week with a question about how to do something relatively simple, and I would have to walk her through it with such instructions as, “Okay, so there is a white bar with rounded corners in the upper right corner of the dialog box? Can you click in there and then we can type…”
For the next couple of years, we purchased newer refurbished iMacs for Mom, and I kept acquiring refurbed Powerbooks and Macbooks that ran the same version of Mac OS. And eventually I started taking the Macbook with me to conventions because I was remembering all the things I liked about my old Apple ][e—and it was more robust than my Windows laptop.
So, I was seriously looking at replacing my Wintel desktop with a Mac… and I got laid off by the company I’d worked at for over 19 years. So I had to wait a bit. After 7 months at a new job (well out of my probationary period), I started plotting the new machine. My past experiences with the Windows machines made me do just a bit of over kill. I intentionally bought a much more powerful Mac Pro than I strictly needed because I didn’t want to change machines again in five years.
Over the next three years (Apple made it really easy and cheap to upgrade the OS each year) I quickly learned that updates weren’t quite the nightmare they had been before. And as more of my day-to-day writing was being done on the laptop (heck, by then I was doing a lot of writing each day on the bus on my iPod — not any iPhone, and the iPad didn’t exist, yet, but Write Room was a great word processor that worked on the iPod and the Mac!). My desktop was still faster with the layout software (InDesign) and drawing software (Illustrator) than the Mac laptops I owned.
One of the pros of the old Mac Pro towers was that you can do a lot of your own upgrading. So I bought faster and larger hard disks, and then upgraded the memory. Then did a major update to the video card, which helped keep the machine humming when I needed to use those resource-hungry programs from Adobe.
As the computer was approaching its fifth birthday I was finally noticing that when I had a whole bunch of programs open it wasn’t as fast as it used to be, but it was still pretty good, so I mentioned to my husband that I would like to see if I could keep the machine viable for another five years. He scoffed… and then bought me a PCI solid state drive card and a solid state drive to go in it to be my new boot disc. Switching to the solid state drive for booting and for all the applications made the machine screaming fast, again.A couple of years ago we finally hit the roadblock where Apple wouldn’t let me install the latest Mac OS any longer. And the Macbook Pro with touchbar that I bought in the fall of 2016 is faster at some tasks than the Mac Pro. I’ve also replaced Illustrator, Photoshop and Acrobat Pro with less resource intense (And much more affordable) software which works really well on both machines. I haven’t yet gotten a viable InDesign replacement, but I’m also no longer publishing a periodical zine. In any case, at the moment even though I’m a couple of versions behind on the OS with the desktop, the latest and greatest versions of all the applications I regularly use still run on the tower.
I know at some point I’m going to have to retire it. Maybe it will be replaced with a dock that I can plug my laptop into when I want a bigger screen. I don’t know. But for now, please join me in wishing Fabulosity, my Mac Pro tower, a happy tenth birthday!
Once I had the Magic Mouse and had been using if for a while with one computer (getting used to the greater number of options the gesture support provided), by the end of the year next year I had purchased another Magic Mouse so that both of my computers had one.
When the Magic Mouse 2 came out almost three years ago, the most significant change was an entirely internal battery. They also updated the bluetooth chip and processor, and managed to make it slightly lighter. Otherwise it was virtually identical, and I didn’t see a reason to update. Part of the reason for that at the time was my Macbook Pro was over 4 years old, and my Mac Pro was over six years old, and it seemed a little silly to get super shiny new mice for older machines.
When I got my shiny new Macbook Pro with Touchbar in late 2016, I considered buying a new mouse along with it, but then I was dropping a lot of money on the laptop, so my inner cheapskate was opposed to additional unnecessary expenses. And, the old Magic Mouse worked just fine with it.
I admit that last year, when they introduced the new iMac Pro which was available in Space Grey which could come with a Space Grey Magic Mouse (among other accessories), my inner gadget lover went “oooooooo! Shiny! Want!” However, Apple was only selling the Space Grey Mouse (and Space Grey Keyboard and Space Grey Magic Touch Pad) with the matching iMac. So despite that fact that I had a cool Space Grey Macbook Pro, I couldn’t get the Space Grey Mouse.
And besides, as the inner cheapskate kept pointing out, the old Magic Mouse worked just fine.
And it did.
Until about a month and a half ago, when it started loosing connection with the Macbook a lot more often, but more annoyingly, instead of taking just a few seconds to reconnect when I moved or clicked it, I would have to fiddle with the mouse for at least a minute before it connected again. Two weeks ago, it got a little worse. The mouse would eventually reconnect, but it would immediately disconnect and I would have to fiddle for another minute before it connected and would remain connected for… a while.
I did notice that it was more likely to do this when the batteries were reporting less than 70%. Now I’ve had this bad habit of ignoring all the warnings from my laptop that the batteries are low. Dismissing the alert again and again for days until the batteries completely die. Then I go swap them out (we keep several sets in chargers all the time, because between the two of us we use the rechargables in a couple of wireless keyboards, at least four wireless mice, one wireless Magic Track Pad, and several small motion-activated LED lights around the house). Funny thing is, that when I get the exact same low battery alert on my Mac Pro Tower, and I almost always stop when I’m doing and go swap the batteries.
Anyway, the upshot is that I know the mouse has in the past worked perfectly fine when the batteries are at 1%. Also, because I’m a weird nerd whose past career titles have included quality assurance and hardware qualification engineer, I did some experiments, and confirmed that even when the batteries are low and the mouse is in another room, it remains connected to the laptop and can control the cursor…
It was getting really annoying by now.And recently Apple has started selling the Space Grey Magic Mouse 2 as a stand alone accessory… so I could get a new mouse to replace the flaky almost nine-years-old one and it would match my laptop. So I did.
Now, a lot of people who have looked at the mouse (but haven’t used it) complain that the lightning recharge port is on the bottom of the mouse. “So if it dies, I have the wait around for it to charge back up! I can’t use it while it’s plugged in.” Bull. Seriously, it’s a purely B.S. objection because here’s the thing: if you connect it for two minutes, that charges the battery enough for nine hours of use. In And remember what I said about about alerts from the computer that the battery is low? I am being serious when I said that I would ignore it and keep using the mouse for days. So, when you see the alert, make a mental note, and the next time you go to refresh your beverage, or run to the bathroom, or get up to walk around (which my Apple Watch reminds me to do once an hour), plug the mouse in for a few moments and you will be good to go.
I know, my use case doesn’t match everyone elses, but I am quite certain that if Apple had put the port where all the complainers want it, that those some complainers would be bitching about how awkward the device which is designed to be wireless and that you use wirelessly all the time is when the attach a wire to it.
Anyway. I am sad that my first Magic Mouse is flaking out. But I’m also very happy with my shiny new one!
Sometimes I try to rationalize this by pointing out the my husband has more computers than I do… and more iPads, and… and… but that’s really deflecting.
Now one thing that I will say in my defense is that many of these things were not paid for at full retail. Most of the iPods, for instance, were picked up used, some of them with more than one previous owner before I got them. And, as I explained in Confessions of a penny pinching packrat, my childhood and early adulthood spent living (barely) paycheck to paycheck taught me to hang on to things. When I buy a new appliance or gadget or whatever the old one is seldom disposed of. Instead it is held onto as a backup in case the new thing breaks. Often older computers and such are passed on to friends and family who need them, and when that isn’t the case, I can frequently find away to sell them or trade them in to get a discount on something else we need.
But, I also love tools that work well, and I especially love tools that work well for particular tasks. The headphones I use for commuting, for instance, need to meet several requirements: they need to be wireless and feel comfortable and not awkward when worn with various hats and scarves and such that I need in various types of weather. They also need to be able to hold up to rain. Because of some issues with my inner ears, they can’t be in-ear. The models that meet those requirements don’t usually have fantastic sound fidelity. But I don’t necessarily want that, because I don’t want headphones to block out traffic noise, and so forth, because since I take a bus, a part of my commute involves walking on sidewalks along busy city streets. So I need to be able to hear what’s going on around me.
That means that the commute headphones aren’t ideal for other listening situations. So I have a pair of wired noise-cancelling headphones that live in my desk drawer at my office, so on those days that I need to block out conversations going on in the cubes and halls around me, I can. And also, if I’m going to listen to music while working, I’d like the quality of the sound to be a bit better than what I’m willing to settle for during my bus ride and walking, right?
Then I have a nice pair of wireless headphones to use at home for listening to music or podcasts while I’m writing or editing. And again, I prefer them to have better music quality than the commute headphones. Unfortunately, it is often the case the wireless headphone with great sound, have inferior microphones. So if I’m trying to have conversations or gaming sessions with friends online, I need a headset that has good sound and a good microphone, which winds up being a wired headset.
And then… well… so the nice bluetooth and wired headsets I mentioned in the above paragraph basically live with my laptop. So there is another set of headphones, wired, that some years ago used to be the primary for listening to music on the laptop, that have been handed-down to the desktop Mac Pro, so that when I use that machine, I can listen to my music without disturbing my husband on the other side of the computer room. And there is a pair of really nice wired noise-cancelling headphones that permanently live in the On The Go computer bag, so that when we’re at cons or whatever, I’ll have a good set on those occasions I need them…
…and then there is a small stash of some older ones that still work well enough in a pinch, and usually one or two pairs of still in box backups for the commute headphones, because when they die, they tend to completely die, and I need a backup right away, right?
It’s a little harder to explain how the primary laptop, iPad, desktop, and Windows-based laptop all fit some of my use cases but aren’t the best tool for some of my other tasks. I mean, I have the Windows laptop because occasionally I need to process a file in software that is only available on Windows. And some of my old backups were done on Windows, since I used that operating system for many years. My new laptop is, in theory, pretty water resistant, but I’m still a bit reluctant to take it outside when rain is likely. And now that we have such a nice veranda, I spend a little bit of pretty much every day out there either writing, reading, or chatting with friends. So the iPad is a better tool for that location, since it is much much much more water resistant than the laptop, right?
I also, whenever possible, I spend my lunch break at the office writing or editing my own fiction, and that happens on the iPad. Which is much tinier and easier to transport along with my lunch and stuff than the laptop.
This is a long way of saying: what works for me, works for me, but may not meet the your needs. Likewise, what works for you may not meet my specific needs at all. And it’s okay if some of us spend more of our time and resources on different things than other people.
You do you. I’ll do me. Okay?
The reasons I switched from the program I’ve been using for years isn’t important. The interesting bit was what I learned after setting up one specific account in the new reader. It’s an email account that is on a domain I own. The sole purpose of this account is to be the home account of one of my side Twitter accounts. I have an twitter account in the name of one of the fictional characters in my novel series. At the time I set it up I had vague plans to promote the books through it. Anyway, the mail services for that domain are outsourced, and for various reasons when I set up my new email reader to pull that account, the junk mail filters at the outsourced place are being ignored. So ever single bit of spam coming to that account gets downloaded to my laptop. This account has never been shared with anyone other than Twitter. The email account doesn’t appear on any contact anywhere, I don’t believe that I have ever sent an email message from it. But still, it gets hundreds of spam messages every day — and at most one legitimate piece of email, because once a day Twitter sends a message to the account with “hightlights” from the people that the twitter account follows, or to tell me someone replied to a tweet, or whatever, right?
So this account is just getting flooded with spam, and you would expect that most of said spam would be Nigerian-Prince-style scams, right? Nope. Don’t get me wrong–there are some messages about “Get in on this 10 Million Dollar deal!” or “Regarding your credit account” or “We tried to deliver your package” that try to get you to click on a link and enter your password for a service they can hijack or get you to confirm credit card information. And there are the ads for Viagra or quack remedies for various illnesses, yes. But that’s less than half. The other half are emails with subject lines: “Obama treason confirmed!” or “Birth Control Makes Women Violent” or “Planned Parenthood Still Selling Infant Organs” “You Won’t Believe What the Gay Agenda is Pushing Now” or “Hilary Crimes Finally Proven” or “You Won’t Believe this Obama Outrage!”
That’s right, a half year since Obama left office and the sexual-predator-in-chief was sworn in, there are bots out there cranking out anti-Obama and anti-Hilary propaganda, and mailing it to millions of people. And clearly, someone must be clicking on some of these mails.
I already knew about the literally millions of twitter-bot accounts that retweat Donald’s nonsense or hate speech and propaganda from alt-right news sites. I knew about the millions of twitter-bot accounts pretending to be Bernie Bros tweeting out slightly more dog-whistling hate speech and anti-Hilary disinformation. I’ve included in recent Friday Links posts some stories about the role of algorithms and those bots in skewing the way the people see and understand the news: The Threat From Artiﬁcial Intelligence May Already Be Here and Maybe the AI dystopia is already here.
I had thought I understood what was happening. But it took seeing thousands of these spam messages from several months worth of spam to one account to finally connect a couple of dots I hadn’t been thinking about it. The various alt-right faux news sites, plus Fox, the millions of twitter-bots, and so forth function like spam in more ways than one. One avenue of success similar to spam is that only a fraction of a percent of any message needs to be seen by the targertted person for it to hit. Most of them aren’t seen by any individual because some are caught in various filters such as junk folders. But as long as some get through, the person is still exposed to the misinformation.
But another aspect of spam’s effectiveness we don’t think about is this: the less tech-savvy someone is, the more likely they are to see the misinformation. And studies have shown that the more educated a person is, or the more knowledgeable they are in a variety of subjects, the more likely they are to be liberal. Conversely, the less knowledgeable, the more likely they are to be conservative. So there’s an asymmetrical distribution of the misinformation, with more of the people who see it being likely to view those ridiculous headlines and subject lines as confirmation of their current beliefs, rather than react with skepticism.
The other aspect is contagion. Certain types of malware and scams depend on people forwarding them on to other people. We all had that one relative who always, without fail, used to click on every single chain email and so forth forwarded to them by anyone they knew, and who in turn would forward it to all of their friends and family (no matter how many times we tried to explain to grandpa that he was forwarding viruses half the time, right?).
The person who sees the false headline and believes it may share the false news link to all their friends by posting it on Facebook or forwarding the message or whatever. And many of the people they know are sharing similar bits of misinformation, creating the impression that everyone they know agrees with their worldview and/or validates the misinformation.
It’s not just that they live in an information bubble, or that they inhabit an echo chamber, its that they are surrounded my scores of overlapping misinformation bubbles that invade and reinforce each other.
And the fourth area comes back to that bit I said about not being able to convince my one grandparent to stop forwarding the bad stuff. After awhile I just had to give up and quarantine all of his emails. Similarly, it’s not just that the misinformation drowns out the good information, but we’re socially conditioned not to argue with some of the vectors of misinformation. And because we get tired of having arguments with all those racist cousins, so we simply mute them or whatever. Then they assume that because we’ve stopped arguing, that we now agree with them.
I wish I had a solution to this. It would be so much easier if the enemy were an army of Cylons coming at us. Instead, twitter-bots and the like are turning our neighbors and relatives into the army that is trying to take away our rights, take away healthcare, and so much more.
Wide Impact: Highly Effective Gmail Phishing Technique Being Exploited The tl;dr version: this particular hack involves the hackers sending emails from a hacked account, to people in that account’s contact list. So it starts with you getting an email from someone you already know. But it’s much more clever than that! They take text from previous messages that person has sent, and it isn’t random. They find messages where the person has sent attachments, and they construct the new message from it. So if it’s someone you know, the phrasing of the subject and the text sound like something that person would write. The attachment in the new message is merely a screen capture, and it hides a link to their fake Google login in page. So you click on the attachment from a friend, and you’re told to view the attachment you need to log in to Google, and they get your username and password. And within seconds, they’re going through your account and sending more hacked messages to your friends.
They’ve even constructed the login page so that if you take the precaution of looking at the address bar in your browser before you start to sign in, you see “https:accounts.google.com” so you think you’re at the real Google. You’re not.
Once they’ve got your password, they can read all your email and do other things to your account.
The linked article has screenshots and advice for how to recognize this kind of attack, as well as steps for what you can do to see if you’ve already been hacked. Check it out!
And this one is less about hackers: Security backdoor found in end-to-end encryption system used in WhatsApp. The Guardian reports that security experts have found that since buying WhatsApp, Facebook has added a back door. In updates, Facebook denies that his is a backdoor to government agencies and claim they will fight any attempts from governments to access accounts.
Which is meaningless.
The existence of the backdoor means that when Facebook loses that fight (because of court orders, for instance) that the backdoor will be used to read the supposedly secure communications. The original design of WhatsApp and similar end-to-end services didn’t have a backdoor because if one exists, it will be exploited eventually. Also, Facebook’s description of the service currently lies and says that they can never read the messages. With the backdoor there, yes they can.
While we’re on the subject of cyber security: Cellebrite, a Major Dealer of Hacking Tools, Has Itself Been Hacked. This is one of the companies that makes tools that allow people to hack your phone. After indulging in a moment of schadenfreude that these hackers have been hacked, we then have to worry about what is in that 900GB of data that was stolen from them. Since the dump “contains what appears to be evidence files from seized mobile phones” among other things, who knows whose personal information has been stolen. Supposedly Cellebrite only sells their tools to law enforcement agencies and the like, but it has been previously shown that those agencies include some very shady regimes. And in the case of their mobile hacking devices, those things could be resold or stolen from those agencies and be in anyone’s hands.
And let’s do one more: E-Sports Entertainment Association hacked; profiles of 1.5 million customers exposed. The leaked data includes real names, phone numbers, and birthdates. Very useful for identity theft. Not much you can do about it once the information has been stolen.
ETA: Several people are questioning the Guardian story about Whatsapp: The backdoor that never was, and how to improve your security with WhatsApp. The argument seems to be that while there is a security problem, it isn’t technically a backdoor. The article I linked has information on things you can do to avoid your Whatsapp messages being compromised. I’m going to leave it to the security experts to argue this out.