Category Archives: computers

The Pure Frustration of Windows 8

Windows8buttons2

I just got a new HP Pavillion™ desktop computer and it looks great but Windows 8 is not a good addition and it may, in fact, be a deal breaker. Windows insists that I keep the button apparatus which dominates the start screen and which is not user-friendly at all. In fact my computer tells me a Trojan virus was downloaded first thing and that virus is like some alien squid thing that cannot be dislodged (at least until Monday).

I suppose if you just want to play on a computer then the arrangement of those buttons in the center of your screen, which used to show you a beautiful picture of your own choosing, would not bother you. Perhaps those ugly buttons suit younger users and gamers. But if you use a computer to do your business this version of Windows is too kludgy.

This Windows 8 is also a sort of fascist-control- freak operating system. It only likes certain search engines. It does not like Chrome. It will reluctantly allow you to use search engines other than the chosen ones but it will set up all kinds of roadblocks to steer you to Yahoo or Bing or MSN (people still use this?)The big tech companies are obviously in a perpetual turf war and we are in the middle because we decide who is winning. We decide with our dollars.
This computer is friendly when you go to a favorite site such as Twitter or Facebook, but there is no “favorites” function to get you to your most often used sites quickly. It may be possible to approximate the favorites function by using the history button but the old favorites/bookmark system was simpler to use and perhaps a favorites function is available if you stick to one of the approved search engines. Many of these changes may be necessary in order for the touch function to work.

Perhaps Windows is trying to level the playing field so that Google gets cut down to size by making it difficult to choose a Google search page. Politically I should applaud this attempt to avoid a Google monopoly, but I wanted a much more seamless transition to my new desktop and this experience is anything but smooth. It is so frustrating that if it doesn’t improve soon I will be taking this desktop back where it came from. I just want to get my tasks done and get on with my day. In order to do that, I am using my old laptop on the bed in the spare room.

There is also the matter of greed. We may have won net neutrality (at least temporarily) but this computer is set up to sell you stuff. This is not only not a user-friendly computer; it is a seller-friendly computer. You could find yourself paying for tons of apps that seem fairly inexpensive, but you will rarely use them, and if you do use them these apps will want you to feed them more money and the dollars will add up fast and you will need to keep careful records of what you are spending.

I suppose that if I don’t return this sucker I will get used to this rip-off operating system, but Windows 7 was so simple, elegantly so, and so user-friendly that I am guessing my old laptop will not get many chances to feel lonely. Whoever thought of “charms” ought to be put in stocks in a public place. I always felt so smug because I missed Vista, but I’m feeling a bit apologetic for my rather petty self-satisfaction. Windows is now saying, “Gotcha”.

By Nancy Brisson

<a href=https://plus.google.com/10640005355488737390?=author>Nancy Brisson</a>

Protection from Cyberattacks

I have just had to have my credit card replaced because someone hacked into my bank. I had my debit card replaced about a year ago for the same reason. We are subject to cyberattacks everyday, some by hackers who plan to sell info for money and some perhaps by terrorists. Every time the internet shuts down or some part of the internet shuts down, however temporarily time and money are lost. Records may also be lost. Here is what Kevin Coleman had to say in Directions Magazine:

”If you look at the projected eCommerce number for this year, the Internet being down for just one day could disrupt nearly $6.5 billion worth of transactions. More than just eCommerce transactions flow over the Internet. eMail, voice communications, some banking machines, credit card authorizations for physical stores and the list goes on and on. Information is the life blood of commerce, regulatory oversight and even social status. The importance of the information and the ability to access it, transfer it and act upon it has increased to the point that it is unfathomable for all but the smallest of businesses to operate without computers or networks. As the value of the computing infrastructure increases so too does the value of disruption. The financial implications are one thing, but the psychological impact of the Internet disruption could be even more damaging.

How likely is this to happen? It is not, if it will happen, but when. The likelihood of a cyber terrorism attack disrupting the Internet increases every day. The increased reliance on the Internet by business, government and society has made it a prime target for terrorist intent on disrupting our economy and way of life.”

It is not just commerce that is controlled by computer. The power grid uses the internet, our government uses the internet, our transportation system uses the internet even our energy resources and water are often routed using the internet. We have not designed the kinds of systems we need to put to rest our fears of terrorist cyberattacks that could create serious problems for the US in the short term. We used to have redundancy because we backed everything up on paper and we could switch back and forth between “old school” methods for conducting our business to more high tech systems.  However, we have come to have faith in computers because they are simpler to operate, they offer filing options that take up little or no physical space and they can be updated and corrected more simply than was often the case when we were pencil pushers. But if everything is in the “cloud” and the cloud disappears we have no backup paper trail. If the grid is shut down we can’t easily switch back to the old grid that was maintained by people; it takes days or even weeks to repair damage to electricity sometimes. Most of us have no generators to keep things moving if the grid is shut down. It is a fear we all keep in the back of our minds.

What are the solutions to keeping unwanted people out of our computers? Here is what Mr. Coleman had to say in Directions Magazine:

“Corporate America must be forced to wage an all-out war against cyber terrorism. Securing the information infrastructures will require a substantial effort on everyone’s part. Close collaboration between government and the private sector is critical. Even more critical is the close collaboration within the computer, networking and software industries. These industries must work closely and continue efforts to enhance technology security capabilities. Security is designed in, not added on. Until the weakest links in the network are protected we all are vulnerable and may be impacted. The government sector must institute tougher penalties for cyber crimes and increased funding for law enforcement efforts to fight it. Easier said than done. This must be accomplished with a high degree of collaboration globally. Getting countries to agree on anything these days seems to be an almost unachievable task. Is cyber terrorism the shape of future conflict? Is a digital underground developing right now? Will our scientists, software engineers, and technical resources be able to stay one step ahead of these faceless terrorists? Only time will tell!”

He simply tells us what we need to do. Carol Y. Yang writing The Protection of Public Facilities against Terrorist Attacks, March, 2005 suggests that some work has already begun:

“The Homeland Security Advanced Research Projects Agency (HSARPA) launched a Small Business Innovation Research (SBIR) program in December 2003 to encourage small businesses participate in federal R/R&D programs that can bring creative technologies and solutions to the mission of homeland security. HSARPA plans to issue various requests for research and development projects twice each fiscal year to meet DHS operational requirements, and develop innovative options. Programs in research, testing and evaluation, enacted in cooperation with universities, fellowship programs and national laboratories, include studies in terrorists’ social behaviors, detection of biological/chemical weapons, threat assessment and decontamination, radiological forensics, and cyber-technology.

Recognizing the urgent challenge of homeland defense, many American companies and other institutions have dedicated their efforts to ongoing research. For example, the University of California at Berkeley and Stanford University have joined the project on Recovery-Oriented Computing to improve response to computer incidents. Some companies—including Cenus Technologies, IBM, Hewlett Packard, Intel, and Sun Computer Associates—are developing self-configuring, self-protecting, self-healing autonomic computing technology for security systems at ports and bay areas.

The Science and Technology Directorate, the primary R&D unit of the DHS, is continuing to transfer cutting-edge technological resources to federal, state, and local officials in order to strengthen the capabilities of protecting the homeland. In the future, science and technology will serve as intelligent tools for national security.

If this is the extent of the progress we have made in thwarting cyberattacks then I believe we need to invest a bit more time, effort, and money in this. Maybe every time we identify one of those hackers who is stealing our identity we should offer a deal if they agree to join a task force dedicated to protecting us from terrorist attacks on important daily functions that are controlled by the internet. If they are successful not only will they avoid prison, they will get paid; paid very well, and we will all be safer.