Categories
Uncategorized

July 17th: Guitar Hero Encore Rocks the 80s

Guitar Hero 2 Rocks the 80s

I was 12 when the 80’s began and 22 when they ended, so the music of that decade is pretty much seared into my consciousness. Hence my jumping for joy when I found out that a new Guitar Hero game featuring 80s rock is due on July 17th. Here are the tracks known to be included with the game:

  • Asia – Heat of the Moment
  • Billy Squier – Lonely Is the Night
  • Bow Wow Wow – I Want Candy
  • Dio – Holy Diver
  • Eddie Money – Shakin’
  • Extreme – Play With Me
  • Faster Pussycat – Bathroom Wall
  • Flock of Seagulls – I Ran (So Far Away)
  • Poison – Nothin’ But A Good Time
  • Police – Synchronicity II
  • Quiet Riot – Bang Your Head (Metal Health)
  • Ratt – Round & Round
  • Skid Row – 18 And Life
  • Twisted Sister – I Wanna Rock

As far as I can tell, it’s a PlayStation 2 exclusive. Since I am the owner of a PS2 (a Christmas present from my lovely and very understanding wife), I am left with one complaint: Where the Hell is the AC/DC?!

Party at my house on July 17th!

Categories
Uncategorized

Mesh Conference 2007

Mesh Conference LogoIn all the hubbub about the D: All Things Digital conference, you may not be aware that the Mesh conference is taking place today and tomorrow in Toronto at the MaRS Centre, pictured below:

MaRS Centre in Toronto, close up.

Mesh is Canada’s premier web conference and features some big names for its keynote speakers. This morning, Mathew Ingram had a “fireside chat” with Michael Arrington, and tomorrow Stuart McDonald will do the same with Richard Edelman.

It looks as though the conference has already had its share of interesting moments. During his keynote, when Arrington spotted Ted Murphy, CEO of PayPerPost, he pointed him out and called him “the most evil person in the room”. I’m certain that the stuffed shirts at D5 (the popular shorthand for the D: All Things Digital conference) are too WSJ-run-event genteel to get into discussions this colourful.

There were a very limited number of tickets to the Mesh conference, so many people — your truly included — missed out as they sold out rather quickly. For those of you who still want to get in on the networking action at Mesh, thereare a couple of options:

  • There’s an unofficial unconference taking place in the open-to-the-general-public food court of the MaRS building. I may check it out tomorrow.
  • There’s an open-to-anyone-interested dinner tonight taking place at the Boiler House in Toronto’s Distillery District. The fun starts at 7 and I plan to be there, probably with wife and accordion.
Categories
Uncategorized

Microsoft Surface, Sun Starfire and Apple Knowledge Navigator Videos

Yesterday, I wrote about how the “cyberwar” in Estonia seemed rather different from the way William Gibson depicted cyberattacks in his “Sprawl series” novels, most notably Neuromancer. I thought that as long as I was comparing speculations of what future tech would be like against how the future actually turned out, I should tie it in with the hot news of the moment, Microsoft Surface.

Microsoft Surface’s Promo Videos

In case you haven’t seen the promo videos for Surface yet, I’ve posted them below. Here’s the first one: Microsoft Surface – The Magic:

Thos one’s called: Microsoft Surface – The Power:

And finally, Microsoft Surface – The Possibilities:

Sun’s Starfire Concept Video (1992)

I mentioned Sun’s Starfire project in my post about Surface, but thought it deserved a front-and-centre mention. Starfire wasn’t a project to develop an actual platform, but to develop concepts that would eventually find their way into future platforms when the technology made it possible and show them in a video. The video is available online in MPEG-4 format, but you’d better have a good connection: it’s 270 megs in size:

Still from Sun’s “Starfire” video.
Click the image above to view the Starfire video.

Apple’s Knowledge Navigator Video (1987)

If the Starfire video gives you a sense of deja vu, it’s probably because you’ve seen Apple’s Knowledge Navigator concept video, shown below:

If the Starfire and Knowledge Navigator videos bear similarities to each other, they should; Apple UI guru Bruce “Tog” Tognazzini helped create both.

Next…

I’m going to post some notes on some of the concepts in the Starfire video that appear to have come to fruition with Surface as well as my notes on what they thought 2004 would be like back in 1992.

Categories
Uncategorized

This Thing’s Gonna Make Porn AWESOME!

Somebody had to say it about Microsoft Surface; I just thought it might as well be me.

Microsoft Surface Spousal Swap

Categories
Uncategorized

Microsoft’s Midnight Surprise, Revealed: Microsoft Surface

“Microsoft Surface” logo.Microsoft’s Midnight Surprise? It’s Microsoft Surface, a large-area screen-and-multi-touch-surface computer. Here are some places to get started:

It’s pretty nifty technology, the sort of which we’d been waiting for since Bruce Tognazzini showed the world (okay, maybe not the world, but a couple of really interested people at Sun and whoever bought Tog on Software Design) his “Starfire Project” concept back in 1992, in which he showed a theoretical multi-touch surface computer hooked to a global network in the far-off year of 2004.

That’s all I’m writing for now; this Global Nerd’s gotta go beddy-bye.

Categories
Uncategorized

Microsoft’s Midnight Surprise

Box in a plain brown wrapper with a question mark.

One minute after midnight tonight, Microsoft’s Entertainment and Devices division — the folks behind the XBox and Zune — will announce “something totally new…and it’s going to change the way people interact with technology.”

Here’s what Gizmodo has to say
:

The timing is good, since tomorrow is when Bill Gates and Steve Jobs get to point fingers at each other under the grandfatherly gaze of Grand Vizier Walt Mossberg, and in these heady iPhone days, Gates needs all the ammo he can get. But what the heck is it? We’re convinced Zune 2.0 is still a ways off, but then again, what else would this division be up to? Stay tuned, and we’ll get back to you with the details right around midnight.

PC World takes Gizmodo’s point and runs with it a little farther:

…while the two will likely talk about the last three decades of computing, when it comes to current tech Jobs is walking in armed with major-league cool. I’m sure Gates is hoping this new techno-thingie will let him talk about new Microsoft developments without audience members snickering.

Whatever it is, it’s not likely to be worth staying up for, but I’ll be up at midnight anyway, so I’ll report on what it is they’re unveiling.

Categories
Uncategorized

Cyberwar Ain’t What It Used to Be

Cover of the 1984 paperback edition of “Neuromancer” by William Gibson.

In his “Sprawl” series of short stories and novels, William Gibson made many references to World War III’s “cyberwar” component, especially in the novel Neuromancer. Willis Corto, an important character in that novel, is the sole survivor of a particularly important but forgotten operation in WWIII called Screaming Fist, which I’ll let Wikipedia summarize:

Operation Screaming Fist was an American military operation aimed at introducing a major virus into a Russian military computer. One of the main characters of the book, Corto, took part in the operation as a colonel. The operation was significant in that it involved dropping the team assembled for it by flying them across enemy lines on light gliders, with each member plugged into the first prototype cyberdecks. Unfortunately, the operation had been grossly mismanaged and had not taken into account certain aerial defenses. As a result, Russian EMP weapons were used against the gliders shortly after they entered Russian airspace. In the ensuing chaos, Colonel Corto escaped in a Soviet helicopter gunship and was the only survivor.

While it wasn’t as visually dramatic as soldiers and hackers on ultralights descending on a Russian military computer installation in a daring night raid, the denial-of-service attack on Estonia is just as Gibsonian, judging by the way the news outlets have been tossing about terms like “cyberattack”, “first war in cyberspace”, “cyberattack” and “digital Maginot Line.

What I find really interesting is that the only futuristic thing about the whole affair are the “cyber-” terms used to describe it. The actual attack itself isn’t anywhere as exotic or future-tech-y as Neuromancer and all those other cyberpunk novels of the ’80s and ’90s made such things out to be. In fact, a lot of it seems so damned ordinary:

Cyberpunk stories Real world
Cyber-attacks often required physical infiltration of a heavily-guarded site by a team comprising crack paramilitary troops and “console cowboys”. The cyber-attack didn’t require anyone to physically go anywhere; it was all done online.
Cyber-attacks often required specialized viral software (“icebreakers” in Gibson’s novels, where “ICE” stood for “Intrusion Countermeasures Electronics”) that had to be written by AIs and were available only to the military or from specialized black market dealers like The Finn. Cyber-attacks do make use of specialized viral software, but they’re written by humans — often teenagers with plenty of spare time — and are relatively easy to obtain if you hang around the right online circles (or wrong ones, depending on your point of view).
Cyber-attacks were typically pulled off using very specialized hardware built by hardware gurus. Here’s a line from hardware specialist Automatic Jack from the short story Burning Chrome:

I knew every chip in Bobby’s simulator by heart; it looked like your workaday Ono-Sendai VII, the `Cyberspace Seven’, but I’d rebuilt it so many times that you’d have had a hard time finding a square millimetre of factory circuitry in all that silicon.

This cyber-attack was carried out by a botnet, which is essentially a lot of ordinary home computers — stock machines and “commodity hardware” — whose spare cycles are being harnessed by a virus that probably found its way in there via spam, malware site or some other rather ordinary vector.
Cyber-attackers interfaced with their machines by “jacking in”; that is, linking themselves to their machines through electrodes, through which they’d operate in a virtual reality-like environment.

If they ran into “Black Ice”, a deadly form of anti-malware countermeasures, their nervous systems would get fried.

Cyber-attackers interfaced with their machines by “logging in”; that is, linking themselves to their machines through a keyboard, mouse and monitor, through which they’d operate in a command-line environment.

If they typed too long without a break, they’d get carpal tunnel syndrome and their wrists would get fried.

Cyber-attack targets were fancy-pants specialized computer installations accessible to few, such as military supercompters in Neuromancer’s backstory or the AI complex in its climax. The cyber-attack target was the Estonian internet, which people used for everyday activities, from banking to email to looking at pictures of other people’s cats with funny captions.
Fashion: Many hackers wore leather, black jeans and mirrored shades. Hey, this is also true in real life! Score one for Gibson!