Status Off-Line: Co-worker Panics

While I knew I had a strong online presence, I didn’t know how tightly bound I was to it. I accidentally went off-line, and the blackout raised concern for my personal well-being. Read more…

Those who know me have come to terms that I’m interfaced into the Internet almost in real time. eMail is always the best way to reach me. When I’m sitting in front of a terminal, whether for work or pleasure, numerous chat clients are active in the background. Even away from a machine, my phones and automated scripts keep some kind of virtual presence active of one form or another. As a result, friends, family, and co-workers can see my status, location, and reach me with impressively short response times.

Today something interesting happened.

Last night, I was working on a fairly complicated piece of code and had set up a rather complex environment that I didn’t want to have to reinitialize in the morning. Rather than shutting down the machine, I took all my instant messaging clients off-line, and this morning I didn’t start them up, relying on the built-in chat facilities of Google’s GMail.

However, as I was researching, I accidentally closed the GMail window unknowingly, and to the Internet, I went dark.

I had not realized how connected I had become, using chat and emails as a primary means for others to reach me. Well, that was until a co-worker came rushing in to see if I was alright with genuine concern.

He was fairly certain I was in the next room, his email didn’t get a near instant reply, and there was no way to reach me interactively. For anyone else, this would have been no big deal. However, my heart was warmed by this sincere response.

Yes, folks. If my Borg-like collections goes down, please check on me. I might have died or be in need of immediate medical attention.

A First Grade Observation

I’ve wasted my life, and it took a six year old to provide the intervention.

Water SlideSo some of our really cool friends who live in the neighborhood hold this amazing backyard party each year, in which they rent an enormous water slide that’s about as tall as their two story house.

The day after the party, their real friends head back over to help clean up. And that was what we were doing tonight.

As it started to rain outside, we all gathered the external lights, furniture, food, tables, and so forth. I made a run for a huge extension cord, feeling that electricity and water wouldn’t mix.

Their little girl decided to help me. And, while untangling the cord, she engages me in the most adult conversation that I’ve had with her in the past three years.

She begins, “So, how come you didn’t go down the water slide with me?”

“Well, we had some friends come over, and they wanted to talk.”

“I know. That’s all you do guys do is talk. It’s so boring.”

Remembering this feeling exactly while I was a kid, I thought I’d get her perspective. “Yeah, I know – what should we be doing?”

She paused, placing her finger on her chin. “I think you should do video games and play board games more.”

With a look that I had been given total enlightenment, I replied: “Oh my gosh, I feel like I’ve just been wasting my whole life away.”

“I know,” she agreed a little too quickly.

“Where’s you learn all this?”

She puffed out her six year old chest with pride. “I’m in the first grade.” And as I took in her achievement, she added “Yes, it’s true. I graduated from pre-school. I’m very, very smart.”

And together we wrapped up the rest of the cord, she carried it in, and I went down stairs to play video games with the adults. Honest to God, cross my heart, hope to die, stick a needle in my eye.

iPhone TOS Rebuttal

I held off my iPhone purchase because of an article exposing the evils of the terms of service. However, those have been adequately rebutted, that I now own an iPhone.

One of the big things holding me back from buying an iPhone in the first place, aside from lack of SSH (which was soon resolved), was an article about the hidden evils in the Terms of Service contract.

Well, not sure about whether to take things at face value or not, I bounced my concern off my friend Phil, who’s extremely knowledgeable about telecommunications.

He wrote me back a wonderful point-by-point analysis, which swayed my decision. Feeling that other people might benefit as well, I sought permission from him to reprint it here.

iPhone Requires a 2-Year Contract with AT&T.
1. True; they make the 2-year contract requirement pretty clear. This isn’t a great thing but it’s pretty standard in the U.S. when you buy a phone.

Expensive: Requires $2,280, Over $1,730 in Wireless Costs.
2. Also true, though he overstates the price. The service plan runs about $60/month ($40 voice, $20 data); if that’s too expensive, the iPhone is probably a bad idea. That’s still less costly than a Blackberry or Treo (both about $80/month when you turn on the features needed).

Double Billing. You and the Caller Both Get Charged for the Same Call.
3. True, but not unique to the iPhone. Every cellular carrier in the United States save for a few Nextel plans will charge airtime on both incoming and outgoing calls. If you call another wireless phone user, I suppose you could call that double-billing (though if that other user is on the same carrier [ATT], the airtime rate is the princely sum of zero cents per minute).

All Use of the Networks Are Always Rounded Up to the Nearest Kilobyte or Minute.
4. Standard practice for the wireless industry. The per-kilobyte complaint is pretty funny, though, since the charge per kilobyte for domestic data usage is zero cents per kilobyte.

Customers Are Billed for “Network Errors” and “Network Overhead”.
5. I have no idea what he’s talking about, but it makes no sense.

Billed Even Though the Call Doesn’t Go Through.
6. Basically untrue. Billing in a wireless system begins when the call is answered, though the timer starts when the call is initiated. In other words, if a call rings for fifteen seconds and then is answered, the clock begins at 15 seconds and counts up from there.

Bogus Fees Added to the Bill: Regulatory Cost Recovery Charge
7. While I agree that regulatory recovery fees are basically bogus padding, I challenge him to find a wireless (or, for that matter, conventional wireline) carrier that doesn’t do this.

$175.00 Termination Fee.
8. The early termination fee is pretty well standard throughout the industry. There are certain circumstances where you can avoid paying it (for example, if they raise rates during your contract term).

International Messages Are Charged Additional Fees as Are Files Over 300Kbps.
9. International text messaging (i.e. SMS) costs extra on every cellular carrier I’m aware of. The picture/video messaging charging he complains about isn’t even relevant to the iPhone. And the “additional fee” for large messages that he talks about is irrelevant to the iPhone. My phone communicates directly with my IMAP server over SSL; there’s no way that ATT can tell how large a message is, let alone bill me for those messages over 300K.

Over Your Quota: Get Gouged: 40¢ Per Minute and 69¢ Roaming Offnet.
10. Once again, he’s whining about something that’s absolutely standard in the industry: if you go over your bucket of minutes, you pay a pretty high rate. He conveniently neglects to mention that UNUSED minutes from your plan roll forward into the next month and can be used to offset high usage up to a year later. If that’s not enough, just call and switch to a higher plan and ask them to make it retroactive to your previous month’s usage.

The Services Are Not Secure and Can’t Block Your Phone Number.
11. “Not secure” is a leftover from the days of ANALOG cell phones, which could be listened in upon pretty trivially. And they’re saying that when calling certain toll-free numbers, you can’t block your caller ID since the recipient pays for the call. There’s a MENU on the iPhone that allows you set the default for whether you send caller ID or not; you can also set it per-call. In other words: JUST LIKE A LANDLINE.

The Current Mobile Email Service Doesn’t Support Attachments.
12. Absolutely false. You can send photos trivially (about the only sort of attachment that makes sense to create on a phone), and the iPhone will read a lot of formats (Word, Excel, PDF, JPEG at a minimum).

Prohibited Uses and “Unlimited” Sales Hype.
13. The prohibited uses language is pretty standard wireless carrier language. I agree with him that the claim of “unlimited” is pretty misleading marketing puffery, but it’s an industry-wide problem. If you use your FIOS connection at full bandwidth 24×7, you’ll soon discover that “unlimited” basically means that you’re not billed per unit of data, but that you can still be cut off if you abuse the service. There’s basically nothing you could do on the iPhone that would cause this to happen, though.

Service Is Not Intended to Provide Full-Time Connections: Unlimited is Hype
14. Same as above.

Wi-Fi Service is Limited
15. I think he’s deliberately misinterpreting this one. He’s talking about a completely different wi-fi service that one can purchase through AT&T that has nothing to do with the iPhone. There is of course no limit at all to the number of times in a given time period that the iPhone can connect to a wi-fi network.

“Offnet” Restrictions
16. Another deliberate misinterpretation, I think. “Off-net” usage refers to areas where you’re roaming. Since cell phone roaming charges basically don’t exist anymore for the consumer (the carriers charge each other, though), what they’re saying is that you can’t buy the phone and then use it full-time where, say, T-Mobile has service and ATT doesn’t.

Plan Goobly-gook
17. He’s so incoherent here that it’s hard to figure out what he’s mad about.

Comparing US and Other Broadband Countries: America Is being Laughed At.
18. Perhaps he should move! He forgot to mention that countries using the metric system think we’re pretty silly too–but I’m sure he would have if he’d thought about it. Seriously, he has a point: mobile telephony is more advanced in other parts of the world (largely due to standardization on one network type–GSM). But I’m not sure why that would be the fault of ATT and the iPhone.

The Only Book About Men Women Ever Need

If you had a book entitled “The Only Book About Men Women Ever Need” and could thumb though its table of contents containing questions – what would you expect to see…

The Only Book About Men Women Really NeedMy friend and published author, Danny Adams has expressed interest in writing a book entitled The Only Book About Men Women Ever Need.

In the book, we intend on soliciting questions from women (about men) and giving them an honest, yet humorous slant.

As part of an experiment, Danny used his Live Journal account to see if there was any interest.

There most certainly was.

Check out the comment section on Danny’s blog, and if you’d like, leave questions here or there.

Top Ten Bad EMail Habits

With over ten years of email to sample from, here are the top ten bad habits committed by email senders.

eMailOk, I lied. They’re not ordered, and there’s more than ten. Which ones have your friends plagued you with?

Here’s a list of bad email habits that annoy recipients.

  1. When you reply to an email, don’t hit Reply-All unless you intend to send to everyone.

    For instance, when you RSVP to a party invitation, everyone who’s been invited doesn’t need to know your response.

    There’s a difference between Reply and Reply-All, learn it, and use it wisely.
     

  2. You do not need to insert your response above my email and send the whole thing back to me.

    When you hit reply, many mail clients copy the whole of the sender’s message so that you may reference it. Don’t whack a few returns, enter your response, and hit send. Delete the quoted message.

    I can’t stress how important this is for anyone who wants to maintain a sane thread of conversation. This is especially true for replying to Internet newsgroups and mailing lists.
     

  3. Do not reply by inserting your text into the quoted text, even if you make it a separate color or font.

    The most unreadable email comes when people reply to a message, and then just type after a paragraph – usually without a line break. If the recipient’s mail client can’t preserve the color or font, it becomes unclear who said what.

    Those quote levels are there for a reason.
     

  4. Reply-to-reply-to-reply-to-reply…

    You typically see this on mailing lists where someone responds with a short message, preserving the entire historical chain of messages up to that point. Stop it. If you see more than two levels of quotes, something is dreadfully wrong.

    There’s what you’ve said, there’s what everyone else has said, there’s what you’re saying now. If you see more than two levels of quoting, someone is committing at least one of these bad habits.
     

  5. Check the To and Cc fields before you hit Reply-All

    If you’ve been blind carbon copied to a message, there’s most likely a reason the sender did so — that usually involves not wanting the public recipients to know you were included.

    For instance, I maintain a list of my friends’ birthdays. Quite often, I’ll send a happy birthday greeting, but BCC their other friends as a subtle reminder. When someone hits Reply-All, it lets the birthday person know that someone else had to be reminded.

    Be considerate to the sender when that person trusts you by using BCC.
     

  6. Don’t attach a picture or video you found on the internet.

    Attachments take up space, they make getting mail slower, they take longer to download, they chew up quota. If you found something on the Internet, send the link, not the resource itself. The recipient can then use the most efficient means of getting it.
     

  7. Learn to use image compression

    If you are going to send an email with an image attachment, then at least learn to use image compression so that you have a small attachment. I can’t begin to count the number of times someone’s sent me a megabyte jpeg of something stupid.

    Like the web, try to keep images down to 32K or less, if possible. Be respectful of the other person’s INBOX space.
     

  8. Learn to upload content to a server

    Rather than clogging email with attachments, learn how to beam content up to a server, and then point the recipients at the content. The email will be smaller, often get there faster, not take as much space, and can be pulled from online faster.
     

  9. Keep your signature block small

    I don’t need random quotes. I don’t need legal disclaimers. I don’t need ASCII pictures. I don’t need colors and fonts. I don’t need your picture. I don’t need advertisements. I don’t need a notice a virus checker was used. I don’t need your slogan. I don’t need your logo.

    Plainly put, if your signature block is equal to or larger than the content of your message’s body, something’s wrong.
     

  10. Get a personal account, use it as such

    I hate automated legal disclaimer blocks, especially in signatures, and even more so if they are larger than the message content.

    “The information in this email is confidential,…”

    If you’re sending me an unsolicited personal email from your corporate email and someone thinks that legal block is somehow enforceable, forget it – you can’t just throw a legal stipulation on a person, especially if the mistake is yours. As such, I’m not bound to delete the message, either. This fluff is just annoying, and yes, most likely it comes from your work. So, get a personal account. Use it instead.

    You do know your work is legally allowed to read your private mail when you use their systems, yes? That alone should scare you.
     

  11. Stop attaching your vCard on every email

    If you’ve sent me your vCard, I’ve got it in my address book – I don’t need a copy with every email.
     

  12. Stop using backgrounds for the sake of backgrounds

    It’s one thing if your email has some functional layout and design to it, but if you’re just sending a background for the sake of adding texture, don’t. The most common occurrence I see of this is a repeating tile of textured background. Honestly, plain white is easier to read and prints better. Let’s do without the visual noise and extra attachment overhead.
     

  13. If it’s a short message, use text mode.

    Fonts, formatting, colors, and embedded images convey additional information. If you don’t need it to get your point across or add additional clarity, don’t incur the extra overhead of making an HTML message. Plain text messages are much easier to read and respond to on mobile devices.

    We’ve all seen documents and adds that look busy or appear as font soup; don’t commit the same atrocities with your emails.
     

  14. Stop putting pictures in Word and PowerPoint files

    I can’t count the number of times someone’s wanted to send me a few images, and was so clueless that they had to make an Office document to hold the picture. The amount of waste, inefficiency, and platform specific ties this incurs is mind boggling. I just can’t take people seriously who do this.
     

  15. Don’t blindly forward and email and not tell me why

    I’m not a mind reader, I just play one on TV. Yes, the information forwarded may be pertinent, but unless you establish some kind of context, it may be perceived as junk.

    Never assume the reader of your message is going to get your message in a timely manner, or will be reviewing it with the same mindset or information you have immediately at hand.
     

  16. Don’t use tiny fonts

    A number of corporate emails I get arrive as HTML documents with 6 point fonts. Yes, you might have a pretty poor monitor, and it may appear big on your screen, but if you force me to read something at a fixed size, my huge monitor will render it as the microscopic text that it really is.

    If you want me to read your email, make it readable.
     

  17. Run spell check

    If you’re typing and a word is underlined in red, double check and fix it. Additionally, avoid cell phone abbreviations like using UR for “your.” You’re not limited to 120 characters, and you’re not being charged 10 cents per message. Use enough to be clear.

    Emails are often saved, and consequently searched. If the words in your email aren’t ones entered into a search box, then you’ve made if difficult for someone to find or reference your email.

Good Friends That Make You Look Bad

What do you do when your significant other leaves for a long duration?

I have a friend who’s girlfriend is going to be out of town for the week. He writes me stating that he’s going to fix her computer, get her a new phone, catch a show with her before she leaves, and detail her car before she returns.

He’s a better man than I.

Me? My wife is leaving as well. My plan? Leave the toilet seat up all week.

Mac to Windows: The Experience

I corrupted my Windows tech guru, turning him on to Apple. He explains from a Windows viewpoint what it’s like to deal with a bare-metal install on Apple compared to a pre-installed Windows system. In this review, we see a totally different perspective: rather than focusing on features, Marcus addresses the overall experience.

I have a good friend, Marcus. He’s a super-uber-master-wizard at Microsoft operating systems and has astounded me on numerous occasions with obscure tidbits of advice from secret registry edits to recovering from system crashes so bad that even Microsoft would recommend switching to Linux.

Why tell you about Marcus? Because I have corrupted him. Yes, it’s true — I showed him the Mac.

No, not the stupid little in-store demos where you can create a photobook with iLife; no, I gave him the real demo, the one reserved for hard core developers.

Marcus shortly thereafter obtained his own laptop, and quickly made the swap to OS X, abandoning in a fortnight over a decade’s worth of emotional ties to Microsoft.

Or so I thought. Marcus writes me, he’s got some new emotions pertaining to Microsoft.

What follows are Marcus’s own words, as only a Windows power-techie can explain. But this review of his isn’t about the features, it’s about the experience.

Marcus writes:

Macintosh. Every time I find another tool that Apple offers to make my life easier, I realize that the scale tips in there favor. I was able to rebuild that drive yesterday in under 2 hours using the transfer my data method from the OS CD. So as my positive experience increases with Apple, inversely that causes an increasing disappointment of Microsoft. I am still shocked that Apple will provide a utility that will allow you to replace your hard drive and automatically transfer not only your profile and files, but all of your applications and their licenses. I booted up and everything is working.

Marcus had an external Apple drive loaded with data and applications; he wanted to install a fresh new version of the OS on a different machine, but port over everything from the old disk – but not the older OS that was on it. Apple’s default OS installation does this automatically, cloning from another system.

Dell vs. McAfee. I bought a Dell Inspirion E1505 laptop for my nephew, Justin, to take to college with him. After putting in over ten years of technical support for various companies I’m now the technical support for the family when it comes to PC’s. I thought I would just open up the laptop and setup everything for Justin in advance. That way he could have one more kid moment when he opens the gift, it would be in a functional state and ready to work, i.e. play games.

I opened the box on a Tuesday night around 6pm. I got everything ready and turned on the laptop. Immediately things went wrong.

1) The network drivers were not loaded, so the system could not call Microsoft to register.

2) Once getting to the desktop, Internet Explorer crashed with a fatal error requiring a reboot.

3) McAfee was not installed correctly and reports too many errors to even cover. This required ALL of McAfee Security Center to be uninstalled.

4) Microsoft Update was not installed, rather they were using the old Windows Update. It crashed 3 times attempting to install this update. (Note: Microsoft Update patches all MS products, verses Windows Update, which only updates the OS.)

5) After Microsoft Update was installed, the real patches start to download. Two hours later on broadband, another GB of the hard drive gone, the system appears to be nearly functional.

6) At this point it’s getting close to 9pm on Tuesday. All of the Microsoft OS and applications are patched, registered and working properly.

7) I reinstalled McAfee. The installation appeared to go smoothly. The application no longer reports any errors and results in a HUGE green checkmark saying that my system is protected.

8) Next, I initiated the Update feature of McAfee and this is when it all goes wrong. A window pops up asking me to register my software now or later. Since I had purchased a 3 year contract with them, I would really like to do this to get full support from them. I select to register now and I got an hour glass suggesting something was going on, the screen flashed and nothing happened. I saw a little red circle moving next to the clock in the tool bar reporting that 16% of the updates were complete; however, the software was not registered. After the download is complete, it requested a reboot.

9) After the reboot, I did a right click on the M icon now next to the clock. This is McAfee Security Center’s ideal of easy access to their software. I was presented with several choices, but thought I would start with Product Setup. I selected that field, got an hour glass, a screen flash and nothing again. I decided to just select open Security Center this time. The application still reports everything is working properly within it’s horrible “Crayola” interface. I again attempted to verify if the updates were complete, so I selected Update. Again the register now button appeared and failed. After trying this several times, by 10pm I was completely done with this thing for the night.

Thursday (yes, I have a life and was busy on Wednesday):

1) I turned on the laptop and found that McAfee was still in the same state as I had left it.

2) I called India…rather, I called Dell’s technical support. They reported that this appears to just be a software problem and that I should call McAfee.

3) I called McAfee. Press # for Home Products. Press 1 to make a purchase, Press 2 for something, Press 3 for technical support. Technical support will cost you 2.90 a min, but feel free to use the free technical support on the web via right clicking the M on the toolbar and selecting Customer Support. (Note: You mean the M icon that’s broken and will not do anything for me. WOW, what a terrible idea!)

I decided to Press 1 to make a purchase. I told them I wanted to verify that I was a customer with them since I was paying for a 3 year subscription that I could not register. I gave them the Dell service tag number and I was not in the system. Then they asked for an email address or my customer number. I had to then explain again that their on-line registration was broken and that they would not have yet received any such information from me. They then asked for a phone number to look me up that way. Again reminding them that I had not given them anything yet to create an account. So, they manually created an account for my nephew. I thanked them for putting me in the system, but had to explain again that in now 6 days the application reports that if unregistered it will cease to function. They of course argued that I’m in the system and a paying customer. While on the phone, the application gave me yet another reminder to register.

Annoyed with McAfee’s mentally challenged support staff, I called Dell back.

I explained the situation of paying for software that is going to disable because it could not be registered. They worked with me for 45 min trying to find a solution. Then without pressing the issue any further, Dell informed me that I can simply request a replacement laptop within the first 21 days or my money back if I’m not satisfied.

Bottom line, Dell was so professional. Dell offered all the information I needed to just wash my hands of this whole matter. McAfee on the other hand really doesn’t seem to want to help anyone. Considering the choice between McAfee and Norton, I’m not really impressed with either, but at least Norton knows how to register their software.

To sum up, with OS X, Marcus was able to do something in approximately two hours that’s completely impossible to do with Windows: install an OS from scratch and move everything from an older system to it seamlessly.

On the Windows side of the house, even when it came pre-installed by an experienced vendor, it took him, a super Windows guru with a decade of experience multiple days and phone calls just to get Windows to a point where it could be given away as a gift.

Marcus, next time perhaps Justin would like a Mac? You did.

Avocado Wedding Cake

A friend of ours bakes a wedding cake and asks us to taste-test her trial run. Unbeknown to her, we’ve

My wife holds a social movie night every so often, and part of the tradition involves making dinner. This responsibility passes around the group, though we’ve found it more enjoyable when guests surprise us with desserts.

One such guest had spent about 12 hours on a trial run making a four layer wedding cake, and she was eager to have us try it. As she brought in one layer, we determined we might need a little more to address the slightly larger crowd. So, she ran out to the car to get the rest.

During her exit, I thought it might be amusing if we all pretended it was a little off, and by the same flavor.

Someone called out, “Avocado?”

“Yes, run with it. When she returns, we’ll all independently taste it and go ‘I didn’t want to say anything, but does this taste funny to you?’ ‘Yeah. It taste like a hint of… I can’t quite placed it…’ ‘Avocado?’ ‘Hmm, yes, that’s it exactly. Avocado. Is this an Avocado cake?'”

At that point, others in the group would start concurring and vocalizing commentaries on the unique flavor.

The cake, of course, was perfectly fine. But when a room full of strangers mysteriously home in on the same awkward point simultaneously, or at least it appears that way, you’ve got to wonder who’s going to break the straight face first.

What really brings this point home is that the guest is actually a fantastic cook and everyone looks forward to when she brings her treats for the group. She’s got quite an underground reputation of baking the best sweets. So, to have something uniformly off by consensus, especially when she’s already tried it, is be high in the amusement scale. Given she also has a great sense of humor, it passed the Will-Walt-Receive-Bodily-Harm test.

Unfortunately, I happened to be upstairs addressing a client issue and missed the actual performance. Although this morning, I did get an instant message that said “Avocado! You don’t mess with someone who’s been up late cooking like that!”

Christy, my apologies. I promise not to do that to you again, well, at least until next week.

Seven Girlfriends To The Perfect Spouse

What do walking sticks, card shuffling, and movie stars have to do with finding the perfect mate? They seem to support that you can find your spouse by seriously dating seven people.

When one goes to a technical conference on Java, perhaps the last thing you’d expect the a speakers’ lunch conversation turn to is mathematical selection of a mate.

I suppose it started simply because we had been talking about change. The topic started with source code change, changes at the office, and moved into changes in people. I offered up the classic observation that women get frustrated at their men because they don’t change, but that men get frustrated at their women because they do.

One gentleman was lamenting on his situation and admiring the subtle manipulation by his wife prior to his flight:
“Honey, ” he relates she began, “you should probably lose some weight, though I’d still love you if you were fat as a house.” And, after a momentary pause, she inquires, “Do you think I need to lose weight?”

Apparently his response of “I always love you, too” wasn’t quite what she was looking for.

Another speaker spoke up and added, “Well, I don’t have that problem at all. We’ve come to an agreement. I can be either fat or bald, but not both.”

Absolutely curious, I asked how that arrangement was sought. That just isn’t the kind of thing that normally just comes up as the finer points of marital negotiation.

He pondered and explained it started by as an ultimatum by her — unfortunately for her, she was engaging with one of the brighter logical minds…

“Honey, I’ve thought about it, and you can’t grow up to be fat and bald.”
“Really? Well, I have no control over being bald.”
“Oh. Well then you can grow up to be bald, but not fat.”
“Well, if I can be bald and not fat, then it’s only fair that I can also be fat and not bald.”
“makes sense, that sounds fair.”
“Then it’s settled, I can either be bald, or fat, but not both.”
“Agreed.”

And at that point, he took another bite of cake, stroking his head of hair with the other hand.

But this started a fantastic digression about how one knows when you have the right person in your life. We’d all just come out of meetings pertaining to measuring, quantifying, trend analysis, and metrics.

Based on rough calculations, to calibrate the scale and distribution of a sample size population, to do the best you could do, in a short period of time, it was concluded that you really needed to examine at least seven samples. At that point, you have a reasonable approximation for making a reasonable judgment call, and it was just a matter of how many standard deviations you were discriminating for.

A simple example is called for.

You’re walking in the woods and you’ve been given the task to pick up the best walking stick you can find. But the rule is, once you set it down, you can’t pick it up again.

So, you pick up the first stick you come to. However, you don’t know if this is the largest, or smallest. You have nothing to compare it to. With no basis for comparison, you set it down.

So, you pick up the next stick you come to. And you start to note more attributes, such as weight, shape, type of wood, etc. And again, you drop it.

So, you pick up the next stick you come to. As the attributes that interest you start to prioritize, you find yourself become more aware of the quality. You start looking at things like balance, general utility, wear, and things that come along with the stick, such as moss or termites. Some things are alterable, others are not.

As your go from stick to stick, each time you’re refining your assessment abilities and have gained more knowledge about what you’re looking at, as well as determining what you want.

After your six stick, depending on the breadth of the distribution you’ve encountered, you’ve started to formulate an accurate picture of of what you can reasonably expect. At this point you simply decide what criteria must be met, and the next stick that meets that criteria, you take. Permanently.

Oh sure, there might be something else better out there, but the effort, cost, time, dangers, and availability will more than likely offset the value you’d currently have. Trading your walking stick for something new, only trades existing faults with new unforeseen ones.

The same mathematical application applies to the dating scene.

Young couples find themselves inexperienced for selecting long term candidates and determining personal discriminators: there are unforeseen personality clashes, other options suddenly look more attractive, and if one settles too prematurely, it usually means being treated like a doormat or being taken advantage of financially.

Who among us didn’t stumble upon infatuation and think it was true love at sixteen? Or, find an exciting girlfriend only to discover character flaws that were obvious to our friends, family, and even our own 20/20 hindsight? Or, have everything wonderful and stable only to have it all turned on its ear for not explicable reason just as she turned twenty.

Unfortunately, for many, desperation or loneliness causes some people to settle well before their calibration process is complete; these people usually learn the hard lesson that being trapped in a bad relationship is worse than being lonely.

Alternatively, there are those that spend too much time in the calibration phase, and totally miss out on the longer term joys that are more rewarding.

It’s also interesting to note that we see microcosms of discriminating selection occur around when context and locality are ignored and we forget the more global nature of the chase.

One example may be the cruise ship filled with old geezers, of which in that context, some middle-aged person who’d never catch your eye looks fairly darn attractive in light of the situation. Same goes for co-workers, people met in bars, or even at parties — the limited selection forces expectations to be lowered.

This is why online dating services that give the illusion of many candidates keeps people seeking for perfection, while speed dating narrows the options and forces a compromised choice or none at all.

Of course, one might also say that it’s the reasoning behind things being in the last place you look, for once you make the find, the search is over.

Seven, however, lets you home in on a very acceptable choice that you can be genuinely be happy with, rather than waiting forever. For you too have a shelf life, and by the time you find the ideal through an exhaustive search, you may be too old to do anything about it.

I ponder, though, if there’s something more special going on.

For example, we’ve all heard of six degrees to Kevin Bacon, at that point you’ve traversed enough paths to get where you want.

Additionally, and I think this was in a story by Wired Magazine, a number of years ago, there was a mathematician who was going on a long horseback cattle drive. To amuse himself, he brought along a deck of cards, and spent the time shuffling it. At the end of his trip, he had mathematically deduced that for a deck to be sufficiently randomized (that is any card could be assured to physically be in any position), it required the deck to be shuffled seven times.

In both cases, we see that seven got us a good sampling — and with a good sample, an intelligent choice can be made.

Inside the Seven Dimensional Problem Space of Quality Assurance

Jeff Voas presents a compelling simple model in which to represent all programming problems, however upon exploring his seven dimensional model, something pretty amazing surfaced.

The other night I happened to happened to have dinner with an old friend, Jeff Voas. He was telling me about a new problem he was working on in which he hypothesizes there are only seven dimensions that describe all computing problem implementations.

While these dimensions are truly independent, and thus orthogonal to one another, it helps to visualize them in the following manner: you have software that runs on hardware which exists inside some environment, these three things are subject to threats; in addition there are non-functional requirements (such as performance and reliability), and everything is operated within a set of defined policies. All of these things are in respect to time.
Seven Dimensions of the Computing Problem Space
Jeff challenged me to come up with any problem that didn’t fit within this model. I could not.

Jeff also pointed out another interesting attribute of his model. That time and threat space could not be locked down. Everything else could be set into stone, frozen forever.

The implications of this, are fairly straight forward, and that is even if you don’t change anything, new threats can be discovered, resulting in your having to change at least one of the other dimension points to compensate. If one could quantify a baseline as a function of these seven attributes, it would become possible to measure changes as a whole. Even better, risk and change impacts can be better assessed and communicated.

What interested me, however, was the reason two of these dimensions could not be locked down, while the others could. I shared my thoughts with Jeff, who after hearing them, sadly pointed out it was a little too late to get this new insight into the IEEE paper.

Physical Three SpacePut aside the model we were working with and consider for just a moment the real physical world of three dimensional space that we live in. Those dimensions are up/down, left/right, in/out to keep things simple.

Clever sorts will blurt out “you forgot time, time is the fourth dimension.” They’d be wrong, because they’re jumping ahead of themselves. Time is not space, but is merely an aspect of where something is in space. Should one actually write it out as a tuple, yes, you get (X, Y, Z, time), and mathematically you can work such problems as having four variables, all independent, thus mathematically orthogonal, and treat them as if they were all dimensions. But, and this is key, I’m not using that definition for dimension. I mean it in the purer sense of the word, meaning that it is possible to move forwards and backwards along any dimensional axis.

Here’s the key: time is not a dimension, but a vector. It only goes in one direction.

Now, here’s a little puzzle for the brainiacs in the group. What other attribute of our physical real universe is also a vector and not a bidirectional dimension?

The answer happens to be entropy; the universe is slowly falling into a state of disorder, and there’s nothing we can do about it. Any amount of effort to reinstill order in one place just speeds up entropy somewhere else, even if it’s just consumption of energy or heat loss.

Turning back to Jeff’s model, I proposed that he actually only had five dimensions and two vectors. The reason time and threat space could not be locked was because they were vectors. He pondered and bought into that notion.

Then comes the zinger. If we only know of two vectors in the real world, and the model attempts to quantify real world problems, and there are two vectors in the model, then is it possible that the threat space is entropy?

There are few moments in life where you actually get to see the gears turn and smoke come out of the ears of a bright Ph.D., and I watched Jeff retreat into his own mind for a minute or so and then reemerge – he concluded with me that it was, and that it was a shame the IEEE article had already been submitted.