Rage of the Machine: The New God Will Fail
"If there are any gods whose chief concern is man, they cannot be very important gods."--Arthur C. Clarke
You can see them at the horizon. Long hidden, they approach slowly, but with the determination of marginalized individuals gathered together in the singularity of Purpose. In their hands, you see torches, pitchforks, banners reading "Death to the PC!" "Long Live the Net!" Like shadows cast by resentment and rage itself, they darken the ground with every encroachment, march closer still, muttering, mumbling beneath their breaths of the tyranny of hard drives and the Interconnectedness of All Things. You could cower behind nearby rocks, or join their growing, ominous ranks ... But they are "coming" no longer. They are here ...
Fortunately, most of the members of this grim band are marketing folks - long-winded, a bit highfalutin', but not especially dangerous. Still, they don't mind sending whole segments of the population down the old rabbit-hole every now and then - for fun and profit. And, true to nature, they are at it again. Yes, the PC as we know it will not last forever. And, yes, the power of an increasingly wired world is likely something that will. But whatever the service, device or system that heralds the New Dawn might be, the Internet appliance (IA) - that i-opener, epod, Dot.Station, web phone, etc. - is not it.
In the rush to arrive at the post-PC era, the Internet appliance is a sideways move at best: a less capable, marginally less expensive PC, marketed to a population that is somehow anti-PC, yet chomping at the bit to get "news! stock quotes! e-mail!" over the Internet. Near the Woodland Park Zoo in Seattle, where a set of Komodo dragons has taken up residence, is a billboard that reads: "There is a reason you've never met anyone from Komodo ..." Something similar could be said for the legions of anti-PC, pro-Internet consumers allegedly waiting to purchase Internet appliances by the bargeload. Do you know why you've never met any of them? Because there aren't any.
I should say, before too much blood or rhetoric is spilled, that this argument has nothing to do with the proliferation of hand-held devices, from the Palm Pilot to Linux-driven devices like Samsung's Yopy and Compaq's iPAQ, which are among the most progressive developments in truly personal computing over the last several years. As the freakish popularity of cell phones can attest, there are few more rational (and, potentially, profitable) directions for personal technology products at the beginning of the 21st century than the development of portable (especially hand-held) computing devices with, say, wireless networking capabilities. And, insofar as the Linux operating system is a player in this development, the flourishing of these machines is a further flourishing of the Linux OS.
But the clamor over IA - particularly those machines that consume desk or counter space much like a PC, access the Internet like a PC, but lack even one-sixth of the PC's basic functionality and value in terms of computing (values such as learning about how computers work to actually programming and building them) - is hype. Perhaps, in the same way the CB radio can be considered one of the Neanderthal ancestors of the cell phone, the IA phase will lead to something that does mark a real, progressive leap forward in a sort of non-portable, home-based, information-creating/processing experience. In such a case, the IA would be properly seen as an interlude. But even as an intermediary step, the IA leaves much to be desired - or not desired, as the case may be. For the IA is a campaign without a natural constituency.
Remember the hacking of the i-opener? (See The Rookery's piece "Honey! I hacked the i-opener!" .) To recap, a Las Vegas engineer, Ken Segler, purchased the $99 Internet appliance late last year and turned it into a real, working computer "simply" by adding a hard drive and installing the Linux operating system. While the developers of the i-opener eventually capitulated to the hacker community, the company's initial reaction was predictable. In essence, Netpliance, the makers of i-opener, roared, "How dare you increase the capabilities of our machine!" and tried to use a mandatory ISP contract as a way to weed out the hackers from the true, blue IA users. This hostility to the spirit of hacking is, in many ways, even worse than the assault on said spirit brought on by the DeCSS case. DeCSS is about access, specifically about the right of individuals to use their talents and technology at hand to alter not the wholesale capabilities of a product, but to allow a broader community to participate: namely, providing Linux users with access to DVD technology. But the i-opener hack was about giving the product an entire new set of additional capabilities, and for that effort, the successful attempt was rebuffed. In short, Ken Segler wanted to bring fire to the i-opener, and Netpliance said, "Remain in the dark".
It is this anti-hacker ethos out of which much IA emerges that makes it interesting to hear Linux people slobbering over IA, particularly those sort of Linux people who once spent time retching over the thought of "dumbing down" Linux for apathetic end users. Hacking, by its very nature, presumes value in working with computers, a value as fundamental to our 21st-century culture as gardening or carpentry. To a hacker, IA is a bunch of flowers purchased at the Safeway supermarket, or plastic furniture bought in a drugstore parking lot. Insofar as hacking is a progressive relationship with computers, a relationship predicated upon investigation, hard work, experimentation and innovation, the IA is reactionary technology - or, perhaps, a reactionary deployment of technology previously used elsewhere to greater (and proven) benefit at only marginally higher cost.
What is an "Internet appliance"? What should it consist of, as something apart from a PC? Too often, IA is the sum of what it is not, chiefly "not complex", as if every PC manufacturer is not spending a major part of every research hour trying to make PCs ever more easy to use and ever more capable. By comparison to the modern PC (the iMac is one, but not the only, instructive example from the consumer/end-user viewpoint), the IA is a glorified dumb terminal: sleek and more attractive, yes, but dumber than a dot-matrix printer. The IA is going to have to offer non-PC users more than the same tired tryptch of "news! stock quotes! e-mail!" that every other mainstream-directed, pro-Internet sales pitch seems to adopt as the come-on of the millennium.
Even IA's greatest feature, the ease with which a user can access the Internet, is suspect when considered competitively with the contemporary personal computer. The promoters of IA boast that Internet access is easier to obtain on a specialty device like an IA than on a PC. Forgetting that shallow learning curve of getting on-line for a moment, this boast begs the observant to ask: have any of you tried logging on to the Internet with an iMac lately? What about the "one-touch" Internet access offered by Compaq, even on its low-end notebook PC like the Presario? Short of patching into cyberspace fully unassisted like someone out of William Gibson's Mona Lisa Overdrive, Internet access cannot get too much simpler. So much is this the case that it arouses suspicion that the IA's Internet access campaign is little more than anti-PC FUD (fear, uncertainty, doubt); is one-step Internet access a major premium over, say, two-step access? And once everyone has secured what can successfully (and accurately) be marketed as "one-step" Internet access, where will the IA's premium be?
And it should be iterated that what we talk about when we talk about IA is a consumer product, not some gamble in the enterprise where losses are part of the price of doing business. For all the technophilia in the consumer market, people are still largely a "look before you leap" bunch. And until IA offers them something they cannot get elsewhere, a premium better than "easier, but less capable", those who are truly Internet-interested will continue to look at PCs. This is especially true considering that PCs are bundled with multi-year Internet packages when sold at places like CompUSA, Circuit City and OfficeMax (and know that this retail market along with Target, Sears and Wal-Mart is where many, though not all, IAs are slated to be sold). On a dollar-for-dollar basis, the Internet bundling packages with most PCs are neither a ripoff nor a bargain for the average, pro-Internet computer user. The main advantage for the PC industry here is the opportunity to re-emphasize that the PC and the Internet are one.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- The Humble Hacker?
- The Death of RoboVM
- The US Government and Open-Source Software
- Why Python?
- Open-Source Project Secretly Funded by CIA
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- ACI Worldwide's UP Retail Payments
- Varnish Software's Hitch
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide