Fired Up and Ready to Go

 

Samsung recalled their new Galaxy Note 7 smartphones last year after some of their lithium ion batteries overheated and either caught fire or swelled and caused other damage. The amount of batteries having problems was quite small in proportion to the amount manufactured, but once the reports got out, the resulting bad publicity constituted a fire of its own that Samsung needed to extinguish. Lithium ion batteries overheating and causing damage or dangerous fires is nothing new, and the problem is not limited to the batteries in Samsung smartphones or particularly in the Galaxy Note 7. What is relatively new are the quick charging and wireless charging features of some newer smartphones, including the Galaxy Note 7.

 

2011 SEMC BA750 back
Back of lithium ion battery,
showing safety warnings;
photo by Solomon203.

 

As batteries go, lithium ion types are particularly volatile and susceptible to malfunction from mishandling or careless manufacturing. That has been the trade-off for batteries that are lightweight, relatively energy dense, and capable of going through hundreds or even thousands of charging cycles without suffering from the memory defects of previous compact battery types like nickel cadmium. Consumer demand is for long battery life combined with quick charging, in a phone that is slim and light, and in the past few years cell phone manufacturers have responded by including quick charging and wireless charging features, while maintaining or even increasing battery capacity.

 

Wireless charging, while it has many benefits such as the capability of being a universal method of charging that eliminates dependence on proprietary wired chargers, is relatively inefficient and therefore loses more power to heat than wired chargers. Heat is bad for batteries, particularly lithium ion types. Quick charging technology that can add a 50% charge to a phone’s battery in 15 minutes requires strict attention to software design in both the charger and the phone to monitor the process, lest it cause overheating. Think of how it is possible for a NASCAR pit crew to dump over 20 gallons of fuel into a race car in less than 10 seconds using only gravity and special attention to venting, and do it safely, and then think of how complex the monitoring system must be for quickly charging a smartphone battery – which includes a flammable electrolyte – when you consider that charging introduces electricity into an essentially chemical process. It’s a wonder the proportion of failures isn’t higher than it is.

 

It turns out the defect in the Samsung Galaxy Note 7 was largely a design error of squeezing too large a battery into the phone. Or the compartment in the phone was too small for the battery. Either way, because of the tight fit the positive and negative plates within the battery got closer to each other than they should, overwhelming the separators meant to keep them apart, and causing some of the batteries to overheat to a disastrous degree. No doubt Samsung’s corporate culture is to blame for this, because unlike other manufacturers they test their batteries in house, and in this case they were rushing to compete with Apple’s impending release of the iPhone 7. The design error was either overlooked in the rush or considered not serious enough to warrant a redesign delay that might keep Samsung from beating out their chief competitor in the smartphone market, Apple. Whatever the issue was, this time Samsung’s attempt to get a jump on Apple backfired.
― Techly

VoltaBattery
Alessandro Volta’s battery on display
at the Tempio Voltiano Museum
in Como, Italy; photo by GuidoB.

 

 

A Green Screen Christmas



Here are two videos, one from 2008 by way of 1968, and the other from 1951, with a stop along the way in 1989 for colorization. The Elvis Presley and Martina McBride “duet” is quite convincing if you don’t know who Martina McBride is, and therefore don’t know she was only two years old in 1968 when Elvis taped his Comeback Special for television. Martina McBride, wearing a wig and clothes to match 1968 fashions, taped her part in 2008 in front of a green screen. From the smoothness of the matching in lighting and other details, you could be forgiven for thinking this was a real duet, without the skeptical quotation marks around the word.

The second clip is from the 1951 film version of A Christmas Carol, made in England and released there as Scrooge. Within the set of clips in the accompanying video is an example of the optical printing process, which was used to show Marley’s Ghost as semi-transparent. Effects were less convincing in those days – at least they seem so to our modern eyes – but good acting and a strong story do wonders to allow us to overlook that. Here’s to the ghosts of Christmases Past!
– Techly


 

The Skimmer Scam

 

Thieves have been using the latest technology to quickly install ever more undetectable credit and debit card skimmers at gas pumps, and even at the card reader inside the gas station. Parts are available cheaply on eBay, and the risks are low while payoffs are high. Installing skimmers on isolated Automated Teller Machines has always been popular with thieves, but now with newer technology that takes mere seconds to install, the greater exposure to detection from passersby at gas pumps over ATMs is not as much of a factor as before. A skimmer placed on a gas pump can offer a larger payoff than an ATM because of the generally higher amount of customer visits.

Diners Club Regular Japan 2016
Diners Club Regular Card with Integrated Circuit, issued in Japan, 2016;
own work by Hitomi

The new smart credit cards, which are the ones embedded with EMV (Europay MasterCard Visa) integrated circuit chips, are far less susceptible to skimming than cards with magnetic stripes only, but while the new cards are rolling out, businesses need to maintain backwards compatibility with magnetic stripe cards, and that makes the United States fertile territory for card skimmers. The United States has also been slower to implement EMV technology than other countries because of the huge cost of replacing all the card readers. It wasn’t until the impetus provided by the high profile Target stores identity theft case in 2013 that US businesses and card providers started moving earnestly toward the new standard. Liability shifts by providers, meaning whether they will reimburse losses by card holders to fraud and identity theft or shift the liability to businesses, are slated to begin for the old magnetic stripe cards in October 2017 generally, although some providers have implemented shifts for some types of card readers as early as October 2015, and other card readers won’t incur a liability shift until October 2020.

 


One to four years until full implementation of the new EMV-only card readers is an enormous window of opportunity for thieves armed with the latest skimmer technology. Gas station owners are trying the low cost stopgap of applying stickers to the pumps for evidence of tampering, but those can only help detect the installation of internal skimmers. Users of the gas pumps will have to be aware of anomalies at the scanner, the keypad, and the pump generally. They should also be aware that using a debit card is riskier than using a credit card, and to keep a close eye on their card statements for suspicious activity. The surest safeguard, of course, is to pay cash. It might be worthwhile for customers as well as business owners to remember the old saying immortalized by the humorist Jean Shepherd in the title of his 1966 novel In God We Trust: All Others Pay Cash.
– Techly

 

A Grain of Salt

 

The picture here of Harry Truman is in no way meant to conflate him with Donald Trump, but merely to illustrate the similar nature of their upset wins. In 1948, polls had the Republican challenger, Thomas Dewey of New York, ahead of Democratic incumbent Harry Truman. The Chicago Tribune, a newspaper which made no secret of its dislike of Truman, was so certain of his impending loss as it went to press late on the night of the election that it went ahead with the infamous headline “Dewey Defeats Truman.” Two days later, after Truman left his home in Independence, Missouri, where he had awaited the election results, his train stopped in St. Louis and he posed on the rear platform with a copy of the Chicago Tribune and with the former Democratic mayor of St. Louis, and in 1948 Postmaster of St. Louis, Bernard Dickmann.
Dewey Defeats Truman
Harry Truman with Bernard Dickmann in 1948

 

Certainly in 1948 newspaper technology played a part in the Tribune’s error, on account of the extensive lead time needed to typeset the pages, photograph the plates, and print the paper. Other newspapers faced with the same technical limitations, however, did not make the same error. Confirmation bias, or wishful thinking, played a larger part in the decision by the Tribune brass to print that headline. They saw all the polls picking Dewey as the winner, and because they wanted Dewey to win – or rather, they wanted Truman to lose – they confirmed their bias in print.

 

As the 2016 election results came in, it became clear that most polls, which up until election day had Clinton ahead of Trump, were wrong again as they had been in 1948. Granted, Clinton narrowly won the popular vote, but at nothing like the three to five percentage points many polls gave her. It seems the electoral vote win by Trump was brought on by taking a few Rust Belt states away from Clinton, all of which the polls generally had either solidly in Clinton’s column or leaning her way. Two factors come to mind here in the disconnect between the polls and the election results, one having to do with the methods pollsters use and the other having to do with voters and media ignoring the disclaimer that comes with all polls, namely the margin of error, typically about three percent. That’s the grain of salt people should take when they read polls, but often choose to ignore.

 

A particular problem with predicting the 2016 presidential election was how quickly the race tightened up in the few weeks between the aftermath of the last debate, when the buzz nationwide was about a possible Clinton landslide, and the weekend before the election. Also, polling up to the last minute did not appear to show a change in the amount of voters who remained undecided. Most of the undecided voters appear to have waited until election day to go for Trump, and that shows in how Clinton’s numbers remained practically unchanged from the polls to the election results, while Trump made up the difference of three to five percentage points he had been behind in the polls. In future elections, pollsters will have to reexamine their methods and consumers of polls will have to remember to take that grain of salt.
Vanity mirror
Vanity mirror; drawing by David Ring
for the Europeana Fashion project
John Podesta
John Podesta in 2010;
photo by Flickr user Connormah

 

Meanwhile, in the aftermath of the election, the Clinton campaign and the Democratic National Committee are casting blame on everyone but themselves for the debacle of losing to a Republican candidate that few political insiders, not even in the Republican establishment, thought could win. The Democratic establishment, with great hubris and with apparent confirmation from the polls, arrogantly expected their candidate to win in a walk, and to their eventual detriment they didn’t appear to care about courting the votes of working class and middle class people in the Rust Belt. We shall see if John Podesta, chairman of the Clinton campaign, and the rest of his crowd learn anything from this, but in the meantime to help them do so they could use a long, hard look in a mirror if they want to assign blame.
– Techly

 

The Fickle Fingerprint of Fate

In May of 2016, Department of Justice officials wrote a memorandum seeking a warrant to search a Lancaster, California, premises and to force the occupants to unlock any phones or electronic devices with their fingerprints if the devices were equipped with that technology. This amounted to a fishing expedition to circumvent previous court rulings which held that law enforcement could not compel a criminal suspect to unlock an electronic device with their pass code because that would be a violation of the Fifth Amendment protection against self incrimination. It is unclear whether the DoJ ultimately received the warrant they sought because not all documents related to the case are publicly available.

Creation of Adam (Michelangelo) Detail
“Creation of Adam,” by Michelangelo

Why is compelling a suspect to unlock a device with their fingerprint also not a violation of the Fifth Amendment? Because of a 2014 ruling in a Virginia Circuit Court which stated that fingerprints and other bodily attributes are not protected, while handing over a pass code to law enforcement is divulging of information, which is protected. Law enforcement has long been able to use a suspect’s physical characteristics to incriminate him or her, but has not been allowed to compel a suspect to give up information. The problem now is that technology has leaped ahead of current law, and judges and prosecutors are falling back on anachronistic case law to cope with the use of biometrics like fingerprints and iris scans to lock personal electronic devices. Case law going back one hundred years and more treats fingerprints as a way of determining a suspect’s culpability at a crime scene, not as a key to a suspect’s possessions which may or may not contain evidence. It is obtuse to claim that a fingerprint or any other biometric is not the same as a pass code when it is being used for the same purpose.

All seeing eye
“All seeing eye,” from U.S. currency

The use of biometrics is springing up not only in consumer devices, but in technology used by the military and law enforcement. The 2002 film, Minority Report, depicts a dystopian future when law enforcement and advertisers make great use of biometrics, and those predictions are proving more accurate with each passing year. The Department of Justice already uses facial recognition technology for surveillance of people in public spaces, and as we have seen with the National Security Agency, the ability of modern digital storage to accumulate massive amounts of data encourages the practice of scooping up everything indiscriminately. Like a fishing trawler using a drift net, law enforcement intends to collect everything now, store it, and sort it all out later. They think they are being efficient and better safe than sorry. But people are not fish subject to by-catch, which ought to be obvious enough, and to be sure the Fourth and Fifth Amendments to the Constitution make the distinction clear.
– Techly

Randolph County Veterans Memorial Park Bill of Rights marker
Randolph County, Georgia, Veterans Memorial Park Bill of Rights marker;
photo by Michael Rivera

No Comments from the Peanut Gallery

Howdy Doody peanut gallery circa 1940 1950s
Buffalo Bob Smith of “The Howdy Doody Show” with the Peanut Gallery

Some may remember the 1950s television program “The Howdy Doody Show” and its studio audience of children who were known as the Peanut Gallery. The show started on radio in 1943 and adopted the designation of peanut gallery for its audience from vaudeville, where it referred to the rowdy denizens of the cheap seats, who often heckled the performers and pelted them with peanuts. In adopting the peanut gallery term “The Howdy Doody Show” cleaned up the associations from earlier uses of the term to the point it became synonymous with that program, at least for that generation. As a side note, the comic strip Peanuts borrowed its name from the Howdy Doody version of the peanut gallery.

The vaudevillian archetype of a peanut gallery has never gone away, of course, as there have always been venues for the unruly mob to express themselves in anonymity. In the past, the opportunities were limited. Now, anyone with a computer and a desire to vent can post a comment online. Never before has the peanut gallery found a forum with as wide a reach as the internet. They are no longer the cute, freckled tykes of “Howdy Doody,” however; now they are known as Trolls.

Many online publications, which at first welcomed comments from their readers for various reasons, have been rethinking their policy after discovering a comments section that is not moderated eventually descends into a cesspool of vitriol largely stirred up by trolls, while moderating a comments section costs time and money. Some publications have decided to do away with their comments section altogether (the policy this website follows, by the way). There are websites which have found some success encouraging commenters to moderate each other with up or down votes on comments.

Anonymity online does a great service promoting and protecting free speech, even when the words someone chooses to use when exercising their right to free speech aren’t agreeable or important. While anonymity encourages the outspokenness of someone who has a worthwhile contribution to make, it does the same for someone who doesn’t. Who is to decide what is worthwhile? You are, for yourself, as others are, for themselves. Trolling can’t be legislated away or even moderated away entirely. It can be shut out, though unfortunately at the price of shutting out worthwhile comments as well. In the end, the best practice for many internet users is probably still the one expressed by some sage in the early days of the internet who advised “Don’t feed the trolls.” They’ve got their own peanuts, after all.

– Techly


Don't feed the trolls, Fløyen
By VS6507 (Own work) A sign saying “don’t feed the trolls” on a mountain Fløyen in Bergen, Norway

Getting to Know You

 

Online Privacy and the Founding Fathers
“Online Privacy and the Founding Fathers” by Matt Shirk


The comedian George Carlin used to riff on oxymorons, phrases he found absurd such as “military intelligence” and “business ethics.” To that list we could add “online privacy.” The internet has always been a public place which gives people the illusion of private communication because of how they access it, from a handheld device or from their own computer. Recently in a ruling on a class-action lawsuit concerning Yahoo’s practice of scanning emails, a federal judge affirmed that online privacy is not for everybody.


In the lawsuit brought against Yahoo by email users who did not use Yahoo’s email service but corresponded with people who did, Judge Lucy Koh of the U.S. District Court for Northern California signed off on a settlement which allows Yahoo to continue scanning the emails of non-Yahoo users without their consent. The major change from Yahoo’s previous practice is that it must do so only while the emails are on its servers, rather than while they are in transit.

That satisfies the letter of the law while doing nothing to redress the grievances of non-Yahoo email users. The four plaintiffs in the lawsuit received $5,000 each. The Judge awarded the plaintiffs’ lawyers 4 million dollars in total. A  45 page PDF of the settlement is here, and the summary starts at page 40. Google is being sued in a similar class-action which is pending before Judge Koh.

Since most people don’t fully read the terms and conditions before signing up for online services, it’s doubtful whether many users of Yahoo, Google, or similar free webmail services are aware those companies are scanning their emails for the purpose of targeted advertising, as well as scanning the other half of the exchange coming from their correspondent. Other users who are aware of the scanning are resigned to accepting it as the price of free webmail. And the “price of free” is another oxymoron Mr. Carlin himself might have gleefully noted.

– Techly 

 

I Can’t Hear You

Chattanooga Mayor Andy Berke with FCC Chairman Tom Wheeler in 2014
Chattanooga Mayor Andy Berke with FCC Chairman Tom Wheeler in 2014.

Rural communities and small cities took a blow to their prospects for municipally provided broadband internet service on August 10th when the U.S. Sixth Circuit Court of Appeals in Cincinnati ruled against the Federal Communications Commission’s 2015 order to preempt state laws in North Carolina and Tennessee. Wilson, North Carolina, and Chattanooga, Tennessee, had petitioned the FCC to allow them to build municipal broadband networks and the FCC had acted under a provision of the 1996 Telecommunications Act directing it to remove barriers to broadband investment and competition. The Sixth Circuit Court ruled the FCC did not have the power to supersede state law.

19 states have laws hampering the ability of local governments to provide broadband service, with the corporate-funded American Legislative Exchange Council (ALEC) offering sample legislation to more states. As Michael Copps, a former FCC commissioner and now an advisor to Common Cause, put it “Let’s be clear: industry-backed state laws to block municipal broadband only exist because pliant legislators are listening to their Big Cable and Big Telecom paymasters.”

The FCC defines broadband as an upload speed of at least three megabits per second and a download speed of no less than 25 megabits per second, and maintains a map displaying the different types of service available around the country. Even in larger cities where broadband is more commonly available, however, consumers have few choices of internet service provider because for all practical purposes carriers such as Comcast operate as regional monopolies.

The possibility of building municipal broadband networks has been an option in areas of low population density where private internet service providers often display little interest in building out their network for what they see as small return on their investment. People in poorly served areas sometimes turn to satellite service, though it has drawbacks in the form of high latency speeds and throttling of service for users who have reached certain data caps. In the same areas, wireless service can be spotty, with generally low data caps at high cost.


It appears the debate over net neutrality and whether to treat broadband service as a utility may revive, and it will be up to Congress to either strengthen the FCC’s regulatory powers over the states and the industry or to enact legislation defining internet service providers as common carriers, something companies like AT&T and Verizon fought tooth and nail against during the last round of discussions in 2014.
– Techly

Hand with Light and Switch

1 9 10 11