Yes, an ethical journalist protects his/her sources

An anonymous reader asked why journalists protect their sources.

It’s a fair question but an easy one to answer. Part of a journalist’s role in society is accountability. When something is wrong, the journalist is supposed to raise awareness.

Read more

Phil Kerpen, net neutrality, and socialism: A post-mortem

I learned the hard way a few weeks ago how net neutrality can be equated with socialism, an argument that puzzles people who work on computer networks for a living and see networking as a big flow of electrons. I think it’s very important that we understand how this happens.

Here’s the tactic: Find a socialist who supports net neutrality. Anoint him the leader of the movement. Bingo, anyone who supports net neutrality follows him, and therefore is a communist.

Political lobbyist and Fox News contributor Phil Kerpen told me Robert W. McChesney was the leader of the net neutrality movement, and he sent me a quote in the form of a meme longer than the Third Epistle of St. John. Yet in a Google search for the key words from that quote, “net neutrality bring down media power structure,” I can’t find him. So then I tried Bing, where I found him quoted on a web site called sodahead.com, but I couldn’t find the primary source.

For the leader of a movement the size of net neutrality, he sure keeps a low profile. Google and Netflix are two multi-billion-dollar companies that support net neutrality. I’m sure it’s news to them that they’re taking orders from Robert W. McChesney. Read more

The legend of Mt. Fuji

Twenty years ago, I was a promising young–and very unseasoned–columnist for a student newspaper at the University of Missouri–home of the Tigers–called The Maneater. Get it? Tiger? Maneater? Actually, healthy tigers never resort to eating humans, but legend has it by the time the founder learned that, the newspaper was already publishing and it was too late to change the name.

We were a ragtag bunch putting together a newspaper on a shoestring. Our computer network was quirkier than our staff, which took a great deal of doing–trust me, I’m used to being the weirdest guy in the room, and there I didn’t even stand out–but the piece of equipment that probably gives the production crew the most nightmares to this day was an old Apple Laserwriter–don’t ask me the specific model–named Mt. Fuji. Read more

Why I set work aside for a while before calling it done

A former supervisor called me the other day. He’s having quality control issues at his new gig, and quality control was one of the things I did when I was working for him. He wanted my insight. And he was very direct with one question he asked me.

“You would always set work aside and then come back to it,” he said. “Why?”

He knew my tactic worked, but wanted to know why it worked. Read more

“Why do we have a server named ‘Vicious?'”

My first non-food service, non-retail job was working desktop support for my college, the University of Missouri-Columbia. They were doing a massive computer upgrade and needed some part-time help. When they realized they’d found a journalism student who knew PC hardware and already knew OS/2, they cut the interview short and showed me around. I started work the next day.

My job was, initially, to unbox a few hundred IBM PC 330s and 350s, install network cards and memory, then install OS/2 on them. We had room for me to set up about 10 of them at a time, on long folding tables on opposite sides of a long room. It was lonely work at times, but I got to work with computers, and they were paying me $8 an hour. I liked it better than retail.

After a few days I had enough time to watch the boot process. OS/2 had a facility called Configuruation, Installation and Distribution (CID), similar to Microsoft’s unattended installation that appeared in later versions of Windows NT, that automated much of the process. An administrator configured machines in advance, and then when build time came, I booted off a floppy, entered a computer name, and the process pulled down what it needed from the network. After 30 minutes or so, we had a functional machine. CID probably saved a couple of hours of repetitive work. On this particular day, after I got nine machines going, I watched the 10th go through its the CID process. I noticed the machine kept addressing a server named \\VICIOUS.

Read more

The trouble with bringing your own software

PC Magazine is advocating a bring your own laptop, with your own software approach to business. It likens it to mechanics who bring their own tools.

The trouble is that while mechanical tools in a toolbox operate autonomously and don’t interfere with one another, software residing on a computer does. Read more

Advice on avoiding college debt–at least for Missouri residents

The business section of the Post-Dispatch had a good article on avoiding college debt. It’s tricky, as even Mizzou costs $22,000 a year now. I’m pretty sure when I was a Tiger, it was more like $10,000 a year, though I had scholarships that knocked that down even more.

Read more

There’s plenty of credit for the Internet to go around

There’s a crazy rumor going around saying that the government didn’t do much of anything to create the Internet, and that private industry did it all.

I remember the Internet before the private sector got involved in it. I was there.
Read more

Yahoo CEO Scott Thompson needed to explain himself

I understand Yahoo CEO Scott Thompson’s predicament. I don’t agree with how he handled it.

You see, both Scott Thompson and I work in the technical industry, and neither of us have a degree in computer science, computer engineering, some other kind of engineering, high mathematics, or another socially accepted relevant-to-the-industry field. Read more

Happy late birthday, OS/2

Twenty-five years ago this month, on April 2, IBM announced its new PS/2 computers and a new multitasking operating system to run on (most of) them–OS/2. They even lured a bunch of the actors from M*A*S*H to do an ad campaign for them.

It didn’t seem like it at the time, but that was the beginning of the end of IBM’s PC business.
Read more