Mothership

As we enter 2019, Cliff Cottage is transitioning.

Mothership has been selected as the generic name for the constellation of products and services provided by the central server rack at Cliff Cottage. While cloud is a buzzword referring, especially, to somebody else’s server, we tried to find a specific cloud variety that we could use for a name. Our choice refers to one of the most beastly type of clouds found on earth.

Mothership Clouds, also referred to as Supercell Thunderstorms, bring long-lived, dangerous storms with strong updrafts and rotation. They generate violent (F2-F5) tornadoes, cause downburst damage and produce large hailstones. Warm, humid conditions promote rapid lifting of air, quick changes of wind speed and/or direction increase rotational speed.

Mothership Cloud (Photo: Nevadanista)

A mothership is also a large vehicle/ vessel/ craft that leads, serves or carries other smaller vehicles/ vessels/ craft, including aircraft or spacecraft. For our purposes, it is a large digital device serving a number of smaller devices/ computers/ peripherals.

For the past 14 years, we have used an ADSL-based internet, which was a dramatic improvement over a dial-up modem. We have now gone over to fiber-optic broadband and cut out our landline. Our handheld personal devices, aka cell phones, are being updated to more advanced variants. We have replaced our inkjet printer, with a laser printer. CAT 6A cables are being installed throughout the house. While our network speed is currently 50 Mb up and down, increasing speeds to 1 Gb is simply an email away. So this is probably the last major communications upgrade in our lifetime.

In another post, a clustered NAS (Network Attached Storage) server system has been discussed (2018-06-21). This is still the goal. While we are not there yet, we are replacing our current NAS, with one designed and built by Alasdair. While we previously maxed out at 24 TB of data, the new NAS will start off with 40 TB. It is expandable to 120 TB. While many of the components are old and used, they are more appropriate for our needs. Typically, they are commercial products, produced by Cisco, but made redundant in commercial environments.

It is not my intention to publish further details about the Mothership in this web-log, at the moment. Rather, detailed information will be made available after a period of implementation and testing, to ensure that proposed solutions work properly.

If you, your close friends or family have developed technological solutions to modern problems, please consider making them freely available, and publishing them in a web-blog, or through other channels.

Netbooks

The Old Colossus

Colossus was the world’s first digital, electronic, programmable computer, although it was programmed by switches and plugs and not by a stored program. It was constructed at Bletchley Park, England in 1943-4.  It was designed by research telephone engineer Tommy Flowers (1905-1998), assisted by William Chandler, Sidney Broadhurst and Allen Coombs; with Erie Speight and Arnold Lynch developing the photoelectric reading mechanism.. Twelve machines were built, which were used for military (decryption) purposes during World War II.

Colossus, the world’s first electronic, digital, programmable computer build 1943-4, and on display at The National Museum of Computing, at Bletchley Park, England.

A colossus machine used massive amounts of electrical energy (8.5 kW) compared with a today’s devices (sometimes less than 50 W), but it was able to undertake massive amounts of computation – for its day, the value of which far exceeded its electrical consumption. 272 women (Wrens) and 27 men were needed to operate ten machines.

Fast forward to today. My aspiration for the Internet (and computing in general), is that it will (help) transform the World, by allowing everyone, including the poorest, access to vital information on numerous topics, including but not limited to: weather and climate, health, nutrition, education, appropriate technology, assorted innovations, ethics and art. We must treat all people as equal citizens with dignity, welcome in a digital world that is still in the process of being created. We must forge peace, not wage war!

The New Colossus

The world anno 2019 does not need an old colossus. Big data, and the information that derives from it, fuels the world. A new colossus is needed, server farms, that can provide data and information to everyone. Unfortunately, the major technological firms are less interested in supplying data, than they are in collecting it, especially personal data.

The new colossus has an energy challenge. For every watt needed to run a server, half a watt is needed to cool it. Selecting a location for a server farm can be as important as selecting a processor, to achieve energy efficiency. Iceland is a preferred location, not just because of its cold climate all, but also because of its cheap and carbon-neutral geothermal electricity.  Fibre optic cables connect it to North America and Europe.  Other prime locations are in Canada, Finland, Sweden and Switzerland. At the most well regulated sites, waste heat from servers warms residential, commercial and even factory buildings, compensating their computing usage.

A modern server farm, at Visa Data Centre, Baskingstoke, England

An Aside

It is in this spirit that the words of Emma Lazarus (1849–1887) are repeated. She wrote them in 1883 to raise money for the construction of a pedestal for the Statue of Liberty. In 1903, her sonnet was cast onto a bronze plaque and mounted inside the pedestal’s lower level:

The New Colossus

Not like the brazen giant of Greek fame,
With conquering limbs astride from land to land;
Here at our sea-washed, sunset gates shall stand
A mighty woman with a torch, whose flame
Is the imprisoned lightning, and her name
MOTHER OF EXILES. From her beacon-hand
Glows world-wide welcome; her mild eyes command
The air-bridged harbor that twin cities frame.
“Keep, ancient lands, your storied pomp!” cries she
With silent lips. “Give me your tired, your poor,
Your huddled masses yearning to breathe free,
The wretched refuse of your teeming shore.
Send these, the homeless, tempest-tost to me,
I lift my lamp beside the golden door!”

Devices

Computer is an inappropriate term to describe personal devices used to access and manipulate data.  These devices seldom compute! Several equipment manufacturers produce devices for the poor of this world. Often, these are referred to as phones, but larger devices, such as tablets, laptops and desktop machines, are also provided. One of the most important device categories was the netbook, that emerged in 2007 and died in 2012. The netbook did not simply appear, but was part of an evolution that had a past and has a future.

eMate

Miniaturization has always been important for computer development, and I have always been attracted to small computers. One of the first of these was the Apple eMate 300. It had a 172 mm diagonal screen ( with 480 x 320 pixel resolution),  16-shade grayscale display with a backlight, stylus pen, keyboard with about 85% the size of a standard keyboard, infrared port and standard Macintosh serial/LocalTalk ports. Its rechargeable batteries lasted up to 28 hours on full charge. It used a 25 MHz ARM 710a RISC processor. It was first introduced on 1997-03-07. While I waited patiently for it to come to Norway, it was discontinued less than a year later, 1998-02-27.

The eMate was not a netbook, but an inspiration. While the Internet existed, it was nothing like it is today. Public and commercial use of the Internet began in mid-1989. By the end of 1990, Tim Berners-Lee had created WorldWideWeb, the first web browser,  and had built all the tools necessary for a working Web: the HyperText Transfer Protocol (HTTP), the HyperText Markup Language (HTML), tHTTP server software, the first web server and the first Web pages (they described the project). By 1995 many of the components that characterize the current concept of the Internet had been developed, including near instant communication by email, instant messaging, telephony (Voice over Internet Protocol or VoIP), two-way interactive video calls,  discussion forums, blogs, social networking, and online shopping sites. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1-Gbit/s, 10-Gbit/s, or more. About the only thing missing were ordinary people, and internet speeds beyond what a dial-up modem could provide.

While ADSL was available in Norway from about 1998, we were only able to obtain it in 2004. Norway was a rich country at this time, so one can only imagine what was happening (or more correctly, not happening) in the poorer regions of the world. Even then, we lived almost at the limit of what could be provided through the copper wires of the telephone system. After using it for fourteen years, we have now progressed to fiber broadband. We have chosen 50 Mbps, but could have chosen anything up to 1 Gbps, if we had wanted to pay for it. We didn’t.

Apple Newton eMate 300. Photograph: Ryan Schultz 2005-03-19

OLPC

The One Laptop Per Child (OLPC) is known for its innovation in producing a durable, cost- and power-efficient netbook for developing countries, it is regarded as one of the major efforts to encourage computer hardware manufacturers to create low-cost netbooks for the consumer market. Seymour Papert (1928 – 2016) provided the pedagogical inspiration with his version of constructionism, encouraged the use of computers by young children, to enable full digital literacy. Nicholas Negroponte (1943-) was chief promoter of the project, starting in 2005 at the World Economic Forum, at Davos, Switzerland.

OLPC  XO-1 original design proposal

Netbooks

A netbook is a category of small, lightweight, inexpensive laptop computers. These are legacy-free, meaning that they use USB ports to replace bulky components such as floppy drives and device-specific ports. This allows machines to be more compact.

The first real netbook was a Asus EEE PC 700. Originally designed for emerging markets, the 225 × 165 x  35 mm device weighed 922 g. By today’s standards it was very primitive, with a 178 mm diagonal display (800 x 480 pixels), a keyboard approximately 85% the size of a normal keyboard (yes, the same as an eMate 300), a 2, 4 or 8 GB solid-state drive  and Linux with a simplified user interface.

I was immediately attracted to the Asus EEE PC 700, the world’s first netbook, launched 2007-10-16.

Between 2009 and 2011, netbooks grew in size and features, and converged with smaller, lighter laptops. At this point, the netbook’s popularity fizzled as manufacturers tried to add features to prevent netbooks from cannibalizing their more profitable laptops. Peak Netbook,  at about 20% of the portable computer market, was reached in early 2010. After that, netbooks started to lose market share. In 2011 tablet sales overtook netbooks. The netbook era ended in 2012 when netbook sales fell by 25 percent, year-on-year. Asus, Acer and MSI announced they would stop manufacturing their most popular netbooks in September 2012. At the same time, Asus announced a focus on their Transformer line.

Chromebooks

Chromebooks are in many ways the new netbooks. They are  laptops and tablets running Linux-based Chrome OS, used to perform a variety of tasks using a browser, with most applications and data residing in the cloud (read: servers run by major corporations) rather than on the machine. They were first introduced by Acer and Samsung in June 2011.

In 2013, Chromebooks became the fastest-growing segment of the PC market. While current Chromebooks function better offline than before, they are still dependent on an Internet connection  to function optimally.

Netbook sized computers, including Chromebooks, offer several distinct advantages. First, their compact size and weight make them appropriate in compact work areas, such as cafes and classrooms. Second, the size makes them easy to carry and transport. Third, they are low priced. They are fully capable of accomplishing general tasks: word processing, presentations, Internet access and multimedia playback.

In North America, especially, schools have limited budget to provide computing resources. This has led to a rise of tablets, including iPads. Yet, Chromebooks provide a more complete hardware solution, such as a full-size keyboard. There has been a transition away from tablets to Chromebooks, so that almost 60% of school computers are Chromebooks. However, the most important factor for success in education, has little to do with the physical machine, it has to do with the human resources need for large-scale deployment. Chromebooks save IT (information technology) workers time!

An Acer Chromebook 11. This is the same type of machine that was purchased 2018-11-16.

Our Computers

It is not my job to support computer manufacturing companies so that they can reward executives with excessive salaries and bonuses. Thus, I want to avoid purchasing expensive computer equipment, and stick to minimal products. For example, much of our server equipment is purchased used, and I am a proponent of single board computers, such as the Raspberry Pi.

Here is a history of our netbook related computers since 2010, with comments.

An Asus EEEbox 1501p was purchased 2012-10-28 as a media centre. It ran assorted versions of Linux Mint, through its life. Unfortunately, it always ran hot, and developed heating issues that required repair. It was replaced by an Asus Tinkerboard, a Raspberry Pi clone, that was purchased 2017-03-31.

Since my employer supplied me with a laptop, I never felt that I needed a second one. Thus, I used an 2010 Acer Aspire tower for 6.5 years, until it was replaced with an Asus VivoMini VC65 desktop in 2017. Both of these were used at a height adjustable desk.

When I retired at the end of 2016, and handed in my workplace laptop, I used Trish’s retired Asus, a U31F 13.3″ laptop originally purchased 2011-02-13 with an i3 core, 4 GB RAM, a 500 GB HDD, running Windows 7, before it was modified to run Linux Mint. Trish retired this machine because it was running hot, and the battery needed replacement. On 2017-05-15, I decided not to replace the battery, but instead bought an Asus Vivobook E402SA. This was not a good decision. While this new machine came with Windows 10, it was a direct decendent of the Asus EEEbook. Linux Mint was installed on the machine, but it never worked correctly. The screen would freeze, and the machine would have to be powered off and restarted. This could happen up to several times a day. It stopped working entirely in September 2018. Undoubtedly my worst computer purchase ever.

An Acer Chromebook 11 was acquired on 2018-11-16. This version allows Linux apps, such as LibreOffice (for word processing, presentations and spreadsheets), Mozilla Firefox web browser and Thunderbird mail server to be installed. In addition to its role as a workhorse, it was also purchased so that I could gain hands-on experience of Chromebooks, as a concept. The main problem with the machine is that the currently installed version of Firefox, ESR (Extended Support Release), will not play audio, although it will display video.  It will be uninstalled, and replaced with other versions, to see if there is one that works.

Most people do not need high-end devices. By opting for machines with modest specifications, modest machines will continue to be made.

Appendix: Asus

Former Asus CEO Jerry Shen attracted my attention in 2007 when he created (what I regard as) the first netbook, the Eee PC, in 2007. Shen is now off to lead a new AIoT (AI = artificial intelligence; IoT = internet of things, often referring to smart home applications) startup, iFast.

Wikipedia describes Asus as “a Taiwanese multinational computer and phone hardware and electronics company headquartered in Beitou District, Taipei, Taiwan. Its products include desktops, laptops, netbooks, mobile phones, networking equipment, monitors, WIFI routers, projectors, motherboards, graphics cards, optical storage, multimedia products, peripherals, wearables, servers, workstations, and tablet PCs. The company is also an original equipment manufacturer (OEM). Asus is the world’s 5th-largest PC vendor by 2017 unit sales.”

On 2018-12-13, slashdot.org wrote about Asus chairman Jonney Shih announcing a comprehensive corporate transformation involving the resignation of CEO Jerry Shen, a new co-CEO structure, and a shift in mobile strategy to focus on gamers and power users. There will be more ROG Phones and fewer ZenFones. During his 11 years as CEO, Shen oversaw the launch of the PadFone series, Transformer series, ZenBook series and ZenFone series. It may seem a worrisome development, but the place abandoned by Asus will undoubtedly be taken over by other companies who see the merits of supplying devices to people with lower incomes.

The McLellans have a history of buying Asus technology including numerous laptops, NAS (Asustor = Network Attached Storage), home theatre desktop (EEEBox), Tinkerboard single board computers, repeaters, etc. Of course, we also have family members who use Apple products exclusively, and another family member who uses Chinese developed products such as Lenovo computers and Huawei phones. Even I am forced to admit that my latest purchase was an Acer, after a difficult year of owning a Asus Vivobook.

 

 

Ethan & Ethel 04: Computer Control Basics

In the last post, Ethan & Ethel had to do a lot of work, to keep track of their heating costs.

Time used = Time turned off – Time turned on.  Example: 17h05m –  15h31m = 94m

They wrote down the time they turned on their heater, and then the time when they turned it off. They then subtract the “on” time from the “off” time to find the number of minutes the heater was on. This had to be repeated for every visit to the workshop with heat on. At the end of the month, they had to add all of these minutes together to find their monthly usage. What a boring job, and so unnecessary when a computer can do it, automatically! All that is needed is a few lines of code. Code that has already been written, and is waiting to be reused.

Workshop computer control means that computing equipment is running hardware and software that senses and activates workshop activities.

Stop the Press!

This post was originally written 2018-03-02. It is now 2018-08-11, more than five months later. Reviewing it at the time I was dissatisfied with the previous paragraph, that continued with, “a Raspberry Pi single-board computer will be used to run Home-Assistant software. The raspberry pi will be connected to two different Arduino micro-controllers using USB cables.”

The problem, both then and now, is that while the above solution would work, it is not optimal. Why should one use three components, when one should do? Ideally, a single microprocessor should be able to run 1) home automation software, in this case Home-Assistant; 2) connect to analogue sensors and have analogue input data converted to digital data; 3) connect digitally to relays to trigger activators; 4) communicate with other components on the local area network using wires (Ethernet); 5) receive electrical power over those same wires.

The best way forward to gain an understanding of workshop problems is to pretend that the ideal solution exists, a fantasy Unicorn IoT (Internet of Things) microcontroller.

Home-Assistant

If Ethan and/or Ethel are to work in a computer controlled workshop, one of the first things they need to control is the workshop computer. It should be designed in such a way that it can respond to their needs turning on and off lights, heat, tools, etc.

While a Raspberry Pi (and its clones and near relatives) is capable of running this software, an Arduino microcontroller is not.

Sensors

In a workshop there can be a large number of different sensors measuring all sorts of things. There can also be a large number of actuators using the same data. For example, both a heater and a vent may use data from a room temperature sensor, but in different ways. The heater may be activated if the work space is too cold. Once it gets hot enough it will shut off. If the temperature continues to rise, then a different actuator, the vent will be activated, but only if the outside temperature is lower than the inside temperature. To determine that, there needs to be a second temperature sensor, this one measuring the outside air.

A sensor is any device that measures a physical quantity. Temperature sensors can be found not only in the workshop space, but also inside machines.  This Wikipedia article lists sensors by sensor type: https://en.wikipedia.org/wiki/List_of_sensors

Some of the other sensors in a workshop include: humidity, measuring water vapour in the air; infra red, detecting body heat; light, measuring light levels; smoke, detecting fires. Those are sensors that can be used anywhere in a house. There can be some sensors that are specific to a workshop: wood moisture content and dust particles in air.

Having so many sensors can be a major distraction, so from now on the focus will be on just one, a LM35 temperature sensor.

LM35 Temperature sensor

Several companies make temperature sensors, but Texas Instruments makes one that is world famous, the LM35. It costs about $1.50.

LM35
A LM35 temperature sensor, inexpensive and accurate. At pin 1 any voltage can be used from 4 to 20 V. Pin 2 provides output that will be connected to an analog pin. Here, the voltage proportional to the temperature. It can vary from -0,5V to +1.5V. Pin 3 is the ground (or negative terminal). It completes the electrical circuit..

While information about the LM35 is available in a data sheet that contains more than enough information about every aspect of the sensor, most people don’t need to read it. Why? Because all of the engineering work has been done before. Since Ethan and Ethel will be using an Arduino, they just need to know how to connect a LM35 with an Arduino. Then they have to find a (free) program that uses the LM35, and upload it onto the Arduino.  With a little practice, anyone can get a sensor working on an Arduino in about five minutes.

The LM35 is cool. The main reason is shown in this graph. Most sensors express themselves as a voltage that varies smoothly with the quantity being measured. On a graph this makes a straight line. The LM35 is exceptional, because at 0°C output voltage  is 0V. Every 1°C up or down adds (with positive temperatures) or subtracts (with negative temperatures) precisely 10 mV. At 100°C, the output voltage is exactly 1V. The LM35 is also very flexible regarding input voltage. It can use anything from 4V to 20V.

LM35 graph
This may be the first time in your life where you see a graph that is actually useful! This shows the output voltage of a LM35 temperature sensor for temperatures that range from  -50° C to  +150° C.

 

ADC

Computers use digital data, and can’t normally read voltages directly. On micro-controllers there are Analog to Digital Converters (ADC) that automatically change an input voltage into a digital value. On the Arduino Uno, there are six analog pins that can read voltages from 0 V to 5 V (or 0 mV to 5 000 mV). This means that up to six different sensors can be connected to an Arduino board. There are ways to add more, if needed. Each sensor then has its voltage converted into a digital values between 0 and 1023. These analog pins have a sensitivity of 4.9 mV. So a voltage from 0 to 4.8 mV will be given a value of 0. From 4.9 mV to 9.8 mV they will be a value of 1. This will continue right up to 4 995.1 mV to 5.0 mV, where they will be given a value of 1023.

It takes about 100 µs (100 microseconds or 0.0001 s) to read an analog input. The maximum reading rate is 10 000 times a second. Usually, reading a temperature once a second is good enough. In fact, in some circumstances reading it every five minutes or every hour would make better sense, especially if all this data has to be stored.

Arduinos have ADC units, Raspberry Pis do not.

Relays

Microcontrollers do not respond well to large currents, and will be permanently damaged if connected to too many volts, amps or watts. If one wants to turn on an electric heater to warm up a space, this is typically done by a relay.   A Relay is an electrically operated switch. When an electromagnet is activated with a low voltage, typically 5 V, it makes or breaks a high voltage circuit.

Many microcontrollers have supplementary boards that attach directly to pins on their main boards. Both the Raspberry Pi and the Arduino have them. On a Raspberry Pi they are called  Hats (Hardware Attatched on Top). On the Arduino they are called shields. The Raspberry Pi hats allow the main board to identify a connected hat and automatically configure the pins.

A Seeed Relay Shield V 2.0. It allows a single Arduino to control up to 4 relays. (Photo: Seeed)

Communication

For automation systems, wired communication is preferred. The most common form of wired communication is the Ethernet, developed at Xerox PARC (Palo Alto Research Center) in 1973-4 and used ever since. Most people would be advised to use CAT 6A cable, for workshop automation.

In the future, almost every significant power tool in a workshop will be connected to the local area network, including dust collection and air filtering equipment. Even in home workshops, various variants of CNC (computer numeric controlled) equipment will be taken into use, including 3D printers and laser cutters.

Microprocessors in the 1970 would process data in a single program that ran continuously. In the 21st century, not so much. The reason for this is that each sensor (and each actuator) is treated as a separate object. Sensors publish data, about a specific state, and actuators subscribe to the data they need to make decisions about how they will operate. To do this they use a publish-subscribe protocol called MQTT. It has been around sine 1999.

Sensor actuator
Home Assistant uses a MQTT broker that allows sensors to publish and actuators to subscribe. With this information, a heater can be turned on and off as required.

PoE (Power over Ethernet)

Power over Ethernet allows electrical power to be sent over the same Ethernet cable used to send and receive data to a device. This simplifies life considerably. There are no batteries to change or high-voltage power cables to install. The main challenge is that only a few microcontrollers are capable of utilizing this feature. Using a Hat or shield with PoE connectivity is another possibility.

 

Kanban

The myth of Kanban is set in the late 1940s,  when Toyota began to optimize inventory levels. Several authors describe this as an engineering process. It isn’t, but myths are not invented to tell truths, but to elevate the mundane into  eloquent and compelling stories. In this myth, Toyota’s goal was to align inventory levels with the actual consumption of materials. To communicate capacity levels in real-time on the factory floor (and to suppliers), workers would pass a card, or kanban, between teams. When a bin of materials used on the production line was emptied, a kanban was passed to the warehouse describing the material and its quanity. The warehouse would then send a replacement to the factory floor, and their own kanban to their supplier. The supplier would then ship a bin of material to the warehouse. While the physical cards may have disappeared, Just In Time (JIT) remains at its heart of modern manufacturing.

As stated in the image itself, this is an example of a Kanban Board. (Illustration: Ian Mitchell, 2012)

Kanban moved from esoteric knowledge about Japanese business practices, to myth in 2010, when David Anderson wrote Kanban: Successful Evolutionary Change for Your Technology Business. The book is only incidentally about Kanban. It is more about the evolution of a software development approach at Microsoft in 2004, to a better approach at the Bill Gates owned digital image business, Corbis, in 2006-7, designated Kanban. About the same time there were several others who were name-dropping Kanban, and suggesting variations of it as a form of lean production, especially for software.

The key point with Kanban is that it works in organizations engaged in processing, either in terms of products or services. It is less applicable in organizations working on projects.

Service organizations, can establish teams to supply these services, using JIT principles. This requires them to match the quantity of Work In Progress (WIP) to the team’s capacity. This provides greater flexibity, faster output, clearer focus and increased transparency. Teams can implement virtual kanban methodology.

In Japanese, kanban translates as visual signal. For kanban teams, every work item is represented as a separate card on the board.A kanban board is a tool used to visualize work and to optimize work flow across a team. Virtual boards are preferred to physical boards because they are trackable and accessibile at every workstation. They visualize work. Workflow is standardized. Blockers and dependencies are depicted, allowing them to be resolved. Three work phases are typically shown on a kanban board: To Do, In Progress and Done. Since the cards and boards are virtual, the unique needs of any team can be mapped to reflect team size, structure and objectives.

Truthing is at the heart of kanban. Full transparency about work and capacity issues is required. Work is represented as a card on a kanban board to allow team members to track work progress visually. Cards provide critical information about a particular work item, including the name of the person responsible for that item, a brief description and a time estimate to completion. Virtual cards can have documents attached to them, including text, spreadsheets and images. All team members have equal access to every work item, including – but not restricted to – blockers and dependencies.

An important management task is to (re)prioritize work in the backlog. This does not disrupt team efforts because changes outside current work items don’t impact the team. Keeping the most important work items on top of the backlog, ensures a team is delivering maximum value. A kanban team focuses on active works in progress. Once a team completes a work item, they select the next work item off the top of their backlog.

Cycle time is the time it takes for a unit of work to travel through the team’s workflow–from the moment work starts to the moment it ships. This metric can provide insights into delivery times for future work.

When a single person holds a skill set, that skill set can potentially becomes a workflow bottleneck. Overlapping skill sets eliminates that potential bottleneck and may reduce cycle times. Best practices, encourage team members to share skills and to spread knowledge. Shared skill sets mean that team members can enrich their work, which may further reduce cycle time. In kanban, work completion is a team responsibility.

A kanban feature is to set a limit on the number of works in progress. Control charts and cumulative flow diagrams provide a visual mechanism for teams to see change. A control chart shows the cycle time for each work item, as well as a rolling average. A cumulative flow diagram shows the number of work items in each state. Combined, these allow a team to spot bottlenecks and blockages.

My interest in Kanban is tied to my son, Alasdair’s use of it for process management with the Council for Religious and Life Stance Communities Bergen (Samarbeidsrådet for tros- og livssynssamfunn Bergen, STLB). See: https://www.stlb.no/english/ . It is available as an app for Nextcloud, Deck. See: https://apps.nextcloud.com/apps/deck . This will be installed on our upcoming server, tentatively named Qayqayt.

Arduino Revisited

I started to write this post on 2017 November 22. The original title was MKR: Arduino Revisited. Two hundred and fifty days should be long enough to write any post, but this one has defied me.

An Arduino MKR 1000, the most basic board in this new Arduino family. In November, I expected to be buying several of them for a home automation project. (Photo: Arduino.cc)

Soon, it will be ten years since I started using and teaching Arduino. In November, I was looking forward to the new series of Arduinos, the MKR (Maker) series, a small form factor microcomputer with a number of outputs and headers (electrical pin connectors), a battery management system and USB, that could be useful for building home automation room control units, small enough to fit inside almost anything, such as a light switch box inside a wall.

Each room in our house would have its own personal microprocessor. Some rooms, such as the workshop might have several. Each microprocessor would then connects to multiple sensors that would measure/ detect things like temperature, humidity, light and motion inside that room. Analogue data would be converted inside the microprocessor to digital data, then sent onwards to a central controller, located somewhere in the house. If specific conditions were met, the controller will initiate an action, sending a message to either the same or another microprocessor, and ordering it to activate an activator (as they are called) such as opening a vent or turning on a light. These microprocessors would be fried if they received power exceeding a few milliwatts, so they use relays to indirectly switch on components that can consume up to 2 500 Watts.

There are just two problems with microprocessors like this. First, they should not use wireless communication (including but not limited to WiFi, Bluetooth or radio), but should be wired. Second, they should not use batteries or mains current as a power source.

Both of these problems can be resolved using Ethernet, which is network cabling technology, initially developed at Xerox PARC (Palo Alto Research Center) between 1973 and 1974. For most home automation circuits there is no great urgency to turn on or off an activator. A millisecond or two will not make much of a difference, so there is no need for gigabit per second Ethernet.  Megabit per second is good enough. Batteries and mains current can be eliminated by sending electrical power through the Ethernet cable.

At the moment, I have lost my enthusiasm for Arduino MKR boards, and am looking for a replacement. Why?  It all has to do with open-source, or lack thereof, if not in practice, at least in spirit.

Arduino, despite its open-source claims, has not always been transparent.  The following is a summary of some of the Arduino disputes, taken from: https://en.wikipedia.org/wiki/Arduino

In 2008, the five cofounders of the Arduino project created a company, Arduino LLC to hold the trademarks associated with Arduino. They transfered ownership of the Arduino brand to the newly formed company. The same year one of the five cofounders, Gianluca Martino through his company, Smart Projects, registered the Arduino trademark in Italy and kept this a secret from the other cofounders for about two years. Later, negotiations with Gianluca to bring the trademark under control of the original Arduino company failed. In 2014, Smart Projects began refusing to pay royalties. It then renamed itself Arduino SRL and created the website arduino.org, copying the graphics and layout of the original arduino.cc. In January 2015, Arduino LLC filed a lawsuit against Arduino SRL. In May 2015, Arduino LLC created the worldwide trademark Genuino, used as brand name outside the United States. In 2016, Arduino LLC and Arduino SRL merged into Arduino AG. In 2017 BCMI, founded by four of the five original founders (with the initials representing those of their respective last names) acquired Arduino AG and all the Arduino trademarks.

In July 2017, Massimo Banzi announced that the Arduino Foundation would be “a new beginning for Arduino. ”  That same month, former CEO Federico Musto allegedly removed many open source licenses, schematics and code from the Arduino website.  See: https://techcrunch.com/2017/07/26/ceo-controversy-mars-arduinos-open-future/

Currently, I have been unable to find any further information about an Arduino foundation, and any new start. Instead, I find in May 2018, Arduino announcing the sale of engineering kits to encourage the use of Arduino at university level.  Unfortunately, the kits require the use of Mathlab and Simulink, closed-source and expensive software packages from MathWorks, despite open-source alternatives, such as R.  Admittedly, the kits contain a one year licence for the software. See: https://blog.arduino.cc/2018/05/12/arduino-goes-to-college-with-the-new-arduino-engineering-kit/

Back in 2013, Massimo Banzi was more enthusiastic about open-source hardware, as he explained in an Arstechnica interview. See: https://arstechnica.com/information-technology/2013/10/arduino-creator-explains-why-open-source-matters-in-hardware-too/

Here are some quotes from the article:  As an open source electronic prototyping platform,  Arduino releases all of its hardware design files under a Creative Commons license, and the software needed to run Arduino systems is released under an open source software license.  Why is openness important in hardware? Because open hardware platforms become the platform where people start to develop their own products. For us, it’s important that people can prototype on the BeagleBone [a similar product] or the Arduino, and if they decide to make a product out of it, they can go and buy the processors and use our design as a starting point and make their own product out of it. … With the Raspberry Pi you cannot even buy the processor….  Raspberry Pi is a PC designed for people to learn how to program. But we [Arduino] are a completely different philosophy. We believe in a full platform, so when we produce a piece of hardware, we also produce documentation and a development environment that fits all together with hardware.

Even the Arduino website has changed its language. Before it might have distinguished between an original board and a clone, emphasizing the open source nature of boards. Now this nuance is missing entirely, it states:  “If you are wondering if your Arduino board is authentic you can learn how to spot a counterfeit board here [with link].” See: https://www.arduino.cc/en/Main/Products

While I live in hope that Arduino will reform, I don’t want to financially support it any more. What I want is an open-source board with its own Ethernet connectivity. They did have one, but retired it without a direct replacement. Currently, this feature seems to be unavailable from Arduino. They are undoubtedly too busy developing boards that connect an assortment of proprietary communications technology.

The Arduino Ethernet with PoE (Power over Ethernet), an almost ideal solution, except that it has been retired. (Photo: Arduino.cc)

I have considered using other boards, even Italian ones, such as the Fishino, but they also lack Ethernet connectivity: https://www.fishino.it/home.html

The board that seems to offer the most promise comes from DF Robot: https://www.dfrobot.com/product-1286.html

DF Robot W5500 Board with PoE, available at a price of USD 45 or less. (Photo: DF Robot)

Their W5500 Ethernet with PoE board is based on the ATmega32u4 in an Arduino Leonardo package with a W5500 Ethernet chip . The latter is TCP/IP hardwired for embedded systems, although not gigabit enabled. The board is compatible with most Arduino shields and sensors. Version 2.0 has an upgraded PoE power regulation circuit, which makes PoE power more reliable.

The main difference between a Uno and a Leonardo package is that the latter uses a more sophisticated chip, an ATmega32U4 chip.  It shares the same form factor and I/O placement (analog, PWM, I2C pins in the same place) as the Uno, which means that it can use the same shields, which are additional boards that sit on top of the Arduino, and connect directly to the pins below.

A Seeed relay shield, showing the pins that allow it to be directly connected to most Arduino boards. Yes, Seeed is spelled with 3 e’s. (Photo: Seeedstudio.com)

A relay shield provides several, typically four,  switches that can control high current loads. They can be wired as NO (Normally Open) or NC (Normally Closed) circuits. These are important, because most electrical equipment cannot be controlled directly by a microprocessor’s pins. Relays are useful for switching AC appliances such as fans, lights, motors as well as high current DC solenoids.

 

DF Robots, an alternative to Arduino. (Illustration: DF Robots)

The fact that the DF Robots W5500 board is open-source, means that everyone is permitted to make their own boards from scratch, if they should want. Most of the time, this is not an economic choice.

 

Open Source Mapping

[osm_map_v3 map_center=”63.5409,10.7749″ zoom=”8″ width=”100%” height=”450″ map_border=”thin solid red” post_markers=”1″]

An embedded map of Trondheim Fjord, Norway, showing the location of Cliff Cottage. It was made using an OSM (OpenStreetMap) plugin, in the WordPress program, used to make this weblog.

While I might have included a screen shot or image to display a map, a more flexible approach is to embed one. This requires adding a mapping plugin to the WordPress program that I currently use. Since there are so many plugins available, I have to decide which one to use. I’m using one that is open source to make a policy statement!

It all started with this item in /. ( https://slashdot.org/ )

Background theory: A factoid from Economics 101 – perfect competition leads to Pareto optimality, which is just a fancy way of saying that businesses that compete will stagnate. There is no way for any of them to make any profits. Ultimately, a little mistake will lead to bankruptcy. So businesses will do almost anything to avoid competition. They want monopolies or,  if that isn’t possible, a large market share, so they can charge whatever consumers will pay, to make lots of money.

Background event: As explained in the /. article, on 2018-07-16, the free ride of using Google Maps’ application programming interface (API) is over. Google is going to make it more difficult and expensive to use its API. The good news (for Google) is that they should be able to extract more revenue from users. The bad news (for organizations and people using these APIs) is that custom maps will be less sustainable or even unfeasible for organizations that made them. See: https://developers.google.com/maps/billing/important-updates

When a company makes programs that are high quality and free, people will use them. Google Maps is no exception. Thus, the most popular WordPress mapping plugins are (with the number of active installations in parentheses, from largest to smallest): WP Google Maps (400 000+ ); Google Maps Widget (100 000+); MapPress Easy Google Maps (100 000+); WP Google Map Plugin (100 000+); Google Maps plugin by Intergeo (60 000+); Snazzy Maps (60 000+); Google Maps Easy (40 000+); Simple Map (40 000+).  All of these plugins relate to Google Maps. It is only when one gets to Leaflet Map Marker (30 000+) that an alternative to Google Maps can be found that works with OpenStreetMaps and Bing Maps, as well as Google Maps.

Consequences: People who need a map, but don’t know how to program, and don’t have a budget to pay for a customized solution, have been able to make maps using Google (or equivalent) APIs. Google’s actions are part of a trend away from easy access to free mapping tools. Fewer companies are offering free accounts and there are fewer alternatives to Google.

Open source API choices to replace Google Maps APIs include Leaflet and OpenLayers.

Leaflet is an open-source JavaScript library for desktop and mobile platform interactive maps. The API code is small, 38 kB,  but has most mapping features needed by developers. It can be extended with plugins. Its focus is on the optimal performance of basic mapping features, rather than on an extensive features rich environment. See: https://leafletjs.com

In contrast OpenLayers is much more extensive, and larger (10 MB) requiring greater insight.  See: http://openlayers.org

Mapzen, often cited as a third open soure tool that ran on OpenStreetMaps, shut down its operations at the beginning of 2018.

For me, open source matters, so I chose to add on OSM – OpenStreetMaps, as a plugin. It took a couple of minutes to download the plugin, and up to several seconds to activate it. Here is the entire procedure:

Select Generate: OSM shortcode

Select the OSM control theme of your choice

Adjust the map and click into the map to generate the OSM shortcode

Copy (Ctrl+C) the generated shortcode and paste (Ctrl+V) it into your article or page.

Notes: The generator was located immediately below the WordPress text frame; Once the map was pasted into the text, the preview button had to be pressed to show the map. The only thing left to do is to publish the post!

 

Artificial General Intelligences

From a previous post …

haves will indirectly control artificial intelligence agents, while the majority have nots will be required to obey the whims of these agents, and their overlord handlers.

Post-modern bread and circus equivalents will pacify the great unwashed. If that doesn’t work even more direct, negative action will be taken.

Neural networks will live a life of their own, so it may not be possible for even the “haves” to exercise direct control over these agents. However, one proposed approach is to frame control, with an AI agent constitution, based on Isaac Asimov’s (1920-1992), Three Laws of Robotics.

In this post, these and other robotic laws will be examined and commented upon.

Sawyer (left) & Baxter (right) are collaborative robots. Just the sort of creatures that might end up in a dispute with living humans. (Photo: Jeff Green/ Rethink Robotics, 2015 CC-BY-SA-4.0)

Isaac Asimov’s Three Laws of Robotics were proposed in a 1942 short story Runaround. According to Asimov they had their origin in a meeting between himself and John W. Campbell on 1940-12-23.

The Three Laws are:
1. A robot may not injure a human being or, through inaction, allow a human being to come to harm.
2. A robot must obey the orders given it by human beings except where such orders would conflict with the First Law.
3. A robot must protect its own existence as long as such protection does not conflict with the First or Second Laws.

Normality 2020

Voice activated actuators wait patiently to serve you. Invisible logistic trails ensure an orange (Citrus × sinensis) is peeled, split into boats, if that is your preference, and placed in front of you on a dish of your own choosing, when you demand it.

Your own speech controls your digital assistants, not only commercial varieties such as Apple’s Siri, Amazon’s Alexa, and Google’s Assistant, but also open source Lucida (formerly Sirius), Abot, Jarvis and Jasper.

On a clear day, the sun shines, oranges are peeled and served, and there is no need to reflect on the laws of robotics underpinning digital assistants.

A snake in the garden of Eden

I have nothing against snakes, personally, but use the term to describe an unwelcome intruder into Eden, subsonic commands hidden in music, videos, or even white noise. This is done by using software to cancel out the sound that the speech recognition system was supposed to hear and replacing it with sound at subsonic frequencies that would be transcribed differently. Instead of an orange, an apple (Malus pumila) is peeled, sliced and served on a dish of someone else’s choice. A humorous change in the eyes of many, but in our family, some people are allergic to apples. Other substitutions can be more serious, even deadly. There can be significant security risks. It is at this stage that laws of robotics, or their AI equivalent, need to be applied.

One challenge with these three laws, is the assumption that all human actions are legitimate. What happens if a human wants to harm another human? With these laws, it would be impossible for a robot to intervene on behalf of the person being harmed. So, it will undoubtedly not go many milliseconds before some enterprising hacker ensures that these three laws are voided.

Asimov was well aware of this shortcoming, which he would have undoubtedly described as a feature. He has referenced Arthur Hugh Clough’s  (1819-1861) satirical poem on the ten commandments, The Latest Decalogue, as its inspiration: “Thou shalt not kill; but needst not strive officiously to keep alive:”

Asimov introduced a zeroth law in Foundation & Earth (1986) but it seems of limited use in conflict situations:

0. A robot may not injure humanity, or, by inaction, allow humanity to come to harm.

In western films, the cliché is that the good guys always wear white Stetson hats! In real life, it is more difficult to distinguish good people from evil doers, or white hackers from black hackers.

These laws have been modified many times, by Asimov as well as others. One extreme is represented by Jack Williamson’s (1908-2006) novelette With Folded Hands (1947), rewritten as the novel The Humanoids (1949), deals with robot servants whose prime directive is “To Serve and Obey, And Guard Men From Harm.” The Williamson robots take the robotic laws to the extreme, by protecting humans from everything, including unhappiness, stress, unhealthy lifestyle and all potentially dangerous actions. All humans may do is to sit with folded hands.

Some feel three laws are insufficient.

The Lyuben Dilov (1927-2008) novel, Icarus’s Way (alternative title, The Trip of Icarus) (1974) added:

4. A robot must establish its identity as a robot in all cases.

This law appears to have been violated in the celebrated Google Duplex restaurant reservation (2018-05-17): https://mashable.com/2018/05/17/google-duplex-dinner-reservation/#X7ChNbJ3baqw

Harry Harrison (1925-2012) also produced a fourth law, found in the short story, The Fourth Law of Robotics, in the tribute anthology Foundation’s Friends (1989):

4. A robot must reproduce. As long as such reproduction does not interfere with the First or Second or Third Law.

Reproduction, here, is asexual but sensational. Why not a fourth law requiring a robot to maintain itself, by undertaking necessary hardware and software repairs? There are robots who can and do reproduce themselves, the most famous being RepRap, a low-cost, self-replicating 3D printer, initially made at the University of Bath in 2005: http://www.reprap.org/

Nikola Kesarovski (c. 1935-2007) published the book The Fifth Law of Robotics (1983):

5. A robot must know that it is a robot.

I am not quite sure why. Is it so that it knows that it isn’t human? Should it know that it is a particular type of robot? For example, a vacuum robot, rather than a lawn mowing robot.

Roger MacBride Allen (1957-) wrote a trilogy set within Asimov’s fictional universe. Caliban (1993), Inferno (1994) and Utopia (1996) are each prefixed with “Isaac Asimov’s”. Here, there are four New Laws, which treat robots as partners rather than slaves to humanity.

1. A robot may not injure a human being or allow a human being to come to harm.
2. A robot must cooperate with human beings except where such actions would conflict with the First Law.
3. A robot must protect its own existence.
4. A robot may do whatever it likes as long as this does not conflict with the first three laws.

Discussion

The various robotic laws are very vague, with concepts such as human and robot undefined. This can give rise to people or equipment being regarded as something other than what they are, such as cyborg or actuator, respectively, in an attempt to avoid following the laws. Ambiguity is a literary device that is masterly exploited by Asimov, and other science fiction authors.

Another challenge with the Asimov approach, is that it is only concerned about the adversarial relationship between two groups – robots and people. Nothing else matters. Robots do not seem to have any ethical obligations with respect to the environment, for example.

Even if the laws were amended or expanded to take other aspects of the world into consideration, these laws would still not work. The only reason for positing laws is to have them fail, in interesting ways. It is not the laws, but the storytelling that is important. The lesson to be learned is that it is not possible to restrict ethics to a set of a few simple rules. If one does, the entire system will at some point fall apart.

In many science fiction worlds, robots only have mental capabilities that are less than, or equal to, their human controllers, for lack of a better word. What happens when artificial intelligence advances beyond human levels? Superintelligence is a key challenge, a situation in which artificial intelligence, or machine intelligence to distinguish it from organic intelligence, will require more advanced ethical considerations, than those that can be stated in a literary work.

Deontology judges the morality of an action based on rules. It is a field I know almost nothing about, except that it is regarded by many professional philosophers as a dead end.

Perhaps it should be stated here and now that robots are another dead end. The future belongs not to robots but to Artificial General Intelligences (AGI). See: https://en.wikipedia.org/wiki/Artificial_general_intelligence These are machines with consciousness, intuitive, flexible and adaptive, even in terms of ethics. Like humans, AGIs do not rely on rote knowledge of rules, ethical or otherwise, but use them – if at all –  as guidelines to nudge ethical instincts and intuitions. It is a situation highly dependent on the environment people and AGIs are brought up in.

As an ethical amateur, I am attracted more to virtue-ethics than deontology. It is in the discussion of virtues, individually and collectively, that one can relate to behaviour that is beneficial, as well as that which is less so.

Rosalind Hursthouse writes in https://plato.stanford.edu/archives/fall2013/entries/ethics-virtue/ :

A virtue such as honesty or generosity is not just a tendency to do what is honest or generous, nor is it to be helpfully specified as a “desirable” or “morally valuable” character trait. It is, indeed a character trait—that is, a disposition which is well entrenched in its possessor, something that, as we say “goes all the way down”, unlike a habit such as being a tea-drinker—but the disposition in question, far from being a single track disposition to do honest actions, or even honest actions for certain reasons, is multi-track. It is concerned with many other actions as well, with emotions and emotional reactions, choices, values, desires, perceptions, attitudes, interests, expectations and sensibilities. To possess a virtue is to be a certain sort of person with a certain complex mindset. (Hence the extreme recklessness of attributing a virtue on the basis of a single action.)

Yes, this is a difficult act for a machine to follow, but absolutely essential if one is to have autonomous cars, autonomous surgeons and other tools that will interact intimately with humans.

The one recent book on ethics that I have enjoyed the most is After Virtue, by Alasdair MacIntyre. But that is another story …

Notes

  1. I taught Artificial Intelligence (AI) at Nord-Trøndelag Regional College from 1988 to 1991. My focus was on expert systems.
  2. I do not normally enjoy reading science fiction. However, I do find it rewarding to read about the topic.
  3. Currently, my main interest in AI relates to robotics in general, and assistive devices in particular. However, I also see a need to look beyond the present to a future where machines acquire a form of consciousness.
  4. Personally, if I needed extensive care in the future, I would prefer that care given to me by a robot rather than a human.

 

Retrograde

Retrograde is an informal project for family and friends to test RetroShare, a friend-to-friend (F2F) network communication and file sharing system, to see if it can replace other social media platforms. Mega-corporate social media incessantly use surveillance trackers, and manipulate users for commercial, political and even more fundamental ideological purposes.

The RetroShare Logo

If you know me personally, you may participate in this project!

The key dates of the project are all the first day of the following months in 2018.

July: Official announcement of project, with a request for participants. If you want to participate, please send an email to brock at mclellan dot no, with Retrograde as subject. Nothing more is needed. The official deadline is 2018-07-14 23:59, Central European Summer Time (CEST). For people living on the West Coast of North America, the deadline is 14:59 or 2:59 PM, Pacific Daylight Time (PDT). Unofficially? Well, why don’t you send it now, so you don’t forget? But your request will be considered by a living human being, with long experience dealing with procrastinators!

August: Notification of selected participants. Participants will receive detailed instructions on how to download and install RetroShare, including creation of private and public keys needed to operate the system. Back channels (email) will be used for this purpose. You may want to have a few close friends and/or family members install RetroShare on their computers.

September. Trial operation. During this time you will be able to communicate with friends and family who have RetroShare, and send communication similar to that you would do on Facebook, but without Facebook being in control. Hopefully, during the month you will learn new features of RetroShare that improve the quality of your on-line life. Every few days, you will receive a new message (on RetroShare) suggesting new ways of communicating, building your skills (and confidence) as a RetroShare user.

October. You will be asked some questions about your experiences using RetroShare in September, and particularly about problems you encountered (and your solutions). The official deadline to reply will be Sunday, 2018-10-14 23:59, Central European Summer Time (CEST). For people living on the West Coast of North America, the deadline is 14:59 or 2:59 PM, Pacific Daylight Time (PDT). Note: This date is before the “fall back” to standard time.

November. An anonymized report on the trial operation will be sent to participants, a less detailed weblog post will follow. It will now be up to each participant to decide if they want to keep using RetroShare actively, to keep it passively on their machine, or deactivate it and remove it.

Why Retrograde?

In the final hours of preparing this post, I received a copy of a report from the Norwegian Consumer Council, titled Deceived by Design. It states,

“In this report, we analyze a sample of settings in Facebook, Google and Windows 10, and show how default settings and dark patterns, techniques and features of interface design meant to manipulate users, are used to nudge users towards privacy intrusive options. The findings include privacy intrusive default settings, misleading wording, giving users an illusion of control, hiding away privacy friendly choices, take-it-or-leave-it choices, and choice architectures where choosing the privacy friendly option requires more effort for the users.” (p. 3)

Yes, social media, including Facebook and Google, but also Microsoft with Windows 10, has gotten out of hand. I would like people to participate in a cyberspace where fundamental rights, including the right to privacy, dominate. At the same time, I want people to use dignity and respect in their dealings with each other, online as well as offline. Project Retrograde is an initial effort to provide such a forum.

About RetroShare

RetroShare is an open source, non-intrusive communication platform, with official and unofficial versions available for devices (usually computers) running the following operating systems:

Windows: XP, Vista, 7, 10.

Apple: MacOS.

Linux: Ubuntu, Debian, Mint, Arch, Fedora, Gentoo, , Raspberry Pi, Mageia, CentOS, OpenSUSE.

FreeBSD

Android:  Only a partial implementation.

There does not seem to be a distribution for iPhone, but this may be in part because Apple is not particularly open to products outside their very commercial ecosystem. One inexpensive solution for people trapped in an Apple environment, is to buy a raspberry pi, and to use it as a RetroShare server. People in this situation can contact me for details, as I will be implementing RetroShare on a Raspberry Pi 3 B+. A Mac computer, running any modern version of macOS can also be used.

RetroShare works as a communication platform, when it is based on real-life acquaintanceships of “trusted” people in a network. Add only people to the network you know and trust. In 2012, a German Court issued an injunction against a user of RetroShare for sharing copyrighted music files. The user had added an anti-piracy monitoring company as a friend, which allowed him to be “caught”.

Unless you tell someone, it will be very difficult for other people to know that you are running RetroShare.

I will only be adding people to my network that I know personally, even if the last time we met physically was over fifty years ago. I still know them, and trust them. On the other hand, there may be people I have regular contact with, but where, for one reason or another, there is a shortage of trust. With people in this category, I will certainly avoid mentioning anything about RetroShare. My estimate is that, fully populated, my RetroShare contact list will include about 100 people.

One challenge with using Facebook is that they categorize everyone as a friend, while I use much more selective nuances. The several hundred people I am Facebook-friends with include: friends (a core group of about 10 people, most of whom I have known for 30 years or more), close family (which may relate to my adoptive or biological family), not-so-close family, neighbours, co-religionists, former colleagues, former pupils, former prison inmates I have taught, other prison inmates, members of environmental and other organizations, random acquaintances, and people who claim to know me that I can’t even recall vaguely. I habitually turn down friend requests from unknown twenty-something year old women, who include a lot of photos of themselves but little real information, so they are not even included on the list of Facebook-friend categories.

Some of the communication services provided by RetroShare include : private chats, a private mailing system, public and private multi-user chat lobbies, a forum system, an auto-download file distribution system similar to RSS feeds, a link posting system, VoIP calls, Video calls, Tor and I2P  support. Admittedly, some of these are not fully developed, and are in Beta testing. During the trial period, a large number of these will be used (or at least proposed used) to see how they function, and if these would be appropriate for continued use.

RetroShare creates encrypted connections to your friends, which reduces the likelihood of surveillance. Retroshare is decentralized. There are no central servers that can retain copies of cleartext (unencrypted) data. Because of this, there is no fear that they will shut down or change their terms of services. RetroShare is independent of government and corporate systems.

For further information see:

https://fil.forbrukerradet.no/wp-content/uploads/2018/06/2018-06-27-deceived-by-design-final.pdf

Wikipedia article: https://en.wikipedia.org/wiki/RetroShare

Official Retroshare website: http://www.retroshare.net/

Tutorial: https://www.youtube.com/watch?v=1zVVxtwEdps

https://www.youtube.com/watch?v=1zVVxtwEdps&t=301s

(At the time of writing 2018-06-29 at 09:00 this video had 4 857 views, and was one of the most popular RetroShare videos.)

Smart-home Abuse

Smart-home technology has become a new arena for abusers to harass their victims. It is a new form of domestic guerrilla warfare. Abusers use smartphone apps connected to internet-enabled devices to remotely control everyday objects in the victim’s residence. Some modes of operation are passive, simply allowing the abuser to watch and/or listen. Other modes display power, and are intended to invoke fear. Both forms are a crime against the victim, and cannot be tolerated.

The abuser may or may not be resident, or in or out of an ongoing relationship with the victim. It is particularly in situations where the abuser and the victim are living together, that smart-home devices can be problematic, and difficult to handle. This post is a warning to potential victims, that smart-home devices may not be as innocent as they look.

Google Home, with an Android smartphone, one of a growing number of smart-home devices (Photo: Bence Boros on Unsplash)

Devices acquired by an abuser, and installed in a victim’s residence, often remain controlled by the abuser, even after a relationship has ended. Smart-home devices are weapons of choice for many abusers. There is often asymmetrical insight into these devices in a relationship. Victims typically lack the technological skills necessary to set up, and modify smart-home devices. This asymmetry, gives power to the abuser. Devices that can be used include cameras. loudspeakers, lights, remotely operated doors and thermostats.

Many smart-home devices are inexpensive and easy to install, as long as one knows what one is doing. Typically, only one person in a relationship – often a male – installs and programs, even operates, the technology. This person has an overview of the technology that the other person in the relationship lacks. The abuser may have exclusive knowledge of user names and passwords, which gives that person the power to compromise the other person in the relationship, typically a woman. For example, the abuser may have exclusive use of a controlling app on his telephone.

Domestic abuse is not uncommon. In a 2010 CDC report, one in three women and one in four men have been victims of physical violence or stalking by an intimate partner. See: https://www.cdc.gov/violenceprevention/pdf/nisvs_report2010-a.pdf

What can be done?

First, both partners should work together and decide which smart-home devices should be installed. If there is no agreement, then it can’t be installed. Once installed, both partners must then have any apps used to control the devices.

Second, all smart-home device installations must be fully documented, and accessible to both partners in the relationship. Part of that documentation includes full discloser as to device names and passwords. However, it should also include wiring and other diagrams.

Third, as part of a legal written agreement between (former) partners, the partner leaving the residence must agree to remove all user names, passwords and other data associated with smart-home devices from all of his devices, including but not limited to phones, computers and tablets.

Fourth, any unusual device behaviour must be assumed to be enemy action, and both parties must agree that it be treated that way. Potential abusive behaviour includes: changing thermostats to uncomfortably high or low temperatures; playing music when the victim is sleeping; flashing lights at inappropriate times or preventing lights to turn on when they are required; posting photos/ videos/ sound recordings on social media, taken by remote cameras/ microphones; inappropriate door locking behaviour, such as preventing the victim from entering the residence, or allowing anyone free access to the residence, including the abuser.

A word of caution

A major problem arises when a victim removes or deactivates smart-home devices. This can result in the victim feeling inadequate and isolated, but may also result in abuse escalation. In most situations, the abuser will have sufficient control over the situation and devices to know if and when a device has been disabled, which can trigger further violence, physical or emotional.

Any course about smart-home devices should be offered either to women alone, or to couples jointly. Users should be able to understand smart-home device documentation. and be able to disable any devices installed in their residence.

Future courses I offer about smart-home devices will require the participation of both couples in a relationship, or signed note from a female domestic partner for permission to attend. This note must also include an acknowledgement that smart-home devices can be used abusively!

Down to Earth

V1 2018-06-24 18:09; V2 2018-06-24 23:37 Some minor changes, including names/descriptions of courses.

English version, Norwegian version follows

The Intergalactic Rocket Science Academy (IRSA) has hovered over everyone’s heads, in outer space, far too long. Now, it needs your help to launch a one week workshop, Down to Earth.

Target group: Earthlings, especially those with physical or mental health issues. OK, that includes all of them.

Earthling at a café in Prague, Czechia (photo: Anders Nord 2018 in Unsplash)

Principles: Fun First! “If it ain’t fun, it ain’t part of IRSA.”

Location: Space Station Straumen [that is Inderøy’s municipal centre. More specifically, at Hastighet, Inderøys teknogarasje = Velocity, Inderøy’s techno garage,  being constructed – at least in theory – as this weblog is being written. It has received a grant of NOK 250 000, about CAD 40 000 to equip a 70m2 former classroom with production machinery, such as 3D printers and a laser cutter, not to mention electronic equipment.]

Arrival Sunday evening; Departure Saturday morning. Information about the specific movement of space shuttles from various planets will be provided later. [Actual dates and years? Petty details like those will be worked out later.]

Groups: There are three groups earthlings can choose between.

Clothing: Functional clothing for everyone [Replaces: Fashionable and functional adaptive clothing for the elderly and disabled.] At the end of the week, each participant will have one garment that they can take with them to their home planet.

Food: Tasty and nutritious food for everyone [Replaces: for the elderly and allergic.] At the end of the week, each participant will have (at least) five recipes they can take home with them. They will also prepare food for the evening meal.

Technology: Home automation for everyone [replaces, for the elderly and disabled.] At the end of the week, each participant will have one device that they can take with them to their home planet. Involves programming, electronics, 3D-printing.

Notes:

Earthlings have lost the ability to photosynthesize, and must “eat”. They gather together for a “meal” several times during an earth day. Earth friendly food will be served, and a food group will be formed in advance to make sure that all participants are able to eat the food served.

Earthlings need to “reflect”, “rest” and “sleep”. These are time periods when they need to be alone. To put it in terms a robot would understand, they need to recharge their batteries.

Remember, Earthlings are primitive. They cannot theorize, practicize and exercise simultaneously, but need separate sessions devoted to each one. They have no capacity for brain to brain communication, but must rely on “speech” (sound making) and “hearing” (sound sensing) for communication. Because of variations in sound sensing capabilities, sound makers have to use artificial amplifiers, especially in the presence of old earthlings.

Earthlings use “breaks” for informal communication, and fluid exchange. Fluid intake of water, coffee or tea is public. Fluid outtake is private, and is undertaken in rooms especially designed for the purpose.

Daily program

Morning meal 9:00 – 10:00.

Theory session: 10:00 – 10:45; break; 11:00 – 11:45; break.

Time for reflection: 12:00 – 13:00.

Common main meal: 13:00 – 14:00.

Practical session: 14:00 – 14:45; break; 15:00 – 15:45; break.

Time for reflection, exercise (walk): 16:00 – 18:00.

Evening meal: 18:00 – 19:00.

Optional cooperative projects: 19:00 – 20:00.

Theory sessions:

First hour

Monday, Tuesday, Thursday, Friday: Coping with life. Strategies for enhanced survival as an earthling.

Wednesday: Clowning. Expressing emotions without words. Extends over two hours.

Second hour

Separate sessions for each of the groups, every day but Wednesday. Here, theoretical information related to the specific group will be presented.

Practical sessions:

Separate sessions for each of the groups. Here, earthlings will use their hands to make things related to the goals of their specific group.

Exercise sessions:

Walks need to be selected, so that people, either alone or with others can walk sufficiently.

Stop the Press!

While it might be fun to start off with a five-day workshop, the entire event might also turn out to be a catastrophe. Perhaps the correct approach is doing what the IRSA does best: build a three stage workshop rocket!

Y0 (Year Zero)

Stage 1. An experimental session. Each teacher makes a lesson plan for a single 45 minute theory hour, plus a single 45 minute practical hour. These two hours are offered as a separate event.

A teaching session should be more than a single organism, creating sound bytes in front of other organisms. The teacher will have to assess whether materials should be read, before the session starts. If so, what is the teacher going to do if there are students with reading difficulties (hint: make audio files of the materials.) Photographs, illustrations, videos, simulations and demonstrations may all be used to enhance learning.

A quiz at the end of the session, can help determine if participants have learned what has been expected of them. At the end of this event, participants are asked for feedback, about the event they have just attended.

Stage 2. A course over several weeks. The feedback from the experimental session will allow the teacher to make adjustments to the lesson plan for the first session, or scrap it entirely. The teacher can now make continue to make lesson plans for the entire course, along with assorted aids, and to implement them on a weekly basis, making adjustments each week as needed. At the end of the course, participants – once again – are asked for feedback.

Stage 3. A workshop! Now we are back to where we started from, but with one major difference. The teacher has experience and, hopefully, confidence.

Y1 (Year One)

If one decides that the workshop has value for other people than the initial participants, additional workshops can be made. These can be located in different cities and held in different languages.

At the same time, new topics can be developed for different target groups. Three of these groups could be 1) parents, 2) immigrants and 3) youth.

If you would like further information about workshop participation, or if you would like to host a similar workshop on your planet, contact brock at mclellan dot no.

Ned til Jorden: Den norske versjonen/ Down to Earth: The Norwegian version.

Intergalaktisk Rakettvitenskaps Academy (IRVA) har svevet over alles hoder, i det ytre rom, altfor lenge. Nå trenger den din hjelp til å starte en ukes workshop, ned til jorden.

Målgruppe: Jordboerne, spesielt de med fysiske eller psykiske problemer. OK, det inkluderer alle av dem.

Prinsipper: Moro først! “Hvis det ikke er morsomt, er det ikke en del av IRVA.”

Sted: Romstasjon Straumen [det er Inderøys kommunale sentrum. Nærmere bestemt Hastighet, Inderøys teknogarasje konstruert – i det minste teoretisk – da denne bloggen blir skrevet. Det har mottatt en gave på NOK 250 000 for å utstyre et 70m2 tidligere klasserom med produksjonsmaskiner, for eksempel 3D-skrivere og laserkutter, og ikke minst elektronisk utstyr.]

Ankomst søndag kveld; avreise lørdag morgen. Informasjon om de nøyaktige bevegelser av romskip fra de ulike planeter vil bli gitt senere. [Faktiske datoer og år? Små detaljer som disse vil også bli utarbeidet senere.]

Undervisningsgrupper: Det er tre grupper jordboerne kan velge mellom.

Klær: Funksjenelle klær for alle. [Erstatter, Fasjonable og funksjonelle, adaptive klær til eldre og funksjonshemmede.] På slutten av uken vil hver deltaker ha ett plagg som de kan ta med seg til deres hjemme planet.

Mat: Velsmakende og næringsrik mat for alle. [Erstatter, til eldre og allergiskere.] Ved slutten av uken vil hver deltaker ha (minst) fem oppskrifter de kan ta med seg. De vil også tilberede mat til kveldsmåltid.

Teknologi: Hjemmautomatisering for alle [Erstatter, for eldre og funksjonshemmede.] Ved slutten av uken vil hver deltaker ha en enhet som de kan ta med seg til deres hjemmeplan. Involver programmering, elektronikk, 3D-utskrift.

Merknader:

Jordboerne har mistet muligheten til å fotosyntetisere, og må “spise”. De samles sammen for et “måltid” flere ganger i løpet av en jorddag. Jordvennlig mat serveres, og en matvaregruppe vil bli dannet på forhånd for å sikre at alle deltakere kan spise maten.

Jordboerne trenger å “reflektere”, “hvile” og “sove”. Disse er tidsperioder når de trenger å være alene. For å si det som en robot ville forstå, må de lade opp batteriene.

Husk at jordenboerne er primitive. De kan ikke teoretisere, praktisere og trene samtidig, men trenger separate økter viet til hver enkelt aktivitet. De har ingen kapasitet til hjernekommunikasjon, men må stole på “tale” (lydfremstilling) og “hørsel” (lydfølelse) for kommunikasjon. På grunn av variasjoner i lydavkjenningsegenskapene, må lydprodusenter bruke kunstige forsterkere, spesielt i nærvær av gamle jordboerne.

Jordboerne bruker “pauser” for uformell kommunikasjon, og fluidutveksling. Væskeinntak av vann, kaffe eller te er offentlig. Væskeutslipp er privat og foregår i rom spesielt egnet til formålet.

Daglig program

Frokost 9:00 – 10:00.

Teoriøkt: 10:00 – 10:45; pause; 11:00 – 11:45; pause.

Tid for refleksjon: 12:00 – 13:00.

Felles hovedmåltid: 13:00 – 14:00.

Praktiskøkt: 14:00 – 14:45; pause; 15:00 – 15:45; pause.

Tid for refleksjon, mosjon (gange): 16:00 – 18:00.

Kveldsmat: 18:00 – 19:00.

Valgfrie samarbeidsprosjekter: 19:00 – 20:00.


Teori økter:

Første time

Mandag, tirsdag, torsdag, fredag: Løft med livet. Strategier for forbedret overlevelse som jordboende.

Onsdag: Klovne. Å uttrykke følelser uten ord.  Strekker seg over to timer.

Andre time

Separate økter for hver av gruppene, hver dag bortsatt fra onsdag. Her vil teoretisk informasjon relatert til den spesifikke gruppen bli presentert.

Praktiske økter:

Separate økter for hver av gruppene. Her vil jordboere bruke hendene til å gjøre ting relatert til målene til deres spesifikke gruppe.

Treningsøkter:

Vandringer må velges, slik at folk, enten alene eller med andre, kan gå tilstrekkelig.

Stopp pressen!

Selv om det kan være morsomt å starte med en fem-dagers verksted, kan hele arrangementet også vise seg å være en katastrofe. Kanskje er riktig tilnærming det som IRVA gjør best: bygge et tre-trinns verkstedrakkett!

Y0 (År Null)

Fase 1. En eksperimentell økt. Hver lærer gjør en leksjon plan for en 45 minutters teori time, pluss en 45 minutters praktisk time. Disse to timene tilbys som et separat arrangement.

En undervisningssesjon bør være mer enn en enkelt organisme som produserer lydbyter foran andre organismer. Læreren må vurdere om materialet skal leses før sesjonen starter. Hvis så, hva skal læreren gjøre hvis det er studenter med lesevansker (hint: lag lydfiler av materialet.) Fotografier, illustrasjoner, videoer, simuleringer og demonstrasjoner kan alle brukes til å forbedre læringen.

En quiz i slutten av sesjonen, kan bidra til å avgjøre om deltakerne har lært hva som er forventet av dem. På slutten av denne hendelsen blir deltakerne bedt om tilbakemelding, om hendelsen de nettopp har deltatt på.

Fase 2. Et kurs over flere uker. Tilbakemeldingen fra eksperimentell økt vil gi læreren mulighet til å gjøre justeringer til leksjonsplanen for den første økten, eller skrap den helt. Læreren kan nå fortsette å lage lektionsplaner for hele kurset, sammen med assisterte hjelpemidler, og å implementere dem på ukentlig basis, foreta justeringer hver uke etter behov. På slutten av kurset blir deltakerne – igjen – bedt om tilbakemelding.

Fase 3. Et verksted! Nå er vi tilbake til hvor vi startet fra, men med en stor forskjell. Læreren har erfaring og, forhåpentligvis, tillit.

Y1 (År Ett)

Hvis man bestemmer seg for at verkstedet har verdi for andre enn de opprinnelige deltakerne, kan det opprettes flere workshops. Disse kan lokaliseres i forskjellige byer og holdes på forskjellige språk.

Samtidig kan nye emner utvikles for ulike målgrupper. Tre av disse gruppene er 1) foreldre, 2) innvandrere og 3) ungdom.

Hvis du vil ha mer informasjon om workshopdeltakelse, eller hvis du ønsker å være vert for et lignende verksted på din planet, ta kontakt med brock på mclellan dot no.