Desert of My Real Life











{November 12, 2010}   Running on Battery

I have had my laptop for about two and a half years.  When I first got it, it could run for three and a half to four hours on battery power.  Now, two and half years later, fifteen minutes on battery power is pushing it.  I know that rechargeable batteries have a limited life span.  But I’m still surprised at how short the life of this battery has been, especially since I’ve diligently tried to avoid all of the behaviors that are known to reduce the life of a battery.

But I’m not really someone who rails against the injustices of life over which I have no control.  So I decided to accept the reality of the situation and by purchasing a new battery.  My laptop is a Dell, which in times past would have been a good thing.  But Dell has kind of been on a downhill slide for a while when it comes to quality of their products.  In fact, I have had a couple of problems with this laptop but I haven’t complained about any of them because they were all fixed under the two-year warranty that I had on the machine.  The battery, however, is not under warranty.  So I recognize that I will have to pay whatever the cost for a new one.  I was completely unprepared to discover that a new 6-cell battery from Dell for my model of laptop costs $135.  I currently have a 9-cell battery and if I want to get an equivalent one, it will cost $155.  In the meantime, I got an email from Dell today telling me about a 72-hour sale they are currently running.  I can buy a new laptop, very similar to the one I currently own, for $450 (only a 6-cell battery, though).  I paid about $1800 for mine two and a half years ago.  Is Dell telling me that nearly one third of the cost of a laptop ($135 dollars out of a $450 pricetag) comes from the cost of the battery?  This makes absolutely no sense to me.  I’m going to buy a new battery rather than a new laptop but I’m not happy about it.

This experience with my laptop battery got me thinking about the batteries in my other electronic devices.  I use my iPod Touch all the time.  I often listen to NPR or music via my docking station for the device.  When the iPod is plugged into the docking station, the battery recharges.  One of the ways you can shorten the life of a battery is by over-charging (and by not letting it discharge).  It makes me wonder if there’s some sort of safeguard on the iPod that prevents it from over-charging.  A number of sites claim that you can not “over-charge” the iPod battery but it isn’t clear to me what those sites mean by that.  What I mean is: will battery life be reduced if you always keep the iPod battery “topped off,” that is, near 100% charged, rather than letting it run down to 0% (or close to 0%)?  I can’t seem to find any information about that.  In any case, I unplug the docking station when I’m not using it, both because that will stop definitely stop charging the attached iPod and because it saves energy to do so.

The other device whose battery I’ve been thinking about is my phone.  I currently have a loaner phone from US Cellular (long story but let’s just say that US Cellular has the best local customer service EVER).  It makes a noise when the battery is completely recharged, which is a nice feature.  Several other devices that I own have a light which changes from red or orange to green when they are completely recharged.  Again, nice feature.  But none of these features really give you an indication about whether your charging behavior is reducing the overall life of the battery.

It would be nice to have battery technology that allows recharging indefinitely with no need to run the battery down in order to maintain the maximum life span of the battery.  Given the fact that so many of us carry so many electronic devices, such technology would be hugely beneficial.



{November 11, 2010}   Google and Privacy

A story about Google and privacy on NPR last week caught my attention because it seemed so strange.  And now that I know what the real story is, it still seems really strange to me.

Google Map’s Street View function is very cool.  It provides street-level camera views of many locations.  In Boston, for example, you could type “Prudential Center” in the Google Maps tool, choose “Street View” and then stand virtually in front of the Prudential Center and look around, as though you were actually standing at that spot.  You can then (virtually) move in any direction along the street, as though you were traveling in a car.  I’ve used the function before visiting new places, trying to find new addresses, to get a sense of what I’ll see when I’m actually there.

To create these street-level views, Google sends people in cars to drive around, video-taping the view at various locations.  To facilitate the coordination of the video with actual addresses, the people in the car utilize mobile computing technology to gather GPS information that is then attached to the video.  The software that Google used in this project apparently had a feature that captured other kinds data from the airwaves in addition to the data needed to create the street views.  In particular, this software sniffed out unsecured wireless networks and captured data such as email addresses, passwords, and IP addresses.  After denying that they were capturing such data, Google finally admitted that they were “inadvertantly” capturing it but that the data was never used for any purpose.  The data capture was inadvertant because the company was using software that had been developed for other purposes and they simply didn’t realize this capability remained intact.

In Britain, such data capture is illegal.  So the story I heard was about the British government deciding whether to fine Google for the “data breach” or not.  Instead of fining Google, the British government sought written assurance from Google that they would not engage in such practices again.  In addition, the government would like to conduct an audit of Google’s data protection practices.  And that, apparently, will be the end of the incident.

I think there are two interesting parts to this story that have not been discussed. 

First, there are a ton of wireless networks that are unsecured.  What this means is that people set up a wireless network in their house or their business and they don’t encrypt the data that is sent via that network.  So all information that is sent on the network can be read by anyone.  If you put in a password, it is transmitted in plain text, so anyone (with a sniffer–another type of program, readily available–that’s another post) can read it.  If you put in your bank account number, it is transmitted in plain text and anyone (with a sniffer) can read it.  In other words, it is a really bad idea to set up an unsecured, unencrypted wireless network.  When you buy a wireless router, the setup instructions are pretty easy for setting up a secure, encrypted network.  But many people choose not to.  I’m not sure why.  Of course, it still makes sense to me that it would be illegal to gather private information from unsecured networks.  If someone doesn’t lock the door to their apartment, we still think it’s a crime for someone to steal things out of that apartment.  It’s the same situation with an unsecured wireless network.

The second thing that I think is interesting about this story is the fact that Google’s software contained functionality left over from some previous project that was unrelated to the current project.  This might not seem like a big deal but I’ve seen this in other pieces of software and it is indeed a big deal.  A few years ago, Microsoft’s Excel was a hog, using huge amounts of memory and CPU time, far beyond what you would expect given its functionality.  I discovered (via the Internet, of course) that the Microsoft programmers had inserted a huge chunk of Microsoft’s Flight Simulator into the Excel code.  So if you pressed a bizarre sequence of keys while you were in Excel, you would suddenly find yourself flying a simulated plane, with some of the most realistic graphics available at the time.  This is called an “Easter egg.”  And here are some instructions for how to get to the Flight Simulator from within Excel. (By the way, I was unable to get this to work on Vista but you can go to Wikipedia to find some documentation of various Easter eggs in Microsoft products.)  It was a cool discovery.  Most Excel users never knew this functionality existed.  And it shouldn’t have existed because it was completely unrelated to spreadsheets.  It was (probably) the major reason that Excel was bloated, taking more memory and CPU time than necessary.

So although the story about Google’s privacy breaches is strange, it contains a couple of lessons for the average computer user as well as for software developers.  Average user–secure your wireless network!  Software developer–resist the temptation to play around as you develop your software.



et cetera