Yahoo! Confirms MS Merger, Name Change

April 1, 2008

Sunnyvale, California

Yahoo! CEO Jerry Yang told reporters today that the board of directors of Yahoo! Inc. had met earlier that morning and agreed to the sale of the company at a price of USD 66.6 Billion. Yang took the opportunity to defuse speculation about what this move means for the company.

Said Yang, “Honestly, it’s not that big a deal. The truth is that we used to show up at the company HQ every day, see that Yahoo! sign up there and get excited. But recently that just hasn’t been the case. I must be getting old or something. Anyway, I figured, ‘they want it? They can have it. I’m stinking rich anyway, why should I have to work?'”

One of the conditions of sale was that the Yahoo! name be changed.

“Let’s just admit it,” explained Yang. “It’s a stupid name. It was fun for, like, 20 minutes. Then we all sobered up and realised we felt like dorks whenever we told someone where we worked.”

Yang then took the opportunity to unveil Yahoo!’s new name: Meh… Its logo, Yang said, will be a giant emoticon consisting of the ‘8’, ‘-‘ and ‘/’ characters. When pressed by reporters, he admitted that it would not be easier to spell, and would still cause problems with grammar checkers.

“On the bright side,” he added, “we might finally be able to fix this, now that we’re part of… Meh… Microsoft.”

Microsoft’s CEO, Steve Ballmer, was not present at the press conference, due to a ‘minor’ chair-related injury. He instead released a taped message stating his satisfaction with the negotiations, which ended with a cryptic reminder to Yahoo! employees that their families would be safe, now that they’d shown some sense. Yang would not speculate about the comment’s meaning.

Letter to a Young Turk

I’ve been arguing for the last few weeks that what’s needed most for Vanuatu is to invest significant time and effort into the creation of a new crop of technically savvy individuals who can help Vanuatu bridge the growing gap between life in the information age and life as we’ve always known it in the islands.

There’s a pressing need for people to assist with this transition. The barriers have begun to fall that once allowed life in the village to remain consistent, with change seeping in slowly and in tiny doses. Very soon, most everyone in Vanuatu will have access to mobile telephony. We’re already hearing stories about Tannese in Middle Bush bringing their mobile to the garden with them, just in case someone wants to reach them.

Only weeks ago, nobody really got fussed about waiting days or even weeks to hear a bit of news. But now that we can actually get it, we want information immediately. It’s a universal human trait to want to keep caught up on the latest. In the past people here have been content to let information and gossip arrive at its own pace, confident at least that nobody was getting the jump on anyone else. But now, someone who owns a mobile phone holds a distinct advantage over those without. In this culture – and most others – knowledge is power, and in Vanuatu, a new arms race has begun.

Read more “Letter to a Young Turk”

No Borders

I made a mistake this week, or rather a misjudgement. I wrote about a new threat called Goolag, in which a malicious person could use Google to find servers on the Internet that are vulnerable to attack. The servers are infected with malicious code that causes anyone who visits them to be exposed to compromise. This is how many an innocent person’s computer becomes a spam-bot, remotely controlled by hackers and used to send spam, and sometimes to infect its neighbours as well.

I wrote, “Making simple mistakes is the easiest way to expose yourself to attack…. You won’t be targeted so much as stumbled across.”

Within two days of writing about the issue, an online security blog reported a wave of attacks affecting approximately 200,000 web servers. The single most important part of comedy, as they say, is timing.

This latest wave of attacks is important to us for a couple of reasons: It demonstrates that the democratising effect of information on the Web respects no single set of ethics or morality. The very same information-sharing tools that have so empowered people everywhere are being used by vandals and criminals for their own selfish ends as well.

It also means that there are no safe havens online.

Read more “No Borders”

Splash and Ripple

Drop a stone in the middle of the pool. Watch its ripples spread wider and wider across the surface. Inevitably – sometimes sooner than later – the ripples mingle and apparently disappear among the others. Cause and effect: A simple action creates immeasurable, unpredictable and unforeseeable results.

Among development professionals, this provokes roughly equal amounts of fascination and frustration. Fascination, because anyone with a mote of interest and natural curiousity is quickly engrossed by the flow of events as human cultures mingle and change. Frustration, because at some point it will be necessary to say to a donor, ‘Your money will have exactly this effect.’

And that will be a lie, of sorts.

Read more “Splash and Ripple”

#@)(!*^ing Encryption

A few words about the title: The first seven letters are written using a very simple code, or cypher. Each of the letters in the original word is replaced by the non-alphabetical character to which it is closest on a US keyboard. The process of hiding a message by substituting other letters, numbers or symbols is known as encryption. When the code is reversed, the title reads ‘Explaining Encryption’.

But it also looks like swearing, doesn’t it? In fact, the use of characters like this to denote swearing is a simple (dare we say crude?) kind of encryption. A child too innocent to know such words derives no meaning from the random collection of characters. Someone well versed in the ways of the world, though, can add up the number of characters and quickly deduce what was intended.

On and off over the last two months, we’ve been looking at various aspects of online security. This week, we’re going to consider what steps we can take to make the information we send over the Internet secure from prying eyes.

We’ll also consider why it is that no one uses these measures, and why most of us won’t any time soon.

Read more “#@)(!*^ing Encryption”

Policing Piracy

The Australian government recently announced that it was taking the issue of Internet piracy very seriously. They were, according to reports, considering their own version of a British proposal to require Internet Service Providers to cut off so-called ‘repeat offenders’. People who were suspected of deliberately and repeatedly downloading unauthorised music and video files would have their Internet accounts suspended.

This is a commendable goal. Respect for the creative works of others is at a low ebb these days. We need to alter our cavalier approach to copyright and to properly reward those who spend their time and effort in creating the music, movies, software and other creations we so enjoy.
Read more “Policing Piracy”

Oranges and Lemons

Over the last few weeks, we’ve been looking at various aspects of online security. It’s a big topic, and it’s often difficult to be clear about what’s happening, and what’s at stake. This week we’ll try to provide a few basic ideas about how to judge what makes us safer and what doesn’t.

We rely exclusively on our senses to assess the presence or absence of threats in the world around us. When we get up in the morning, we check the bread we eat for mould, sniff the milk before adding it to the tea, and touch the edge of the mug with our lips before drinking, to make sure it’s not too hot. We look both ways before crossing the road and we listen for oncoming traffic. We hesitate to get into a bus that doesn’t look safe. We cover our mouth and nose if there’s too much dust or smoke.

We employ our senses in a multitude of ways without any conscious thought. All the while, in the background, the brain is taking everything in and deciding from one moment to the next how to react to each new situation. For most of us, a typical computer gives us exactly nothing to react to. All we see is a pretty background, a few flashing icons or blinking lights and the Solitaire game in front of us.

Read more “Oranges and Lemons”

The Coconut Wireless

Last week’s column introduced a broad but important topic about current trends in technology. Over the next few weeks, we’ll take some time to look in more detail about the issues of privacy and access to information. What are the current trends? How are they going to affect us here in Vanuatu? What can we do to mitigate the worst effects and maximise the best of them?

Before we go into detail, though, it’s important to establish a bit of context. We’ve already described how people often make the wrong assumptions about the level of privacy they enjoy when using computers and the Internet. But let’s look at this issue in more practical terms.

Everyone in Vanuatu knows what ‘Coconut Wireless’ means. It refers to the lively rumours that spread via word of mouth concerning anything – or anyone – of interest to people as they idle away their spare time. In small doses, it’s generally unreliable, but when information is amalgamated from numerous sources, an assiduous listener can gather a good deal of interesting (sometimes deliciously scurrilous) and surprisingly accurate information.
Read more “The Coconut Wireless”

Privacy and Paper Walls

Every time I get on a plane, I find myself wondering if the crew feels the same about the aircraft I’m in as I do about computers. Does the pilot mutter, “If only they knew…” under his breath after the in-flight announcement? Does the technician who handles the pre-flight checklist give the thumbs up while saying a silent prayer?

Happily, the answer is no. If planes worked the way computers do, nobody would ever fly again.
Read more “Privacy and Paper Walls”