Category Archives: Computers

Remember those black Apple II computers?

I doubt many do.

So here’s a bit of history.

Our first home computer was a black Apple II+ sold under the Bell & Howell brand. I believe we brought it home somewhere around 1979 or 1980.

Here’s an excerpt from an online history of old computer models, which reports the common assumption that it was not available to retail purchasers.

Founded in the early 1900’s, Bell & Howell has always been associated with audio-video equipment – cameras, projectors, and the like. In 1979, they had a computer system which they sold mainly to educational institutions – you couldn’t buy one, it wasn’t available in your local computer store.

The “Bell & Howell computer” is actually an Apple II Plus computer in disguise. The normally beige case is now black, and a Bell & Howell label was attached. But as you can see above, Apple is still given full credit.

But that was wrong in one respect.

We went shopping for a home computer to see for ourselves what all the excitment in magazines was about, and found an early store in Honolulu. I don’t recall much about the store and the owner, who we just referred to as “Computer Bill.” As I recall, it was a small store that may have competed with Computerland, the first large chain of computer stores, although my memory of this is rather hazy.

One day there was a stack of boxes in the store containing these black Apples, which had somehow been diverted from educational sales to this retail store. We asked no questions, and took one home.

The computer’s memory was limited to 48k, as in kilobytes, later expandable with an additional memory card that brought it up to 64k. Compare that to today’s entry level computers that are often delivered with 128 gigabytes of internal memory.

Start doing the math. A single megabyte is about 20 times larger than that original 48k, and a single gigabyte is 1,000 times more than a megabyte, so 128 gigabytes is…immense by comparison.

At first, there was no disk drive available. Software came on casettes, and you plugged a tape recorder into the computer and downloaded the software. Apple Writer was the first software we bought, and it immediately suggested to us that this technology was going to become extremely useful. I think we may have purchased a dot matrix printer at the same time, or very soon afterwards, and started writing. It was like magic.

It wasn’t too long before Apple’s first floppy disk drives became available. It could store over 100kb on a single 5” floppy disk. Huge. Later, when the first hard drive became available for the Apple II, it held a monstrous 5 megabytes. Compare that to today’s drives that can pack terabytes into a tiny package (terabye=1,000 gigabytes; gigabyte=1,000 megabytes). Whew.

Anyway, we were hooked. We later bought several Apple II Plus computers as their capabilities increased and prices dropped. Graduated to a Mac Plus when they arrived at the beginning of 1986, and rode the Mac wave through until today.

Along the way, we bought an early Powerbook in the early 1990s, later supplanted by one of the colorful iBook laptops when they were introduced at the end of the decade. And the laptops were parallel to our continued upgrades through many generations of Mac desktops. Today Meda and I each rely on a 16” Mac laptop powered by Apple’s M1 chips, accompanied by iPads (I’m writing now on a 9.7” iPad Pro, while Meda uses the latest generation iPad Mini). And, of course, the little computer we carry with us everywhere (packaged as an iPhone).

Having lived through the early years of this computer age, we fully appreciate how far we have come!

What ChatGPT had to say about this blog

I’ll be bogged down today and probably tomorrow as well. It’s tax time, so TurboTax and I will be trying to complete our federal and state tax returns. Hopefully I won’t run into any real problems.

I happened to notice another news story this morning about useful things to do with ChatGPT, and decided to ask a couple of questions and see what this AI system would come up with. The results were interesting.

IL: describe the blog ilind.net

Ilind.net is a blog that covers a wide range of political and social issues, primarily focused on the United States. The blog is authored by Ian Lind, a journalist and commentator with a background in investigative reporting and political analysis.

The topics covered on ilind.net range from local politics and community issues in Hawaii, where Lind is based, to national and international news and events. The blog often delves into the inner workings of government and politics, analyzing policy decisions and the actions of elected officials.

In addition to political analysis, ilind.net also features commentary on a variety of social issues, including civil rights, environmentalism, and social justice. Lind’s writing is characterized by a deep knowledge of history and politics, as well as a critical and often humorous tone.

Overall, ilind.net is a thought-provoking and insightful blog that offers a unique perspective on the world of politics and social issues.

IL: how could ilind.net be improved?

As an AI language model, I do not have an opinion, but here are some general suggestions that could potentially improve ilind.net:

Increase interactivity: ilind.net could benefit from more interactive features, such as comment sections or social media integration, to encourage greater engagement and discussion among readers.

Incorporate multimedia: While ilind.net includes written articles and images, incorporating multimedia such as videos, podcasts, or infographics could make the content more engaging and accessible.

Diversify perspectives: While Ian Lind offers a unique perspective on politics and social issues, ilind.net could benefit from featuring guest writers or diverse perspectives to offer a wider range of voices and viewpoints.

Improve website design: ilind.net could improve its website design to make it more visually appealing and user-friendly, which could encourage readers to spend more time on the site.

Expand coverage: While ilind.net covers a wide range of political and social issues, expanding coverage to include more topics or regions could attract a wider audience and increase the relevance and impact of the blog.

PGA tournament data system catches my eye

The Sony Open, one of the first PGA tournaments of the year, officially gets underway Thursday at the Waialae Golf Course, just around the corner from our house.

Things get very busy in the neighborhood, and on the golf course, in week or two before the tournament, as tents, stages, grandstands, and camera towers are put together in various parts of the course, and miles of fiber optic and power cables are laid in place around the course.

I took this photo a couple of days ago showing the cables running along what during the tournament is the 17th hole, which runs parallel to the beach. The cables appeared to be running to a television camera tower overlooking the 16th green.

On the other end, it seemed that some or all plugged into a black case that sat under a temporary pole, perhaps 10′ high, with some sort of gizmo at the top. I was curious, and took a photo of the case, which was marked “PGA Tour Shotlink.”

So when I got back home, I looked up PGA Tour Shotlink, which turns out to be an amazing data system that is temporarily installed on the course for each PGA tournament, and makes possible instant data sharing of a tremendous amount of cloud-based data.

The PGA TOUR’S ShotLink technology, powered by CDW, has tracked and recorded every professional golf shot in real time since 2001, delivering insights to fans watching at home or following tournaments through mobile apps, and providing critical data to
players striving to improve their performance.

I was just shaking my head at the complexity of this portable system, but a friend made an obvious comment: “Imagine what a system like this can do tracking demonstrators or marchers or any other public gathering or in any public space.”

It’ a whole new world.

What an email account can reveal….

One of the search warrants described in my Civil Beat story yesterday was addressed to Google and requested “information associated with” a Gmail account.

It turns out that a request of this kind has a much wider reach than most people expect. Emails sent and received are just the starting point.

Although the warrant in question is sealed, I took a look at what appears to be a similar request, a search warrant application filed on February 13, 2017, sought records associated with the account for gingerbreadjr3351@gmail.com, used by Lance Bermudez, known as “Hammah,” one of the Miske defendants who pleaded guilty in September.

The case file containing the warrant application, affidavit, and related documents, case number 17-MJ-00161, was unsealed by Watson’s court order dated September 23, 2022.

It was supported by a 48-page affidavit signed by FBI Special Agent Austin Jackson, and an attachment detailing the types of information the search warrant sought from Google.

The scope of information sought by this search warrant, described in “Attachment B,” is surprisingly broad, and is a reminder of how much information internet service providers collect and maintain on every user.

Information sought by the Bermudez warrant began with all emails stored in the account, whether sent to or from the account, including draft emails, “the source and destination addresses associated with each email, the date and time at which each email was sent, and the size and length of each email.”

That was just the beginning.

It then asked for all information about the identification of the account, including the name, physical address, telephone numbers used in creating the account, along with the date the account was created, length of service, types of services utilized, the IP address used to register the account, the log-in IP addresses associated with individual sessions and dates, any alternate email addresses provided, log files, and sources, including credit or bank account numbers, used to make payments.

The list goes on. Next came all information stored by the person using the account, including address books, contact lists, pictures and files stored on Google Drive and Google Photo, as well as information on additional accounts linked by “cookies,” those small files left by websites visited that can track the site, and the viewer, over time.

And there was one final but very important type of information, “location history,” described as “all location data whether derived from Global Positioning System (GPS) data, cell site/cell tower triangulation precision measurement information such as timing advance or per call measurement data, and Wi-Fi location….”

Knowing how, when, and where the email account was accessed could then be used “to determine the geographic and chronological context of account access, use, and events relating to the crime under investigation and to the email account owner….” as well as “indicating the email account owner’s state of mind as it relates to the crimes under investigation,” according to Agent Jackson’s submission.

Further, information maintained by the email
provider can show how and when the account was accessed or used.
For example, as described below, email providers typically log
the Internet Protocol (IP) addresses from which users access the
email account, along with the time and date of that access. By
determining the physical location associated with the logged IP
addresses, investigators can understand the chronological and
geographic context of the email account access and use relating
to the crime under investigation. This geographic and timeline
information may tend to either inculpate or exculpate the
account owner. Additionally, information stored at the user’s
account may further indicate the geographic location of the
account user at a particular time (e.g., location information
integrated into an image or video sent via email). Last, stored
electronic data may provide relevant insight into the email
account owner’s state of mind as it relates to the offense under
investigation. For example, information in the email account
may indicate the owner’s motive and intent to commit a crime
(e.g., communications relating to the crime) or consciousness
of guilt (e.g., deleting communications in an effort to conceal
them from law enforcement).