Yesterday my wife asked me if we could go to an auto show this weekend. Yeah, I know – she’s a keeper! Here are some of the pictures that I took of some of the cars (there were over 3000 there, many were for sale! It’s amazing that I actually didn’t walk away with something!
I tweeted some of the pictures as it was happening, but apparently my “multi-photo” tweets didn’t go through, so here they are. When I get a chance, I will try to have captions of what they are.
This weekend was frustrating. So frustrating that I had to send out this tweet:
Badger 5, J and the Wife 1. One tough cookie. #WillysJeep
— J Metz (@drjmetz) March 15, 2015
When my wife and I went out to work on Badger over the weekend, it seemed that we got stymied every step along the way. What’s worse, it’s made me rethink what I need to do to get Badger’s steering running again and opened up the (previously healed) wound of deciding whether or not to convert to a Saginaw system.
In short, I’m looking for thoughts and advice, so feel free to make suggestions. Consider me in perpetual “sponge mode.” Read more…
The FCC today released it’s “Protecting and Promoting the Open Internet” order, a.k.a. “Net Neutrality.”
Weighing in at nearly 600 pages, it is a monstrous behemoth. It’s important to note that the order was not unanimous among the commissioners (3-2).
Commissioners Pai and O’Rielly dissenting and issuing separate statements and included as an addendum inside the document. The contents of this dissent will be important for any legal challenges to the ruling.
Looks like I have a little light reading to do. I’ll post the links to the dissenting opinions when they’re published.
It’s no secret that I’m a huge fan of Synology. The company has always, always treated me well. In fact if more companies acted like Synology did, I think that we’d have a lot of very happy consumers out there. It’s also no secret that I simply do not trust “The Cloud” for securing personal data. As I’ve said before on the Speaking in Tech podcast I have significant doubts as to how much anyone will protect my data as much as I want them to. I know that Scott Lowe has also searched for ways on how to manage encrypted backups as well. The convoluted means by which you have to do this is infuriating. Today Synology announced a number of enhancements to their DSM 5.2 beta that I’m just chomping at the bit to try out that will hopefully put my personal paranoid fears to rest, once and for all. (Yeah, well, maybe not. But hopefully close!) Read more…
This is a recovery of a peer-reviewed article published in 1996 in the New Jersey Journal of Communication (now the Atlantic Journal of Communication).
Metz, J. M. (1996). Balancing act: The struggle between orality and linearity in computer mediated communication. The New Jersey Journal of Communication, 4, 61-70.000
You probably thought that the Internet was created to survive a nuclear attack. Nothing could be further from the truth. In fact, the true origins of the Internet had no military usage whatsoever.
How do I know? I talked to several people who actually created the Internet (well, it was called the ARPANET back then). I took the material from those conversations, as well as other primary and secondary historical sources, and prepared a chronological description of how the Internet (as we knew it in 1994) came into being. Granted, this is a predominantly US-centric historical account – much work was being done in England and France at the same time, but their influence was beyond the scope of the paper.
This history is incredibly valuable. For example, it’s important to note that in today’s debate about Net Neutrality and government intervention, the story of the Internet’s development is a key component that is overlooked. Many of the metaphors used in 2015 about what the “Internet is for” and “why it exists” are, quite simply, dead wrong. Having a better understanding of the history of the (arguably) most important technological development since the Gutenberg printing press can, and should, provide a solid foundation for that debate.
Note: This is a peer-reviewed academic paper presented to the American Historical Association in October, 1995. It is also text prepared for, but ultimately excised from, my doctoral dissertation. In an effort to preserve the text it has been reprinted here, but artifacts from the original digital file (which was heavily corrupted) may remain. Read more…
This is a paper that was peer-reviewed and presented to the annual Popular Culture Association conference, Las Vegas, NV, March 1996. Images and links, obviously, were not included in the original. Any strange artifacts in the text were a result from the rescue attempt to save the article from potential file corruption.
“Misunderstanding Cyberculture: Martin Rimm and the ‘Cyberporn’ Study.” (with Rod Carveth). Paper presented at the annual Popular Culture Association conference, Las Vegas, NV, March 1996. Read more…