why home computing is a mess
DESCRIPTION
A home computer is by far the most complex item that an average consumer is likely to own. Unfortunately, many of the possible uses of the standard home computer require a level of technical understanding that the average user does not have. Also a computer requires a level of routine maintenance that is more than many people can or will deal with. Security problems abound and require a vigilance that many do not exercise. Also, the economic interests of the computer industry often do not coincide with the best interests of the consumer.TRANSCRIPT
Why Home Computing is a Why Home Computing is a MessMess
Vic LaurieVic Laurie
Background of the ProblemsBackground of the Problems
Home computing has changed radicallyHome computing has changed radically First home users were not involved with the First home users were not involved with the
InternetInternet Users were interested in technology and willing to Users were interested in technology and willing to
learn something about how computers worklearn something about how computers work Home computers were concentrated in USHome computers were concentrated in US
World Wide Web is now a major force World Wide Web is now a major force in global societyin global society Going on the Internet is the major reason for Going on the Internet is the major reason for
owning a home computerowning a home computer
Who Uses ComputersWho Uses Computers
Nature of the people using computers Nature of the people using computers has changed but computing paradigm has changed but computing paradigm has nothas not Oriented to desktop applications for Oriented to desktop applications for
technically savvy userstechnically savvy users Hundreds of millions of new usersHundreds of millions of new users
75% of adult Americans online75% of adult Americans online Over 200 million in China aloneOver 200 million in China alone
ChildrenChildren
The ProblemsThe Problems
Computers are too complicatedComputers are too complicated Users are untrainedUsers are untrained Security is a major and worldwide Security is a major and worldwide
problemproblem The interests of the computing The interests of the computing
industry are counter to the those of industry are counter to the those of the consumerthe consumer
A Quote about ComplexityA Quote about Complexity
Walter MossbergWalter Mossberg ““There’s no other major item most of us There’s no other major item most of us
own that is as confusing, unpredictable own that is as confusing, unpredictable and unreliable as our personal and unreliable as our personal computers. “computers. “
Why Computers Are Too Hard Why Computers Are Too Hard to Useto Use
The model of one size fits all is not The model of one size fits all is not best suited for consumer needsbest suited for consumer needs Dozens of different functionsDozens of different functions Computer, hi-fi, TV, gamebox, Computer, hi-fi, TV, gamebox,
telecommunications center telecommunications center Microsoft’s integration of everything into Microsoft’s integration of everything into
WindowsWindows Complexity, insecurity, and expenseComplexity, insecurity, and expense
Design by geeksDesign by geeks Consider Vista UACConsider Vista UAC
Why Computers Are Too Hard Why Computers Are Too Hard to Use (continued)to Use (continued)
Mismatch with needs of average PC usersMismatch with needs of average PC users Untrained users who want an appliance with a few Untrained users who want an appliance with a few
functionsfunctions Computer comes with no manual, few instructionsComputer comes with no manual, few instructions Basic PC setup derives from 1980’s and was Basic PC setup derives from 1980’s and was
never intended for mass consumptionnever intended for mass consumption Too much maintenance is requiredToo much maintenance is required
If help is needed, users can’t even describe If help is needed, users can’t even describe problemproblem
““Featuritis”Featuritis” Constant addition of more features to hardware Constant addition of more features to hardware
and softwareand software
Industry Misunderstands or Industry Misunderstands or Ignores Consumer NeedsIgnores Consumer Needs
Hundreds of millions of users with no Hundreds of millions of users with no technical backgroundtechnical background
Microsoft is oriented to businesses Microsoft is oriented to businesses and OEMsand OEMs The “Bob” effect?The “Bob” effect?
Computer industry does not Computer industry does not understand or ignores the mindset of understand or ignores the mindset of the non-technical massesthe non-technical masses
Mindset of Average Mindset of Average ConsumerConsumer
No interest in having to learn details of No interest in having to learn details of how a computer workshow a computer works
Do not do simplest maintenanceDo not do simplest maintenance Inability to deal with even simplest Inability to deal with even simplest
computer problemcomputer problem Unrealistic to expect anything differentUnrealistic to expect anything different Industry needs to recognize the realitiesIndustry needs to recognize the realities
Quote from Security Expert Quote from Security Expert (copying Robert Heinlein)(copying Robert Heinlein)
The following does not apply to The following does not apply to anyone in the audience but has some anyone in the audience but has some truth:truth: ““Trying to teach a typical user how to Trying to teach a typical user how to
operate their computer properly is like operate their computer properly is like trying to teach a pig to sing.”trying to teach a pig to sing.”
““It wastes your time and annoys the It wastes your time and annoys the pig.” pig.”
We are all affectedWe are all affected
Knowledgeable users cannot ignore Knowledgeable users cannot ignore the problems that others havethe problems that others have
The Internet is like a giant single The Internet is like a giant single organism with low resistance to organism with low resistance to diseasedisease
Infections spread everywhereInfections spread everywhere Example of spam and email wormsExample of spam and email worms
BotnetsBotnets Your name on pornYour name on porn
Security ProblemsSecurity Problems
Organized international gangsOrganized international gangs Internet crime has little risk for the Internet crime has little risk for the
criminalcriminal The average PC user is a sitting duck for The average PC user is a sitting duck for
cyber-criminalscyber-criminals
Sophisticated techniquesSophisticated techniques Botnets and zombie PCsBotnets and zombie PCs
System DeficienciesSystem Deficiencies
Malware defenses are inadequate Malware defenses are inadequate and too complicatedand too complicated
Until Windows XP SP2 and Vista, Until Windows XP SP2 and Vista, Windows was a sieveWindows was a sieve Windows ActiveXWindows ActiveX
Poor security at businessesPoor security at businesses
Security QuoteSecurity Quote
Roger GrimesRoger Grimes ““I don’t see any paradigm shifts. I don’t see any paradigm shifts.
Computer security vendors aren’t likely Computer security vendors aren’t likely to make you significantly safer, and to make you significantly safer, and what the criminals are already doing is what the criminals are already doing is working quite well for them, so there’s working quite well for them, so there’s no need for them to shift tactics.”no need for them to shift tactics.”
Ever-Growing MalwareEver-Growing Malware
In the 25 years through 2007, In the 25 years through 2007, Symantec detected 1.1 million Symantec detected 1.1 million distinct threatsdistinct threats
The year 2007 provided 711,912 of The year 2007 provided 711,912 of thesethese
Anti-virus software has to write a Anti-virus software has to write a new signature for every onenew signature for every one
Malware EverywhereMalware Everywhere
Google search results infectedGoogle search results infected Normally trustworthy sites infectedNormally trustworthy sites infected
Trend Micro, Trend Micro, USA TodayUSA Today, social portals, social portals Banner ads on legitimate sitesBanner ads on legitimate sites
DNS tricksDNS tricks
More Security ProblemsMore Security Problems
Constant need to apply security patchesConstant need to apply security patches Many different software programs are constantly found Many different software programs are constantly found
to have security holesto have security holes Secunia estimates that over half of systems lack Secunia estimates that over half of systems lack
updatesupdates Average user cannot keep upAverage user cannot keep up
Failure of reactive methods of defenseFailure of reactive methods of defense Program databases always lag the latest exploitsProgram databases always lag the latest exploits Users often have outdated anti-malwareUsers often have outdated anti-malware
Industry has no liability for faulty securityIndustry has no liability for faulty security Software firms often take months to patch known Software firms often take months to patch known
problemsproblems
How to check if all your apps How to check if all your apps are patchedare patched
Secunia Personal Software InspectorSecunia Personal Software Inspector https://psi.secunia.com/
Adobe PDF reader, QuickTime, Adobe Adobe PDF reader, QuickTime, Adobe Flash, Java, RealPlayer, Microsoft Flash, Java, RealPlayer, Microsoft WorksWorks
Consumer Interests Are Not a Consumer Interests Are Not a High Priority High Priority
Quote from security expert Bruce Quote from security expert Bruce SchneierSchneier "The technology industry is driven by "The technology industry is driven by
demand for features, for options, for demand for features, for options, for speed. There are no standards for speed. There are no standards for quality or security, and there is no quality or security, and there is no liability for insecure software. Hence, liability for insecure software. Hence, there is no economic incentive to create there is no economic incentive to create high quality." high quality."
Marketing and Consumer Marketing and Consumer Interests are at OddsInterests are at Odds
Computers are sold not boughtComputers are sold not bought Consumers have insufficient Consumers have insufficient
knowledge to make informed choicesknowledge to make informed choices Marketing is the overwhelming factor Marketing is the overwhelming factor
and overcomes consumer and overcomes consumer discretionary choicediscretionary choice
Microsoft monopoly limits Microsoft monopoly limits choiceschoices
Almost the entire Almost the entire ecosystem depends ecosystem depends on Microsofton Microsoft
Market grip so tight Market grip so tight that over 140 M that over 140 M copies of Vista have copies of Vista have been sold in spite of been sold in spite of its unpopularityits unpopularity
Desktop OS market shareas of January, 2008
Windows - 91.46%
Mac - 7.57%
Linux - 0.67%
Industry vs. ConsumerIndustry vs. Consumer
Manufacturers and vendors have no Manufacturers and vendors have no economic incentive for simple, economic incentive for simple, inexpensive systemsinexpensive systems
Digital Rights Management (DRM)Digital Rights Management (DRM) WGAWGA Software licensingSoftware licensing Enforced obsolescenceEnforced obsolescence
Software Feature BloatSoftware Feature Bloat
In order to keep selling, more and In order to keep selling, more and more features addedmore features added
Programs get more and more Programs get more and more complicatedcomplicated Often become unstable or buggyOften become unstable or buggy
Demand bigger and bigger computersDemand bigger and bigger computers Windows 98SE needed about 32 MB RAM, Vista Windows 98SE needed about 32 MB RAM, Vista
requires 1000 MBrequires 1000 MB or more or more
Recommended System Requirements
SolutionsSolutions
Inexpensive Internet boxes powered Inexpensive Internet boxes powered by Linuxby Linux
Macs at the higher price endMacs at the higher price end Open source softwareOpen source software Computer literacy in schoolsComputer literacy in schools Stricter laws governing industry Stricter laws governing industry
responsibilityresponsibility
Improved Approaches to Improved Approaches to SecuritySecurity
SandboxingSandboxing Intrusion detectionIntrusion detection Whitelisting programsWhitelisting programs Virtual machinesVirtual machines Rollback softwareRollback software Applications on USB sticksApplications on USB sticks
Change in the Computing Change in the Computing Paradigm?Paradigm?
Modular PCsModular PCs Basic kernel plus individual packages for Basic kernel plus individual packages for
different functionsdifferent functions Applications on the Web, “Web 2.0”Applications on the Web, “Web 2.0”
The browser becomes the platformThe browser becomes the platform Hardware virtualization- hypervisorsHardware virtualization- hypervisors Mobile platformsMobile platforms
Small units dedicated to particular applicationsSmall units dedicated to particular applications Example of iPhoneExample of iPhone Mini-computersMini-computers
Let’s Help OthersLet’s Help Others
Advise people to keep things simpleAdvise people to keep things simple Few average users need a high-end machineFew average users need a high-end machine Keep software simple- open sourceKeep software simple- open source
Encourage alternatives to WindowsEncourage alternatives to Windows Encourage computer educationEncourage computer education Support programs for developing nationsSupport programs for developing nations
OLPC OLPC
THE END