Intelligence and Thuggery

Highly intelligent people often have problems in predicting the likely behavior of thugs.

In his 1982 book Rethinking Systems Analysis and Design–a work whose relevance is considerably broader than might be imagined from its title–Gerald Weinberg briefly discusses a contemporary book called How Real is Real?–An Anecdotal Introduction to Communications Theory. Although he finds value is many aspects of this book, Weinberg strongly objects to a passage in which the author (Paul Watzlawick) suggests ways in which communications theory could have been used in the Patty Hearst kidnapping case. Watzlawick suggests that the authorities should have used “Erickson’s confusion technique” as follows:

Utilizing the same channels of delivery as the abductors, it would have been relatively simple for them to deliver to the mass media fake messages, contradicting the real ones but similarly threatening the life of Patricia Hearst if they were not complied with…Very quickly a situation of total confusion could have been set up. None of the threats and demands could have been believed, because every message would have been contradicted or confused by another, allegedly coming from the ‘real’ abductor.

Weinberg responds:

It’s very difficult for me to believe that Watzlawick ever thought critically about this idea for fifteen seconds, but its naivete is typical for this genre of speculative systems writing.

…and goes on to suggest that a good way to consider the possible real-world consequences of ideas like this is to imagine a movie (specifically, a thriller) based on the situation and the proposed actions, and to imagine how the plot might develop.

Read more

A Blogger Asks A Question

Shannon’s post set me thinking about the odd & perhaps correct clock maker. And it took me back to 1983. We decided to computerize our typing service; my sister visited with the salesman (she ran the business while I had my middle child). As in so much, I think she made the correct choice: we both liked the TI models better but went with IBM, which appeared more flexible and accessible. We needed equipment that several part-time typists a day would work on, typists who came and went for a semester or two.

Read more

Conflicts of Interest

It looks as though Microsoft will require the installation of their new operating system, Vista (née Longhorn), in order to run the PC version of their hit video game, Halo II. Vista has already been delayed several times and is now scheduled for release in December 2006. No independent software maker would have written the game for an OS that doesn’t yet exist. Instead, Microsoft seems to be using their application software to drive sales of their operating system software. Don’t be surprised if you see the next MS Office release “optimized” for Vista, or backward compatibility problems between Vista and older versions of Office.

This also may help explain why Microsoft released part of its Windows source code to the EU in connection with a monopoly investigation. Call me paranoid, but I suspect that parts of that source code will become obsolete.

We saw similar issues with the Sony DRM/spyware/rootkit problems. Sony is both a content provider (music and movies, CDs and DVDs) and a hardware manufacturer. One of their hardware lines is the Sony Minidisk system. The proprietary encoding software that comes with the player includes a system for counting how many times a song has been “checked out” from your hard disk to a minidisk, with the maximum set at three (net of the times it has been “checked in” and removed from a minidisk). The original version of the software and player did not allow for MP3s; the current version will play them, but cripples some of the functions available on other players.

Sony’s spyware ploy was based on the realization that the market had left their minidisk player behind, so their preferred method of controlling the spread of copied content had failed. The minidisk hardware and software were both proprietary and not adopted by other companies, with the exception of some third-party minidisk manufacturing. They were in effect trying their Betamax strategy again, and it didn’t work this time, either. Earlier attempts to restrict copying had been evaded by disabling the copy-protect function resident on the disk. Sony’s solution was to alter the user’s application software to mimic the behavior of the minidisk player. And they would have gotten away with it, too, if it hadn’t been for those meddling kids.