What is the cloud?

The term “cloud” typically refers to cloud computing or cloud services. In the context of technology, the cloud refers to a network of remote servers that are hosted on the internet and used to store, manage, and process data. These servers are usually owned and maintained by a third-party provider, such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud.

Cloud computing allows users to access computing resources and services over the internet on-demand, without the need for local infrastructure or hardware. It provides a convenient way to store and access data, run applications, and perform various computational tasks without relying heavily on physical devices.

One of the key advantages of cloud computing is scalability. Users can easily scale up or scale down their computing resources based on their needs, without having to invest in expensive hardware upgrades or worry about infrastructure maintenance. The cloud also offers flexibility, as users can access their data and applications from any device with an internet connection.

Cloud services are typically offered in different models, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). These models provide varying levels of control and management over the underlying infrastructure, allowing users to choose the level of abstraction that best suits their requirements.

Overall, the cloud has revolutionized the way businesses and individuals store, access, and utilize data and computing resources, offering increased efficiency, cost-effectiveness, and flexibility compared to traditional on-premises solutions.

(Ed: written by ChatGPT; verified by jrivett.)

Microsoft’s empty promises

I was just talking about a recent announcement from Microsoft, in which they assured the general public that their days of messing around with user settings and defaults on Windows were behind them.

In that post, Microsoft claimed that they are “reaffirming our long-standing approach to put people in control of their Windows PC experience”. Which I called out as baloney, since Microsoft has a long history of reverting user settings and defaults when it suits Microsoft.

That was on March 18. Yesterday, a mere six weeks later, The Verge reported that “Microsoft is forcing Outlook and Teams to open links in Edge”.

So this is Microsoft once again changing the way Windows works, to favour their own applications. I’m sure there are workarounds, but I’d be willing to bet that these workarounds will need to be reapplied after Windows updates.

Look, I understand that once a corporation gets to a certain size, it can be very difficult for one hand to know what the other is doing. But as I pointed out in my earlier post, Microsoft has engaged in these problematic behaviours for years. For them to a) claim that they’re innocent; b) “reaffirm their approach”; then c) keep right on doing this stuff… is incredibly annoying.

UPDATE: And the shenanigans continue. As of August 2023, Microsoft is showing annoying popups in Windows 11, urging users to switch to Bing for search. These things are appearing on top of games, presentations, and in other extremely inconvenient contexts. Come on, Microsoft, this is some serious bullshit.

UPDATE 2023Sep11: Ctrl.blog has additional details. It looks like Microsoft’s recent announcements about improving Windows’ behaviour were complete bullshit.

What is a database?

A database is an organized collection of data that is stored and managed in a structured manner. It is designed to efficiently store, retrieve, and manage large amounts of data. A database management system (DBMS) is a software application that enables users to create, manipulate, and access databases.

Databases are used in a variety of applications such as banking systems, e-commerce websites, healthcare systems, social media platforms, and many more. They are essential for managing and organizing data, which helps businesses and organizations make informed decisions based on the insights derived from the data.

Databases can be classified based on the type of data they store, the number of users accessing the data, the structure of the data, and the mode of access. The most common types of databases include relational databases, NoSQL databases, hierarchical databases, and object-oriented databases.

(Ed: written by ChatGPT; verified by jrivett.)

What are cookies?

Cookies are small pieces of data that are stored on a user’s computer or device by a website. They are used to remember user preferences and activities on a website, such as login information, shopping cart contents, or language preferences. Cookies are also used for tracking user behavior and providing personalized experiences, such as targeted advertisements or product recommendations.

There are two types of cookies: session cookies and persistent cookies. Session cookies are temporary and are deleted when the user closes their browser. Persistent cookies, on the other hand, are stored on the user’s device for a longer period of time, and can be used to track user behavior across multiple sessions.

While cookies are generally harmless, they have raised privacy concerns, as they can be used to collect personal information about users without their knowledge or consent. As a result, many websites now provide options for users to opt-out of cookie tracking or to limit the amount of data that is collected through cookies.

(Ed: written by ChatGPT; verified by jrivett.)

What is a web browser?

A web browser, also known as an Internet browser, is a software application that allows users to access and view web sites on the internet. Web browsers are used to navigate the Internet, view web pages, and interact with web-based applications. Examples of popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge, Safari, and Opera. Web browsers use protocols like HTTP, HTTPS, and FTP to request web pages from servers, render the content of those pages, and display them to the user.

(Ed: written by ChatGPT; verified by jrivett.)

What is cryptocurrency?

(Ed: before cryptocurrency showed up, the abbreviation ‘crypto’ usually referred to cryptography. Now it’s almost always used to refer to cryptocurrency.)

Cryptocurrency is a digital or virtual currency that uses cryptography for security and operates independently of a central bank. Cryptocurrencies use a decentralized network of computers to maintain and verify transactions, which are recorded on a public ledger called a blockchain.

Unlike traditional currencies, which are backed by governments or other centralized authorities, cryptocurrencies are not issued or regulated by any single entity. Instead, they rely on complex mathematical algorithms and protocols to create new units and verify transactions.

The most well-known cryptocurrency is Bitcoin, which was created in 2009. Since then, thousands of other cryptocurrencies have been developed, each with its own unique features and use cases.

Cryptocurrencies are often used for online purchases, investments, and as a store of value. They have gained popularity due to their ability to operate independently of government or financial institutions, and their potential for anonymity and privacy. However, cryptocurrencies are also subject to volatility and regulatory uncertainty, which can make them a risky investment.

(Ed: written by ChatGPT; verified by jrivett.)

What is cryptography?

(Ed: before cryptocurrency showed up, the abbreviation ‘crypto’ usually referred to cryptography. Now it’s almost always used to refer to cryptocurrency.)

Cryptography is the practice of securing information by transforming it into a form that is unintelligible to anyone who does not have the proper key or password to decode it. It involves techniques for encrypting and decrypting data to protect it from unauthorized access or modification.

Cryptography has been used throughout history to protect sensitive information such as military secrets, diplomatic messages, and financial transactions. It is now widely used in computer networks to ensure the security of data transmitted over the Internet, such as passwords, credit card numbers, and other confidential information.

Modern cryptography relies on algorithms and protocols that are designed to be mathematically secure and resistant to attacks by hackers or other malicious actors. Common cryptographic techniques include symmetric-key encryption, public-key encryption, digital signatures, and hash functions.

(Ed: written by ChatGPT; verified by jrivett.)

Microsoft frames long-overdue Windows changes as ‘reaffirming our long-standing approach’

Here are the first two paragraphs of a recent post on the Windows blog:

“Today we’re reaffirming our long-standing approach to put people in control of their Windows PC experience and to empower developers to take advantage of our open platform.

We want to ensure that people are in control of what gets pinned to their Desktop, their Start menu and their Taskbar as well as to be able to control their default applications such as their default browser through consistent, clear and trustworthy Windows provided system dialogs and settings.”

These changes are very welcome, and appear to resolve some particularly annoying Windows behaviours that users have been complaining about for decades.

But for Microsoft to frame these much-needed fixes as “we’ve always done this, and now we’re just making sure” is rather amusing. Come on guys, admitting mistakes is healthy. Are you saying these issues are new? Because they’re not. Are you saying you were unaware of these issues? I doubt that very much, because people have been complaining about them for years. No, this is just Microsoft public relations attempting to revise history.

What Microsoft is conveniently leaving out is that the worst offenses of this kind (reverting user settings, pinning and unpinning shortcuts, changing default applications, etc.) have always been committed by Microsoft. For example, Windows Update had a very annoying tendency to revert the default web browser to Internet Explorer.

Microsoft has of course run into legal trouble for some of these behaviours. It seems clear that reverting a user’s default web browser to a Microsoft browser in the process of updating the operating system is unfair to competitors. And Microsoft has been forced to stop doing some of those things.

Anyway, here’s hoping that Microsoft truly is committed, now, to avoiding such devious — and incredibly annoying — practices.

What is a VPN?

VPN stands for Virtual Private Network. It is a technology that creates a secure and encrypted connection between two points on the internet. This connection is established by using VPN client software on a device that connects to a VPN server, typically located in a different geographic location.

When a user connects to a VPN server, the user’s device becomes part of the private network established by the VPN server. This allows the user to access the internet as if they were physically located in the same location as the VPN server.

The primary benefit of using a VPN is that it provides a secure and private connection, which is especially important when accessing sensitive information, such as financial data or personal information, over public Wi-Fi networks or when accessing geo-restricted content. It also helps to protect against hackers, identity theft, and other online threats by masking the user’s IP address and encrypting their internet traffic.

(Ed: written by ChatGPT; verified by jrivett.)

What is a worm?

In computing, a worm is a type of malicious software (malware) that replicates itself and spreads to other computers or networks without the need for human interaction. Unlike viruses, worms do not require a host program to attach themselves to, and can propagate independently through computer networks, usually by exploiting vulnerabilities in operating systems or other software.

Once a worm infects a computer, it can perform various malicious actions, such as stealing sensitive data, sending spam emails, launching distributed denial-of-service (DDoS) attacks, or installing additional malware. Worms can also consume a large amount of network bandwidth, causing network slowdowns or outages.

To protect against worms, it’s important to keep software up-to-date with the latest security patches, use antivirus software, and avoid downloading or opening suspicious attachments or links in emails.

(Ed: written by ChatGPT; verified by jrivett.)

Rants and musings on topics of interest. Sometimes about Windows, Linux, security and cool software.