Monday, January 7, 2013

Quantum Computing Primer - Understanding Bits and Bytes

I've been some reading on the next true evolution of computers, that being quantum computing.  In the current digital world all of the data, all of the application, everything we do with computers can be broken down in it's simplest at the "bit" level - that a bit being a two state "switch" that is either on or off.

Before I can continue to write about quantum computing and what it's implications and impact may be on our technology and lives, it is important to understand how computers work and store data now.  This will be the first in a series of articles which attempts to explain the fundamentals.  For many of you, these articles may not be as relevant as you already understand these fundamentals..


The bit - and the inherent on/off - is a fundamental tenet of our technology.  Each character that we type or read is comprised of 8 bits and it's referred to a more familiar term - the byte (and it's distant relations, megabytes and gigabytes - millions and billions of bytes respectively.  A byte is made of 8 bits, each of which is either on or off which gives us a possibility of up to 256 different combinations of the 8 bits within a given byte which can be demonstrated as below (with 0 representing a bit being off and 1 with the bit being on).




Bit #        0  1  2  3  4  5  6  7
Bit Value  128 64 32 16  8  4  2  1  Byte Value
             0  0  0  0  0  0  0  0  0
             0  0  0  0  0  0  0  1  1
             0  0  0  0  0  0  1  0  2
             0  0  0  0  0  0  1  1  3 (2 + 1)
             0  0  0  0  0  1  0  0  4 
             0  0  0  0  0  1  0  1  5 (4 + 1)
repeating the pattern up to the state where all bits are turned on as follows:
             1  1  1  1  1  1  1  1  255 (128+64+32+16+8+4+2+1) 

Each character that we see on the screen is one byte and each letter of the alphabet is assigned one particular byte value.  When we see the word "cat" on screen, it is represented by bytes with the following three values 99 (c), 97 (a) and 116 (t).  If you were able to look so see physically how it is stored at the bit level, it would look something like this.

Bit Value  128 64 32 16  8  4  2  1  Byte Value
c  (#99)                   0       1     1      0      0     0     1      1     64 + 32 + 2 + 1 = 99

a  (#97)                   0       1     1      0      0     0     0      1     64 + 32 + 1  = 97
t  (#116)                  0       1     1      1      1     1     0      0     64 + 32 + 16 + 8 + 4 = 116


Thursday, January 3, 2013

A Freeware Alternative to Microsoft Office

One of the most common applications used in business and at home are one of the various configurations of the Microsoft Office Suite. I’m a big fan of Microsoft Office and I’ve used it for many years. However, what I’m not a fan of is the cost of it, especially when a new PC is purchased.

I’ve recently looked into an alternative to Microsoft Office that is free to use. Free, totally. Not a limited time offer, nor a crippled version of the software. OpenOffice (www.openoffice.org) has been around for many years and it’s only in the past few months that I’ve installed it and used it to see if I can avoid purchasing another Microsoft Office license.

My first reaction is that of frustration as the interface isn’t the same, nor are menu options grouped the same. Where I am so comfortable with knowing exactly where to find an item in Microsoft Office, I struggle and vent (and sometimes swear!) when I can’t figure out how to do the same function in Open Office. That having been said, I’m learning gradually and my frustration is somewhat reduced.

I would expect that there are some features and advanced functionality that is in Microsoft Office that perhaps isn’t available in Open Office, but to date, I’ve managed to muddle my way around and eventually have figured out how it’s done with Open Office.

Electronic Tollbooths and the Myth of the Free Ride

The plethora of websites that provide services out there is an incredible resource for all of us, and there’s no question that many of them enrich our lives – or at the very least, allow us to establish and enrich connections with friends and family.

What is important to consider though is that the vast majority of them are not in business for altruistic reasons. Websites cost money to build, host, support and enhance. Not all websites are developed for monetary gain but it should be assumed that it is not offering their services and resources out of the goodness of their hearts.

Why does this matter?

It matters because this makes us an educated consumer and by understanding this principle, we can decide if we want to agree with the terms of service of the website and use whatever “currency” is required to avail ourselves of the service.

I have made mention of this in a previous article, but there are many websites that when you sign-up, you are giving them the rights to use your uploaded content as they desire. In this case, your consent to share your content is the currency.

In other cases, the website provides basic functionality for free in the hopes that you become dependent on the website and services at which point in time, you may decide to become a paid subscriber in order to receive additional functionality.

Sometimes, your list of contacts can also be a valuable resource to a third party. Many applications such as Linked In (in addition to some other sites such as dating sites) will present a screen when you sign up that offers to invite your friends. By providing your email address and password, you are giving explicit consent for the website to mine your address book which allows them to grow their potential subscribers exponentially. This is fine if that is what you wanted to do, but many times it’s not clear that’s what will be involved with the sign-up process.

In other cases, the currency is your personal profile and your web surfing habits. Advertisements can be specifically directed to you based on your surfing history. As an example, late last year, I was researching digital picture frames from Staples. Within an hour of looking at specific products on their website, I was on a different website and noticed that the ads being delivered were from Staples and that the products displayed was the same ones that I had been viewing.

This last type of currency to me is the most dangerous and nefarious. We’re not necessarily aware of how we are tracked, and how the information is used – or possibly sold to third parties. This may seem like it’s not a big deal, but many times the marketing data that is gleaned isn’t anonymous – it could be – and probably is – stored in a database. Since many of us use the same user ids for websites, it wouldn’t be that difficult for an organization to start putting together a profile of what products you like, where you shop, and how much money you make and where you bank. In any of these cases, there’s nothing wrong with trading off your “currency” to access their site and services but as long as you’re aware of how you fit into the revenue stream and you’re making a conscious decision to do so, then that’s all part of being an educated consumer.