Vol. 5 No. 7

February, 2006


iToon on 39 cents

iPod, Therefore iAm

iToon on Holiday Pods


iToon on Mr. Ed Pitch


iToon on Modern Intellectualism

The Meaningless Network

iToon on Computer Blowout presents

(New logo t-shirt on sale now)

Have No Fear the internet is Here

Don't forget to check out the







Therefore, iAm

When an old school blue jean manufacturer now includes a special pocket in its product, you know that the iPod has gone mainstream in a big way.


Therefore, iAm





The software upgrade came on disc. Some of the older iMacs would not recognize the CD. Then it determined that the OS update came on a DVD and many of the older machines only had a CD-R. It appeared that one needed to have the disc on the machine drive in order to install.

Time to learn something new.

Connect a laptop with a DVD drive to the computer to be updated. Insert the upgrade OS DVD. Restart by holding down the T key. This turns the laptop into a Borg assimilation ship. The above icon begins to roam around the laptop screen. Then you restart the destination machine by holding down the ALT key and now the assimilation is complete. It is called Target Disk Mode. It gives an accessory drive the ability to become the start-up installer. The installation software appears on the iMac, and you click your way to an easy installation. It is like a stupid human trick, but it was a cool solution to a possible vexing situation. With automatic software updating features built in to most OS menus, the possibility of skipping a few updates is remote. Unless it is upgrading to a new (i.e. major) upgrade that the manufacturer wants new cash for each install.

So the Borg laptop went from work station to work station installing the new operating system discs. On only one occasion did the install disc stall and fail to complete its mission. (Just like a Star Trek cliffhanger episode.) Watching the Y-logo move slowly around the laptop screen had an erie quality; leaving the software to do all the work in secret. The installation was completed and the new system was installed with only one freeze incident on one desktop out of five.


Word on the street is that GOOGLE is going to take over the world. It is just a matter of when.

The first evil empire in the new technology era was Microsoft. Bill Gates was going to control every aspect of the computer world through the mandatory use of his Windows operating system. It made him a multi-billionaire. Multiple generations of desktop business systems were trapped in the Windows world as it became the default standard.

The Internet has changed the landscape of business. Now the browser is replacing the individual operating system as the next standard. Alternatives to Microsoft's dominance have been slowly creeping into the picture. Enterprise software solutions are on par with the next Internet strategy.

The simple task of searching the Internet spawned two major companies, Yahoo and Google. The search engine is the Swiss Army knife for web surfers. It is a basic tool. Everyone knows how to use it. By habit, it is simple transparent exercise. The revenue side of the search engine company has always been advertising. The new form of ad circulation, the click view. But in order to meet the unrealistic Wall Street growth projections, search companies had to continue to squeeze the business model to increase revenue streams.

Google was on the leading edge of creating new ways to increase revenue in the simple search engine universe. It offered pay search databases targeting specialized business groups. It offered to sell companies prime listings for search engine result pages. The hope was more page views for web publishers, to increase traffic ad revenues. Now, it is offering affiliate advertising, placing its advertisers on individual web pages with revenue sharing.

Google is portrayed as the poster child for the next evil empire. Googlization will be a negative word. Competitors will curse its market power and hordes of cash to make acquisitions or put its stamp on everything. Google is now rumored to use its billions in market capital to acquire content providers, scan search every publication printed, produce cheap alternative computer systems, and push everything net-worthy through its portals. Gmail was to corral email through its pages. But all the expansion themes still deal with the core of its business: trying to get more eyes on their advertising links. Google is still pushing its advertising on us, under different guises. It is trying to standardize net advertising under its global banner.

Googlization. It's all still just about advertising.

When the broadcasting industry started, only advertising would support its programming. Television and radio is advertising driven business enterprises. If you have a popular show, the network will receive higher advertising dollars which are tied to number of viewers. If you have a popular show, you will be rewarded. The same is true in the New Media. If you have a popular web site or web utility (like a search engine), you will be rewarded. The only currency is viewers; the only open issue is how to count them so advertisers can correlate Internet ad expenses with customer sales.

Google began making money from “finding” designated web content through keywords and sorting software parameters. It moved into “controlling” search results by paid search rankings, paid banner ads on search pages, sponsored links, and affiliated click ads. It has begun to reach beyond its own page development to “taking ownership” over content by attempting to scan all books into a searchable database to the horror of copyright owners who have the exclusive right to authorize copies or views of their work (for a royalty).

Google needs to expand its revenue growth in order to keep its sky-high stock price in the outer atmosphere. Microsoft had the same huge growth margins during the last tech boom. Microsoft's stock created a huge cash cow for the leading operating system software firm. The company staked everything on the continued growth of Windows as the standard operating system for computers and next generation computer like devices, like cell phones, PDAs, ect. With billions in retained earnings, and the OS license revenue at a plateau, Microsoft attempted to leverage more growth by buying, taking or throwing cash at new ventures outside its core competency: hardware, game box developer, Internet browser king. But the marketplace placed road blocks against such expansion, either in quality or monopoly issues. The company was always behind the cutting edge independent developers to take away fickle end users. So Microsoft has had its stock turn into a tech utility, a narrow trading range and consistent business news. If Google throws its billions in markets beyond the search engine venue, it may wind up on the same plain vanilla shelf as Microsoft.



The Sultanate of Clintonia-Rogstaden

The global on-line gaming experience has quietly exploded into a a bandwidth python of multi-hour, multi-kingdom game spheres. Whether it is the team combat arena, or the total simulated fantasy genre, more and more men and women are using their free time to escape to a virtual world. As a result of our tech guru's prodding suggestion, has created Sultanate of Clintonia-Rogstaden. Readers will have a running update of the status of this virtual country; you can peek at the real game pages, or get the backstories outside the game's program. For example, check out the images of the national currency. There will be inside jokes, satire, humor and pulse of a real bizarre country. New features will be added on a regular basis. So check out the cyber-soap opera of nation building here at




The Meaningless Network

The office has an extremely stable Macintosh ethernet network. All the work stations have a hard wired networked computer. So the end of the year capital equipment purchasing was thin. So it was suggested to purchase an airport base station. The original premise was that if a person with a laptop with a Wi-Fi card (Apple's Airport for example), then that person could wander around the two floors of the office and be connected to the network. In a small office, it really does not make that much sense because all the desks one would park a laptop already has a networked computer. If the original premises was that if a client came into the office with a laptop, some file sharing could be done. But that possibility happens . . . next to never. The electronic transfer of pdf files usually happens via email attachments. This irrational purchasing decision occurred to us halfway through the installation of the wireless office network.

After plugging the base station into an ethernet port, and loading the configuration software, more questions about the wireless option came to the forefront. Pulling down the radar icon on the top menu bar showed that there were four other wireless networks streaming around the neighborhood. This was concern number one . . . security. There are wi-fi hijackers looking for a free Internet connection. That is why we had kept the airport carded computers wi-fi configuration off. So the first priority was to set up a secured wireless administration firewall. It was a simple procedure to get the administration set up program, but with the current Mac OS, it runs best with an auto IP addressing to each network node. So after tinkering with the IP option screen, we got the configuration set up. Unplugging a desktop and a laptop, it was time to test the wireless connection. The connection to the other computers was painfully slow. Then there was no DSL-internet connection. So it was back to square one. Reconfigure, then go back to original set-up. Some success. The laptop could connect wirelessly to the net. But then it could not read the other network hard drives. It took forever for the network browser to recognize all the stations. About an hour later, it seemed that the system was set up properly.

Then I asked a simple question. As an administrator, I'd like to know who was actually connected to the office wi-fi. In the regular configuration, you could check the network browser and find all the computer stations named in a window. But with this airport network, there was no identification. The only monitor that showed up was the signal activity or signal strength. No, that cannot be right. One of the basic tools a network administrator needs to have is the ability to see who is on his network. Common sense. To the web to find the answer. Under Apple's network administrative tools, there was supposed to be a client monitor. But it was not the answer. It was nearware; a signal monitor cloyed as something else. It was late so the chase for the final answer was left for another day, or possibility a third party answer. That is troubling that with the need for wi-fi security being paramount for all business enterprises, such a simple tool should have been front and center in the basic installation package.

But it could be a moot point anyway. The hard wire network runs fast without problems. The need to use a wi-fi network is non-existent at the moment. It is the meaningless network. If the router would crash, then a wi-fi system could be called a redundant back-up plan like the phone wire connected to one computer's modem port when the DSL fails. Redundant; insurance?





Your Interest keeps this Site moving forward. Thank you!


cyberbarf eStore

Webmaster Contact


Distribution ©2001-2006, inc.

All Rights Reserved Worldwide.


Wasted Time for Wasted Lives™