Categories

Donate

Advert

Unique Names

Prior to wide-spread use of the Internet it was reasonable to expect that if you had a family name that was not really common and a given name that was also not really common then you might never meet someone else with the same combination of first and last names as yourself. I have never met anyone else named Russell Coker because Coker is not a really common family name and it seems that Russell was not overly common in the last 4+ decades. If you had a family name such as Smith, Ng, or Ali then the chance of having someone else with the same given name would be significant as those family names are so incredibly popular.

Even with names that are not known to be extremely popular name clashes happen, for example my sister is named Helen Coker, it doesn’t seem likely to be an overly common combination however there was another Helen Coker at the same high-school.

On the Internet however things are different. About 10 years ago I received an email from someone named Russell Coker who just wanted to say hello after having searched for his own name and found information on me. Shortly after that I found a third Russell Coker on the net (who didn’t respond to my email). It seems likely that even in the early days of the net I didn’t find everyone named Russell Coker, and it also seems quite likely that the number of Russell Coker’s on the net has increased significantly over the last 10 years. There could be dozens of Russell Coker’s although if they are using “Russell Coker” as their name on the net then I am unlikely to find them as it’s most likely that I’m the only Russell Coker to have the same email address and web site for 10 years – so my net presence probably squashes everyone else who uses that as their entire name.

A quick google search for “Russell J Coker” (John is my middle name) found one other person using that name, I also found a Russell D Coker, a Russell M Coker, a Russell N Coker, and two Russell R Coker’s (one of whom died in 2002).

It seems that if you don’t have a family name that is rarely used (EG Torvalds which was created recently) or a made-up first-name (which seems to be a popular trend nowadays) then you are going to encounter other people with the same name as you. Using an initial will significantly reduce the incidence of this, in my case if I used my middle initial then I would remove four out of five of the other living Russell Coker’s that are found by Google.

But as is the case with me it seems that many (most?) people will have name collisions no matter what they do.

As an attempt to increase my control over my name I have registered the domain RussellCoker.com. Not sure if it will do any good but it’s cheap enough and it’s worth a try.

Mobile Phone Safety

Safety Benefits of Mobile Phones

The benefits of being able to call emergency services from any location are obvious. It’s also a benefit for children to be able to call their parents at any time and without the need for change.

The ability to send videos and pictures that is included in all recent mobile phones is also a potential safety benefit. Children can send their parents pictures of the people they associate with which will deter such people from doing anything bad.

Problems With Current Mobile Phones

There has been a lot of publicity in recent times about the risks of children communicating with pedophiles over the Internet. I believe that the risks in this regard are minimal, children merely need to be supervised while using the net. I think it’s a much bigger problem is that anyone (including pedophiles) can call a child on their mobile phone, and in the case of modern phones they can exchange pictures and movies with the child! There have been many documented cases of this technology being used by teenagers to film gang violence and I believe that the incidence of teenagers making their own pornography (including videos of sexual assault) will only increase (I first wrote this document about four months before such a sexual assault was filmed and sold on DVD in Melbourne [1]).

Another significant problem is the theft of phones (which often takes the form of violent crime). For their own safety children should not be permitted to carry expensive items that can be sold easily!

Solutions to these Problems

Many of these problems can be greatly alleviated with current technology. Firstly transfer of video and pictures needs to be restricted, current phones already have configuration options to restrict which numbers may call the phone. What is needed is to have separate lists of numbers permitted to call the phone and to be called by the phone that are also separated by the type of call (voice call, video call, SMS, and video/picture SMS). A typical configuration for young children might only permit communication with relatives and emergency services. A typical configuration for older children might permit voice and text SMS communication with anyone but only permit video and picture communication with relatives and emergency services. These measures would greatly reduce the ability of pedophiles to communicate with children, and also prevent teenagers from distributing pornography and fight club movies.

Another necessary feature is the ability to restrict access to the Internet and 3G content. This has been requested by many adult customers to prevent accidentally incurring large bills. However phone companies have been refusing to do this, legislation will be required.

Such restrictions of phone use would also significantly reduce the incidence of phone theft. A phone that can only be used to call the parents of it’s owner is useless to a thief!

New Features

A new feature that is badly needed is the ability to make video calls to emergency services. In a medical emergency call a lot of time is spent describing the situation and that time could be saved if pictures were available. In the case of a crime in progress a criminal would be deterred if they knew that their picture was being sent directly to the police and stored for use as evidence at their trial.
It would require some moderately expensive new equipment to support emergency video calls and require some training of the people who receive the calls, but I am certain that the benefits outweigh the costs.

Every mobile phone has a unique ID number that it sends to the phone company when it registers. It would be easy for each phone company to keep a database of the ID numbers of all phones it sells and then when a phone is stolen it could be blocked from the network or traced by the police. A similar scheme was tried in the Netherlands where the police sent large numbers of SMS messages to stolen phones.

With a registry of stolen phones shared between all phone companies and a block on the use of stolen phones phone theft would drop dramatically.

Implementation of the Necessary Changes

Support for video calls to emergency services requires government funding. All the other suggestions I make on this page can be implemented without government involvement. It would be nice if phone companies would address these issues voluntarily, but based on past performance that seems unlikely. We probably need legislation to force them to do the right thing.

Computer Related Power Use

Below are some test results of other devices related to computers. Eventually I aim to discover some information on the best types of switches, hubs, and monitors to use for power. I include the air-filter because I believe that every small server room (IE one that doesn’t have tens of thousands of dollars spent on air-conditioning and filtering) should have a small air filter.

BenQ 17inch 1280×1024 TFT monitor active 32W
Phillips 15inch 1024×768 TFT monitor 31W
Cabletron Smartswitch 2200, 24*10baseT, 2*100baseT two PSU 52W
Cabletron Smartswitch 2200, 24*10baseT, 2*100baseT one PSU 45W
Sunbeam Air Filter (fastest) 114W
Sunbeam Air Filter (slowest) 13.9W

Here is the Computer Power Use page [1].

Conditions of Sending Email

The conditions of sending mail to my server are as follows:

  1. A signature will in no way restrict my use of your message. You sent the message to me because you want me to read it (it was not mis-sent, my mail server does not accept mis-addressed mail). I will keep the message as long as I like either deliberately or because I forgot to delete it.
  2. I reserve the right to publish any email that is threatening (including any threats of legal action). I don’t like being threatened and part of my defence is to publish such threats at an appropriate time. Anyone who is considering the possibility of threatening me should consider when their threat may re-appear.
  3. I reserve the right to publish any email that is abusive/profane, is a confession of criminal or unethical behaviour, or is evidence that the sender is a liar or insane.
  4. I reserve the right to forward all amusing email to my friends for their enjoyment.

My mail server will now provide the URL of this page to everyone who connects at the first stage of the SMTP protocol. When a mail server continues the connection that indicates acceptance of these conditions.
This doesn’t mean that I wildly forward email and business discussions are kept confidential of course. I expect that most people don’t keep mail secret when it matches the conditions in my list above, unlike most people I’m publishing the list of reasons.

Due to the popularity of this post I have created a T-Shirt and put it on sale at http://www.cafepress.com/email_eula . Wear your email disclaimer on your shirt!

Blog License

The contents of my blogs (unless otherwise noted) are licensed under a non-commercial share-alike license. This means (among other things) that you may not put my content on a web page that contains Google AdWords or any other similar advertising, and you may not use any automated system to take an RSS feed from my blog (either directly, via Feedburner, or via a Planet installation or other syndication service that includes my posts) and post it to another blog for commercial purposes (which includes attempts to increase page-rank or other SEO).

Services such as Blog Overdriv are specifically prohibited from using my RSS feed.

Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 Unported License.

As an exception to this I permit BoingBoing.net to copy my posts. I may make exceptions for some other sites on request.

Another exception is that this license may be freely copied by anyone who wants to license their blog in the same way.