Saturday, September 26, 2009

Should You Call Or Email?

I do a lot of tech work. Support-type functions. Repairs. Fixes. Configurations.

I'm also wired with the Aspergian mind. That doesn't help with being patient with people when they don't listen.

But this topic isn't just for people like me. It affects everyone to some degree.

See, one of the high-on-list peeves is when people call on the phone for something that they could have emailed about. It drives me nuts because whenever the phone rings and I answer it, it draws my attention away from what I was focusing on. Even if it's just to answer a quick question, it takes me time to get refocused on what I as doing before the phone interruption.

The part that really steams me is when they call, the person they want to talk to (there's others on the multiline system I'm sharing) isn't available, and they say, "That's okay, I'll just send them an email."

Then WHY DID YOU CALL?

If it's not something you need an immediate answer to, email it. It gets neatly queued to be handled when I have time to handle it. I have a paper trail. I have a reference.

You interrupted me because a phone was handy and you had a brain fart?

Ugh.

Then I have to try to refocus on the task at hand. For tech people, once you're "in the groove" you tend to be more efficient, and interruptions lead to mistakes, possibly bad ones if I'm doing something that could affect others (mail server alterations, anyone?)

So here...if you have something you want to communicate, and it isn't something that requires an immediate answer, email it. Ask yourself: "If the person I want isn't available, will I just email the message to them instead?"

If the answer is yes, EMAIL IT. We'll thank you for it. Or at least not curse you for forcing me to figure out what the hell I was working on before you called.

Friday, September 25, 2009

Spotting Snow Leopard

I just installed OS X 10.6, Snow Leopard, on the one Mac I routinely use.

So far there's not much to love to the experience other than it just works. But I've had that experience most of the time with the Mac.

Snow Leopard is the latest operating system release from Apple. It has several refinements and improvements; they just are more or less hidden and are meant more for developers and techies than end users to enjoy.

Some notes...it doesn't run on PowerPC systems (the processor that was used before Apple shifted to the Intel platform). The PowerMac G5 my toddler son uses will forever be locked in at OS X 10.5 at most.

SL is smaller than 10.5. Like 7 gig smaller (some people are saying they're getting more space reclaimed). Nice.

The installation was simple. A couple of clicks...sat there for twenty minutes...rebooted, done. And by a couple of clicks, I really mean a couple of clicks. Simple as they could make it.

There are some refinements to memory footprint (how much space is taken by the operating system, meaning more memory free for your applications).

There are baby steps towards running 64 bit applications. Apple is mixing things slowly here...the default kernel for the operating system is 32 bit on most systems. You can force it to boot to 64 bit mode by holding the 6 and 4 keys at startup. First, though, you have to be aware that some of the drivers won't work with that mode so you'll lose some functionality if you try that. Not that it's a big deal. The only real reason I've ever found for running 64 bit operating systems is to address gobs of memory (by today's standards)...over 4 gig in your machine, you need a 64 bit operating system. Most home users don't have this worry.

OS X now has some simple anti-malware built in. I guess it will download updates from Apple to scan for them automatically, but really I consider this to be a bit of ineffective fluff.

There is some criticism I heard on MacOS Ken about the 10.6 system being considered insecure because it doesn't do address randomization. Basically, if portions of a program are in a known location of memory then malware...bad stuff...can easily find portions that are vulnerable and target it for hacking. Malware overwrites part of a buffer, executes it, and "boing"...it takes over the computer. Address randomization uses techniques that make it impossible for user code to know where exactly other programs (or operating system components) are located in memory, and while Apple hints that they're working on this they don't currently have the ability in OS X. Windows has had this ability for quite some time and is the default ability of Vista. Not a huge concern right now but it would be nice to have that built in, much like the ability for current Macs to defrag files on the fly in the background (did you know it did that? Search for "On-the-fly" in the article).

Another disappointment, though, was that ZFS was dropped in Snow Leopard. Hints indicate Apple may still be working on it but they haven't commented on the lack of it despite early beta work on integrating the filesystem drivers. Some speculate it's a licensing issue. It's a largely cool filesystem that has a lot of REALLY NEAT features...really hoping Sun Microsystems gets their heads out of their colons and open sources it.

Overall, Snow Leopard is faster and more responsive and is largely a foundation improvement over previous versions of OS X. There's a lot of under-the-hood work done and Apple knows there's not a lot for end users to drool over; they priced it at only $30. Wow! They wanted users to have incentive to install it for the enhancements probably to ease a transition into something more drastic down the road, and judging from the number of hidden changes (see the Wiki article at the beginning of this post if you're interested) the next iteration of the cat will be something quite interesting...

Wednesday, September 23, 2009

IT People Have Asperger Tendencies?

This article (click here) is really kind of a duh for people like me, who are utterly bathed in technology work.

It doesn't specifically address tech people as having Asperger's, but the tendencies it describes seem to be VERY common among people who fit into the server room and they are tendencies that seem to be fairly common with Aspies. I'm just saying there's overlap. Not that you're an Aspie if you work in technology.

The article is pointing out how (among other things) tech people value logic and reason over social graces; they'd rather work for a curmudgeon who's right than a pleasant but incompetent person.

My first thought: "Duh."

It's true that incompetence means more work is created by well meaning but incompetent people. We don't want to go back and redo things. We don't like the idea that there's "never time to do it right but there's time to redo it later". Getting things right in an efficient way is valued; this is something that is really overlooked by management more often than not.

I also thought it was interesting that the editorial brought up that when techies complain, it's part of their respect. They are expressing their opinion, their experience, and when it's "managed" out of them to express these ideas they stop telling their managers why something is a stupid idea. Managers..."normals"...think they're doing a good job of making you more pleasant. In reality, it fosters contempt and is a sign of disrespect (from the techie) because now their boss, manager, supervisor, idiot coworker, isn't worth sharing information with. It's another reason for the job to a rut where the techie feels they aren't valued.

It was an interesting read that I wish more of our users would read and understand...

Tuesday, September 22, 2009

Twitter as a Teeny Bit of Microblogging Fun

I finally did it. I broke down and created a Twitter account.

For those who have been hiding in the desert for the past couple years, Twitter is a microblogging site that lets you post quick messages, 140 characters or less, to legions of fans (or in my case, myself).

It's another social networking site; the kind I sort of blasted previously regarding Facebook. Twitter only has spambots, so far...I had three "girls" following me within two minutes (following means they're monitoring your "tweets", or updates) telling me how they loved hot guys. I blocked them right off the bat.

It's kind of neat in that it is convenient; I can send updates from my phone (unlimited texting to number 40404 after you register your phone), my iPod over wifi, my computer,...there's only about have a metric f***ton of applications dedicated to monitoring and updating your twitter account.

The truth is that I started monitoring several accounts from the web, and eventually it just got to be a pain in the butt. I had started checking in on a college student with a real knack for utilizing social media in ways most authors could probably take notes on (I don't know how she does it and still has a life to blog about!), a local journalist that gives some interesting insights to what people are like offscreen, Mur Lafferty (an author I have blogged about several times before), and a few others that are just really funny. I'm still expanding the number of people I'm following.

I wanted a way to consolidate them all from a simple interface; everything I installed, however, required me to register an account. So I registered. I set up my phone. I figured if I was going to have another account, I might as well give it an honest try before hating it.

I'm thinking of using it for notes, like web sites I want to make note of or notes to myself. I don't know yet. It might be a good tool for trying to get rid of my "wordiness" problem, since each tweet is limited to 140 characters.

The only thing I REALLY have to careful of is being too honest. It's too easy to want to spew some random brain fart that could land you in hot water, especially if it's about work or personal things. You can hide your tweets (make them "personal") so only friends can see them...but still, it's a risk that too many dippy teenagers (and a worrying number of adults) don't think about now. So basically I only post things that I wouldn't mind my mother seeing.

(Another issue is that with my brain's goofy wiring, I still say things that are inappropriate...so says my wife, anyway.)

Anyway it's an experiment. No, I can't share the link here since it can reveal a bit too much about my superhero identity. Some of you already may know who I am. Others, if you're really curious, feel free to leave a comment with info on how to contact you and if I am adequately removed from you professionally I'll let you know who I am.

Saturday, September 12, 2009

Overnight Delivery in Just Four Days

I recently had the good fortune of discovering my CPU cooler's fan had seized up. If you're unfamiliar with the internals of your computer, modern processors get hot. Very hot. Like, burn your bare finger hot. If allowed to stay that hot, it seizes up and dies. Or with today's processors they have a sensor that triggers when they overheat and the computer goes into thermal shutdown...*bloop*.

The CPU cooler is a radiator that is designed to pull heat off the processor and circulate it out of the case. On my particular computer the cooler with the radiator baffles is bigger than my fist, and mounted on it is a fan to push air through the baffles and keep the processor at a cool 50 degrees Celsius, give or take, depending on the load I'm putting on it.

Well, without air circulating through the baffles, the thing will heat up. Fortunately my computer, built by Puget Systems, is built like a tank. The freakin' thing warmed up, but not enough to kill the processor. Nice work! It had enough redundancy with cooling inside that the system was kept safe. My computer has a case with a clear panel on the side, so I just looked over and saw that the fan was seized up.

It happens over time. Dust, age, worn bearings...fans die.

A side note-while waiting for the new part, I installed a program to read temperatures and display them on the panel at the top of my Linux system's desktop. I had temps...but what was too much? I emailed Puget and asked them, along with current numbers. Their techs emailed me back the next business day with assurance that the numbers were well within tolerance. I emailed back a thank you, and they emailed again telling me, "Hey, no problem, any other questions don't hesitate to let us know." This computer was purchased a few years ago...they still were uber-responsive to me as a customer. Strong incentive for me to look to them for my next set of systems, if I don't go with a Mac-centric home...

Anyway, I ordered a new one on NewEgg, a great source for techie toys. Exact same model cooler. This was a Thursday night. I specified, next day UPS, expedited order. Cost me a total of $65...twice as much as the cooler alone.

My wife said I probably wouldn't get it on Friday. I didn't.

I got it Monday night.

Oddly enough, I'm still going to be billed for overnight delivery.

In a time when packages could be tracked to the point when they're dropped on my porch, why am I paying for what I'd like my delivery to be, instead of what the delivery ends up being?

I shouldn't have to pay overnight when I didn't get it for FOUR days!

Am I the only one that thinks this makes some sense?

Friday, September 11, 2009

What Is That Program Doing? Or, Why Is This System Using So Much Memory!?

First, let's get a quick concept out of the way. When dealing with computers, new sysadmins have to understand that when it comes to a system compromise (a computer gets hacked), the system cannot be trusted. It's like asking a person to objectively assess their mental state; when you ask a person's brain to evaluate itself, it's going to be biased and distorted. Similarly, when a person cracks a computer system, they can alter the programs and filesystem so that if you run utilities to show network connections, running programs, etc., the altered files will hide the unauthorized activity.

Pretty simple, yeah?

So how do you see unauthorized activity? If your computer was hacked and is now sending spam email...which is network activity...but if you run utilities everything is showing up as normal (because the altered files are hiding the unauthorized network activity), the computer can hide what's going on, but a second system on the network that is monitoring network activity will see all the activity. In other words, your hacked computer may have its fingers in its ears yelling, "LA LA LA LA LA" but a third party system will still see what that computer is doing.

You add a layer of abstraction to watch what's going on, and in the process you can learn a bit about what is actually going on with your computer.

Now...the topic of of the post.

I have been working with a technology called virtualization for some projects at work. It's really great stuff...it lets you create computers that exist only in software, letting you install and configure multiple computers that run on just one system. Schizophrenic, but very very handy for people like me that have to run print servers, web servers, and file sharing servers in an organization among other things because I can consolidate those systems onto one or two actual physical systems (with tons of RAM and disk space).

In the process of running tests to migrate some of our physical systems to virtual software systems we moved a printer server. This is a Windows computer whose entire job on our network is to spool print jobs and dole them out to our many many printers scattered around several buildings. Not uncommon in businesses to have printer servers configured in their network for easier management.

Normally we'd think that this isn't a huge task, either. Most of the time a server like this would sit largely unused; I mean, it just sits waiting for someone to send a print job, render it then send it to the appropriate printer. It's not crunching numbers to predict the weather.

"But Barry," you ask, "What does this have to do with hackers and second computers to watch what a system is doing?" Glad you asked. See, when you run a full-on virtual server system...in this case what's called a type 1 hypervisor...you get an abstracted view of a computer; memory use, disk use, network use...and so you can get a quick overview of what the computer is doing that ordinarily you wouldn't get to see with a physical computer.

What I saw was that out of (more than five, fewer than ten systems) on our virtualization server the printer server was taking up nearly 800 meg of memory and shooting between first and second place for CPU usage and network usage, depending on what the other systems virtualized on the testbed were doing at that point. What in blazes is it doing?

I logged into the machine and ran a wonderful tool from the sysinternals suite called Process Explorer (free download...I highly recommend the sysinternals suite of software to ANY system administrator or troubleshooter). From there I could monitor process (program) names, the command line from which they were running, memory and CPU usage, etc.

I found a couple things of note. First, the converter program I used to automagically convert the physical machine to a virtual machine runs a service that carries a large footprint of memory; now that the system was virtual, the converter program isn't needed. So I removed that program from add/remove programs and memory use for that virtual image dropped over 100 megabytes.

Second, the computer is running a database program as well as a Bash shell spawning Java. Huh?

In case you didn't know, Bash is a shell program that runs normally under a Unix system (like Linux), not Windows.

Process Explorer told me that both the database and the Bash shell (and in turn the Java system) was tied to a Dell utility tied to Openmanage. Many mental scars remind me that OpenManage is a set of utilities made by Dell for managing their servers...usually it has functions for things like monitoring fans and CPU temps, rebuilding RAID arrays, etc. etc...generally a headache to sort everything out and get working in the proper combination for your system. At least, that's my experience with it.

So I go into add/remove programs to remove the OpenManage software, since now that the system is virtual there really wasn't any Dell hardware for it to manage.

Surprise! I was wrong. Apparently at some point someone installed an OpenManage component for managing printers! It wasn't small either. In the add/remove programs there was a listing for "Dell Printer Software" and for "OpenManage Printer Manager", each of which was taking 1.6 gigabytes in storage space on the hard disk. Each. Not both together.

But since some departments wanted Dell multifunction printers on the network and I didn't install it I don't know if these software packages are something that are needed so I can't really just tear through and uninstall those programs without dealing with the possibility of Nasty Consequences(tm).

Apparently Dell tries to cut some corners to make their software more portable between Linux and Windows by using Java (I'm speculating since I'm not too thrilled with OpenManage software, so I don't install it on my Linux systems on Dell hardware). Part of their software workflow involves using a program called Cygwin to do something with logging or some management task; Cygwin is a port of Unix utilities to run on Windows (that's why I saw Bash running). You can run tools like Secure Shell or awk or sed or ls...many many many scripting and administration utilities...on Windows that normally you'd only see on Linux. Process Explorer popped up lines in the process list as some of these scheduled tasks were periodically popping up thn disappearing, no doubt adding to the memory and resource use of the virtual machine. To be clear, Cygwin has it's place and I think it's great when properly used. I've also seen it installed on systems that suddenly start spiking CPU usage because of one of the programs using Cygwin libraries (in that case, SSHD running on Windows as a service).

What lessons can we learn from this little educational field trip?
  • Generic is good. Addon software is bad. Backed up by anecdotes on the StackOverflow podcast, that CD that came with your camera/printer/device should not be installed unless you have no other choice but to use it to get the device to work. Many modern operating systems include drivers to work various media devices, or for devices like HP printers, you often can go right to the website and download just the driver, without all the addon crap that will bog down your computer with extra programs that you don't need (or know what they're really doing).
  • Virtualization can give you tools that will both teach you about using your system and open your eyes to some things your computer(s) may be doing in the background without your knowledge. There's no reason that a printer server should be sucking down resources like this one was except that it had some poorly optimized software installed that it probably doesn't need.
  • Third party utilities like the Sysinternals Suite can help you track down oddball activity on your system (or insights on how things work) for free. There are tools that tell you what's connected to the system over the network, which program is writing and reading the hard disk, which program is hitting what part of the registry, and many other useful tools. Try it out if you run Windows.
  • Audit your system once in awhile to see what's actually installed and what it's doing. If it's not needed, free up the drive space by uninstalling that program. Use Google to figure out what the programs are. Part of what contributes to your computer slowing down over time is having programs running in the background that take up space in memory and access the network and you probably don't need them. Become familiar with your system and it can help save you aggravation down the road...also it'll help you later on when you notice something that should not be in that process list running, so you can tell when something is out of the ordinary on your computer. Process Explorer even includes tools for you to Google process names from a menu, making it even easier to learn about what your system is doing!
Windows isn't the only platform to suffer from bloated, inefficient and/or poorly designed software, but since Windows has the majority of users who are non-technical in interest and nature it is the platform with developers who get away with creating shovelware much more often. Fight it by not using it. I'm not referring specifically to Windows, although I encourage not using that too...but rather don't use the bloated crap that comes as trinkets and addons that only serve to bog down your computer. Don't install software from CD's that came with your new tech toys unless you must; try plugging it into the computer first to see if Windows or Linux or the Mac recognizes the hardware and installs the necessary drivers for you first. Then you're using native tools and not someone else's idea of how you should use their tools (and sometimes screw up your system in the process). Check your computer and screen it for odd behavior and find out what those processes in the background of your system are doing so you can get rid of software that is slowing your computer without justified cause.

Anyone have any stories they'd like to share?

Sunday, September 6, 2009

The iPhone Vs. LG Voyager

It's official. The iPhone 3GS has smashed records for AT&T and Apple.

I would love to have an iPhone but the only carrier in the US is AT&T and I'm already quite invested with Verizon. Every carrier has horror stories associated with them, but in our relations with Verizon we've had good luck with customer service as well as technical service.

AT&T didn't come into our area with coverage until late in the game and when they finally did put in tower coverage the coverage was unreliable and spotty.

In other words, they left a bad taste in my mouth after seeing how they ran their business. If you followed my blog you know how I feel about businesses that seem incompetent with their customer relations.

I'm told that they're better today. I don't particularly care. There's a similar effect for restaurants. It's quite common for a restaurant to work long and hard at building a loyal number of regulars, but it takes only one bad experience to lose a customer forever.

That doesn't mean I don't wish I had an iPhone. I have an iPod Touch, the iPhone's close cousin, and I owned a Verizon LG Voyager. The iPod gives a pretty close experience to what an iPhone is like in most areas other than actually calling and texting (and a couple other features like taking photos and GPS, since the hardware isn't available on an iPod). The iPod does give the computer integration, music, podcast, and touchscreen as well as close form factor to the iPhone as well as the app store integration. It runs the same operating system as well.

Having used both the iPod Touch and Voyager, I can tell you that the interface to the iPod is light years beyond the Voyager and it's Verizon technology kin.

The touch interface on the iPod is responsive and probably three to four times more accurate than the Voyager's.

The app store on Apple is convenient and makes the iPod more flexible. Yes, Apple acts as the gatekeeper for all applications on the iPod and you won't (intentionally) find porn-based applications on the iPod/iPhone, but overall there are a simply huge number of various applications to choose from and they aren't tying you directly to Apple's brand overtly. Verizon requires you to do everything through Verizon and they're quite limiting in what I could and couldn't do on their phone.

The iPod allows for wifi access. Not so sure about Verizon's phones. It's not on the Voyager.

The iPod/iPhone was integrated with my computer. I could back it up and sync data easily with my computer, without having to find some kind of accessory kit with the proper cable for use with my particular phone. There are even applications to allow you to explore and navigate your iPhone/iPod from your computer. My Verizon phone was very much a separate accessory; it is as if Verizon is afraid of diluting their brand by allowing the customer to have any control over the product.

The only place I preferred my Voyager was the tactile keyboard. I could type significantly more quickly than on my iPod. However I could learn to work the iPhone's key display in a pinch (on the Voyager you almost had to get proficient with the full keyboard; the touchscreen was horribly inaccurate and lagged, making it nearly impossible to use.)

The Voyager was barely usable with the touch screen. For anything more complicated than viewing text messages I often had to drop to using the keyboard to get anything done; I can't count the number of times my phone thought I wanted to edit or view a contact entry when I was trying to get the damn thing to scroll. The iPod? No problem. If anything the iPod was almost too responsive, the screen just begged to be touched. The Voyager was so finicky and glitchy that it was just the opposite.

I don't know if it's a problem with Verizon just not "getting it" or if they're so stuck in some paranoid business model of controlling the brand rather than creating a great customer experience that limits them so much. Verizon has a great network, I've had excellent luck with coverage. The services offered by their website have worked well for us.

Now I just wish they had good products to match those services. I'm hoping that at some point Apple will cut their exclusivity with AT&T and create a product with Verizon...so far Verizon has show zero ability to "get it".

Friday, September 4, 2009

MyLife.com : Be Careful Who You Sign Up With Online

I had an email arrive from a friend recently that raised an eyebrow. It said that my friend wanted me to confirm that I knew him to a site called MyLife.com.

Hmm...

This isn't the first time I've seen emails like this before, and the're almost always trouble. Usually the person named as the sender doesn't even know that "they" sent it to me...and like most of these sites, my suspicions were quickly confirmed.

Check it out:
"Just Say No To Mylife.Com"
"MyLife.Com: A New Tool for Bargain-Seeking Stalkers."

Things are rarely really "free"; in this case, these sites take it to a new extreme in order to invade your privacy. This website downloads your contact information on your email and social networking sites then contacts people in your name to try getting them hooked into their snare to further marketing efforts; and once you're in, good luck getting back out.

Much like urban legends perpetuated with emails by everyone and their grandma, these underhanded websites spring up all the time with various names and never seem to go away. By the time people realize what they're really up to it's too late. Your information is out there, and everyone you have in your email has been spammed. It's not like there's one or two of these...they change tactics periodically to escape having their tarnished name hinder profits; the articles I linked above reference a few other names that website company is associated with, for example.

The lesson here is to double and triple check the fine print of sites you're looking at signing up with. Do a Google search for the name of the site and the word "spam" or "scam" to see what, if anything, pops up...before you click that ok button. You may not know what you're actually allowing and all the security in the world won't protect your computer when you give permission to install or upload their weaselware. It should became a second nature just like verifying your emailed "I can't believe this outrageous claim" should be verified on Snopes before you help pass it on with the forward button.

I'm not mad at him. If anything I'm mad at the company for using such weasel tactics to take advantage of people on the Internet. Those web weasels are no better than spammers clogging our junk filters and choking our bandwidth with attempted hijacking of our computers and emails attempting to evade filters.

Thursday, September 3, 2009

Facebook and Other Social Networking Value

I have a Facebook account. I was curious about just who I might know on the network; thought maybe I could find out some interesting things my classmates are up to now after so many years.

Small confession...if there's a Barry Atric there, it's not me. I'm techy, and occasionally techie, but not like here.

Anyway the primary reason I made the plunge was because I was looking for a few specific people from my college alma mater; I didn't find him there, but I did find many others that I thought had disappeared.

The web has plenty of tools available for people to use for expressing themselves in various ways (no, not talking about porn...although I guess there's venues for that too). Twitter, Facebook, Myspace, YouTube, even Blogger...all wonderful sites for stroking your virtual ego to no end.

I lately have questioned the value of using Facebook. I occasionally see something interesting, like finding out about an old aquaintance being attacked by a dog or someone else getting lost on a hike in the woods and having to spend an extra day in the wilderness with her husband until finding their way out the next day.

Far more often, however, I see updates about how Billy wants me to join a mafia war (what the hell is that?), or some other bulb managed to get a high score playing a virtual gardener. Worse are the quizzes; I think they're originating from some dimwitted kindergarten class. I took one quiz off Facebook when I first saw an interesting one about Star Trek; one of the questions had an answer that was one-hundred percent wrong. Wrong wrong wrong.

I was rather curious about this. That's when I discovered that other people write the quizzes. You don't need to be qualified in any way, shape, or form. Any idiot that can type can create some "wunderful" quiz for others to take and pass on like a meme-virus on Facebook.

So people are spending tons of time into a black hole of playing crappy games (get a Pogo account, people) and taking quizzes that are as meaningful as what any 12-year-old could come up with when they're not sharing small tidbits of their lives to their "friends". At least, I think they are friends. Apparently there's a group of people that make it their mission to "Friend" as many people as possible. I think it's like some form of virtual street cred or electronic Viagra for them to be able to say they can share the fact that Furball went poop on a pile of clean clothes (hee hee!) with 984 seemingly random individuals.

It's getting harder and harder to cull useful material out of Facebook. I went there hoping to reconnect with old friends. I did that to a degree. I found one person who I was remembering from old albums by finding a mutual friend. The person I was originally looking for? Again, friend of a friend, finally. I found out that the mutual friend was still in touch with him when I saw him post pictures of my lost aquaintences' second wedding on the website.

Yeah. He got married again. He was my best man at my wedding...and I wasn't invited to the second wedding.

Another friend I reconnected with acted like kind of a jerk to a ribbing I commented on. He deleted the whole thing and replied as if nothing had happened, but I was rather offended that he'd have said what he said. Well, written. Rather than make it worse I just didn't say much of anything other than, "Man,...that was harsh, don't you think?"

He erased that with his other comments, but still...it bugged me.

Really. What good is Facebook?

I contacted a few people, but they rarely say anything. It's a cacophy of people advertising themselves or some small highlight of the day, and once in awhile making comments about what someone else does. The little blurbs take on a life of their own for a few minutes before being drowned out by the latest game score someone managed to achieve in VeggiePatch or on some meaningless quiz.

Meanwhile I'm sinking time into Facebook that I could have used to write a story or try getting some time in learning a programming language. It's my own fault, I acknowledge that. But I think that maybe I should cut some of that time on Facebook.

I've noticed that most of the people populating it seem to be more concerned with themselves more than what their friends are up to. Maybe I'm just imagining it, but really, what do I accomplish by using it? Most people don't say much of anything about what I'm up to. Most probably don't even care. Once in awhile I'll get something from someone as feedback, and I try commenting on other active status updates, but most of the time...nada.

Lately I've just been posting song lyrics and whatever music video I happen to be listening to as a YouTube link. I don't bother investing energy in trying to use it as a conduit for keeping up with people's lives or having them keep up with mine. If it were something they were intersted in I think they'd have emailed me.

Or they'd already know about this blog. The only one that knows more about what's in my head is my insurance-mandated psychologist with my journal (yeah, I keep a journal...it's easier than running through things in-session most of the time and I don't think he spends enough time on the Webbertubes to read my blog. I'm not so sure even my doctors at the baritric office still read it at all, to tell the truth...)

So do you use Facebook or Myspace or the other sites? Why? I mean, do you get any benefits from using the site? Feel free to share...