Whether we evolved to be this way or God simply decided that we were going to be this way, we operate best in environments that have air, food, water, gravity and a certain amount of light and heat. Put a man in space and he dies. Fans of science fiction know that one of the most horrible ends for anyone is to be "spaced" or "sent out an airlock". It's an ugly way to die.
In order not to die, space-faring people must duplicate many of the conditions as found on Earth. Air, food, water, light and heat are manufactured in a little bubble around the people who go into space. The size of that bubble may vary from a special suit of clothes wrapped around the person, to a considerably larger bubble the size of the International Space Station.
Manufacturing gravity is a bit more difficult and nobody does that just yet. As a result, lots of effort is being expended to understand how to keep people healthy in weightless environments. You see, if you just float along inside your bubble and don't do the right things, you'll turn very fragile and eventually die. We were designed for life on Earth. We weren't at all designed to go into space. We have to take steps to ensure that we don't die "out there".
Why bother talking about this? Well, I like the idea of exploring the universe, and of making discoveries that will help us here on our home bubble - the Earth. Unfortunately, everything that explores the universe in person has to either orbit the Earth or just plain leave the Earth behind. To stay in orbit, stuff has to be moving at 17,500 MPH. To leave the Earth, stuff has to be moving at over 20,000 mph. That's like travelling from New York to Los Angeles in about 10 minutes. It's really fast.
EVERYTHING that is going to leave has to be accelerated to that speed. It doesn't matter if it's water, people, toilet paper or computers, it still qualifies as "stuff" and has to get up to that speed in order to go exploring. That takes a lot of power in a very short time. It's one of the reasons we have NASA. If you don't have "a collection of inventive and smart people" you don't get "stuff accelerating to 20,000 MPH".
NASA figures out how to get stuff to go fast, and they also spend a lot of work on figuring out how to ensure that people can survive in space. The lethality of problems is illustrated by the Apollo 1, Challenger and Columbia disasters. Getting to and from orbit is a tough problem to solve and it can and has resulted in disaster.
My question is this: why do we put people into space? I've just outlined the basic problem of getting stuff into space, how homo sapiens is ill-suited to be in space, and how we have to accelerate all the stuff that we need to survive up to really high speeds. What are the returns for all this?
Advocates of putting people into space will perhaps speak of the gut-level need for mankind to explore. It was that very sense of exploration that led to the discovery of, and ultimate settling of America by Europeans. There is also the more practical argument of having somebody at the problem site in order to use every facility of humanity to do the exploration. Having a human being on the Moon or on Mars is far more effective than just putting a rover there. People can improvise to solve problems and discover things that robots and science instruments simply cannot.
I don't buy either argument because of the current NASA program of the mars rovers. Spirit and Opportunity are a pair of robotic explorers that have been on Mars for almost three years now, driving across the surface of the planet, doing science and making discoveries. Unlike us, those rovers were designed to operate on Mars. They have limited senses, but their senses are good enough to provide science data for hundreds of engineers and scientists back here on Earth. They're on Mars now, for a combined cost of less than one billion dollars. In contrast, the manned program to Mars is looking to cost well over 100 billion dollars and won't be on Mars for at least another 14 years. When the robots develop a problem or encounter something new, a whole mess of engineers and scientists can combine their smarts to use whatever capabilities the rovers DO have to solve the problem. Humanity doesn't drop out of the loop just because we put a robot on Mars instead of a human being. We remain the explorers that we have always been.
Ultimately, I say that for now people should remain in the bubble that we were created for until we can figure out how to make new bubbles that will permit many people to go exploring. In the meantime, we should be creating robotic explorers for the environments that we are ill-suited for. This may smack of "If man was intended to fly, he would have been given wings." In response, I'd say that "If man was intended to go everywhere in person, the endoscope would never have been invented". Robots and sensors are needed to go where man is ill-suited to go. Let's push the envelope and create robots and sensors that will let everyone on Earth experience other worlds instead of moving the senses and abilities of just a few of us to those other worlds. However we improve robotics and sensors for other worlds, we will be improving them for our own world.
Look at computers. They've been reduced from the size of a room to the size of a paperback book with massive improvements in capacities and capabilities. Sensors are going the same route. Remember that problem of getting stuff up to speed so that we can go exploring? Our electronics are getting ever smaller, lighter and more capable, while our bodies remain unchanging with the same need for the bubble that we were designed for. When computers and sensors are down to the nanometer scale, we may find that we'll only have to get a couple pounds of electronics up to those really high speeds - instead of the tens of thousands of pounds required to have a bubble for a small crew of people. It just doesn't make sense to me to send people into space.
Thursday, November 02, 2006
Monday, October 30, 2006
Digital Identification
There are many ways to identify yourself to another person. They can range from just showing your face to perhaps showing a pass to someone. When we show our face to a friend, they know many things about us and they will let us do a variety of things, according to our status with them. We might be able to borrow their lawnmower, but not their fancy car. When we show a pass to someone that we don't even know, they don't recognize us, but they recognize the pass. Because of that, they will let us do whatever specific things that holders of that pass are permitted to do.
That pattern carries through to many facets of our lives. We use our voice to identify ourselves to others over the phone, we use account numbers or signatures to identify ourselves to companies, we use our driver's license or our social security number to identify ourselves to government agencies, and so on. All of these forms of identification have been established to ensure that the people who should be permitted access to various services are able to do so - and that those who shouldn't be permitted to access them to be prevented from doing so.
When we work with computers, we frequently supply a user name combined with a Personal Identification Number (PIN) or a password as a means of identifying ourselves to the software that runs on the computers. As many people have learned, it is entirely possible for someone else to learn that information and then to masquerade as them, accessing services that are supposed to be reserved to them. Services such as withdrawing money from an ATM.
Just about everything that we use to identify ourselves has been stolen at one time or another. Our signatures are stolen by forgers. Our voices are stolen by impersonators. Our usernames and passwors are stolen by phishers. Our passes are stolen by yet more forgers.
Whenever someone steals identifying information, it constitutes a form of identify theft. By obtaining the information that identifies you to a computer, a thief has effectively stolen your identity as far as that computer is concerned. If that thief obtains enough information about you, they can do everything that you can do with computers.
These days, that a lot of stuff. Customer service employees don't know you at all, so if that thief has your username, password, date of birth, mother's maiden name, etc, they can answer all those security questions over the phone and the company employees won't hesitate to help the thief to all the services that you normally use. Computers are even less personal, and if the thief has your identifying information, they get to use the electronic services that you normally use. The computer believes that the thief is you.
Many companies and researchers are working on this problem. The solution has been to take a page from the olden days, when we identified ourselves by the way we look. Computers can be programmed to remember lots of things about our appearance and other things about our bodies. If we then approach a computer that has ever seen us before, it will recognize us in much the same way that our friends recognize us. The solution to the problem has been to recognize something about our bodies instead of recognizing something that we know, such as a password. This is the field of biometrics.
Biometrics is the study of measuring our bodies in a variety of ways. A promising biometric is the appearance of the eye. A computer uses a camera to look at your eye, and it remembers a variety of information about it. When the computer sees the same eye, it assumes that it is you. Because eyes are as individual as fingerprints, it's a good way to recognize people.
For a thief to steal your identity, they'd either have to steal your eye or figure out a way to show the computer a fake eye that matches your own. Neither is particularly practical for the typical thief. Combine the eye scan with other types of biometrics, such as fingerprint scanning or voice recognition, and you've made it even harder for someone to steal the information that identifies you. Someday we may include DNA scanning, requiring even more exotic techniques for thieves to steal your identity.
Now that you've got a way to reliably identify people to computers (and that means identification to strangers as well), what does Fort Data permit us to do? If Fort Data is really locked up tight and it can trust us to be us when we claim we're us, then Fort Data can be relied upon to provide all those delicate services that we were talking about. Services like tracking our health care information. Or our financial information. If you know that nobody is going to be able to get into your financial data unless you say so, you're going to be pretty happy to have that data stored in Fort Data. Without effective identification schemes, you're just assembling all your precious personal information in one place. That provides a greater incentive for thieves to be as sneaky as possible to steal your identifying information. If that identifying information is biometric data, they're going to have a very hard time indeed.
That pattern carries through to many facets of our lives. We use our voice to identify ourselves to others over the phone, we use account numbers or signatures to identify ourselves to companies, we use our driver's license or our social security number to identify ourselves to government agencies, and so on. All of these forms of identification have been established to ensure that the people who should be permitted access to various services are able to do so - and that those who shouldn't be permitted to access them to be prevented from doing so.
When we work with computers, we frequently supply a user name combined with a Personal Identification Number (PIN) or a password as a means of identifying ourselves to the software that runs on the computers. As many people have learned, it is entirely possible for someone else to learn that information and then to masquerade as them, accessing services that are supposed to be reserved to them. Services such as withdrawing money from an ATM.
Just about everything that we use to identify ourselves has been stolen at one time or another. Our signatures are stolen by forgers. Our voices are stolen by impersonators. Our usernames and passwors are stolen by phishers. Our passes are stolen by yet more forgers.
Whenever someone steals identifying information, it constitutes a form of identify theft. By obtaining the information that identifies you to a computer, a thief has effectively stolen your identity as far as that computer is concerned. If that thief obtains enough information about you, they can do everything that you can do with computers.
These days, that a lot of stuff. Customer service employees don't know you at all, so if that thief has your username, password, date of birth, mother's maiden name, etc, they can answer all those security questions over the phone and the company employees won't hesitate to help the thief to all the services that you normally use. Computers are even less personal, and if the thief has your identifying information, they get to use the electronic services that you normally use. The computer believes that the thief is you.
Many companies and researchers are working on this problem. The solution has been to take a page from the olden days, when we identified ourselves by the way we look. Computers can be programmed to remember lots of things about our appearance and other things about our bodies. If we then approach a computer that has ever seen us before, it will recognize us in much the same way that our friends recognize us. The solution to the problem has been to recognize something about our bodies instead of recognizing something that we know, such as a password. This is the field of biometrics.
Biometrics is the study of measuring our bodies in a variety of ways. A promising biometric is the appearance of the eye. A computer uses a camera to look at your eye, and it remembers a variety of information about it. When the computer sees the same eye, it assumes that it is you. Because eyes are as individual as fingerprints, it's a good way to recognize people.
For a thief to steal your identity, they'd either have to steal your eye or figure out a way to show the computer a fake eye that matches your own. Neither is particularly practical for the typical thief. Combine the eye scan with other types of biometrics, such as fingerprint scanning or voice recognition, and you've made it even harder for someone to steal the information that identifies you. Someday we may include DNA scanning, requiring even more exotic techniques for thieves to steal your identity.
Now that you've got a way to reliably identify people to computers (and that means identification to strangers as well), what does Fort Data permit us to do? If Fort Data is really locked up tight and it can trust us to be us when we claim we're us, then Fort Data can be relied upon to provide all those delicate services that we were talking about. Services like tracking our health care information. Or our financial information. If you know that nobody is going to be able to get into your financial data unless you say so, you're going to be pretty happy to have that data stored in Fort Data. Without effective identification schemes, you're just assembling all your precious personal information in one place. That provides a greater incentive for thieves to be as sneaky as possible to steal your identifying information. If that identifying information is biometric data, they're going to have a very hard time indeed.
Subscribe to:
Posts (Atom)