Feeds

The Girl with the NSObject Class Reference tattoo

Verity tackles Swedish noir

Security for virtualized datacentres

Stob What better occupation, at this time of year, than to polish up one's IT skills with some background reading? What have the great programming publishers got lined up for our delectation in 2011?

Alas, as far as this reviewer is concerned, these rhetorical questions must remain unanswered. A certain Amazon parcel, containing several kilos of Addison-Wesley's and O'Reilly's latest, is delayed-believed-lost in the region of the Park Royal depot, and I haven't got time to go running off to shops to acquire replacements. That tap-tap-tapping at the window is Dudley Deadline, and he is wearing his mean face.

This is the sort of situation that distinguishes the ovine from the caprine. But have no fear. My name is Verity, and I am your Nanny for today. We can get through this; we have seen worse.

It so happens that I do have to hand a couple of paperbacks, freshly bought, which represent a very Swedish approach to modern software issues. And we all know how important the Swedes are becoming in our speciality, what with Joe Armstrong and everything. If you are sitting comfortably, I shall begin.

The Girl with the Dragon Tattoo

(Author: Stieg Larsson, pub: Quercus, 538pp.)

The late Stieg Larsson's book is a quaint, nostalgic look back at the very early days of the computing - ie five years ago - masquerading as a ripper thriller. The text was originally written in Swedish, but has been translated into idiosyncratic English for the convenience of Anglophone readers.

The translation contains various curiosities. The computer abbreviations are spelled out with full stops, thus: 'A.D.S.L'. This makes them look like defunct trade unions, as referenced in yellowing press cuttings from the mid-1960s. One wonders: what has the Association of Domestic Servants and Loafers got to do with the Interweb? However the 'AK4', apparently a kind of rifle (see p10), is presented unpunctuated, following some linguistic algorithm that I do not pretend to understand.

We may be confident that Stieg Larsson was an Apple fan. Not only does he make the hero purchase an early model iPod as a Christmas gift, Stieg actually stops the action and uses the narrator's voice to recommend an OS X shareware program called 'Notepad' (a very confusing name for Windows users), even bothering to supply its url in the text.

However, he does allow some characters to use Windows. Here is a summary of the principals and their machine/OS choices:

TGWTDT characters and computers
Character Occupation Machine
Hr Mikael Blomkvist Our hero, a middle-aged, journalist who is the editor-in-chief of Millennium magazine. For some reason, not really made clear, all the women in the book are keen to hop into bed with Blomkvist. (Incidentally, if you turn to the author's biog at the front of the book, you will find that in real life Stieg Larsson was a journalist: editor-in-chief of Expo magazine, founded 1999. Just saying.) Apple iBook, see, eg, p124
Frk Lisbeth Salander Kooky, gothy 'genius computer hacker' (says back cover blurb), not afraid of wandering the wrong side of the law when justice requires it. The eponymous girl. Apple iBook 600 (p193), then Apple Powerbook G4/1.0 GHz with 960 megs of R.A.M. and N.V.I.D.I.A. graphics 'which shook the P.C. advocates' (p194)
Hr Hans-Erik Wennerstrom Maxwell-like entrepreneur and fraudster, and oppressor of Hr Blomkvist. I.B.M. (sic) laptop, using the software programme (sic) Microsoft Explorer (sic, no 'Internet') to surf the web, p471-472
Hr Benny Bjorn (not his real name, which I withhold to avoid spoiling the surprise) Incredibly evil and unpleasant serial rapist and Nazi, who starts off by forcing his sister into incest, then goes on over a period of many years to kidnap, imprison and murder a long string of women. Also vivisects a cat, by way of a change. Dell laptop, model unspecified, p416

Do you notice anything? Just as the moral allegiances of cowboys used to be identifiable by the colour of their stetsons, author Larsson distinguishes a good egg from a bad one by the egg-in-question's choice of computer. The heroes are all equipped with Macs; the villains must click through their wretched and perverted lives with Windows.

God knows I carry no spear for Microsoft, but I do think this is taking fanboism a bit far.

 (I would love to know if this computer brand-based approach is also used in the other two volumes of Hr Larsson's Millennium trilogy. If anybody happens to have read them, an answer in the comments section much appreciated.)

Secure remote control for conventional and virtual desktops

Next page: Firewall

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
Was ist das? Eine neue Suse Linux Enterprise? Ausgezeichnet!
Version 12 first major-number Suse release since 2009
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.