Attention and Distraction

I was asked to speak in church a few months ago and spoke on the topic of attention and distraction. Here’s the outline of my talk, delivered Aug 28, 2011 in Boulder, CO. By the way, I consider this a very positive topic — the opportunity to direct our attention and feel more peace and flow — not a negative topic about simply avoiding the “perils” of distraction.

Define attention: “your treasure”

You have a limited amount of time. You have even less attention because attention is the subset of your time during which you’re awake, alert, and have energy. Therefore, attention is more valuable than time. How you spend your attention constitutes what is important to you.

“For where your treasure is, there will your heart be also” (3 Ne 13:21)

  • Where does your attention go?
  • Which people get your attention?
  • Which projects and causes and acts of service get your attention?

(The week after I presented this talk, Jason Fried wrote a great post on this concept: “Your Attention Please”.)

Technology can be a source of distraction

NYT Article: “Keep Your Thumbs Still When I’m Talking to You”

  • Story of people at dinner at tech conference.
  • Putting away your phone was like holding your breath.
  • Once one person caved to distraction, all caved.
  • “Mutually assured distraction”

WSJ Article: “When Twittering Gets in the Way of Real Life”

  • “Sometimes, it’s like you’re here and you’re not here,” Joe said to me. “Your mind and soul are in cyberspace, and all we’re left with is the husk.”
  • “Sometimes, I mindlessly find myself logging on to Facebook and staring at photos I have posted of my children when I just as easily could be staring at the real thing. I’m not proud to admit that.”
  • “It’s incumbent upon me to find a way to consume less — and, more importantly, let it consume less of me.”

What we consume consumes us.

David A. Bednar: “Things As They Really Are”

“Please be careful of becoming so immersed and engrossed in pixels, texting, ear buds, twittering, online social networking, and potentially addictive uses of media and the Internet that you fail to recognize the importance of your physical body and miss the richness of person-to-person communication. Beware of digital displays and data in many forms of computer-mediated interaction that can displace the full range of physical capacity and experience.”

We’re here on earth to have a mortal experience with a body, with presence, with real people.

Distraction is the enemy of attention

  • “I am persuaded that two of the greatest sins of our busy and hectic generation are distraction and preoccupation.” (David A. Bednar)
  • “We need to frustrate…distraction by identifying what is critically important in our lives. We must give the cream of our effort to accomplish those things. Where there is limited time or resources, this pattern may require that some good activities be…set aside.” (Richard G. Scott)
  • “Does the use of various technologies and media invite or impede the constant companionship of the Holy Ghost in your life?” (David A. Bednar)
  • “Each of us should be careful that the current flood of information does not occupy our time so completely that we cannot focus on and hear and heed the still, small voice that is available to guide each of us with our own challenges today.” (Dallin H. Oaks)

When we allow some moments of our life to be quiet, peaceful moments, God can speak to our hearts through the Holy Spirit. My prayers are best when I take more time to listen in between what I say. I sometimes feel prompted to pray for something I hadn’t previously considered. We might pray for A, B, C. God may actually want to give us B, C, D, E, F, G, H. If we don’t listen, we may miss those extra things He wants to give.

Dallin H. Oaks: Focus and Priorities

We have thousands of times more available information than Thomas Jefferson or Abraham Lincoln. Yet which of us would think ourselves a thousand times more educated or more serviceable to our fellowmen than they? The sublime quality of what these two men gave to us–including the Declaration of Independence and the Gettysburg Address–was not attributable to their great resources of information, for their libraries were comparatively small by our standards. Theirs was the wise and inspired use of a limited amount of information.

The truck story, ibid.:

Two men formed a partnership. They built a small shed beside a busy road. They obtained a truck and drove it to a farmer’s field, where they purchased a truckload of melons for a dollar a melon. They drove the loaded truck to their shed by the road, where they sold their melons for a dollar a melon. They drove back to the farmer’s field and bought another truckload of melons for a dollar a melon. Transporting them to the roadside, they again sold them for a dollar a melon. As they drove back toward the farmer’s field to get another load, one partner said to the other, “We’re not making much money on this business, are we?” “No, we’re not,” his partner replied. “Do you think we need a bigger truck?”

We don’t need a bigger truckload of information, either. Like the two partners in my story, our biggest need is a clearer focus on how we should value and use what we already have.

Because of modern technology, the contents of huge libraries and other data resources are at the fingertips of many of us. Some choose to spend countless hours in unfocused surfing the Internet, watching trivial television, or scanning other avalanches of information. But to what purpose? Those who engage in such activities are like the two partners in my story, hurrying to and fro, hauling more and more but failing to grasp the essential truth that we cannot make a profit from our efforts until we understand the true value of what is already within our grasp.

How to Password Protect Redmine with Apache, mod_perl, and Redmine.pm

Today I needed to password-protect a Redmine installation. I’ve typically used mod_auth_mysql for similar projects, but Redmine uses a salted password format that’s incompatible with mod_auth_mysql. So, I turned to Apache/Perl authentication, a first for me (I rarely touch Perl) and was able to make it work.

  1. Install mod_perl, and the DBI, MySQL, and Digest (SHA1) Perl modules.
    $ apt-get install libapache-dbi-perl libapache2-mod-perl2 libdbd-mysql-perl libdigest-sha1-perl
    
  2. Copy Redmine.pm to the appropriate Perl location.
    $ cd /path/to/redmine
    $ mkdir -p /usr/lib/perl5/Apache/Authn
    $ cp extra/svn/Redmine.pm /usr/lib/perl5/Apache/Authn/
    
  3. Perhaps I’m not using Redmine’s projects/members/permissions correctly, but I had to patch Redmine.pm to get it to work for me. I greatly simplified the SQL statement used to authenticate a user. There’s no sense of permissions; it’s simply a yes/no for authenticated users.
    --- Redmine.pm	2011-11-12 17:33:10.000000000 -0700
    +++ Redmine.richardkmiller.pm	2011-11-12 17:37:26.000000000 -0700
    @@ -148,16 +148,11 @@
       my ($self, $parms, $arg) = @_;
       $self->{RedmineDSN} = $arg;
       my $query = "SELECT 
    -                 hashed_password, salt, auth_source_id, permissions
    -              FROM members, projects, users, roles, member_roles
    +                 hashed_password, salt
    +              FROM users
                   WHERE 
    -                projects.id=members.project_id
    -                AND member_roles.member_id=members.id
    -                AND users.id=members.user_id 
    -                AND roles.id=member_roles.role_id
    -                AND users.status=1 
    -                AND login=? 
    -                AND identifier=? ";
    +                    users.status=1 
    +                AND login=?";
       $self->{RedmineQuery} = trim($query);
     }
     
    @@ -336,11 +331,12 @@
       }
       my $query = $cfg->{RedmineQuery};
       my $sth = $dbh->prepare($query);
    -  $sth->execute($redmine_user, $project_id);
    +  $sth->execute($redmine_user);
     
       my $ret;
    -  while (my ($hashed_password, $salt, $auth_source_id, $permissions) = $sth->fetchrow_array) {
    -
    +  while (my ($hashed_password, $salt) = $sth->fetchrow_array) {
    +      my $permissions = ":commit_access";
    +      my $auth_source_id = 0;
           unless ($auth_source_id) {
     	  			my $method = $r->method;
               my $salted_password = Digest::SHA1::sha1_hex($salt.$pass_digest);
    
  4. Configure and restart Apache.
    <virtualhost *:80>
        ServerName example.com
        DocumentRoot "/var/www/sites/example.com/public"
        RailsEnv production
    
        PerlLoadModule Apache::Authn::Redmine
    
        <directory "/var/www/sites/example.com/public">
            AuthType basic
            AuthName "Private Area"
            Require valid-user
            PerlAccessHandler Apache::Authn::Redmine::access_handler
            PerlAuthenHandler Apache::Authn::Redmine::authen_handler
            RedmineDSN "DBI:mysql:database=my_database;host=localhost"
            RedmineDbUser my_db_user
            RedmineDbPass my_db_password
        </directory>
    </virtualhost>
    

By the way, I’m running Ubuntu 11.10 (oneiric), Apache 2.2, MySQL 5.1, and Redmine 1.2.2.

Capitalism is pro-markets; corporatism is pro-business

I can empathize with the Occupy Wall Street protestors, but my perception is that many of them misunderstand the cause of their pain. They naively blame capitalism; they should blame corporatism.

Corporatism is the alliance of government and business. It happens on the left (think Solyndra), and on the right (think military-industrial complex), in the Federal government (think bipartisan bailout of GM) and in local government (think Utah naming April 5, 2010 “Cafe Rio day”.)

Corporatism is pro-business. Specific businesses get government subsidies, above-market-rate contracts, or special recognition.

Capitalism is pro-market. The consumer decides whether to favor GM or Ford; Cafe Rio, Costa Vida, Bajio, or Chipotle.

I loved Phil Windley’s post today on how Occupy Wall Street and the Tea Party, though they seem like polar opposites, actually share a disdain of corporatism and ought to work together to fight it.

Image source: James Sinclair

Script to enable/disable SOCKS proxy on Mac OS X

I’m working in a coffee shop today. I used SSH and SOCKS to browse the Internet securely, but today I decided to take it a step further and automate the process with a shell script. Here’s the script, for what it’s worth:

#!/bin/bash
disable_proxy()
{
        networksetup -setsocksfirewallproxystate Wi-Fi off
        networksetup -setsocksfirewallproxystate Ethernet off
        echo "SOCKS proxy disabled."
}
trap disable_proxy INT

networksetup -setsocksfirewallproxy Wi-Fi 127.0.0.1 9999
networksetup -setsocksfirewallproxy Ethernet 127.0.0.1 9999
networksetup -setsocksfirewallproxystate Wi-Fi on
networksetup -setsocksfirewallproxystate Ethernet on
echo "SOCKS proxy enabled."
echo "Tunneling..."
ssh -ND 9999 MYHOST.macminicolo.net

Instructions:

  1. Save this to a file. I saved it to “/Users/richard/bin/ssh_tunnel”.
  2. Make it executable and run it.
    $ chmod a+x /Users/richard/bin/ssh_tunnel
    $ /Users/richard/bin/ssh_tunnel
    
  3. It creates an SSH tunnel to my dedicated server at macminicolo.net and routes Internet traffic through that server.
  4. Hit Control-C to quit. The proxy is disabled. No need to fiddle with Network Preferences manually.

UPDATE March 18, 2011: I haven’t tried it, but Sidestep appears to be a free Mac OS X app that will enable SSH tunneling automatically when you connect to an insecure network.

Script to enable/disable DMZ on Linksys and Verizon routers

Your home Internet router gives you some protection against direct attacks on your computer by keeping your home network safely encapsulated. Each of your home computers can access the Internet (this is called NAT), but no outsider can access your computers directly. Outsiders only see the router. However, sometimes you want your computer to be “fully” online. Enter the “DMZ” feature of your router. Your router’s DMZ allows one of your computers to be fully exposed to the Internet (for better or worse).

Reasons to enable your DMZ:

  • Access your files while away from home.
  • Serve web pages from your computer.
  • Make BitTorrent transfers faster. BitTorrent transfers are usually faster when your computer is directly exposed to the Internet.

For my work at FamilyLink.com, I develop directly on my local machine. While working on our Facebook application, I need to allow Facebook servers to directly access my machine. (When you use a Facebook app, you’re accessing Facebook’s servers and Facebook servers are, in turn, accessing the developer’s server via a callback URL. While working on our Facebook app, Facebook directly accesses my local machine.) This requires me to open my machine to the DMZ.

Reasons not to enable your DMZ:

  • Your computer is more likely to be hacked
  • Your private data is more likely to be accessed

If you enable your DMZ, know which services are enabled on your machine and which files and data are being shared. There may be files you’re comfortable sharing on your local network that you wouldn’t want to share with the world. Only enable the DMZ as long as necessary.

Enabling the DMZ can be a pain — logging into your router and navigating to the correct setting — so I wrote the following Ruby scripts to make it easy. The first worked with the Linksys router I had. (I believe it was a WRT54G.) To use, fill in your router’s IP address and password, and your computer’s hardware address, then type “linksys_dmz.rb on” or “linksys_dmz.rb off” at the command-line. The script looks up your computer’s hardware address in the table of local IP addresses so the IP address can safely change from time to time.

#!/usr/bin/env ruby
# linksys_dmz.rb

router = '10.1.1.1'
user = 'admin'
pass = 'your_password'
hardware_address = '00:23:6C:00:00:00'

leases = `curl -su #{user}:#{pass} http://#{router}/DHCPTable.asp`
leases.scan(%r{'([^']+)', hardware_address}) do |m|
  ip_address = m[0].strip.to_s
  last_digit = ip_address.split('.').last
  if $*[0] == 'open' || $*[0] == 'on'
    post_values = "submit_button=DMZ&change_action=&action=Apply&dmz_enable=1&dmz_ipaddr=#{last_digit}"
    print "Opening DMZ to #{ip_address}\n\n"
  else
    post_values = "submit_button=DMZ&change_action=&action=Apply&dmz_enable=0"
    print "Closing DMZ\n\n"
  end
  `curl -su #{user}:#{pass} -e http://#{router}/DMZ.asp -d '#{post_values}' http://#{router}/apply.cgi`
end

Last year I switched to Verizon FIOS, which came with its own wireless router, so I had to write a new script. Again, fill in the password, then type “verizon_dmz.rb on” or “verizon_dmz.rb off” in Terminal. (This script assumes a 10.1.1.* network. Change it to 192.168.1.* if that’s what you have.)

As a side note, the Verizon router was a bit of beast to automate. It uses a hashed signature to try to enforce JavaScript-enabled browsers. Writing this script required using TamperData, Charles Proxy, and a lot of trial and error to discover which POST data were necessary.

I use this script to open the DMZ before working on our Facebook app, then I close it when I’m done for the day. Eventually, it’d be nice to find a way to enable the DMZ remotely — maybe via email or something.

#!/usr/bin/env ruby
# verizon_dmz.rb

require 'rubygems'
require 'mechanize'
require 'digest/md5'

user = 'admin'
pass = 'your_password'

localhost = `ifconfig`.scan(/inet (\d+\.\d+\.\d+\.\d+).*broadcast 10.1.1.255/).join
router    = localhost.gsub(/\d+$/,'1')

begin
    agent = Mechanize.new
    page = agent.get("http://#{router}:81")
rescue Exception
    abort "Unable to connect to Verizon Router! Check the IP address."
end

form = page.forms[0]
auth_key = form.fields.find {|f| f.name == 'auth_key'}.value
form.fields.find {|f| f.name == 'user_name'}.value = user
form.fields.find {|f| f.name == 'md5_pass'}.value = Digest::MD5.hexdigest(pass + auth_key)
form.fields.find {|f| f.name == 'mimic_button_field'}.value = 'submit_button_login_submit%3A+..'
form.method = "POST"
form.submit

post = {
    'dmz_host_cb_watermark' => '1',
    'dmz_host_ip0' => localhost.split('.')[0],
    'dmz_host_ip1' => localhost.split('.')[1],
    'dmz_host_ip2' => localhost.split('.')[2],
    'dmz_host_ip3' => localhost.split('.')[3],
    'active_page'  => '9013',
    'mimic_button_field' => 'submit_button_login_submit%3A+..',
}

if $*[0] == 'open' || $*[0] == 'on'
   post['dmz_host_cb'] = '1'
   puts "Opening DMZ to #{localhost}"
else
    puts "Closing DMZ"
end

agent.post('/index.cgi', post)