From: Peter Olcott on

"Joseph M. Newcomer" <newcomer(a)flounder.com> wrote in
message news:4ff9r5ltn625v5977frmcq84984n1iklga(a)4ax.com...
> See below...
> On Wed, 31 Mar 2010 10:58:24 -0500, "Peter Olcott"
> <NoSpam(a)OCR4Screen.com> wrote:
>

>>If the only thing that I must insure does not occur is
>>that
>>the customer is not charged for a transaction that did not
>>complete, this simplifies the design.
> ****
> And a belieft that email is reliable (in spite of the
> overwhelming evidence that it is
> not) solves this how?

I asked if email at least had verifiable reliability and no
one answered. I could do on-the-fly off-site backups of
every transaction by email.

> Better to simply credit the account and drop the
> transaction. If
> they want it, they'll submit again, knowing the
> uncompleted transaction had been credited
> to their account.

I don't know maybe. I will await the critique of my current
much more refined IPC design. It still may be full of holes,
but, the holes would be much smaller now.

>
> Never mind, I just answered how: a "belief" is good
> enough, facts don't actually matter.
> ****
>>For every complex set
>>of issues there is always a way to minimize the effective
>>complexity.
> ****
> "For any problem, there is a solution that is simple,
> obvious, and wrong".
> -- H.L. Mencken
> ****
>>
>>One thing that I need to know hopefully without the need
>>to
>>read a 1,000 page book first, Is there any way that the
>>sender of an email message can automatically confirm that
>>an
>>email was received. This is one of the questions that I
>>know
>>needs to be answered and if no one else is helpful on this
>>I
>>will eventually find it elsewhere.
> ****
> Did you read Hector's message explaining email
> acknowledgements? Turns out that an
> acknowledgement of receipt has value to spammers, which is
> why an ISP is now permitted to
> acknowledge receipt and discard the message, at any stage
> along the way.

I put Hector on the blocker sender list for a while. His
rudeness went beyond a tolerable threshold. So your comment
is vague. Are all emails acknowledged as received or not?

>>
>>If email has precisely measurable reliability, then on the
>>fly backups of transaction details can be made.
> ****
> Outlook has a feature to acknowledge to the sender when an
> email is read, and the first
> thing any intelligent person does is turn off the feature
> that says "inform the sender
> when I have read this message". We call it "invasion of
> privacy"

I am not talking about whether they read it or not. I am not
concerned with that. If they pay me some money to ship a
package and the package arrives, then my obligation is done,
even if they never open the package.

>
> I have no idea what you mean by "precisely measurable
> reliability"

Is there any sort of hand-shaking protocol such that all
emails are explicitly acknowledged as received by the
receiving ISP? Even if email itself is very unreliable, as
long as it always reports its own failure to deliver, then
we have one aspect of precisely measurable reliability.

> and what this has to do
> with anything real. For example, suppose I told you "I
> have precisely measured the
> reliability, and the probability your message is actually
> received is 0.48�0.02. That is
> *precise* but it does not solve your problem, because it
> says that there is less than a
> 50% probability that your email will be received. You
> have apparently confused "precisely
> measurable" with "100% probability". And notice 100%
> probability is not the same as
> saying there can be no failure (if you don't believe this,
> a remedial course in statistics
> would be necessary).
>
> To me, the only reliable mechanism is to drop the
> transaction, but credit the account. The
> belief that there is a reliable "callback" mechanism is
> ill-founded and I would not use
> anything that was not completely guaranteed to be correct.
> Crediting the account can be
> made completely reliable, as long as you are using a
> transacted database to record the
> transactions you are charging for (this is why transacted
> databases were created!)
> ****

I don't know maybe. Since all users will also have the
results of their transaction posted to their user account,
and I won't know that the connection is dropped until the
most expensive part of the processing is completed, I might
not do it this way. The nest time that the user logs in, I
would inform them of these results, and provide a link to
get these results. If the connection is dropped, they would
have to log in again to try to repeat the original
transaction.

>>
>>> Corollary: this system will be such a finacial success
>>> (at
>>> $0.10/transaction) that he will
>>> soon have unlimited funds to hire people to solve all
>>> the
>>> very real problems he has been
>>> ignoring. [He even said so!]
>>
>>It is not a matter of counting my chickens before they
>>hatch, it is a matter of simple arithmetic. The minimal
>>system will be able to handle at least 10 transactions per
>>second. (With the redesign it is looking more like 100 per
>>second now). I will have to have sufficient load on my
>>system before upgrading it is justified. There is no sense
>>upgrading a system for much better performance if peak
>>load
>>it is only at 1% of capacity. This 1% of capacity produces
>>a
>>dime a second. Even an huge degree of difference between
>>peak load and average load should not change this overall
>>evaluation much. Whenever I do need to upgrade beyond a
>>single core processor, I will be able to afford it, and it
>>looks like a long time before I will need to upgrade.
> ****
> I can handle X number of transactions per second, and
> therefore people will actually
> engage in enough of a percentage of X number of
> transactions per second to generate
> significant revenue.
>
> Capacity is not utilization.
>
> If I build a grocery store, put 22 checkout lanes in it,
> populate them with 22 cashiers, I
> will not survive if the average purchase is $2.00 each
> from 40 customers a day.
>
> I've had business plans I worked on (and I was not the
> principal of the company) turned
> down because the plan did not demonstrate that the
> expected income could be realized. As
> a sanity check, get a real financial expert to review the
> business plan for feasibility.
> They will ask some important questions, and handwaves will
> not suffice for answers. In
> fact, I believe that the banks and venture capitalists
> were justified in turning down our
> business proposals because those proposals were weak in
> how the technology would be turned
> into revenue. In later years, we got better at writing
> proposals. Then both of us
> decided we no longer had the energy to do a startup (by
> the time you hit 55, the ability
> to pull 80-hour weeks decreases, as does the motivation.
> If you look at your finances and
> say "I could retire, comfortably, now, or I could do a
> startup" the choice gets easy after
> age 55. It doesn't mean I haven't learned a lot in trying
> to do thos startups between age
> 35 and 55. We would come up with a new idea every 2-3
> years.
> *****
>>
>>>
>>> One thing I learned being self-employed: every expense
>>> turns out to be expressible
>>> precisely in hours of my time. So to hire me for 1 hour
>>> will require 1,000 transactions.
>>> And I'm cheap (I've been told I consistently underprice
>>> myself). A full-time person
>>> requires about 2,500 transactions for every hour they
>>> work, so to support a full-time
>>> person requires 1370 transactions every day, 57
>>> transactions/hour EVERY HOUR OF EVERY DAY
>>> just to break even. That's a little under 1/minute
>>
>>Right and the cheap single core processor can do 100 per
>>second, so there is a much greater chance that I would
>>hire
>>you or someone else than there is that I would need to
>>upgrade beyond a single core, thus all this talk about
>>multiple threads or multiple processes is not really
>>cost-effective for me right now.
> ****
> I'm glad that you know that. It is important to know
> cost-effectiveness of solutions.
> joe
> ****
>>
>
> Joseph M. Newcomer [MVP]
> email: newcomer(a)flounder.com
> Web: http://www.flounder.com
> MVP Tips: http://www.flounder.com/mvp_tips.htm


From: Joseph M. Newcomer on

See below...
On Thu, 1 Apr 2010 12:50:02 -0500, "Peter Olcott" <NoSpam(a)OCR4Screen.com> wrote:

>
>"Joseph M. Newcomer" <newcomer(a)flounder.com> wrote in
>message news:4ff9r5ltn625v5977frmcq84984n1iklga(a)4ax.com...
>> See below...
>> On Wed, 31 Mar 2010 10:58:24 -0500, "Peter Olcott"
>> <NoSpam(a)OCR4Screen.com> wrote:
>>
>
>>>If the only thing that I must insure does not occur is
>>>that
>>>the customer is not charged for a transaction that did not
>>>complete, this simplifies the design.
>> ****
>> And a belieft that email is reliable (in spite of the
>> overwhelming evidence that it is
>> not) solves this how?
>
>I asked if email at least had verifiable reliability and no
>one answered. I could do on-the-fly off-site backups of
>every transaction by email.
****
The reason no one answered is there IS no "verified reliability", in fact, the only thing
we CAN verify is that it is NOT reliable!
>
>> Better to simply credit the account and drop the
>> transaction. If
>> they want it, they'll submit again, knowing the
>> uncompleted transaction had been credited
>> to their account.
>
>I don't know maybe. I will await the critique of my current
>much more refined IPC design. It still may be full of holes,
>but, the holes would be much smaller now.
****
I've not see the "refined" IPC design, so I cannot ocmment on it.
***
>
>>
>> Never mind, I just answered how: a "belief" is good
>> enough, facts don't actually matter.
>> ****
>>>For every complex set
>>>of issues there is always a way to minimize the effective
>>>complexity.
>> ****
>> "For any problem, there is a solution that is simple,
>> obvious, and wrong".
>> -- H.L. Mencken
>> ****
>>>
>>>One thing that I need to know hopefully without the need
>>>to
>>>read a 1,000 page book first, Is there any way that the
>>>sender of an email message can automatically confirm that
>>>an
>>>email was received. This is one of the questions that I
>>>know
>>>needs to be answered and if no one else is helpful on this
>>>I
>>>will eventually find it elsewhere.
>> ****
>> Did you read Hector's message explaining email
>> acknowledgements? Turns out that an
>> acknowledgement of receipt has value to spammers, which is
>> why an ISP is now permitted to
>> acknowledge receipt and discard the message, at any stage
>> along the way.
>
>I put Hector on the blocker sender list for a while. His
>rudeness went beyond a tolerable threshold. So your comment
>is vague. Are all emails acknowledged as received or not?
****
Sorry you missed his detailed reply. I see no reason to repeat it here. The truth is
that some server feel free to send a positive acknowledgement before they apply anti-spam
rules, so essentially any positive acknowledgement merely states that somewhere along the
line, SOMEBODY "received" it; whether or not it go DELIVERED is not specified!
****
>
>>>
>>>If email has precisely measurable reliability, then on the
>>>fly backups of transaction details can be made.
>> ****
>> Outlook has a feature to acknowledge to the sender when an
>> email is read, and the first
>> thing any intelligent person does is turn off the feature
>> that says "inform the sender
>> when I have read this message". We call it "invasion of
>> privacy"
>
>I am not talking about whether they read it or not. I am not
>concerned with that. If they pay me some money to ship a
>package and the package arrives, then my obligation is done,
>even if they never open the package.
****
If I don't receive a package, I question the validity of the charge. The fact that the
package was lost along the way is not my concern, nor is the allegation that you sent it
matter in the slightest if I did not receive it. My receipt is the ONLY thing that
matters, and you cannot guarantee that.
****
>
>>
>> I have no idea what you mean by "precisely measurable
>> reliability"
>
>Is there any sort of hand-shaking protocol such that all
>emails are explicitly acknowledged as received by the
>receiving ISP? Even if email itself is very unreliable, as
>long as it always reports its own failure to deliver, then
>we have one aspect of precisely measurable reliability.
***
Read Hector's reply. I'm sure you can find it in the archives. It was very detailed.

From a network perspective, email is an "unreliable" transport mechanism.

****
>
>> and what this has to do
>> with anything real. For example, suppose I told you "I
>> have precisely measured the
>> reliability, and the probability your message is actually
>> received is 0.48�0.02. That is
>> *precise* but it does not solve your problem, because it
>> says that there is less than a
>> 50% probability that your email will be received. You
>> have apparently confused "precisely
>> measurable" with "100% probability". And notice 100%
>> probability is not the same as
>> saying there can be no failure (if you don't believe this,
>> a remedial course in statistics
>> would be necessary).
>>
>> To me, the only reliable mechanism is to drop the
>> transaction, but credit the account. The
>> belief that there is a reliable "callback" mechanism is
>> ill-founded and I would not use
>> anything that was not completely guaranteed to be correct.
>> Crediting the account can be
>> made completely reliable, as long as you are using a
>> transacted database to record the
>> transactions you are charging for (this is why transacted
>> databases were created!)
>> ****
>
>I don't know maybe. Since all users will also have the
>results of their transaction posted to their user account,
>and I won't know that the connection is dropped until the
>most expensive part of the processing is completed, I might
>not do it this way. The nest time that the user logs in, I
>would inform them of these results, and provide a link to
>get these results. If the connection is dropped, they would
>have to log in again to try to repeat the original
>transaction.
****
This is a possible approach, as long as you can guarantee that this cannot fail.
joe
***
>

Joseph M. Newcomer [MVP]
email: newcomer(a)flounder.com
Web: http://www.flounder.com
MVP Tips: http://www.flounder.com/mvp_tips.htm
From: Liviu on
"Joseph M. Newcomer" <newcomer(a)flounder.com> wrote...
> On Wed, 31 Mar 2010 22:56:59 -0500, "Liviu" <lab2k1(a)gmail.c0m> wrote:
>>"Peter Olcott" <NoSpam(a)OCR4Screen.com> wrote...
>>>
>>> If you read much of the patent you would see that this is not the
>>> case.
>>
>>Oh, right... There is also the "store a DFA as a sparse matrix" thing.
> ****
> Back in 1982, I implemented a new kind of sparse matrix approach,
> "comb vectors", based on a research paper from the University of
> Karlsruhe, Karlsruhe, Germany, which outlined the algorithm. I'm not
> sure if Gerhod Goos was one of the authors or it was a set of his
> students; I no longer have the paper. But it "interlaces" the "holes"
> in a parse-table vector so that we got incredible density in the
> immense parse tables. I still have the code, but cannot release it.
> So recompaction of spare matrices was an idea that was well-understood
> in 1981 or so.

Sure was. I (used to) know a thing or two about sparse matrices back in
the early 80's, having done some research which involved resultants of
sparse polynomials. It was also obvious at the time that the more one
knew about particular "sparseness" characteristics of the matrix, the
more dramatic "compaction" could be achieved.

Unrelated (and this is no stab at P.O.) but the patent language in
general amuses me to no end with "de rigueur" convolutions like...

|| The term "Sparse Matrix" is taken to have the common meaning
|| of the term "Sparse" combined with the common computer science
|| meaning of the term "Matrix", a two dimensional array of elements.

> So it opens the issue about prior art on some of the compaction;
> I have not read the patent details soo I don't know if the compaction
> model differs from what I know to be past history, but I do know
> that DFA compaction is still patentable

I never disputed that point. As for his patent, on cursory reading it's
a combination between a fast DFA "exact pixel matching" recognition
(compare to: face tagging in photos, 100% accurate if one has a prior
database of the face at all sizes, angles, expressions, lighting etc)
and an idea that it could be somehow used for "remote control" of
another system (compare to: character-mode screen scraping and
keyboard control over a terminal session into a mainframe). I did not
mean to, and not going to, argue the merits, or the prior art doubts.
The point I tried to make a few times (too many) was that without
a viable implementation and/or business plan, the best of patents will
forever remain just a piece of paper to frame and hang on the wall.

Liviu


From: Peter Olcott on

"Joseph M. Newcomer" <newcomer(a)flounder.com> wrote in
message news:m0p9r5hovngicdjqipdojt9kkvt55sq9mo(a)4ax.com...
>
> See below...
> On Thu, 1 Apr 2010 12:50:02 -0500, "Peter Olcott"
> <NoSpam(a)OCR4Screen.com> wrote:
>
>>
>>"Joseph M. Newcomer" <newcomer(a)flounder.com> wrote in
>>message news:4ff9r5ltn625v5977frmcq84984n1iklga(a)4ax.com...
>>> See below...
>>> On Wed, 31 Mar 2010 10:58:24 -0500, "Peter Olcott"
>>> <NoSpam(a)OCR4Screen.com> wrote:
>>>
>>
>>>>If the only thing that I must insure does not occur is
>>>>that
>>>>the customer is not charged for a transaction that did
>>>>not
>>>>complete, this simplifies the design.
>>> ****
>>> And a belieft that email is reliable (in spite of the
>>> overwhelming evidence that it is
>>> not) solves this how?
>>
>>I asked if email at least had verifiable reliability and
>>no
>>one answered. I could do on-the-fly off-site backups of
>>every transaction by email.
> ****
> The reason no one answered is there IS no "verified
> reliability", in fact, the only thing
> we CAN verify is that it is NOT reliable!
>>
>>> Better to simply credit the account and drop the
>>> transaction. If
>>> they want it, they'll submit again, knowing the
>>> uncompleted transaction had been credited
>>> to their account.
>>
>>I don't know maybe. I will await the critique of my
>>current
>>much more refined IPC design. It still may be full of
>>holes,
>>but, the holes would be much smaller now.
> ****
> I've not see the "refined" IPC design, so I cannot ocmment
> on it.
> ***
>>
>>>
>>> Never mind, I just answered how: a "belief" is good
>>> enough, facts don't actually matter.
>>> ****
>>>>For every complex set
>>>>of issues there is always a way to minimize the
>>>>effective
>>>>complexity.
>>> ****
>>> "For any problem, there is a solution that is simple,
>>> obvious, and wrong".
>>> -- H.L. Mencken
>>> ****
>>>>
>>>>One thing that I need to know hopefully without the need
>>>>to
>>>>read a 1,000 page book first, Is there any way that the
>>>>sender of an email message can automatically confirm
>>>>that
>>>>an
>>>>email was received. This is one of the questions that I
>>>>know
>>>>needs to be answered and if no one else is helpful on
>>>>this
>>>>I
>>>>will eventually find it elsewhere.
>>> ****
>>> Did you read Hector's message explaining email
>>> acknowledgements? Turns out that an
>>> acknowledgement of receipt has value to spammers, which
>>> is
>>> why an ISP is now permitted to
>>> acknowledge receipt and discard the message, at any
>>> stage
>>> along the way.
>>
>>I put Hector on the blocker sender list for a while. His
>>rudeness went beyond a tolerable threshold. So your
>>comment
>>is vague. Are all emails acknowledged as received or not?
> ****
> Sorry you missed his detailed reply. I see no reason to
> repeat it here. The truth is
> that some server feel free to send a positive
> acknowledgement before they apply anti-spam
> rules, so essentially any positive acknowledgement merely
> states that somewhere along the
> line, SOMEBODY "received" it; whether or not it go
> DELIVERED is not specified!
> ****
>>
>>>>
>>>>If email has precisely measurable reliability, then on
>>>>the
>>>>fly backups of transaction details can be made.
>>> ****
>>> Outlook has a feature to acknowledge to the sender when
>>> an
>>> email is read, and the first
>>> thing any intelligent person does is turn off the
>>> feature
>>> that says "inform the sender
>>> when I have read this message". We call it "invasion of
>>> privacy"
>>
>>I am not talking about whether they read it or not. I am
>>not
>>concerned with that. If they pay me some money to ship a
>>package and the package arrives, then my obligation is
>>done,
>>even if they never open the package.
> ****
> If I don't receive a package, I question the validity of
> the charge. The fact that the
> package was lost along the way is not my concern, nor is
> the allegation that you sent it
> matter in the slightest if I did not receive it. My
> receipt is the ONLY thing that
> matters, and you cannot guarantee that.
> ****
>>
>>>
>>> I have no idea what you mean by "precisely measurable
>>> reliability"
>>
>>Is there any sort of hand-shaking protocol such that all
>>emails are explicitly acknowledged as received by the
>>receiving ISP? Even if email itself is very unreliable, as
>>long as it always reports its own failure to deliver, then
>>we have one aspect of precisely measurable reliability.
> ***
> Read Hector's reply. I'm sure you can find it in the
> archives. It was very detailed.
>
> From a network perspective, email is an "unreliable"
> transport mechanism.
>
> ****
>>
>>> and what this has to do
>>> with anything real. For example, suppose I told you "I
>>> have precisely measured the
>>> reliability, and the probability your message is
>>> actually
>>> received is 0.48�0.02. That is
>>> *precise* but it does not solve your problem, because it
>>> says that there is less than a
>>> 50% probability that your email will be received. You
>>> have apparently confused "precisely
>>> measurable" with "100% probability". And notice 100%
>>> probability is not the same as
>>> saying there can be no failure (if you don't believe
>>> this,
>>> a remedial course in statistics
>>> would be necessary).
>>>
>>> To me, the only reliable mechanism is to drop the
>>> transaction, but credit the account. The
>>> belief that there is a reliable "callback" mechanism is
>>> ill-founded and I would not use
>>> anything that was not completely guaranteed to be
>>> correct.
>>> Crediting the account can be
>>> made completely reliable, as long as you are using a
>>> transacted database to record the
>>> transactions you are charging for (this is why
>>> transacted
>>> databases were created!)
>>> ****
>>
>>I don't know maybe. Since all users will also have the
>>results of their transaction posted to their user account,
>>and I won't know that the connection is dropped until the
>>most expensive part of the processing is completed, I
>>might
>>not do it this way. The nest time that the user logs in, I
>>would inform them of these results, and provide a link to
>>get these results. If the connection is dropped, they
>>would
>>have to log in again to try to repeat the original
>>transaction.
> ****
> This is a possible approach, as long as you can guarantee
> that this cannot fail.
> joe
> ***

That mostly depends upon the quality of my IPC design. I
posted this in the Unix/Linux/Threads groups because this
design depends on features of the Unix/Linux OS.

Basically it has two named pipes that form the FIFO Queue,
and both of these coordinate through a single binary file
with fixed length records, that forms the transaction log.
It requires two named pipes one for each direction of
communication. The web server uses one pipe provide
transactions to the OCR process. The OCR process uses the
other pipe to inform the web server that one transaction has
been processed.

As soon as a web request is made it is written to the log
file, and then to the FIFO Queue connected to the OCR
process. The OCR process then updates the transaction log
status to [Being Processed].

The log file keeps track of all of the transaction details,
and has three flags:
0=Available for Processing
1=Being Processed
2=Processing is Completed

As soon as a web request has completed processing, the
transaction log status is updated to [Processing is
Completed], and a message is written to the FIFO Queue
connected to the web server.

Unix/Linux guarantees that appends to files is an atomic
operation, and provides pread() and pwrite() that perform a
seek and then a read or write as a single atomic operation.
The log file is the persistent storage and serves many
purposes.

>>
>
> Joseph M. Newcomer [MVP]
> email: newcomer(a)flounder.com
> Web: http://www.flounder.com
> MVP Tips: http://www.flounder.com/mvp_tips.htm


From: Hector Santos on
Peter Olcott wrote:

>> And a belieft that email is reliable (in spite of the
>> overwhelming evidence that it is
>> not) solves this how?
>
> I asked if email at least had verifiable reliability and no
> one answered.


Thats because you were not listening again.

> I put Hector on the blocker sender list for a while. His
> rudeness went beyond a tolerable threshold. So your comment
> is vague.


Joe thinks you are STUPID too! If fact, I wouldn't be off base the
whole group knows you are stupid!

> Are all emails acknowledged as received or not?


YES all of them. Email is always accepted. You can rest assured in
your patent, trade secrets and business plan, that you can guarantee a
fault tolerance email contact system with your customers so that you
don't have to give refunds in your fictitious wish list product line.

>> ****
>> Outlook has a feature to acknowledge to the sender when an
>> email is read, and the first
>> thing any intelligent person does is turn off the feature
>> that says "inform the sender
>> when I have read this message". We call it "invasion of
>> privacy"
>
> I am not talking about whether they read it or not. I am not
> concerned with that. If they pay me some money to ship a
> package and the package arrives, then my obligation is done,
> even if they never open the package.


Do you won't offer a federal required return policy? But you will
never have that problem

>> I have no idea what you mean by "precisely measurable
>> reliability"
>
> Is there any sort of hand-shaking protocol such that all
> emails are explicitly acknowledged as received by the
> receiving ISP? Even if email itself is very unreliable, as
> long as it always reports its own failure to deliver, then
> we have one aspect of precisely measurable reliability.


No such thing - PATENT IT!

>> To me, the only reliable mechanism is to drop the
>> transaction, but credit the account. The
>> belief that there is a reliable "callback" mechanism is
>> ill-founded and I would not use
>> anything that was not completely guaranteed to be correct.
>> Crediting the account can be
>> made completely reliable, as long as you are using a
>> transacted database to record the
>> transactions you are charging for (this is why transacted
>> databases were created!)
>> ****


> I don't know maybe. Since all users will also have the
> results of their transaction posted to their user account,
> and I won't know that the connection is dropped until the
> most expensive part of the processing is completed,


HA! No drop connection detection

I might
> not do it this way. The nest time that the user logs in, I
> would inform them of these results, and provide a link to
> get these results. If the connection is dropped, they would
> have to log in again to try to repeat the original
> transaction.


That will work! Your prices will include surcharge for Peter errors!

--
HLS