Friday, December 30, 2005

Get to know Ruby before you hop on (or off) the Rails bandwagon

Andrew Glover

Ruby's syntax is different from that of the Java language. First, Ruby has no brackets or semicolons, and it makes types completely optional. Some might say that Ruby's syntax is terse, and it's that way with a purpose : this language lets you create concise working code in short order.


Andrew Glover is Chief Technology Officer for JNet Direct

I would be interested in hearing from my developer readers what they think of Glover’s article.

Bringing the test drive to software

The free sample, or test drive, is a very powerful tool in the sales cycle. Until recently it simply was not practical for software. Now some companies have begun to offer thirty-day trials of their software. Codign has been offering a trial version of its code testing plug-in, CoView.

I will be interested in watching how this approach works. Much of the cost of software is associated with the installation and training requirements, so a free trial only solves part of the problem. Still, I think free trials will become part of almost every sales cycle.

Edit-
Testing is important, automatically generating JUnit tests is magical

Thursday, December 29, 2005

Are you sure you want your name on this?

U.S. stalls on human trafficking

WASHINGTON - Three years ago, President Bush declared that he had "zero tolerance" for trafficking in humans by the government's overseas contractors, and two years ago Congress mandated a similar policy.

But notwithstanding the president's statement and the congressional edict, the Defense Department has yet to adopt a policy to bar human trafficking.

A proposal prohibiting defense contractor involvement in human trafficking for forced prostitution and labor was drafted by the Pentagon last summer, but five defense lobbying groups oppose key provisions and a final policy still appears to be months away, according to those involved and Defense Department records.

The lobbying groups opposing the plan say they're in favor of the idea in principle, but said they believe that implementing key portions of it overseas is unrealistic. They represent thousands of firms, including some of the industry's biggest names, such as DynCorp International and Halliburton subsidiary KBR, both of which have been linked to trafficking-related concerns.


Are you sure you want to go on the record as saying your client can’t reasonably be asked to fulfill their contract without resorting to kidnap and slave labor? Do you think that simply because Congress does not write such a ban into policy that such practices are less criminal?

Part of being a good lobbyist is explaining the facts of PR and political life to your client. If your client is such that they don’t understand that human trafficking is a line that can never be crossed, your have your work cut out for you.

What is Ruby?

Serge van den Oever

Never heard of Ruby? Its that new hot language that is at the tipping point of blowing away all existing languages;-)

Read about it at http://ruby-lang.org, and of course don’t forget the great Ruby on Rails framework at http://www.rubyonrails.org that lets you build a data driven, Ajax style web site garanteed under 15 minutes. And the book “Agile web development with Rails” is absolutely a great reading.


What’s Ruby?

Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, extensible, and portable.

Oh, I need to mention, it's totally free, which means not only free of charge, but also freedom to use, copy, modify, and distribute it.


User Groups

Adam’s Morgan Ruby User Group

DC Area Group

Northern Virginia Ruby Users Group

Ruby Garden Wiki

Yet another local .Net blog

Jonathan Cogley tells us that John Morales is blogging.

Wednesday, December 28, 2005

But not nearly as photogenic as Lassie

Bomb-Sniffing Wasps

Why government contracting is different, or why it may be a while before anyone else crosses Microsoft

Mass. CIO Peter Quinn resigns

Massachusetts CIO Peter Quinn, a leader among state IT officers in the push towards open data standards, unexpectedly resigned this week.

... The CIO came under fire during the later stages of 2005. Earlier this year the state senate launched hearings into what it called a lack of due process within the state’s IT division, and is now considering the creation of an IT review board to oversee state policies on the standardization of IT equipment and software.

This fall, Gov. Romney opened a review of six trips Quinn made to out-of-state conferences over the last two years.

The review found that Quinn had not violated any conflict of interest provisions, the Boston Globe reported.


Massachusetts mandates open-format docs

Government procurement, why it’s different

Massachusetts flips, sides with Microsoft

Steven J. Vaughan-Nichols comments.

Tuesday, December 27, 2005

The Second International Conference on Open Source Systems

8 - 10 June 2006, Grand Hotel, Como, Italy

Call for Papers, Workshops, Tutorials, Panels and Demonstrations

Free and Open Source Software (OSS) development continues to emerge, grow, and spread as a global phenomenon that spans and connects culture, technology, and organization. OSS is one of the most exciting and controversial technologies of modern times that is stimulating scholarly research and popular debate in many disciplines. OSS research studies are now found in diverse disciplines including anthropology, economics, education, law, management of technology, organization science, political science, public policy, sociology, and the visual and performing arts, as well as computer supported cooperativework, human-computer interaction, information systems, and software engineering. Such diversity gives rise to recognizing OSS as an interdisciplinary information technology that both depends on and stimulates social relationships in the organizations and project communities that develop, deploy, and adapt OSS.

The goal of OSS2006 is to provide an international forum where a diverse audience of OSS researchers and practitioners can come together to examine the culture, technology, and organization of OSS systems, work practices, development processes, community dynamics, tools and applications.

OSS2006 will bring together people from academia, industry, and public administration to share their experiences, ideas, and concerns, as well as provide an archival source of important papers addressing OSS topics within or across disciplines. The conference will consist of research papers presentations, workshops, tutorials, panels, and project demonstrations.

Important dates:

Research Paper and Extended Abstracts Submission: Jan 9th, 2006
Proposals for Tutorials, Workshops, Panels and Demonstrations: Jan 23rd, 2006
Notification of acceptance: Feb 20th, 2006
Submission of final papers: Mar 13th, 2006


For my developer, project manager and systems integrator readers.

Monday, December 26, 2005

Measuring PR

Shel Holtz tells us the New PR Wiki has a measurement page.

Blogs, more work, more opportunity

Shrinking News Holes Make it Tougher for Mid-Level Companies

Media targeting has long been the name of the game for many mid-level corporations, as a specific placement in regional dailies can pay off as much as the national dailies. But shrinking newsrooms and news holes, and an increasing number of mid-level corporations, has even made this a tough placement to gain.

... Beyond mainstream pitching techniques, Braykovich also points to the importance of utilizing emerging forms of media. "We do monitor numerous blogs, notably, blogs providing news about regional companies or issues. Influencing the influencers and pitching your news to bloggers is another, albeit less direct, manner of reaching our newsroom."


The media food chain has been extended. On the one hand, it will be increasingly necessary to launch a story from blogs before you even pitch to mass-market media. On the other hand, there are millions of blogs and more each day; the possibility to place a story is greater than ever.

Good news for bloggers

'Wash Post' Extends Free Online Archives to 60 Days

It used to be a story that ran one day would only generate one day’s worth of advertising dollars. Now a story you ran two months ago can still be generating paid links. Online content will be very profitable for those who understand online conversations.

And in a moment, 216,000 were gone

World marks tsunami anniversary

The South-East Asia Earthquake and Tsunami Blog

It must take a lot of courage to go forward in the face of that sort of grief.

Thursday, December 22, 2005

International Association of Software Architects Launches

Loosely Coupled Thinking links to my client IASA and describes it thusly:

IASA is a vendor agnostic, non-profit organization focused on defining and supporting the professional duties of IT architects.


From the news release:

The new website was created expressly for professional software architects and aims to assist them at all stages of their career by providing articles, reusable content and chapter pages for local IASA chapters around the world.

Paul Preiss, the President and Founder of IASA, describes why the online resource is a necessary addition to the industry:

"Most articles, templates and patterns are written with the developer in mind. The IT architect is completely left out of the equation. Thus the IASA provides this valuable resource to our members."

Architecture related news, patterns, templates and web log postings from practincing architects will make up most of the content of the new website. Visitors will also find Knowledge Communities, which are pools of knowledge on specific IT architecture topics, edited by the experts in the field.


Edit-
Phil Windley comments.
Cirrus Minor comments.

Massachusetts reverses itself

"Office Open XML will meet our new standards for acceptable open formats"

I wondered if they would be able to make that stick.

Continuous feedback

Google Tool Empowers Feedback Loop

Blogger Web Comments for Firefox allows web surfers (using Firefox) to see what people are saying about any page on the Internet.


This could lead to industrial strength naval-gazing.

More on press releases

Michael Sommermeyer

However, many organizations use their blog as a repository; a place to post the press releases and little else. Sadly, some blogs also are used as places to promote or market products, services and reputations.


I want every reporter reading this to know I would never, ever, send out a press release so unnewsworthy that I would not post it on my own blog.

The future of the trade press

Vik David

On the tech side, I've dropped all my print magazine subscriptions (JDJ, EAI Journal, Computerworld, InfoWorld, etc.) and rely completely on blogs and a podcast or two. This is good because my tech news is MUCH more focused to what I care about.


This is very discouraging, because some of the best reporting is done in the trade press. Tech blogs have a very idiosyncratic approach. They are unreliable in the sense that they do not have regular assignments or deadlines. If you want a predictable source of news on a subject you need a professional organization, news is not something amateurs can do, any more than writing code is something amateurs can do. Somehow the trade press is going to have to create a symbiotic relationship with blogs.

Let it be so

DC #1 in Tech Jobs again

Wednesday, December 21, 2005

OMB releases new version of DRM

Joab Jackson, Government Computer News

The Office of Management and Budget has posted the second version of the Federal Enterprise Architecture Data Reference Model.


PDF copy of the Federal Enterprise Architecture Data Reference Model

The new standard will make it possible for federal agencies to exchange information; for example if the National Highway Traffic Safety Administration needed to exchange data with the FBI. This is will improve the efficiency and effectiveness of the Federal government.

It will also change the IT industry. Everyone who wants to sell to the federal government will have to comply with this standard. States will put it in their requirements, partly because they need to exchange information with the federal government, but also because they look to the federal government to provide leadership on this sort of thing.

Any company who exchanges information with the federal government, as in an investment bank sending information to the Securities Exchange Commission, will want their software to comply with the standard to facilitate the exchange of data. And so on and so on down the IT economic food chain. The Federal Enterprise Architecture Data Reference Model is the de facto industry standard.

Discouraging headline

Daily Data Breaches

Clue to the financial industry and all others who collect personal data, either you can solve this problem or you can wait for the political system to solve it for you. I leave it to you to decide which you would prefer.

Privacy Rights Clearinghouse

Tuesday, December 20, 2005

European Computer Manufacturer’s Association Technical Committee 45

TC45 begins the creation of the Ecma Office Open XML File Formats standard...

Ecma International began the technical work Thursday 15 December 2005 to standardize the Office Open XML File Formats. TC45, the Ecma technical committee organized to create the Ecma document format standard, held its first meeting in Brussels, Belgium.

The standard will be based on an initial 2000 page draft technical specification submitted by Apple, Barclays Capital, BP, the British Library, Essilor, Intel Corporation, Microsoft, NextPage Inc., Statoil ASA and Toshiba.


If open standards are to work they must be international.

Edit-
Not everyone is impressed.

Software Usability Thoughts

design from interface

Press release humor

Check out the dateline.

Monday, December 19, 2005

The Soul of a New Machine

Tracy Kidder’s Soul of a New Machine has to be one of the most unlikely best sellers of all time. It tells the story of how Data General brought a new computer to market. Written in the days before the PC, to story of writing software must have seemed an unlikely subject for the general public. But readers were fascinated.

There is a lesson there are about the appeal of enterprise computing stories for publications that would heed it.

A difficult pitch to make

Conferences that Kevin Maney will not be attending:

IMI’s 9th Annual Toner & Imaging Chemicals Conference – The Future of Toner & Imaging Raw Materials on February 6-8, 2006 focuses on the technology, market and applications challenges and opportunities that are facing the toner industry.


Here is why technology reporters should cover this conference, because toner cartridges, their cost, quality, and recycling issues have a huge impact on your readers. Cartridges are the largest single cost of ownership for a printer.

Cartridge technology drives what you can do with a printer, as in color printers, etc.

No, it is not as fun as a gadget trade show. There aren't any cool toys. Any reporter can cover a gadget show, only the most skilled business reporter can write about toner cartridges in a way that shows readers how their lives are affected.

Note - no this is not my client, but it is the sort of story I pitch.

Regarding online communications

Tom Murphy

We can identify and contact bloggers on any given subject in minutes. We can quickly and easily scan their blogs to see if their content is relevant and we can use tools like Technorati or BlogPulse to try and gauge their influence, but do we stop to understand the blog?

Two separate conversations this week have led me to believe that the Internet has spoilt us and has put unrealistic expectations into our heads. Two different marketing/PR folks were in touch asking my opinion on undertaking blog relations. Both saw the value of blog relations, but wanted to know how they could pull together an outreach campaign quickly. Both mentioned they were under time pressures. You see, given you can find anything online quickly, you can communicate quickly, well then you must be able to communicate well quickly. It’s the Hare’s approach to online PR. The reality is somewhat different.

Rather than racing to throw some bloggers into the e-mail hopper, I believe you would be better advised to follow the tortoise’s example. Take a deep breath, slow down and let that wonder of millions of years of evolution, your brain, take over from the speed of the Internet. If you really want to effectively pitch bloggers, then just like journalists you need to identify them, understand their audience, understand their policy on PR pitches and then tailor your pitch to effectively communicate with them.


With some trepidation, I am going to dissent from this. Certainly you want to understand the writers, journalists or bloggers, you are pitching to; but ultimately it is about readers. Think about who you want to reach, not just which publications and/or blogs they read, but why they read them. I try to have a specific person in mind when I write a press release and imagine them sitting at their computer looking for information or interesting tidbits. It is easier to write lively copy if you have a specific reader in mind.

Delivering Christmas

Say thanks to your postal carrier today...

Chris Dorobek reminds us that for some people, Christmas is a massive logistical undertaking.

Sunday, December 18, 2005

Whistle blowers

Bush Secretly Lifted Some Limits on Spying in U.S. After 9/11, Officials Say

Nearly a dozen current and former officials, who were granted anonymity because of the classified nature of the program, discussed it with reporters for The New York Times because of their concerns about the operation's legality and oversight.


Rarely, very rarely, anonymous sources speak to reporters because they are genuinely concerned about serious wrong doing. This is how the cult of anonymous sources was established.

In the case of intelligence agencies, there are only a limited number of people who could possibly have known about this. Does anyone reading this have any doubt that the proponents of this program have long since identified and retaliated against the sources for this article? Particularly because the New York Times, for reasons best known to itself, withheld publication of this article for a year? When a source speaks speaks off-the-record to a reporter, they have no possibility of invoking the whistle blower protection act.

Of course civil servants feel that the act is ineffective and will not protect them, which is why both the Project on Government Oversight and Public Employees for Environmental Responsibility encourage anonymous activism. But in a world where almost no one will publicly blow the whistle, it is far easier for bullies to isolate and punish the whistle blowers who do emerge. Had the sources for the New York Times article all have gone on the record, it would have been very difficult to have retaliated against all of them. It is known as solidarity and is the foundation of all nonviolent political protest.

If the PR industry wishes to end the practice of anonymous sources, and I hope opinion is shifting in that direction, then it is not enough to persuade our clients to speak on the record. We also have to educate our clients to distinguish between whistle blowers and trouble makers and resist the temptation to retaliate against the former.

This article is great reporting. There isn’t a PR pro reading this post who wouldn’t be thrilled to have a client favorably mentioned in the New York Times. We pay for advertising in the Times not merely because of the number of people who read it, but because of the class of the venue. Great journalists make PR possible; James Risen and Erick Lictblau have reminded us why journalism matters.

New to me local software developer blog

Tom Copeland

Friday, December 16, 2005

On public speaking

Stop your presentation before it kills again!

Sometimes the best presentation is... no presentation. Ditch the slides completely. Put the projector in the closet, roll the screen back up, and turn the damn lights back on!

... But given how many people hate slide presentations, why is it universally assumed that where there is "a talk", there's PowerPoint (or its much cooler cousin, Apple's KeyNote)? Conference coordinators rarely ask speakers if they'll be projecting slides. They send out the slide templates, then start demanding your slides several weeks before the show. Saying you don't have slides is like saying you'll give your talk naked. "You mean... you're going out there with nothing???"


I too am puzzled by the ubiquitous presence of slides. Those who speak for a living, teachers, lawyers, preachers, never use slides. Surely there is a lesson there.

The place to share your ideas, rumors, and complaints about Healthcare IT and Medical Informatics

HITSphere Health IT and Informatics Community

Thursday, December 15, 2005

Traction Customer IJIS Institute Named One of BusinessWeek's WebSmart 50

IJIS Institute Cited by BusinessWeek as One of 50 Innovative Uses of Internet Technology in Business

PROVIDENCE, R.I., Dec. 15 /PRNewswire/ -- Traction Software, Inc., the leader in Enterprise Blog software for business, today announced that The Integrated Justice Information Systems (IJIS) Institute was selected as a BusinessWeek "WebSmart 50" organization, in the November 21, 2005 issue, based on IJIS's deployment of Traction TeamPage(TM) enterprise blog technology for its Website, Partner Extranet, and Staff Intranet. You can read about the Web Smart 50 by going to: http://www.businessweek.com.


Congrats to the Traction PR team for placing this.

Edit-
IJIS Institute Has Deployed Blogs, Cited by BusinessWeek as Web Smart

But what gave the Internet its disruptive power and exhilarating appeal was that it was barely owned

Jonathan Krim, Washington Post

Suddenly, the mom-and-pop store in Des Moines could advertise and sell to the world, without paying the freight of someone else's marketing apparatus. Intellectual and artistic works could be shared rapidly, at little or no cost. Games could be created and distributed without ever having to manufacture a physical item.

We may think of it as the information superhighway, but really the Net has been a gigantic bypass, circumventing barriers to entry and whole swaths of middlemen (think travel agents or, I'm sad to say, newspaper owners) who are now trying to figure out how to survive.


Saving the Net: How to Keep the Carriers from Flushing the Net Down the Tubes

What is mesh networking?

Wikipedia

Mesh networking is a way to route data, voice and instructions between nodes. It allows for continuous connections and reconfiguration around blocked paths by "hopping" from node to node until a connection can be established.

Mesh networks are self-healing: the network can still operate even when a node breaks down or a connection goes bad. As a result, a very reliable network is formed. Applicable to wireless networks, wired networks, and software interaction.

A mesh network is a networking technique which allows inexpensive peer network nodes to supply back haul services to other nodes in the same network. A mesh network effectively extends a network by sharing access to higher cost network infrastructure.


Now you know.

European RoHS directive 2002/95/EC

Waste Electrical and Electronic Equipment

Directives 2002/95/EC on the restriction of the use of certain hazardous substances in electrical and electronic equipment and 2002/96/EC on waste electrical and electronic equipment are designed to tackle the fast increasing waste stream of electrical and electronic equipment and complements European Union measures on landfill and incineration of waste. Increased recycling of electrical and electronic equipment will limit the total quantity of waste going to final disposal. Producers will be responsible for taking back and recycling electrical and electronic equipment. This will provide incentives to design electrical and electronic equipment in an environmentally more efficient way, which takes waste management aspects fully into account. Consumers will be able to return their equipment free of charge. In order to prevent the generation of hazardous waste, Directive 2002/95/EC requires the substitution of various heavy metals (lead, mercury, cadmium, and hexavalent chromium) and brominated flame retardants (polybrominated biphenyls (PBB) or polybrominated diphenyl ethers (PBDE)) in new electrical and electronic equipment put on the market from 1 July 2006.


Nearson Begins RoHS Compliant Production Runs

While big business is hiring lawyers and lobbyists to fight these initiatives, small businesses are hiring engineers and complying. There are many reasons small business is big news, this is one of them.

Wednesday, December 14, 2005

Measuring inbound links

You can tell the PubSub PR List is a great list, Presto Vivace Blog is on it. But I don't understand how inbound links are detected and measured. Missing inbound links on my blog include Manuel L. Quezon III, Gartner Watch, Love the Mac, and Content & Technology Crossroads. Any theories how these links got overlooked?

Top Five Federal Software Product Categories for 2006

Constatin Bastura was kind enough to forward this item:

Teaming Will be the Key to Federal Success for Software Firms

RESTON, Va., Dec. 14 /PRNewswire/ -- In an analysis of over 3,000 federal business opportunities, five software product categories have been identified as having a high number of potential subcontracting opportunities, according to a report released today by INPUT, the authority on government business. The five categories are document & content management, project management, supply chain & logistics management, knowledge management, and inventory management.

Federal IT contracted spending for 2006 is estimated to reach $64 billion with software procurements accounting for nearly $5 billion of the market. INPUT has identified the largest segment of software subcontract opportunities is under business and enterprise applications. The top five categories within the report comprise nearly 30 percent of this segment.

"The federal market holds ample opportunities for software vendors, whether they focus on targeted applications, enterprise solutions, or the underlying platforms," said John Slye, senior analyst, federal subcontracting opportunities for INPUT. "Success for both the large primes and small subcontractors in the software market will rely heavily on their ability to create effective partnerships."


The best way to identify potential partners is to be active in any of the fine organizations on the sidebar to your right.

Unclear on the concept

Everywhere Christmas is observed marketers try to think of some tie-in for their business. I have no problem with that and would do it too if I could come up with an angle for enterprise computing.

But some things just don't fit. Some marketers should just stay away from holiday tie-ins, such as this one:

Counter Terrorism Training School

Holiday Special!!!

Tactical Shooting Course 3Days $700

(Regular $1,800)

We provide Weapons & Ammunition

(Glock 17, M-4, AK47 & Shotgun)


Happy holidays indeed.

Tuesday, December 13, 2005

How did this even get to be part of the conversation?

As I write this the Financial Times has an online poll on the merits of torture.

Just in time for Christmas.

My heart is so full, I can hardly speak.

Why I founded Presto Vivace, Inc.

Alternet has an interview with Larry Beinhart; one of the things he says is:

With certain exceptions, news is not automatically big news. The exceptions are dead popes, the World Series, tsunamis, volcanoes, wars the wars that involve us anyway -- but most news actually becomes news -- including wars -- because of press releases. The example I always use -- because we're in the small town of Woodstock -- is the little league schedule. If the little league schedule is going to be in the newspaper, it's only because the coach or the coach's wife sends it to the newspaper.

Most news originates as a press release or a press conference or an announcement. And if it's going to stay in the news, it has to get new press releases and new stories. Someone has to work at that, someone has to invest effort and time to make it a big story. And if nobody does that, it may not be a story at all, or it may be a one-time item. You know, page 12 of the New York Times, page 26.


This puts small business at a terrible disadvantage, because even the prosperous ones do not have the resources to gin out press releases. That is a terrible pity, for them and the readers who would be interested in their stories. Presto Vivace was structured in a way that allows me to offer PR services at a price small companies can afford.

Does this sound like hot copy to you?

I have stayed away from the press release from hell theme, but Couthe found one that illustrates almost everything that is wrong with traditional IT hype:

Portal Solution Provides Cost-Effective Means for Unlocking Potential of Trapped “Siloed” Assets; Fuels Adoption of SOA


Do you have any idea what that means? Neither do I, and neither, I suspect, does the person who wrote it.

I think John Wagner had it exactly when he described technology PR Pros as translators. We should replace techno-speak with English.

Monday, December 12, 2005

We need more laughs, not fewer

Editorial Cartoonists: An Endangered Species

Black ink Monday

EditorialCartoonists.com

The key to effective advertising

Know Your Audience

The power of the press, who is the press? who is the newsmaker?

Washington Post Reporters Upset About Links To Blogs

I think the Washington Post’s deal with Technorati is brilliant. Just plain brilliant. Bloggers commenting on your newspaper is tangible evidence of readers. If you can go to an advertiser and say that the average article receives X amount of links, or that the articles in the business section receive X amount of links, it gives advertisers confidence that they are reaching an influential audience.

Of course it’s no fun when someone exposes your writing as clueless. Better to link it from your site and learn from it, than have everyone else link to it for the purpose of enjoying a hearty laugh at your expense.

Post reporters are walking barefoot for the first time as it were. As soon as their calluses are built up they will enjoy blogosphere.

Sunday, December 11, 2005

Sez who?

World's poorest don't want "$100 laptop" -Intel

COLOMBO, Dec 9 (Reuters) - Potential computer users in the developing world will not want a basic $100 hand-cranked laptop that is due to be rolled out to millions, chip-maker Intel Corp. Chairman Craig Barrett said on Friday.


I have no idea what people in these countries want and neither does Mr. Barrett.

PR Leap

About PR Leap

R Leap - the free press release distribution service to major search engines, newswires and websites, since 2003 - has two main goals :

1. We want to help newsmakers - artists, authors, business professionals, designers, developers, entrepreneurs, filmmakers, musicians, retailers, and all other types of newsmakers - get free media exposure.

... 2.We want to help newsmakers increase their search visibility.


I just stumbled across this, so can't say much about it; but I thought some of my readers would be interested.

Friday, December 09, 2005

From those same wonderful people who brought us "We love the Iraqi information minister"

Karl Rove is toast.

Great moments in spin

Estimating breach size by fraud volume

An additional finding is that the likelihood of a fraud being committed using a given piece of revealed PII is inversely proportional to the size of the breach.

These results are being spun as suggesting that large breaches are not so bad, and that the "real risk" of ID theft is low.


Who came up with that spin?

Why data reference models are news

Military, Civilians Must Be Able To Share Data During Disaster Response

The growing number of joint civil and military users of satellite and other communications systems during times of natural disaster relief deployments — like the one following Hurricane Katrina in the Gulf of Mexico — will make it necessary to find a way to pass secure and nonsecure information so users can share data or talk with one another more easily, said Robert Otten, senior vice president of Vocality International.


Why can't we share?

Who used which application?

Shahid Shah tells us that eXpert Technology Solutions has a solution for the hole in the Citrix product line:

As we know, Citrix is a thin-client application enabler: it can take a “fat client” windows application and through a small client application (or just a browser) on a client PC it can run an entire application from just a server and use the display/keyboard/mouse from the client. Eric and his two other co-founders set out to plug an important hole in Citrix’s product line: detailed analysis and reporting of who used what application, for how long, and whether they were supposed to be able to or not. While Citrix eases the administration burden of having to install applications on multiple computers, it doesn’t ease the administrators burden of reporting to upper management.

When you sell technology, you are selling to a committee

Casey Software

Next, technology decisions are not made from the top down. The marketing dollars are focused at the CIO's and the CTO's who are believed to chart the overall direction of the ship, but they're not the ones manning the oars. Once again, we go to the line-level geek, developer, admin who is going to use the best tools they can find to get the job done.


One reason I attend so many meetings of user groups and trade associations is because that is the only way you get a feel for what the worker bees in the industry are thinking.

Developing software for the Greater Washington, DC area, why it’s different

Project - A Contract Management Tool

I've noticed that most of the dotProject feature requests which come from these groups don't reflect the feature requests and requirements of the core group and those who frequent the dotProject forums.

Anyway, there are two main areas which have been discussed over and over again. First, is Earned Value Management (or Earned Value Accounting) and the second is detailed Contract Management tracking costs by Work Classification, etc. While these are likely to have little value outside this geographical area, there are a number of local groups looking for this functionality.


Project Forums

Department of Wish I had thought of that

John Wagner points to a terrific post by Jeremy Pepper describing Nokia’s blogger relations program. Ingenious. And very clever to have sent out samples to many bloggers so that any negative post would have less impact.

This, along with B.L. Ochman’s campaign for Budget Rent A Car, is a great example of blog-based promotion.

Jeff Jarvis needs to get over himself

Jeff Jarvis says bloggers should ignore PR people and our news releases. His post was inspired by a presentation on blog relations that he knows was terrible without even seeing it.

I am mildly curious, who elected Jeff Jarvis?

Seriously, isn’t writing, in blogs or any medium, about providing something interesting for readers? Either a news release would interest your readers or it wouldn’t. If it is interesting to your readers, I don’t see that it matters that the motives of those who sent it were impure. What is important is providing your readers with something worthwhile.

Wednesday, December 07, 2005

Breaking silence

Counterterrorism co-operation is endangered by US renditions

Vital global counterterrorism co-operation is under threat in the wake of several international inquiries into the US government practice of sending terrorism suspects to third countries outside the established legal framework, known as 'extraordinary renditions'. These inquires could also see US Central Intelligence Agency (CIA) operatives face legal action.

At issue is the US practice of rendition, which includes such missions as "snatch and grab" operations, as well as the shipment of prisoners already in the custody of one state to another for arrest, detention or interrogation - outside the lines of regular extradition processes.


American Torture Chambers

Blogging and privacy

Tom Foremski

What is socially acceptable to blog about? That's one of the questions I have pondered when everyone can be a publisher, and when most in my social circle are publishers/bloggers.

And the answer is simple: if you are at a private event, among your friends, then everything is off-the-record you do not publish anything that could embarrass anybody, or republish anything that was said/done unless you have an agreement to do otherwise.


This is something we, as a society, are going to have to start talking about. For example, if I go to a meeting, I may cover the presentation and the questions. I do not write about the little meeting after the meeting were attendees come forward to ask the questions they did not want to ask publicly. Neither do I blog about the after the meeting gossip session that inevitably occurs on the subway ride home.

There has been some discussion about libel, but almost none about privacy.

Tuesday, December 06, 2005

The Arlington way

Arlington goes wireless with free Internet service

Arlington County is asking technology companies to give Internet users something for nothing.

The county wants companies to provide wireless Internet access, or wi-fi, in 10 areas at no cost to the government or the users. Free access would be at about one-fifth the speed of a broadband connection.

Providers would cover their costs through county-approved business plans, such as charging for faster connections and selling online ads.


The Arlington way refers to Arlington's unique political culture that places great emphasis on citizen input and participation. No decision can be made without consulting all stakeholders. This initiative is but one example of the Arlington way in action.

The result is a grassroots political culture that produces a high quality of government services with the lowest taxes in the Greater Washington area. Precisely because all stakeholders are brought into any discussion it is very difficult for the business community or any other group to exert undo pressure. Businesses which are not used to it can get very frustrated.

UPDATE: The Arlington Way AAA rated.

Great moments in document management

Brian Krebs on Computer Security

Few things in the world of digital documents are as pesky and revealing as "metadata" -- the information automatically embedded in documents by popular software such as Microsoft Word or Adobe Acrobat. When the government or a business forgets to purge metadata from documents before releasing them to the public, the results can range from embarrassing to dangerous.

On Sunday, the New York Times ran a story on President Bush's Nov. 30 speech on the war in Iraq. While White House officials said many federal departments contributed to the new national strategy on Iraq, one look at the metadata stored in the 35-page National Security Council document, titled, "Our National Strategy for Victory in Iraq," showed that the original author of the paper was Peter D. Feaver, a Duke University political scientist who was recruited to join the NSC staff as a special adviser in June after he and several Duke colleagues presented the administration with an analysis of polls about the Iraq war. Their analysis concluded that Americans would support a war with mounting casualties if they believed that effort would ultimately succeed.


Don't have a document management strategy? Get one.

Monday, December 05, 2005

What is meant by agile software development?

Manifesto for Agile Software Development

We are uncovering better ways of developing
software by doing it and helping others do it.
Through this work we have come to value:

Individuals and interactions over processes and tools
Working software over comprehensive documentation
Customer collaboration over contract negotiation
Responding to change over following a plan

That is, while there is value in the items on the right, we value the items on the left more.


You would have to know more than I do about software development and project management to judge the merits of this. But software is too important to leave to the techies, we all have a stake in these debates.

When this happens to a committee chairman or news mogul, we will do something about it

Prostitution Suspect Used Data Access to Keep Tabs on Cops

Whether it is a civil servant with access to data or employee at a private data mining company, this is problem that will only get worse.

Sunday, December 04, 2005

Johnny Cash

I saw Walk the Line this weekend. It is a wonderful account of the life and career of Johnny Cash. Cash’s appeal was mostly County & Western, but also Top 40 Rock & Roll. The film shows Cash, warts and all. The film also tells us about the remarkable June Carter Cash.

Cash recorded his first records with the legendary Sam Phillips. Watching the film I started thinking about the impresarios of popular music, the Chess brothers, Ahmet Ertegun of Atlantic Records, and Barry Gordy of Motown. What they all had in common was their love of the music they recorded. It was a business; but it was more than a business. They loved the music they recorded and they wanted to share it with others.

Other than Russell Simmons, there is no one on the business side of the music business who is motivated by a love of the music. For the management of our contemporary entertainment conglomerates, popular music is just a business. It is hard not to wonder if the business would not be better off in the hands of those for whom it is more than a business.

Friday, December 02, 2005

What is Software Architecture?

Software architecture

Software architecture is a coherent set of abstract patterns guiding the design of each aspect of a larger software system.

...The software architect consults with clients on conceptual issues, managers on broad design issues, software engineers on innovative structural features, and computer programmers on implementation techniques, appearance, and style.

Software architecture is a sketchy map of the system. Software architecture describes the coarse grain components (usually describes the computation) of the system. The connectors between these components describe the communication, which are explicit and pictured in a relatively detailed way. In the implementation phase, the coarse components are refined into "actual components", e.g, classes and objects. In the object-oriented field, the connectors are usually implemented as interfaces.


ITscout Blog

Integrating Islands with Landmasses

Damir Tomicic

Simon Says

Miguel Castro

International Association of Software Architects

Transparency and marketing

Define Open

The whole thing reminded me of a story that I've heard Nat Friedman tell. Nat founded a former client of mine called Ximian, an open source company which was later sold to Novell. While at MIT, Nat spent a summer doing an internship at Microsoft and through that had a chance to talk with Bill Gates. They were discussing open source and the Apache server, which was growing in popularity.

Gates couldn't understand why developers would need access to the source code. He offered that if it's functionality that people wanted then Microsoft should just add that functionality to its servers. Nat came away feeling that Gates just didn't "get it," that the openness of the code WAS the draw. While many of the developers and users may never take advantage of the code, they wanted the option to peak under the hood and make changes and adjustments, should they feel the need. I've rarely, if ever, looked under the hood of my car, but I certainly wouldn't purchase one that didn't let me in.

New from Crain's, FinacialWeek

Crain to introduce FinancialWeek in 2006

NEW YORK - Crain Communications Inc., the company that publishes InvestmentNews, will launch FinancialWeek, a newspaper designed to help satisfy the growing information needs of corporate finance executives.

... Among the many topics it will cover: news of financing techniques, risk management, benefits finance, corporate governance, investment management, accounting, information technology, real estate, and compliance and reporting.


With all the layoffs and cutbacks, it is encouraging to read about the launch of a new publication.

FinancialWeek

Thursday, December 01, 2005

The Small Business Innovative Research Program

About SBIR and STTR Programs

The SBIR (Small Business Innovation Research) and STTR (Small Business Technology Transfer) programs, two competitively awarded, three-phase Federal Government programs, are designed to stimulate technological innovation and provide opportunities for small business. These dynamic teamings of the private and public sectors include joint venture opportunities for small businesses and the nation's premier nonprofit research institutions.


Three-Phase Program:

Following submission of proposals, agencies make SBIR awards based on small business qualification, degree of innovation, technical merit, and future market potential. Small businesses that receive awards or grants then begin a three-phase program.

- Phase I is the startup phase. Awards of up to $100,000 for approximately 6 months support exploration of the technical merit or feasibility of an idea or technology.
- Phase II awards of up to $750,000, for as many as 2 years, expand Phase I results. During this time, the R&D work is performed and the developer evaluates commercialization potential. Only Phase I award winners are considered for Phase II.
- Phase III is the period during which Phase II innovation moves from the laboratory into the marketplace. No SBIR funds support this phase. The small business must find funding in the private sector or other non-SBIR federal agency funding.


I met with Mr. Darrell Williams, of the Washington Emerging Technologies Center, to learn more about the SBIR program. While many Presto Vivace clients have been SBIR participants or graduates, I had only a general understanding of the program and wanted to be fully informed. Williams’ company, WETC, has been hired by the government to explain the program.

Williams said that SBIR was a “business development program, no more, no less”. SBIR grants come in three phases: phase I which is the work plan, phase II, where the company builds a prototype, and phase III where the company is expected to raise its own capital and take its idea to production.

Williams said the single most important element of any successful SBIR proposal was the company’s business strategy. This is true in every phase of the program. Essentially, a proposal is a business plan. Evaluators also look at the company’s team; do they have a history of success in their industry? Evalators include well known authorities in their respective fields; it is important that the proposal be credible from a scientific and technical point of view.

Evaluators are not interested in investing our tax money in creating yet another government contractor. They are looking for business plans that propose products with a commercial use. (Some exceptions for the Department of Defense and NASA.)

Sometimes, evaluators will find two roughly equivalent proposals and will fund both for phase I, with the better work plan winning phase II funding.

Willimas said that the SBIR program is a great way for subcontractors to become prime contractors. A prospective grantee’s best strategy is to develop a proposal for a product their field. They should look at the current open solicitations and see if there is anything related to their business.

Williams and I agree that companies should not confine themselves to venture capital to fund phase III. (In some cases the government may offer matching funds, if the SBIR grantee can raise private capital.) A loan or line of credit from a bank may be more practical. It may even be possible to obtain funds from a large company who is interested in buying the product. Some SBIR companies have formed partnerships based on their intellectual property rights on the products that they have developed.

SBIR funding has several advantages over other types of capital. The government is not interested in owning or managing your business. SBIR grants are precisely that, grants. You don’t have to pay the money back. You retain complete control of your company.

Government evaluators are not faddists. They are not looking for the entrepreneur from central casting. They don’t care about your race or gender or if you have gray hair. They are looking at your business plan, your team’s professional experience and the scientific and technical information contained in your proposal. Potomac business culture is far more diverse and more stable than anywhere else in the country. The SBIR program is a contributing factor to this.

Related links
DC Certified Capital Company (CAPCO) Program

Maryland Investment Financing

The Virginia Small Business Financing Authority (VSBFA)

Tuesday, November 29, 2005

Government bodies from federal to municipal find better ways to serve the public through M2M technology

Charity Pihlaja, M2M Magazine

One issue it seems all government bodies deal with is vehicle maintenance. Whether it’s a fleet of squad cars, an all-important fire truck, or durable tanks and Humvees, each agency has means of transportation.

M2M also offers mobile asset monitoring. Included in this is GPS (global positioning system) to help agencies track where their vehicles are, how long they spend at one location, and can be used to help drivers find better routes to destinations.


It is not unusual for governments to be an early adopter of technology.

CIO Council sends Data Reference Model to OMB for final approval

Rob Thormeyer, Government Computer News

Kim Nelson, Environmental Protection Agency CIO and co-chairwoman of the CIO Council’s Architecture and Infrastructure Committee, said the document could be one of the most important documents produced all year.


At least.

Why journalism matters, Poland

Gazeta Wyborcza and Rzeczpospolita express their solidarity with newspapers in Belarus. And if there is one thing the Poles understand, it's solidarity.

Objective journalism is not about presenting both sides of every story. It's following the facts wherever they lead without fear or favor.

Peter Klaus talks to DC Communicator

Peter Klaus of Fleishman-Hillard’s DC office talks about the seismic shifts in communications we will see in 2006:

1. Disappearing boundaries;

2. Growth of blogs;

3. Growth of RSS;

4. Cause Marketing;

5. Social networking; and,

6. Mobile device screens.


Apparently Fleishman-Hillard just got the memo. These shifts occurred some time ago.

Total audience, the evolving news media business model

Dispelling the Myth of Readership Decline

The industry has touted the notion of readership -- a metric that takes into account how many people read the paper whether they buy it or not -- for years, but has often taken halfhearted steps toward giving it true legitimacy.

Then there's the confounding, if promising, online angle. If you count Web traffic, newspapers are actually more popular than ever.


If you don’t count online audience you’re not in touch with what is happening.

The Washington Post’s partnership with Technorati is very smart marketing. Measuring unique visitors is still an inexact science. Inbound links are a more tangible sign of reader interest and provide well defined data to offer advertisers about audience demographics.

Remixing reader relations, an interactive model

David Card likes Washington Post Remix. From the site:

We are pleased to announce washingtonpost.com's Post Remix. With Post Remix, you may use washingtonpost.com RSS feeds to experiment with different applications using washingtonpost.com content.Here are the conditions for participating in Post Remix:

- Your efforts must be for personal, and not for commercial, use. You may not sell applications that use or incorporate washingtonpost.com content.
- You recognize that Washingtonpost.Newsweek Interactive retains all intellectual property rights in all washingtonpost.com content and you that acquire no such rights by participating in Post Remix.
- Washingtonpost.com may incorporate your ideas into future projects it develops.


Very smart. The Washington Post was a little slow to catch on to blogosphere and the new covnersation, but now they seem to be smart indeed.

Ann L. McDaniel, Vice President of The Washington Post Company, talks about The Washington Post, the Post-Newsweek Tech Group, FOSE and the blogging phenomenon.

Monday, November 28, 2005

Tracking online influence

Mitch Arnowitz has a list of tools to track online influence, including one I had not heard about, Kebberfegg a keyword based RSS feed generator.

The K Street Project turns on its creators

The Abramoff BLOB, going to eat all of K Street alive

It's a great time to be in the litigation support and records management business.

CSS hacking

Scoble and Molly Holzschlag point to Tantek Çelik’s Pandora's Box (Model) of CSS Hacks And Other Good Intentions No easy way to summarize it, but I encourage my developer readers to look at it.

The struggle for the open, end-to-end Internet

Consider:

On March 3, the Federal Communications Commission announced that it settled a case against a small North Carolina-based telephone company that was blocking the ability of its customers to use voice-over-Internet calling services instead of regular phone lines.

On Sept. 15, the first major draft of proposed changes in the nation's telecommunication's laws was circulated by the House Energy and Commerce Committee. The draft said Internet service providers must not "block, impair, interfere with the offering of, access to, or the use of such content, applications or services."

On Nov. 2, another draft of the bill came out, with language specifically addressing the Internet video services that are proliferating as connection speeds increase and the phone companies get into the digital television business. In this draft, the prohibition on blocking or impeding content was gone.

If the bill passes as is, tech companies say, the Internet could be forever compromised.

"Enshrining a rule that broadly permits network operators to discriminate in favor of certain kinds of services and to potentially interfere with others would place broadband operators in control of online activity," Vinton G. Cerf, a founding father of the Internet who now works for Google Inc., wrote in a letter to Congress.

The phone companies argue that with their new fiber-optic systems capable of handling huge amounts of bandwidth, they simply want the ability to set aside some of it for their own services, be it television, gaming or anything else.

Unfortunately for them, the head of phone giant SBC Communications Inc., Edward E. Whitacre Jr., was a little more plain-spoken in an interview in Business Week.

"Now what they [Google, Yahoo, MSN] would like to do is use my pipes free, but I ain't going to let them do that because we have spent this capital and we have to have a return on it," Whitacre said. "So there's going to have to be some mechanism for these people who use these pipes to pay for the portion they're using."


Saving the Net: How to Keep the Carriers from Flushing the Net Down the Tubes

Sunday, November 27, 2005

Python, static type checking, RuntimeException, and unit testing

Bruce Eckel

So this, I assert, is an aspect of why Python works. C++ tests happen at compile time (with a few minor special cases). Some Java tests happen at compile time (syntax checking), and some happen at run time (array-bounds checking, for example). Most Python tests happen at runtime rather than at compile time, but they do happen, and that's the important thing (not when). And because I can get a Python program up and running in far less time than it takes you to write the equivalent C++/Java/C# program, I can start running the real tests sooner: unit tests, tests of my hypothesis, tests of alternate approaches, etc. And if a Python program has adequate unit tests, it can be as robust as a C++, Java or C# program with adequate unit tests (although the tests in Python will be faster to write).


From the Nova JUG discussion list.

Bruce Eckel

You can’t flack this stuff if you’re not conversant with the technology.

How to shoot yourself in the foot with your intellectual property protection strategy

P2p, file sharing and Big Music

Thanks largely to failing entertainment industry efforts to sue file sharers into becoming good little consumers, p2p and the technologies surrounding it have become headline news and more people than ever before are logging onto the p2p networks.


Time to adjust the business model.

Silktide’s online marketing’s brilliant play for buzz

Media Orchard points to Silktide’s free online site analysis tool, SiteScore. Who can resist?

Presto Vivace, Inc. received a low 5.6 score. They don’t think much of Presto Vivace’s austere look.

Friday, November 25, 2005

New local .Net blog

Brian Noyes informs us that Clyde Barretto has begun blogging.

IT and the healthcare system

The Healthcare IT Guy

Lyle Schofied

Edit-

See also Shahid Shah's It Healthcare aggregator - HITSphere

It is with great that regret we report the death of irony

Michael D. Brown is offering his services for crisis communications in emergency response.

I wonder what it's like to go through life free of shame.

When the criminal element gets really bold

Computer Worm Poses as E-Mail From FBI, CIA

It's being called the worst computer worm of the year -- a fast-spreading Internet threat that looks like an official e-mail from the CIA or FBI but can leave your computer wide open to intruders.

The bogus e-mail claims the government has discovered you visiting "illegal" Web sites and asks you to open an attachment to answer some official questions. If you do, your computer gets infected with malware that can disable security and firewall programs and blast out similar e-mails to contacts in your address book. It can also keep you from getting to computer security Web sites that might help fix the problem, and it may open your Windows computer to intruders who can steal your personal data.


First of all, if law enforcement wants to contact you they do not send email, neither do they call you on the phone. They knock on your door in person.

Second of all, the perpetrators of this worm are in serious trouble. Law enforcement takes inpersonators very seriously.

Report online fraud to the FBI

Tuesday, November 22, 2005

Shape of things to come

Internet advertising up 34% in one quarter

Wouldn't it be more profitable to sell music online in a P2P format that customers want?

EFF, Texas Attorney General Sue Sony

Greg Abbott, the attorney general for Texas, today filed a lawsuit against Sony BMG Music Entertainment, alleging that its controversial (and now recalled) "XCP" anti-piracy software violates the state's anti-spyware and consumer protection laws.

... Abbott's suit seeks civil penalties of $100,000 for each violation of the law, attorneys’ fees and investigative costs.


Nobody ever won a war with their customers.

Peering into Google's future

Cringely

So why buy-up all that fiber, then?

The probable answer lies in one of Google's underground parking garages in Mountain View. There, in a secret area off-limits even to regular GoogleFolk, is a shipping container. But it isn't just any shipping container. This shipping container is a prototype data center. Google hired a pair of very bright industrial designers to figure out how to cram the greatest number of CPUs, the most storage, memory and power support into a 20- or 40-foot box. We're talking about 5000 Opteron processors and 3.5 petabytes of disk storage that can be dropped-off overnight by a tractor-trailer rig. The idea is to plant one of these puppies anywhere Google owns access to fiber, basically turning the entire Internet into a giant processing and storage grid.

While Google could put these containers anywhere, it makes the most sense to place them at Internet peering points, of which there are about 300 worldwide.

Whereas blogging can remove all doubt

the blogless professional indicates he/she has nothing to say.

So think before you post.

Sunday, November 20, 2005

Nominate your customer

Federal 100 awards: Call for nominations

Federal Computer Week begins accepting nominations for the Federal 100 awards program this week. The deadline is Dec. 21, so don't delay.

Convergence, it's finally happening

New Communications Blogzine

Things are changing, and changing fast, and that hackneyed word “convergence” finally has some validity as we discuss these changes.

The trends that we’ve been anticipating for years are finally coming to pass.

The drivers of this change:

Ever-increasing penetration rates for highspeed Internet access in the home as well as wireless access. Mobile phones have more functionality than ever and carriers need to find new revenue streams. Traditional media networks are losing viewers and advertisers and money and need to reinvent their business models in the face of media fragmentation and the rise of CGM. And, consumers are demanding the ability to choose their own content, wherever, whenever and however they want it.

The nature of the Internet

Tim Jarrett

...a marketplace, rather than just a transport system.


And it is in the interests of the Public Relations industry that it remain so.

Friday, November 18, 2005

Speaking of security

RSA has a blog. It is written in techno speak, so they are still getting the hang of blogosphere. They need to hire my copy editor.

New FBI website goes after online fraud

The FBI has launched a new-to-me website called Looks too good to be true. There is a page that identifies risk factors; also file a complaint.

We could turn the logic of spammers, and their fellow travelers, on its head by doing more than deleting fraudulent email. Once, just once a year, pick an especially obnoxious sample of spam, research its origin, and alert every government agency with any possible jurisdiction. Spammers are counting on most of us to delete their spam and just reach their victims. What they don't expect is for us to fight back.

Great copy writing

American Eagle Group has a great opener on it's home page:

Ready, Fire, Aim!

How do you manage your projects? Do you "Fire" before taking aim? Sadly, many companies seem to "Fire" upon a project without taking advantage of the proper project management practices.

Ed Cone has a new address

Ed Cone

Interview with Paul Duval

Shahid points to Andy Glover's interview with Paul Duval about Duval's new book on software project management.

What is Continuous Integration?

In defining continuous integration, most people refer to the article that Martin Fowler and Matthew Foemmel from ThoughtWorks wrote several years ago. In it, they refer to CI as "a fully automated and reproducible build, including testing, that runs many times a day". I expand on this definition and describe CI as "an automated process of building software whenever a change is applied - this may include automated testing, inspection, reporting, deploying, and notification."

It's amazing how their paper has become the touchstone for defining CI even though it's been around in some form or another for awhile! Given that is not some new revolutionary tool or technique, why should I care about CI?

Because it does the dirty work for you, so you can write software for your users and not spend time on infrastructure issues. It reduces common risks, improves the software quality, and ensures timely feedback. I don't know about you, but I don't like paying bills so I use automatic bill pay. Why? Because paying my bills is a mundane, repetitive activity that drains money from my account. I still haven't found anything to prevent the draining of money, but at least I don't need to do the mundane repetitive work any more. I like working on interesting and unique problems when developing software and there is far more in software development that is "dirty work" than you might imagine. It is the "little things" here and there that add up to decreased productivity and efficiency. Of course, "building the software" is something that we must do, yet I have seen far too many shops who haven't even automated their builds. In fact, an MIT study conducted in 2003 indicates that only between 20-25% are even running daily builds. There is so much more, including the execution of regression tests, static analysis tools, SCM labeling, database integration, notification, and deployment that can and should be automated - and run continuously.


This is the first time I have heard the expression, continious integration, so it is something I am going to have to look into. I don't think you can flack this stuff if you don't know what it is.

Thursday, November 17, 2005

I'm so ravenous, I could eat an entire blackbird pie

c=US ID Mgt.

It's this thread that's been developing in my head over the last few weeks starting with a comment by my muse to start checking out heteronyms.

Heteronyms are pseudonyms with individually developed writing styles. The "Book of Disquiet" is an example of a novel that's written in this style. Along with heteronyms came words such as homographs.

Homographs are also a security risk when people think they are reaching one web site, when they are actually reaching another.

How in fact does one guard identity when similar sounding (or written in different character set) web sites or telephone numbers are used? Another Hax0r trick.

Certainly a great source of punning, and double entendre, this facility of language to act at multiple levels at the same time is a great thing. Cequs is also seek us, or c equals us
and so on. It's what makes Shakespeare worth watching and reading time and time again, that sense of depth.

So I started making a sort of homograph, and not a very good one. "I'm so ravenous, I could eat an entire blackbird pie".

The next day I walked outside and there was a gigantic flock of crows or blackbirds hanging outside in the trees, a very unusual event and a portent. Giant flocks of birds suddenly squawking outside your door is very Alfred Hitchcock.

When I told someone at work about this they said "well of course, they hang out on the wire and pick this stuff up".


This fellow employs a stream-of-consciousness method to information assurance commentary. It is oddly effective.

Congratulations Mary Aufseeser

Mary Aufseeser, Tom Biro's mother, was elected mayor of Matawan, New Jersey.

I also had a political mom. It is a very special experience to ask people for vote for mom.

Wednesday, November 16, 2005

RSS and its impact on XML

Implications to the Meta Data Environment

The implications for the meta data environment are enormous. Taking a closer look at RSS standard reveals that simplicity and consistency are critical irregardless of context. This indicates that a simple metamodel, such as the Dublin Core, could be easily exchanged by the use of RSS technology. Several of the sample feeds, included at the bottom of this article, contain Dublin Core expansions. Newsreaders could replace the majority of the functionality currently held within the centralized meta data repository. Publishing new content is very similar to the information required for publishing technology asset meta data or will be in the near future. Advancements in the RSS technology will allow code objects, analysis documents, modeling artifacts and other system development life cycle products to publish information about the assets automatically. This will eliminate the need for the extraction of information by hand or forcing integration into a single methodology. RSS already has search functionality and personal taxonomies where the end user can catalog their own content which may prove to be much more valuable than the traditional IT based taxonomies.


I would be very interested in hearing developer's comments on this.

Defending the open, end-to-end Internet

Deal Reached on Managing the Internet

TUNIS, Tunisia -- A U.N. technology summit opened Wednesday after an 11th-hour agreement that leaves the United States with ultimate oversight of the main computers that direct the Internet's flow of information, commerce and dissent.

A lingering and vocal struggle over the Internet's plumbing and its addressing system has overshadowed the summit's original intent: to address ways to expand communications technologies to poorer parts of the world.


Dan Gillmor

There's a lot of angst about the rest of the world "taking control" of the Internet from the U.S. I share some of that concern, given the total disregard for free speech that exists in so many countries and the ITU's record of cloddishness in its regulatory approach. (Tunisia, with its fairly repressive regime, seems like an odd place to hold an "information society" gathering, but the UN does like to be inclusive, which is a good thing.)

This is a hugely complicated topic, involving things like which servers handle lookup requests; arcane regulation; and a lot more. But there's no question in my mind that an Internet a) controlled in serious ways terrible organizations such as the ITU; or b) turned into a bunch of local fiefdoms is not the way we want it to go. The signs are already emerging that the latter will happen, unfortunately.


If the Internet is to work we need everyone on it, including half-literate farmers in the African sahel coming to an internet cafe once a month when they take their goods to market.

We also need to keep it open and not degenerate into walled-off gardens like the bad old days of Compuserve, Prodigy, and only talking to those who subscribed to the same service.

Cultivating the channel

Media Orchard says its time for advertisers to embrace blogs.

Many developer blogs have advertising; this would be a great opportunity for Microsoft, Apple, Sun, etc. to support their independent software developers. An ad on your developer’s blog would reinforce the partnership and generate leads for both of you. It would also be an effective way to reinforce your company’s message to the reader.

Tech on the Potomac, the Mid-Atlantic Technology Blogs

Tuesday, November 15, 2005

Why the price of online advertising is about to go up

Readers up 11% at US news websites

US newspaper websites are attracting users at a faster pace than the internet overall with visitor numbers up 11 per cent annually, according to figures released yesterday by Nielsen/NetRatings.


I think publications will start charging for more of their online content. I hope someone can develop a technology that would allow bloggers with paid subscriptions to link to individual articles that would allow their readers to click through to that article, and that article only. It would be great marketing for any news organization that employed such technology.

Precise and concise

Keith Casey on why he blogs

Second, it forces me to practice communication in general. I believe most blog readers don't have the time or attention to spend 15 minutes reading an article. It's not from a lack of intellect or anything like that, it's simply a matter of time/attention available. Therefore, I figure I have about 15-30 seconds to draw people in and give them a reason to continue reading. This has caused me to think even faster on my feet in person and give someone a reason to continue the discussion.

Monday, November 14, 2005

The importance of timing

Managing a Crisis in Associations and Nonprofits

When reporters don’t understand RSS

David Carr, The New York Times

Blogs can be serious enough and conventional enough in execution to fit in with mainstream media (as will be the case when Time.com will begin running AndrewSullivan.com in January). But because blogs can be amended or erased, the people who write them tend not to be held to account.


It is perfectly true that you can alter or even delete a post; but the RSS feed is still out there. To say nothing of The Wayback Machine.

Other people’s property

Jim Horton continues his great commentary on the Sony BMG fiasco. The central issue, to my way of thinking, is Sony’s assumption that it was acceptable to harm their customer’s property in attempt to protect their own. This is a line that must never be crossed; to cross this line is to put your foot on a very slippery slope indeed. The IT world would become a cesspool of cyber warlords.

This sort of incident is part of what is driving the free software movement. It is not simply that you have to pay for proprietary software, most of us are OK with that, it is that you have no way of knowing what is buried in that code. Sony did not just hurt itself with this incident; it hurt the whole idea of proprietary software.

Magazines and newspapers survived the invention of the copy machine, TV and films survived the introduction of the VCR, the music industry would not only survive file sharing, it will flourish once it adopts its business model. The increasing adoption of Linux indicates that you can make money from free.

I don’t understand it either.

Sunday, November 13, 2005

Another reason to do business with the government

Government Enters Fray Over BlackBerry Patents

The Justice Department has filed a legal brief in a patent dispute, asking a federal court to delay any immediate shutdown of the popular wireless e-mail system to ensure that state and federal workers can continue to use their devices.

... The Justice Department, filing on behalf of various government agencies, requested a stay of 90 days to put together an electronic database of government users whose service should not be cut off in the event Research In Motion loses its final legal battles and does not reach a settlement. In addition, the "statement of interest" filed by Justice said the government is concerned "there may be a substantial public interest that may be impaired" by shutting down the service.

There are more than 3 million BlackBerry users in the United States, approximately 10 percent of whom are state and federal government employees who use the devices to keep in contact when out of the office.


The Federal government can be a very powerful ally in this kind of fight.

What if your blog were vaporized?

Morgan McClintic helpfully points to WebGrabber for Macs and HTTrack for PCs.

It wouldn't be just the disappointment of losing all your work. Once you've put something on the web, you are responsible, so it is helpful to have your own copy of the historical record.

See it now

I saw Good Night and Good Luck last night at the Uptown Theater. A friend recommended it as reminiscent of the world of our parents men in white shirts, smoking cigarettes, doing important things. (My friend does not smoke, nor does she recommend it.) The film really is that; it did put me forcibly in mind of my parents' world. Clooney wisely decided to go with old tapes of Joseph McCarthy, rather than have an actor play him. That dictated that the film be shot in black and white, which coincidentally enhanced its historical authenticity.

Good Night and Good Luck offers a glimpse of how television news really works, the assorted pressures of running a commercial news operation, the complications that come from aggressively covering a government that has the power to regulate you via the FCC licensing process.

It is also a great film about fear, how silence enables it and how speaking out destroys it. Highly recommended.

Friday, November 11, 2005

Government procurement, why it’s different

Mass. reference model controversy over open formats

Since its release last September, a technical reference model issued by Massachusetts has sparked considerable debate within the government technology community—and beyond.

At stake is the issue of how active a role public offices should take in fostering open standards. Should an agency adopt a new open format—one that would better suit its goals but may prove more difficult to deploy and manage? Or should agencies follow the best practices of the commercial IT industry, taking full advantage of cost efficiencies and new features that may follow?


If a private company decided to migrate to open source systems, that would be that. The customer is always right and there isn’t much a vendor can do. But with the multiple decision makers involved in government systems, elected, appointed and civil service, it is an entirely different situation.

Why would a government insist on open standards?

... Massachusetts CIO Peter Quinn has indicated that the reason behind the move to OpenDocument is that it will allow the state to better keep permanent records.

“Ease of access to electronic records created in proprietary formats is limited in time. Once the proprietary vendor abandons a particular version of an application or format, documents created and formatted in those applications and formats may become inaccessible to all readers,” according to the frequently asked questions section of the state CIO’s Web site .


Massachusetts Enterprise Technical Reference Model - Version 3.5

Dan Bricklin’s audio files of the public meetings the state has held on the matter.

New to me local content management blog

Kensington Business Solutions

New to me tech organization

The Content Management Community of Practice

Sony gets a clue

Ted Bridis, Associated Press

WASHINGTON -- Stung by continuing criticism, the world's second-largest music label, Sony BMG Music Entertainment, promised Friday to temporarily suspend making music CDs with antipiracy technology that can leave computers vulnerable to hackers.

Sony defended its right to prevent customers from illegally copying music but said it will halt manufacturing CDs with the "XCP" technology as a precautionary measure. "We also intend to re-examine all aspects of our content protection initiative to be sure that it continues to meet our goals of security and ease of consumer use," the company said in a statement.


No way to know what happened; but I suspect the Sony PR department explained the facts of customer relations to management.

Jim Horton has a good summary here and an earlier one here.

Contrary to legend, Macs are vulnerable.

Now the Legalese Rootkit: Sony-BMG's EULA

How to detect a root kit hack

Looking for a web hosting service?

These web hosting services recommended by Novajug members.

Veterans' day

The Armed Forces Relief Trust

United Services Organization

This is satire

Faith based firewalls

I say that because it is getting harder and harder to tell what is satire and what is real.

FTP software for Mac OS X

RBrowser

Cyberduck

Fetch Softworks

Pure Mac: FTP Software for Macintosh

I haven't tried any of these, so can't speak to their quality, but on the MacEdit discussion list RBrowser, Cyberduck, and Fetch all got recommendations.

Thursday, November 10, 2005

Why blog relations is a growth industry

Intelliseek

CINCINNATI, Ohio (Sept. 26, 2005) -- Consumer trust toward traditional advertising is being challenged by growing confidence in consumer-generated-media (CGM) and the recommendations of other consumers, according to a new study of consumer behavior by Intelliseek Inc., a leader in word-of-mouth measurement.

A follow-up to a 2004 "Trust in Advertising" study, the "2005 Consumer-Generated Media (CGM) and Engagement Study" finds that, compared to traditional advertising, word-of-mouth (WOM) behavior continues to grow in importance in consumer awareness, trial, and purchase of new products.

Consumers are 50 percent more likely to be influenced by word-of-mouth recommendations from their peers than by radio/TV ads – a slightly higher level of influence/trust than found in the 2004 study co-authored by Intelliseek and Forrester.


Obviously Intelliseek has a vested interest in promoting this point of view; but I think this in on track. The smart way for companies to tap into the blog phenomena is to encourage their employees to blog and link to the influential blogs in their industry. No astroturf, just let nature take its course.