Saturday, December 31, 2005
Friday, December 30, 2005
Get to know Ruby before you hop on (or off) the Rails bandwagon
Andrew Glover
Andrew Glover is Chief Technology Officer for JNet Direct
I would be interested in hearing from my developer readers what they think of Glover’s article.
Ruby's syntax is different from that of the Java language. First, Ruby has no brackets or semicolons, and it makes types completely optional. Some might say that Ruby's syntax is terse, and it's that way with a purpose : this language lets you create concise working code in short order.
Andrew Glover is Chief Technology Officer for JNet Direct
I would be interested in hearing from my developer readers what they think of Glover’s article.
Bringing the test drive to software
The free sample, or test drive, is a very powerful tool in the sales cycle. Until recently it simply was not practical for software. Now some companies have begun to offer thirty-day trials of their software. Codign has been offering a trial version of its code testing plug-in, CoView.
I will be interested in watching how this approach works. Much of the cost of software is associated with the installation and training requirements, so a free trial only solves part of the problem. Still, I think free trials will become part of almost every sales cycle.
Edit-
Testing is important, automatically generating JUnit tests is magical
I will be interested in watching how this approach works. Much of the cost of software is associated with the installation and training requirements, so a free trial only solves part of the problem. Still, I think free trials will become part of almost every sales cycle.
Edit-
Testing is important, automatically generating JUnit tests is magical
Thursday, December 29, 2005
Are you sure you want your name on this?
U.S. stalls on human trafficking
Are you sure you want to go on the record as saying your client can’t reasonably be asked to fulfill their contract without resorting to kidnap and slave labor? Do you think that simply because Congress does not write such a ban into policy that such practices are less criminal?
Part of being a good lobbyist is explaining the facts of PR and political life to your client. If your client is such that they don’t understand that human trafficking is a line that can never be crossed, your have your work cut out for you.
WASHINGTON - Three years ago, President Bush declared that he had "zero tolerance" for trafficking in humans by the government's overseas contractors, and two years ago Congress mandated a similar policy.
But notwithstanding the president's statement and the congressional edict, the Defense Department has yet to adopt a policy to bar human trafficking.
A proposal prohibiting defense contractor involvement in human trafficking for forced prostitution and labor was drafted by the Pentagon last summer, but five defense lobbying groups oppose key provisions and a final policy still appears to be months away, according to those involved and Defense Department records.
The lobbying groups opposing the plan say they're in favor of the idea in principle, but said they believe that implementing key portions of it overseas is unrealistic. They represent thousands of firms, including some of the industry's biggest names, such as DynCorp International and Halliburton subsidiary KBR, both of which have been linked to trafficking-related concerns.
Are you sure you want to go on the record as saying your client can’t reasonably be asked to fulfill their contract without resorting to kidnap and slave labor? Do you think that simply because Congress does not write such a ban into policy that such practices are less criminal?
Part of being a good lobbyist is explaining the facts of PR and political life to your client. If your client is such that they don’t understand that human trafficking is a line that can never be crossed, your have your work cut out for you.
What is Ruby?
Serge van den Oever
What’s Ruby?
User Groups
Adam’s Morgan Ruby User Group
DC Area Group
Northern Virginia Ruby Users Group
Ruby Garden Wiki
Never heard of Ruby? Its that new hot language that is at the tipping point of blowing away all existing languages;-)
Read about it at http://ruby-lang.org, and of course don’t forget the great Ruby on Rails framework at http://www.rubyonrails.org that lets you build a data driven, Ajax style web site garanteed under 15 minutes. And the book “Agile web development with Rails” is absolutely a great reading.
What’s Ruby?
Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, extensible, and portable.
Oh, I need to mention, it's totally free, which means not only free of charge, but also freedom to use, copy, modify, and distribute it.
User Groups
Adam’s Morgan Ruby User Group
DC Area Group
Northern Virginia Ruby Users Group
Ruby Garden Wiki
Wednesday, December 28, 2005
Why government contracting is different, or why it may be a while before anyone else crosses Microsoft
Mass. CIO Peter Quinn resigns
Massachusetts mandates open-format docs
Government procurement, why it’s different
Massachusetts flips, sides with Microsoft
Steven J. Vaughan-Nichols comments.
Massachusetts CIO Peter Quinn, a leader among state IT officers in the push towards open data standards, unexpectedly resigned this week.
... The CIO came under fire during the later stages of 2005. Earlier this year the state senate launched hearings into what it called a lack of due process within the state’s IT division, and is now considering the creation of an IT review board to oversee state policies on the standardization of IT equipment and software.
This fall, Gov. Romney opened a review of six trips Quinn made to out-of-state conferences over the last two years.
The review found that Quinn had not violated any conflict of interest provisions, the Boston Globe reported.
Massachusetts mandates open-format docs
Government procurement, why it’s different
Massachusetts flips, sides with Microsoft
Steven J. Vaughan-Nichols comments.
Tuesday, December 27, 2005
The Second International Conference on Open Source Systems
8 - 10 June 2006, Grand Hotel, Como, Italy
Call for Papers, Workshops, Tutorials, Panels and Demonstrations
For my developer, project manager and systems integrator readers.
Call for Papers, Workshops, Tutorials, Panels and Demonstrations
Free and Open Source Software (OSS) development continues to emerge, grow, and spread as a global phenomenon that spans and connects culture, technology, and organization. OSS is one of the most exciting and controversial technologies of modern times that is stimulating scholarly research and popular debate in many disciplines. OSS research studies are now found in diverse disciplines including anthropology, economics, education, law, management of technology, organization science, political science, public policy, sociology, and the visual and performing arts, as well as computer supported cooperativework, human-computer interaction, information systems, and software engineering. Such diversity gives rise to recognizing OSS as an interdisciplinary information technology that both depends on and stimulates social relationships in the organizations and project communities that develop, deploy, and adapt OSS.
The goal of OSS2006 is to provide an international forum where a diverse audience of OSS researchers and practitioners can come together to examine the culture, technology, and organization of OSS systems, work practices, development processes, community dynamics, tools and applications.
OSS2006 will bring together people from academia, industry, and public administration to share their experiences, ideas, and concerns, as well as provide an archival source of important papers addressing OSS topics within or across disciplines. The conference will consist of research papers presentations, workshops, tutorials, panels, and project demonstrations.
Important dates:
Research Paper and Extended Abstracts Submission: Jan 9th, 2006
Proposals for Tutorials, Workshops, Panels and Demonstrations: Jan 23rd, 2006
Notification of acceptance: Feb 20th, 2006
Submission of final papers: Mar 13th, 2006
For my developer, project manager and systems integrator readers.
Monday, December 26, 2005
Blogs, more work, more opportunity
Shrinking News Holes Make it Tougher for Mid-Level Companies
The media food chain has been extended. On the one hand, it will be increasingly necessary to launch a story from blogs before you even pitch to mass-market media. On the other hand, there are millions of blogs and more each day; the possibility to place a story is greater than ever.
Media targeting has long been the name of the game for many mid-level corporations, as a specific placement in regional dailies can pay off as much as the national dailies. But shrinking newsrooms and news holes, and an increasing number of mid-level corporations, has even made this a tough placement to gain.
... Beyond mainstream pitching techniques, Braykovich also points to the importance of utilizing emerging forms of media. "We do monitor numerous blogs, notably, blogs providing news about regional companies or issues. Influencing the influencers and pitching your news to bloggers is another, albeit less direct, manner of reaching our newsroom."
The media food chain has been extended. On the one hand, it will be increasingly necessary to launch a story from blogs before you even pitch to mass-market media. On the other hand, there are millions of blogs and more each day; the possibility to place a story is greater than ever.
Good news for bloggers
'Wash Post' Extends Free Online Archives to 60 Days
It used to be a story that ran one day would only generate one day’s worth of advertising dollars. Now a story you ran two months ago can still be generating paid links. Online content will be very profitable for those who understand online conversations.
It used to be a story that ran one day would only generate one day’s worth of advertising dollars. Now a story you ran two months ago can still be generating paid links. Online content will be very profitable for those who understand online conversations.
And in a moment, 216,000 were gone
World marks tsunami anniversary
The South-East Asia Earthquake and Tsunami Blog
It must take a lot of courage to go forward in the face of that sort of grief.
The South-East Asia Earthquake and Tsunami Blog
It must take a lot of courage to go forward in the face of that sort of grief.
Saturday, December 24, 2005
Thursday, December 22, 2005
International Association of Software Architects Launches
Loosely Coupled Thinking links to my client IASA and describes it thusly:
From the news release:
Edit-
Phil Windley comments.
Cirrus Minor comments.
IASA is a vendor agnostic, non-profit organization focused on defining and supporting the professional duties of IT architects.
From the news release:
The new website was created expressly for professional software architects and aims to assist them at all stages of their career by providing articles, reusable content and chapter pages for local IASA chapters around the world.
Paul Preiss, the President and Founder of IASA, describes why the online resource is a necessary addition to the industry:
"Most articles, templates and patterns are written with the developer in mind. The IT architect is completely left out of the equation. Thus the IASA provides this valuable resource to our members."
Architecture related news, patterns, templates and web log postings from practincing architects will make up most of the content of the new website. Visitors will also find Knowledge Communities, which are pools of knowledge on specific IT architecture topics, edited by the experts in the field.
Edit-
Phil Windley comments.
Cirrus Minor comments.
Massachusetts reverses itself
"Office Open XML will meet our new standards for acceptable open formats"
I wondered if they would be able to make that stick.
I wondered if they would be able to make that stick.
Continuous feedback
Google Tool Empowers Feedback Loop
This could lead to industrial strength naval-gazing.
Blogger Web Comments for Firefox allows web surfers (using Firefox) to see what people are saying about any page on the Internet.
This could lead to industrial strength naval-gazing.
More on press releases
Michael Sommermeyer
I want every reporter reading this to know I would never, ever, send out a press release so unnewsworthy that I would not post it on my own blog.
However, many organizations use their blog as a repository; a place to post the press releases and little else. Sadly, some blogs also are used as places to promote or market products, services and reputations.
I want every reporter reading this to know I would never, ever, send out a press release so unnewsworthy that I would not post it on my own blog.
The future of the trade press
Vik David
This is very discouraging, because some of the best reporting is done in the trade press. Tech blogs have a very idiosyncratic approach. They are unreliable in the sense that they do not have regular assignments or deadlines. If you want a predictable source of news on a subject you need a professional organization, news is not something amateurs can do, any more than writing code is something amateurs can do. Somehow the trade press is going to have to create a symbiotic relationship with blogs.
On the tech side, I've dropped all my print magazine subscriptions (JDJ, EAI Journal, Computerworld, InfoWorld, etc.) and rely completely on blogs and a podcast or two. This is good because my tech news is MUCH more focused to what I care about.
This is very discouraging, because some of the best reporting is done in the trade press. Tech blogs have a very idiosyncratic approach. They are unreliable in the sense that they do not have regular assignments or deadlines. If you want a predictable source of news on a subject you need a professional organization, news is not something amateurs can do, any more than writing code is something amateurs can do. Somehow the trade press is going to have to create a symbiotic relationship with blogs.
Wednesday, December 21, 2005
OMB releases new version of DRM
Joab Jackson, Government Computer News
PDF copy of the Federal Enterprise Architecture Data Reference Model
The new standard will make it possible for federal agencies to exchange information; for example if the National Highway Traffic Safety Administration needed to exchange data with the FBI. This is will improve the efficiency and effectiveness of the Federal government.
It will also change the IT industry. Everyone who wants to sell to the federal government will have to comply with this standard. States will put it in their requirements, partly because they need to exchange information with the federal government, but also because they look to the federal government to provide leadership on this sort of thing.
Any company who exchanges information with the federal government, as in an investment bank sending information to the Securities Exchange Commission, will want their software to comply with the standard to facilitate the exchange of data. And so on and so on down the IT economic food chain. The Federal Enterprise Architecture Data Reference Model is the de facto industry standard.
The Office of Management and Budget has posted the second version of the Federal Enterprise Architecture Data Reference Model.
PDF copy of the Federal Enterprise Architecture Data Reference Model
The new standard will make it possible for federal agencies to exchange information; for example if the National Highway Traffic Safety Administration needed to exchange data with the FBI. This is will improve the efficiency and effectiveness of the Federal government.
It will also change the IT industry. Everyone who wants to sell to the federal government will have to comply with this standard. States will put it in their requirements, partly because they need to exchange information with the federal government, but also because they look to the federal government to provide leadership on this sort of thing.
Any company who exchanges information with the federal government, as in an investment bank sending information to the Securities Exchange Commission, will want their software to comply with the standard to facilitate the exchange of data. And so on and so on down the IT economic food chain. The Federal Enterprise Architecture Data Reference Model is the de facto industry standard.
Discouraging headline
Daily Data Breaches
Clue to the financial industry and all others who collect personal data, either you can solve this problem or you can wait for the political system to solve it for you. I leave it to you to decide which you would prefer.
Privacy Rights Clearinghouse
Clue to the financial industry and all others who collect personal data, either you can solve this problem or you can wait for the political system to solve it for you. I leave it to you to decide which you would prefer.
Privacy Rights Clearinghouse
Tuesday, December 20, 2005
European Computer Manufacturer’s Association Technical Committee 45
TC45 begins the creation of the Ecma Office Open XML File Formats standard...
If open standards are to work they must be international.
Edit-
Not everyone is impressed.
Ecma International began the technical work Thursday 15 December 2005 to standardize the Office Open XML File Formats. TC45, the Ecma technical committee organized to create the Ecma document format standard, held its first meeting in Brussels, Belgium.
The standard will be based on an initial 2000 page draft technical specification submitted by Apple, Barclays Capital, BP, the British Library, Essilor, Intel Corporation, Microsoft, NextPage Inc., Statoil ASA and Toshiba.
If open standards are to work they must be international.
Edit-
Not everyone is impressed.
Monday, December 19, 2005
The Soul of a New Machine
Tracy Kidder’s Soul of a New Machine has to be one of the most unlikely best sellers of all time. It tells the story of how Data General brought a new computer to market. Written in the days before the PC, to story of writing software must have seemed an unlikely subject for the general public. But readers were fascinated.
There is a lesson there are about the appeal of enterprise computing stories for publications that would heed it.
There is a lesson there are about the appeal of enterprise computing stories for publications that would heed it.
A difficult pitch to make
Conferences that Kevin Maney will not be attending:
Here is why technology reporters should cover this conference, because toner cartridges, their cost, quality, and recycling issues have a huge impact on your readers. Cartridges are the largest single cost of ownership for a printer.
Cartridge technology drives what you can do with a printer, as in color printers, etc.
No, it is not as fun as a gadget trade show. There aren't any cool toys. Any reporter can cover a gadget show, only the most skilled business reporter can write about toner cartridges in a way that shows readers how their lives are affected.
Note - no this is not my client, but it is the sort of story I pitch.
IMI’s 9th Annual Toner & Imaging Chemicals Conference – The Future of Toner & Imaging Raw Materials on February 6-8, 2006 focuses on the technology, market and applications challenges and opportunities that are facing the toner industry.
Here is why technology reporters should cover this conference, because toner cartridges, their cost, quality, and recycling issues have a huge impact on your readers. Cartridges are the largest single cost of ownership for a printer.
Cartridge technology drives what you can do with a printer, as in color printers, etc.
No, it is not as fun as a gadget trade show. There aren't any cool toys. Any reporter can cover a gadget show, only the most skilled business reporter can write about toner cartridges in a way that shows readers how their lives are affected.
Note - no this is not my client, but it is the sort of story I pitch.
Regarding online communications
Tom Murphy
With some trepidation, I am going to dissent from this. Certainly you want to understand the writers, journalists or bloggers, you are pitching to; but ultimately it is about readers. Think about who you want to reach, not just which publications and/or blogs they read, but why they read them. I try to have a specific person in mind when I write a press release and imagine them sitting at their computer looking for information or interesting tidbits. It is easier to write lively copy if you have a specific reader in mind.
We can identify and contact bloggers on any given subject in minutes. We can quickly and easily scan their blogs to see if their content is relevant and we can use tools like Technorati or BlogPulse to try and gauge their influence, but do we stop to understand the blog?
Two separate conversations this week have led me to believe that the Internet has spoilt us and has put unrealistic expectations into our heads. Two different marketing/PR folks were in touch asking my opinion on undertaking blog relations. Both saw the value of blog relations, but wanted to know how they could pull together an outreach campaign quickly. Both mentioned they were under time pressures. You see, given you can find anything online quickly, you can communicate quickly, well then you must be able to communicate well quickly. It’s the Hare’s approach to online PR. The reality is somewhat different.
Rather than racing to throw some bloggers into the e-mail hopper, I believe you would be better advised to follow the tortoise’s example. Take a deep breath, slow down and let that wonder of millions of years of evolution, your brain, take over from the speed of the Internet. If you really want to effectively pitch bloggers, then just like journalists you need to identify them, understand their audience, understand their policy on PR pitches and then tailor your pitch to effectively communicate with them.
With some trepidation, I am going to dissent from this. Certainly you want to understand the writers, journalists or bloggers, you are pitching to; but ultimately it is about readers. Think about who you want to reach, not just which publications and/or blogs they read, but why they read them. I try to have a specific person in mind when I write a press release and imagine them sitting at their computer looking for information or interesting tidbits. It is easier to write lively copy if you have a specific reader in mind.
Delivering Christmas
Say thanks to your postal carrier today...
Chris Dorobek reminds us that for some people, Christmas is a massive logistical undertaking.
Chris Dorobek reminds us that for some people, Christmas is a massive logistical undertaking.
Sunday, December 18, 2005
Whistle blowers
Bush Secretly Lifted Some Limits on Spying in U.S. After 9/11, Officials Say
Rarely, very rarely, anonymous sources speak to reporters because they are genuinely concerned about serious wrong doing. This is how the cult of anonymous sources was established.
In the case of intelligence agencies, there are only a limited number of people who could possibly have known about this. Does anyone reading this have any doubt that the proponents of this program have long since identified and retaliated against the sources for this article? Particularly because the New York Times, for reasons best known to itself, withheld publication of this article for a year? When a source speaks speaks off-the-record to a reporter, they have no possibility of invoking the whistle blower protection act.
Of course civil servants feel that the act is ineffective and will not protect them, which is why both the Project on Government Oversight and Public Employees for Environmental Responsibility encourage anonymous activism. But in a world where almost no one will publicly blow the whistle, it is far easier for bullies to isolate and punish the whistle blowers who do emerge. Had the sources for the New York Times article all have gone on the record, it would have been very difficult to have retaliated against all of them. It is known as solidarity and is the foundation of all nonviolent political protest.
If the PR industry wishes to end the practice of anonymous sources, and I hope opinion is shifting in that direction, then it is not enough to persuade our clients to speak on the record. We also have to educate our clients to distinguish between whistle blowers and trouble makers and resist the temptation to retaliate against the former.
This article is great reporting. There isn’t a PR pro reading this post who wouldn’t be thrilled to have a client favorably mentioned in the New York Times. We pay for advertising in the Times not merely because of the number of people who read it, but because of the class of the venue. Great journalists make PR possible; James Risen and Erick Lictblau have reminded us why journalism matters.
Nearly a dozen current and former officials, who were granted anonymity because of the classified nature of the program, discussed it with reporters for The New York Times because of their concerns about the operation's legality and oversight.
Rarely, very rarely, anonymous sources speak to reporters because they are genuinely concerned about serious wrong doing. This is how the cult of anonymous sources was established.
In the case of intelligence agencies, there are only a limited number of people who could possibly have known about this. Does anyone reading this have any doubt that the proponents of this program have long since identified and retaliated against the sources for this article? Particularly because the New York Times, for reasons best known to itself, withheld publication of this article for a year? When a source speaks speaks off-the-record to a reporter, they have no possibility of invoking the whistle blower protection act.
Of course civil servants feel that the act is ineffective and will not protect them, which is why both the Project on Government Oversight and Public Employees for Environmental Responsibility encourage anonymous activism. But in a world where almost no one will publicly blow the whistle, it is far easier for bullies to isolate and punish the whistle blowers who do emerge. Had the sources for the New York Times article all have gone on the record, it would have been very difficult to have retaliated against all of them. It is known as solidarity and is the foundation of all nonviolent political protest.
If the PR industry wishes to end the practice of anonymous sources, and I hope opinion is shifting in that direction, then it is not enough to persuade our clients to speak on the record. We also have to educate our clients to distinguish between whistle blowers and trouble makers and resist the temptation to retaliate against the former.
This article is great reporting. There isn’t a PR pro reading this post who wouldn’t be thrilled to have a client favorably mentioned in the New York Times. We pay for advertising in the Times not merely because of the number of people who read it, but because of the class of the venue. Great journalists make PR possible; James Risen and Erick Lictblau have reminded us why journalism matters.
Friday, December 16, 2005
On public speaking
Stop your presentation before it kills again!
I too am puzzled by the ubiquitous presence of slides. Those who speak for a living, teachers, lawyers, preachers, never use slides. Surely there is a lesson there.
Sometimes the best presentation is... no presentation. Ditch the slides completely. Put the projector in the closet, roll the screen back up, and turn the damn lights back on!
... But given how many people hate slide presentations, why is it universally assumed that where there is "a talk", there's PowerPoint (or its much cooler cousin, Apple's KeyNote)? Conference coordinators rarely ask speakers if they'll be projecting slides. They send out the slide templates, then start demanding your slides several weeks before the show. Saying you don't have slides is like saying you'll give your talk naked. "You mean... you're going out there with nothing???"
I too am puzzled by the ubiquitous presence of slides. Those who speak for a living, teachers, lawyers, preachers, never use slides. Surely there is a lesson there.
Thursday, December 15, 2005
Traction Customer IJIS Institute Named One of BusinessWeek's WebSmart 50
IJIS Institute Cited by BusinessWeek as One of 50 Innovative Uses of Internet Technology in Business
Congrats to the Traction PR team for placing this.
Edit-
IJIS Institute Has Deployed Blogs, Cited by BusinessWeek as Web Smart
PROVIDENCE, R.I., Dec. 15 /PRNewswire/ -- Traction Software, Inc., the leader in Enterprise Blog software for business, today announced that The Integrated Justice Information Systems (IJIS) Institute was selected as a BusinessWeek "WebSmart 50" organization, in the November 21, 2005 issue, based on IJIS's deployment of Traction TeamPage(TM) enterprise blog technology for its Website, Partner Extranet, and Staff Intranet. You can read about the Web Smart 50 by going to: http://www.businessweek.com.
Congrats to the Traction PR team for placing this.
Edit-
IJIS Institute Has Deployed Blogs, Cited by BusinessWeek as Web Smart
But what gave the Internet its disruptive power and exhilarating appeal was that it was barely owned
Jonathan Krim, Washington Post
Saving the Net: How to Keep the Carriers from Flushing the Net Down the Tubes
Suddenly, the mom-and-pop store in Des Moines could advertise and sell to the world, without paying the freight of someone else's marketing apparatus. Intellectual and artistic works could be shared rapidly, at little or no cost. Games could be created and distributed without ever having to manufacture a physical item.
We may think of it as the information superhighway, but really the Net has been a gigantic bypass, circumventing barriers to entry and whole swaths of middlemen (think travel agents or, I'm sad to say, newspaper owners) who are now trying to figure out how to survive.
Saving the Net: How to Keep the Carriers from Flushing the Net Down the Tubes
What is mesh networking?
Wikipedia
Now you know.
Mesh networking is a way to route data, voice and instructions between nodes. It allows for continuous connections and reconfiguration around blocked paths by "hopping" from node to node until a connection can be established.
Mesh networks are self-healing: the network can still operate even when a node breaks down or a connection goes bad. As a result, a very reliable network is formed. Applicable to wireless networks, wired networks, and software interaction.
A mesh network is a networking technique which allows inexpensive peer network nodes to supply back haul services to other nodes in the same network. A mesh network effectively extends a network by sharing access to higher cost network infrastructure.
Now you know.
European RoHS directive 2002/95/EC
Waste Electrical and Electronic Equipment
Nearson Begins RoHS Compliant Production Runs
While big business is hiring lawyers and lobbyists to fight these initiatives, small businesses are hiring engineers and complying. There are many reasons small business is big news, this is one of them.
Directives 2002/95/EC on the restriction of the use of certain hazardous substances in electrical and electronic equipment and 2002/96/EC on waste electrical and electronic equipment are designed to tackle the fast increasing waste stream of electrical and electronic equipment and complements European Union measures on landfill and incineration of waste. Increased recycling of electrical and electronic equipment will limit the total quantity of waste going to final disposal. Producers will be responsible for taking back and recycling electrical and electronic equipment. This will provide incentives to design electrical and electronic equipment in an environmentally more efficient way, which takes waste management aspects fully into account. Consumers will be able to return their equipment free of charge. In order to prevent the generation of hazardous waste, Directive 2002/95/EC requires the substitution of various heavy metals (lead, mercury, cadmium, and hexavalent chromium) and brominated flame retardants (polybrominated biphenyls (PBB) or polybrominated diphenyl ethers (PBDE)) in new electrical and electronic equipment put on the market from 1 July 2006.
Nearson Begins RoHS Compliant Production Runs
While big business is hiring lawyers and lobbyists to fight these initiatives, small businesses are hiring engineers and complying. There are many reasons small business is big news, this is one of them.
Wednesday, December 14, 2005
Measuring inbound links
You can tell the PubSub PR List is a great list, Presto Vivace Blog is on it. But I don't understand how inbound links are detected and measured. Missing inbound links on my blog include Manuel L. Quezon III, Gartner Watch, Love the Mac, and Content & Technology Crossroads. Any theories how these links got overlooked?
Top Five Federal Software Product Categories for 2006
Constatin Bastura was kind enough to forward this item:
Teaming Will be the Key to Federal Success for Software Firms
The best way to identify potential partners is to be active in any of the fine organizations on the sidebar to your right.
Teaming Will be the Key to Federal Success for Software Firms
RESTON, Va., Dec. 14 /PRNewswire/ -- In an analysis of over 3,000 federal business opportunities, five software product categories have been identified as having a high number of potential subcontracting opportunities, according to a report released today by INPUT, the authority on government business. The five categories are document & content management, project management, supply chain & logistics management, knowledge management, and inventory management.
Federal IT contracted spending for 2006 is estimated to reach $64 billion with software procurements accounting for nearly $5 billion of the market. INPUT has identified the largest segment of software subcontract opportunities is under business and enterprise applications. The top five categories within the report comprise nearly 30 percent of this segment.
"The federal market holds ample opportunities for software vendors, whether they focus on targeted applications, enterprise solutions, or the underlying platforms," said John Slye, senior analyst, federal subcontracting opportunities for INPUT. "Success for both the large primes and small subcontractors in the software market will rely heavily on their ability to create effective partnerships."
The best way to identify potential partners is to be active in any of the fine organizations on the sidebar to your right.
Unclear on the concept
Everywhere Christmas is observed marketers try to think of some tie-in for their business. I have no problem with that and would do it too if I could come up with an angle for enterprise computing.
But some things just don't fit. Some marketers should just stay away from holiday tie-ins, such as this one:
Counter Terrorism Training School
Happy holidays indeed.
But some things just don't fit. Some marketers should just stay away from holiday tie-ins, such as this one:
Counter Terrorism Training School
Holiday Special!!!
Tactical Shooting Course 3Days $700
(Regular $1,800)
We provide Weapons & Ammunition
(Glock 17, M-4, AK47 & Shotgun)
Happy holidays indeed.
Tuesday, December 13, 2005
How did this even get to be part of the conversation?
As I write this the Financial Times has an online poll on the merits of torture.
Just in time for Christmas.
My heart is so full, I can hardly speak.
Just in time for Christmas.
My heart is so full, I can hardly speak.
Why I founded Presto Vivace, Inc.
Alternet has an interview with Larry Beinhart; one of the things he says is:
This puts small business at a terrible disadvantage, because even the prosperous ones do not have the resources to gin out press releases. That is a terrible pity, for them and the readers who would be interested in their stories. Presto Vivace was structured in a way that allows me to offer PR services at a price small companies can afford.
With certain exceptions, news is not automatically big news. The exceptions are dead popes, the World Series, tsunamis, volcanoes, wars the wars that involve us anyway -- but most news actually becomes news -- including wars -- because of press releases. The example I always use -- because we're in the small town of Woodstock -- is the little league schedule. If the little league schedule is going to be in the newspaper, it's only because the coach or the coach's wife sends it to the newspaper.
Most news originates as a press release or a press conference or an announcement. And if it's going to stay in the news, it has to get new press releases and new stories. Someone has to work at that, someone has to invest effort and time to make it a big story. And if nobody does that, it may not be a story at all, or it may be a one-time item. You know, page 12 of the New York Times, page 26.
This puts small business at a terrible disadvantage, because even the prosperous ones do not have the resources to gin out press releases. That is a terrible pity, for them and the readers who would be interested in their stories. Presto Vivace was structured in a way that allows me to offer PR services at a price small companies can afford.
Does this sound like hot copy to you?
I have stayed away from the press release from hell theme, but Couthe found one that illustrates almost everything that is wrong with traditional IT hype:
Do you have any idea what that means? Neither do I, and neither, I suspect, does the person who wrote it.
I think John Wagner had it exactly when he described technology PR Pros as translators. We should replace techno-speak with English.
Portal Solution Provides Cost-Effective Means for Unlocking Potential of Trapped “Siloed” Assets; Fuels Adoption of SOA
Do you have any idea what that means? Neither do I, and neither, I suspect, does the person who wrote it.
I think John Wagner had it exactly when he described technology PR Pros as translators. We should replace techno-speak with English.
Monday, December 12, 2005
The power of the press, who is the press? who is the newsmaker?
Washington Post Reporters Upset About Links To Blogs
I think the Washington Post’s deal with Technorati is brilliant. Just plain brilliant. Bloggers commenting on your newspaper is tangible evidence of readers. If you can go to an advertiser and say that the average article receives X amount of links, or that the articles in the business section receive X amount of links, it gives advertisers confidence that they are reaching an influential audience.
Of course it’s no fun when someone exposes your writing as clueless. Better to link it from your site and learn from it, than have everyone else link to it for the purpose of enjoying a hearty laugh at your expense.
Post reporters are walking barefoot for the first time as it were. As soon as their calluses are built up they will enjoy blogosphere.
I think the Washington Post’s deal with Technorati is brilliant. Just plain brilliant. Bloggers commenting on your newspaper is tangible evidence of readers. If you can go to an advertiser and say that the average article receives X amount of links, or that the articles in the business section receive X amount of links, it gives advertisers confidence that they are reaching an influential audience.
Of course it’s no fun when someone exposes your writing as clueless. Better to link it from your site and learn from it, than have everyone else link to it for the purpose of enjoying a hearty laugh at your expense.
Post reporters are walking barefoot for the first time as it were. As soon as their calluses are built up they will enjoy blogosphere.
Sunday, December 11, 2005
Sez who?
World's poorest don't want "$100 laptop" -Intel
I have no idea what people in these countries want and neither does Mr. Barrett.
COLOMBO, Dec 9 (Reuters) - Potential computer users in the developing world will not want a basic $100 hand-cranked laptop that is due to be rolled out to millions, chip-maker Intel Corp.Chairman Craig Barrett said on Friday.
I have no idea what people in these countries want and neither does Mr. Barrett.
PR Leap
About PR Leap
I just stumbled across this, so can't say much about it; but I thought some of my readers would be interested.
R Leap - the free press release distribution service to major search engines, newswires and websites, since 2003 - has two main goals :1. We want to help newsmakers - artists, authors, business professionals, designers, developers, entrepreneurs, filmmakers, musicians, retailers, and all other types of newsmakers - get free media exposure.
... 2.We want to help newsmakers increase their search visibility.
I just stumbled across this, so can't say much about it; but I thought some of my readers would be interested.
Friday, December 09, 2005
Great moments in spin
Estimating breach size by fraud volume
Who came up with that spin?
An additional finding is that the likelihood of a fraud being committed using a given piece of revealed PII is inversely proportional to the size of the breach.
These results are being spun as suggesting that large breaches are not so bad, and that the "real risk" of ID theft is low.
Who came up with that spin?
Why data reference models are news
Military, Civilians Must Be Able To Share Data During Disaster Response
Why can't we share?
The growing number of joint civil and military users of satellite and other communications systems during times of natural disaster relief deployments — like the one following Hurricane Katrina in the Gulf of Mexico — will make it necessary to find a way to pass secure and nonsecure information so users can share data or talk with one another more easily, said Robert Otten, senior vice president of Vocality International.
Why can't we share?
Who used which application?
Shahid Shah tells us that eXpert Technology Solutions has a solution for the hole in the Citrix product line:
As we know, Citrix is a thin-client application enabler: it can take a “fat client” windows application and through a small client application (or just a browser) on a client PC it can run an entire application from just a server and use the display/keyboard/mouse from the client. Eric and his two other co-founders set out to plug an important hole in Citrix’s product line: detailed analysis and reporting of who used what application, for how long, and whether they were supposed to be able to or not. While Citrix eases the administration burden of having to install applications on multiple computers, it doesn’t ease the administrators burden of reporting to upper management.
When you sell technology, you are selling to a committee
Casey Software
One reason I attend so many meetings of user groups and trade associations is because that is the only way you get a feel for what the worker bees in the industry are thinking.
Next, technology decisions are not made from the top down. The marketing dollars are focused at the CIO's and the CTO's who are believed to chart the overall direction of the ship, but they're not the ones manning the oars. Once again, we go to the line-level geek, developer, admin who is going to use the best tools they can find to get the job done.
One reason I attend so many meetings of user groups and trade associations is because that is the only way you get a feel for what the worker bees in the industry are thinking.
Developing software for the Greater Washington, DC area, why it’s different
Project - A Contract Management Tool
Project Forums
I've noticed that most of the dotProject feature requests which come from these groups don't reflect the feature requests and requirements of the core group and those who frequent the dotProject forums.
Anyway, there are two main areas which have been discussed over and over again. First, is Earned Value Management (or Earned Value Accounting) and the second is detailed Contract Management tracking costs by Work Classification, etc. While these are likely to have little value outside this geographical area, there are a number of local groups looking for this functionality.
Project Forums
Department of Wish I had thought of that
John Wagner points to a terrific post by Jeremy Pepper describing Nokia’s blogger relations program. Ingenious. And very clever to have sent out samples to many bloggers so that any negative post would have less impact.
This, along with B.L. Ochman’s campaign for Budget Rent A Car, is a great example of blog-based promotion.
This, along with B.L. Ochman’s campaign for Budget Rent A Car, is a great example of blog-based promotion.
Jeff Jarvis needs to get over himself
Jeff Jarvis says bloggers should ignore PR people and our news releases. His post was inspired by a presentation on blog relations that he knows was terrible without even seeing it.
I am mildly curious, who elected Jeff Jarvis?
Seriously, isn’t writing, in blogs or any medium, about providing something interesting for readers? Either a news release would interest your readers or it wouldn’t. If it is interesting to your readers, I don’t see that it matters that the motives of those who sent it were impure. What is important is providing your readers with something worthwhile.
I am mildly curious, who elected Jeff Jarvis?
Seriously, isn’t writing, in blogs or any medium, about providing something interesting for readers? Either a news release would interest your readers or it wouldn’t. If it is interesting to your readers, I don’t see that it matters that the motives of those who sent it were impure. What is important is providing your readers with something worthwhile.
Thursday, December 08, 2005
Wednesday, December 07, 2005
Breaking silence
Counterterrorism co-operation is endangered by US renditions
American Torture Chambers
Vital global counterterrorism co-operation is under threat in the wake of several international inquiries into the US government practice of sending terrorism suspects to third countries outside the established legal framework, known as 'extraordinary renditions'. These inquires could also see US Central Intelligence Agency (CIA) operatives face legal action.
At issue is the US practice of rendition, which includes such missions as "snatch and grab" operations, as well as the shipment of prisoners already in the custody of one state to another for arrest, detention or interrogation - outside the lines of regular extradition processes.
American Torture Chambers
Blogging and privacy
Tom Foremski
This is something we, as a society, are going to have to start talking about. For example, if I go to a meeting, I may cover the presentation and the questions. I do not write about the little meeting after the meeting were attendees come forward to ask the questions they did not want to ask publicly. Neither do I blog about the after the meeting gossip session that inevitably occurs on the subway ride home.
There has been some discussion about libel, but almost none about privacy.
What is socially acceptable to blog about? That's one of the questions I have pondered when everyone can be a publisher, and when most in my social circle are publishers/bloggers.
And the answer is simple: if you are at a private event, among your friends, then everything is off-the-record you do not publish anything that could embarrass anybody, or republish anything that was said/done unless you have an agreement to do otherwise.
This is something we, as a society, are going to have to start talking about. For example, if I go to a meeting, I may cover the presentation and the questions. I do not write about the little meeting after the meeting were attendees come forward to ask the questions they did not want to ask publicly. Neither do I blog about the after the meeting gossip session that inevitably occurs on the subway ride home.
There has been some discussion about libel, but almost none about privacy.
Tuesday, December 06, 2005
The Arlington way
Arlington goes wireless with free Internet service
The Arlington way refers to Arlington's unique political culture that places great emphasis on citizen input and participation. No decision can be made without consulting all stakeholders. This initiative is but one example of the Arlington way in action.
The result is a grassroots political culture that produces a high quality of government services with the lowest taxes in the Greater Washington area. Precisely because all stakeholders are brought into any discussion it is very difficult for the business community or any other group to exert undo pressure. Businesses which are not used to it can get very frustrated.
UPDATE: The Arlington Way AAA rated.
Arlington County is asking technology companies to give Internet users something for nothing.
The county wants companies to provide wireless Internet access, or wi-fi, in 10 areas at no cost to the government or the users. Free access would be at about one-fifth the speed of a broadband connection.
Providers would cover their costs through county-approved business plans, such as charging for faster connections and selling online ads.
The Arlington way refers to Arlington's unique political culture that places great emphasis on citizen input and participation. No decision can be made without consulting all stakeholders. This initiative is but one example of the Arlington way in action.
The result is a grassroots political culture that produces a high quality of government services with the lowest taxes in the Greater Washington area. Precisely because all stakeholders are brought into any discussion it is very difficult for the business community or any other group to exert undo pressure. Businesses which are not used to it can get very frustrated.
UPDATE: The Arlington Way AAA rated.
Great moments in document management
Brian Krebs on Computer Security
Don't have a document management strategy? Get one.
Few things in the world of digital documents are as pesky and revealing as "metadata" -- the information automatically embedded in documents by popular software such as Microsoft Word or Adobe Acrobat. When the government or a business forgets to purge metadata from documents before releasing them to the public, the results can range from embarrassing to dangerous.
On Sunday, the New York Times ran a story on President Bush's Nov. 30 speech on the war in Iraq. While White House officials said many federal departments contributed to the new national strategy on Iraq, one look at the metadata stored in the 35-page National Security Council document, titled, "Our National Strategy for Victory in Iraq," showed that the original author of the paper was Peter D. Feaver, a Duke University political scientist who was recruited to join the NSC staff as a special adviser in June after he and several Duke colleagues presented the administration with an analysis of polls about the Iraq war. Their analysis concluded that Americans would support a war with mounting casualties if they believed that effort would ultimately succeed.
Don't have a document management strategy? Get one.
Monday, December 05, 2005
What is meant by agile software development?
Manifesto for Agile Software Development
You would have to know more than I do about software development and project management to judge the merits of this. But software is too important to leave to the techies, we all have a stake in these debates.
We are uncovering better ways of developing
software by doing it and helping others do it.
Through this work we have come to value:
Individuals and interactions over processes and tools
Working software over comprehensive documentation
Customer collaboration over contract negotiation
Responding to change over following a plan
That is, while there is value in the items on the right, we value the items on the left more.
You would have to know more than I do about software development and project management to judge the merits of this. But software is too important to leave to the techies, we all have a stake in these debates.
When this happens to a committee chairman or news mogul, we will do something about it
Prostitution Suspect Used Data Access to Keep Tabs on Cops
Whether it is a civil servant with access to data or employee at a private data mining company, this is problem that will only get worse.
Whether it is a civil servant with access to data or employee at a private data mining company, this is problem that will only get worse.
Sunday, December 04, 2005
Johnny Cash
I saw Walk the Line this weekend. It is a wonderful account of the life and career of Johnny Cash. Cash’s appeal was mostly County & Western, but also Top 40 Rock & Roll. The film shows Cash, warts and all. The film also tells us about the remarkable June Carter Cash.
Cash recorded his first records with the legendary Sam Phillips. Watching the film I started thinking about the impresarios of popular music, the Chess brothers, Ahmet Ertegun of Atlantic Records, and Barry Gordy of Motown. What they all had in common was their love of the music they recorded. It was a business; but it was more than a business. They loved the music they recorded and they wanted to share it with others.
Other than Russell Simmons, there is no one on the business side of the music business who is motivated by a love of the music. For the management of our contemporary entertainment conglomerates, popular music is just a business. It is hard not to wonder if the business would not be better off in the hands of those for whom it is more than a business.
Cash recorded his first records with the legendary Sam Phillips. Watching the film I started thinking about the impresarios of popular music, the Chess brothers, Ahmet Ertegun of Atlantic Records, and Barry Gordy of Motown. What they all had in common was their love of the music they recorded. It was a business; but it was more than a business. They loved the music they recorded and they wanted to share it with others.
Other than Russell Simmons, there is no one on the business side of the music business who is motivated by a love of the music. For the management of our contemporary entertainment conglomerates, popular music is just a business. It is hard not to wonder if the business would not be better off in the hands of those for whom it is more than a business.
Friday, December 02, 2005
What is Software Architecture?
Software architecture
ITscout Blog
Integrating Islands with Landmasses
Damir Tomicic
Simon Says
Miguel Castro
International Association of Software Architects
Software architecture is a coherent set of abstract patterns guiding the design of each aspect of a larger software system.
...The software architect consults with clients on conceptual issues, managers on broad design issues, software engineers on innovative structural features, and computer programmers on implementation techniques, appearance, and style.
Software architecture is a sketchy map of the system. Software architecture describes the coarse grain components (usually describes the computation) of the system. The connectors between these components describe the communication, which are explicit and pictured in a relatively detailed way. In the implementation phase, the coarse components are refined into "actual components", e.g, classes and objects. In the object-oriented field, the connectors are usually implemented as interfaces.
ITscout Blog
Integrating Islands with Landmasses
Damir Tomicic
Simon Says
Miguel Castro
International Association of Software Architects
Transparency and marketing
Define Open
The whole thing reminded me of a story that I've heard Nat Friedman tell. Nat founded a former client of mine called Ximian, an open source company which was later sold to Novell. While at MIT, Nat spent a summer doing an internship at Microsoft and through that had a chance to talk with Bill Gates. They were discussing open source and the Apache server, which was growing in popularity.
Gates couldn't understand why developers would need access to the source code. He offered that if it's functionality that people wanted then Microsoft should just add that functionality to its servers. Nat came away feeling that Gates just didn't "get it," that the openness of the code WAS the draw. While many of the developers and users may never take advantage of the code, they wanted the option to peak under the hood and make changes and adjustments, should they feel the need. I've rarely, if ever, looked under the hood of my car, but I certainly wouldn't purchase one that didn't let me in.
New from Crain's, FinacialWeek
Crain to introduce FinancialWeek in 2006
With all the layoffs and cutbacks, it is encouraging to read about the launch of a new publication.
FinancialWeek
NEW YORK - Crain Communications Inc., the company that publishes InvestmentNews, will launch FinancialWeek, a newspaper designed to help satisfy the growing information needs of corporate finance executives.
... Among the many topics it will cover: news of financing techniques, risk management, benefits finance, corporate governance, investment management, accounting, information technology, real estate, and compliance and reporting.
With all the layoffs and cutbacks, it is encouraging to read about the launch of a new publication.
FinancialWeek
Thursday, December 01, 2005
The Small Business Innovative Research Program
About SBIR and STTR Programs
Three-Phase Program:
I met with Mr. Darrell Williams, of the Washington Emerging Technologies Center, to learn more about the SBIR program. While many Presto Vivace clients have been SBIR participants or graduates, I had only a general understanding of the program and wanted to be fully informed. Williams’ company, WETC, has been hired by the government to explain the program.
Williams said that SBIR was a “business development program, no more, no less”. SBIR grants come in three phases: phase I which is the work plan, phase II, where the company builds a prototype, and phase III where the company is expected to raise its own capital and take its idea to production.
Williams said the single most important element of any successful SBIR proposal was the company’s business strategy. This is true in every phase of the program. Essentially, a proposal is a business plan. Evaluators also look at the company’s team; do they have a history of success in their industry? Evalators include well known authorities in their respective fields; it is important that the proposal be credible from a scientific and technical point of view.
Evaluators are not interested in investing our tax money in creating yet another government contractor. They are looking for business plans that propose products with a commercial use. (Some exceptions for the Department of Defense and NASA.)
Sometimes, evaluators will find two roughly equivalent proposals and will fund both for phase I, with the better work plan winning phase II funding.
Willimas said that the SBIR program is a great way for subcontractors to become prime contractors. A prospective grantee’s best strategy is to develop a proposal for a product their field. They should look at the current open solicitations and see if there is anything related to their business.
Williams and I agree that companies should not confine themselves to venture capital to fund phase III. (In some cases the government may offer matching funds, if the SBIR grantee can raise private capital.) A loan or line of credit from a bank may be more practical. It may even be possible to obtain funds from a large company who is interested in buying the product. Some SBIR companies have formed partnerships based on their intellectual property rights on the products that they have developed.
SBIR funding has several advantages over other types of capital. The government is not interested in owning or managing your business. SBIR grants are precisely that, grants. You don’t have to pay the money back. You retain complete control of your company.
Government evaluators are not faddists. They are not looking for the entrepreneur from central casting. They don’t care about your race or gender or if you have gray hair. They are looking at your business plan, your team’s professional experience and the scientific and technical information contained in your proposal. Potomac business culture is far more diverse and more stable than anywhere else in the country. The SBIR program is a contributing factor to this.
Related links
DC Certified Capital Company (CAPCO) Program
Maryland Investment Financing
The Virginia Small Business Financing Authority (VSBFA)
The SBIR (Small Business Innovation Research) and STTR (Small Business Technology Transfer) programs, two competitively awarded, three-phase Federal Government programs, are designed to stimulate technological innovation and provide opportunities for small business. These dynamic teamings of the private and public sectors include joint venture opportunities for small businesses and the nation's premier nonprofit research institutions.
Three-Phase Program:
Following submission of proposals, agencies make SBIR awards based on small business qualification, degree of innovation, technical merit, and future market potential. Small businesses that receive awards or grants then begin a three-phase program.
- Phase I is the startup phase. Awards of up to $100,000 for approximately 6 months support exploration of the technical merit or feasibility of an idea or technology.
- Phase II awards of up to $750,000, for as many as 2 years, expand Phase I results. During this time, the R&D work is performed and the developer evaluates commercialization potential. Only Phase I award winners are considered for Phase II.
- Phase III is the period during which Phase II innovation moves from the laboratory into the marketplace. No SBIR funds support this phase. The small business must find funding in the private sector or other non-SBIR federal agency funding.
I met with Mr. Darrell Williams, of the Washington Emerging Technologies Center, to learn more about the SBIR program. While many Presto Vivace clients have been SBIR participants or graduates, I had only a general understanding of the program and wanted to be fully informed. Williams’ company, WETC, has been hired by the government to explain the program.
Williams said that SBIR was a “business development program, no more, no less”. SBIR grants come in three phases: phase I which is the work plan, phase II, where the company builds a prototype, and phase III where the company is expected to raise its own capital and take its idea to production.
Williams said the single most important element of any successful SBIR proposal was the company’s business strategy. This is true in every phase of the program. Essentially, a proposal is a business plan. Evaluators also look at the company’s team; do they have a history of success in their industry? Evalators include well known authorities in their respective fields; it is important that the proposal be credible from a scientific and technical point of view.
Evaluators are not interested in investing our tax money in creating yet another government contractor. They are looking for business plans that propose products with a commercial use. (Some exceptions for the Department of Defense and NASA.)
Sometimes, evaluators will find two roughly equivalent proposals and will fund both for phase I, with the better work plan winning phase II funding.
Willimas said that the SBIR program is a great way for subcontractors to become prime contractors. A prospective grantee’s best strategy is to develop a proposal for a product their field. They should look at the current open solicitations and see if there is anything related to their business.
Williams and I agree that companies should not confine themselves to venture capital to fund phase III. (In some cases the government may offer matching funds, if the SBIR grantee can raise private capital.) A loan or line of credit from a bank may be more practical. It may even be possible to obtain funds from a large company who is interested in buying the product. Some SBIR companies have formed partnerships based on their intellectual property rights on the products that they have developed.
SBIR funding has several advantages over other types of capital. The government is not interested in owning or managing your business. SBIR grants are precisely that, grants. You don’t have to pay the money back. You retain complete control of your company.
Government evaluators are not faddists. They are not looking for the entrepreneur from central casting. They don’t care about your race or gender or if you have gray hair. They are looking at your business plan, your team’s professional experience and the scientific and technical information contained in your proposal. Potomac business culture is far more diverse and more stable than anywhere else in the country. The SBIR program is a contributing factor to this.
Related links
DC Certified Capital Company (CAPCO) Program
Maryland Investment Financing
The Virginia Small Business Financing Authority (VSBFA)
Tuesday, November 29, 2005
Government bodies from federal to municipal find better ways to serve the public through M2M technology
Charity Pihlaja, M2M Magazine
It is not unusual for governments to be an early adopter of technology.
One issue it seems all government bodies deal with is vehicle maintenance. Whether it’s a fleet of squad cars, an all-important fire truck, or durable tanks and Humvees, each agency has means of transportation.
M2M also offers mobile asset monitoring. Included in this is GPS (global positioning system) to help agencies track where their vehicles are, how long they spend at one location, and can be used to help drivers find better routes to destinations.
It is not unusual for governments to be an early adopter of technology.
CIO Council sends Data Reference Model to OMB for final approval
Rob Thormeyer, Government Computer News
At least.
Kim Nelson, Environmental Protection Agency CIO and co-chairwoman of the CIO Council’s Architecture and Infrastructure Committee, said the document could be one of the most important documents produced all year.
At least.
Why journalism matters, Poland
Gazeta Wyborcza and Rzeczpospolita express their solidarity with newspapers in Belarus. And if there is one thing the Poles understand, it's solidarity.
Objective journalism is not about presenting both sides of every story. It's following the facts wherever they lead without fear or favor.
Objective journalism is not about presenting both sides of every story. It's following the facts wherever they lead without fear or favor.
Peter Klaus talks to DC Communicator
Peter Klaus of Fleishman-Hillard’s DC office talks about the seismic shifts in communications we will see in 2006:
Apparently Fleishman-Hillard just got the memo. These shifts occurred some time ago.
1. Disappearing boundaries;
2. Growth of blogs;
3. Growth of RSS;
4. Cause Marketing;
5. Social networking; and,
6. Mobile device screens.
Apparently Fleishman-Hillard just got the memo. These shifts occurred some time ago.
Total audience, the evolving news media business model
Dispelling the Myth of Readership Decline
If you don’t count online audience you’re not in touch with what is happening.
The Washington Post’s partnership with Technorati is very smart marketing. Measuring unique visitors is still an inexact science. Inbound links are a more tangible sign of reader interest and provide well defined data to offer advertisers about audience demographics.
The industry has touted the notion of readership -- a metric that takes into account how many people read the paper whether they buy it or not -- for years, but has often taken halfhearted steps toward giving it true legitimacy.
Then there's the confounding, if promising, online angle. If you count Web traffic, newspapers are actually more popular than ever.
If you don’t count online audience you’re not in touch with what is happening.
The Washington Post’s partnership with Technorati is very smart marketing. Measuring unique visitors is still an inexact science. Inbound links are a more tangible sign of reader interest and provide well defined data to offer advertisers about audience demographics.
Remixing reader relations, an interactive model
David Card likes Washington Post Remix. From the site:
Very smart. The Washington Post was a little slow to catch on to blogosphere and the new covnersation, but now they seem to be smart indeed.
Ann L. McDaniel, Vice President of The Washington Post Company, talks about The Washington Post, the Post-Newsweek Tech Group, FOSE and the blogging phenomenon.
We are pleased to announce washingtonpost.com's Post Remix. With Post Remix, you may use washingtonpost.com RSS feeds to experiment with different applications using washingtonpost.com content.Here are the conditions for participating in Post Remix:
- Your efforts must be for personal, and not for commercial, use. You may not sell applications that use or incorporate washingtonpost.com content.
- You recognize that Washingtonpost.Newsweek Interactive retains all intellectual property rights in all washingtonpost.com content and you that acquire no such rights by participating in Post Remix.
- Washingtonpost.com may incorporate your ideas into future projects it develops.
Very smart. The Washington Post was a little slow to catch on to blogosphere and the new covnersation, but now they seem to be smart indeed.
Ann L. McDaniel, Vice President of The Washington Post Company, talks about The Washington Post, the Post-Newsweek Tech Group, FOSE and the blogging phenomenon.
Monday, November 28, 2005
Tracking online influence
Mitch Arnowitz has a list of tools to track online influence, including one I had not heard about, Kebberfegg a keyword based RSS feed generator.
The K Street Project turns on its creators
The Abramoff BLOB, going to eat all of K Street alive
It's a great time to be in the litigation support and records management business.
It's a great time to be in the litigation support and records management business.
CSS hacking
Scoble and Molly Holzschlag point to Tantek Çelik’s Pandora's Box (Model) of CSS Hacks And Other Good Intentions No easy way to summarize it, but I encourage my developer readers to look at it.
The struggle for the open, end-to-end Internet
Consider:
Saving the Net: How to Keep the Carriers from Flushing the Net Down the Tubes
On March 3, the Federal Communications Commission announced that it settled a case against a small North Carolina-based telephone company that was blocking the ability of its customers to use voice-over-Internet calling services instead of regular phone lines.
On Sept. 15, the first major draft of proposed changes in the nation's telecommunication's laws was circulated by the House Energy and Commerce Committee. The draft said Internet service providers must not "block, impair, interfere with the offering of, access to, or the use of such content, applications or services."
On Nov. 2, another draft of the bill came out, with language specifically addressing the Internet video services that are proliferating as connection speeds increase and the phone companies get into the digital television business. In this draft, the prohibition on blocking or impeding content was gone.
If the bill passes as is, tech companies say, the Internet could be forever compromised.
"Enshrining a rule that broadly permits network operators to discriminate in favor of certain kinds of services and to potentially interfere with others would place broadband operators in control of online activity," Vinton G. Cerf, a founding father of the Internet who now works for Google Inc., wrote in a letter to Congress.
The phone companies argue that with their new fiber-optic systems capable of handling huge amounts of bandwidth, they simply want the ability to set aside some of it for their own services, be it television, gaming or anything else.
Unfortunately for them, the head of phone giant SBC Communications Inc., Edward E. Whitacre Jr., was a little more plain-spoken in an interview in Business Week.
"Now what they [Google, Yahoo, MSN] would like to do is use my pipes free, but I ain't going to let them do that because we have spent this capital and we have to have a return on it," Whitacre said. "So there's going to have to be some mechanism for these people who use these pipes to pay for the portion they're using."
Saving the Net: How to Keep the Carriers from Flushing the Net Down the Tubes
Sunday, November 27, 2005
Python, static type checking, RuntimeException, and unit testing
Bruce Eckel
From the Nova JUG discussion list.
Bruce Eckel
You can’t flack this stuff if you’re not conversant with the technology.
So this, I assert, is an aspect of why Python works. C++ tests happen at compile time (with a few minor special cases). Some Java tests happen at compile time (syntax checking), and some happen at run time (array-bounds checking, for example). Most Python tests happen at runtime rather than at compile time, but they do happen, and that's the important thing (not when). And because I can get a Python program up and running in far less time than it takes you to write the equivalent C++/Java/C# program, I can start running the real tests sooner: unit tests, tests of my hypothesis, tests of alternate approaches, etc. And if a Python program has adequate unit tests, it can be as robust as a C++, Java or C# program with adequate unit tests (although the tests in Python will be faster to write).
From the Nova JUG discussion list.
Bruce Eckel
You can’t flack this stuff if you’re not conversant with the technology.
How to shoot yourself in the foot with your intellectual property protection strategy
P2p, file sharing and Big Music
Time to adjust the business model.
Thanks largely to failing entertainment industry efforts to sue file sharers into becoming good little consumers, p2p and the technologies surrounding it have become headline news and more people than ever before are logging onto the p2p networks.
Time to adjust the business model.
Silktide’s online marketing’s brilliant play for buzz
Media Orchard points to Silktide’s free online site analysis tool, SiteScore. Who can resist?
Presto Vivace, Inc. received a low 5.6 score. They don’t think much of Presto Vivace’s austere look.
Presto Vivace, Inc. received a low 5.6 score. They don’t think much of Presto Vivace’s austere look.
Friday, November 25, 2005
It is with great that regret we report the death of irony
Michael D. Brown is offering his services for crisis communications in emergency response.
I wonder what it's like to go through life free of shame.
I wonder what it's like to go through life free of shame.
When the criminal element gets really bold
Computer Worm Poses as E-Mail From FBI, CIA
First of all, if law enforcement wants to contact you they do not send email, neither do they call you on the phone. They knock on your door in person.
Second of all, the perpetrators of this worm are in serious trouble. Law enforcement takes inpersonators very seriously.
Report online fraud to the FBI
It's being called the worst computer worm of the year -- a fast-spreading Internet threat that looks like an official e-mail from the CIA or FBI but can leave your computer wide open to intruders.
The bogus e-mail claims the government has discovered you visiting "illegal" Web sites and asks you to open an attachment to answer some official questions. If you do, your computer gets infected with malware that can disable security and firewall programs and blast out similar e-mails to contacts in your address book. It can also keep you from getting to computer security Web sites that might help fix the problem, and it may open your Windows computer to intruders who can steal your personal data.
First of all, if law enforcement wants to contact you they do not send email, neither do they call you on the phone. They knock on your door in person.
Second of all, the perpetrators of this worm are in serious trouble. Law enforcement takes inpersonators very seriously.
Report online fraud to the FBI
Wednesday, November 23, 2005
Online display windows
Shel Holtz points to an excellent article from SmartBiz.
Are Blogs A Meaningful Tool For Startups and Small Businesses?
Are Blogs A Meaningful Tool For Startups and Small Businesses?
Tuesday, November 22, 2005
Wouldn't it be more profitable to sell music online in a P2P format that customers want?
EFF, Texas Attorney General Sue Sony
Nobody ever won a war with their customers.
Greg Abbott, the attorney general for Texas, today filed a lawsuit against Sony BMG Music Entertainment, alleging that its controversial (and now recalled) "XCP" anti-piracy software violates the state's anti-spyware and consumer protection laws.
... Abbott's suit seeks civil penalties of $100,000 for each violation of the law, attorneys’ fees and investigative costs.
Nobody ever won a war with their customers.
Peering into Google's future
Cringely
So why buy-up all that fiber, then?
The probable answer lies in one of Google's underground parking garages in Mountain View. There, in a secret area off-limits even to regular GoogleFolk, is a shipping container. But it isn't just any shipping container. This shipping container is a prototype data center. Google hired a pair of very bright industrial designers to figure out how to cram the greatest number of CPUs, the most storage, memory and power support into a 20- or 40-foot box. We're talking about 5000 Opteron processors and 3.5 petabytes of disk storage that can be dropped-off overnight by a tractor-trailer rig. The idea is to plant one of these puppies anywhere Google owns access to fiber, basically turning the entire Internet into a giant processing and storage grid.
While Google could put these containers anywhere, it makes the most sense to place them at Internet peering points, of which there are about 300 worldwide.
Monday, November 21, 2005
Sunday, November 20, 2005
Nominate your customer
Federal 100 awards: Call for nominations
Federal Computer Week begins accepting nominations for the Federal 100 awards program this week. The deadline is Dec. 21, so don't delay.
Convergence, it's finally happening
New Communications Blogzine
Things are changing, and changing fast, and that hackneyed word “convergence” finally has some validity as we discuss these changes.
The trends that we’ve been anticipating for years are finally coming to pass.
The drivers of this change:
Ever-increasing penetration rates for highspeed Internet access in the home as well as wireless access. Mobile phones have more functionality than ever and carriers need to find new revenue streams. Traditional media networks are losing viewers and advertisers and money and need to reinvent their business models in the face of media fragmentation and the rise of CGM. And, consumers are demanding the ability to choose their own content, wherever, whenever and however they want it.
The nature of the Internet
Tim Jarrett
And it is in the interests of the Public Relations industry that it remain so.
...a marketplace, rather than just a transport system.
And it is in the interests of the Public Relations industry that it remain so.
Saturday, November 19, 2005
Friday, November 18, 2005
Speaking of security
RSA has a blog. It is written in techno speak, so they are still getting the hang of blogosphere. They need to hire my copy editor.
New FBI website goes after online fraud
The FBI has launched a new-to-me website called Looks too good to be true. There is a page that identifies risk factors; also file a complaint.
We could turn the logic of spammers, and their fellow travelers, on its head by doing more than deleting fraudulent email. Once, just once a year, pick an especially obnoxious sample of spam, research its origin, and alert every government agency with any possible jurisdiction. Spammers are counting on most of us to delete their spam and just reach their victims. What they don't expect is for us to fight back.
We could turn the logic of spammers, and their fellow travelers, on its head by doing more than deleting fraudulent email. Once, just once a year, pick an especially obnoxious sample of spam, research its origin, and alert every government agency with any possible jurisdiction. Spammers are counting on most of us to delete their spam and just reach their victims. What they don't expect is for us to fight back.
Great copy writing
American Eagle Group has a great opener on it's home page:
Ready, Fire, Aim!
How do you manage your projects? Do you "Fire" before taking aim? Sadly, many companies seem to "Fire" upon a project without taking advantage of the proper project management practices.
Interview with Paul Duval
Shahid points to Andy Glover's interview with Paul Duval about Duval's new book on software project management.
This is the first time I have heard the expression, continious integration, so it is something I am going to have to look into. I don't think you can flack this stuff if you don't know what it is.
What is Continuous Integration?
In defining continuous integration, most people refer to the article that Martin Fowler and Matthew Foemmel from ThoughtWorks wrote several years ago. In it, they refer to CI as "a fully automated and reproducible build, including testing, that runs many times a day". I expand on this definition and describe CI as "an automated process of building software whenever a change is applied - this may include automated testing, inspection, reporting, deploying, and notification."
It's amazing how their paper has become the touchstone for defining CI even though it's been around in some form or another for awhile! Given that is not some new revolutionary tool or technique, why should I care about CI?
Because it does the dirty work for you, so you can write software for your users and not spend time on infrastructure issues. It reduces common risks, improves the software quality, and ensures timely feedback. I don't know about you, but I don't like paying bills so I use automatic bill pay. Why? Because paying my bills is a mundane, repetitive activity that drains money from my account. I still haven't found anything to prevent the draining of money, but at least I don't need to do the mundane repetitive work any more. I like working on interesting and unique problems when developing software and there is far more in software development that is "dirty work" than you might imagine. It is the "little things" here and there that add up to decreased productivity and efficiency. Of course, "building the software" is something that we must do, yet I have seen far too many shops who haven't even automated their builds. In fact, an MIT study conducted in 2003 indicates that only between 20-25% are even running daily builds. There is so much more, including the execution of regression tests, static analysis tools, SCM labeling, database integration, notification, and deployment that can and should be automated - and run continuously.
This is the first time I have heard the expression, continious integration, so it is something I am going to have to look into. I don't think you can flack this stuff if you don't know what it is.
Thursday, November 17, 2005
I'm so ravenous, I could eat an entire blackbird pie
c=US ID Mgt.
This fellow employs a stream-of-consciousness method to information assurance commentary. It is oddly effective.
It's this thread that's been developing in my head over the last few weeks starting with a comment by my muse to start checking out heteronyms.
Heteronyms are pseudonyms with individually developed writing styles. The "Book of Disquiet" is an example of a novel that's written in this style. Along with heteronyms came words such as homographs.
Homographs are also a security risk when people think they are reaching one web site, when they are actually reaching another.
How in fact does one guard identity when similar sounding (or written in different character set) web sites or telephone numbers are used? Another Hax0r trick.
Certainly a great source of punning, and double entendre, this facility of language to act at multiple levels at the same time is a great thing. Cequs is also seek us, or c equals us
and so on. It's what makes Shakespeare worth watching and reading time and time again, that sense of depth.
So I started making a sort of homograph, and not a very good one. "I'm so ravenous, I could eat an entire blackbird pie".
The next day I walked outside and there was a gigantic flock of crows or blackbirds hanging outside in the trees, a very unusual event and a portent. Giant flocks of birds suddenly squawking outside your door is very Alfred Hitchcock.
When I told someone at work about this they said "well of course, they hang out on the wire and pick this stuff up".
This fellow employs a stream-of-consciousness method to information assurance commentary. It is oddly effective.
Congratulations Mary Aufseeser
Mary Aufseeser, Tom Biro's mother, was elected mayor of Matawan, New Jersey.
I also had a political mom. It is a very special experience to ask people for vote for mom.
I also had a political mom. It is a very special experience to ask people for vote for mom.
Wednesday, November 16, 2005
RSS and its impact on XML
Implications to the Meta Data Environment
I would be very interested in hearing developer's comments on this.
The implications for the meta data environment are enormous. Taking a closer look at RSS standard reveals that simplicity and consistency are critical irregardless of context. This indicates that a simple metamodel, such as the Dublin Core, could be easily exchanged by the use of RSS technology. Several of the sample feeds, included at the bottom of this article, contain Dublin Core expansions. Newsreaders could replace the majority of the functionality currently held within the centralized meta data repository. Publishing new content is very similar to the information required for publishing technology asset meta data or will be in the near future. Advancements in the RSS technology will allow code objects, analysis documents, modeling artifacts and other system development life cycle products to publish information about the assets automatically. This will eliminate the need for the extraction of information by hand or forcing integration into a single methodology. RSS already has search functionality and personal taxonomies where the end user can catalog their own content which may prove to be much more valuable than the traditional IT based taxonomies.
I would be very interested in hearing developer's comments on this.
Defending the open, end-to-end Internet
Deal Reached on Managing the Internet
Dan Gillmor
If the Internet is to work we need everyone on it, including half-literate farmers in the African sahel coming to an internet cafe once a month when they take their goods to market.
We also need to keep it open and not degenerate into walled-off gardens like the bad old days of Compuserve, Prodigy, and only talking to those who subscribed to the same service.
TUNIS, Tunisia -- A U.N. technology summit opened Wednesday after an 11th-hour agreement that leaves the United States with ultimate oversight of the main computers that direct the Internet's flow of information, commerce and dissent.
A lingering and vocal struggle over the Internet's plumbing and its addressing system has overshadowed the summit's original intent: to address ways to expand communications technologies to poorer parts of the world.
Dan Gillmor
There's a lot of angst about the rest of the world "taking control" of the Internet from the U.S. I share some of that concern, given the total disregard for free speech that exists in so many countries and the ITU's record of cloddishness in its regulatory approach. (Tunisia, with its fairly repressive regime, seems like an odd place to hold an "information society" gathering, but the UN does like to be inclusive, which is a good thing.)
This is a hugely complicated topic, involving things like which servers handle lookup requests; arcane regulation; and a lot more. But there's no question in my mind that an Internet a) controlled in serious ways terrible organizations such as the ITU; or b) turned into a bunch of local fiefdoms is not the way we want it to go. The signs are already emerging that the latter will happen, unfortunately.
If the Internet is to work we need everyone on it, including half-literate farmers in the African sahel coming to an internet cafe once a month when they take their goods to market.
We also need to keep it open and not degenerate into walled-off gardens like the bad old days of Compuserve, Prodigy, and only talking to those who subscribed to the same service.
Cultivating the channel
Media Orchard says its time for advertisers to embrace blogs.
Many developer blogs have advertising; this would be a great opportunity for Microsoft, Apple, Sun, etc. to support their independent software developers. An ad on your developer’s blog would reinforce the partnership and generate leads for both of you. It would also be an effective way to reinforce your company’s message to the reader.
Tech on the Potomac, the Mid-Atlantic Technology Blogs
Many developer blogs have advertising; this would be a great opportunity for Microsoft, Apple, Sun, etc. to support their independent software developers. An ad on your developer’s blog would reinforce the partnership and generate leads for both of you. It would also be an effective way to reinforce your company’s message to the reader.
Tech on the Potomac, the Mid-Atlantic Technology Blogs
Tuesday, November 15, 2005
Why the price of online advertising is about to go up
Readers up 11% at US news websites
I think publications will start charging for more of their online content. I hope someone can develop a technology that would allow bloggers with paid subscriptions to link to individual articles that would allow their readers to click through to that article, and that article only. It would be great marketing for any news organization that employed such technology.
US newspaper websites are attracting users at a faster pace than the internet overall with visitor numbers up 11 per cent annually, according to figures released yesterday by Nielsen/NetRatings.
I think publications will start charging for more of their online content. I hope someone can develop a technology that would allow bloggers with paid subscriptions to link to individual articles that would allow their readers to click through to that article, and that article only. It would be great marketing for any news organization that employed such technology.
Precise and concise
Keith Casey on why he blogs
Second, it forces me to practice communication in general. I believe most blog readers don't have the time or attention to spend 15 minutes reading an article. It's not from a lack of intellect or anything like that, it's simply a matter of time/attention available. Therefore, I figure I have about 15-30 seconds to draw people in and give them a reason to continue reading. This has caused me to think even faster on my feet in person and give someone a reason to continue the discussion.
Monday, November 14, 2005
When reporters don’t understand RSS
David Carr, The New York Times
It is perfectly true that you can alter or even delete a post; but the RSS feed is still out there. To say nothing of The Wayback Machine.
Blogs can be serious enough and conventional enough in execution to fit in with mainstream media (as will be the case when Time.com will begin running AndrewSullivan.com in January). But because blogs can be amended or erased, the people who write them tend not to be held to account.
It is perfectly true that you can alter or even delete a post; but the RSS feed is still out there. To say nothing of The Wayback Machine.
Other people’s property
Jim Horton continues his great commentary on the Sony BMG fiasco. The central issue, to my way of thinking, is Sony’s assumption that it was acceptable to harm their customer’s property in attempt to protect their own. This is a line that must never be crossed; to cross this line is to put your foot on a very slippery slope indeed. The IT world would become a cesspool of cyber warlords.
This sort of incident is part of what is driving the free software movement. It is not simply that you have to pay for proprietary software, most of us are OK with that, it is that you have no way of knowing what is buried in that code. Sony did not just hurt itself with this incident; it hurt the whole idea of proprietary software.
Magazines and newspapers survived the invention of the copy machine, TV and films survived the introduction of the VCR, the music industry would not only survive file sharing, it will flourish once it adopts its business model. The increasing adoption of Linux indicates that you can make money from free.
I don’t understand it either.
This sort of incident is part of what is driving the free software movement. It is not simply that you have to pay for proprietary software, most of us are OK with that, it is that you have no way of knowing what is buried in that code. Sony did not just hurt itself with this incident; it hurt the whole idea of proprietary software.
Magazines and newspapers survived the invention of the copy machine, TV and films survived the introduction of the VCR, the music industry would not only survive file sharing, it will flourish once it adopts its business model. The increasing adoption of Linux indicates that you can make money from free.
I don’t understand it either.
Sunday, November 13, 2005
Another reason to do business with the government
Government Enters Fray Over BlackBerry Patents
The Federal government can be a very powerful ally in this kind of fight.
The Justice Department has filed a legal brief in a patent dispute, asking a federal court to delay any immediate shutdown of the popular wireless e-mail system to ensure that state and federal workers can continue to use their devices.
... The Justice Department, filing on behalf of various government agencies, requested a stay of 90 days to put together an electronic database of government users whose service should not be cut off in the event Research In Motion loses its final legal battles and does not reach a settlement. In addition, the "statement of interest" filed by Justice said the government is concerned "there may be a substantial public interest that may be impaired" by shutting down the service.
There are more than 3 million BlackBerry users in the United States, approximately 10 percent of whom are state and federal government employees who use the devices to keep in contact when out of the office.
The Federal government can be a very powerful ally in this kind of fight.
What if your blog were vaporized?
Morgan McClintic helpfully points to WebGrabber for Macs and HTTrack for PCs.
It wouldn't be just the disappointment of losing all your work. Once you've put something on the web, you are responsible, so it is helpful to have your own copy of the historical record.
It wouldn't be just the disappointment of losing all your work. Once you've put something on the web, you are responsible, so it is helpful to have your own copy of the historical record.
See it now
I saw Good Night and Good Luck last night at the Uptown Theater. A friend recommended it as reminiscent of the world of our parents men in white shirts, smoking cigarettes, doing important things. (My friend does not smoke, nor does she recommend it.) The film really is that; it did put me forcibly in mind of my parents' world. Clooney wisely decided to go with old tapes of Joseph McCarthy, rather than have an actor play him. That dictated that the film be shot in black and white, which coincidentally enhanced its historical authenticity.
Good Night and Good Luck offers a glimpse of how television news really works, the assorted pressures of running a commercial news operation, the complications that come from aggressively covering a government that has the power to regulate you via the FCC licensing process.
It is also a great film about fear, how silence enables it and how speaking out destroys it. Highly recommended.
Good Night and Good Luck offers a glimpse of how television news really works, the assorted pressures of running a commercial news operation, the complications that come from aggressively covering a government that has the power to regulate you via the FCC licensing process.
It is also a great film about fear, how silence enables it and how speaking out destroys it. Highly recommended.
Friday, November 11, 2005
Government procurement, why it’s different
Mass. reference model controversy over open formats
If a private company decided to migrate to open source systems, that would be that. The customer is always right and there isn’t much a vendor can do. But with the multiple decision makers involved in government systems, elected, appointed and civil service, it is an entirely different situation.
Why would a government insist on open standards?
Massachusetts Enterprise Technical Reference Model - Version 3.5
Dan Bricklin’s audio files of the public meetings the state has held on the matter.
Since its release last September, a technical reference model issued by Massachusetts has sparked considerable debate within the government technology community—and beyond.
At stake is the issue of how active a role public offices should take in fostering open standards. Should an agency adopt a new open format—one that would better suit its goals but may prove more difficult to deploy and manage? Or should agencies follow the best practices of the commercial IT industry, taking full advantage of cost efficiencies and new features that may follow?
If a private company decided to migrate to open source systems, that would be that. The customer is always right and there isn’t much a vendor can do. But with the multiple decision makers involved in government systems, elected, appointed and civil service, it is an entirely different situation.
Why would a government insist on open standards?
... Massachusetts CIO Peter Quinn has indicated that the reason behind the move to OpenDocument is that it will allow the state to better keep permanent records.
“Ease of access to electronic records created in proprietary formats is limited in time. Once the proprietary vendor abandons a particular version of an application or format, documents created and formatted in those applications and formats may become inaccessible to all readers,” according to the frequently asked questions section of the state CIO’s Web site .
Massachusetts Enterprise Technical Reference Model - Version 3.5
Dan Bricklin’s audio files of the public meetings the state has held on the matter.
Sony gets a clue
Ted Bridis, Associated Press
No way to know what happened; but I suspect the Sony PR department explained the facts of customer relations to management.
Jim Horton has a good summary here and an earlier one here.
Contrary to legend, Macs are vulnerable.
Now the Legalese Rootkit: Sony-BMG's EULA
How to detect a root kit hack
WASHINGTON -- Stung by continuing criticism, the world's second-largest music label, Sony BMG Music Entertainment, promised Friday to temporarily suspend making music CDs with antipiracy technology that can leave computers vulnerable to hackers.
Sony defended its right to prevent customers from illegally copying music but said it will halt manufacturing CDs with the "XCP" technology as a precautionary measure. "We also intend to re-examine all aspects of our content protection initiative to be sure that it continues to meet our goals of security and ease of consumer use," the company said in a statement.
No way to know what happened; but I suspect the Sony PR department explained the facts of customer relations to management.
Jim Horton has a good summary here and an earlier one here.
Contrary to legend, Macs are vulnerable.
Now the Legalese Rootkit: Sony-BMG's EULA
How to detect a root kit hack
This is satire
Faith based firewalls
I say that because it is getting harder and harder to tell what is satire and what is real.
I say that because it is getting harder and harder to tell what is satire and what is real.
FTP software for Mac OS X
RBrowser
Cyberduck
Fetch Softworks
Pure Mac: FTP Software for Macintosh
I haven't tried any of these, so can't speak to their quality, but on the MacEdit discussion list RBrowser, Cyberduck, and Fetch all got recommendations.
Cyberduck
Fetch Softworks
Pure Mac: FTP Software for Macintosh
I haven't tried any of these, so can't speak to their quality, but on the MacEdit discussion list RBrowser, Cyberduck, and Fetch all got recommendations.
Thursday, November 10, 2005
Why blog relations is a growth industry
Intelliseek
Obviously Intelliseek has a vested interest in promoting this point of view; but I think this in on track. The smart way for companies to tap into the blog phenomena is to encourage their employees to blog and link to the influential blogs in their industry. No astroturf, just let nature take its course.
CINCINNATI, Ohio (Sept. 26, 2005) -- Consumer trust toward traditional advertising is being challenged by growing confidence in consumer-generated-media (CGM) and the recommendations of other consumers, according to a new study of consumer behavior by Intelliseek Inc., a leader in word-of-mouth measurement.
A follow-up to a 2004 "Trust in Advertising" study, the "2005 Consumer-Generated Media (CGM) and Engagement Study" finds that, compared to traditional advertising, word-of-mouth (WOM) behavior continues to grow in importance in consumer awareness, trial, and purchase of new products.
Consumers are 50 percent more likely to be influenced by word-of-mouth recommendations from their peers than by radio/TV ads – a slightly higher level of influence/trust than found in the 2004 study co-authored by Intelliseek and Forrester.
Obviously Intelliseek has a vested interest in promoting this point of view; but I think this in on track. The smart way for companies to tap into the blog phenomena is to encourage their employees to blog and link to the influential blogs in their industry. No astroturf, just let nature take its course.
Subscribe to:
Posts (Atom)