What would happen if google re-designed their site?. An interesting article pointing out some flaws with the current google design: Click here [BrainFuel]
Author: admin
Fiber Scam?
Fiber Scam?. MuniWireless and TechDirt describe a recent book that claims telephone companies have scammed approximately $200 billion from all of us (about $2,000 per household), promising fiber to every home with symmetric 45 Mbps speeds and an open access model. For the last decade, those same telcos have made promise after promise to local… Continue reading Fiber Scam?
Open Source Flaim
Open Source Flaim. The new, slimmer Calvin has quietly announced that Novell has open sourced the flaim database, which removes a major blocker to getting iFolder into Ubuntu and Debian. Thanks guys! (Martin's already working on it, yay!) [jorge @ whiprush.org]
Press Release
Tasks Pro 1.6 has been released! Read the Press Release. [Tasks Pro News]
The Secret of My Catholic Education
The Secret of My Catholic Education. I'm the Official Computer Guy for my 40th grade school reunion, and as June bears down on us and things kick into high gear, I've been thinking about things that I haven't thought about since, well, 1966. One of the great mysteries is how the school even functioned with… Continue reading The Secret of My Catholic Education
kGTD Tip: Link to sites, files, and more
kGTD Tip: Link to sites, files, and more. This is technically more of an OmniOutliner Pro tip than a strictly kGTD trick, but its so useful that I wanted to make sure my fellow fans are aware of it. The beauty of kGTD lies in its single-minded focus on managing your tasks in the context… Continue reading kGTD Tip: Link to sites, files, and more
Redacting the rules
Redacting the rules. The Ninth Circuit Court of Appeals ruled yesterday in support of airport regulations demanding the display of identification by travelers — and in support of the existence of secret laws, laws that our government can prohibit people from scrutinizing yet can impose on those same people. (The decision, in PDF form, is… Continue reading Redacting the rules
What to do after you've been hacked
What to do after you've been hacked. SearchWindowsSecurity.com has posted a checklist of 11 things you should do when you've been the victim of a hacked system. We preach quite a bit on this site about how to prevent security breaches, and hopefully you take it to heart and play an active role in hardening… Continue reading What to do after you've been hacked
6 metaways of Getting Things Done
6 metaways of Getting Things Done. Starting a micro-ISV and putting bread on the table and having a life of some sort is definitely a tall order. . . . heres my 6 metaways of Getting Things Done both for my clients, my editors and my micro-ISV. These are the biggies. Call them lifehacks if… Continue reading 6 metaways of Getting Things Done
Guy's 11 micro-ISV Commandments
Guy's 11 micro-ISV Commandments. Guy Kawasaki's latest post on the Art of Bootstrapping is such good advice, every micro-ISV should print it and read it until they know it by heart. Here's the bullet point version, just to whet you appetite so you go read Guy's post: Focus on cash flow, not profitability. Forecast from… Continue reading Guy's 11 micro-ISV Commandments