12 things I hate about you. Ralph Nader has an opinion piece in the Boston Globe noting 12 important topics in which the Democrats will be silent during the convention this week…. [Third Party & Independents:]
Author: Vince Kimball
Redesigning the Personal Video Recorder
Redesigning the Personal Video Recorder. Personal Video Recorders, like Tivo, have changed their owners viewing habits to the point of shifting advertising strategies. However, current PVRs have some significant interface drawbacks. Teehan+Lax, a Toronto UX consultancy, recently launched a free 40 page report about the user experience of two current PVRs, and show UI comps… Continue reading Redesigning the Personal Video Recorder
Seagate Ups Drive Warranties To 5 Years
Seagate Ups Drive Warranties To 5 Years. swordboy writes “Seagate have just announced that they are going to standardize on a five year warranty for all of their hard drives, including desktop and notebook units. While this seems like amazing news, I'm certainly hoping that the company will be around to honor these warranties.” The… Continue reading Seagate Ups Drive Warranties To 5 Years
My experience in porting an extension to PHP5
My experience in porting an extension to PHP5. One of the mysteries of PHP is how people actually figure out how to write C extensions. Most books get quickly out-of-date, and key API's are only documented in the brains of the elite hackers. The C source is incomprehensible, thanks to the extensive use of weird… Continue reading My experience in porting an extension to PHP5
MyDoom Hits Google Hard: Librarians At A Loss
MyDoom Hits Google Hard: Librarians At A Loss. A variant of the MyDoom worm has brought Google to its knees. Searches on Google are returning 503 errors on all queries submitted from certain locations (including my location here in San Rafael, California). The attack has also affected Lycos & Altavista. A CNet story gives more… Continue reading MyDoom Hits Google Hard: Librarians At A Loss
KM & competitive advantage
KM & competitive advantage. There are some well-recognized KM strategies which can be applied to gain or leverage competitive advantage. Which one you choose, depends on your firm's competencies, the market niche, competitors and finding an internal champion. Here are some examples: 1) Information transfer: The capture and distribution of explicit information via groupware, file… Continue reading KM & competitive advantage
Correcting the Record on Sept. 11, in Great Detail
Correcting the Record on Sept. 11, in Great Detail. The 9/11 commission showed that much of what had been common wisdom about the attacks was wrong. By PHILIP SHENON. [The New York Times > Home Page]
A Trusted Information Network for Homeland Security
A Trusted Information Network for Homeland Security. The 9/11 Commission report is available in pdf and in book formats. The focus on information sharing begins on page 416 of the pdf document. Here's what the Commission says: “We propose that information be shared horizontally, across new networks that transcend individual agencies. The current system is… Continue reading A Trusted Information Network for Homeland Security
911 search
911 search. 911 search: Search engine company Vivisimo shows how it can be useful to restrict search and clustering results to a single document, in this case the 500-page report of the US commission on the September 11 attacks. (The report is available in bookstores, and in PDF on the commission's site, and Jason Kottke… Continue reading 911 search
Microsoft to Enforce Antispam Plan
Microsoft to Enforce Antispam Plan. “Microsoft will soon put some bite into its Sender ID antispam plans. The software giant will check e-mail messages sent to its Hotmail, MSN, and Microsoft.com mail accounts to see if they come from valid e-mail servers, as identified by the Sender ID… The company is strongly urging e-mail providers… Continue reading Microsoft to Enforce Antispam Plan