uiweb: How to manage smart people. Over the years I've experienced many mistakes and successes in both how I was managed, and how I managed others. What follows is a short distillation of some of what I've learned. There's no one way to manage people, but there are some approaches that I think most good… Continue reading How to manage smart people
Structured search, phase two
Structured search, phase two. The next phase of my structured search project is coming to life. For the new version I'm parsing all 200+ of the RSS feeds to which I subscribe, XHTML-izing the content, storing it in Berkeley DB XML, and exposing it to the same kinds of searches I've been applying to my… Continue reading Structured search, phase two
Mac Software Business mailing list
Mac Software Business mailing list. Just about every day I talk with people who want to start a Macintosh software business. People have all kinds of questions: can I make money at this? How much should I charge for my app? Where should I advertise? Should I do my idea as a plugin or as… Continue reading Mac Software Business mailing list
Security Breach in U.S. Senate
Security Breach in U.S. Senate. Over at eLawyer Blog, Doug Simpson has some tough questions concerning the computer security breach in the U.S. Senate. [Netlawblog]
Understanding E-mail Headers
Understanding E-mail Headers. Need some help reading e-mail headers?… [MS Exchange Blog]
Microsoft: change to IE will block some Web URLs
InfoWorld: Microsoft: change to IE will block some Web URLs. Microsoft will soon release a software update for IE that will end that browser's ability to accept Web URLs that hide the address of the Web page being displayed using the “@” symbol. The update will remove a feature that is being exploited in scams… Continue reading Microsoft: change to IE will block some Web URLs
FBI's Top 10 Online Security Threats for Windows
FBI's Top 10 Online Security Threats for Windows. The FBI has worked with the SANS Institute to develop a list of the 10 most exploited Windows threats. You can read more about it here. The gist of it? There are 10 component on the Windows platform that are prone to new vulnerabilities, and are regularly… Continue reading FBI's Top 10 Online Security Threats for Windows
NIST releases paper on Risk Management Guide for Information Technology Systems
NIST releases paper on Risk Management Guide for Information Technology Systems. NIST has released a DRAFT paper on risk management for IT Systems. Published as Special Publication 800-30 Rev A its shaping up to be a good reference. Taken from the paper's introduction: An effective risk management process is an important component of a successful… Continue reading NIST releases paper on Risk Management Guide for Information Technology Systems
The Commoditization of User Experience
The Commoditization of User Experience. Adaptive Path's Simple Solution series of reports is the first widespread commoditization of user experience practice…and it's worth thinking about what IAs and others should do in a world where $49 buys the fix to a common problem. This week Adaptive Path launched their new reports. The star of the… Continue reading The Commoditization of User Experience
The new influencers
The new influencers. Can one person decide what the entire industry will buy and use? Anita Rowland points at one story (the Zamboni) where that seems to have happened. That's precisely why evangelists like me pay attention to influentials so much. The problem is, now EVERYONE is an influential. Why? Weblogs. That's why I subscribe… Continue reading The new influencers