A friend mentioned I edit (post to, I assume) my blog than all the rest of the people on her blogroll combined. I’m probably not as much of a junkie as the people on my feedreader, but it is one of the advantages of editing the blog through vim. Sending off a missive is just a xterm-switch away. The next thing is to track up the total amount of day spent clicking away at this thing, but it’s most likely less than the amount of time I spend walking between meetings and offices, so I don’t feel too bad about it.
Category: Legacy
Danah says supporting the Mac is required for social computing.
You can build enterprise software that doesn’t work on a Mac but you CANNOT build social technologies that don’t work on the Mac. Who are key driving forces behind sociable technology? Freaks, (independent) geeks, academics and other marginalized populations. What do marginalized groups use when it comes to technology? Surprise – they use subversive tools. Conferences organized by geeks, freaks and academics are like walking into an Apple distribution warehouse. If you only lived in this world, you would think that Apple makes up 70% of the market share.
I’d go further and say that any social networking infrastructure MUST be inherently cross-platform, but I’m sure that lots of people are/will try to prove that wrong. Lets hope for their continued unsuccess.
With all these inbound links, some interesting things are showing up, like Wacky Neighbor (check out this great debate highlight reel set to hip-hop), Blognows’ mov clips tracker.
Related, a resume for Bush that tries to be objective (see forward)
ahh, that’s better. Oh, by popular request (Mr. Crosby is the legal contact at theplanet):
Ref: R3434 Re: http://randomfoo.net/junk/200409/U2%20-%202004%20-%20Vertigo%20(Single)/ Dear Lance Crosby, I am contacting you on behalf of the International Federation of the Phonographic Industry (IFPI) and its member record companies. The IFPI is a trade association whose member companies are some 1,500 major and independent record companies in the US and internationally who create, manufacture and distribute sound recordings. Under penalty of perjury, we submit that the IFPI is authorized to act on behalf of its member companies in matters involving the infringement of their sound recordings, including enforcing their copyrights and common law rights on the Internet. We have learned that your service is hosting infringing files on its network (see above-referenced directory). These files contain sound recordings by the artists known as U2. These sound recordings are owned by one of our member companies and have not been authorized for this kind of use. We have a good faith belief that the above-described activity is not authorized by the copyright owner, its agent, or the law. We assert that the information in this notification is accurate, based upon the data available to us. We are asking for your immediate assistance in stopping this unauthorized activity. Specifically, we request that you remove the infringing files from your system or that you disable access to the infringing files. In addition, please inform the site operator of the illegality of his or her conduct. You should understand that this letter constitutes notice to you that this site operator may be liable for the infringing activity occurring on your service. In addition, under the Digital Millennium Copyright Act, if you ignore this notice, you and/or your company may also be liable for any resulting infringement. This letter does not constitute a waiver of any right to recover damages incurred by virtue of any such unauthorized activities, and such rights as well as claims for other relief are expressly retained. You may contact me at IFPI Secretariat, 54 Regent Street, London W1B 5RE, United Kingdom or email Notices@ifpi.org, to discuss this notice. We await your response. Sincerely, Mr Paul Mitchell Internet Anti-Piracy Administrator IFPI Secretariat 54 Regent Street London W1B 5RE United Kingdom Tel: +44 (0)20 7878 7915 Fax: +44 (0)20 7878 6832 E-mail: Notices@ifpi.org Website: www.ifpi.org
Prevayler – wow, why haven’t I seen this before? This is the memory database that Jot uses (via Life with Alacrity).
Note, that while Calcanis thinks this is a commodity business, well, you might not think blogging would be what is has been when you first heard about it… From an enterprise perspective, I can say that this is definitely exciting, and from on the larger-scope (think Memex, Xanadu [or as Jot likes to put it, Excel]), it’s even more promising. Of course, I could be biased.
Wow, so What Barry Says video I’m mirroring is getting some major traffic. Looks like it even maxed out my interface for some brief periods. Nice.
/
I don’t really need to worry until I hit about 1TB, I think.
Hmm, was wondering why I had a spike in access to /junk (indexing removed) and it was because I had temporarily disabled my robots.txt file and forgot to reenable it (this is a good url to remember: http://services.google.com:8882/urlconsole/controller?cmd=robots). Oops.
The Long Tail – Matt is right, Chris Anderson’s article about how the Internet has changed the nature of the media life-cycle is a treat. So simple, yet so well synthesized (definitely the best summation I’ve read). Lessons to keep in mind as people start on “Web 2.0”.
Wow, What Barry Says, an amazing 2 minute short, is so good that I’m mirroring it locally.
[rdfweb-dev] Plink – plink.org is going down due to the inability for FOAF to be expired. Lack of control of proliferation of personal information is one of the major hurdles (a subset of the larger question of publishing control [see: Towards Semi-Permeable Blogging] and data control/faceting [see: Capabilities Theory]) in moving towards larger (hopefully open) identity management and relationship management systems.
Certainly, one way to do it is along the lines of using PKI and encryption to create classes of data encrypted on per-user, per-group bases. Keys could then be directly managed and revoked to limit continued availability within the system regardless of the distribution of the encrypted data (spread it over Freenet or other P2P for caching!). There are also other ways of expiring data, but those should remain in confidence for now.