Article archive - page 6
Web Directions South 2009 - Cloud Sourcing the Business
Friday, October 9th 2009
Notes from a Web Directions South talk on cloud computing that outlines public, private and hybrid models. It walks through infrastructure, platform and software services with business examples.
An unofficial endorsement of the Android platform?
Wednesday, July 29th 2009
Facebook's official Android app signals that the platform is now a serious iPhone rival. It removes a key Apple differentiator, and sets up a fierce Android vs iOS battle.
Case Study: Django + Agile = Sportsgirl redevelopment
Sunday, July 26th 2009
A rapid Sportsgirl community rebuild used Django, Pinax and an agile workflow to ship in under eight weeks. The case study covers the stack, cloud deployment and performance tuning that made it work at scale.
The Golden Age of mobile? Soon maybe...
Tuesday, July 21st 2009
With smartphones, data plans and app stores exploding in 2009, it feels like the golden age of mobile is near but not here yet. The real shift will come with contextual and augmented reality experiences.
EEEPC's power is in the network not the machine
Friday, May 9th 2008
The EeePC is compelling not because of specs but because it is a lightweight tool that thrives on constant connectivity. A love letter to small, network-first computing.
Ubuntu 8.04 - truly desktop Linux
Friday, May 2nd 2008
Ubuntu 8.04 finally delivers a Linux desktop that just works, even on finicky laptops. With Vista faltering, it feels like the first truly viable moment for mainstream Linux adoption.
Easy product or class rating system
Sunday, April 27th 2008
Build a rating system that won't set your servers on fire.
Phorm over function?
Tuesday, April 22nd 2008
Phorm's ISP-level tracking raises serious privacy concerns even if the data is anonymous. Opt-out tracking erodes trust and could spark a privacy-first backlash or new laws.
Can Yahoo really get things so wrong?
Monday, April 21st 2008
Yahoo's spam filters began deleting legitimate customer emails with no clear appeal path. Debugging the trail of why, and the frustration of opaque email filtering.
Security 101 : The user should be able to authenticate
Saturday, March 15th 2008
Security needs to be appropriate to the value of the asset it protects.







