links for 2010-11-09

  • This wiki aims to be the authoritative resource for all things related to the art and science of mobile user interface design.

    Designing mobile user interfaces grows ever more interesting. Device and network capabilities are improving, platforms are giving us more features to help the user, privacy and security are becoming more important, and device proliferation is both increasing and decreasing.

    The following topics may be helpful to get you started in mobile design.
    The Mobile Challenge – Designing for mobile is more complex than designing for desktops. Device proliferation abounds.
    Design Patterns – an introduction to what design patterns are.
    Class-Based Design – Devices and device classes can be chosen strategically, based on market and user needs.
    Device Hierarchy – mobile patterns rely on both device user interface style and platform.
    Mobile Design Principles – ways to think about mobile design.

  • Clay Shirky: "What's going away, from the pipeline model, isn't the importance of news, or the importance of dedicated professionals. What's going away is the linearity of the process, and the passivity of the audience. What's going away is a world where the news was only made by professionals, and consumed by amateurs who couldn't do much to produce news on their own, or to distribute it, or to act on it en masse.

    We are living through a shock of inclusion, where the former audience is becoming increasingly intertwined with all aspects of news,

    This shock of inclusion is coming from the outside in, driven not by the professionals formerly in charge, but by the former audience. It is also being driven by new news entrepreneurs, the men and women who want to build new kinds of sites and services that assume, rather than ignore, the free time and talents of the public.

links for 2010-11-05

How the NY Times turns topic pages into link spam

Topic pages can be a great for news venues and audiences. In my post yesterday to the Knight Digital Media Center’s News Leadership 3.0 blog, I sang the praises of topic pages as a tool news orgs can use to engage communities over time around issues.

Of course, news topic pages can be abused, too.

Today the New York Times (which in many ways pioneered the use of news-related topic pages) offers a classic bad example of spammy links to its own topic pages… Continue reading

links for 2010-11-04

links for 2010-11-03

  • "However eclectic your music collection, it would still need to go some way to match the sheer range of tracks shared by villagers swapping songs via Bluetooth and Sim card in the Sahara. Bollywood classics, Algerian Rai, Kuduro, French ballads – this is just a sample grab of the kind of sounds doing the rounds there, many of which can be found on Music from Saharan Cellphones, a mixtape put together by Portland-based blogger Christopher Kirkley.

    "The cellphone is such a fixture of west Africa. Everyone has a phone even in villages lacking reception," explained Kirkley, who collected MP3 memory cards in the Tuareg city of Kidal in northern Mali. "They're not just phones, they're all purpose media devices. In the west we maintain a repository of data on hard drives, in Sahel, the cellphone does the same thing."

links for 2010-11-01

  • "Use a VPN. This is the easiest solution of all, as well as the most thorough. It will not only encrypt your web browser traffic, it will encrypt all of your Internet traffic (including IMs, email, etc) at least from your computer all the way out to the web. I used Witopia some time ago with both my MacBook and my iPhone. It was very easy to configure and use. For $40/year you can use their "personalVPN – PPTP" service, which will work for both iOS devices and Macs. Their products page describes some important differences between some of their offerings. Their $70/year "personalVPN – SSL/PPTP Combo" is worth a look if you have the budget for it, but the $40/year version will probably suit most people's needs. Of course, if your employer or school offers a VPN client for your use, that will do the job as well."
  • This is where you can download FireSherd, a Windows program that kills firesheep sidejacking sessions running on a network.

    If you're a windows user, be a good network citizen and install this and use it when you're on open wifi.

  • "FireShepherd (the nice one) kills any Firesheep sessions running over unsecured hotspots. Unfortunately, FireShepherd is a Windows program, which leaves users of other systems unprotected."

    "Many smartphone owners are accessing the web via Wi-Fi hotspots, but those devices have the best protection against hackers in their 3G or 4G connections. As tempting as using the free Wi-Fi may be, the safest way to connect to the web is using the phone’s integrated 3G/4G data connection. These connections are encrypted at the carrier level, and are risk-free as a result."

  • Useful tool to protect yourself at least partially from Firesheep and other sidejacking incursions.
  • "Years ago David Cheriton at Stanford taught me something that seemed very obvious at the time — that if you have a network link with low bandwidth then it's an easy matter of putting several in parallel to make a combined link with higher bandwidth, but if you have a network link with bad latency then no amount of money can turn any number of them into a link with good latency.

    It's now many years later, and this obvious fact seems lost on the most companies making networking hardware and software for the home. I think it's time it was explained again in writing."

  • "The FCC concluded that the spectrum deficit will reach 300MHz within the next five years due to a 35 times increase in demand for mobile broadband. The FCC believes that growth and demand will outstrip technology's ability to keep pace. Last, the FCC thinks the spectrum shortfall will increase the value of spectrum by $120 billion. As it stands, the National Broadband plan has called for 500MHz of spectrum to be made available within 10 years, and 300MHz of it within five years. The FCC notes that, because it generally takes between six and 13 years to make spectrum available, the government needs to enact steps to free up the necessary spectrum sooner."