|We have had nearly 24 hours to jump out Steve Jobs’ reality distortion field and put common sense behind the announcements made yesterday – especially the company’s iPhone 3G.
Christian Zibreg, WWDC 2008: Will the iPhone 3G kill the iPhone?
Christian Zibreg thinks the money iPhone users shell out to AT&T each month is the deal killer. It is for my family.
Just as I was posting this, Verizon called and offered my whole family free phone upgrades and extra minutes. Coincidence? LOL!
|A number of people have alerted me in the last 24 hours that a Microsoft project called Sandcastle, located on Codeplex, used the Ms-PL and called itself “open source” yet never posted the source code. This is unacceptable and represents a violation of Microsoft’s Open Source policy. I take it extremely seriously. I have directed the project to be unpublished from Codeplex immediately, including removal of the project’s use of the Ms-PL.
Sam Ramji, Sandcastle Removed from Codeplex
Isn’t it ironic that Microsoft picked Sandcastle as the name for their documentaion tool? Now, like a real sandcastle, it’s disappeared in a wave of indignation from the OSI community.
|Over time, we have added classic data warehouse features like partitioning, sampling and indexing to this environment. This in-house data warehousing layer over Hadoop is called Hive and we are looking forward to releasing an open source version of this project in the near future.
Joydeep Sen Sarma, Hadoop
|The culture that is embodied in the FOSS movement — a meritocracy that is built upon both collaboration and critique — is synergistic with some core principles of learning, so, where possible, I try to embrace that culture.
Walter Bender, as quoted in Walter Bender Discusses Sugar Labs Foundation
“Constructionism” is a theory of learning pioneered by Seymour Papert. Papert first started developing the theory as a student of Piaget in the early 1960s. Over the course of more than 40 years of research and practice, Papert and his students found that children learn best when they are in the “active role of the designer and constructor” and that this happens best in a context where the child is “consciously engaged in constructing a public entity” — something “truly meaningful” for the learner. Further, the creation process and the end product must be shared with others in order for the full effects to take root.
|Most agile coaches move around from team to team and need to fit in with different groups. Not only do they have to be approachable by different people, but they also have to ensure that what they say and how they act doesn’t work to exclude people.
Patrick Kua, The Agile Coach, from A to Z
|One unfortunate habit Bill Gates has is constantly bringing his finger tips together high across his chest while speaking. Often this leads to his hands being locked together somewhere across his chest. This gesture makes him seem uncomfortable and is a gesture reminiscent of The Simpsons’ Mr. Burns.
Garr Reynolds, Gates, Jobs, & the Zen aesthetic
Garr Reynolds does an excellent job explaining PowerPoint Zen by comparing the presentation styles of Steve Jobs and Bill Gates.
|The nature of Grid/Cloud computing means a business has to migrate its applications and data to a third party solution. This creates huge barriers to the uptake.
Paul Wallis, Is the Cloud There Yet?
In such a climate it will require asking the business to take a leap of faith to find solid footing in the cloud for mission critical applications.
And that is never a good way to sell to the business.
|Recent statistics show that the job opportunities in India have outnumbered the available hands. The problem is more of “Employability” rather than employment.|
|The most popular reason for not implementing tokenization is that companies have already implemented data encryption and key management systems costing hundreds of thousands of dollars, and either they did not feel they needed tokenization or they were unwilling to be perceived by upper management as “changing course” by recommending the removal of the data they just spent all this money to protect.
Evan Schuman, Opposition To Tokenization A Lot More Than Token
|Spending too much time with the ‘in crowd’ who ‘get’ Enterprise 2.0 can result in serious over-enthusiasm and lack of realism.
Martin Kloos, The state of Enterprise 2.0 and why we need new stories
Ever since Forrester released a report last month saying that Web 2.0 technologies will have a world-wide market value of $4.6 billion by the year 2013, the early adopters have been patting themselves on the back, saying “I told you so.”
Not so fast, bucko. 2013 is a long way away and enterprise IT is not just going to open its doors to the new kids on the block just because a new generation is entering the workplace. What’s more likely to happen is that legacy IT applications will make updates, incorporating Web 2.o features that work for a particular industry or software application.
At the very least…those Web 2.0 apps wanting consideration will need respectable names. Manly names. Serious names. Names IT professionals don’t feel embarrassed talking about at manager’s meetings. Twitter? Tweets? I don’t think so.