|The Open Source Software vendors have a similar model where they offer the software for free download and sell consulting, maintenance and support contracts for revenue.
Don Dodge, Freemium – Free to paid conversion rates
Don Dodge does a good job weeding through the Web 2.0 biz-speak and nailing down why the Freemium model could actually work for some start-ups.
Do the math. 100,000 free users convert to 3,000 paid users. They pay between $10 to $50 per user per month. Lets use $25 as an average. That is $75K a month or $900K per year. That is an excellent revenue stream for companies that typically have 3 to 5 employees.
|KDE and GNOME tend to mimic Windows. An unwritten rule in the Linux world is that user-friendliness is getting closer and closer to the MS-Windows model. So what really grabbed me when I started E (as Enlightenment is generally called) was it’s departure from the beaten track.
Kiran, The Day I Was Enlightened
|Microsoft SharePoint 2007 comes in 2 flavors: Microsoft Office SharePoint Server (MOSS) and Windows SharePoint Services (WSS). SMB’s will traditionally be able to rapidly deploy WSS and not hassle with expensive licensing in MOSS. However, at certain levels, MOSS offers some higher level functionality that you just can’t beat.
Ken Stewart, SharePoint 2007: Friend or Foe? – 2 of 4 –
|I think it’s a combination of technical and social factors that leads to all the defects in deployed software. Part of it is the attitude that software is just inherently unreliable, and customers are conditioned to accept that. Developers are conditioned to accept that. Testers are conditioned to accept that. We just decided it was like the weather and there’s nothing we could do about it, which isn’t a very responsible position because in fact, there’s a lot that software developers can do about it.
Kent Beck, as quoted in Extreme Programming inventor talks about agile development
Kent Beck gave a great interview that’s posted on the IBM developerWorks site, where he talks about the payroll project at Chrysler. It’s a great read.
Now, the payroll program would handle Chrysler’s entire payroll, representing 1/10 of 1 percent of the entire US gross national product — at that scale, with union rules and all the places they operate, it’s a complicated program. They had a crying business need; it had to work. At the same time, this wasn’t rocket science — we just had to execute.
So, after a couple of weeks I interviewed everyone one-on-one. I told the first guy that we’ll divide the project into three-week intervals called, say, iterations. In each iteration we’ll implement a few new features called stories. We’ll write down all the stories we need, slot them into the iterations, then do it.
I told the next guy [I interviewed] that we have these three-week iterations divided into stories. For each story we’ll write these, um, acceptance tests to demonstrate that the stories meet the customer’s expectations.
With each person I interviewed I added a little more. By the end of the day, I’d interviewed 20 people and had laid out Extreme Programming’s basics.
My favorite quote from the article? “Sucks less isn’t progress.”
|If every hour a burglar turned up at your house and rattled the locks on the doors and windows to see if he could get in, you might consider moving to a safer neighbourhood. And while that may not be happening to your home, it probably is happening to any PC you connect to the net.
Mark Ward, Tracking down hi-tech crime
In 2006, a BBC News technology team set up a honeypot and found that the average home computer was attacked from the Internet once every twelve minutes. I wonder what the number is now?
|Sure, the YouTube explosion was fueled by amateurs, but it will be showbiz professionals who cash in on Web video. That’s because most big corporate advertisers want a safe, predictable environment — not the latest YouTube one-off, no matter how viral.|
Frank Rose put together an interesting look at the scramble to monetize web video. I hadn’t realized that some TV execs were looking at Web video as the farm team for the big league. It also hadn’t occurred to me that product placement in web video could be big business.
On a sunny afternoon in March, Rogow pulls his black Porsche SUV to the curb, collects a ticket from the valet, and walks briskly into the Creative Artists Agency building on LA’s Avenue of the Stars. Perfectly framed in an enormous glass wall is the Hollywood sign, 8 miles away. Rogow is here to meet with Anita Lawhon, the Cisco executive in charge of entertainment partnerships. This is crunch time for Gemini Division, the weeks when everything — advertising, distribution, financing, production — must come together. On a table in the vast marble reception zone sits this morning’s Daily Variety. “Changes to Biz Give Town the Jitters,” reads the front-page headline.
Today, Rogow is focused on how to get that business model working. It’s going well — so well that Herskovitz recently met with his CAA agents to learn how Electric Farm is doing it. Cisco is key. Those Gemini Division agents are going to wield some pretty cool tech, much of it — thanks to a deal brokered by CAA — actual products from Cisco: a video surveillance system that sends an alert when someone penetrates the wrong sector; digital billboards that can be reprogrammed on the fly; TelePresence, a teleconferencing system with life-size video so hi-def it makes virtual meetings seem almost real. In the past few weeks, similar deals have been cut with Acura, Intel, Microsoft, and UPS. “In a cold business sense,” Rogow confides, “this show is a self-financing marketing vehicle.”
Another quote from this article got me thinking: “In 1908, movies were 10 minutes long because that’s all you could get on a reel of film, and the actors who appeared in them were anonymous. ” Sound familiar?
|Last week we tagged Mark Schoonover. We invite you to tag his blog and follow Mark too!|
1. When did you first discover your love for technology?
As soon as I was old enough to hold a screwdriver and take things apart!
2. How do you earn a living?
I’m a developer on the United States Navy and Marine Corp Intranet.
3. What do you love most about your work?
Very challenging assignments, great people, huge network.
4. What keeps you up at night?
Lately it’s been devoting time to the Drizzle project.
5. What do you do when you’re not working?
Coach soccer, referee, ultracycling, bugging my wife and kids….
6. You’ve looked in your crystal ball and have seen the future of enterprise IT. What does it look like?
Bigger, faster, more cores! There’s going to be a limit on CPU speeds, so the only way to go faster is to do things in parallel across many cores/CPUs at a time.
|Last week we tagged Pam Baker!|
1. Pam, when did you first discover your love for technology?
I’m the cat that curiosity is always stalking! I love to learn new things and technology is constantly about new things, so it’s a natural match for my questing mind. There is much to accomplish but only one lifetime to do it in; technology allows us to super-speed our accomplishments to roughly double the time we actually have. Combine the lightning speed action with the continuous intellectual exercise, and you have the reason I’m addicted to tech!
2. How do you earn a living?
I am a full-time freelance writer who also does significant analytical work as a contracted analyst for various research firms, most notably for UK-based Visiongain using the pen name Pam Duffey, but also for several other research firms. I also do “big picture” consulting work, meaning I help start-ups and tech companies figure out how to make money from their great tech ideas. I repair the disconnect between great adoption rates and poor monetization.
3. What keeps you up at night?
Fear of human nature. Technology within itself is neither good nor bad — the humans wielding it however are often both. Greed is growing at an unprecedented rate while compassion, decency, and respect for privacy are wilting everyday. I fear what the man behind the curtain may do to the munchkins of the land if left unchecked. To many of our so-called over-seers and governmental regulators are far too ignorant of technology to properly protect the people — and they too are a mix of good and evil. In my opinion, human nature is the scariest thing out there.
4. What do you do when you’re not working?
I play hard. Not being one to tackle anything half-heartedly, I go after pleasure with the same gusto that I tackle a work project. Generally, I love to travel and learn new cultures whether that’s in another state or another country. Once there, I try out just about anything the locals enjoy. Told you, the cat that curiosity stalks!
Downtime at home, I enjoy great sci-fi movies, books of all kinds, my wonderful dogs, and long walks through the woods. Pretty sedate really.
5. You’ve looked in your crystal ball and have seen the future of enterprise IT. What does it look like?
A greatly diminished data center as everything goes Software as a Service (SaaS) and to cloud computing. Companies will crystallize their efforts to their core competencies and outsource everything else; hosted everything will rule the day. Unified communications and universal compatibility will make everything easier to do and use. Vulnerability, however, will sky-rocket because of this.
Outsourcing things like contact centers to foreign countries, however, will crash and burn as great customer service once again becomes vital to bottom-lines and companies realize that “cost per contact” is not nearly as important as “outcome per contact.” Using locals in contact centers for any given region is the only way companies can achieve the customer satisfaction levels they need to boost sales and brand loyalty, so expect offshore outsourcing to revert to near-shore and onshore outsourcing. In fact, some of that is happening now.
Nanotechnology will finally burst through the manufacturing obstacles and devices and hardware will become much smaller, better and faster, further reducing the size of the data center, the impact on the environment, and the cost of IT.
Google and Apple will eventually break the U.S. carrier stranglehold, possibly Yahoo will have a role in that as well, and the U.S. will finally see more benefits in mobile technology than we imagine today. That too, will further change enterprise IT. But until we get our carriers to play ball, mobile’s not going to be much more than it currently is here. Mobile advertising here is going to fail, largely because of carrier shortsightedness and their fear of becoming “dumb pipes.” It will take years before companies will be willing to try mobile advertising again after that, but they will eventually, and the second wave will be tremendously successful because carrier obstruction will be dealt with and because new business models will make mobile advertising more lucrative.
Broadband speeds in the U.S. will finally come up to par to other countries, once we eventually get around to redefining what constitutes “high-speed” broadband. Broadband issues will become paramount as companies turn to more telecommuters worldwide in order to satisfy their talent needs and lower energy needs. Enterprises will push hard for the change — and get it — as they learn from the global marketplace how badly out-of-whack the U.S. is, comparatively speaking.
The same is true with SOA. Only the U.S. sees SOA as a reuse advantage, other countries see it as a business process advantage. Because of this, U.S. based companies are not realizing the full benefits of SOA, but that will change in the near-future.
That’s just a few of the changes I see coming.
Bonus Question: If Stephen Spielberg was going to make a movie about your life, what would it be called?
It would definitely be an action movie, most likely a sci-fi movie too because the role technology has in my life, and a bit of a thriller since even I never know what’s going to happen next, lol, so maybe it would be called “The Wonder-lust Chronicles” or “Chaos Trapper.”
|A group of reporters from Global Security Mag were kicked out of the Black Hat conference in Las Vegas after stealing password information from another reporter who will remain nameless—we’ll call him “me.”
Brian Prince, How eWEEK Got Hacked at Black Hat
Alas, I broke one of the cardinal rules of security and, but for the grace of the Black Hat conference staff, would have had my name added to the infamous Wall of Sheep.
Hackers have the most colorful language. The Wall of Sheep is run by volunteers at the DEFCON security conference. It’s a projection on a wall that lists users at the conference who put their data at risk by running unencrypted information on the conference’s open network. Originally the offender’s names were posted on white paper plates — the wall filled with crinkle-edged paper plates looked like a kindergarten bulletin board of little fluffy sheep and the name stuck.
|A software system can be tested in two ways. It depends on your point of view. It can be with or without technical knowledge of the system.|
Black-box tests can be functional or non-functional, though usually functional. The tester selects valid and invalid input for the test and determines if the output is correct. The tester doesn’t need to have knowledge of the internal structure of the system. Typical black-box test design techniques include:
- Equivalence partitioning; To reduce the number of test cases and select test cases that cover all possible scenarios
- Boundary value analysis Validates input and checks if the input is in the valid range, i.e. if (month > 0 && month < 13)
- Decision table testing Are about if- and switch-statements. Decision tables model conditional logic.
- Pairwise testing Test each pair of input parameters to a method. Simple bugs are triggered by a single parameter, next simplest category of bugs consists of those dependent on interactions between pairs of parameters.
- State transition tables Shows in what state a system moves to, based on the current state and input parameters.
- Use case testing Users work through use cases with the aid to verify that a UI fulfills the needs of its users, as described in the use case model. The tester identifies which use case(s) to test, the actors (users), input, output and system effects and the flows of interest between the use cases.
- Cross-functional testing The work of one person is reviewed by the team as a whole.