From: Gleanigns To: bloggers Subject:

From: Gleanigns To: bloggers Subject: Gleanings: from pyra to email wiretaps… OPENING THANG I’m still facinated by the […]

From: Gleanigns
To: bloggers
Subject: Gleanings: from pyra to email wiretaps…

OPENING THANG

I’m still facinated by the blogger and pyra adventure.
http://www.haughey.com/pyra.html
“Thousands of young and old alike, beginner and expert started using their website to communicate their voice, build a brand, feed an ego, and spread their ideas through weblogs. At the center of it all, was Blogger.com, and it showed no signs of stopping.
But backstage, things were falling apart…” from matt haughey.

Loving his new site design, btw
http://a.wholelottanothing.org/
but then, anyone who quotes Tibor is okay with me. Wish I had time to redesign eleganthack.com. or at least the front page. sigh.

IA MATTERS

Designing a normalized database structure is the first step when building a database that is meant to last. Normalization is a simple, commonsense, process that leads to flexible, efficient, maintainable database structures. We’ll examine the major principles and objectives of normalization and denormalization, then take a look at some powerful optimization techniques that can break the rules of normalization.
Normalization Is a Nice Theory
http://www.4dcompanion.com/downloads/papers/normalization.html
as a 732K PDF:
http://www.4dcompanion.com/downloads/papers/normalization.pdf

USABILITY MATTERS

Q&A: Vanessa Donnelly (Part II)
We caught up with IBM’s usability guru Vanessa Donnelly. In Part 2 of an
interview, we talked about the availability of online usability courses.
She also gives her Top 10 list of usability do’s and don’ts.
http://www.newmedia.com/default.asp?articleID=2474

NEWS & COMMENTARY

First Monday: Content is Not King.
Andrew Odlyzko. For the wired Internet, the secondary role of content will
likely mean that the dangers of balkanization are smaller than is often
feared. Further, symmetrical links to the house are likely to be in greater
demand than is usually realized.
http://www.firstmonday.org/issues/issue6_2/odlyzko/

SJ Mercury: Big business and government stretch the boundaries of privacy yet
again.
Dan Gillmor. Trusting businesses to protect privacy is always a risk, because
personal data is a valuable commodity. That’s why I’m hesitant to take at face
value a new Amazon service that looks quite useful — and which, at least for
now, is sensitive to privacy concerns…
http://www.mercurycenter.com/svtech/columns/gillmor/docs/dg020701.htm

Forbes: Linking Like Minds.
There is no shortage of people willing to freely give their time to their
favorite sites, and certainly, companies are quick to reap the benefits.
Mindful of the legal pitfalls, executives are hiring consultants to show them
new ways to involve volunteers online without incurring liability.
http://www.forbes.com/asap/2001/0219/078.html

all from tomalak.org. read more news there….

MARKETING MATTERS

Unleashing The Ideavirus, by Seth Godin
free download
http://www.ideavirus.com
review:
http://www.personalization.com/soapbox/columns/norlin-1.asp

Coming Clean on “Real-Time” Marketing
Real-time optimization, real-time tracking and real-time trafficking need
to be key elements of your online marketing campaigns. Monitoring and
fine-tuning campaigns in real-time is the key to improving click rates,
conversion rates, cost per acquisition and sales. And when we say
“real-time”, we mean real-time–not taking days, weeks or months.
http://www.newmedia.com/default.asp?articleID=2476

APROPOS OF NOTHING

“you can have my aeron when you pry it off my cold dead ass.”
http://www.fuckedcompany.com/merch/

bible action figures
HTTP://www.jesuschristsuperstore.net/Action%20figures/Action%20figures.html

A FRIEND WRITES

passed on from muffy

WASHINGTON (AP) – Imagine a large corporation wants to acquire a
small Web company. The corporation sends an e-mail with a price
proposal to the target – and includes a few lines of invisible
computer code. As the target’s executives pass the message around,
the corporation gets a copy each time it’s forwarded – with all the
supposedly private comments attached. On Monday, a privacy group
started demonstrating this new method to listen in on e-mail that
works on the most popular programs. Called an e-mail wiretap, it
could be used to note off-color remarks from governmental officials,
by a spamming company to gather e-mail addresses, or by a boss to
find out what you’re saying about him. “You really would never know
that this is occurring, unless you could view the source code and
know what it meant,” said Stephen Keating, executive director of the
Privacy Foundation. The foundation, associated with the University
of Denver, and its chief technology officer Richard Smith, found out
about the situation from computer engineer Carl Voth, who discovered
it in 1998. Though Voth posted an explanation on his Web site, he
kept quiet about it otherwise until contacting the Privacy
Foundation recently. Smith said e-mail wiretaps may become even more
common than viruses