Sunday, March 27

CalDAV - Wikipedia, the free encyclopedia: "The CalDAV specification was first published in 2003 by Lisa Dusseault as an Internet-Draft submitted to the Internet Engineering Task Force (IETF), and it quickly gained support from several calendaring software vendors. In January 2005 the first interoperability event was organized by the CalConnect consortium. CalDAV does not have an IETF Working Group but the authors still plan to submit it as an IETF standard. CalDAV is designed for implementation by any collaborative software, client or server, that needs to maintain, access or share collections of events. It is being developed as an open standard to foster interoperability between software from different implementors.

The architecture of CalDAV is to model events, which may be meetings or appointments or blocked-off-time, as HTTP resources. Each event is expressed in the standard iCalendar format. Thus, any Web browser can download a standard representation of an event. Events are organized into WebDAV collections to allow browsing and synchronization. In addition to HTTP (RFC2616) and WebDAV (RFC2518) functionality, a CalDAV server must support WebDAV access control (RFC3744), must parse iCalendar files (RFC2445) and support a number of calendaring-specific operations such as doing free-busy time reports and expansion of recurring events. With this functionality, a user may synchronize his or her own calendar to a CalDAV server, and share it among multiple devices or with other users. The protocol also supports non-personal calendars, such as calendars for sites or organizations.


Up-to-date CalDAV information can be found at the CalDAV home page."
Mitch Kapor's Weblog: "Novell's Open Source Collaboration Server

Novell is contributing its NetMail server code base to create a new open source collaboration server, Hula. Hula will support CalDAV, and is currently tested to be robust and scalable for up to 200,000 accounts with 50,000 concurrent connections on a single Linux server. Having this kind of server resource available enriches the Chandler ecosystem, will provide an additional alternative backend, and make it easier to implement a distribution of Chandler and other CalDAV clients that will be able to interoperate and share information without relying on proprietary servers.

At a recent roundtable and interop meeting of the Calendaring and Scheduling Consortium several vendors demonstrated initial interoperability between some CalDAV servers and clients. Novell is a founding member of the consortium and a supporter of the CalDAV initiative. "
Mitch Kapor's Weblog: "Caveat altert: In a transitional era like the one we are in now, it is notable that it's harder to convert a code base developed in a proprietary context to be open source than it is to start from scratch for the same reason renovating a house completely is harder than new construction. Trust me if you haven't been through this. I have. This is one of the reasons it took seven years from the day Netscape announced it was going to open source the Mozilla browser to get to Firefox 1.0."
Mitch Kapor's Weblog: "Snippets from Emerging Technologies - Tuesday A.M.

Networks of amateurs (in astronomy, publishing) are displacing the professionals -- Leabeater, quoted by Rael Dornfest

Too much important knowledge is locked up on paper where it's not searchable and hard to get to. -- Jeff Bezos, also by Rael.

Pay attention to design patterns for innovation -- Tim O'Reilly. Examples:

* Build with 'Small Pieces, Loosely Joined': (borrowing the David Weinberger book title)
* Design for participation, e.g., have users add value to your data (Amazon user book reviews)
* Make participation the default: Aggregate user data as a side effect. (Flickr's default for sharing is public)
* Data is the next 'Intel Inside': owning a unique, hard-to-replicate data source as a competitive advantage"

Saturday, March 26

USB webcam driver for Mac OS X
Multi-Cam Driver Downloads
((((( SUPER SIZE ME ))))) A FILM OF EPIC PORTIONS: "'Just one meal that is high fat and unhealthy can hurt your arteries. One day, one meal will hurt, and it's measurable,' Llamas said."
Jeff Grabill
to Association
More options 3:15pm (4 hours ago)
Two from Pat Sullivan (for soon-to-be assistant professors):

Write about everything you do; don't do anything you can't write about.

Go to lunch (with colleagues in your department)

jeff

Thursday, March 17

Notes and Recommendations for 15 December 1998: "David Noble's latest article about distance education provoked as much hate mail as you might expect. You're not interested in the personal abuse and all-around cheap shots in several of these messages. More interesting is the underlying form of their arguments. Although nobody openly says this, the conflict here is between two tacit views of the relation between technology and power. Noble comes from a tradition that regards technology as an instrument of power and its plans. Power, he believes, wants to replace people with machines, regardless of whether it is efficient or decent to do so, simply because the machines make us easier to control. The history of this perspective stretches across centuries, and Noble regards distance education as simply the next chapter in that history. Noble's opponents, on the other hand, assume that technology is the natural enemy of power. They believe that technology has its own inner logic, that this logic is unstoppable, and that its inevitable effect is to destroy hidebound institutions and to overthrow their oppressive masters. They apply these assumptions not only to the university system, but to governments and hierarchies of all sorts, and they get upset if anybody challenges the virtues of technology. These two views cannot both be correct, and you will be unsurprised to hear that I believe that the truth lies in the middle. That's not because I'm a centrist, as someone suggested. A centrist is someone whose views are defined in relation to the views of others -- Slobodan Milosevic is a centrist in the terms of Serbian politics. Rather, I have repeatedly noticed that opposite-extreme ideas are, in practice, evil twins that feed on one another. To be sure, each of the extreme views is useful as a counter to the other, and each side directs our attention to factors that the other side defines away. What's valuable in the perspective of Noble's critics, for example, is an insistence on the unanticipated consequences of new technologies. And what's valuable in Noble's perspective is its insistence that the proper unit of analysis is machinery plus institutions. The machinery and the institutions, that is, evolve together. "

Saturday, March 12

Wonderland: Burn The House Down

Brenda Laurel:
I want to talk about the spectacle. The meanings created by images that hold us in webs. My thesis is that we are contributing to the damage that the spectacle does to human beings by suggesting the interactivity of a joystick is real agency. We entrain people to understand that imitation has personal power. The spectacle trains us to be consumers. We are urged to keep the economy healthy, pay our bills. Did you ever notice there’s not place for the earth on the bottom line? We cancelled the Voyager mission for less than the cost of a video game! The dream of space appropriated by George W Bush? How can we stand for this?

Games keep essential social myths in place. So we have tropes in our business. Criminals are cool. The commercial game business is a non-consensual relationship between middle aged men and young boys. It’s worse than the catholic church. These are guys who have really big tyres on their trucks … and we all know why! [laughter] So the fantasies of these guys position these boys as tiny little clones: so they force you to take your genius to create this .. this .. we can’t have that fellas. Oh by the way there was a crowd in the ladies bathroom today. w00t!

GTA. I talked to 22 little boys in LA, all of them wanted to see that game. With only one exception, the thing that they wanted to see was to be able to drive by their house. They weren’t interested in stealing cars. Or the criminals. Or the back-story. They weren’t interested in that, they wanted the simulation of driving by the house.

We model male ethos in the games we design: soldier, super athlete, criminal. Anyone who was born with internet and computers are prosocial. Skaters are mainstream. We have two models of alpha maleness: skaters and ballers [I have no idea what this is referring to - A]. … we need heroes, but what kind of heroes are we making? Where’s Malcolm X, or Chavez? There hasn’t been a game about geopolitics that was worth a shit since Hidden Agenda! We should be giving people rehearsals for citizenship and change. I have to tell you, Microsoft is the walking dead. DRM is a wet dream. It’s not gonna work! Cat’s out the bag! When this happens, you have to let the cards fly in the air and fall where they may. GIVE IT UP ABOUT DRM. GIVE IT UP ABOUT OWNERSHIP. Cleave to open source! A NEW ECONOMY IS COMING. As we become further connected we will find new economies emerging. We are the wellspring of popular culture. We have a responsibility.

Monday, March 7

eWiz.com IS YOUR BEST FRIEND! We do the product pricing for you!
O'Reilly Emerging Technology Conference 2005: "Session
Military E-Tech
JC Herz, Author and Defense Researcher/Consultant

Date: Thursday, March 17
Time: 9:15am - 9:30am
Location: California Ballroom

TrackBackTrackBack

The United States Defense Department has a technology fetish and seemingly limitless amounts of money. How are emerging technologies (social software, untethered devices, web services, and computer games) being combined with the conventional superpower technology (satellites, sensors, aircraft carriers) to take military transformation from rhetoric to reality? What are soldiers doing that's straight out of science fiction--and what's mostly hype? How do web services disrupt the business model of the military industrial complex?

What's happening to the culture of the armed forces as 20-something soldiers, used to blogging and digital cameras, confront a hierarchy that's barely comfortable typing? What does the recent spate of military blogs (and the occasional crackdown) tell us?

And lastly, how can small teams of programmers hack hardware and software for Navy Seals, Green Berets, and Delta Force operators--without getting crushed or exploited by Beltway Bandits? An insider shares all that can be revealed, subject to classification."
O'Reilly Emerging Technology Conference 2005: "Tangible Computing
Chris Heathcote, Manager, User Experience, Nokia
Matt D. Jones, Concept Development Manager, Nokia

Date: Tuesday, March 15
Time: 1:45pm - 2:30pm
Location: California Ballroom C

TrackBackTrackBack

For over twenty years, computers have mainly been a rectangular window onto a digital world, controlled by keyboard and mouse. As we accelerate towards ubiquitous computing, the computer is all around us, and we need new ways of controlling all our intelligent devices, connecting them together to perform new tasks, and visualizing their complex interactions. Tangible computing proposes one method, moving back to a tight coupling of interaction and action, similar to that of the craftsman and their tools.

We are at a point where several pieces of tangible technology now exist at consumer prices, with enough processing power to facilitate new interaction paradigms. Eyetoy, smart whiteboards, and Tablet PCs enable direct manipulation of computer objects on screen. Cellphones are becoming equipped with accelerometers, compasses, and image processing.

In this session, Heathcote and Jones look at the next five years of tangible computing, showing prototypes, research, and Near Field Communications from Nokia. They will also consider the wider problems of tangible computing and explain some new ways of interacting, such as direct combination, haptics, and tilt/shake UIs."
O'Reilly Emerging Technology Conference 2005: "Session
Life Hacks Live
Danny O'Brien, editor, Need To Know
Merlin Mann

Date: Thursday, March 17
Time: 11:45am - 12:30pm
Location: California Ballroom B

TrackBackTrackBack

Based on the research into the secret habits of 'overprolific alpha geeks,' last year's popular Life Hacks talk predicted a new software field: the spread of the time and info management 'power tools' hackers have learnt to build for themselves to a wider audience, who are increasingly struggling to handle the information overload that geeks have fought with for years.

Join Danny O'Brien and the smash hit blog '43 Folder''s Merlin Mann to see just how those predictions have come true on the Mac, Linux, and Windows platforms.

We'll take a whistle-stop tour through an amazing year in this exploding field: tracking apps that merge the geek's command-line power with GUI ease-of-use; the expansion of RSS and wiki techniques into frontline organizing apps; the spread of search and script automation onto the desktop; how plain text files are the new rock and roll.

But there's more: with live cameo appearances of alpha geeks (and their desktops), Mann and O'Brien will demo live some more of the secret tricks that have yet to reach a wider audience, and the applications and gadgets that even the super-organized are only now getting to play with. And, once again, the duo will pinpoint the market opportunities that exist for the toolmaker who wants to reach a growing new audience for their software."
O'Reilly Emerging Technology Conference 2005: "How Sex Laws Incite Technological Change
Annalee Newitz, Policy Analyst, Electronic Frontier Foundation

Date: Tuesday, March 15
Time: 2:35pm - 3:20pm
Location: California Ballroom B

TrackBackTrackBack

Why is sex-related technology always ahead of the curve? Why are internet pornographers early adopters? In a nutshell: sex laws. These ever-changing laws, which affect everything from online anonymity to content availability, fuel innovation in the so-called 'adult' industry by creating conditions where content delivery models must always outpace legal and social limitations.

Come find out more about how sex laws have enlarged the demand for technologies that provide anonymous, instant, mobile gratification while also stoking content-providers' desires for soft/hardware that can control access and quickly identify users by age and geographical location. Ultimately, geeks in other industries can learn from porn's misadventures because the laws that affect porn sites today will affect other cutting-edge players tomorrow."
O'Reilly Emerging Technology Conference 2005: "Folksonomy, or How I Learned to Stop Worrying and Love the Mess
Clay Shirky, Decentralization Writer/Consultant, shirky.com
Stewart Butterfield, President, Ludicorp
Joshua Schachter, del.icio.us
Jimmy Wales, President, Wikimedia Foundation, Inc.

Date: Wednesday, March 16
Time: 10:00am - 10:30am
Location: California Ballroom B & C

TrackBackTrackBack

As Louis Armstrong said, 'Folk music is music by folks.' Similarly, folksonomy is organization by folks. The term, coined by Thomas Vander Wal, described the shared classification of a large body of material, often using simple tags in a flat namespace.

Folksonomy assumes you can get value from such shared classification without binding guidelines for how the material is classified, or professional standards for limiting who the classifiers are. Anyone who has ever taken Intro to Library Science can see why folksonomies are unworkable, which makes it all the more curious that they are working in places like del.icio.us, Flickr, and Wikipedia.

Come hear the founders of those three systems talk about the theory and practice of unconstrained classification as practiced on their sites, and their speculations about future direction and value to developers in adopting folksonomic strategies for large, distributed systems."
O'Reilly Emerging Technology Conference 2005: "All Complex Ecosystems Have Parasites
Cory Doctorow, European Affairs Coordinator, Electronic Frontier Foundation

Date: Wednesday, March 16
Time: 9:15am - 9:30am
Location: California Ballroom B & C

TrackBackTrackBack

From the copyfight to e-voting, from spamfighting to trusted computing, from Whuffie to digital identity, there is a pervasive thread running through those who would 'fix' the Internet: that it is BROKEN. The Internet isn't broken: successful models for adapting to the Internet treat its 'flaws' (unlimited copying, anonymity, unreliability) as features, not bugs. In this session, Doctorow runs down the state of the union in thinking across business, regulators, treaty organizations, lawmakers, lobbyists, technologists, and science fiction writers who are working to envision a 'better' Internet, and, you know, make fun of them."

Thursday, March 3

keys1: "The survival of Qwerty is surprising to economists only in the presence of a demonstrably superior rival. David uses Qwerty's survival to demonstrate the nature of path dependency, the importance of history for economists. and the inevitable oversimplification of reality imposed by theory. Several theorists use his historical evidence to claim empirical relevance for their versions of market failure. But on what foundation does all this depend? All we get from David is an undocumented assertion and some advertising copy."