Welcome!

JOHO the Blog

David Weinberger

Subscribe to David Weinberger: eMailAlertsEmail Alerts
Get David Weinberger via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by David Weinberger

David Weinberger's Blog An article in the WSJ today, which they have chosen to make inaccessible to bloggers, reports that Google is talking to Verizon and Sprint about using the Google phone operating system. Money makes such strange bedfellows! Do I care just because I am a Google fanboy? Not exactly, although that does amp up my excitement. With an open platform for development for mobiles, plus Google's conquest of Jaiku for its mobile/presence capabilities — I am a big fan of Jyri Engestrom, the founder of Jaiku, a smart and innovative person devoted to the Net's common good — this could be the disruption that turns mobile phones from annoying bricks of bad reception into a platform for apps that can assume constant presence and that know where we are and who our friends are. It could make FaceBook look like CompuServ. Or, of course, the rumors could be wrong, the ... (more)

[aif] Re-imagining public libraries

I’m at an early Sunday morning (7:45am) session on re-imagining libraries with John Palfrey of the DPLA, Brian Bannon (Commissioner of the Chicago Public Library), and Tessie Guillermo (Zero Divide) . It’s moderated by Sommer Mathis (editor of CityLab.com. My seat-mate tells me that many of the people here are from the local library and its board.The audience is overwhelmingly female. NOTE: Live-blogging. Getting things wrong. Missing points. Omitting key information. Introducing artificial choppiness. Over-emphasizing small matters. Paraphrasing badly. Not running a spellpcheck... (more)

Google vs. Apple Control Freakism

Rich Cannings, Android security lead, blogged about remotely removing an app from people’s Android phones [excerpted]: Recently, we became aware of two free applications built by a security researcher for research purposes. These applications intentionally misrepresented their purpose in order to encourage user downloads, but they were not designed to be used maliciously, and did not have permission to access private data — or system resources beyond permission. As the applications were practically useless, most users uninstalled the applications shortly after downloading them. ... (more)

Distributed Denial of Service Attacks Against Human Rights Sites

Hal Roberts, Ethan Zuckerman [twitter:ethanz] , and Jillian York [twitter:jilliancyork] are doing a Berkman lunchtime talk on Distributed Denial of Service [DDoS] Attacks against Human Rights Sites, reporting on a paper they’ve posted. NOTE: Live-blogging. Getting things wrong. Missing points. Omitting key information. Introducing artificial choppiness. Over-emphasizing small matters. Paraphrasing badly. Not running a spellpchecker. Mangling other people’s ideas and words. You are warned, people. A DDoS is an attack that consumes the resources of the target machine so that that... (more)

Leopard - The Little Things and Virtual Desktops

David Weinberger's Blog I've used systems before that provide multiple desktops. It's such a sensible idea. Yet they've never become a part of my usual work environment. It turns out that the problem may have been something as simple as providing a visual transition from one desktop to another. With Leopard, desktops quickly slide out of the way to make room for the one you're entering. That little bit of eye candy provides a geographical reference that makes the multiple desktops feel like having multiple screens plugged in to your computer. That's orientation geographically-cha... (more)