Category: technology

  • Resources for Community Building

    Richard Millington—online community builder for the UNHCR and one of Seth Godin’s 2008 interns—hasĀ compiledĀ over 100 of his best posts from the previous two years. There’s a wealth of valuable information at FeverBee and this list is a great introduction to the topic of community building. A few of the twelve categories Millington has used in…

  • On Hiring Talent (Not Just Programmers)

    You could hire through open source like GitHub (“we hire ‘The Girl or Guy Who Wrote X,’ where X is an awesome project we all use or admire”) or use a check-list to recognise competency (passion, self-teaching, a love of learning, intelligence, hidden experience and knowledge of a variety of technologies) and no doubt find…

  • The Statistics of A/B Testing

    Whether or not you believe this to be (as Joel Spolsky does) the “best post […] about A/B testing, ever”, it definitely is one of the easiest to understand and one of the few posts on split testing that is statistically sound (i.e. useful). Is [a given A/B test] conclusive? Has [variant] A won? Or…

  • Apple, Disney and Pixar: It’s the Products

    Written in early 2006 shortly after Disney’s acquisition of Pixar in a $7.4 billion all-stock deal, BusinessWeek looks at the relationship between the Disney and Apple CEOs and where their relationship may lead. Prescient in that it accurately predicted the Apple TV and the iPhone, the article also briefly looks at Jobs and his product-first…

  • Seven Psychological Principles Con Artists Exploit

    Inherent human vulnerabilities need to be taken into account when designing security systems/processes, suggests a study that looks at a dozen confidence tricks from the UK TV show The Real Hustle to determine recurring behavioural patterns con artists use to exploit victims. The study was a collaboration between Frank Stajano of the University of Cambridge…

  • Anti-Patterns

    I’ve written about design patterns a couple of times in the past, but today I discovered anti-patterns: design patterns that “may be commonly used but [are] ineffective and/or counterproductive in practice”. One of the “key elements present to formally distinguish an actual anti-pattern from a simple bad habit, bad practice, or bad idea”: Some repeated…

  • The Importance of Information Literacy

    The future of the Internet as a credible source of information is under threat due to the proliferation of spam and inaccurate information online, suggests Howard Rheingold, proposing that the most efficient way to counter this worrying trend is for “a great many people [to] learn the basics of online crap detection and begin applying…

  • Resources on the Psychology of Security and Risk

    Professor of Security Engineering at the Computer Laboratory, University of Cambridge, Ross Anderson, has compiled a comprehensive resource page on the psychology of risk and security. The resources themselves are divided into seven section, to wit: Introductory Papers Deception Security and Usability Social Attitudes to Risk Behavioural Economics of Security Miscellaneous Papers Other (Conferences, Websites/Blogs,…

  • The New Rules of The Fold

    In 1996, while discussing the importance of the inverted pyramid style of writing, usability expert Jakob Nielsen wrote that “users don’t scroll”. From there the idea of The Fold as an integral part of web design came into being. But, as Nielsen himself has said, the Internet has evolved and “as users got more experience…

  • Identification through Anonymous Social Networking Data

    Anonymity is “not sufficient for privacy when dealing with social networks” is the conclusion from a study that has successfully managed to de-anonymise large amounts of sanitised data from Twitter and Flickr. The main lesson of this paper is that anonymity is not sufficient for privacy when dealing with social networks. […] Our experiments underestimate…