Registering Again … (Sigh)

The bane of social networking sites is the need to register one more username, one more password, and once more to fill in some sharable details.  That is sooooo 2008.   I am registering with a conference so I can select interesting presentations, and reminded once again how much I hate registering for sites. Continue reading

Race-cars, Drivers, and Mechanics

I met with a Fujitsu executive last week, and we naturally got onto the topic of software development methodology. I presented my case that it is critical that programmers know the actual customer because 90% of all decisions that effect usability are made by the lowest programmer. He countered with a story from his own experience of how a race car mechanic and driver have to work as a team. Continue reading

Introducing the Web T-Link

The concept is simple: you want to make a web reference (HTML link) to an other web resource, but you don’t want that link to go bad.  This requires a web link, with just a little bit of smarts on the server, and so I call that a T-Link and it is a key capability for a collaboration system. Continue reading

Social Business: Identity and Reputation

Social Software is turning the idea of identity on it head.  Actually this is a trend that has been happening for long time, but it is being thrust into the public consciousness by the desire now to bring social systems into the enterprise: ESS.  It used to be that on the Internet nobody knows you are a dog), but that is changing.  What they do know is your reputation, which becomes your identity. Continue reading

Cloud User’s Bill of Rights

Want users to use your cloud-based web site?  Follow these guidelines, so that users can sign up easily and use it.  Sadly, there are soooo many ways that web sites can do this wrong.  The result is a bewildering variety of inconsistent and sometimes incomprehensible mechanisms that unnecessarily annoy the very users you are trying to attract.  Continue reading

Process Analytics Webinar with Sandy Kemsley

I did a web presentation with Sandy Kemsley on the subject of Crossing the Next Frontier of Business Process Management: Introducing Process Intelligence.” The webcast went well, and I really appreciated Sandy’s clear and accurate descriptions of how process mining works.  It also touched on Fujitsu’s new Interstage Process Analytics product.  Access the webcast and related things at the BPM For Agile Enterprise site. Continue reading

The Anti-SSL Conspiracy

This post is about secure internet protocols, and mainly about a bizarre phenomenon that prevents us from using SSL security in many situations where it would be useful. What is bizarre is that I don’t think anyone intends it, but there seems to be a natural reaction that leads to less secure systems.  While some might attribute this cynically to element who want to make money, I don’t think that is the real driver in this case.  Instead, it seems to be natural tendency toward the “security purist” who would rather be completely open and unprotected than to be partially safe. Continue reading