Assistants Transform Data, Synchronize as Well

In previous post I introduce a scenario for cooperation between doctors, and show that a personal assistant is a good way to connect those in real time.  Here are some additional details that we should consider more carefully. Continue reading

Race-cars, Drivers, and Mechanics

I met with a Fujitsu executive last week, and we naturally got onto the topic of software development methodology. I presented my case that it is critical that programmers know the actual customer because 90% of all decisions that effect usability are made by the lowest programmer. He countered with a story from his own experience of how a race car mechanic and driver have to work as a team. Continue reading

Cloud User’s Bill of Rights

Want users to use your cloud-based web site?  Follow these guidelines, so that users can sign up easily and use it.  Sadly, there are soooo many ways that web sites can do this wrong.  The result is a bewildering variety of inconsistent and sometimes incomprehensible mechanisms that unnecessarily annoy the very users you are trying to attract.  Continue reading

Web Security vs. Superstition, Part 4

Web site security is a very important issue to me. I find it frustrating sometimes dealing with people who operate based more on superstition and urban legends than on solid principles.  Part 4 is about some strange behavior I have seen in security groups and other insanity. Continue reading

Web Security vs. Superstition, Part 2

Web site security is a very important issue to me. I find it frustrating sometimes dealing with the “security experts” in IT who operate based more on superstition and urban legends than on solid principles.  Part 2 is in response to my meeting with such a “security expert”. Continue reading

Web Security vs. Superstition, Part 1

Web site security is a very important issue to me. Every application, every information resource, must be built strong enough to put in the Internet, to reliably deliver information to those allowed access, and prevent delivery to those who are not.  I find it frustrating sometimes dealing with the “security experts” in IT who operate based more on superstition and urban legends than on solid principles.  Part 1 lays down the requirements for a secure web application.  Today’s post is prompted by my meeting with such a security expert. Continue reading

Security and Email Confirmation

I was using a site today that has a “security” procedure that is so poorly designed, that I thought it was worth discussion.  When it comes to aspects of security, I believe it is a good idea to publicize wrong approaches widely, so that those implementing web sites will learn not to take that approach.  Let this be a lesson. Continue reading