- The Freight Train That is Android — Google’s aim is defensive not offensive. They are not trying to make a profit on Android or Chrome. They want to take any layer that lives between themselves and the consumer and make it free (or even less than free). [...] In essence, they are not just building a moat; Google is also scorching the earth for 250 miles around the outside of the castle to ensure no one can approach it. (via Fred Wilson)
- Group Think (New York Magazine) — Big Idea tomes typically pull promiscuously from behavioral economics, cognitive science, and evolutionary psychology. They coin phrases the way Zimbabwe prints bills. They relish upending conventional wisdom: Not thinking becomes thinking, everything bad turns out to be good, and the world is—go figure—flat. (With Gladwell’s Blink, this mania for the counterintuitive runs top-speed into a wall, crumples to the ground, and stares dizzily at the little birds circling overhead. This is, let me remind you, a best-selling book about the counterintuitive importance of thinking intuitively.) A piercing take on pop science/fad management books.
- Product Design at GitHub — Every employee at GitHub is a product designer. We only hire smart people we trust to make our product better. We don’t have managers dictating what to work on. We don’t require executive signoff to ship features. Executives, system administrators, developers, and designers concieve, ship, and remove features alike. (via Simon Willison)
- Linus on Android Headers Claims — “seems totally bogus”. I blogged the Android headers claim earlier, have been meaning to run this rather definitive “ignore it, it was noise” note. Apologies for showing you crap that was wrong: that’s why I try not to show weather-report “news”, but to find projects that illustrate trends.
ENTRIES TAGGED "google android"
Android Strategy, Fad Books, Ubiquitous Product Design, and Android Headers Apology
Android Firefox, CloudPlayer Licenses, Github Lessons, and Data Structures
- Firefox for Android — faster than stock browser, apparently.
- Amazon CloudPlayer Needs No Licenses (Ars Technica) — that’s what Amazon claim, anyway. Because users upload the files (rather than accessing a central single copy of the ripped music), Amazon think they need no license. If this holds, expect Google and Amazon to follow suit.
- Ten Lessons from Github’s First Year — Your customers are most likely early adopters and love to see new features roll out every few weeks. If this results in a little bit of downtime, they’ll easily forgive you, as long as those features are sweet. In the early days of GitHub, we’d deploy up to ten times in one afternoon, always inching closer to that target. Make good use of that first year, because once the big important customers start rolling in, you have to be a lot more careful about hitting one of them with a stray bullet. Later in the game, downtime and botched deploys are money lost and you have to rely more on building instruments to predict where you should aim. Thoughtful take on agile and continuous deployment, among other things.
- What Are The Lesser-Known But Cool Data Structures? (Stack Overflow) — I have no joke here, I just like to say “cool data structures”. (via Joshua Schachter)
Chinese Maps, Ops Standards, Android Malware, and Free Fonts
- Guangzhou City Map — Chinese city maps: they use orthographic projection (think SimCity) and not satellite images. A nice compromise for usability, information content, and invisible censorship. (via Hacker News)
- Broken Windows, Broken Code, Broken Systems — So, given that most of us live in the real world where some things are just left undone, where do we draw the line? What do we consider a bit of acceptable street litter, and what do we consider a broken window? When is it ok to just reboot the system, and when do you really need to figure out exactly what went wrong?
- Android Malware — black hat copied apps, added trojans, uploaded to Android Marketplace. Google were slow to respond to original developer’s claims of copying, quick to react to security guy’s report of malware. AppStores are not magic moneypumps in software form, no more than tagging, communities, or portals were. User contributions need editorial oversight.
- The League of Movable Type — a collection of open source fonts, ready for embedding in your web pages.
Sensor Trojan, node.js IDE, Quantified Conference, and P2P Streaming
- Proof-of-Concept Android Trojan Captures Spoken Credit-Card Numbers — Soundminer sits in the background and waits for a call to be placed [...] the application listens out for the user entering credit card information or a PIN and silently records the information, performing the necessary analysis to turn it from a sound recording into a number. Very clever use of sensors for evil! (via Slashdot)
- Cloud9 IDE — open source IDE for node.js. I’m using it as I learn node.js, and it’s sweet as, bro.
- The Quantified Self Conference — May 28-29 in Mountain View. (via Pete Warden)
- Bram Cohen Demos P2P Streaming — the creator of BitTorrent is winding up to release a streaming protocol that is also P2P. (via Hacker News)
Big Companyitis, Spyware Apps, Maturing Cloud, and Mobile Sync
- Cash Cow Disease — quite harsh on Google and Microsoft for “ingesting not investing” in promising startups, then disconnecting them from market signals. Like pixie dust, potential future advertising revenues can be sprinkled on any revenue-negative scheme to make it look brilliant. (via Dan Martell)
- Your Apps Are Watching You (Wall Street Journal) — the iPhone apps transmitted more data than the apps on phones using Google Inc.’s Android operating system [...] Both the Android and iPhone versions of Pandora, a popular music app, sent age, gender, location and phone identifiers to various ad networks. iPhone and Android versions of a game called Paper Toss—players try to throw paper wads into a trash can—each sent the phone’s ID number to at least five ad companies. Grindr, an iPhone app for meeting gay men, sent gender, location and phone ID to three ad companies. [...] Among all apps tested, the most widely shared detail was the unique ID number assigned to every phone. It is effectively a “supercookie,” [...] on iPhones, this number is the “UDID,” or Unique Device Identifier. Android IDs go by other names. These IDs are set by phone makers, carriers or makers of the operating system, and typically can’t be blocked or deleted. “The great thing about mobile is you can’t clear a UDID like you can a cookie,” says Meghan O’Holleran of Traffic Marketplace, an Internet ad network that is expanding into mobile apps. “That’s how we track everything.”
- On Undo’s Undue Importance (Paul Kedrosky) — The mainstream has money and risks, and so it cares immensely. It wants products and services where big failures aren’t catastrophic, and where small failures, the sorts of thing that “undo” fixes, can be rolled back. Undo matters, in other words, because its appearance almost always signals that a market has gone from fringe to mainstream, with profits set to follow. (via Tim O’Reilly on Twitter)
- libimobiledevice — open source library that talks the protocols to support iPhone®, iPod Touch®, iPad® and Apple TV® devices without jailbreaking or proprietary libraries.
Kinect Hacking, Crowdsource, Lists, and Tablets
- 2 Kinects 1 Box (YouTube) — merging data from two Kinects in real time, to get astonishing 3D information. (via Chelfyn Baxter)
- Crowdsource is not Open Source (Simon Phipps) — there are some businesses that don’t understand this, and exploit community for their sole benefit in the name of open source. Ignorance of the four freedoms is dangerous.
- We Like Lists Before We Don’t Want to Die (Spiegel) — fascinating interview with Umberto Eco. If you interact with things in your life, everything is constantly changing. And if nothing changes, you’re an idiot. (via Aaron Straup Cope on Delicious)
- $139.99 Android Tablet at Toys R Us — sales of Android tablets (as well as Apple tablets) could help bolster the after-market accessory opportunity for wireless players, including modem makers and wireless operators.
(via Sylvain Carle on Twitter)
Android, Cellphone Photos, Long-Exposure iPhone Apps, and Open Street Map
- What Android Is (Tim Bray) — a good explanation of the different bits and their relationship.
- Cell Phone Photo Helped in Oil Spill (LA Times) — a lone scientist working from a cell phone photo who saved the day by convincing the government that a cap it considered removing was actually working as designed. (via BoingBoing)
- Penki — iPhone app that lets you paint 3D messages which are revealed in long-exposure photographs. (via Aaron Straup Cope on Delicious)
- I’m Working at Microsoft and We’re Donating Imagery to OpenStreetMap! (Steve Coast) — MSFT hired the creator of OSM and he says Microsoft is donating access to its global orthorectified aerial imagery to help OpenStreetMappers make the map even better than it already is.
Data Metrics, AR Intervention, Facebook Export, and Android ROMs
- Understanding Your Customers — I enjoyed Keith’s take on meaningful metrics. We talk a lot about being data-driven, but we interpret data with a model. The different take on meaningful metrics reflect the different underlying models that are lit up by data. It’s an important idea for the Strata conference, that gathering and processing data happens in the context of a world view, a data cosmology. (via Eric Ries)
- Bushwick AR Intervention 2010 — an augmented reality take over of Bushwick, Brooklyn NY. Artists will rework physical space with computer generated 3d graphics. A wide variety of works ranging from a virtual drug which has broken free of its internet constraints and is now effecting people in the real world, to a unicorn park, to serious commentary on the state of United States veterans will be free for the public to view [with correct mobile device]. (via Laurel Ruma)
- How to Mass Export all of your Facebook Friends’ Private Email Addresses (TechCrunch) — Arrington gives a big finger to Facebook’s “no, you can’t export your friends’ email addresses” policy by using the tools they provide to do just that. Not only is this useful, it also points out the hypocrisy of the company.
- TaintDroid — an Android ROM that tracks what apps do with your sensitive information. (via Brady Forrest on Twitter)
Participation, iPhone Games Programming, Mobile Keypad Magic, and Web App Security
- Lessons from the Johnny Cash Project — When a participatory activity is designed without a goal in mind, you end up with a bunch of undervalued stuff and nowhere to put it. (via Courtney Johnston)
- Doom iPhone Review — fascinating explanation of how the iPhone works for programmers, and how the Doom source code works around some of the less-game-friendly features. (via Tom Carden on Delicious)
- The 8 Pen — new alphanumeric entry system for Android.
- Salesforce Security — lots of information for web developers, most generally applicable. (via Pete Warden)
Expiring Copyrights, Network Fail, The Book of Jobs, and Android FTW
- Which Works Enter the Public Domain in 2011 (OKFN) — slowly we’re getting recognizable artists in some jurisdictions (e.g., F. Scott Fitzgerald and Paul Klee) but it’s slow going. This is a great reminder about how slow the law works: most people appropriate small bits of modern works when they need something, rather than seeking out or caring about out-of-copyright status. Either most people are lawbreakers and law enforcement will catch up with them, or most people have a new conception of fair use and the law will catch up with them.
- Android IM App Brought T-Mobile’s Network To Its Knees — rumour is that this kind of thing isn’t isolated, that carrier networks are fragile rather than robust. Not even apps, sometimes just devices can make smoke come out of the cell tower (metaphorically): In April of this year, T-Mobile disclosed in an FCC filing that “when subscribers began connecting unlocked iPhones to T-Mobile’s network, the devices repeatedly issued PDP Context Activation requests to establish a session and obtain an IP address. These repeated requests began to cause signal overload akin to a denial of service attack, requiring immediate action and network management to mitigate the massive signaling load on T-Mobile’s Packet Core network.”
- John Sculley on Steve Jobs — the full interview text is fascinating reading. Sculley gives Jobs full respect, and his insights make for very interesting reading. It’s okay to be driven a little crazy by someone who is so consistently right. What I’ve learned in high tech is that there’s a very, very thin line between success and failure. It’s an industry where you are constantly taking risks, particularly if you’re a company like Apple, which is constantly living out on the edge. Your chance of being on one side of that line or the other side of the line is about equal.
- Android (Fred Wilson) — absolutely nails why Android will be a big market, whether or not it’s “better” than Apple. My father in law told me he wants a tablet but $500 for an iPad seems high to him. I asked him if he’d pay $199 for an Android tablet. He said “where can I get one”?