"product" entries

Four short links: 8 July 2015

Four short links: 8 July 2015

Encrypted Databases, Product Management, Patenting Machine Learning, and Programming Ethics

  1. Zero Knowledge and Homomorphic Encryption (ZDNet) — coverage of a few startups working on providing databases that don’t need to decrypt the data they store and retrieve.
  2. How Not to Suck at Making ProductsNever confuse “category you’re in” with the “value you deliver.” Customers only care about the latter.
  3. Google Patenting Machine Learning Developments (Reddit) — I am afraid that Google has just started an arms race, which could do significant damage to academic research in machine learning. Now it’s likely that other companies using machine learning will rush to patent every research idea that was developed in part by their employees. We have all been in a prisoner’s dilemma situation, and Google just defected. Now researchers will guard their ideas much more combatively, given that it’s now fair game to patent these ideas, and big money is at stake.
  4. Machine Ethics (Nature) — machine learning ethics versus rule-driven ethics. Logic is the ideal choice for encoding machine ethics, argues Luís Moniz Pereira, a computer scientist at the Nova Laboratory for Computer Science and Informatics in Lisbon. “Logic is how we reason and come up with our ethical choices,” he says. I disagree with his premises.
Comment
Four short links: 7 July 2015

Four short links: 7 July 2015

SCIP Berkeley Style, Regular Failures, Web Material Design, and Javascript Breakouts

  1. CS 61AS — Berkeley self-directed Structure and Interpretation of Computer Programs course.
  2. Harbingers of Failure (PDF) — We show that some customers, whom we call ‘Harbingers’ of failure, systematically purchase new products that flop. Their early adoption of a new product is a strong signal that a product will fail – the more they buy, the less likely the product will succeed. Firms can identify these customers either through past purchases of new products that failed, or through past purchases of existing products that few other customers purchase.
  3. Google Material Design LiteA library of Material Design components in CSS, JS, and HTML.
  4. Breakoutsvarious implementations of the classic game Breakout in numerous different [Javascript] engines.
Comment
Four short links: 10 June 2015

Four short links: 10 June 2015

Product Sins, Container Satire, Dong Detection, and Evolving Code Designs

  1. The 11 Deadly Sins of Product Development (O’Reilly Radar) — they’re traps that are easy to fall into.
  2. It’s the Future — satire, but like all good satire it’s built on a rich vein of truth. Genuine guffaw funny, but Caution: Contains Rude Words.
  3. Difficulty of Dong Detection — accessible piece about how automated “inappropriate” detection remains elusive. (via Mind Hacks)
  4. Evolution of Code Design at Facebook — you may not have Facebook-scale scale problems, but if you’re having scale problems then Facebook’s evolution (not just their solutions) will interest you.
Comment
Four short links: 19 May 2015

Four short links: 19 May 2015

Wrist Interactions, Kubernetes Open Source Success, Product Quality, and Value of Privacy

  1. Android Wear vs Apple Watch (Luke Wroblewski) — comparison of interactions and experiences.
  2. Eric Brewer on Kubernetes — interesting not only for insights into Google’s efforts around Kubernetes but for: There’s so much excitement we can hardly handle all the pull requests. I think we’re committing, based on the GitHub log, something like 40 per day right now, and the demand is higher than that. Each of those takes reviews and, of course, there’s a wide variety of quality on those. Some are easy to review and some are quite hard to review. It’s a success problem, and we’re happy to have it. We did scale up the team to try and improve its velocity, but also just improve our ability to interact with all of the open source world that legitimately wants to contribute and has a lot to contribute. I’m very excited that the velocity is here, but it’s moving so fast it’s hard to even know all the things that change day to day. Makes a welcome change from the code dumps that are some of Google’s other high-profile projects.
  3. We Don’t Sell Saddles Here — Stewart Butterfield, to his team, on product development and quality. Every word of this is true for every other product, too.
  4. What is Privacy Worth? (PDF) — When endowed with the $10 untrackable card, 60.0% of subjects claimed they would keep it; however, when endowed with the $12 trackable card only 33.3% of subjects claimed they would switch to the untrackable card. […] This research raises doubts about individuals’ abilities to rationally navigate issues of privacy. From choosing whether or not to join a grocery loyalty program, to posting embarrassing personal information on a public website, individuals constantly make privacy-relevant decisions which impact their well-being. The finding that non-normative factors powerfully influence individual privacy valuations may signal the appropriateness of policy interventions.
Comment
Four short links: 18 May 2015

Four short links: 18 May 2015

Javascript Tools, Elements of Scale, 2FA Adoption, and Empathy

  1. Tools are the Problem Tools don’t solve problems any more; they have become the problem. There’s just too many of them, and they all include an incredible number of features that you don’t use on your site –but that users are still required to download and execute.
  2. Elements of Scale: Composing and Scaling Data Platforms (Ben Stopford) — today’s data platforms range greatly in complexity, from simple caching layers or polyglotic persistence right through to wholly integrated data pipelines. There are many paths. They go to many different places. In some of these places at least, nice things are found. So, the aim for this talk is to explain how and why some of these popular approaches work. We’ll do this by first considering the building blocks from which they are composed. These are the intuitions we’ll need to pull together the bigger stuff later on.
  3. Estimating Google’s 2FA AdoptionIf we project out to the current day (965 days later), that’s a growth of ~25M users (25,586,975). Add that to the ~14M base number of users (13,886,058) exiting the graph and we end up at a grand total of…nearly 40 million users (39,473,033) enrolled in Google’s 2SV. NB there’s a lot on the back of this envelope.
  4. Empathy and Product DevelopmentNone of this means that you shouldn’t A/B test or have other quantitative measure. But all of those will mean very little if you don’t have the qualitative context that only observation and usage can provide. Empathy is central to product development.
Comment: 1
Four short links: 9 February 2015

Four short links: 9 February 2015

iBeacon at Scale, Product Teams, Progress Bars, and Distributed Fallacies

  1. The Realities of Installing iBeacon at Scale (Brooklyn Museum) — death by a thousand mundane little real-world pains.
  2. How We Build Software (Intercom) — rare to see descriptions of how to build product teams.
  3. MProgress.js — Material Design progress bars for the web.
  4. Eight Fallacies of Distributed Computing — your network is unreliable, slow, congested, insecure, changing, expensive, and inconsistent. And that’s on a good day.
Comment
Four short links: 15 July 2013

Four short links: 15 July 2013

  1. Product Strategy Means Saying No — a resource for strength in saying ‘no’ to unplanned features and direction changes. My favourite illustration is for “but my cousin’s neighbour said”. Yes, this.
  2. git-imerge — incremental merge for git.
  3. The Paranoid #! Security GuideNetworked-Evil-Maid-Attacks (Attacker steals the actual SED and replaces it with another containing a tojanized OS. On bootup victim enters it’s password which is subsequently send to the attacker via network/local attacker hot-spot. Different method: Replacing a laptop with a similar model [at e.g. airport/hotel etc.] and the attacker’s phone# printed on the bottom of the machine. Victim boots up enters “wrong” password which is send to the attacker via network. Victim discovers that his laptop has been misplaced, calls attacker who now copies the content and gives the “misplaced” laptop back to the owner.)
  4. Why Mobile Web Apps Are Slow — long analysis. Just to be clear: is possible to do real-time collaboration on on a mobile device. It just isn’t possible to do it in JavaScript. The performance gap between native and web apps is comparable to the performance gap between FireFox and IE8, which is too large a gap for serious work. (via Slashdot)
Comment
Four short links: 21 December 2012

Four short links: 21 December 2012

Reverse PR, Cyberbullying Research, Design Notes, and Evaluating CEOs

  1. Amazon’s Product Development Techniquethe product manager should keep iterating on the press release until they’ve come up with benefits that actually sound like benefits. Iterating on a press release is a lot less expensive than iterating on the product itself (and quicker!). (via Fast Company)
  2. Bullying in a Networked World — Harvard literature review on cyberbullying. (via Kinder Braver World)
  3. Lamps (BERG London) — design notes from a project Google did with BERG a year ago. I treat these like backstory in a novel or film: you see a little bit, but the author has imagined a complex history and world that you only see the consequences of. Similarly, BERG spend a long time making complex stories behind the simple objects and interactions they design.
  4. How AH Evaluates CEOs (Ben Horowitz) — my experience backs this up 150% percent. Filed under “stuff I wish I’d known a decade ago”.
Comment

Top Stories: May 14-18, 2012

A coding judge, big data's enterprise conundrum, DIY education is on the move.

This week on O'Reilly: Coding is tied to cultural competence, not just a profession; Jim Stogdill wondered if solution vendors are waiting for broad Hadoop adoption before jumping in; and we learned how Schoolers, Edupunks and Makers are reshaping education.

Comment
Four short links: 18 May 2012

Four short links: 18 May 2012

Adoption Curves, Highschool Makerspaces, Google Glass, and OAuth Design Fiction

  1. Overlapping S-Curves of Various Products (PNG) — product adoption speed over time. (via Beta Knowledge)
  2. High School Makerspaces Q&A with Dale Dougherty (Radioshack) — Experimentation is one of the things we’re trying to promote. If you do experiments, a number of them fail and you learn from that failure and say, “Gee, I could have done that differently.” It’s metacognitive skills that we’re trying to develop—a way of thinking, a way of doing that increases your confidence in your own abilities and in your capacity to learn. I’d like students to believe that anybody can do these things, not that only a few people are good at math or only a few people are good at programming. The goal is to reduce the barrier to those subjects and show that anybody can be good at them. (via Tim O’Reilly)
  3. Google Glass Patent: Infrared Rings and Fingernails (The Verge) — The patent describes a wearable computing device whose interface can be controlled by infrared markers in the form of bracelets, rings, artificial fingernails, or effectively invisible temporary decals. A camera in the glasses would pick up radiation reflected from the marker, giving it a point of reference for user control. (via Chris Arkenberg)
  4. OAuth is Your Future (Flickr) — design fictions to provoke thought. DHS accessing your Foursquare history? Aie. (via Dan Hon)
Comment: 1