BellSouth vs. Google – Round 1

What about the customers? Companies all too often play chicken. It is the consumers who get screwed. A few years ago, a Sun vs. Microsoft disagreement meant no adequate Java Runtime Environment for the brand new Windows XP personal computers for months. Developers for online classes often tap Java for mini-applications (HTML editors, chat, file managers, etc.). No Java? May as well find an old computer that does or drop or fail. Sorry….

The Jeff Pulver Blog: Jeff Pulver to Eric Schmidt: Turn the Tide – Turn off BellSouth!

Given the market power that Google has today, they are more relevant to the Internet community than BellSouth. Given that, if I were running Google today, I would choose to implement a BellSouth Boycott and stop offering access to Google to BellSouth customers and would start advertising Cox Cable service on any requests that came from BellSouth customers in their regions. I’m willing to wager that by Q3 2006, BellSouth’s DSL group will feel the effects of their grave error in judgment.

As the battle between the Internet Access Providers and Internet Application Providers rages on, it is the customers who will be hurt more than any of the underlying companies selling access or offering applications. Welcome to the game of Internet Chicken and the race to mutually assured destruction. Who will flinch first before it is too late?

Customers are not all as dumb as you think. Placing ads to BellSouth’s competitors on through the BS network would not convert many. They listen to people like me, who would view Google acting like a bully as very, very counter to what we like about Google. At that point, I would remove Google as our search engine of choice and drive my clients to Yahoo!

Election results changed by hackers in Florida

Not good…

Finnish security expert Harri Hursti, together with Black Box Voting, demonstrated that Diebold made misrepresentations to Secretaries of State across the nation when Diebold claimed votes could not be changed on the “memory card” (the credit-card-sized ballot box used by computerized voting machines.

A test election was run in Leon County on Tuesday with a total of eight ballots. Six ballots voted “no” on a ballot question as to whether Diebold voting machines can be hacked or not. Two ballots, cast by Dr. Herbert Thompson and by Harri Hursti voted “yes” indicating a belief that the Diebold machines could be hacked.

read moredigg story

Machines Better Programmers than Humans

… Computers now create programs that solve complex problems better than programs designed by people….

Grasemann and Miikkulainen applied genetic algorithms to solve the fingerprint compression puzzle in work supported by the National Science Foundation’s Computer and Information Science and Engineering directorate. They provided their computer with the basic programming instructions needed to compress graphic images and then waited for a better algorithm to be born. The progress of the evolving program was tested at each generation. After 50 generations, the genetic algorithm consistently outperformed the human-derived WSQ.

Machines Better Programmers than Humans

Goody! First my job could be going to offshore outsourcing. Now my job could be going to a computer.

Great Site Ranking in Google

Only recently have I come to accept toolbars as something quasi useful. Previously, the trouble they caused more than outweighed the benefits.

A web page on how Google works has me considering recommending the installation of the Google toolbar on all local computers (~3,000) with seeded bookmarks, cache, and temporary files for our web sites. Also, were we to offer a package that would seed the bookmarks for employees and clients, then we could see tremendous increases in our ranking.

[Click through rates] may now be monitored through cache, temporary files, bookmarks and favorites via the Google toolbar or desktop tools. Many have suspected for some time that sites are rewarded for good CTR with a raise in ranking.
Great Site Ranking in Google The Secret’s Out

Ugh. Probably down the road Google will figure out a way to make that appear to be people abusing the system and heavily dock us…. 🙁

Forethought

Technologies are not well thought out.

Podcasters host MP3s on a web site. So any time a listener grabs it, they download it from the web site. In the case of someone with a limited bandwidth hosting plan, it is very possible for the bandwidth to be exceeded. Events like a major software provider (iTunes) and service provider (iTunes Music Store) suddenly listing the podcast could result in the creators exceeding their bandwidth. There is no facility for distributing the podcasts so that any one locationo bears the brunt of the downloading.

Oops.

Apparently no one anticipated the possibility of hundred of thousands or even millions of computers grabbing the RSS feeds associated with blogs.

No one predetermined someone would actually want to send an email under a forged or even non-existant identity.

Another One Bites the Dust

<sarcasm>I agree that I only wanted to be a bike messenger because of my idol, Puck, on The Real World.</sarcasm> In this article, How The Internet Has Changed The Bike Messenger Business, it indicates that bike messengers are getting killed by the ubiquitousness of email. Perhaps another step forward should be taken. Technology has made it way too easy to send files to others. This allows people to infect their computers, easily send confidential documents to the wrong recipients, and other acts of poor impulse control.