Categories
Uncategorized

Mobile developer news roundup #1: The phablet era, UX lessons from restaurants, Evernote’s 5% problem, Android and OpenJDK, and Solitaire’s secret history

We’re in the phablet era now

Chart: Time spent on mobile grows 117% year over year.

Click the graph to see it at full size.

Venture capitalist Fred Wilson looked at research firm Flurry’s State of Mobile 2015 report and took note of the chart above, which shows that the greatest growth in time spent on mobile came from “phablets” — those large phones that blur the line between phone and tablet — and wrote:

There’s not a lot new in this data to be honest, but it confirms a lot of what everyone believes is happening. We are converging on a single device format in mobile and that’s driving some important changes in usage. We are in the phablet era.

Everything I needed to know about good user experience I learned while working in restaurants

Waiter and cook working in a restaurant.

At the Neilsen/Norman Group’s blog, Everything I Needed to Know About Good User Experience I Learned While Working in Restaurants lists the many things that you can learn from restaurants and apply to your applications, from designing for both new and expert users to interaction design and error handling to community management.

If you’re not familiar with the Nielsen/Norman Group, they’re the “Monsters of Rock” of user interface and experience. Their principals are:

The cautionary lessons of Evernote’s “5% problem”

An out-of-focus Evernote icon.

Evernote used to be my go-to note-taking app in 2011. I worked across platforms, and I loved that I could start a note on my laptop, continue on my iPad, and then later make tweaks or addenda on my phone. But as time went by, it got buggier and increasingly less usable to the point where I abandoned it worse and buggier until I abandoned it in annoyance.

Their note-taking app got buggier as the company tried to expand so that they had offerings that would appeal to as many people as possible. Therein lay their problem: as their own former CEO put it, people at Evernote conferences would go up to him and say that they loved the platform, but used only 5% of what it could do. The problem was that there was a different 5% for every person. They spread themselves too thin, lost their focus, started half-assign their product lines, and in an attempt to please everyone, ended up annoying them.

Keep calm and carry on developing Android apps

The classic 'Keep Calm and Carry On' poster.

You may have heard that the ongoing legal battle between Oracle (who own Java) and Google (who own Android, which is Java-based) has led to Google’s decision to move from their proprietary version of the JDK to Oracle’s OpenJDK. You may be concerned, but you probably shouldn’t be. It may cause headaches for Google and Android mobile phone vendors, but as Android developers, it shouldn’t really affect you.

As Android developer and online tutor Tim Buchalka puts it:

We write our code accessing the same libraries, and things just work. Of course its going to be a decent chunk of work for Google to get this all working so that we dont have to worry about it, but if anyone has the resources to do it, Google do.

What do you need to do as an Android developer? Absolutely nothing, its business as normal! You dont need to change anything in your development process and it may well be that when Android N arrives you won’t have to either. So fire up Android Studio, and get back to coding!

A story you might not know about Microsoft Solitaire: it was created by a summer intern!

Screen shot of Microsoft Solitaire on Windows 3.1

Is Wes Cherry a bit annoyed that he never got paid to write one of the most-used applications of the Windows 3.x/9x days? He once answered “Yeah, especially since you are all probably paid to play it!”

Categories
Uncategorized

The five key phases of software development

This photo of someone’s answer to a computer science exam question has been making the rounds:

5 key phases of software development

Click the photo to see it at full size.

I have no idea if they’re still teaching the waterfall model of software development in universities these days, but judging from the exam question, I suspect the “correct” answer to the question was this:

waterfall phases

While psychiatrist Elisabeth Kübler-Ross’ five stages of grief wasn’t the answer the professor was looking for, I’d have awarded the student a couple of points if I were marking the exam.

Consider these recent stats for major software projects:

On second thought, I think that student should get full marks for his/her answer.

Thanks to Peach Flambée for the find!

also appears in linkedin

Categories
Uncategorized

Episode IV: The Empire strikes out (on their pen test)

Star Wars Episode IV.1.d: The Pentesters Strike Back from CyberPoint International on Vimeo.

While the Empire in Star Wars had a lot of fearsome war machinery, a rag-tag gaggle of rebels was able to defeat them thanks to their terrible computer and network security. The folks at the security company CyberPoint have taken clips from A New Hope (a.k.a. Episode IV, a.k.a. “The Original”) and used them to make a funny video that illustrates the many security mistakes that even the biggest organizations make with securing — or more accurately, failing to secure — their systems.

I know of a number of places whose systems were bamboozled by the system equivalent of the Jedi mind trick…

spoofing

…and it’s amusing how many open USB ports there are in the Star Wars universe for R2-D2 to plug into and start injecting malware…

malicious dongles

…and while it’s forgivable for a 1970s screenwriter to not think that the Death Star’s tractor beam controls wouldn’t have some kind of way of preventing use by unauthorized parties, I’ve seen real-world, 21st-century organizations who should know better do exactly the same thing:

no authentication

In the spirit of all the current nerd hoopla about the new Star Wars movie (and yes, I’ve already seen it, and will probably see it again over the holidays), go watch the video and have a laugh at the Empire’s woefully inadequate security. Then go patch up your own organization’s weak spots. Kudos to CyberPoint for putting together the video, and here’s hoping Disney’s lawyers don’t send them a takedown notice.

I’ve got to give CyberPoint bonus points for using video from the original, non-special-edition version of Episode IV, complete with the English labels on the tractor beam controls (the Special Editions show all text in Aurebesh, the space alphabet), and theold-school ring-free Death Star explosion:

old school

Categories
Uncategorized

We’ve all forgotten that it’s the 25th anniversary of the first web page!

the first web server

Note the sticker on its chassis, which reads: “This machine is a server. DO NOT POWER DOWN!”
Creative Commons photo by “Coolcaesar” at Wikipedia. Click the photo to see the source.

In this weekend’s collective geeky euphoria over Star Wars: The Force Awakens, the 25th anniversary of the first web page has gone largely unreported. It was on December 20, 1990 when the NeXT computer pictured above served it, kicking off what I consider to be the world’s most successful side project.

The folks at CERN tweeted about the anniversary in the wee hours of the Eastern Time Zone…

…and so far, it seems that the only tech site to It some commemoration of this historic event is Engadget. That’s a shame, for as they put it:

It’s more of a platform than a bunch of documents, and it’s now available on everything from the phone in your pocket to a display on your head. However, its core remains the same: it’s a vital, dynamic tool for sharing information around the planet. Barring surprises, you’ll likely be surfing the web by the time the first site marks its 50th birthday.

The world’s first web page still lives on today in its original, very plain form at the same URL, http://info.cern.ch/hypertext/WWW/TheProject.html, with the exact same content. If you’d like to see it the same way a lot of people did back then, go to CERN’s Line Mode Browser page and enjoy it in all its monochromatic green glory:

first web page in line-mode browser

My first experience with the Web was in the fall of 1994 on the NCSA Mosaic browser at Queen’s University on a terminal running X, followed soon by Mosaic running on my Mac Quadra 660AV. A number of my friends first experienced it on Windows 3.1, where the first web page looked like this:

first web page in mosaic for windows browser

As for the inventor of the web, he’s done quite well for himself. How many developers get to take part in the opening ceremonies of the Olympics, never mind for their technological achievements?

tim berners-lee

Here’s a quick video featuring Sir Tim talking about how the web went from idea to reality, and his continuing hopes for the platform:

To close this article, I’ll leave you with Sir Tim’s TED talk from last year, A Magna Carta for the Web, in which he reminds us that the fight for openness and access, for net neutrality and against filter bubbles and centralized corporate control, continues:

Categories
Uncategorized

IDC says that 2015 will be the first year where smartphone growth is just in the single digits

lumia

Creative Commons photo by “Entirely”. Click to see the source.

The market research and analysis firm IDC says that 2015 will be “the first full year of single-digit worldwide smartphone growth”. Their prediction is that 2015’s smartphone shipments will make up 1.43 billion units, which represents a growth rate of 9.8%.

Some notes takes from their press release:

  • There are still some areas of the world that will see double-digit growth. While sales growth is slowing in most of Asia/Pacific, Western Europe, and Latin America, the hot spots are in the middle east, Africa, India, and Indonesia.
  • Cheap phones are expected to drive faster replacement cycles. As they put it in their press release, “the components that comprise a sub-$100 smartphone simply do not have the ability to survive two years.”
  • More higher-end devices will be sold through financing plans. One example they cite is of Apple taking the reins by introducing their own financing: “Apple has taken the lead with its iPhone Upgrade Program, and several other vendors are expected to implement similar plans in the months ahead. These plans could represent the most effective way to get flagship devices into the hands of consumers while speeding up the upgrade cycle through trade-in and incentives.”

Here’s how the smartphone market share for mobile OS vendors looks like, according to IDC’s numbers:

smartphone market share dec 2015

TechCrunch’s Alex Wilhelm took note of IDC’s prediction for the fate of Windows as a mobile OS:

idc on windows phone sales march 2015

This is a far cry from their wacky 2011 prediction, in which they said that one in five smartphones would be a Windows Phone in 2015:

idc on windows phone sales march 2011

They were so sure that the combination of two industry giants, Microsoft and Nokia, would create a juggernaut that would bring the Windows Phone OS to the number two position, ahead of iOS and BlackBerry.

To quote their press release:

“The new alliance brings together Nokia’s hardware capabilities and Windows Phone’s differentiated platform. We expect the first devices to launch in 2012. By 2015, IDC expects Windows Phone to be number 2 operating system worldwide behind Android.”

Gartner’s 2011 predictions for the 2015 smartphone market weren’t all that different:

But the prize for the most comically-wrong prediction about the 2015 smartphone market has to go to Pyramid Research, who predicted that Windows Phone would take over the number one spot:

As the late great Yogi Berra said: “It’s tough to make predictions, especially about the future”.

Categories
Uncategorized

In honor of another nail in Flash’s coffin: My 2010 video, “HTML and RIAs: Friends with Benefits”

flash to animate

In honor of Adobe’s changing of Flash Professional to Animate and their not-as-subtle-as-they’d-like announcement that yes, even they have to admit that Flash is going away, here’s a video a made back in 2010, — when I was still a Microsoft — about HTML5, RIAs, and when to choose between them.

It was just five summers ago, but it was a different time: the first-gen iPad and iPhone 4 had just been released, Android was just emerging from being awful to not-too-bad with version 2.2, a.k.a. “Froyo”, and Windows Phone 7 was still in beta. If I were to make the video today, I’d change its take-away message to “Sometime is now. Ditch the RIAs.

Categories
Uncategorized

How to sabotage your workplace, WWII-style

office sabotage

In 1944, the OSS (Office of Strategic Services, the predecessor to the CIA) published the Simple Sabotage Field Manual, a “Sabotage for Dummies” guide filled with handy tips for resistance members in Europe. In 32 pages, it listed a number of acts of anti-Nazi disruption that could be carried out by ordinary people without military or spy training.

don burke and sean dennehey

CIA employees Don Burke and Sean Dennehey, who revealed the connection between 1944 sabotage practices and 2015 office behavior.

At the Enterprise 2.0 conference in 2008, CIA employees Don Burke and Sean Dennehey gave a keynote presentation where they talked about the Simple Sabotage Field Manual and made a very important observation:

What the CIA’s predecessor considered to be office sabotage techniques during World War II are normal office behaviors today.

Take a look at the sabotage tactics from the section titled General Interference with Organizations:

sabotage-organizations-page

Here’s the text from that page:

(1) Insist on doing everything through “channels.” Never permit short-cuts to be taken in order to expedite decisions.

(2) Make “speeches.” Talk as frequently as possible and at great length. Illustrate your “points” by long anecdotes and accounts of per­ sonal experiences. Never hesitate to make a few appropriate “patriotic” comments.

(3) When possible, refer all matters to committees, for “further study and considera­tion.” Attempt to make the committees as large as possible — never less than five.

(4) Bring up irrelevant issues as frequently as possible.

(5) Haggle over precise wordings of com­munications, minutes, resolutions.

(6) Refer back to matters decided upon at the last meeting and attempt to re-open the question of the advisability of that decision.

(7) Advocate “caution.” Be “reasonable” and urge your fellow-conferees to be “reason­able” and avoid haste which might result in embarrassments or difficulties later on.

(8) Be worried about the propriety of any decision — raise the question of whether such action as is contemplated lies within the juris­diction of the group or whether it might conflict with the policy of some higher echelon.

If you’ve worked in an office for even one day, the odds are pretty good that you’ve seen at least one of these acts of sabotage.

meeting-should-have-been-an-email-ribbon

The Simple Sabotage Field Manual has more tips for killing productivity, including my “favorite” pro-tip for managers, “Hold conferences when there is more critical work to be done.” If this trick didn’t work, there’d be no market for an entire line of “I survived another meeting that should’ve been an email” products.

stabbing-the-cc-button

Another office sabotage tip from the manual involved misusing carbon copies to slow things down: “In making carbon copies, make one too few, so that an extra copying job will have to be done”.

For you younger folks, carbon copying was a method of producing multiple copies of a typed letter in the days before photocopiers, never mind computers. This video shows how it was done (as well as why you should be thankful that we don’t live in the dark ages anymore):

Today, carbon copies live on in their descendant, the cc: field of emails (“cc” is short for “carbon copy”). And instead of making too few copies, the internet-era version is to send emails that are cc’d to as many people as possible. In its more innocent form, the sender is just trying to be inclusive, but is likely filling other people’s inboxes with messages that don’t necessarily apply to them. In its nastier version, it’s a way to snitch on someone or throw them under the bus by cc:ing their boss and ensuring that “the wrong words go in the right ears”. No matter the intent, the effect is the same: it disrupts work.

simple-sabotageIn their new book, Simple Sabotage: A Modern Field Manual for Detecting and Rooting Out Everyday Behaviors that Undermine Your Workplace, consultants Robert Galford, Bob Frisch, and Cary Greene revive the notion of modern organizational behavior mirroring WWII-era organizational sabotage. They’re quick to point out that most of these acts are carried out with the best of intentions:

Saboteurs make you think that what they’re talking about is relevant and important when in reality what they’re saying is tangential, unimportant, or even inappropriate. They don’t know they’re doing it, so their earnestness and honesty helps make their case. And the people on the receiving end are instantly, innocently swept off course because they believe what they think they see or hear.

It’s not 1940s occupied Europe, so we can’t simply turn over our work saboteurs to our neighborhood friendly occupying army or take them behind the office and have them quietly shot, as tempting as it may seem. After all, we’re supposed to be more enlightened these days, and besides: we probably report to some of those saboteursThe first step toward making our workplaces more productive is to recognize these behaviors for what they truly are.

web horizontal rule

cyberspy

If you’re not spooked out by downloading a file from the CIA (and likely adding another item to their file on you), you can download a scan of the book from them. It’s a 2.5 MB PDF file.