<?xml version="1.0" encoding="utf-8"?>
	<rss version="2.0"
		xmlns:dc="https://purl.org/dc/elements/1.1/"
		xmlns:sy="https://purl.org/rss/1.0/modules/syndication/"
		xmlns:admin="https://webns.net/mvcb/"
		xmlns:rdf="https://www.w3.org/1999/02/22-rdf-syntax-ns#"
		xmlns:content="https://purl.org/rss/1.0/modules/content/">

		<channel>
		<title>Dale Allyn: Thoughts &amp; Discoveries</title>
			<link>https://daleallyn.com/index.php</link>
			<description>Thoughts & Discoveries from Dale Allyn</description>
			<dc:language>en</dc:language>
			<dc:creator>contact@daleallyn.com</dc:creator>
			<dc:rights>Copyright 2010</dc:rights>
			<dc:date>2010-12-25T15:41:08+00:00</dc:date>
			<admin:generatorAgent rdf:resource="http://www.expressionengine.com/" />
		
			
				<item>
				  <title>Specific Gravity Calculator for Gemstones</title>
				  <link>https://daleallyn.com/index.php/site/comments/specific-gravity-calculator-for-gemstones</link>
				  <guid>https://daleallyn.com/index.php/site/comments/specific-gravity-calculator-for-gemstones#When:04:31:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>A gemologist friend of mine recently complained about the tedium of calculating gemstone and mineral specimen specific gravity via the hydrostatic weighing method. You see, after weighing the specimen in air (at room temperature) and in water (at 4º Celsius, ideally) one must do a little math to determine the specific gravity (S.G.) of a sample. The formula is very simple: It&#8217;s the weight in air, divided by the loss of weight in water (at 4º Celsius). Or: the weight in air, divided by the weight in air minus the weight in water. Simple. Right? But when you do dozens (or more) of these a day, it gets tedious. High-end lab equipment will do the calculations for the technician, but my friend doesn&#8217;t have such equipment. And such equipment doesn&#8217;t help if one is in the field.</p>

<p>There are a few calculators on the Web, but most are not mobile-phone-friendly, and he likes to use his iPhone around his lab. So I coded <a href="http://daleallyn.com/specific-gravity-calculator.html">this simple little web app</a> to help my friend in his time of need. Of course he wants a native iOS app, but that seems a bit overkill for such a simple task.</p>

<p>Now I just need to update this site to modernize it and make it mobile-friendly. So little time&#8230;</p>

<p>If you&#8217;d like to use the calculator, you can <a href="http://daleallyn.com/specific-gravity-calculator.html">go here</a> and calculate &#8216;til your heart&#8217;s content. It&#8217;s labeled to suggest entering carat weight (for precision), but entering weight in grams is fine as well (but rounding may negatively affect accuracy, depending upon your precision). Most important is to not mix units of measure. <img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>
					]]>
				</content:encoded>
				  <dc:subject>Technology, Everything Else,</dc:subject>
				  <dc:date>2015-05-17T04:31:04+00:00</dc:date>
				</item>
			
				<item>
				  <title>Cisco Switches to Weaker Hashing Scheme</title>
				  <link>https://daleallyn.com/index.php/site/comments/cisco_switches_to_weaker_hashing_scheme</link>
				  <guid>https://daleallyn.com/index.php/site/comments/cisco_switches_to_weaker_hashing_scheme#When:14:12:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>&#8220;Cisco switches to weaker hashing scheme, passwords cracked wide open.&#8221;</p>

<p>In this day and age, for a company with such technical and financial resources such as Cisco Systems to &#8220;dumb down&#8221; their password hashing methods is inexcusable and irresponsible. As <a href="http://daleallyn.com/index.php/site/comments/web_security_fundamental_obligations_to_protect_users_part_1" title="Web Security: Fundamental Obligations to Protect Users, Part 1">noted elsewhere here</a>, other large companies (like LinkedIn) have employed poor password management practices and they and their users have paid for it.</p><blockquote><p>It turns out that Cisco&#8217;s new method for converting passwords into one-way hashes uses a single iteration of the SHA256 function with no cryptographic salt.</p>
</blockquote>

<p>Read about Cisco&#8217;s poor choice <a href="http://arstechnica.com/security/2013/03/cisco-switches-to-weaker-hashing-scheme-passwords-cracked-wide-open/" title="Cisco goes weak on Ars Technica: in a new window" target="_blank">here on Ars Technica</a>. I expect there&#8217;ll be a fix in an update, but sheesh. <img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>
					]]>
				</content:encoded>
				  <dc:subject>Everything Else,</dc:subject>
				  <dc:date>2013-03-20T14:12:04+00:00</dc:date>
				</item>
			
				<item>
				  <title>Patent Wars: Of Smartphones and Sewing Machines</title>
				  <link>https://daleallyn.com/index.php/site/comments/patent_wars_of_smartphones_and_sewing_machines</link>
				  <guid>https://daleallyn.com/index.php/site/comments/patent_wars_of_smartphones_and_sewing_machines#When:20:46:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>Bloomberg has posted an <a href="http://www.bloomberg.com/news/2012-10-08/apple-phone-patent-war-like-sewing-machine-minus-violence.html" title="Apple Phone Patent War Like Sewing Machine at Bloomberg">interesting article</a> in which historical comparisons to patent infringement and litigation of the 1,800&#8217;s and today are made. Airplanes, sewing machines, agricultural reapers and smartphones share a history &#40;and present&#41; of conflicts over patents. </p>

<p>I&#8217;d like to see the tech patent wars end as they did with the sewing machine &mdash; with patent pools. It&#8217;s being <a href="http://www.nytimes.com/2012/10/08/technology/patent-wars-among-tech-giants-can-stifle-competition.html" title="Patent as a Sword at the New York Times">reported</a> that Apple and Google spent more on purchasing patents and litigation than on R &amp; D last year. &#40;I&#8217;d like to see most software patents go away altogether, but that&#8217;s a different issue, although it&#8217;s also discussed in the linked NYT article.&#41;</p>

<p>The New York Times has also published a rather <a href="http://www.nytimes.com/2012/10/08/technology/patent-wars-among-tech-giants-can-stifle-competition.html" title="Patent as a Sword at the New York Times">detailed article today</a> on the topic of smartphone patent litigation which addresses some of the stresses the issues place on a bureaucratic system and on the markets. </p>

<p>Check out the Bloomberg article <a href="http://www.bloomberg.com/news/2012-10-08/apple-phone-patent-war-like-sewing-machine-minus-violence.html" title="Apple Phone Patent War Like Sewing Machine at Bloomberg">here</a>.</p>

<p>The New York Times article is <a href="http://www.nytimes.com/2012/10/08/technology/patent-wars-among-tech-giants-can-stifle-competition.html" title="Patent as a Sword at the New York Times">here</a>. <img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>
					]]>
				</content:encoded>
				  <dc:subject>Technology,</dc:subject>
				  <dc:date>2012-10-08T20:46:04+00:00</dc:date>
				</item>
			
				<item>
				  <title>Web Security: Fundamental Obligations to Protect Users, Part 1</title>
				  <link>https://daleallyn.com/index.php/site/comments/web_security_fundamental_obligations_to_protect_users_part_1</link>
				  <guid>https://daleallyn.com/index.php/site/comments/web_security_fundamental_obligations_to_protect_users_part_1#When:13:30:06Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p><strong>Part 1: Passwords</strong></p>

<p>In this day and age, when there are highly publicized reports of security lapses associated with user data around the web, there is no excuse for weak password security practices to continue. Web services which require users to submit personal information, email addresses, use passwords or passphrases to access accounts, etc., have an obligation to exercise best-practice fundamentals when designing their services. Mistakes happen, breaches will occur, but neglecting to at least implement best-practice fundamentals is not acceptable.</p>

<div class="image">
<p><img src="https://daleallyn.com/images/posts/padlock.jpg" alt="open rusty padlock" /></p>
</div>
<div class="photocredit"><span>Photo:</span> <a href="https://www.flickr.com/people/lwr/" title="Leo Reynolds at Flickr.com: in a new window" target="_blank">Leo Reynolds</a></div>

<p>Recently, I have experienced several examples of very poor security design on various websites and it simply baffles me that businesses allow this sort of condition to persist in the wake of so much negative press. We&#8217;ve had examples of poor practices made very public and embarrassing at: RockYou, Gawker, Stratfor, eHarmony, LinkedIn, Sony, Yahoo! and more, and yet developers and business managers are allowing the weakest of practices to persist.</p>

<p>Here are some simple examples of basic do&#8217;s and don&#8217;ts, describing what should be minimum habits of design. This represents just a few of the lowest of low-hanging fruit. There must be a complete and comprehensive security policy throughout. </p>

<p><strong>1. Registration and Logon must be over HTTPS, i.e. Transport Layer Security (TLS), SSL, etc. </strong></p>

<p>No exceptions unless the site is just a personal project for sharing a semi-private blog among friends and family and you don&#8217;t <em>really</em> care if non-members access it. For websites which are for commerce or community this should not be an option. There are security holes when redirecting from HTTP to HTTPS (or including logon forms on non-secure pages), but that&#8217;s another post.</p>

<p><strong>2. Don&#8217;t store users&#8217; passwords in plain text. Argh!</strong></p>

<p>This is a big one. There&#8217;s NO justification for this and yet mega-corp Sony did exactly this (according to reports) and bore significant abrasion to their rep and their pocketbook, with the issue affecting millions of account holders. In fact they had to close down the PlayStation Network for quite some time while they retooled. And Yahoo! was recently hacked in which nearly a half million passwords were exposed for this weak practice.</p>

<p><strong>3. Don&#8217;t skip the salt!</strong></p>
					]]>
				</content:encoded>
				  <dc:subject>Technology,</dc:subject>
				  <dc:date>2012-07-23T13:30:06+00:00</dc:date>
				</item>
			
				<item>
				  <title>No Thank You&amp;hellip; for Your Investment</title>
				  <link>https://daleallyn.com/index.php/site/comments/no_thank_you_for_your_investment</link>
				  <guid>https://daleallyn.com/index.php/site/comments/no_thank_you_for_your_investment#When:16:00:45Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>Raising funding for an Internet startup project is a grueling and somewhat complicated process. As most of my friends know, I&#8217;m involved in such a startup about which we&#8217;re very excited. So far, the feedback has been nothing short of fantastic from all who have seen it. Our project has a humanitarian element to it, so finding the right investment partner (or partners) is very important to us. We&#8217;re taking a lot of time to find the right fit. We truly want our investor to make a handsome return, but we want to work with people who care about more than just making a buck. To that end, we have stepped away from potential investors for various reasons, and this week we did again. I&#8217;d like to share a bit of the &#8220;what&#8221; and &#8220;why&#8221;.</p>

<div class="image">
<p><img src="https://daleallyn.com/images/posts/reject_money.jpg" alt="hand rejecting money" /></p>
</div>

<p>First, even if our project (or yours) did not have a humanitarian element we&#8217;d still want to be very selective regarding the type of investors with whom we work. This is fundamental to any long-term business relationship and extremely important in the Internet startup world. We must like and respect our partners, and this must be truly mutual for the project to flourish.</p>

<p><strong>Angel investor background:</strong> Working with a special liaison, we presented our project to what was described to us as a very special angel investor. We did a lot of background due diligence on the individual and he was more than qualified as an investor and a professional. This person could be considered to have a very public persona within his profession and it was stated that he was interested in investing in special projects which will do good, and which are &#8220;bigger than he is&#8221;. That sounded like potential for a fit. </p>

<p>We&#8217;re looking to raise investment funds of a non-trivial amount, i.e. solid seven figures. But it must come from a truly ethical source and someone(s) genuinely interested in building something great to help others. That&#8217;s not the easiest criteria to start with, but we thought we had a good fit with this investor who had stated that they LOVE our project.</p>

<p><strong>So what went wrong?</strong> Why did we withdraw our invitation to invest, when we thought we were likely going to close with this investor? We put a tremendous amount of work into our presentation, in a form suitable to the investor&#8217;s preferences and we were told that we hit all the right notes. In fact, we received a term sheet with an offer to which we countered and we were getting closer to mutually-agreeable terms. We weren&#8217;t in exact alignment yet, but the differences were shrinking – mostly centering on valuation – and we felt a close was possible soon. </p>

<p>We returned what we had hoped would be our final adjustments to the term sheet, but still remained opened minded, as we always want to consider all parties and their valid needs. In other words, this was our final offer unless we could be convinced to flex a tiny bit more. But here&#8217;s where the deal went south: The investor received the package via e-mail on Wednesday evening, May 16th and replied with thanks and &#8220;I will review over the weekend and get back with you the beginning of next week&#8221;. That meant the following Monday or Tuesday, and that&#8217;s consistent with his pattern up to that point. Well, the next Tuesday came and went; the Memorial Day holiday weekend was approaching and so we figured it might be the following Tuesday that we&#8217;d have our reply. We contacted our liaison with the investor to check status. We were assured that he was still VERY interested and looking at a couple of options to help get it all settled&hellip;</p>

<p>Then, after waiting an additional week, we get a nasty e-mail stating that the e-mail attachment  could not be opened; and he had his &#8220;best IT men working on it for the past five business days&#8221; to open the attachment, so he knew &#8220;it wasn&#8217;t on his end&#8221;. This was then followed by some disrespectful, condescending crap and an offer to invest at a split between what he understood our offer would be and his last. <strong>WHAT??</strong> You want us to believe that someone in IT spent more than <strong>90 seconds</strong> on it before realizing that the file was corrupted in transit?? (And by the way, the file opened fine for others on various operating systems, even after the file name was corrupted.) Would it not make sense to simply ask for a new file to be sent? Are your IT people so inept as to waste valuable time on such a thing? Or are you prone to lies and attacks when you attempt to manipulate others during negotiation? If this is how one functions during the courtship and honeymoon, how is it likely to be when in the trenches of business together?</p>

<p><strong>Now let&#8217;s break this down (in case it&#8217;s not obvious):</strong> </p>

<p>	<strong>1)</strong>	After briefly attempting to open an e-mail attachment which seems to be corrupted, a <em>normal</em> person would simply request a replacement – not waste time on the original.</p>

<p>	<strong>2)</strong>	Rather than berating those with whom one is about to invest a large sum of money, does it not make sense to pleasantly seek a solution to the minor hiccup? Hint: yes.</p>

<p>	<strong>3)</strong>	If an investor is showing signs of Napoleonic tendencies over rules of contact and something so common as a corrupted attachment file name, what will the relationship on your Board of Directors be like? Answer: Not pleasant, nor productive!</p>

<p>	<strong>4)</strong>	If the investor realizes that he did not respond in the time frame which he personally had set, and which crowded the expiration date of the original term sheet, why lie about spending five days on attempting to open the file? Why not simply say &#8220;sorry, I needed a bit more time to complete my process&#8221; or similar? This is either meant to manipulate the time frame and press toward urgency to pressure a close at his desired terms, or simply a lack of ability to accept responsibility for one&#8217;s own delay by apologizing and rescheduling. Either way, a bad partner! Walk away.</p>

<p>	<strong>5)</strong>	Suggesting that the team&#8217;s technical ability is in question because the attachment could not be opened? Do I really need to point out the flaws here? Our web application is comprised of thousands of lines of code, including (but not limited to) PHP, Java, JavaScript, Perl, XHTML, CSS, and HTML5, in addition to various server technologies. We&#8217;re pretty sure we know how to attach a file to e-mail, and we know how to replace it if it gets corrupted. This attack method was used to intimidate so that we would acquiesce to the investor&#8217;s terms (in this case, additional equity), but as mature and experienced business people we were not phased. Don&#8217;t let this negatively affect you. See it as the blessing it is (a clear sign of things to come if you accept his money) and walk away from this investor. A bad investor can be worse than no investor at all.</p>

<p><strong>What&#8217;s the moral of the story?</strong> Keep your business standards high, and never, ever accept investment from someone who shows little or no sincere respect for you and your team at any time throughout the process – or who thinks too highly of themself. Of course in this investor&#8217;s previous counter-offer he stated &#8220;Your company and its leadership is above reproach and I am well pleased&#8221; so go figure. Bullying is not a rare tactic in business negotiation, but don&#8217;t let it affect you. It tells you two very important things about your negotiation counterpart: 1) S/he is very interested in your deal (or they would have disengaged); and 2) this person may be difficult to work with in the future, so you&#8217;ve gained useful information to consider.</p>

<p><strong>And if you&#8217;re an investor:</strong> If you want to invest in great projects with great people and be a part of something really big–much bigger than yourself, DON&#8217;T BE A JERK!</p>

<p><strong>Bottom line: We withdrew our invitation for investment and are cheerfully moving on.</strong></p>

<p>One final note: Some might be tempted to blame our liaison for not properly vetting the investor, but that&#8217;s not how we feel at all. The liaison has known the investor for a long time and they have closed several investment transactions. However, we gather (from certain inquiries) that many of those investments were made in which the principles were more desperate for funding and didn&#8217;t have the resources or experience to repel or avoid such tactics. The investor simply tarnished his own &#8220;face&#8221; and the liaison has likely now seen another side of him.<img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>
					]]>
				</content:encoded>
				  <dc:subject>Startup,</dc:subject>
				  <dc:date>2012-06-01T16:00:45+00:00</dc:date>
				</item>
			
				<item>
				  <title>U of F Eliminates Computer Science Program for Athletics: Wow&amp;hellip;</title>
				  <link>https://daleallyn.com/index.php/site/comments/u_of_f_eliminates_computer_science_program_for_athletics_wow</link>
				  <guid>https://daleallyn.com/index.php/site/comments/u_of_f_eliminates_computer_science_program_for_athletics_wow#When:00:13:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>According to <a href="http://www.forbes.com/sites/stevensalzberg/2012/04/22/university-of-florida-eliminates-computer-science-department-increases-athletic-budgets-hmm/" title="Read article at Forbes: in a new window" target="_blank"> an article at Forbes</a> the University of Florida is eliminating its computer science program to save $1.7 million while the athletic department receives a budget increase.</p><blockquote><p>Let’s get this straight: in the midst of a technology revolution, with a shortage of engineers and computer scientists, UF decides to cut computer science completely? <cite>Steven Salzberg: Forbes</p>
</blockquote>
<p>Universities are big business, but eliminating C.S. while the U.S. struggles to improve employment statistics seems wrong-minded to me. <img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>
					]]>
				</content:encoded>
				  <dc:subject>Technology, Politics,</dc:subject>
				  <dc:date>2012-04-23T00:13:04+00:00</dc:date>
				</item>
			
				<item>
				  <title>The Browser I Love(d) to Hate</title>
				  <link>https://daleallyn.com/index.php/site/comments/the_browser_i_loved_to_hate</link>
				  <guid>https://daleallyn.com/index.php/site/comments/the_browser_i_loved_to_hate#When:01:12:43Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>I count myself among those who love to hate Internet Explorer (IE), at least versions up to, and including, IE8. It&#8217;s a web developer&#8217;s nightmare (although IE8 has been an improvement) and costs clients money for the additional work required to build and maintain  websites which support all current browsers. We build a &#8220;web-standards compliant site&#8221;, and then add IE support&#8230; sigh. In version 9, IE has begun to finally support some web standards which have long been part of the <a href="http://www.w3.org/" title="World Wide Web Consortium: in a new window" target="_blank">W3C</a> web standards spec, as well as some design rules used in newer CSS practices which have been supported by most other browsers for some time now. </p>

<p>This Microsoft ad for Internet Explorer is making the rounds and I must give Microsoft a &#8220;tip o&#8217; the hat&#8221; for laughing at themselves a bit. We should all laugh at ourselves at times and resist taking ourselves too seriously. I could go on a long diatribe about why IE sucks or sucked in past versions, but why? You probably know, or can easily find abundant complaints for the lack of web-standards support which has been the norm with IE. Better to just enjoy this new Microsoft advertisement and give them credit for improving, as well as poking a bit of fun at themselves. <img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p><div class="vdo">
<iframe width="560" height="340" src="https://www.youtube.com/embed/4DbgiOCTQts" frameborder="0" allowfullscreen></iframe>
</div>
					]]>
				</content:encoded>
				  <dc:subject>Technology,</dc:subject>
				  <dc:date>2012-03-22T01:12:43+00:00</dc:date>
				</item>
			
				<item>
				  <title>Flaw Found in Online Encryption Method</title>
				  <link>https://daleallyn.com/index.php/site/comments/flaw_found_in_online_encryption_method</link>
				  <guid>https://daleallyn.com/index.php/site/comments/flaw_found_in_online_encryption_method#When:07:12:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>I found <a href="http://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an-online-encryption-method.html?_r=3&amp;pagewanted=all" title="Article in the New York Times">this article</a> interesting, but have been swamped and didn&#8217;t get around to writing a post about it. It&#8217;s been sitting in my to-do pile, so I&#8217;ll just punt and link to it <a href="http://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an-online-encryption-method.html?_r=3&amp;pagewanted=all" title="Article in the New York Times">here</a>.</p><blockquote><p>A team of European and American mathematicians and cryptographers have discovered an unexpected weakness in the encryption system widely used worldwide for online shopping, banking, e-mail and other Internet services intended to remain private and secure.</p>
</blockquote>
<p>Security is so important in web application design, but cryptography quirks and nuances can affect even well conceived designs. Yet another reason to maintain &#8220;best practice&#8221; coding and use &#8220;belt and suspenders&#8221; security design whenever possible. The researchers&#8217; technical paper is <a href="http://eprint.iacr.org/2012/064.pdf"title="view research document as pdf">available here (as a pdf)</a>. <img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>
					]]>
				</content:encoded>
				  <dc:subject>Technology,</dc:subject>
				  <dc:date>2012-03-12T07:12:04+00:00</dc:date>
				</item>
			
				<item>
				  <title>Apple: From Computers to Consumer Electronics Company</title>
				  <link>https://daleallyn.com/index.php/site/comments/apple_from_computers_to_consumer_electronics_company</link>
				  <guid>https://daleallyn.com/index.php/site/comments/apple_from_computers_to_consumer_electronics_company#When:01:55:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>Apple&#8217;s path from computer company to a consumer electronics company – and consumer services company – has been going on for a long time. As a long-time Apple user and an admirer of their products and much of their software, especially much of OS X, and a one-time stockholder, I&#8217;m actually quite disappointed by the &#8220;evolution of Apple&#8221; as it currently is going – at least regarding the OS and high-end tools. Oh sure, I do get it from a business point of view, from a shareholder value perspective, etc., but I&#8217;m just not thrilled with it from a selfish point of view. </p>

<p>Lots of people complain about &#8220;the Apple walled garden&#8221;, yet with some exceptions, I really like Apple&#8217;s integrated approach as it pertains to quality control and a uniform user experience. That many of these controls also add to Apple&#8217;s profitability is fine with me. That&#8217;s business, and I like the products.</p>

<p>However, as one who likes computers to feel like mature tools, I really don&#8217;t like the direction of Mac OS X at this time. I like OS X 10.6.x  (Snow Leopard) very much. It&#8217;s stable on my machines (much better than Leopard, which was worse than Tiger for me), it looks grown-up and mostly works well with my software and peripherals. I don&#8217;t like Lion and find the UI absolutely atrocious in some areas (esp. the Address Book and iCal), as it looks like <a href="http://en.wikipedia.org/wiki/Romper_Room" title="Romper Room at Wikipedia: in a new window" target="_blank">Romper Room</a> to me and it&#8217;s tacky IMHO. Hopefully Apple will consider moving back to a mature and elegant user interface in Mountain Lion and beyond. The move to a uniform &#8220;iOS feel&#8221; across Apple products is the obvious direction, but it&#8217;s something I truly hate about Apple&#8217;s current path. For the consumer market it makes sense, but for people (like me) who like computers to feel like tools with detailed controls instead of a stroll through <a href="http://www.fao.com/home/index.jsp" title="FAO Shwarz: in a new window" target="_blank">FAO Schwarz</a> it&#8217;s not a great path. Don&#8217;t get me wrong, I love the integration, just not the &#8220;sameness&#8221; across tools used for different tasks. </p>

<p>This is all a very personal thing, and I&#8217;m sure that there are many who love the current path (or simply don&#8217;t care). For example, I&#8217;m one who loves the detailed controls available in Photoshop and hates the simplified UI of products like iPhoto. Even Adobe Lightroom is not for me because of the lack of precision. Apple really ticked off a lot pro users with their &#8220;update&#8221; to Final Cut Pro because of &#8220;dumbing it down&#8221; in many users&#8217; eyes. Apple has moved away from supporting pro users on many fronts, such as color management (horrible support), discontinuation of their one display suitable for high-end image processing (the 30 inch cinema display), and a tower line with very limited RAM expansion capacity and long-due for an update (last updated August of 2010). Again, I get it, for business reasons. I just don&#8217;t like it. </p>

<p>Over time Apple had lost a lot of the enterprise world (or didn&#8217;t get it at all in many sectors) as IT managers stayed with the Windows platform. I&#8217;m always rooting for Apple to get more uptake in enterprise, but I can see why CIOs are hesitant to invest in Apple. Apple is making progress in this market, but talking with ranking engineers at large enterprises I can understand the resistance. One concern which I had not considered is Apple&#8217;s frequent OS updates which are not as backward compatible as needed. That doesn&#8217;t really affect me, so I overlooked it. My friend said that his team at a Fortune 100 company is using mostly Window XP still and that a change to Windows 7 will be very time consuming and costly. Enterprise needs stability, not new eye-candy. Still, thanks to the great success of the iPhone and iPad, Apple computers are working their way in to more enterprises and I like that. </p>

<p>Here&#8217;s <a href="http://www.pcadvisor.co.uk/news/desktop-pc/3343466/apples-lion-is-resource-security-nightmare/"title="Apple Lion Resource and Security Nightmare: in a new window" target="_blank">an article</a> that describes some real concerns with Mac OS X Lion in the enterprise environment. Most of what is described would be fairly easy to fix if Apple were to focus on such adjustments. The part about automatically reopening applications and windows which were open at shutdown would be an easy fix and is the source of much frustration even for the non-enterprise Mac community. There&#8217;s at least one lengthy thread in Apple&#8217;s support forums asking for this to be fixed. Apple just need to give the pro and business users a little love now and then, even though they&#8217;re &#8220;killing it&#8221; with iOS. </p>

<p>So there is my rant and personal lament regarding how I wish that Apple would find a way to continue to support not only the vision that is iOS, but also keep supporting those who use computers for more technical tasks, business needs, and professional production, and less so for social congregation. My whining is personal, but I also hear if from friends using OS X Lion and looking ahead to OS X &#8220;Mountain Lion&#8221;. Plus, Lion has stopped a couple of my friends from switching from Windows and that&#8217;s a shame. I&#8217;d love to see Apple develop the OS in a way that continues to innovate, yet retains the means for users to work more technically if they wish. <img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>
					]]>
				</content:encoded>
				  <dc:subject>Technology,</dc:subject>
				  <dc:date>2012-03-11T01:55:04+00:00</dc:date>
				</item>
			
				<item>
				  <title>Stop S.O.P.A. and P.I.P.A.</title>
				  <link>https://daleallyn.com/index.php/site/comments/stop_s.o.p.a_and_p.i.p.a</link>
				  <guid>https://daleallyn.com/index.php/site/comments/stop_s.o.p.a_and_p.i.p.a#When:09:51:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>S.O.P.A. and P.I.P.A. are U.S. legislative bills presented as means to protect intellectual property and to stop online &#8220;piracy&#8221; of digital media. However, behind the labels of these <strong>destructive</strong> bills lies legislation which is potentially very harmful to how the Internet works to empower individuals, while pandering to certain parties in the movie industry and music industry. It&#8217;s no surprise that representatives in Congress would pander to the likes of these skillful and well-funded lobbyists, but the Internet is a valuable, global asset which must not be controlled by special interests. </p>

<p>To be clear, <strong>I am against any form of intellectual or creative property piracy</strong>, including bit torrents to share music against its creators&#8217; will, using photos without the photographer&#8217;s permission, etc. We currently have laws in place against such behavior, but S.O.P.A. and P.I.P.A. appear to be designed to simply help U.S. media industry players who refuse to embrace new business models as technology has evolved–at the expense of the entire Internet.</p>

<p>Here&#8217;s a great talk by Clay Shirky on TED:</p>

<p><strong>EDIT:</strong> I removed the embedded video here because the method TED uses for video embeds is such a drain on resources and loads incredibly slowly. So the link to the talk on the TED website is here, and worth a watch: <a href="http://www.ted.com/talks/defend_our_freedom_to_share_or_why_sopa_is_a_bad_idea.html" title="View video in a new window" target="_blank">Link to video on TED</a></p>

<p>Please inform yourself about S.O.P.A. and P.I.P.A. by following the links below, and reach out to your representatives in Washington D.C. to let them know that if they support such rubbish it will cost them their jobs.<img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>

<p><a href="https://www.eff.org/deeplinks/2011/10/sopa-hollywood-finally-gets-chance-break-internet" title="EFF: SOPA: Hollywood Finally Gets a Chance to Break the Internet" target="_blank">SOPA: Hollywood Finally Gets a Chance to Break the Internet</a></p>

<p><a href="http://www.wired.com/threatlevel/2012/01/why-weve-censored-wired-com/" title="Wired.com's Comments" target="_blank">Wired.com&#8217;s Comments</a></p>

<p><a href="http://arstechnica.com/tech-policy/2011/10/house-takes-senates-bad-internet-censorship-bill-makes-it-worse/" title="An Article on Ars Technica on SOPA" target="_blank">An Article on Ars Technica on SOPA</a></p>

<p><a href="http://www.opencongress.org/bill/112-h3261/show" title="SOPA on Open Congress" target="_blank">SOPA on Open Congress</a></p>

<p><a href="http://www.opencongress.org/bill/112-s968/show" title="PIPA on Open Congress" target="_blank">PIPA on Open Congress</a></p>

<p><a href="http://KeepTheWebOPEN.com/" title="Congressman Darrell Issa's Project: Keep the Web Open" target="_blank">Congressman Darrell Issa&#8217;s Project: Keep the Web Open</a></p>

<p><a href="http://readwrite.com/2012/01/18/what-i-wish-wikipedia-and-othe#awesm=~opPkX8H9Q84gMD" title="An Important Point Raised at Read-Write Web" target="_blank">An Important Point Raised at Read-Write Web</a></p>
					]]>
				</content:encoded>
				  <dc:subject>Technology, Politics,</dc:subject>
				  <dc:date>2012-01-17T09:51:04+00:00</dc:date>
				</item>
			
				<item>
				  <title>Misadventures in VC funding: Rand Fishkin Shares His Experiences</title>
				  <link>https://daleallyn.com/index.php/site/comments/misadventures_in_vc_funding_rand_fishkin_shares_his_experiences</link>
				  <guid>https://daleallyn.com/index.php/site/comments/misadventures_in_vc_funding_rand_fishkin_shares_his_experiences#When:03:59:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p><a href="http://moz.com/rand/about/" title="About Rand Fishkin">Rand Fishkin</a>, CEO of <a href="http://moz.com/" title="Go to SEOmoz.org">Moz (formally SEOmoz)</a>, has posted a very <a href="http://moz.com/rand/misadventures-venture-capital-funding/" title="Misadventures in VC Funding: The $24 Million Moz Almost Raised by Rand Fishkin">interesting article</a> on the experiences he and his colleagues experienced during a recent attempt to raise $24 million in venture capital. He had signed the term sheet and received the letter of intent from the VC, but ultimately they did not close. In the post, Rand lays out the chain of events, and shares what he learned about the process and what he could have done differently. But most importantly, he points out the importance of choosing an investor who is aligned with your own vision and team culture. Rand&#8217;s  tone is humble and the content is remarkably transparent. This type of sharing by Rand is a great resource for startups considering taking venture capital. </p>

<p>Within the post there are links to a couple of blog entries about previous funding attempts. They&#8217;re worth checking out too. <img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>

<p><a href="http://moz.com/rand/misadventures-venture-capital-funding/" title="Misadventures in VC Funding: The $24 Million Moz Almost Raised by Rand Fishkin">Misadventures in VC Funding: The $24 Million Moz Almost Raised</a></p>
					]]>
				</content:encoded>
				  <dc:subject>Startup,</dc:subject>
				  <dc:date>2011-08-30T03:59:04+00:00</dc:date>
				</item>
			
				<item>
				  <title>Marc Andreessen: Why Software is Eating the World</title>
				  <link>https://daleallyn.com/index.php/site/comments/marc_andreessen_why_software_is_eating_the_world</link>
				  <guid>https://daleallyn.com/index.php/site/comments/marc_andreessen_why_software_is_eating_the_world#When:06:21:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>The Wall Street Journal has published an <a href="http://online.wsj.com/news/articles/SB10001424053111903480904576512250915629460">insightful essay</a> by Marc Andreessen on how technology permeates society, even in analogue life.</p><blockquote><p>My own theory is that we are in the middle of a dramatic and broad technological and economic shift in which software companies are poised to take over large swathes of the economy. <cite>Marc Andreessen</cite></p>
</blockquote>
<p>Andreessen, an immensely successful entrepreneur, as well as venture capital and angel investor, sees tremendous opportunity globally in this trend. Of course, he&#8217;s not alone, as technology is one of the gleaming bright spots in our very challenging economy. </p>

<p><a href="http://online.wsj.com/news/articles/SB10001424053111903480904576512250915629460" title="Marc Andreessen on Why Software is Eating the World at the WSJ">Marc Andreessen on Why Software is Eating the World</a>&nbsp; Definitely recommended reading. <img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>
					]]>
				</content:encoded>
				  <dc:subject>Technology,</dc:subject>
				  <dc:date>2011-08-20T06:21:04+00:00</dc:date>
				</item>
			
				<item>
				  <title>Garagiste Healdsburg: A Wine Lover&#8217;s Gem</title>
				  <link>https://daleallyn.com/index.php/site/comments/garagiste_healdsburg_a_wine_lovers_gem</link>
				  <guid>https://daleallyn.com/index.php/site/comments/garagiste_healdsburg_a_wine_lovers_gem#When:03:55:17Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>Last Sunday my wife and I needed a day away from the grind, so we impulsively decided to explore a bit of wine tasting in <a href="https://en.wikipedia.org/wiki/Healdsburg,_California" title="Healdsburg, California on Wikipedia: in a new window" target="_blank">Healdsburg, California</a> &ndash; prompted by a random tweet by <a href="https://twitter.com/#!/sacca" title="Chris Sacca on Twitter: in a new window" target="_blank">Chris Sacca</a> in which he mentioned that <a href="https://www.cartographwines.com/" title="Visit the Cartograph Wines website: in a new window" target="_blank">Cartograph Wines</a> is his favorite winery. Completely unfamiliar with Chris’ taste in wine, it really didn’t matter because we were looking for an excuse to get out&hellip; so,&nbsp; Healdsburg or bust&#33;</p>

<p>Healdsburg is located at the center-point of the Alexander Valley, Dry Creek Valley and Russian River Valley wine producing regions. Thanks largely to the growth in quality wine production in this area – and high quality Pinot Noir wines in particular – Healdsburg has evolved from a quiet little town to a delightful destination with tasting rooms, charming and sophisticated restaurants, shops and great atmosphere. We encountered perfect weather, friendly people and happy dogs enjoying the day there. </p>

<p><strong>Enter Garagiste Healdsburg</strong></p>

<p><a href="https://garagistehbg.com/" title="Visit the Garagiste Healdsburg website: in a new window" target="_blank">Garagiste Healdsburg</a> is a wine tasting collaboration established by <a href="https://www.cartographwines.com/" title="Visit the Cartograph Wines website: in a new window" target="_blank">Cartograph Wines</a> and <a href="https://starkwine.com" title="Visit the Stark Wine website: in a new window" target="_blank">Stark Wine</a> &ndash; both, micro-wineries which share the same wine making philosophy of quality over quantity. They just opened the tasting room in July of this year and they’ve done a great job in my opinion. The venue has comfortable patio seating with a pleasant fountain, as well as inside seating, so take your pick. Or just stand at the bar and learn about their wines, as we did. </p>

<p>Our hosts were Cartograph Wines proprietors Serena Lourie and Alan Baker. Serena and Alan were an absolute delight to speak with, and both very open and informative about their wine making. Sincere passion for their craft is abundant and obvious in each of them – and infectious. Serena brought us up to speed regarding the wines that both they and Stark produce, while Alan shared specifics of the grape clones used for each wine. I’m a neophyte when it comes to Russian River and Dry Creek Valley pinots and Serena and Alan made me very comfortable as they shared their knowledge. Christian Stark was not at Garagiste on this day, but Serena and Alan are quite knowledgeable about the Stark offerings and explained the materials and processes which Christian employs in making his wines. </p>

<p>We tasted six wines &ndash; three from each winery. Cartograph Wines was offering two Pinot Noirs and a very nice Gerw&#252;rztraminer,&nbsp; and Stark presented a Chardonnay, a Syrah and a Viogner – the latter employing grapes from the Sierra foothills because of the advantageous (for the variety) warmer weather there.</p><div class="image">
<p><img src="https://daleallyn.com/images/posts/garagistehbg_line2.jpg" alt="Five wines from Garagiste Healdsburg" /></p>
</div>
<p>Before visiting Garagiste Healdsburg I read on the <a href="https://www.cartographwines.com/" title="Cartograph Wines: in a new window" target="_blank">Cartograph Wines website</a> that they produce a Gerw&#252;rztraminer, but I must admit that the &ldquo;Gerw&#252;rz&rdquo; was of least interest to me. I love good pinots and cabs., and have never really been fond of floral or fruity Alsatian-style wines. Well, I got a lesson in how different this variety can be. The Cartograph Gerw&#252;rtz is pleasantly dry (just as they state on their website), yet complex and delicious, without a florid nose that I don’t care much for. A great surprise for me. </p>

<p>Two fine Pinot Noir wines are currently offered by Cartograph Wines: one with grapes from Floodgate Vineyards, and one made from Perli Vineyard grapes. Each is distinctly different, complex and elegant. In fact, we enjoyed a bottle of the Cartograph Wines Floodgate Pinot Noir last night with grilled pork tenderloin and pearl couscous made with sauteed mushrooms, pignoli nuts (pine nuts), celery, garlic, shallots and dried mission figs (simmered in a bit of the pinot to reconstitute) and it ROCKED! You should have been here.&nbsp; ;-)</p>

<p>The Stark Wine Chardonnay is not a typical heavy-handed, oak-laden wine. We’ve grown tired of such wines, and have in fact largely moved away from Chardonnays because of the popularity (and ubiquity) of the heavy oak style. Serena explained to us that Christian Stark uses stainless and “neutral oak” barrels to avoid the heavy oak elements and that suits us just right. In fact, the Stark Chardonnay has a distinct coconut element, both on the palate and the nose. We look forward to enjoying a bottle with a nice halibut meal. </p>

<p>The Syrah from Stark is another example of the care with which both of these wineries craft their wines. It’s full-bodied, not overly round or mushy (as so many syrahs can be), and in fact it’s complex and well-balanced. To Stark&#8217;s credit, the current release is a 2006 vintage &ndash; a pleasure to see, in contrast to the really young reds that get pushed into the market much of the time these days. I need to taste this wine again, without tasting five other wines first, to better appreciate its nuances. I purchased two bottles for just such a study. </p>

<p>And finally, the Stark Viogner. I have very little experience with this variety, but enjoyed it very much. It boasts a strong stone fruit complexity that seemed like it would pair nicely with cheese and fruit. In fact Serena suggested that it is fantastic with a nice brie and apricots, and that made perfect sense. </p>

<p>In case you haven’t noticed, there’s a common thread here which applies to each of the wines from both of these micro-wineries: careful attention to quality to produce elegant, well-balanced, nuanced wines. It’s not often that we’ve tasted wines on our explorations where we actually enjoyed each wine we tasted and envisioned the setting in which we’d like to enjoy them again. </p>

<p>So enough of my blathering here. For those close enough to do so, put a picnic together and check out Garagiste Healdsburg. You probably need a break from the grind, too. They ship to many U.S. states as well. </p>

<p><a href="http://garagistehbg.com/" title="Visit the Garagiste Healdsburg website: in a new window" target="_blank">Garagiste Healdsburg</a> is located at 439 Healdsburg Avenue, two blocks north of the plaza. Their hours of operation are from 12:00 noon to 7:00 p.m., Thursday through Sunday &#40;by appointment Monday&ndash;Wednesday&#41;. </p>

<p>Cheers! <img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>
					]]>
				</content:encoded>
				  <dc:subject>Everything Else,</dc:subject>
				  <dc:date>2011-08-17T03:55:17+00:00</dc:date>
				</item>
			
				<item>
				  <title>Tomatillo Salsa Verde: My Favorite Salsa Recipe</title>
				  <link>https://daleallyn.com/index.php/site/comments/my_favorite_salsa_recipe</link>
				  <guid>https://daleallyn.com/index.php/site/comments/my_favorite_salsa_recipe#When:00:33:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>Here&#8217;s the recipe for my favorite salsa. I&#8217;ve been asked for it several times by friends and provided it by phone, but when recently asked to email it I thought it would be better to just post it here. It&#8217;s a <a href="https://en.wikipedia.org/wiki/Tomatillo" title="tomatillo at Wikipedia: in a new window" target="_blank">tomatillo</a> salsa verde, or green salsa. It&#8217;s really simple to make and requires no cooking. This salsa is addictive when eaten with tortilla chips, but it&#8217;s also amazingly versatile as an accompaniment  to various foods. I love it on grilled salmon – it&#8217;s great on halibut or chicken too. Use it on beef steak (or roast pork or lamb) similar to how you might use a chimichurri sauce. And it&#8217;s killer on mahi mahi or shrimp tacos and burritos. Oh, and breakfast potatoes and omelettes, and&#8230; well, you get the idea. Of course, all of this assumes it doesn&#8217;t get eaten before the food comes off the grill.</p><div class="image">
<p><img src="https://daleallyn.com/images/posts/salsa_verde.jpg" alt="tomatillo salsa verde" /></p>
</div>
<p>Okay, enough talk. Let&#8217;s get to this easy recipe.</p>

<p><strong>Ingredients: </strong></p>

<p>1 pound fresh tomatillos, husks removed, rinsed, patted dry and quartered<br />
1 bunch fresh cilantro (probably about 1/2 to 3/4 cup)<br />
1 fresh <a href="https://en.wikipedia.org/wiki/Serrano_pepper" title="serrano chili at Wikipedia: in a new window" target="_blank">serrano chili pepper</a>, green, seeds removed, finely chopped &#91;1&#93;<br />
1/2 to 1 fresh <a href="https://en.wikipedia.org/wiki/Habanero_chili" title="habenaro chili at Wikipedia: in a new window" target="_blank">habenero chili pepper</a>, seeds removed, finely chopped &#91;1&#93;<br />
1 medium or large garlic glove (or two small cloves), quartered<br />
1 ripe avocado<br />
1 fresh lime &#91;see note 2&#93;<br />
Kosher salt<br />
Fresh ground black pepper</p>

<p><strong>Method:</strong></p>

<p>In a food processor combine the tomatillos, cilantro, chilies and garlic. Add a few twists of fresh ground black pepper and a couple of teaspoons of kosher salt. I like this recipe with a bit of salt, but if you need to reduce the salt you can replace it with some lime juice to taste. Remember that kosher salt is less intense than iodized table salt. I usually add more salt, but taste it after processing to decide. </p>

<p>Blend well in the processor until the ingredients are well processed. Some texture is desired, but not big chunks. </p>

<p>Once well processed, taste for salt and adjust. You&#8217;ll be adding the avocado at the end, so anticipate that it will need a bit of salt for that. Also now is the time to squeeze in a bit of lime if you feel the tomatillos lack acid or are a bit sweet. They vary, so adjust to your taste. </p>

<p>Finally, add the avocado as chunks (be sure to keep the pit aside for later &#91;3&#93;) and PULSE the mixture just a few times until the avocado is evenly chopped and distributed as chunks larger than the rest of the salsa mixture. </p>

<p>That&#8217;s it. Enjoy! </p>

<p>The salsa improves with some time to allow the flavors to mingle. Making it several hours ahead of time is best. It lasts well in the refrigerator for a day or two (or three) if you store it covered, with the avocado pit placed in the container to help keep the avocado from turning brown. </p>

<p>If you want a bit of color and variety gently add diced tomatoes when you serve it. It&#8217;s also very nice with quality, tiny bay shrimp added and served with tortilla chips. We sometimes serve half the batch with shrimp and half without just to mix it up a bit.</p>

<p>&#91;1&#93; I find that the heat provided by the amount of chills in the above list is about right for a broad audience. However, I like it a bit spicier, so often make a hotter batch or divide it and make half as described and half with more chilies. Chilies vary in heat, so when you&#8217;re tasting for salt you can add more chili to kick it up if needed. Leaving the seeds and interior ribs of the chilies in will make the salsa spicier. Also, Jalape&ntilde;os can be substituted, although the flavors of the serrano and habenero are really nice. Try a red and a green jalape&ntilde;o if that&#8217;s the route you go. I chop the chilies before adding just to ensure even distribution. </p>

<p>&#91;2&#93; You may not need to add lime, but sometimes the tomatillos are a bit sweeter or &#8220;fruity&#8221; tasting. I like to add lime if there&#8217;s a lack of acid, etc. </p>

<p>&#91;3&#93; Storing with the avocado pit really makes a difference, so do keep it if you&#8217;re not planning to eat all of the salsa right away. Just place the pit in the salsa during storage and remove it when you serve (or don&#8217;t). <img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>


					]]>
				</content:encoded>
				  <dc:subject>Everything Else,</dc:subject>
				  <dc:date>2011-08-03T00:33:04+00:00</dc:date>
				</item>
			
				<item>
				  <title>Burmese Living in Australia Admits to War Crimes</title>
				  <link>https://daleallyn.com/index.php/site/comments/burmese_living_in_australia_admits_to_war_crimes</link>
				  <guid>https://daleallyn.com/index.php/site/comments/burmese_living_in_australia_admits_to_war_crimes#When:19:26:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>A guilty conscience can be a powerful thing. It&#8217;s been known to drive one mad or as in this case, to finally admit to heinous crimes against humanity done in the past. </p>

<p>Burmese refugee, Htoo Htoo Han, has been living as a political refugee in Australia. He has now admitted to the Australian press that he murdered 24 people and had indirect involvement in about 100 more murders some 20 years ago in Burma. He&#39;s said to have infiltrated activist groups while working as an undercover officer for Burmese military intelligence.</p>

<p>While in Australia Htoo Htoo Han has been working in support of human rights and speaking out against the Burmese government. He now risks going to prison for his acts in the past, but he claims that he can no longer live with the guilt. </p>

<p>Here are a couple of articles regarding Han&#39;s admission: <a href="http://blogs.voanews.com/breaking-news/2011/07/18/burma-refugee-admits-war-crimes-past/" title="Story at Voice of America: In a new window" target="_blank">Voice of America</a> and <a href="http://news.smh.com.au/breaking-news-national/australian-admits-war-crimes-in-burma-20110718-1hkug.html" title="View article at The Sidney Morning Herald: In a new window" target="_blank">The Sidney Morning Herald</a>. There are others on the web.</p>

<p>Life is brutal for many people in Burma. The Burmese are typically wonderful people, but they live in constant fear of their government. I hope that they will find peace and a democratic government one day, but it won&#8217;t be an easy process &ndash; even if the military rulers allowed for fair elections. Strong security will need to be in place for many years to protect against territorial conflicts between various warlords throughout Burma. <img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>
					]]>
				</content:encoded>
				  <dc:subject>Politics,</dc:subject>
				  <dc:date>2011-07-18T19:26:04+00:00</dc:date>
				</item>
			
				<item>
				  <title>Thomas Jefferson on Patents</title>
				  <link>https://daleallyn.com/index.php/site/comments/thomas_jefferson_on_patents</link>
				  <guid>https://daleallyn.com/index.php/site/comments/thomas_jefferson_on_patents#When:20:37:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p><a href="http://cdixon.org/about.html">Chris Dixon</a> has <a href="http://cdixon.org/2011/07/16/thomas-jefferson-on-patents/">posted to his blog</a> an except from a letter by Thomas Jefferson on patents. It really strikes a chord with me in this time of so many patent infringement legal cases in the tech world. Here&#8217;s the excerpt as Chris posted:</p><blockquote><p>If nature has made any one thing less susceptible than all others of exclusive property, it is the action of the thinking power called an idea, which an individual may exclusively possess as long as he keeps it to himself; but the moment it is divulged, it forces itself into the possession of every one, and the receiver cannot dispossess himself of it. Its peculiar character, too, is that no one possesses the less, because every other possesses the whole of it. He who receives an idea from me, receives instruction himself without lessening mine; as he who lights his taper at mine, receives light without darkening me.</p>

<p>That ideas should freely spread from one to another over the globe, for the moral and mutual instruction of man, and improvement of his condition, seems to have been peculiarly and benevolently designed by nature, when she made them, like fire, expansible over all space, without lessening their density in any point, and like the air in which we breathe, move, and have our physical being, incapable of confinement or exclusive appropriation. Inventions then cannot, in nature, be a subject of property.</p>

<p>Society may give an exclusive right to the profits arising from them, as an encouragement to men to pursue ideas which may produce utility, but this may or may not be done, according to the will and convenience of the society, without claim or complaint from anybody. Accordingly, it is a fact, as far as I am informed, that England was, until we copied her, the only country on earth which ever, by a general law, gave a legal right to the exclusive use of an idea. In some other countries it is sometimes done, in a great case, and by a special and personal act, but, generally speaking, other nations have thought that these monopolies produce more embarrassment than advantage to society; and it may be observed that the nations which refuse monopolies of invention, are as fruitful as England in new and useful devices.&rdquo; <cite>Thomas Jefferson</cite></p>
</blockquote>

<p>I&#8217;m not posting this (or reposting) because I feel that all patents are wrong, but I do feel that there is such abuse that the system needs to be reworked. I&#8217;m not a fan of software patents because I believe they stifle innovation, as well as laying claim to usage of &#8220;language&#8221; (as in computer languages) and how a user communicates or interacts with information. </p>

<p>In fact, I do support patents in the context of tangible products &#40;though I abhor patent trolls&#41;. If an inventor, whether an individual or a corporation, develops an idea and wishes to earn money from the effort and creativity, I&#8217;m all for it and feel s&#47;he should be protected from those who would simply copy the product and not compensate the originator. A lot of work and expense goes into developing prototypes and finished products. Of course, if a creative inventor takes pleasure from sharing his or her inventions with others without the need to profit, that&#39;s wonderful. </p>

<p>Thomas Jefferson was the inventor of many things, which he freely shared with everyone. A commenter on Chris&#39; post, Patrick Lee, reminds us the Thomas Jefferson died at age 83, deeply in debt, and had he patented some of his inventions he might have been financially better off for it. He could have joined with others to create businesses which grew from his ideas as well. Still, his humble generosity is something to appreciate I think. </p>

<p>Here&#39; the letter from <a href="http://press-pubs.uchicago.edu/founders/documents/a1_8_8s12.html">Thomas Jefferson to Isaac McPherson</a>. Kudos to Chris for finding this and posting it. <img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>

<p><span class="via">&#91;via: <a href="http://cdixon.org/" title="Visit Chris&#39; blog&#58; in a new window" target="_blank">Chris Dixon</a>&#93;</span></p>
					]]>
				</content:encoded>
				  <dc:subject>Technology, Startup,</dc:subject>
				  <dc:date>2011-07-17T20:37:04+00:00</dc:date>
				</item>
			
				<item>
				  <title>FOMO and Social Media by Caterina Fake</title>
				  <link>https://daleallyn.com/index.php/site/comments/fomo_and_social_media_by_caterina_fake</link>
				  <guid>https://daleallyn.com/index.php/site/comments/fomo_and_social_media_by_caterina_fake#When:21:34:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>Caterina Fake has published <a href="http://caterina.net/wp-archives/71" title="Go to Caterina&#39;s post: in a new window" target="_blank">a thoughtful post</a> to her blog addressing FOMO, or the &#8220;Fear of Missing Out&#8221;, and how it affects the way people interact  with, and by means of, social media.</p>

<blockquote><p>FOMO is a great motivator of human behavior, and I think a crucial key to understanding social software, and why it works the way it does&#8230; Social media has made us even more aware of the things we are missing out on.&rdquo; <cite>Caterina Fake</cite></p>
</blockquote>

<p>One need only look around when in public to see so many eyes locked on to mobile devices, thumbs pounding away at texting and tweeting or checking their Facebook, rather than taking in the scenery or talking with a companion, to see her point.<img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>
					]]>
				</content:encoded>
				  <dc:subject>Technology,</dc:subject>
				  <dc:date>2011-03-15T21:34:04+00:00</dc:date>
				</item>
			
				<item>
				  <title>Asian University for Women: A Triumph of Hope over Despair</title>
				  <link>https://daleallyn.com/index.php/site/comments/asian_university_for_women_a_triumph_of_hope_over_despair</link>
				  <guid>https://daleallyn.com/index.php/site/comments/asian_university_for_women_a_triumph_of_hope_over_despair#When:20:42:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>Amit Chakma, president and vice-chancellor of the University of Western Ontario, has <a href="http://www.theglobeandmail.com/news/opinions/opinion/asian-university-for-women-a-triumph-of-hope-over-despair/article1933208/" title="Go to the post by Amit Chama: in a new window" target="_blank">a post on The Globe and Mail</a> opinion page regarding the Asian University for Women (AUW). In that post Dr. Chakma expresses his belief in the importance of education as a means of improving conditions in regions of the world which are suffering from abject poverty, discrimination and oppression. </p>

<blockquote><p>In fact, it’s clearly evident that, for societies to be able to make progress, women must be given equal opportunity, and they must be allowed to play leadership roles.&rdquo; <cite>Amit Chakma</cite></p>
</blockquote>

<p>In the article, Dr. Chakma shares that he was a boy from a tribe in the hills of southeastern Bangladesh, stating that neither he nor his parents would ever have dreamed that he would one day become the president of a 133 year-old university in Canada. The context is that opportunities provided by organizations like the AUW are essential to helping people break away from the cycle of poverty and despair through access to education. <a href="http://www.theglobeandmail.com/news/opinions/opinion/asian-university-for-women-a-triumph-of-hope-over-despair/article1933208/" title="Go to Dr. Chakma&#39;s post at the Globe and Mail: in a new window" target="_blank">Check it out</a>. <img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>

<p><br />
Related Posts:<br />
<a href="http://daleallyn.com/index.php/site/comments/cherie_blair_takes_position_as_chancellor_of_a.u.w" title="View post: Cherie Blair Takes Position as Chancellor of A.U.W.">Cherie Blair Takes Position as Chancellor of A.U.W.</a><br />
<a href="http://daleallyn.com/index.php/site/comments/the_asian_university_for_women_a_special_cause" title="View post titled The Asian University for Women: A Special Cause">The Asian University for Women: A Special Cause</a></p>
					]]>
				</content:encoded>
				  <dc:subject>Giving,</dc:subject>
				  <dc:date>2011-03-12T20:42:04+00:00</dc:date>
				</item>
			
				<item>
				  <title>The Blue Sweater by Jacqueline Novogratz</title>
				  <link>https://daleallyn.com/index.php/site/comments/the_blue_sweater_by_jacqueline_novogratz</link>
				  <guid>https://daleallyn.com/index.php/site/comments/the_blue_sweater_by_jacqueline_novogratz#When:17:13:37Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>Jacqueline Novogratz is the founder and CEO of <a href="https://www.acumenfund.org/" title="Visit the Acumen Fund website: in a new window" target="_blank">Acumen Fund</a>, a nonprofit venture capital fund committed to investing in business models which help to empower the poor. <a href="https://www.acumenfund.org/bluesweater/" title="The Blue Sweater: in a new window" target="_blank">The Blue Sweater</a> is a chronicle of the events in the author&#8217;s life which led to her eventual establishment of Acumen Fund. </p>

<p>The dialogue begins by describing the sweater she received as a gift from her uncle when she was a young girl. Jacqueline loved the sweater, but after being harshly teased in school she donated it to Goodwill. Many years later, while trying to sort out what she would do with her life, she met a young boy on a street in Rwanda who was wearing her sweater. This was a seminal moment that would mark the beginning of an amazing journey.</p>

<blockquote><p>After more than 20 years of working in Africa, India, and Pakistan, I&#8217;ve learned that solutions to poverty must be driven by discipline, accountability, and market strength, not easy sentimentality. I&#8217;ve learned that many of the answers to poverty lie in the space between the market and charity and that what is needed most of all is moral leadership willing to build solutions from the perspectives of poor people themselves rather than imposing grand theories and plans upon them.&rdquo; <cite>Jacqueline Novogratz</cite></p>
</blockquote><p> </p>

<p>In the book, Jacqueline humbly shares the events that would teach her so much about cultures in Africa which differ greatly from what she experienced growing up in the United States, as she learned how to cope with and grow beyond her naiveté. Though her college education and work on Wall Street prepared her for certain business challenges, she was not prepared for many of the challenges presented her while working for non-governmental organizations (N.G.O.) in some of the poorest regions of Africa. Her work centered mostly around teaching women how to engage in business in a land where women have little or no self-identity or personal rights. Respecting local customs and truly listening became as important as skillful business artistry in working to affect meaningful and lasting change in African women&#8217;s lives.</p>

<p>The author provides detailed descriptions of everything from scenery to the clothing people wore, giving the reader a sense of participation. As one who travels outside of my home-country often, I enjoyed the imagery provided by these descriptions. </p>

<div class="vdo">
<object width="560" height="340"><param name="movie" value="https://www.youtube.com/v/ZglgXeH1H8k?fs=1&amp;hl=en_US&amp;rel=0"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><iframe width="560" height="340" src="https://www.youtube.com/embed/ZglgXeH1H8k?si=qgZgWJbfCZjnDdJT" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></object>
</div>

<p>The Blue Sweater is a wonderful and inspiring read, although there are parts which are difficult to read without emotional response. The almost unimaginable poverty and harshness of genocide are provoking, but they are juxtaposed with stories of strength, triumph and dignity. </p>

<p>I love how Jacqueline continuously fought with bureaucrats in defense of practical solutions to ensure lasting improvements in women&#8217;s circumstances, preferring micro-finance lending over handouts. She didn&#8217;t always win, but at least she tried–and sometimes she learned why some of her methods were ill-conceived and naive. The Blue Sweater should be required reading for all N.G.O.s and charities.</p>

<p>When Jacqueline Novogratz was a young girl she knew she wanted to change the world, and she has done so in a very positive way. The Blue Sweater allows us to join her on her inspiring journey.<img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>
					]]>
				</content:encoded>
				  <dc:subject>Giving,</dc:subject>
				  <dc:date>2011-03-02T17:13:37+00:00</dc:date>
				</item>
			
				<item>
				  <title>Copyright Troll: The New Bottom?</title>
				  <link>https://daleallyn.com/index.php/site/comments/copyright_troll_the_new_bottom</link>
				  <guid>https://daleallyn.com/index.php/site/comments/copyright_troll_the_new_bottom#When:14:05:04Z</guid>
				  <content:encoded>
					<![CDATA[
						
						<p>I have <a href="http://daleallyn.com/index.php/site/comments/skype_sued_for_patent_infringement_patent_troll" title="Skype Sued for Patent Infringement">zero respect for patent trolls</a>, and I am a firm supporter of copyright laws protecting content creators, but now there&#8217;s a new twist: a law firm named Righthaven is apparently engaging in &#8220;copyright trolling&#8221;. As described by Christopher Mims on the M.I.T. Technology Review blog, Righthaven is making a business of suing people and businesses for copyright infringement by waiting for an image to go viral and then buying the rights to it for the purpose of suing those who have posted it on the web. </p>

<p>As a photographer I value my copyrights, but I surely do not support this type of trolling abuse of an otherwise important method of protecting content creators. It&#8217;s actions such as these which may ultimately bring about changes in laws which weaken protection for artists, designers, writers, musicians, photographers and other makers of creative content. This kind of misuse of copyright law should not be rewarded and the actions should be penalized.</p>

<p>Mim&#8217;s post is here: <a href="http://www.technologyreview.com/blog/mimssbits/26306/" title="Post a Copyrighted Picture, Face a $150,000 Lawsuit, at M.I.T. Tech Review" target="_blank">Post a Copyrighted Picture, Face a $150,000 Lawsuit</a></p>

<p>If there is good to come from this, perhaps some exposure to this sort of thing will get more people to think before posting others&#8217; images without permission and attribution. Still, I&#8217;ll be happy to see this &#8220;business model&#8221; practiced by any copyright trolls FAIL.<img class="dot" src="/images/interface/da_dot.png" alt="end of article icon"/></p>
					]]>
				</content:encoded>
				  <dc:subject>Technology, Politics,</dc:subject>
				  <dc:date>2011-02-09T14:05:04+00:00</dc:date>
				</item>
			
		</channel>
	</rss>