- Your address data (to, cc, and bc) is longer than your text. Use Twitter or text instead.
- Visible recipients (to, cc) don't know one another's email address...until you reveal them. (Unless the point of the message is introduction.)
- BC messages don't describe the recipients in general ("members of the committee"). Otherwise you spawn many unnecessary emails forwarding information to people who have it.
- You send multiple formats of an attachment (DOC, PDF, JPEG...). Use collaborative tools like Slack and Dropbox instead)
- You need multiple versions of an attachment (Thursday after meeting, Friday with client...). Use collaborative tools or web so that the current version is known and accessible.
We'll talk about the flip-side of data retention and archiving: getting rid of what you don't need to keep. We may also talk about how your communication and messaging apps may be saving lots and lots of data.
On the topic of security, this article from The Atlantic raises some good points. It starts from Henry Stimson's famous line: "Gentlemen do not read each others' mail."
Washington Post article: What We Lose When the World Moves On From Email. Read here.
Springtime (April - June) is developer conference time. It probably started with the back-to-school and holiday shopping seasons in the fall. In order to fill the pipeline and retail channel with software to go with the new hardware, companies invited their developers to preview the new features of the operating systems so they could write code for the new products.
Microsoft's Annual Build conference was held this month as was Google I/O. Facebook developers met in April, and Apple's turn is June 5. What's in the air? What will products look like in the next year?
Some of the words in the air at 2017 developer conferences:
- AI (artificial intelligence)
- AR (augmented reality)
- Speech recognition
Some of the developer conversations:
- Kotlln and Swift
- Neural networks
Some of the quotes from developer conferences:
"AI is going to disrupt every single business".-- Harry Shum, Microsoft EVP AI and Research Group at Microsoft Build 2017, 5/10/2017
"An important shift from a mobile first world to an AI first world" -- Google CEO Sundar Pichai at Google I/O 2017
“We can’t build the AR product that we want today, so building VR is the path to getting to those AR glasses” -- Mark Zuckerberg in Recode interview
Joe and Jesse talk about some of the highlights on The Roundtable on WAMC Tuesday, May 23, 2017 11 AM.
Cyber Security, Contingency Planning, Context Maintenance — they’re all part of Cyber Continuity. When you want to use your computer or device to do something and you can't do it, it doesn't really matter if it's cyber crime, a power failure, or you just plain forgot how to use it. You just want to get your project — be it work or play — back on track.
Cyber Continuity app lets you walk though major challenges so that you understand them, rate your issues for each one on a slider, and make notes to yourself to make things better.
Adjust the sliders to see how your Cyber Continuity score changes. Use the Score popover in the list of challenge areas (at the top right) to look as your overall score. As you work with each particular challenge, the slider shows you the score and its color. The info button at the top right of each challenge provides information about the challenge and what you can do about it.
Cyber Continuity is developed by Jesse Feiler. It draws on projects involving major organizations as well as individual users. These projects have included contingency planning for the Systems Development and Data Processing functions at Federal Reserve Bank of New York; consulting and speaking about the Year 2000 problem; and rescue missions for individuals and organizations who found out about Cyber Continuity when they least expected to learn about it.