False Positives , Ian Irving's Adventures in Tech, Toronto (and HK), Sci and SciFi

Friday, May 07, 2004

I may never live this down

For the record I've "picked" tobacco by hand, too.

Amazon Chief, Java Problem Solver: Al Vermeulen, The Seattle Times, Wednesday, May 05, 2004


(KRT)

SEATTLE - Things to know about Al Vermeulen, chief technology officer of Amazon.com:

He works in Seattle and lives in Corvallis - Oregon. To bridge the distance, he learned to fly.

He co-wrote a book about Java (the computer language, not the drink). At one point, it afforded him some "serious geek cachet."

He knows how to harvest tobacco by hand.

To his first job interview he wore a wedding suit. He was 34.

"I just came in and talked to folks," Vermeulen says of the interview, which led to a job at Corvallis-based Rogue Wave. "They gave me an offer that night at dinner. I think I pushed back a little bit because I heard you're supposed to negotiate these things."

Vermeulen, who oversees Amazon's huge technology operations, is something of a linguist. In the mid-1980s, as a doctoral candidate at the University of Waterloo in Ontario, Canada, he helped pioneer C++, a widely used computer language.

That expertise fit in nicely with Rogue Wave, which sold some of the first reusable building blocks for C++. (Think of Rogue Wave as a seller of ready-made foundations to software builders.)

He co-wrote "The Elements of Java Style," a book that mimics the presentation of the Strunk and White classic for writers, "The Elements of Style." He and his cohorts were tired of thumbing through an obtuse, 1,200-page manual for answers about the Java programming language.

"That sensibility is just definitely part of what he's about," says Jim Shur, who worked with Vermeulen at Rogue Wave. "Right to the point, less is more."

Today, Vermeulen guides Amazon's $100 million-a-year effort to use computer power to refine its e-commerce prowess. Indeed, the company is defined as much for its technology as its ability to sell caviar, lawnmowers and books.

Amazon powers the Web sites of other large retailers, including Borders Books & Music, Target and Toys R Us. Its search technology is such that users can search not just titles but also the text of the books it sells.

All this for a man who was in school until he was 34 and who once wrote that his career goal was to go as long as possible without getting a job.

"It's something he and I always had in common," said Tom Keffer, a former oceanography professor who founded Rogue Wave. "I could've easily been a bum and roamed the world, or I could've been a rocket scientist, and Al's that way, too."

Vermeulen was raised in the southern Ontario town of Burford, where school started after the tobacco harvest, "usually not until the first hard frost," he said.

His grandfather had a tobacco farm, where he learned to pick ripened leaves by hand.

Shur says his friend has the ability to quickly understand fundamental issues at hand and "get rid of the extraneous stuff."

An example: When Vermeulen first joined Amazon, he, his wife and their two kids moved to Issaquah, Wash. But they decided they liked Corvallis better and returned to their previous home.

So he took the train to get to work. Then he drove. Then he hired a sky taxi.

"As I was flying in the plane, I thought `I could do this myself,'" he said.

He took lessons and received a pilot's license in December.

"It's way better than driving," Vermeulen says. "It's much more intellectually interesting, actually."

---

Al Vermeulen

Age: 39

Occupation: Chief technology officer, Amazon.com

Education: University of Waterloo, Ph.D. in systems design engineering

Distinguishing characteristic: Finds elegant solutions to complex problems.

Accomplishment: Helped to pioneer the computer language C++.


Via Xyling Java Blogs

Wednesday, May 05, 2004

The Shining in 30 seconds (with bunnies.)

The Shining in 30 seconds with bunnies.
and then there is : The Exorcist in 30 seconds, re-enacted by bunnies.

I think I'm starting to agree with Anya.

Camera-phone barcode reader

Cory posts about Camera-phone barcode reader: point the camera at a 2-d barcode and the phone will decode it into its component URL and open the URL in it browser, from SemaCode.

For the clueless that whine about useless camera phones, this is one of those things that you couldn't do with a un-connected camera.

Think about what else you could do (thinking about this for 5 seconds) : once I know the product, look up product reviews, do price comparisons (national and local). Anything else (I'll spend another 5 seconds - more than the clueless do)

update : Reiter's Camera Phone Report has more details :

Discussing his view of barcodes, Simon writes, "For a long time computer scientists have been looking for a cheap, inexpensive way to create a gate between the real world and virtual world of the internet.

Simon has also created a Java applet to code a url into a 2-d bar code.
Here's a semacode to my favorite blog ;)

Now I just need to print it out and post it around...

Question : Is it possible to add the semacode 2-d barcode as a watermark to a image? bardcodes are ugly. This would allow enabling an image with the smarts of semacode encoded url. cane the image, extract the watermark and de-encode the url. Or "just" watermark a url into a image, such that it can be scaned and decoded by a camera phone? insanity or in sanely great? (Thanks for the question Chuck!)

Heres a peice from TheFeature Barcodes for the World of Ends with some interesting factorids

Very nice implementation of the Simpleton Pattern there....

NOW I know what they meant. (Has anyone cataloged the mis-management patterns of PHB's? ) Let the wet noddles of sarcasm be unleashed:

Resign Patterns - Ailments of Unsuitable Project-Disoriented Software by Michael Duell

Abstract

Anyone familiar with the book of patterns by the Gang of Four [1] knows that the patterns presented in the book represent elegant solutions that have evolved over time. Unfortunately, extracting these patterns from legacy code is impossible, because nobody knew that they were supposed to be using these patterns when they wrote the legacy code. Hence, this work is a catalog of patterns for the masses. The patterns presented here represent abundant solutions that have endured over time. Enjoy reading the patterns, but please don't use them!


  • 1 Cremational Patterns


  • Below is a list of five cremational patterns.

    • 1.1 Abject Poverty

      The Abject Poverty Pattern is evident in software that is so difficult to test and maintain that doing so results in massive budget overruns.


    • 1.2 Blinder

      The Blinder Pattern is an expedient solution to a problem without regard for future changes in requirements. It is unclear as to whether the Blinder is named for the blinders worn by the software designer during the coding phase, or the desire to gouge his eyes out during the maintenance phase.


    • 1.3 Fallacy Method

      The Fallacy method is evident in handling corner cases. The logic looks correct, but if anyone actually bothers to test it, or if a corner case occurs, the Fallacy of the logic will become known.


    • 1.4 ProtoTry

      The ProtoTry Pattern is a quick and dirty attempt to develop a working model of software. The original intent is to rewrite the ProtoTry, using lessons learned, but schedules never permit. The ProtoTry is also known as legacy code.


    • 1.5 Simpleton

      The Simpleton Pattern is an extremely complex pattern used for the most trivial of tasks. The Simpleton is an accurate indicator of the skill level of its creator.




  • 2 Destructural Patterns

    Below is a list of seven destructural patterns.

    • 2.1 Adopter

      The Adopter Pattern provides a home for orphaned functions. The result is a large family of functions that don't look anything alike, whose only relation to one another is through the Adopter.


    • 2.2 Brig

      The Brig Pattern is a container class for bad software. Also known as module.


    • 2.3 Compromise

      The Compromise Pattern is used to balance the forces of schedule vs. quality. The result is software of inferior quality that is still late.

    • 2.4 Detonator

      The Detonator is extremely common, but often undetected. A common example is the calculations based on a 2 digit year field. This bomb is out there, and waiting to explode!

    • 2.5 Fromage

      The Fromage Pattern is often full of holes. Fromage consists of cheesy little software tricks that make portability impossible. The older this pattern gets, the riper it smells.


    • 2.6 Flypaper

      The Flypaper Pattern is written by one designer and maintained by another. The designer maintaining the Flypaper Pattern finds herself stuck, and will likely perish before getting loose.

    • 2.7 ePoxy

      The ePoxy Pattern is evident in tightly coupled software modules. As coupling between modules increases, there appears to be an epoxy bond between them.




  • 3 Misbehavioral Patterns

    Below is a list of eleven misbehavioral patterns.

    • 3.1 Chain of Possibilities

      The Chain of Possibilities Pattern is evident in big, poorly documented modules. Nobody is sure of the full extent of its functionality, but the possibilities seem endless. Also known as Non-Deterministic.

    • 3.2 Commando

      The Commando Pattern is used to get in and out quick, and get the job done. This pattern can break any encapsulation to accomplish its mission. It takes no prisoners.

    • 3.3 Intersperser

      The Intersperser Pattern scatters pieces of functionality throughout a system, making a function impossible to test, modify, or understand.

    • 3.4 Instigator

      The Instigator Pattern is seemingly benign, but wreaks havoc on other parts of the software system.

    • 3.5 Momentum

      The Momentum Pattern grows exponentially, increasing size, memory requirements, complexity, and processing time.

    • 3.6 Medicator

      The Medicator Pattern is a real time hog that makes the rest of the system appear to be medicated with strong sedatives.

    • 3.7 Absolver

      The Absolver Pattern is evident in problem ridden code developed by former employees. So many historical problems have been traced to this software that current employees can absolve their software of blame by claiming that the absolver is responsible for any problem reported. Also known as It's-not-in-my-code.

    • 3.8 Stake

      The Stake Pattern is evident in problem ridden software written by designers who have since chosen the management ladder. Although fraught with problems, the manager's stake in this software is too high to allow anyone to rewrite it, as it represents the pinnacle of the manager's technical achievement.

    • 3.9 Eulogy

      The Eulogy Pattern is eventually used on all projects employing the other 22 Resign Patterns. Also known as Post Mortem.

    • 3.10 Tempest Method

      The Tempest Method is used in the last few days before software delivery. The Tempest Method is characterized by lack of comments, and introduction of several Detonator Patterns.

    • 3.11 Visitor From Hell

      The Visitor From Hell Pattern is coincident with the absence of run time bounds checking on arrays. Inevitably, at least one control loop per system will have a Visitor From Hell Pattern that will overwrite critical data.


Tuesday, May 04, 2004

Dutch tulips & Google

Mathew Ingram describes Dutch Auctions and Why is Google going Dutch?

and the New york Times (Google May Have Pre-empted Regulators on Public Offerings) notices too.

Monday, May 03, 2004

Press Release : Marketing “Killer App” Launched at CMA Convention

“Utility” positioned to change the face of Marketing

Ottawa, Ontario, May 3, 2004 The launch of CentrSource signals a new era in marketing, for advertisers, their agencies and the media. Centrsource is a killer app for the $450 billion global advertising industry. It is an integrated on-line utility where customers go to respond to virtually any advertisement, in any medium, anywhere and where they can buy, get information, request samples, enroll, get coupons, or shop. All in a completely secure and permission based environment. And, all at their convenience.

“We are launching CentrSource now because the timing is perfect” says Bob Westrope, President and CEO of CentrSource Corp. “Advertisers have been looking for true holistic approaches to marketing that are accountable, measurable and put the consumer first. With CentrSource, they now have the answer”.

Marty Rothstein, former President & CEO of MacLaren McCann and Vice Chairman of CentrSource says that “I saw the potential of CentrSource early on to meet the needs of sophisticated marketers to answer the question of which markets, with which offers, and in which medium are my marketing dollars most effectively invested? It’s that powerful an ROI tool”.

Strictly Pay-for-Performance

The CentrSource model for the customer is deceptively simple. Using a standardized navigation protocol which is destined to become as familiar as the keystrokes of the Windows operating system, CentrSource provides access and appeal to customers across traditional rural and urban, ethnic, affluence, and education divides – the definition of a utility.

Advertisers, or their media or agency partners can use CentrSource to reach their prospects and customers with an infinite array of offers through a sophisticated yet easy to use commercial application called ResponseExchange. ResponseExchange is web based and so simple to use that offers tailored down to the local trading area level can be created in 5 to 10 minutes. CentrSource will also be providing advertisers and their affiliates with detailed reporting and analysis so they can further refine their customer offers. CentrSource is strictly a pay-for-performance model – the Advertiser’s expenses are completely variable and tied to revenue – commissions are only generated when a consumer takes an action that moves them toward a purchase or makes an actual purchase.
Creates a “Please Call Me” Registry Where Everybody Wins

With over 60 million Americans registered with the ‘Do Not Call’ registry in the United States, the evidence is overwhelming that the consumer is demanding an end to intrusive, unsolicited advertising. With the Canadian market already exposed to an estimated 20 billion advertising exposures per day, CentrSource saw that the opportunity was to provide advertisers, and the media and advertising agencies that serve them, the tools to instantly convert all advertising executions into a consumer-accessible database or directory.

The result, according to Cheryl Young, Strategic Advisor to CentrSource, and a past Chair of the Canadian Marketing Association, is that “we effectively enable the creation of a ‘Please Call Me’ registry where the consumer feels secure enough and safe enough to raise their hand when they see or hear an advertising offer that is relevant to them – when the advertising has worked in other words – and say to us, ‘please serve me in the following manner’. Imagine. Being given permission by the consumer to be contacted with regard to a specific offer, or for that matter, to commence a new relationship.”
”The Holy Grail of Direct Response”

For agencies, CentrSource also has immense appeal. Dwain Jeworski, General Manager of Mason & Geller, a leading direct response agency out of New York says that “CentrSource is a refreshing alternative for our industry. By making all media measurable and giving customers the opportunity to “raise their hands” at their choice, we are moving towards the holy grail of direct response – measurability, precise segmentation, and customers who actually want to hear from you in a place where their privacy is put first. And the pay for lead model based on real consumer interest makes participation virtually “frictionless”.

Westrope says that Canada was selected to lead the world for the Business to Business launch of CentrSource because of the unique marketing environment here. “Canadians have always been on the leading edge of technology adoption, and there is no question we are pioneers in the privacy arena. There is enormous opportunity to gather significant learning and best practices here that we would then roll out to other markets in North America and globally.”



“CentrSource Is To Advertising What Google Is To Search”

Westrope expects to have market leaders in each industry category committed to launching CentrSource by the end of May. Following closely on the Business-to-Business launch of CentrSource will be the consumer brand push in the fall of 2004. “Like Google or eBay, CentrSource will grow exponentially simply by word of mouth, spread by consumers and advertisers. If fact, we often say internally that CentrSource is to Advertising as Google is to Search”.

Launch Exceeded Expectations

“Response to the launch of CentrSource exceeded our expectations” says Westrope. “We engaged dozens of significant advertisers, media and agencies on the trade show floor, with several committing on the spot to register. As business people, and as consumers, virtually everyone ‘got it’, asking the obvious question – “Why would I NOT participate?”. We expect most to register with CentrSource by the end of May”.

ABOUT CENTRSOURCE CORP:

CentrSource is a North American Company with approximately $5.0 million, and 6,000+ development days invested in its patents-pending technologies. The angel funder is the Interwood Marketing Group, one of the world's leading Direct Response Television advertisers. Seed funds were provided by Landmark Global Financial, a Toronto-based incubator, in February of 2000, enabling the commencement of technology development.

FOR MORE INFORMATION CONTACT:

Robert J. Westrope
President & CEO
CentrSource Corp.
416 515 2930 P
rwestrope@centrsource.com



CMA Press Release.pdf

Rules for contact sports

Via What they didn't teach me in Design & Usability school - UIWEB.COM comes Scot's rules for contact sports applies not just to designers but everyone. Here's a brief summaztion of the rules:


  • Get out of your office. Unless everyone in your world has the same job title as you...Get out of your office and make yourself a part of the team: not just a specialist.

  • Politics are real and not necessarily stupid... Sometimes it's for good reasons, other times not so good, but be prepared for things to change. If you are smart, you'll have an ear out for these issues so that you will never be blindsided, and possibly even a hand in their resolution them before decisions are made.

  • There is a bigger world than what you know: ..There can be engineering, marketing and business strategy decisions than impact the decisions you are making. Those decisions shouldn't be made without your input, but they may often be made without your complete acceptance. Understand what parts of the project you?re working on are in your control and which ones aren't. Know who is in control of the those areas that you are not. Build relationships with them. This will help keep you sane.

  • Design work is team work: Expect to share both the work and the rewards. Don't covet ideas, or have ego battles. Tthis will rarely help you or your customers. Take pride in the end results, not the pretty screenshots that are intermediary steps ...Don't join a team only to inflict your ego on them: it only makes everyone, yourself included, miserable.

  • Get in the game: In contact sports people get their hands dirty.

no animal was harmed in its making

Via Globe and Mail Ford slams Internet ad depicting cat killed by car roof

It's all about this