Blogs

BROWSE: Most Recent | Popular Tags |

Tags > Wesabe

Four short links: 30 July 2010

By Nat Torkington
July 30, 2010

The No-Twinkie Database -- These are all the Twinkie Denial Conditions described in my “Bad Game Designer, No Twinkie!” Designer’s Notebook columns. Each one is an egregious design error, although many of them have appeared in otherwise great games. A collection of "don't do this" for app designers. (via waxy) Cloud Privacy Heat Map (Forrester) -- a map showing...

Wayner security flip gets real-life play in Wesabe's Grendel

By Andy Oram
January 13, 2010

A security trick documented by Peter Wayner in the books Beautiful Security and Translucent Databases was also discovered and used by Wesabe.

Ubicomp and Web 2.0: Connecting the Dots

By Tim O'Reilly
June 2, 2008

I've been saying for some time that the next stage of Web 2.0 is the application of collective intelligence techniques to sensor data, not just to data input directly by humans. Two stories this weekend illustrate this point nicely. The New York Times published a story on Saturday entitled Billboards that Look Back, about a new generation of electronic...


1 to 3 of 3
The Watering Hole