Africa and Military and Politics06 Jan 2008 at 23:51 by Jean-Marc Liotier

The story has been getting recently some more exposure, but it has been going on for years with sporadic appearances in mainstream media. It is still quietly under-reported in contrast to the widely hyped Darfur crisis.

As we can see in Sudan, killing civilians and destroying infrastructure is a practical method of ethnic purification that can yield useful results. But the social fabric itself is left intact – and with it the opponent still has the potential to survive as an organized group. But to really annihilate the opposition, its social fabric has to be torn up. And that is the motive behind the massive organized rape campaign in eastern Congo. Some of it is random violence comparable to what is found in any other armed conflict, but there is a disturbing trend that shows a systematic approach : the heart of darkness has found its weapon of mass destruction. According to the UN representative, the prevalence and intensity of sexual violence against women in eastern Congo are “almost unimaginable”.

A UN report found that in the central Equateur province, the police and army often responded to civil unrest “with organised armed reprisals that target the civilian population and involve indiscriminate pillage, torture and mass rape”. It is most notable that this violence is not the uncontrolled acts of random rebels, but planified operations executed by official armed forces. Of course, violence by state armed forces against civilian population is not a Congolese monopoly, but it is still an alarming signal that something is going very wrong, especially at this level and this extent.

In traditional societies, in the absence of a centralized impartial power to enforce social order, honor within the group is by far the most important measure by which relations of trust are established and preserved. Lose it and you lose everything. When you have witnessed how touchy members of traditional societies are when they feel the tiniest slight to what they perceive as their honor, you can understand how utterly ruined they are after every conceivable taboo has been broken in front of them. It goes beyond the sheer psychological shock of the abomination : in modern societies there is a safety net that can help in mending a broken life and starting again – medical, psychological, professional and financial help – but in the chaos of eastern Congo there is nothing of the sort. Losing all social links is a catastrophic event as bad as the physical effects of the violence. In practical terms, survivors of rape face abandonment by husbands, discrimination by the whole community and a very bleak future.

John Holmes, the UN emergency relief coordinator remarked : “It’s the scale and brutality of it, it’s the use of it as a weapon of terror. It’s the way it’s done publicly, for maximum humiliation. It’s hard to understand”. Actually, when put into the context of a systematic use for social destruction it makes a lot of sense. With a heavy medical burden unsupported by any health care, with overwhelming shame and no psychological support, with sexually transmitted diseases and a destroyed reproductive system that voids all prospects of bearing children, women not only lose their role as pillar of their community but they also become a constant reminder of the humiliation, a vehicle for the hopelessness. And their former community that rejects them suffers just as heavy a blow to its cohesion.

Again, the key point is that those horrendous violences are not reported to be the product of the random urges of some isolated criminally perverse elements – they are part of a systematic campaign against entire populations. The yet to be open case should not waste time targeting the lowly executioners : if the phenomenon is as widely spread as reports suggest, then it cannot exist without approval and active support from their military hierarchy. Some major war criminals are out there, still free to roam and take profit from the continuing suffering of the population. And we have not even started to denounce them, so it is not even worth mentioning doing anything against them.

Sadly, we are not interested in doing anything to stop the crisis in Congo : a meaningful intervention would be hugely expensive and last a generation. In all honesty, I am not ready to pay for that, nor are you – so we simply look away. From a Realpolitik point of view that may be a sound strategic decision. But from an humanitarian point of view the least we can do is not to let the horror stare us down when we look at it in the face.

If you wish to help, you can promote awareness of the humanitarian situation in Eastern Congo, or for a more direct impact you can get in touch with the Panzi Hospital whose action in the treatment of sexual violence has been exemplary.

Email31 Dec 2007 at 11:59 by Jean-Marc Liotier

Spam from Gmail accounts has appeared at least three years ago. Two years ago it caused Gmail servers to hit Spamcop’s database. But only now am I starting to notice it on my systems. My existing antispam arsenal may have protected me so far, but now I receive three or four illegitimate messages a day from that source, which is more than I tolerate.

Those messages have valid domain key signatures which lower their Spamassassin score enough to pass them as ham. If Google does not police its mail service better, then domain key signatures will become more than useless. A signature is only as good as its authority.

Meanwhile I will probably have to weight down the negative scores added through Mail::SpamAssassin::Plugin::DomainKeys.

Africa and Music31 Dec 2007 at 1:22 by Jean-Marc Liotier

I’m not particularly fond of new year’s greetings, but this time I stumbled upon some randomly incident inspiration in the form of Babatunde Olatunji‘s 1959’s song… “Odun de” means “Happy new year” and the lyrics “Odun de ire” mean “good fortune in the new year” in the Yoruba language.

So in lieu of seasonal electronic and dead tree spam, here is something from Baba to start your new year on…

Yesterday is history.
Tomorrow is a mystery.
And today?
Today is a gift.
That’s why we call it the present.

— Babatunde Olatunji

Jabber05 Dec 2007 at 12:21 by Jean-Marc Liotier

Owners of and AOL Instant Messenger can now use the service from Gmail. You may be surprised to learn that I consider that this is bad news. All the hype about interoperability between the two networks is just that : hype. This is not interoperability, this is just using Google as a multi-protocol client. In short, it merely hides the problem under the rug and further legitimates the fragmentation of the instant messaging world. I expected something more ambitious from Google. I thought that by opening their network to the Jabber galaxy, Google had made a statement in support of interoperability and open networks. But apparently this was just a way to embrace their competitors. I hope that users will some day understand the value of openness and demand it from their suppliers. They once did it for email and for internetworking – let’s hope the miracle happens again for instant messaging. Meanwhile, make sure that friends don’t let friends use closed networks !

Knowledge management and Social networking and The Web23 Nov 2007 at 11:04 by Jean-Marc Liotier

I set up a link blog and a collaborative bookmarking site for our tiny geek community. My friends have initially been slightly confused by the conceptual similarities. So here are a few general guidelines to provide a clearer distinction of use cases.

Both tools are relevant for posting links with no significant value added by the poster. If there is value added by the poster in the way of analysis, context, story telling or anything else, a traditional blog entry is a better choice.

A social bookmarking tool must focus on resources that the user might want to come back to in the future, or that he thinks that his friends might be interested in one day. The accent is on easy recall through various means of discovery such as search, feed reading and folksonomic exploration.

By contrast, a link blog focuses on immediate sharing. It is the place to show off the spectacular, the anecdotic, the exceptional – novelty items that you want to share with your friends but whose future recall value for practical use might be low.

The motive for link blogging is not just altruistic : posting in a link blog is also a way to elicit reactions to the content you discovered. And that is why the community gathered around your link blog is important : you want to gather contributions from the people that matter to you. And if you have enough feedback, then there might just be enough new material to warrant more synthetic capitalization in a proper blog article.

As you can see, although the niches of social bookmarking and link blogging in knowledge management do overlap a little, they are definitely distinct and educating the users in extracting the highest value from them is worth the effort.

Email21 Nov 2007 at 14:13 by Jean-Marc Liotier

Yes, we do hate stupid email disclaimers that much : they are a completely meaningless waste of electrons, they waste display real estate and they make proper quoting more awkward. And most of all they are unilateral clauses whose acceptation is most dubious.

Lerouge dug out an article by Russel Coker about striking back at worthless email disclaimers by configuring Postfix’s smtpd_banner in /etc/postfix/main.cf with the appropriate legalese of its own. Lerouge suggested that we do likewise and I jumped on the case and implemented it immediately…

Looking for something really outrageous and fit to point out how ridiculous those things are, I found inspiration at ReasonnablAgreement.com and modified it for my purposes…

So there you go :

13:52 jim@kivu ~% telnet localhost 25
Trying 127.0.0.1…
Connected to localhost.
Escape character is ‘^]’.
220 kivu.grabeuh.com ESMTP (M Sexchange) – READ CAREFULLY. By transmitting email to this server you agree personally and on behalf of your employer or organization, to release the recipients from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies (hereafter BOGUS AGREEMENTS) that the recipients have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to the recipients ongoing rights and privileges. You further represent that you have the authority to release the recipients from any BOGUS AGREEMENTS on behalf of your employer or organization.

So in case you wondered, here is proof : the humongous disclaimer from hell does fit into smtpd_banner’s limits !

Design and Identity management and Knowledge management and Social networking and The Web20 Nov 2007 at 6:47 by Jean-Marc Liotier

Open is everything – the rest is details. That is why we must take the best use cases of the closed social networking world and port them in the open. This is a lofty goal in all meaning of the adjective, but a surprisingly large number of potential basic components are available to cut the way short.

Friend of a Friend (FOAF) enables the creation of a machine-readable ontology describing persons, their activities and their relations to other people and objects. This concept is a child of the semantic web school of thought that has its origins about as far ago as the Web itself. In a narrower but deeper way, XFN (XHTML Friends Network) enables web authors to indicate their relationships to people simply by adding attributes to hyperlinks.

Microformats such as hCard, xfn, rel-tag, hCalendar, hReview, xFolk, hResume, hListing, citation, media-info and others provide a foundation for normalizing the information sharing. Some major operators are starting to get it – for example my LinkedIn profile contains hCard and hResume data. If you like hresume, take a look at DOAC while you are at it !

Some code is already available to process that available information. For example, identity-matcher is a Rails plugin to match identities and import social network graphs across any site supporting the appropriate Microformats. This code extracted from the codebase of dopplr.com and this is probably how Dopplr now supports import from other social networks like Twitter.

But part of the appeal of a social networking platform is how it empowers the user with control of what information he makes available, how it makes it available and to whom. So microformats are not sufficient : a permission management and access control system is necessary, and that requires an authentication mechanism. That naturally takes us to OpenID.

OpenID is a decentralized single sign-on system. Using OpenID-enabled sites, web users do not need to remember traditional authentication tokens such as username and password. Instead, they only need to be previously registered on a website with an “identity provider”. OpenID solves the authentication problem without relying on any centralized website to confirm digital identity.

The OpenID project is going even further than just authentication – authentication is just the surface. What OpenID really is about is digital identity management. OpenID Attribute Exchange is an OpenID service extension for exchanging identity information between endpoints. Although the list of attributes included in the OpenID Attribute Exchange schema does not match a nice collection of microformats, a process is defined to submit new attributes. And anyway, such a standard looks like a great fit to cover the need for keeping the user in control of his own content.

Finally, the social graph is the support for applications that must interact with the user’s information wherever it is hosted. That is why Google’s OpenSocial specification proposes a common set of API for social applications across multiple websites.

So a few technologies for social networking do exist, and they seem able to provide building blocks for an open distributed social networking. The concept of open distributed social networking itself has been in people’s mind for a long time. But until now only large proprietary platforms have succeeded in seducing a critical mass of users. Thanks to them, there is now a large body of information about the best practices and use-cases. What is now necessary is to think about how those use-cases can be ported into a decentralized open environment.

Porting a closed single provider system into an open distributed environment while equaling or surpassing the quality of the user experience is a huge challenge. But social networking and digital identity management are such critical activities in people’s life that the momentum behind opening them may soon be as large as the one that led Internet pioneers to break down the walls between networks.

Brain dump and Email and Jabber and Social networking and The Web19 Nov 2007 at 10:43 by Jean-Marc Liotier

Most social tools come and go. The ones that stay share a common feature : openness. For example, email is open : chose any technology, chose any provider or be your own provider, chose any client, any platform – any way you do it you are still connected to the whole world.

If you have the slightest understanding of your own interest, then there is no way you should even consider using a closed platform as your primary mean of communication. Why would you willingly chose to put your most critical asset outside of your control ?

Many users will object that they gladly surrender control to closed social networking platforms because plain email does not meet their sophisticated communications needs and they are not willing to invest in developing the skills currently required to participated efficiently in the blogging sphere. That is a tragedy because the social graph is quickly becoming the glue of the connected services.

And even if the functionality was sufficient, we would still have a huge mindshare gap to bridge. XMPP provides nice basic instant messenging and presence management in an open environment, but most users still prefer proprietary centralized networks and happily trade freedom for webcam compatibility.

But similar battles have been fought and won in the past : Compuserve, AOL, The Source, Prodigy and their ilk have all dissolved in the Internet. The forces of openness now have a new crusade to embark upon : we must take the best use cases of the closed social networking world and port them in the open !

Open is everything – the rest is details. That is what drew me to the Internet fifteen years ago.

Design and The Web10 Nov 2007 at 16:48 by Jean-Marc Liotier

Because I live and breath computing and the Internet, I often forget what the casual users experience. So sometimes I watch one at random over his shoulder just to keep abreast of what the Myspace generation and the typewriter generation are doing. And every time my battle-hardened sysadmin heart still shudders at the sights.

These days, my favorite casual user habit is searching for an obvious URL using a search engine. For example I have seen “yahoo mail” typed as an argument in the Google search form – no once, but several times and by different users ! I would have thought that http://mail.yahoo.com/ or http://www.yahoo.com/mail/ or http://yahoo.com/mail or whatever other variations that have been setup by Yahoo provide enough obvious ways to reach the service. But apparently they don’t.

If even the most obvious of all are not typed, we can infer that today’s casual user does not memorize any URL anymore. Maybe the clean URL that we strive to produce are intended for the sole consumption of search engines and power users. And that’s one more reason why portals are so important.

PHP and Systems19 Oct 2007 at 10:12 by Jean-Marc Liotier

PHP :

  • Sparkline is a PHP library that produces Edward Tufte inspired “intense, simple, wordlike graphics”. I like the way sparklines spruce up text without interrupting its flow.
  • Libchart is a simple PHP charting library that reminds me of the core functionality of the Jpgraph. Simple to deploy and does the basics well.
  • Jpgraph can be used to create numerous types of graphs either on-line or written to a file. The range of functionality is very impressive and new features get added all the time. But basic use remains simple. Jpgraph is used by many Free software projects such as Mantis.
  • PEAR::Image_Graph was formerly known as GraPHPite. It supports a good choice of graph types, five types of data sources and many output formats.
  • Artichow is yet another small PHP charting library. Functionality is limited but it does look clean. The downside is that everything about it is in French… But that may be an upside if you are a French speaker !

Command-line and CGI :

  • Ploticus provides a C and Python API, and a Perl command line that can be called from CGI. It is a mature solution that is no longer on the cutting edge but still satisfy many users.

DHTML and Javascript :

  • Timeplot is a DHTML-based AJAXy widget for plotting time series and overlay time-based events over them (with the same data formats that Timeline supports). It has limited functionnality, but what it does looks very good and easy to integrate.
  • Plotkit is aimed at web applications that require plotting series of data in modern web browsers. It requires MochiKit and supports HTML Canvas and SVG, which makes it a cutting edge way to render graphics. It supports graphing from a dynamic table.
  • Plotr is a fork of Plotkit with no need for MochiKit. The result is an incredibly lightweight charting framework : only 12 KB !

Multiplatform :

Systems17 Oct 2007 at 11:49 by Jean-Marc Liotier

A new job generally mean a new computer. In most old big companies, a computer is still synonymous with having to suffer using Microsoft Windows. But despair not : a good selection of additional software will make Windows more functional and your workstation experience more bearable.

Here is a list of the ones I setup most of the time. It covers most of the indispensable everyday utilities :

Jxplorer LDAP client
Filezilla FTP client
Xchat IRC client
Notepad++ text editor
Psi Jabber client
Putty SSH client
WinSCP SCP client
Irfanview image viewer
PalmOne Palm Desktop
Virtual Dimension virtual desktop
Winmerge diff and merge utility
7zip archive manager
Mozilla Firefox Web browser
VMware player
Foxit PDF reader
Tortoise SVN client
Thunderbird mail client
Kompozer HTML editor
Unison file synchronization tool
AdAware system cleanser
Gimp image editor
Openoffice suite
GPG4Win
Tora Oracle SQL client

Of course that will not get you anywhere near as far as a half decent setup of Ubuntu or Debian, and once you will have hunted down, downloaded and installed each of those independant packages with no centralized package management you will have a much better understanding of what super cow powers are all about. But at least it is a start and you can quite comfortably survive with that kit.

As a bonus, here are the few useful Thunderbird that I use all the time :

Attachment Extractor
Headers Toggle
Rewrap Button
Remove Duplicate Messages
Enigmail

Africa and Music15 Oct 2007 at 20:07 by Jean-Marc Liotier

Sorting old papers I stumbled upon a note I had taken while underway in Zimbabwe. It is the lyrics of a Shona lullaby. My phonetic transcription was like this – Elisabeth posted a comment with a corrected transcript :

Shiri yakanaka unoendepi ?

Huya, huya, huya titambe

Ndiri kuenda kumakore

Kuti ndifanane nemakore

I have not found those lyrics anywhere else on the web, but I was told this song is a classic for many children. I don’t remember the exact meaning of the song – the closest thing I have to a translation is on the BBC Radio 3 site where a Zimbabwean mother explains :

‘Here’s your nice bed’ (you will be imagining there’s a bed flying up in sky) ‘Hey nice bed where are you going? Please, come to me, Come let’s play together.’ And the bed will say ‘Oh no, I’m going into the clouds I want to be as nice as the clouds.’

Now you better have a good answer ready for when your kids ask you why the bed goes flying into the clouds… Until then you an go to the BBC Radio 3 site to listen to the tune from a recording of that woman singing Shiri Yakanaka !

I sang that to my daughter when she was a baby a few years ago, and it worked like a charm…

Music and Systems13 Oct 2007 at 17:24 by Jean-Marc Liotier

This took me a ridiculous chunk of afternoon to solve, and the solution was surprising to me. So I guess a full report will be useful to spare other users the same process…

Symptoms :

  • You mount a share with music files over SMB or CIFS. With a file browser you can navigate the tree, and you can play the files perfectly.
  • You add local music files to your Amarok collection, they appear and Amarok is fully functional.
  • You add the mount point of the network share to your collection. You then update or rescan your collection.
  • At some point during the scan, a notification pops up with the message : “The Collection Scanner was unable to process these files“. Once you acknowledge the notification, the scan halts and no files appear to have been added to the collection. As a bonus, KNotify may crash with signal 11 (SIGSEGV).
  • On the Samba file server, a ridiculously high number of files is opened. So many that on the client if you try even a ‘ls’ anywhere on the mounted share you will get a complain about “too many files opened”. In normal operation, Amarok only opens one file at a time during a scan.
  • Desperate, you try exiting Amarok. It crashes hard on termination and brings down the whole X session along with him.
  • You are pretty pissed off.

In summary, both sides work perfectly fine individually, but trying to get them to work together fails and there are no useful pointers.

Failing to root out the bug and not finding anything obvious on the Web I headed to the Amarok forums. There I quickly found that about each and every thread mentioning Samba ended with a link to the Samba page of the Amarok wiki. I found the content to be basic and apparently completely unrelated with my problem, but reading between the lines I understood the key to the solution…

If you have read and write rights on a share, there are probably no problems any way you put it. But if you only have read rights on the share and mount it read and write, then Amarok is all confused ! That is what was happening to me.

A few days ago, before letting a novice user play music on my workstation , in order to protect the files from harm, I had quickly removed my username from the write list of the music share on the file server. And I had forgotten about that…

So I went back to faulty /etc/smb.conf and I added my username to the “write list” parameters. I reloaded the Samba configuration, launched Amarok, the collection was automatically rescanned and my world was back to harmony.

Let the music play !

Military and Politics11 Oct 2007 at 14:11 by Jean-Marc Liotier

The Economist has just concluded a series of detailed articles on terrorism and civil liberties (1, 2, 3). I have been particularly touched by how the editorial introduction to the series has made an essential point in a stunningly courageous way :

“[..] We accept that letting secret policemen spy on citizens, detain them without trial and use torture to extract information makes it easier to foil terrorist plots. To eschew such tools is to fight terrorism with one hand tied behind your back. But that—with one hand tied behind their back—is precisely how democracies ought to fight terrorism. [..]

Human rights are part of what it means to be civilised. Locking up suspected terrorists—and why not potential murderers, rapists and paedophiles, too?—before they commit crimes would probably make society safer. Dozens of plots may have been foiled and thousands of lives saved as a result of some of the unsavoury practices now being employed in the name of fighting terrorism. Dropping such practices in order to preserve freedom may cost many lives. So be it”.

Considering the care that the editors of The Economist usually take in exercising opinions, such bold stand against the way we currently fight against terrorism has taken me by surprise. And it expresses better than I so far managed to conceive the profound reason why, in the fight to uphold our values, letting the ends justify the means is counter-productive : you cannot fight in the name of your own values if you sell your own soul.

Different regimes have different constraints, choosing democracy comes with specific ones and acting within them is the price we must keep paying without reneging. If we don’t we are just loosing ourselves and there will only be pyrrhic victories.

Brain dump and Military and Politics10 Oct 2007 at 20:53 by Jean-Marc Liotier

The song “Guantanamera” is such an omnipresent timeless classic tune that the mere mention of it immediately recalls its irresistible groove in anyone. But Guantanamo is now a name draped in an infamy that may well become just as famous as the song. So since a couple of years, every time I think about that song I can’t help but associate the concepts.

Now I want you to associate them too ! Every time you hear that song I want you to think about all the losers imprisoned in Camp X-ray without cause. Think about how arbitrary arrest, indefinite detention without trial, extraordinary rendition and suspension of habeas corpus are actually sapping at the foundation of the very freedom that our democracies are supposed to uphold.

Yo soy un hombre sincero
De donde crece la palma
Y antes de morirme quiero
Echar mis versos del alma

Guantanamera, guajira Guantanamera (..)

I am a sincere man
From where the palm tree grows
And before dying I want
To let out the verses of my soul

Peasant girl from Guantanamo (..)

Mi verso es de un verde claro
Y de un carmín encendido
Mi verso es un ciervo herido
Que busca en el monte amparo

Guantanamera, guajira Guantanamera (..)

My verse is light green
And it is flaming red
My verse is a wounded stag
Who seeks refuge on the mountain

Peasant girl from Guantanamo (..)

Cultivo una rosa blanca
En julio como en enero
Para el amigo sincero
Que me da su mano franca

Guantanamera, guajira Guantanamera (..)

I grow a white rose
In July just as in January
For the honest friend
Who gives me his open hand

Peasant girl from Guantanamo (..)

Con los pobres de la tierra
Quiero yo mi suerte echar
El arroyo de la sierra
Me complace más que el mar

Guantanamera, guajira Guantanamera (..)

With the poor people of the earth
I want to cast my lot
The brook of the mountains
Gives me more pleasure than the sea

Peasant girl from Guantanamo (..)

When I started writing this post five minutes ago, I thought I was the only one to have thought of using that song as a symbol… But as usual in the global memetic ocean, like-minded individuals exposed to the same set of stimuli will produce the same response – so much for my delusion of being creative… Shortly after starting researching some context for this article I stumbled about the most unlikely like-minded individual : Richard Stallman the Free Software pionneer and undefatiguable advocate !

Richard Stallman even went a step further by writing new lyrics for the tune and recorded it with amateur Cuban musicians. So pass the mike to Sir Richard !

Me odiaba mi primo
Por celos a mi carrera.
Lo arrestaron y dijo
Que terrorista yo era.

Guantanamero, soy preso guantanamero. (..]

My cousin hated me;
He was jealous of my career.
They arrested him and he said
I was a terrorist.

Guantanaman, I’m a Guantanaman prisoner. (..)

Ha decidido el imperio
Tenerme por siempre preso
Y la cuestión es hacerlo
Con o sin falso proceso.

Guantanamero, soy preso guantanamero. (..]

The empire has decided
To keep me in prison forever.
The question is whether to do it
With or without a fake trial.

Guantanaman, I’m a Guantanaman prisoner. (..)

Cuando me hieren el cuerpo,
Dicen que no me torturan.
Causan heridas profundas
De esas que nunca se curan.

Guantanamero, soy preso guantanamero. (..]

When they injure my body
They say they are not torturing me.
They cause me grave wounds
Such as never heal.

Guantanaman, I’m a Guantanaman prisoner. (..)

No me permiten que duerma:
Mi fin no es un misterio.
Voy a salir cuando muera
O caiga el gran imperio.

Guantanamero, soy preso guantanamero. (..]

They don’t let me sleep:
My end is no mystery.
I will get out when I die
Or the great empire falls.

Guantanaman, I’m a Guantanaman prisoner. (..)

Brain dump and Knowledge management and Mobile computing and The Web10 Oct 2007 at 15:47 by Jean-Marc Liotier

Someone asked : what is the mobile Web ? Here is my take :

The mobile Web is not just about overcoming the connectivity, ergonomics and device constraints that make access more difficult than on the desktop that the Web originated on. Focusing on these issues is merely playing catch-up with the “normal” Web.

The value that the mobile Web brings is context sensitivity. The mobile Web is about being there, in contact with the physical world away from a desktop. So bring on location sensitive services, search by photo similarity using the on board camera, search by sound similarity using the on board microphone, augmented reality (for navigation, social life or technical help), QR code readers and barcode readers using the camera, RFID readers, permanent presence management including location and activity…

Shoehorning complex applications on a handheld device is hopeless. On the other hand, the handheld device is the one you being with you, so when time comes to interact with the environment anywhere there is just no other choice. Linking the physical world to the virtual one, that is the mobile Web.

When the physical world merges with the data, wonderful things happen !

« Previous PageNext Page »