Techspoitation

Stop getting things done

|
(0)

> annalee@techsploitation.com

TECHSPLOITATION Among business-oriented tech nerds, there is an acronym that is a cult: GTD. It stands for "getting things done," and it comes from the title of a popular time-management book by productivity coach David Allen. Not only has Allen turned GTD into a multimillion-dollar consulting and advice business, but he's also infected the hearts and minds of an entire generation trying to work as fast as the processors in their computers do. Read more »

How to control my body

|
(0)

> annalee@techsploitation.com

TECHSPLOITATION The biological functioning of my body is all over the news right now. Lawmakers and federal regulatory agencies are asking themselves whether I should be allowed to have abortions, and whether I should be allowed to take a drug that prevents me from menstruating. Read more »

The trouble with Twitter

Your life, sped up and squared
|
(0)

annalee@techsploitation.com

TECHSPLOITATION All the Web geeks I know are playing around with Twitter. Basically, Twitter is an online tool for updating your friends about your life on a minute-by-minute basis using mobile devices. You sign up for a Twitter account, build a friends list, and then read and write little things about your day from your mobile or the Web. Read more »

Another digital divide

Low-income communties and high-speed wireless
|
(0)

annalee@techsploitation.com

TECHSPLOITATION A couple weeks ago I moderated a panel discussion about free wireless Internet access in San Francisco. The audience and panelists included people who work on tech projects for the city, activists from impoverished neighborhoods, and civil liberties wonks. Read more »

Smoking Yahoo!'s pipes

How could a tool designed to help you manipulate all kinds of information actually limit your control?
|
(0)

annalee@techsploitation.com

TECHSPLOITATION I've been playing around with Yahoo!'s latest technological experiment on the Web. It's called Pipes, and it's a system designed to help Web-savvy people write simple programs without ever having to read a book about Java. If you visit pipes.yahoo.com, you can take a peek. Visitors to the site are presented with a sheet of virtual graph paper and a list of modules that you can drag onto the paper and connect with pipes. Read more »

Vote Mac

A political machine and a fondness for gizmos
|
(0)

annalee@techsploitation.com

TECHSPLOITATION A Barack Obama fan, supposedly operating on his own time and not as part of the campaign, recently released a rather clumsy attack ad smearing Hilary Clinton on YouTube. No, it's not particularly amazing that spin-doc wannabes are splattering DIY attack ads on video-sharing networks. What's surprising is the content of this particular ad, which rips off an old Macintosh commercial from the 1980s. The message? Read more »

Exploitation

Testing the limits of vulnerability
|
(0)

annalee@techsploitation.com

TECHSPLOITATION Among hackers, exploitation is a social good. Exploiting a piece of software means discovering a little chink in its armor, a vulnerability that could allow a crook to slip through and do unwanted things to innocent people's computers. Read more »

Web trenz!

|
(0)

annalee@techsploitation.com

TECHSPLOITATION It's the time of year when we celebrate new ideas and fresh memes on the Interwebs. For some reason, March is the month for all the big Webbish conferences, such as South by Southwest Interactive and O'Reilly's Emerging Technology shindig in San Diego. Strange new Web apps are announced; venture capital is hurled forcefully at people who wear hoodies over button-down shirts; everybody does freaky shit with their cell phones. Read more »

Data crash of 2027

|
(0)

annalee@techsploitation.com

TECHSPLOITATION All your personal correspondence is on Yahoo! or Hotmail or Gmail. Links to important news and research data are stored in your Del.icio.us account. Your blog, which contains records of a personal and professional nature, is hosted with some company owned by another company called SixApart. Your business contacts are on LinkedIn. Your art portfolio is at Deviant Art. Your photographs are on Flickr. You keep track of where your boyfriends are with Twitter. Read more »

Men are not men

Avatars, in fact, don't reflect social norms at all.
|
(0)

annalee@techsploitation.com

TECHSPLOITATION A couple weeks ago I gave a presentation at the annual meeting of the American Association for the Advancement of Science about how journalists often misreport the results of gender research because they have a lot of preconceived notions about men and women. Most of these notions come from popular culture, and since journalists are in the pop culture biz, none of this should be a big surprise.

Still, sometimes a story is so egregiously reported — and based on such flimsy research — that it takes my breath away. Read more »