Categories
Uncategorized

Latest Blogware developments

Major improvements to Blogware’s “Help” files

Photo: The Beatles, in a promo photo for the movie 'Help!'

The Help files for Blogware are improving in leaps and bounds as I write more every day. Check them out!

  • If you’re a Blogware user, you’ll find more useful information to help you get the most out of Blogware (and more is on the way!).
  • If you’re not a Blogware user, but interested in becoming either a Blogware reseller or user, they’ll give you an idea of what Blogware is like.
  • If you have any suggestions about the Help file, whether it’s to correct an error, add something that’s missing, or clear up something that’s unclear or confusing, let me know in the comments for this entry!

I make additions to Blogware’s Help files every day, and my plan is to make it the most complete and useful help file for any blogging software out there.

If you thought you heard the sound of a gauntlet being thrown, that’s because I just threw one.

Blogware supports book, music and movie reviews!

“Big fat hairy deal,” you might say. “There’s no difference between a blog entry about what I did last night and one with my review of Cory Doctorow’s novel, Down and Out in the Magic Kingdom.”

You would be correct — and therein lies the problem. We humans can tell the difference between blog entries that are reviews and blog entries that aren’t by context; our fancy-pants brains are pretty good at that sort of thing. But our dumb computers aren’t — they’re only good as following incredibly simple instructions with incredible speed. As far as a computer is concerned, there is no difference between a blog entry about what you did last night and what you think of Cory’s book. Or the Yeah Yeah Yeahs’ album. Or that masterpiece of cinema-guano, Freddy vs. Jason. To a computer, it’s all text (actually, it’s all numbers, but let’s not get too nit-picky).

The end result of this ignorance of your computer’s part is that you end up having to searching for things on the Internet in a roundabout way. When you Google for reviews of a certain book, you’re not actually asking for reviews of that book, you’re asking for documents that contain words that you think are likely to be in reviews of that book. The outcome varies; sometimes you get lucky and get what you want, sometimes you have to sift through the results.

Since computers are terrible at classifying information by looking at its context, methods of marking data with metadata — additional information about that data — were developed. Using metadata, it’s possible to mark a blog entry with a little note for a computer’s benefit that says “this is an album review for album X by artist Y, and my opinion of this album is Z“. Once data’s been marked this way, it’s possible to build programs that can better answer questions like “What do people think of album X?”

Blogware’s reviews are the first step in this direction. Let’s consider one kind of review that Blogware provides: book reviews. In addition to the standard fields for a blog entry (such as “title” and “body”), Blogware also provides extra fields for you to add metadata about your book review. Here’s a screenshot from the entry page for a Blogware book review showing these extra fields:

Screen shot: 'Book Review' section of Blogware's 'Post Book Review' page.

Readers of the review see the usual blog entry accompanied by this little summary box that displays the extra information entered in those extra fields as show below:

Screen shot: 'Book Review' summary table.

Having a summary is like this is a convenience for human readers, but the same information is also put in a form that computers can read. This opens up all kinds of possibilities. It’s now possible to ask a computer to find reviews of a specific book. Or find what people consider to be an author’s best book. The attention span-challenged can find books under 100 pages and David Foster Wallace fans can find other authors afflicted with logorrhea. Using this metadata, it’s even possible to get fancy and find out a hot new author or when an old author “jumped the shark” by correlating reviews with publishing dates. Once a computer is given some kind of understanding of the data, all sorts of useful (and useless, but fun) data-crunching is possible.

If you’d like to read more about entering reviews, check out these Blogware Help pages:

Some geeky detail

Blogware’s review metadata is included in the RSS (2.0) feed. It uses Alf Eaton’s RVW (RSS Review) Module for RSS 2.0. If you want to see RVW in action, take a look at Boss Ross’ review of the Danny Michel album — first the human-readable version, and then the snippet of the RSS feed shown below:

<rvw:item>

      <rvw:link>

      

      </rvw:link>

      <dc:identifier>UPC:B0000BZNJB</dc:identifier>

      <dc:title>Tales from the Invisible Man</dc:title>

      <dc:creator>Danny Michel</dc:creator>

      <dc:date>2003-08-19</dc:date>

      <ent:cloud ent:href="">

          <ent:topic ent:id="Alternative Rock"

          ent:classification="music" ent:href="">

              Alternative Rock

          </ent:topic>

      </ent:cloud>

      <rvw:rating>

          <rvw:minimum>1</rvw:minimum>

          <rvw:maximum>10</rvw:maximum>

          <rvw:value>9</rvw:value>

      </rvw:rating>

  </rvw:item>

  

I’ll cover this in greater detail in a more suitable blog for this topc: The Farm.

As with the help files, questions and comments are welcome.

Categories
It Happened to Me

I don’t ask questions, I just shoot video

Here’s a video (820K QuickTime) from my friend Dorian’s Hallowe’en party last night. These two lovely ladies are demonstrating “The Running Man” dance:

Still frame: Two women in costume demonstrating the 'Running Man' dance.

(Click the still frame above to see the video.)

Categories
Uncategorized

BoingBoing: It’s alive!

However, the “http://boingboing.net” name doesn’t direct you to the site yet. Give the domain name system a day or two to clue in. In the meantime, the magic numbers http://216.126.84.59/ will give you the boingy goodness you’ve been jonesing for.

Categories
Uncategorized

Birthday party announcement

Evite seems to have failed to send my invitations, so I’m going to announce the party here and email my friends later today.

I’m having a joint party — it my 36th birthday and Ashley Bristowe’s something-or-anotherth birthday party on Saturday, November 8th. The fun starts at nine-ish, and the last guest crawled out at almost 7 a.m.. If you know me, you’re invited.

Pictures from last year’s festivities are here.

This year, I’m working on securing the Hot Tub Truck, which I’ve mentioned here and here. Bring a towel and a bathing suit. The truck will be outdoors, so bring something warm to wear between your jaunts from the house to the truck.

I’ll be providing food and some alcohol and mix, but please bring some to contribute to the bathtubs. Like last year, both bathtubs will be full of ice and hold all the bottled drinks.

Dancing always breaks out. This year, we’re going to simplify life for the volunteer DJs and rely on good old iTunes. If you have any requests for music selection, let me know in the comments.

I’m always up for new party ideas, so if you have any, leave them in the comments!

Categories
It Happened to Me

Dad gets Bueller

Life moves pretty fast. You don’t stop and look around once in a while and you could miss it.”

Ferris Bueller

Dad’s been waxing a little bit philosophical in the hospital. During my last visit, this little conversation snippet took place:

Dad: While it’s good to get ahead, you should make sure that you enjoy life while you’re still young.

Me (laughing): Dad, have you watched me at all over the past five years?

Categories
Geek

Geeks and Atkins

I thought I’d blog what Cory would have, had the BoingBoing server been up and running: Salon has an article on the Atkins diet and its appeal to programmers and techies.

It’s worked so far for me; combined with working out, I’ve dropped about 35 pounds.

In honour of this article, I think I’m going to create a Hacker Emblem out of sausage slices tonight.

Categories
Geek

ESR’s proposed hacker emblem

Eric S. “ESR” Raymond, one of the elder statesmen of hackerdom (and aficionado of peanut butter cookies) is proposing that hackers get an emblem:

The Linux folks have their penguin and the BSDers their daemon. Perl’s got a camel, FSF fans have their gnu and OSI’s got an open-source logo. What we haven’t had, historically, is an emblem that represents the entire hacker community of which all these groups are parts. This is a proposal that we adopt one — the glider pattern from the Game of Life.

Here’s the emblem, which might look familiar if you’ve ever been given Conway’s Game of Life as a school programming assignment:

Graphic: ESR's proposed hacker emblem, the 'glider' pattern from Conway's 'Game of Life'.

Raymond reports that “About half the hackers this idea was alpha-tested on instantaneously said ‘Wow! Cool!’ without needing any further explanation.” I’m sure this will be true for the over-30 crowd like me; do any of you under-30s — especially those of you who still have to escape your teen years — recognize this pattern?

ESR’s set up a FAQ page, in which he answers the questions:

  • What is the emblem?
  • Why have an emblem?
  • Why this emblem?
  • Why the emblem should come from him

I think the emblem design’s great: it’s simple, recognizable on a couple of different levels, easy to draw even by hand — even by the least-artisically-gifted person, and can even be represented in text:


   0

    0

  000

Or the binary version:


  010

  001

  111

Or the decimal version of the above binary version, which is the sequence 217. Someone should be able to derive a gang sign from that.

(Yes, someone will derive a gang sign. If you don’t believe me, check out the DefCon conference, which features a distressingly large number of pasty white kids talking “street”.)

One more thing — allow me to recap the true definition of the work “hacker”, taken from the Jargon File:

hacker n. [originally, someone who makes furniture with an axe]

1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.

2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.

3. A person capable of appreciating hack value.

4. A person who is good at programming quickly.

5. An expert at a particular program, or one who frequently does work using it or on it; as in ‘a Unix hacker’. (Definitions 1 through 5 are correlated, and people who fit them congregate.)

6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example.

7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.

8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence ‘password hacker’, ‘network hacker’. The correct term for this sense is cracker.

The term ‘hacker’ also tends to connote membership in the global community defined by the net (see the network and Internet address). For discussion of some of the basics of this culture, see the How To Become A Hacker FAQ. It also implies that the person described is seen to subscribe to some version of the hacker ethic (see hacker ethic).

It is better to be described as a hacker by others than to describe oneself that way. Hackers consider themselves something of an elite (a meritocracy based on ability), though one to which new members are gladly welcome. There is thus a certain ego satisfaction to be had in identifying yourself as a hacker (but if you claim to be one and are not, you’ll quickly be labeled bogus). See also wannabee.

This term seems to have been first adopted as a badge in the 1960s by the hacker culture surrounding TMRC and the MIT AI Lab. We have a report that it was used in a sense close to this entry’s by teenage radio hams and electronics tinkerers in the mid-1950s.

Perhaps the emblem could be used in the same way the “Jesus Fish” was — to separate the True Believers from the Heathen. To establish bona fides, an early Christian would draw one arc of the Jesus Fish, and only one who knew the secret would know to draw the other half. Perhaps hackers could identify each other by drawing the emblem with a couple of missing cells; only a 1337 H4X0R would know which ones to fill in.

I give the emblem a thumbs-up. Where can I get the T-shirt?

[Thanks to snowchyld for the link!]