This is Saqib Ali's Typepad Profile.
Join Typepad and start following Saqib Ali's activity
Join Now!
Already a member? Sign In
Saqib Ali
Scotts Valley, CA
Interests: Law, Legal issues surrounding privacy, computing etc.
Recent Activity
Saqib Ali has shared their blog My Blog
Apr 20, 2013
Saqib Ali has shared their blog Capital Punishment
Apr 20, 2013
@Marcel Kolsteren Re: SSOCircle Who would wanna trust a SAML provider whose website is powered by FreeWebsiteTemplates and Cooltext :) Saqib
Toggle Commented Sep 23, 2010 on OpenID: technology or a movement? at David Recordon
1 reply
Thus my argument that ALL OpenID providers should utilize unbound discoverable URLs unbound discoverable URLs provide the UI/UX that will enable wider adoption of OpenID. Nobody remembers their OpenID URL, nor should we expect them to. So far only following OpenID providers utilize Unbound Discoverable URLs: myopenid yahoo Hyves myspace myid.net google yahoo japan AOL Verisign Kudos to them, but this list need to grow. Here is what I think OpenID UI/UX should look like: http://crowdedintelligence.appspot.com/ Note: nowhere on the page, the word OpenID is mentioned...........
Toggle Commented Sep 22, 2010 on OpenID: technology or a movement? at David Recordon
1 reply
Yahoo doesn't need to add more functions, they just need to clean up the cluttered UI/UX. Adding more "visual content" to a site to attract more users is a strategy from 1990s. Younger generation doesn't care about how "cool" the search page looks. We just care about how fast we can find the information we are looking for. I don't plan on staying on the search results pages to "engage" with the "visual content". Search results is proxy page, it should it be invisible, and should NOT distract me.
1 reply
Beth, Loved the Network Orientation slide. Can I re-use it (with proper credits, of course)? Thanks, Saqib
@Adrian: While I don't mind using Java Applet now and then, but using it to compose an email (for e.g. in gmail) will be painful. Also last year at Google I/O there was a demo with just HTML 5 Canvas and Javascript for a Cut and Paste functionality. I think it is possible to get around the security restrictions. I will have to research this a little bit more.
@Adrian: I like the cut and paste functionality in EditLive, however it requires Java. Utilizing HTML 5 Canvas and AJAX, you can do away with Java, and make it a light weight editor.
@Adrian: I was hoping that with the aid of the HTML 5 Canvas, it would be possible to cut and paste images in a Rich Text editor.......
@Adrian: Is the Accessilibilty Checker validating against WCAG 2.0? And do you have plans to utilize HTML 5 Canvas?
p.s. I have not seen any 3rd party rich text editors that utilize the HTML 5 Canvas. We desperately need that......
yes and yes. One thing I don't like about the Lotus QuickR is that the default editor is no good. But it can be replaced with a 3rd party rich-text editor (i heard, haven't tried it yet). Also the first 3rd party Rich Text web editor that fully utilizes HTML 5 Canvas, will gain lot of market share. Saqib
Am I intrigued? Probably not. From what I have read, Vulcan seems like a Lotus Connections powered Inbox. I think that is a good move, since I love Lotus Connections, but I think the Inbox has to evolve too. More importantly, I intrigued by the adoption of the HTML 5. I think HTML 5 is the key for cross-platform rich web apps, especially the Canvas tag for handling images and the HTML Cache DB for local email archives.
Recently Burton Group has produced a lot good of research in the area of Identity. Hopefully Gartner will keep the momentum going.
Dr. Wang, When the consumer of the Cloud Service is not in a direct contractual relationship with each party of the service stack that might be considered to have custody of its data, there is always a risk of non-compliance. However, I don't like the idea of the consumer signing a contract with each and every party involved in the service stack. That will be a legal dept. (outside counsel’s) dream come true. Think of all the billable hours. The beauty of the Cloud Computing paradigm is that the customer doesn't have to worry about the exact location of the data, as long as the provider can guarantee the Confidentiality, Integrity and the Availability of the Data and Logs. In fact I prefer that the contract between the customer and the cloud computing provider doesn't include the clause about the exact location of the data. This gives the provider the agility and nimbleness during disaster recovery. Confidentiality needs to be addressed. But I don't think taking apart the service at each layer before signing the contract is the way to go. We need to explore other ways of ensuring Confidentiality. One way to ensure confidentiality of the backup logs you mentioned in your post would be to encrypt them before shipping them off for backup or use a host-proof hosting encrypted vault. That way the exact location of the backup won’t be an issue. Just my $0.02. Saqib
Niki, Check out http://www.youtube.com/watch?v=G04SRRnVask . The video highlights the need for lawyers to have an excellent Social Media enabled online presence. Saqib
Niki, What is the timeline for the two books? btw, not sure if you know this, the Google Page Rank for this (nylawblog) blog is 5, whereas the 21stcenturylaw (on WP) blog scores a 4. Which are excellent rankings for personal blogs. So kudos to you :) Saqib
Dr. Wang, I agree that Facebook and other SM sites in general haven't done a good job of making the users aware of what information is available publicly. However, I don't think it is entirely up to FB to provide this user awareness training. New cars come with an Operator's Manual but not a Driving Manual. Driving proficiency is assumed with possession of a Driver's License. And if the driver gets in an accident due to poor driving skills, the car manufacturer is not be blamed. I am not saying that we need to regulate Internet usage privileges to the point that we require licenses to connect to the internet, but at the same time we cannot hold SM sites accountable. In the end, it is up to us to join or not join Facebook. Saqib
Bill, The guidance document sounds interesting and very timely. I don't subscribe to Burton Group. Any chance that the document will be available for free download from Burton Group's website? Saqib
Happy Holidays to you too Niki. Enjoyed reading your blog posts this year. Keep on blogging!! :)
Toggle Commented Dec 25, 2009 on Happy Holidays! at Sui Generis--a New York law blog
Nicole, I have to disagree. As you alluded to in your blog post, the word inter has a negative connotation. Merriam Webster defines it as “to deposit (a dead body) in the earth or in a tomb”. With the social media, we are not really getting rid of the media, just making it bi-directional i.e. more social. Why not use the phrase emergent media? Saqib P.S. Also check out Prof. McAfee’s blog post titled The S Word
re: Enterprises Will Shape the Next Generation of What We've Called "Social Media" This is very true. One of the major push back for social media apps in an enterprise is that they are not integrated into the workflow. Collaboration using Social Media works best when it’s in the flow of work. Novell Pulse added the 'social' element to the Google Wave Platform. Novell designed the the next killer e2.0 app. Who would have thunk?
1 reply
Since we are the poetic mood, I will share few lines from W.H. Auden's "Law Like Love": Law, says the judge as he looks down his nose, Speaking clearly and most severely, Law is as I've told you before, Law is as you know I suppose, Law is but let me explain it once more, Law is The Law.
(note: I posted this comment on Nicole's other blog as well) Excellent post! I suppose the nay sayers (i.e. the people opposing emerging technologies) made similar arguments when the world moved from paper based memos to email for official use. The memos were filed in a in a locked filing cabinet. And any type of tampering was fairly evident. But once we moved electronic mail, there was no locked metal filing cabinet. Everything resided on a user’s PC, which could be infested with malware and rootkits. How do you know that some rootkit was not modifying or deleting the user’s emails? The rules of investigation and evidence collection changed with the introduction of email, and same will happen when we move to other emerging technologies for communication and collaboration. Things change. Having said this, instead of changing attitudes, we need to influence the right attitude about emerging technologies.
very very cool! :)
Toggle Commented Nov 22, 2009 on Painting of Morning Coffee at Portals and KM