Posted 19 April 2014, 5:29 pm
Another great example of gamification brought to our attention over at Gamification CO What’s the best way to talk about the gamification of gambling and gaming? PlayStudios CEO Andrew Pascal took the stage at GSummit SF 2013 to talk about MyVegas, a partnership between MGM Resorts and PlayStudios to bring gamified loyalty and rewards to […]
[Blog] Pete Jenkins | Gamification Consultant | UK: How one teacher is making high school and physics fun by Gamifying the classroomI came across this great article over at Fast Company, a great example of how gamification is helping education. Shawn Young turned physics class into a role-playing game, and now he’s made the game available to teachers everywhere. Please watch and enjoy the video below.
Posted 18 April 2014, 5:26 pm
[Blog] Pete Jenkins | Gamification Consultant | UK: 5 ways employers fail with gamification–and how to avoid themWe came across a great article over at http://hr.blr.com/ describing 5 ways employers fail with gamification and how to avoid them, we agree with their views and we hope this article may help yourself and company. Gamification has the potential to become an integral layer to all employee and customer interactions, if it’s done right. […]
Posted 17 April 2014, 5:43 pm
These 25 examples of gamification in use today cover a broad spectrum, but perhaps there’s something here that will spark an idea for your own gamification project… To see the 25 examples please click here
Posted 17 April 2014, 5:25 pm
I really like the way that Cennydd emphasises the importance of being able to explain the reasoning behind your design decisions:
If you haven’t already, sometime in your career you’ll meet an awkward sonofabitch who wants to know why every pixel is where you put it. You should be able to articulate an answer for that person—yes, for every pixel.
That reminds me of something I read fourteen(!) years ago that’s always stayed with me. In an interview in Digital Web magazine, Joshua Davis was asked “What would you say is beauty in design?” His answer:
Being able to justify every pixel.
It’s called fragmentions and it builds on the work done by Eric and Simon. They proposed using CSS selectors as fragment identifiers. Kevin’s idea is to use the words within the text as anchor points (like an automatic Command+F):
To tell these apart from an id link, I suggest using a double hash - ## for the fragment, and then words that identify the text. For example:
That link will work in your browser because of this script, which Kevin has added to his site. I may well add that script to this site too.
Fragmentions are a nice idea and—to bring it back to Cennydd’s point—nicely explained.
Have you published a response to this? :
Posted 17 April 2014, 3:59 pm
Have you read these?
- How many h1 tags can you have on a page?
- Header tags and how you use them in SEO Copy
- My Favourite Social Media Tools
- How to write a killer About Us page!
- How to produce SEO Copy in eight easy stages
- Which WordPress Plug-ins Do I Use? (23 of them)
- What does SEO mean? How do you define it?
If you’re new to Writing For SEO, or haven’t been here for a while, these are the essential pieces of content.
What do you think is the most useful content here?
Thanks to DaveBleasdale for allowing me to use his image.Have you read these?
- Top Posts on Wednesday 12 March 2014Have you read these? How many h1 tags can you have on a page? Header tags and how you use t...
- Top Posts on Wednesday 3 July 2013Not only are there changes afoot in patterns of traffic to Writing For SEO, but the long reign fo...
- Top Posts on Friday 20 September 2013Five top pieces of content on Writing For SEO: Header tags and how you use them in SEO Copy ...
- Top Posts on Wednesday 19 February 2014Our first Top Posts of 2014... How many h1 tags can you have on a page? Header tags and how...
- Top Posts on Wednesday 27 November 2013Here we go. this week's most popular content on Writing For SEO: Header tags and how you use ...
Posted 17 April 2014, 2:00 pm
Here’s a quick book update – we just released a second Early Release of High Performance Python which adds a chapter on lists, tuples, dictionaries and sets. This is available to anyone who has bought it already (login into O’Reilly to get the update). Shortly we’ll follow with chapters on Matrices and the Multiprocessing module.
One bit of feedback we’ve had is that the images needed to be clearer for small-screen devices – we’ve increased the font sizes and removed the grey backgrounds, the updates will follow soon. If you’re curious about how much paper is involved in writing a book, here’s a clue:
We announce each updates along with requests for feedback via our mailing list.
I’m also planning on running some private training in London later in the year, please contact me if this is interesting? Both High Performance and Data Science are possible.
Ian applies Data Science as an AI/Data Scientist for companies in Mor Consulting, founded the image and text annotation API Annotate.io, co-authored SocialTies, programs Python, authored The Screencasting Handbook, lives in London and is a consumer of fine coffees.
Posted 16 April 2014, 9:11 pm
After the whole Heartbleed fiasco, I’ve decided to continue my march towards improving my online security. I’d already begun the process of using LastPass to store my passwords and generate random passwords for each site, but I hadn’t completed the process, with some sites still using the same passwords, and some having less than ideal strength passwords, so I spent some time today improving my password position. Here’s some of the bad examples of password policy I’ve discovered today.
First up we have Live.com. A maximum of 16 characters from the Microsoft auth service. Seems to accept any character though.
This excellent example is from creditexpert.co.uk, one of the credit agencies here in the UK. They not only restrict to 20 characters, they restrict you to @, ., _ or |. So much for teaching people how to protect themselves online.
Here’s Tesco.com after attempting to change my password to ”QvHn#9#kDD%cdPAQ4&b&ACb4x%48#b”. If you can figure out how this violates their rules, I’d love to know. And before you ask, I tried without numbers and that still failed so it can’t be the “three and only three” thing. The only other idea might be that they meant “‘i.e.” rather than “e.g.”, but I didn’t test that.
Edit: Here is a response from Tesco on Twitter:
Here’s a poor choice from ft.com, refusing to accept non-alphanumeric characters. On the plus side they did allow the full 30 characters in the password.
The finest example of a poor security policy is a company who will remain nameless due to their utter lack of security. Not only did they not use HTTPS, they accepted a 30 character password and silently truncated it to 20 characters. The reason I know this is because when I logged out and tried to log in again and then used the “forgot my password” option, they emailed me the password in plain text.
I have also been setting up two-factor authentication where possible. Most sites use the Google Authenticator application on your mobile to give you a 6 digit code to type in in addition to your password. I highly recommend you set it up too. There’s a useful list of sites that implement 2FA and links to their documentation at http://twofactorauth.org/.
I realise that my choice LastPass requires me to trust them, but I think the advantages outweigh the disadvantages of having many sites using the same passwords and/or low strength passwords. I know various people cleverer than me have looked into their system and failed to find any obvious flaws.
Remember people, when you implement a password, allow the following things:
- Any length of password. You don’t have to worry about length in your database, because when you hash the password, it will be a fixed length. You are hashing your passwords aren’t you?
- Any character. The more possible characters that can be in your passwords, the harder it will be to brute force, as you are increasing the number of permutations a hacker needs to try.
If you are going to place restrictions, please make sure the documentation matches the implementation, provide a client-side implementation to match and provide quick feedback to the user, and make sure you explicitly say what is wrong with the password, rather than referring back to the incorrect documentation.
There are also many JS password strength meters available to show how secure the inputted passwords are. They are possibly a better way of providing feedback about security than having arbitrary policies that actually harm your security. As someone said to me on twitter, it’s not like “password is too strong” was ever a bad thing.
Posted 16 April 2014, 2:03 am
In this week’s internet marketing podcast Andy talks to Kelvin Newman, former Creative Director at SiteVisibility and now Managing Director of Rough Agenda, about email marketing. Kelvin talks about the importance of having character within your emails to stand out from the crowd. He then gives some advice on how to develop your company’s personality and ends by giving some general rules for email content.
Post from Apple Pie & Custard blog by SiteVisibility - An SEO Agency
Personality in Email Marketing – Kelvin Newman – Podcast Episode #242
Posted 15 April 2014, 11:00 am
[Blog] Freelance Copywriter | Web / SEO Copywriter | Dorset / London / Brighton: You should divide your web budget between design, development and content
When you plan your website, how much of your budget do you assign to the content?
Too many organisations spend thousands of pounds on the design and development of their website, but fail to budget for content creation and management.
But what is the point of having a great-looking and easily-navigable website if the content is weak, or wrong, or off-message?
It’s hard to attribute a value to quality content, but it’s easy to see that while great design can impress potential customers, the design can’t tell people what you do, or what makes you unique. Nor can great design answer the questions that your potential customer have.
Great design is an essential component of a successful website, but without well-planned and well-executed content you have a pretty brochure that says nothing about your business.
If you want a website that is more than a costly but beautiful artefact, spinning in space, you need to think carefully about your content.
And if your budget is tight, why not consider spending less on the design and functionality, and spending more on the content?
Posted 15 April 2014, 10:32 am
Hove based Crunch Accounting, the UK’s fastest growing accountancy firm, celebrated its fifth birthday last week and welcomed their 5,000th client - a Taekwondo academy in Reading. Crunch celebrated their fifth anniversary with a staff party at their ...
Posted 14 April 2014, 1:00 am
[Blog] Wired Sussex Digital Media News: City & Guilds Kineo Managed Learning Service Benefits From Acquisition of MindsetThe City and Guilds Group has announced today that it has acquired Mindset, a digital learning company that provides services to colleges and employers in the UK. Mindset has developed a leading platform known as Profiler to manage and deliver functional ...
Posted 14 April 2014, 1:00 am
Many people are—quite rightly, in my opinion—upset about the prospect of DRM landing in the W3C HTML specification at the behest of media companies like Netflix and the MPAA.
This would mean that a web browser would have to include support for the plugin-like architecture of Encrypted Media Extensions if they want to claim standards compliance.
A common rebuttal to any concerns about this is that any such concerns are hypocritical. After all, we’re quite happy to use other technologies—Apple TV, Silverlight, etc.—that have DRM baked in.
I think that this rebuttal is a crock of shit.
It is precisely because other technologies are locked down that it’s important to keep the web open.
I own an Apple TV. I use it to watch Netflix. So I’m using DRM-encumbered technologies all the time. But I will fight tooth and nail to keep DRM out of web browsers. That’s not hypocrisy. That’s a quarantine measure.
From what I’ve seen, this is a discussion of pragmatism: given that DRM exists and movies use it and people want movies, is it a good idea to integrate DRM movie playback more tightly with the web?
His conclusion perfectly encapsulates why I watch Netflix on my Apple TV and I don’t want DRM on the web:
The argument has been made that if the web doesn’t embrace this stuff, people won’t stop watching videos: they’ll just go somewhere other than the web to get them, and that is a correct argument. But what is the point in bringing people to the web to watch their videos, if in order to do so the web becomes platform-specific and unopen and balkanised?
As an addendum, I heard a similar “you’re being a hypocrite” argument when I raised security concerns about EME at the last TAG meetup in London:
I tried to steer things away from the ethical questions and back to the technical side of things by voicing my concerns with the security model of EME. Reading the excellent description by Henri, sentences like this should give you the heebie-jeebies:
Alex told me that my phone already runs code that I cannot inspect and does things that I have no control over. So hey, what does it matter if my web browser does the same thing, right?
I’m reminded of something that Anne wrote four years ago when a vulnerability was discovered that affected Flash, Java, and web browsers:
We have higher standards for browsers.
Have you published a response to this? :
Posted 12 April 2014, 1:56 pm
Delighted to have been asked as a judge, (since when did i become esteemed) get voting now :)
Posted 11 April 2014, 4:58 pm
These photos are the most recent added to the BNM Flickr Photo pool.
[Flickr] ladies of night 3
Posted by http://heatherbuckley.co.uk, on 3 Apr 2014, 6:02 pm
[Flickr] Brighton Bros
Posted by pg tips2, on 27 Mar 2014, 2:01 pm
[Flickr] Brighton another dimension
Posted by pg tips2, on 22 Mar 2014, 11:22 am
[Flickr] brighton bookshop
Posted by pg tips2, on 16 Mar 2014, 9:10 am
[Flickr] The MARCH of the MERMAIDS
Posted by pg tips2, on 16 Mar 2014, 8:37 am
[Flickr] brighton: homeless punks
Posted by pg tips2, on 15 Mar 2014, 2:27 pm
[Flickr] brighton mothers' day
Posted by pg tips2, on 15 Mar 2014, 2:25 pm
[Flickr] brighton: the sun harvester
Posted by pg tips2, on 13 Mar 2014, 10:59 pm
[Flickr] brighton silver machine
Posted by pg tips2, on 13 Mar 2014, 10:53 pm
[Flickr] brighton saint trinians' hub
Posted by pg tips2, on 12 Mar 2014, 11:11 pm
[Flickr] Brighton Gay Pride Parade 2013: SHE WORE A ...
She was afraid to come out of the locker she was as nervous as she could be she was afraid to come out of the locker she was afraid that somebody would see Two three four tell the people what she wore It was an Itsy Bitsy Teenie Weenie White Polka Dot Boudice... Leopard Print Lycra One…
Photo uploaded by pg tips2, on 13 Apr 2014, 2:46 pm
This list of subject headings is generated from the last 50 posts made to the BNM mailing list which also had a response.
- File recovery after... – 8 posts.
These are links tagged by members of the BNM mailing list with the tag ‘bnm’. If you find something you think other readers may find useful, why not do the same?
[Bookmark] TESAURO BIBLIOTECA NACIONAL DE MAESTROS
Bookmarked by by_volume on Sat, 18 January 14 at 7:35am
[Bookmark] g4u - Harddisk Image Cloning for PCs
[Bookmark] TV Links
Events are taken from the BNM Upcoming Group. There are currently no events to display.