The last sneak peak release of Brent Simmon’s NetNewsWire was in February — and he’s kept up his frantic dev pace with 16 intermediate releases between then and now. Anyway, take a look, and give Nicholas Shanks‘ NSTiger theme a try.
Category: What I do
Apollo Alpha is out, the WOW comes later
There’s a ton of buzz being tossed on the alpha release of Adobe’s new Apollo platform. And reasonably so, as ZDNet blogger Ryan Stewart points out, in a world of Web 2.0 internet-goodness, this is the desktop rearing its head again in the form powerful RIAs.
I’ll leave the coverage to other folks, but in the meantime, I installed the runtime libraries and ran the sample apps included — grabbing a bunch of screenshots along the way that you should take a look at.
I also set up a Flickr group for other screenshots and a Ma.gnolia group for collecting news and other Apollo-related links.
I’m particularly excited about Apollo given its advance of the state of web tech… and the best is yet to come (though Finetune gives a taste of where we’re starting from). At the same time, I’d prefer a slightly lest costly and more open — but equally intuitive and capable — solution. OpenLaszlo, where y’at?
Alex King releases Twitter Tools beta for WordPress
Alex King has released a WordPress plugin that links your WordPress blog to your Twitter account, allowing you to pull your “tweets” into your blog or post directly to Twitter from WordPress. Among other features is a sidebar widget for latest tweets and a forthcoming digest mode.
IconBuffet and Shopify add support for OpenID
Two more announcements for OpenID adoption — but this time on the consuming side (as opposed to my originally incorrect report about WordPress.com — for now, they’re only serving as an identity provider).
The first is Shopify, a great Rails-based custom store application. As Alex points out, these guys really get it right — and make it super easy to create compelling marketplaces. And now, it’s super easy to log in with OpenID.
Meanwhile, IconBuffet has gone through a major overhaul, becoming something of a social network for … icon enthusiasts! (Sweet!) One of the more existing aspects of the relaunch (at least for me) is their use of OpenID: you can either create a new account with an existing OpenID (say, your WordPress.com blog URL) or you associate your existing account with an OpenID. Either way, they too’ve made it really easy to get going with OpenID.
I imagine that these won’t be the last of the increasing deployments of OpenID in the medium- to long-tail (read: not Google or IBM, but small business community). What’s so existing about these recent additions is their proximity to commerce — and how folks like Shopify could eventually weave a web service that allows you to check out — entirely by way of logging in to your OpenID provider. If you choose a good OpenID provider, you can start to see how the CardSpace metaphor makes sense — just like when you go out to eat and depending on whether it’s a business meal or a personal expense, you’ll use a different credit card to pay.
The same thing is true for OpenID — where you can have as many OpenIDs as you like and you can pick among them for different uses or purposes. It’s only a matter of time before I go to check out at IconBuffet, I login with my WordPress.com OpenID and I’m able to use credits that I’ve purchased on WordPress.com to pay for my icons — with no need to reach for the credit card, to fill in my address info or any of that ever again!
Now, if that doesn’t sound exciting, you might want to check your pulse. 😉
37 Signals’ next app Highrise will support OpenID
I got an email today from 37 Signals today about their forthcoming CRM tool called Highrise (formerly known as Sunrise). Curious to see where the project was at, I went and snooped around, trying out some common beta URLs to see if I could get a sneak peak… (naughty naughty) and, finding nothing, it dawned on me that Jason Fried was probably using his standard domain prefix for his account… just as he’s done with the Backpack reviews.
Sure enough, there was a welcome page at jf.highrisehq.com but what else did I discover? None other than a link to “Login with OpenID”. I tried logging in and it went through all the proper steps — so it does look like this is a functioning feature.
So it appears that the 37 Signals guys have finally drunk the Koolaid and will be supporting OpenID… I asked for this awhile ago but now, with DHH on the case and writing code, it seems that it’s actually going to happen.
And I couldn’t be more excited about it. Finally, one login for all my Basecamps, Backpacks, Campfires, Tada Lists… and now, Highrise. This is exactly the way it’s supposed to work.
WordPress.com adds support for OpenID
In talking to Matt last Friday at the Adaptive Path party, I asked him when OpenID was coming to WordPress.com — the hosted blogging service — and he replied “Monday”.
Well, a day late but hardly a dollar short, WordPress.com has added bi-directional support for OpenID.
What this means is that you can both sign in to WordPress.com using your existing OpenIDs (making WordPress.com a “consumer”) as well as use your WordPress.com URL (for example, https://factoryjoe.wordpress.com) as an OpenID elsewhere, making WordPress.com an iDP or “identity provider”.
The FAQ entry is pretty descriptive and I’d recommend you take a look at it. WordPress.com now joins a growing array of service providers offering support for this grassroots-driven authentication protocol.
No word on when OpenID will hit core of the WordPress project, but there are already two great efforts driven first by Alan Castonguay and more recently Will Norris — which point to a positive future between the two open source initiatives.
A design pattern for image and figure alignment
Dan Cederholm proposed the idea of a figure microformat some time ago and I followed up with a post the microformats discuss list. I’ve continued thinking about it and after throwing down with Tantek over IM, realized that K2‘s presentational approach of using alignleft, alignright and center classnames on images just didn’t hold up over time and, as Tantek asserted, was worse than being semanticly neutral.
Therefore, I decided and have been using the following approach to laying out images in my blog posts:
.code { border: 1px solid #eee; list-style-type: decimal-leading-zero; padding: 5px; margin: 0; }
.code code { display: block; padding: 3px; margin-bottom: 0; }
.code li { background: #fff; border: 1px solid #ccc; margin: 0 0 2px 2.2em; }
a img {border:0;}img.figure {max-width:460px;border:2px solid #f7f7f7;}img.figure-a {margin-left:auto;margin-right:auto;display:block;}img.figure-b {float:right;border:0;margin:0 0 6px 6px;}img.figure-c {float:left;border:0;margin:0 6px 6px 0;}
Thus, if you apply the figure class to an image on its own line, it can’t be larger than a setting of your choosing (i.e. to not overlap columns, at least in Firefox) and will have a nice border outlining it. Adding figure-a will center it on the line, figure-b will align it to the right and figure-c will align it to the left.
I chose these names after consulting with Tantek, reading Dan’s piece and thinking about the multiple uses these classes might have beyond images (i.e. for formatting tables or graphs). Figures are often cited in textbooks and newspapers and currently don’t conflict with any other microformat.
I’d like to see the next versions of Sandbox and K2 support this and deprecate the alignleft, alignright and center image classes in subsequent versions. I’d also like NetNewsWire, Bloglines and other feed readers to support these basic alignment styles. But until then, feel free to use this markup in your own projects and spread the pattern!
Microformatting the Future of Web Apps
Lisa from FoWA notified me that she’s since incorporated my hcalendar changes into the official schedule. Nice!
I wanted to draw attention to the effort put into the schedule for the upcoming Future of Web Apps (which we’re in London for). One the surface, it’s a great looking schedule — under the hood, you’ll find microformats marking up the times of the sessions. A nice effort, to be sure, except that their effort lacks a certain… accuracy.
I point this out for two reasons: one, I’d love to see the schedule fixed so that you can download it into your calendar. Second, it serves as a good example of why the Microformats community has been wise to minimize the use of both hidden microformatted content as well as invisible meta data as much as possible.
To illustrate the problem, let me point out two important elements of the hcalendar microformat. These elements specify when an event begins and ends respectively. From the icalendar standard, these values are indicated by the DTSTART and DTEND attributes. For example, this code would indicate that an event starts on Feb 20th at 6pm in London:
<abbr class="dtstart" title="20070220T1800Z">6pm</abbr>
However, when viewed in a browser, it looks like this: 6pm, and taken out of context, that 6pm could happen on any day of any year in any timezone. By marking up that time with an ISO datetime in the context of an hcalendar object, we know exactly what time and in what timezone we’re talking about.
So, looking at the FoWA schedule, you don’t know it, but even though it looks like it’s offering all the right times and correct information in the human-facing data, delving into the microformatted data will reveal a very different agenda, specifically one that takes place in 2006 and goes backwards in time, with some events ending on the day before they started.
Again, they’re certainly to be commended for their efforts to microformat their schedule to make it easy to import and subscribe to, but they seem to have missed an opportunity in actually providing a computer-readable schedule.
Here are some things that need to be fixed on the schedule:
- All times need to be contained in <abbr> tags, not <span>s. This is a common error in marking up hcalendar, so watch for this one first.
- Second, the dates specified in the title attributes need to be 100% accurate; it’s better to have no data than incorrect data.
- Third, all start times should begin before the end times, unless you’re marking up the schedule for a time machine.
- I should point out that it would be useful if all people and organization were marked up as hcards, but that’s a separate matter.
- Lastly, it always helps to validate your basic XHTML and run your microformatted content through consuming applications like Operator, X2V or Tails to see if the existing tools can make sense of your data. If not, it won’t work for anyone else either.
I’ve gone head and corrected the schedule. I’d love the for the FoWA team to take these basic changes and incorporate them into their schedule, but I know they’re busy, so in the meantime, feel free download the schedule in ICS format using Brian Suda‘s X2V transform script.
Who’s who on Twitter
Jeff Barr posted a lazy web request for a better view of Twitter contacts and Wes Maldonado responded with a slick Greasemonkey script.
Well, not to be outdone by the scripting folks, I made two similar scripts for Stylish, a Firefox plugin that allows you to apply custom CSS on certain webpages (see what I did for Tangler a couple days ago).
To apply these styles, install the extension and then add either of these styles to Twitter.com:
.code { border: 1px solid #ccc; list-style-type: decimal-leading-zero; padding: 5px; margin: 0; }
.code code { display: block; padding: 3px; margin-bottom: 0; }
.code li { background: #ddd; border: 1px solid #ccc; margin: 0 0 2px 2.2em; }
No avatars
@-moz-document domain("twitter.com") {#friends {margin-top: 12px;}#friends a[rel=contact] {display:block;text-decoration: none !important;margin-bottom:3px;}#friends a[rel=contact] img {display:none;}#friends a[rel=contact]:after {content: attr(title);}}
With avatars
@-moz-document domain("twitter.com") {#friends a[rel=contact] {display:block;text-decoration: none !important;margin-bottom:3px;}#friends a[rel=contact] img {margin-right: 3px; text-decoration: none !important;}#friends a[rel=contact]:after {content: attr(title);}}
OpenID creates a foundation as Microsoft pledges support
You can read it around the web, but, hot on the heels of the creation of the OpenID Foundation, the news from the RSA Security conference is that Bill Gates has announced Microsoft’s intention to support OpenID 2.0.
Scott Kveton, our advisor at JanRain, has a summary and text of the announcement:
Microsoft to Work With the OpenID Community, Collaborating With JanRain, Sxip, and VeriSign
JanRain, Microsoft, Sxip, and VeriSign will collaborate on interoperability between OpenID and Windows CardSpace™ to make the Internet safer and easier to use. Specifically:
As part of OpenID’s security architecture, OpenID will be extended to allow relying parties to explicitly request and be informed of the use of phishing-resistant credentials.
Microsoft recognizes the growth of the OpenID community and believes OpenID plays a significant role in the Internet identity infrastructure. Kim Cameron, Chief Architect of Identity at Microsoft, will work with the OpenID community on authentication and anti-phishing.
JanRain, Sxip, and VeriSign recognize that Information Cards provide significant anti-phishing, privacy, and convenience benefits to users. Information Cards, based on the open WS-Trust standard, are available though Windows CardSpace™.
JanRain and Sxip, leading providers of open source code libraries for blogging and web sites, are announcing they will add support for the Information Cards to their OpenID code bases.
JanRain, Sxip and VeriSign plan to add Information Card support to future identity solutions.
Microsoft plans to support OpenID in future Identity server products.
The four companies have agreed to work together on a “Using Information Cards with OpenID” profile that will make it possible for other developers and service providers to take advantage of these technology advancements.
There’s no shortage of coverage, so I’ll just give you a run down of the players involved: Kim Cameron of Microsoft, Dick Hardt of SXIP, Michael Grave and David Recordon of VeriSign, Johannes Ernst of Netmesh, and Brad Fitzpatrick of LiveJournal.
What this means will be seen over time, but it does mean that a major player has shown their support for the protocol and for the community, making way for other, more reluctant parties, to step up and enter the arena.
It also means that Microsoft will be answering a major question about interface for the OpenID effort with their CardSpace work — and, if that work complies with their Open Specifications Promise, it will be advancing the anti-phishing efforts of the OpenID community years forward by bringing to the table a deployed, open specification for handling authentication in the browser.
While there will certainly be much work to be done to offer choice, this seems like a great opportunity to accelerate the user-centric identity efforts that have recently come to fruition.







