Adam Fields (weblog)

This blog is largely deprecated, but is being preserved here for historical interest. Check out my index page at adamfields.com for more up to date info. My main trade is technology strategy, process/project management, and performance optimization consulting, with a focus on enterprise and open source CMS and related technologies. More information. I write periodic long pieces here, shorter stuff goes on twitter or app.net.

2/22/2006

Handy trick for mobile users

Filed under: — adam @ 12:04 pm

I have net access on my phone, but it’s reasonably slow. A click to follow a link is expensive, especially when I just want to look up a word or something.

I’ve noticed that answers.com and m-w.com are now both supporting putting a query in the url path:

http://www.answers.com/privacy
http://www.m-w.com/dictionary/privacy

Also, there’s gada.be search, which lets you do things like:

http://privacy.gada.be

Any others?

Tags: , , ,


This is what we mean by abuse of databases

Okay, here it is, folks.

When someone asks “what’s wrong with companies compiling huge databases of personal information?”, this is part of the answer:

http://www.boingboing.net/2006/02/18/miller_hunts_down_pe.html
http://spamkings.oreilly.com/archives/2006/02/inside_the_creepy_miller_brewi.html

Someone signed up for a Miller Brewery contest using a throwaway email address, and they tracked her down and signed up her “real” email address. The second link above concludes that they did it by using information collected by Equifax’s direct mail division, Naviant (which was supposed to have been shut down years ago). They own the domain from which the email was sent.

When we talk about privacy, it can mean a number of things. But indisputably, one of the definitions is “the right to be free from unauthorized intrusions”.

Maybe this is a small thing, but it’s a terrible precedent.

This person obviously didn’t want to be permanently signed up for messages from Miller. Letting an address expire is probably the ultimate form of “opt-out”. Yet, Miller thought it was okay to use personal information gleaned from who-knows-what sources to tie her to another email address, and send her more spam. Would they do the same thing if you changed your phone number to avoid telemarketers? What else is fair game?

Tags: , , , , , ,


Powered by WordPress