Skip to content →

Category: zettel

scraps of paper

Zoho: Online Database

Zoho releases new apps at an amazing clip. Now there’s Zoho DB. TechCrunch reviews. An online database viewable in a spreadsheet format, but with the capability to accept SQL queries in multiple formats. I keep looking for simple online solutions to small data sets. Maybe this is it.

The demo above is for Zoho creator. This must be one of the more successful examples of outsourcing code to India.

Comments closed

You’re the Top,
You’re the Mona Lisa

The Top

We like top 100 lists. The best films of all time, the most influential books, the best baseball players and the best cars. We like the best, the best is good. The problem is figuring out what the best means. Mahalo wants to create portals to the top 20,000 Web pages. “Top” in terms of most requests. Calacanis bemoans the it next list. Techmeme has begun to rank its “contributors.” Scoble thinks that it’s the end of blogging. Frankly, not appearing on a list is not the same as death.

Cole Porter had an interesting list of the “top.” It included Mahatma Gandhi, cellophane, turkey dinners and Garbo’s salary.

You’re the top!
You’re the Louvre Museum.
You’re a melody from a symphony by Strauss
You’re a Bendel bonnet,
A Shakespeare’s sonnet,
You’re Mickey Mouse.
You’re the Nile,
You’re the Tower of Pisa,
You’re the smile on the Mona Lisa
I’m a worthless check, a total wreck, a flop,
But if, baby, I’m the bottom you’re the top!

Top stuff lists are meant to drive traffic. The popular is by definition popular. But the popular is, as Leonard Cohen says, just what everybody knows.

Comments closed

Hackers Demand Stable iPhone Hacking Environment

Huh? Hackers are upset that Apple takes active counter measures? Seems to me that’s part of the game. You do something, and then they do something. Now you’re supposed to do something else. The enviornment isn’t going to be stable because Apple needs to live up to their contracts and commitments. Oh, and by the way, they’d like to make some money on the product.

I’m confident we’ll see third-party apps on the iPhone, it may just take a while. I’m also certain we’ll see some new apps from Apple and some amazing Web-based apps. The hacking of the iPhone is good in that it forces Apple to move more quickly. It tells them there’s some demand there.

I wonder if iPhones can be hacked in such a way that they can be restored to a pre-hacked state? Seems like that’s going to have to be standard operating procedure if folks want to keep hacking away. It’s called risk mitigation.

Comments closed