E-petitions Don't Work

Imagine being frustrated about a new tax and going into the basement to scream. Great, you've had a little therapeutic outlet but unless the people who levied the tax are in your basement it will not change anything.

I'm just as irritated as the next guy when it looks like an injustice might be perpetrated through the passage of a new bill or some court ruling. I want to do something and I want to be efficient when I do it.

At first blush the e-petition seems like a great way to influence the powers that be. Get thousands of people who agree with you and have them all sign it, but there are a number of problems with it.

Consolidating Quality Attribute Scenarios

One of the steps in a Quality Attribute Workshop is to consolidate the raw quality attribute scenarios that have been gathered. A helpful question to apply to each scenario when evaluating it for consolidation is, "Can this be abstracted without losing the essence of the scenario while at the same time covering more scenarios?"

Understanding Software Architecture

Software architecture is a discipline focused on the quality attributes of a system, the "ilities". While functional requirements and constraints are important to understand, the software architect is primarily concerned with the quality attribute requirements. The Software Engineering Institute at Carnegie Mellon University uses the following definition of software architecture.

The software architecture of a program or computing system is the structure or structures of the system, which comprise the software elements, the externally visible properties of those elements, and the relationships among them.

Greylisting for your telephone

Greylisting is "method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will "temporarily reject" any email from a sender it does not recognize. If the mail is legitimate, the originating server will try again and the email is accepted. If the mail is from a spammer it will probably not be retried since a spammer goes through thousands of email addresses and can not afford the time delay to retry."

Why not apply a similar technique to your telephone? It could be done without much effort in this day of caller-id. Imagine if you had a device that, when plugged into your telephone line, would allow you to automatically answer the phone for unknown numbers and give the caller a message. The message could be generic or it could be instructions to do something specific. You could be program the device with a list of white listed (allowed) telephone numbers as well as blacklisted (denied) numbers. The device could give a different message based on whether the number is in the blacklist or simply unknown. If the calling number is on the white list the device does nothing, allowing standard telephonic devices to continue operating.

Outlook and Outlook Express Users Want to Reply to Digitally Signed E-mail

You are probably reading this post because you are an Outlook or Outlook Express user and you tried to reply to a digitally signed e-mail from me. The result was a warning/error notice stating, "You cannot send digitally signed messages because you do not have a digital ID for this account." or some such thing. You are receiving this notice because Microsoft made a mistake in the default configuration settings when it packaged Outlook and Outlook Express for distribution.

Pages