Is Design really seedy?

Blackbelt Jones wrote this great post about Seedcamp and the lack of design involvement.

From the Seedcamp about pages:

“There will be a diverse mentor network of serial entrepreneurs, corporates, venture capitalists, recruiters, marketing specialists, lawyers and accountants that will help the selected teams put together the foundations of a viable business.”

How about designers?

Technology plays alone are starting to lose their distinctiveness in many of the more-crowded areas of the marketplace.

Great service and interaction design are on the rise as strategic differentiators for products as diverse as the iPhone and Facebook.

He's right, The only thing desiresable about the iphone is the interface, the technology is under powered or frankly from 2005. Thankfully its not all bad.

The line between hackers and interaction designers is blurring as they start small businesses that are starting to make waves in the big business press.

As I mentioned, my experience of HackDay Europe was that

“It really does seem that the hacker crowd in London/Europe at least is crossing over more and more with the interaction design crowd, and a new school of developers is coming through who are starting to become excellent interaction designers – who really know their medium and have empathy with users.”

This reminds me of my made up position name while at Ravensbourne, Designer/Developer. At the time I design was far too form based while development was far too programming based. Web designer meant you created HTML pages, Information designer meant you didn't actually touch any data or apis and Interaction designer meant you were too focused on art, hanging out in Hoxton and convince your clients they were always wrong. Things have changed for the better. The grey area between design and development
has been intersected by a 3rd force the hacker. So now you get pursuits like hardware hacking, alternative reality games, product user interface hacking. The fact is that its not about the titles, its about what vision you have in your head and how much effort your willing to put in to it.

Business-wise I think we have yet to see what affect the greying of design, development and hacking will have on startup culture.

Comments [Comments]
Trackbacks [0]

Finally got the Wiimote working with my laptop

Wiimote and Dell laptop

After weeks of messing around with many different configurations, tonight (1am) I got it working, thanks to this great forum.

I'm using a Wavelinker bluetooth USB dongle with the IVT Corporation BlueSoleil drivers on my Dell XPS M1210. I have to turn off my internal Bluetooth because it seem to not work with BlueSoleil drivers. The thing which seemed to make all the difference was this ordering.

  1. Open GlovePie
  2. Open BlueSoleil
  3. Press 1+2. Wait for “* Connected” to pop up in the lower righthand corner of your screen.
  4. Run your script.

I found that GlovePie with no Bluetooth Fix or Auto Bluetooth Connect worked for me. GlovePie when opened would launch BlueSoleil for me and within a few seconds I was up and running. I used the script Wiimote identifier to work out if the Wiimote was connected or not. Once it was connected I can then run a more exotic script like the Mouse Control Script.

I've uploading a video I shot, so others can learn how to do the same.

Comments [Comments]
Trackbacks [0]

Hackday officially live – sign up now

hackday in Sunnyville

As previously mentioned on the backstage blog. Hackday.org is now official and you can sign up and grab yourself a ticket now.

The dates are the weekend of the 16th – 17th June at Alexander Palace (yes now it makes sense why I had pictures of the venue on my flickr stream)

Its a partnership between Yahoo! Developer Network and BBC Backstage, which we've been developing for quite sometime. Matthew Cashmore, Tom Coates, Matt McAlister and many others have been involved in this from the start.

As the hackday.org site says, stimulation will be provided in Food, Drinks, Feeds and APIs. Like BarCamp, you are welcome to play werewolf sorry hack or (sleep) through-out the night. Tomski's already offered his shower for Sunday morning. Its going to be a very cool event. No I won't
be doing a live DJ session from stage 1 afterwards but nor will Beck this time around.

Comments [Comments]
Trackbacks [0]

Linux and homebrew on Xbox 360 and PS3?

So while I was looking around the 23C3 conference notes I found some links to videos about a possible Xbox 360 hacking. The video which can only be viewed on Youtube now seems odd and underwelming. But if its true means you can now using some exploit in the game King Kong run unsigned code on a Xbox
360. Engadget also had a piece about the whole thing.

One of the best things about the original Microsoft Xbox console wasn't the fact that it ran games. Oh no, for many, the best part was the ease at which that low-cost / high-powered device could be hacked to run all kinds of Homebrew applications including a damn fine media center. Now, in a tantalizing bit of showmanship put on by a cloaked hacker at the 23C3 Hacker Congress in Germany, a modified Xbox 360 (note attached circuit board) is shown loading Ubisoft's King Kong game just before displaying a trio of
dancing 360, Tux, and (old) MacOS logos with the words “coming soon.” Could this be a true exploit of King Kong's unchecked and unsigned vector shaders? We don't know, but the ability to execute any kind of code is certainly progress.

This is all fitting because Sony have just released a Yellow Dog linux build for PS3. Engadget once again has the right idea.

We're still holding out until Ubuntu gives us the love we crave. Well, that or until the OSS community get started on making an XBMC-like PS3 interface, since Sony believes all of your home's media should live on the PS3, and not on a media server.

Hey and no better time, XBMC is long from dead. Its been partly ported over to x86 for skinners and developers and this new skin from PDM called clearly shows the pure maturity of the XBMC platform.

And in related news I read Microsoft are releasing another version of the Xbox 360 code named Zephyr (1st one was called Xenon), this time with cooler processor, 120gig HD, HDMI and 1080p support out of the box. Sounds interesting but not as important as the previous news.

If the hack is true, it looks like I'll have to decide between the PS3 and Xbox 360 sometime this year. Maybe it will be a race to see who gets XBMC on it first.

Comments [Comments]
Trackbacks [0]

When’s the xbox 360 going to be hacked?

Xbmc 1.1

Not the DVD firmware hack or even the HD/Memory card reading, I'm talling about the (proper) run unsigned code type of hack. I said it would be done within a year. Well theres about 2 months left now. The amount of HD content on my network is growing and I got nothing except my workstation to play it all back on. Plus the Xbox Media Centre has pushed the Pentium 3 733mhz chip to its absolute limit now and the Xbox 360 simply isn't up to scratch for media playback sorry.

Comments [Comments]
Trackbacks [0]

Messy haxoring with metasploit caught on iptv

Its not quite as cool as it may sound from the title. I just watched epioside 13 of my lame-ass iptv soap, The scene. yes everyones got there weakness but if you put this against other soaps like Hollyoaks then it comes out quite well. Anyhow, I got a real kick out of main character trying to get root on windows box hosting a FTP server. They used the well established metasploit to find a flaw and exploit it. To be fair its one step up from the hack in the matrix reloaded and they did do a little homework to use the nice opensource framework metasploit. Its certainly a fine line between security tester and exploiter but the best tools always are.

Talking of which if you didnt catch the Security now podcast number 9 about rootkits, please do as it will give you a good old wake up call. I've been personally aware of rootkits for quite a long time but I didnt know spyware, adware applications were starting to use them just so they cant be removed from a computer. Its crazy, but its true. Honestly I wouldnt wish a rootkit on my worst enemy, I just cant imagine anything worst. Anyhow, Steve and Leo do a great job explaining how rootkits work. It is however really good to know Microsoft and Sysinternals are working on the problem. I did try out SysInternal's Rootkit Revealer on all my machines and I'm clean as expected but its good to be sure. I suggest everyone should give it a try, at least till Microsoft add rootkit scanning to there malicious software removal tool. No one likes to be rooted…

Comments [Comments]
Trackbacks [0]