All posts by Craig Murphy

DeveloperDeveloperDeveloper – some statistics

As part of another exercise, I have been looking through the speaker lists for the seven DDD Reading events that we’ve run in the UK so far.

Thinking about the number of unique speakers who submitted sessions vs. number of sessions submitted, I pulled the the information from each of the first seven events to produce this graph below. Note that this graph isn’t limited to those speakers who made it on to the agenda – it contains data relating to those speakers who submitted one or more sessions.

DDD1 was obviously the first DDD event – it had a hand-picked agenda. As I recall there were a couple of cancellations, so pretty much every speaker who submitted a session made it on to the final agenda. I can’t remember the precise details behind the use of “developer developer developer” as the conference name, however it is obviously a hark back to Steve Ballmer’s famous pitch (of which there are plenty on YouTube). Of course, this is also the reason why the speaker to sessions submitted ratio is virtually 1:1. DDD1 came about after I was invited to look at an Excel spreadsheet containing a list of speakers and sessions…the next thing I knew is that I had a spreadsheet with an agenda on it, then a date, then a registration process, then an event (coinciding with my wedding anniversary)…it happened so fast!

DDD2 was the first, and last, DDD to have 30 minute sessions. We had hoped that the 30 minute sessions would be appealing to new speakers who may have felt that 60 minutes was too long. Whilst that was perhaps good for the new speakers, it was a scheduling and practical nightmare…although it seemed to work pretty well on the day. This is what happens at events – the attendees can have a whale of a time, whereas the organisers can see all the imperfections that make an event hard work for them. Luckily the DDD team are hard-skinned individuals who are keen to experiment and learn, so we take on-the-day problems with a pinch of salt and think “learning experience”.

DDD3 was almost a 1:1 speaker to session ratio. It was also the first time that Dave McMahon used his Sunday name “David” as part of a session submission. The key change for DDD3 was the introduction of community voting. Instead of relying on instinct to build an agenda, we asked the attendees to vote for the sessions that they wanted to see on the agenda. This has two main benefits. Firstly, it help us with room scheduling – if we know a session received 120 votes then we know to put it in a room that can handle at 120 people. Secondly, it means that the agenda is community-driven, we get to build an agenda that the majority of attendees are going to be interested in. Of course, like all systems, it’s not as precise as this and we do have to make some scheduling decisions, e.g. there might be two speakers discussing the same topic, we have to work out how best to handle that. I think that tells you that we don’t often take the first 20 sessions – it should come as little surprise to you that we look at the first 30-40 sessions, often settling on the 20 out of 35 sessions. With more and more speakers submitting two or more sessions, the chances of them getting more than one session in the top 25 is moderately high.

DDD4 was an eye-opener, fewer unique speakers, but those that did submit sessions were submitting one or more. This is a trend that has continued to this day.

DDD5 was originally planned to run on the first day of England’s World Cup match. You would be surprised how hard it is to plan developer events around the variety of sports that are competing for the same audience!

DDD6 “sold out” within 24 hours. DDD is clearly a popular event. After all, it is free, it is held on a Saturday, there are bacon (and veggie) rolls in the morning, there’s a free lunch, 20 full sessions, lunch-time grok talks, swag, discounted books, access to many of the Microsoft DPEs, an evening geek dinner (at your cost!)…it is no wonder that 350 attendees are driven to the registration site within seconds of it going live. We also had SQLBits (thanks!) sponsor coaches from Reading railway station to Microsoft’s TVP campus – feedback for this was good, so we’re hoping to run the same coaches at DDD7.

DDD7 saw us skip the summer DDD slot. We ran DDD 1-6 every 6 months, after DDD6 we looked at the year ahead and felt that so much was going on in the “2008 space”, that postponing DDD until November 22nd was a good idea. It is, after all, post-TechEd and post-PDC. I understand that there is a football match planned for that day…clearly football schedule planners don’t consult us when they are making their plans! We also stretched the time-frame for DDD7 – we have a time-line that we follow for all DDDs, this one we changed to suit the fact we had time on our hands. We opened session submissions earlier than usual and kept it open for longer – this has had the advantage of attacting new speakers on to the submission list. DDD7 is also the first DDD since DDD2 to have girlgeeks (aka ladies, with the exception of Barry, “he ain’t no lady”) on the agenda – Sarah Blow, Kalen Delaney, Annie Matthewman being the first to hold that honour.

Now that I’ve got some statistics rolling, I’ll publish some more over the coming weeks. For example, there is one speaker who has made it on to the agenda for all seven DDDs…more later!

In the meantime, DDD7, November 22nd 2008, Microsoft Thames Valley Park, Reading – on a Saturday, no cost to attend, bacon rolls, free lunch, swag, registration opens “real soon now”.

Follow DDD on Twitter here.

Technorati Tags: , , , , , , , , , , ,

Forcing a USB pen / key drive format

A colleague asked me if I knew of a means of restoring a PNY Attaché Pro 1GB pen drive back to a usable state.

It was one of these “partitioned” pen drives with an 8MB drive containing a small executable program that, after entering the correct password, opens up the rest of the drive. However my colleague had forgotten the password and was wondering if the drive could be formatted such that the full 1GB was available. I don’t use protected pen drives myself, however I believe some pen drives are “partitioned” like using private and public areas.

I had a look around on the PNY web-site, tried their pre-test tool, all to no avail. I even tried a couple of big-name disk utilities, however they didn’t “see” the USB pen/key drive.

Then I stumbled upon this post. It basically said, download and use this tool (via here), but don’t let it finish its format. So instead of letting it finish its format, I waited a moment or two, then removed the PNY drive. Windows then let me format the full 1GB without any further problems. Possibly an unorthodox approach, but a win nevertheless. Huge thanks to TTC Shelbyville for pointing this trick out.

I’m sure that there are other tools available that would achieve the same result, however this was my “5 minute solution”. I would be happy to hear about other approaches in the comments for this post.

Disclaimer: YMMV

Technorati Tags: , , , , , , ,

Lots of bright folks are speaking in the UK next month

UK – VBUG Annual Conference 2008 (the 11th!)

When:
4th and 5th November 2008

What:
2 days and 21 session tracks with presenters from across the UK and global community

Key Note:
Roy Osherove, founder of the Agile Israel community.

From overseas:
From the US the legendary Ken Getz and Jeffrey McManus.

UK community speakers:
András Belokosztolszki, Santosh Benjamin, Harry Brignul, Barry Dorrans, Richard Fennell, Sebastien Lambla, Ben Lamb, Mike Ormond, David Ringsell, Gary Short, Oliver Sturm, Dave Sussman, Mike Taulty, Tony Whitter and Phil Winstanley.

Cost:
£299 Members / £399 Non Member (ex VAT)

Location:
Microsoft Reading, Microsoft Campus – Building 3, Thames Valley Park, Reading, RG6 1WG, GB

What to expect:
Roy Osherove – Tips and Tricks for Successful Software Teams, Unit Testing Best Practices

Ken Getz -Investigating LINQ to XML, Create Managed Code for Office 2007 in Visual Studio 2008, Create Custom Workflow Activities

Jeffrey McManus – Data-Driven ASP.Net AJAX, Distributed Caching for ASP.Net Applications

Tony Whitter – Silverlight for Mobile

Oliver Sturm – Functional Programming in C# (devExpress blog and here too)

Mike Ormond – Overview of Silverlight 2

Gary Short – Red, Green, then what? (devExpress blog)

Ben Lamb – Go With the Flow – an Introduction to Windows Workflow

David Ringsell – Improve Your Own Learning

Mike Taulty – Beyond Silverlight with Windows Presentation Foundation

Barry Dorrans – WCF 101

Seb Lambla – ASP.Net MVC

Santosh Benjamin – The Integration Landscape: Biztalk Server, WF and WCF

Andras Belokosztolszki – Advanced T-SQL 2005/2008

Phil Winstanley & Dave Sussman – ASP.Net 4.0

Richard Fennell – Team Foundation Server – The Answer to All Project Management Problems?

Harry Brignull – Making the User Experience Shift in a .NET Development House

More information can be found here: http://url.ie/svg

Technorati Tags: , , , , , , , , , , , , , , , , , ,

eCards linking to dangerous executable files…

In a previous post I mentioned that phishing and spoofing were still very much in the mainstream. There are many tricks that scammers use in order to convince the unsuspecting Internet user to part with their financial details. One such trick is to send fake e-mails inviting users to click on an “eCard”. In reality, clicking on the eCard link typically links to file that can be run on the victim’s computer – even though today’s modern browsers offer many levels of warning, users frequently click on yes or OK when asked “are you really sure?”

Most eCards are trojan horses – they lay in wait watching for useful information such as credit card details, passwords, etc. to be typed into reputable web-sites. They then capture that information and, more often than not, attempt to transmit it to a central source that is capable of making the most of stolen credit card information.

Here’s an example:

As noted in my previous posting, it’s always worth verifying the destination of any links found in e-mails (there are some good comments on that post, with tips worth heeding). However, link aside, the text of the e-mail has a few other clues that suggest it might not be authentic. Look for problems with grammar, spelling mistakes, incorrect spacing, etc. I’ve highlighted a couple in the e-mail above. Also look out for “odd” e-mail addresses that are out of character, e.g. Hallmark would never use a personal e-mail address (other card vendors are available!)

If you are feeling even more adventurous, you could take a look at the message itself. In Microsoft Outlook if you right click on an e-mail in the Inbox view, choose Message Options and you’ll see something similar to the text below:

Return-path:
Envelope-to: your.name@yourdomain.com
Delivery-date: Mon, 13 Oct 2008 15:30:19 +0100
Received: from dynamic-123-123.natpool.uc.edu ([123.137.123.123])
by pc1.yourmailhost.com with esmtp (Exim 4.69)
(envelope-from )
id 1KpOR9-0007BM-6h
for your.name@yourdomain.com; Mon, 13 Oct 2008 15:30:19 +0100
Message-ID: <09622.bamber@nolan>
Date: Mon, 13 Oct 2008 12:42:56 +0000
From: “123greetings.com”
User-Agent: Thunderbird 2.0.0.12 (Windows/20080213)
MIME-Version: 1.0
To: “friend”
Subject: You have received an eCard
Content-Type: text/plain;
charset=iso-8859-1
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, score=4.7
X-Spam-Score: 47
X-Spam-Bar: ++++
X-Spam-Flag: NO

A few things can be gleamed from the e-mail headers. Most reputable eCard web-sites wouldn’t use a client-side e-mail tool such as Thunderbird. Nor would they purport to be “123greetings.com” but actually be a personal e-mail address of a.bbbb@acccgggs.com. Similarly, “friend” isn’t something mainstream vendors would use. A closer inspection reveals that this e-mail appears to have made use of a .edu domain, i.e. an educational establishment may have been used in the transport of this particular e-mail. Indeed, it is this .edu domain that demonstrates the true nature of trojan horses – they don’t always steal your financial details, they sometimes enable your computer such that it can act as e-mail hubs whereby further propagation of the the same or similar eCard e-mail takes place. In other words your computer could be used to send out eCard e-mails.

Incidentally, this particular eCard hit my spam filter before I even saw it. However, whilst my e-mail host has good spam filtering, coupled with my local spam filter (MailWasher Pro), it doesn’t mean other e-mail hosts are doing the same, it’s still possible that an eCard could make it into your inbox.

Again, regular readers will be sucking eggs after reading this post, however these e-mails are still doing the rounds. I always find it handy having these real world examples handy as demonstrations when I’m explaining the less than salubrious side of the Internet to newcomers.

Technorati Tags: , , , , ,

GTD – Using Microsoft Outlook to colour-code e-mails

I receive a lot of e-mail that is not sent directly to me. I work for a large company with thousands of employees – at least 50% of my inbox is made up of corporate “global all” type e-mail. Whilst it’s important to read these, I personally prefer to read’n’process the e-mail that are sent directly to me before I look at the global all items. To do this, I make use of Microsoft Outlook’s built-in formatting options such that mail sent directly to me appears in my inbox in light blue.

Here’s how we do this…choose the Tools menu followed by the Organise menu item:

Next, click on Using Colours. I already have e-mail that is sent to me and me only appear in blue, hence the option to turn it off is available. Assuming that you don’t have this option enabled, click on the Automatic Formatting button at the top right:

By default, Microsoft Outlook provides a handful of automatic formatting rules, one of them is “Mail sent directly to me”:

Outlook will do a pretty good job working out the conditions required to make this happen. For the sake of completeness though, click on the Condition… button to see for yourself:

As long as you have a tick beside the “Mail sent directly to me” rule, Outlook will colour-code your incoming e-mail:

This is yet another small and simple product feature that you may well have been aware of, however if it’s new to you, it could be of some use.

Other posts
GTD Action/Deferred/WaitingFor/Someday folders in Microsoft Outlook – Show Item Count
Making e-mail simpler and easier to handle: using Microsoft Outlook rules
Elementary GTD using Microsoft Outlook “move to folder”

Technorati Tags: , , , , ,

GTD Action/Deferred/WaitingFor/Someday folders in Microsoft Outlook – Show Item Count

Following on from my previous posts about using Microsoft Outlook for GTD (here and here), I’d like to mention a further tweak that we can make to Microsoft Outlook’s folder view control. Most of us probably have Microsoft Outlook display the number of unread items in each folder. However, for the GTD folders that I mentioned earlier, it’s likely that you will have read the items before they are filed in the GTD Action, Defer, Waiting For or Someday Maybe folders.

For these folders, I prefer to see the total number of items regardless of whether they have been read or not. Like a lot of things in Microsoft Outlook, the folder list is configurable. Right-clicking on a folder, then choosing Properties will allow us to configure the “total” that appears after the folder name.

This is a simple little tip, but one that might be of use to you if are are “rolling your own GTD” implementation.

Other posts
GTD Action/Deferred/WaitingFor/Someday folders in Microsoft Outlook – Show Item Count
Making e-mail simpler and easier to handle: using Microsoft Outlook rules
Elementary GTD using Microsoft Outlook “move to folder”

Technorati Tags: , , , , , , ,

Datamation’s Top 200 Tech Blogs – I’m in at 160!

Last night, I discovered that this blog had made in on to Datamation‘s Top 200 Tech Blogs…at position 160. Huge thanks to the folks involved in making that happen!

I’m pleased to be sharing the page with the likes of Joel on Software, Scott Hanselman, Channel 9, John Lam, Jeff Attwood and many others!

Here’s the URL:

http://itmanagement.earthweb.com/cnews/article.php/12035_3770056_8

Technorati Tags: , ,

Spoofing and Phishing: gentle reminder with PayPal example

I meant to write about this when it first arrived in my inbox a few years ago (ahem, sorry!) It has re-surfaced after a major inbox cleaning operation, so here it is now.

With the economy taking a downturn, spoofing and phishing are on the increase again. Spoofing – web-sites are setup to look as identical to reputable web-sites thus inticing you to part with your financial details or login information for the site that is be emulated. Phishing – you might receive e-mails that attempt to convince you to part with login details, personal data, etc. Plenty has been written about spoofing and phishing, I won’t try to re-invent the wheel here.

Anyway, here’s an example of a phishing e-mail that looks remarking like a real PayPal e-mail, including layout and graphics. Whilst the hyperlinks in this e-mail look genuine enough, hovering the mouse over the links reveals that they don’t lead to the real PayPal web-site, but to the site of a scammer. If you clicked on one of these links, you might not notice anything untoward as the scammer may well have done a good job spoofing the PayPal site look’n’feel.

Don’t be fooled – always check the ultimate destinations of links from e-mails. Better still, open up a browser window and physically type in the URL of the web-site that the e-mail claims to be from – in this case PayPal’s web-site. If the site in question really want to communicate with you, there will, more often than not, be a message waiting for you when you login using the correct channels.

I realise that I’m probably teaching a lot of readers to suck eggs. Sometimes these scams need concrete examples like this for demonstration purposes. I’ve certainly used this screenshot to help folks understand the “how do you know?” process, as noted here and here.

Technorati Tags: , , , , ,

Making e-mail simpler and easier to handle: using Microsoft Outlook rules

In my earlier blog post, I hinted that I had a few more tips’n’tricks that are helping me get on top (and stay on top) of my e-mail.

This one is somewhat simpler than my “move to folder” tip.

If you’re anything like me, you’ll be on a number of mailing lists and online subscriptions. It can be easy to mentally block these out, however even over a short space of time, more than a handful can build up. Rather than touching each one individually, I prefer to be able to group the offending e-mails together.

To help me achieve, this I have a single rule that is capable of identifying where an e-mail comes from – mailing lists and subscriptions are usually pretty consistent with the From: and Subject: fields, so it’s easy to spot words or e-mail addresses that *always* appear in such e-mails. My rule then makes use of an action to set the priority of the e-mail to low. This way I can sort my inbox by priority, whereupon I can deal with the low priority items in one go.

Creating a rule in Microsoft Outlook is fairly straightforward, so I won’t bore you with the precise steps involved. Your starting point is the Tools menu followed by the Rules and Alerts menu option.

I have a Low Priority rule that sets all e-mail from Computer Weekly and Building Magazine have a priority of low. Sorry folks, I do read your e-mails, but I want to be able to file or delete them quickly too!

As such, this results in my inbox looking like this:

As you can see, e-mails from the two parties mentioned in the rule are automatically marked as low priority. Sorting (by clicking on the ! in the header row), filing and deleting are now that bit easier.

Other posts
GTD Action/Deferred/WaitingFor/Someday folders in Microsoft Outlook – Show Item Count
Making e-mail simpler and easier to handle: using Microsoft Outlook rules
Elementary GTD using Microsoft Outlook “move to folder”

Technorati Tags: , , , , , ,