John Gruber posted one of the most thorough estimates of what he thinks might be the price of the other two Apple Watch models. In anticipation of the flurry of counter-estimates, I thought I’d keep a running table showing what other pundits are putting down as their best guess and update it as I get new estimates via Google Alerts.
But no need to keep others from joining in on the fun. What’s your best guess for the price of the gold Apple Watch Edition?
How much money was the company bought for?
Microsoft acquired Mojang for a smooth 2.5 BILLION dollars.
– Mojang blog post
I love you. All of you. Thank you for turning Minecraft into what it has become, but there are too many of you, and I can’t be responsible for something this big. In one sense, it belongs to Microsoft now. In a much bigger sense, it’s belonged to all of you for a long time, and that will never change.
Under the terms of the agreement, Microsoft will acquire Mojang for $2.5 billion. Microsoft expects the acquisition to be break-even in FY15 on a GAAP basis. Subject to customary closing conditions and any regulatory review, the acquisition is expected to close in late 2014.
– Microsoft Press Release
I really should read Joi Ito’s blog more. He has a fascinating post about a recent trip to Shenzhen where he visited the back alley electronic component markets and observes an ecosystem teeming with activity, rapidly iterating on designs in a way that I’m sure makes Silicon Valley rate of evolution feel glacial.
However, the more interesting phones were the phones that weren’t like anything that existed anywhere else. Keychains, boom boxes, little cars, shiny ones, blinky ones – it was an explosion of every possible iteration on phones that you could imagine. Many were designed by the so-called Shanzhai pirates who started by mostly making knockoffs of existing phones, but had become agile innovation shops for all kind of new ideas because of the proximity to the manufacturing ecosystem. They had access to the factories, but more importantly, they had access to the trade skills (and secrets) of all of the big brand phone manufacturers whose schematics could be found for sale in shops. These schematics and the engineers in the factories knew the state of the art and could apply this know-how to their own scrappy designs that could be more experimental and crazy. In fact many new technologies had been invented by these “pirates” such as the dual sim card phone.
While intellectual property seems to be mostly ignored, tradecraft and trade secrets seem to be shared selectively in a complex network of family, friends and trusted colleagues. This feels a lot like open source, but it’s not. The pivot from piracy to staking out intellectual property rights isn’t a new thing. The United States blatantly stole book copyright until it developed it’s own publishing very early in US history. The Japanese copied US auto companies until it found itself in a leadership position. It feels like Shenzhen is also at this critical point where a country/ecosystem goes from follower to leader.
Love this! Use technology to turn ordinary, functional objects into something that’s fun and interactive. Urban environments offer so many opportunities to shine a spotlight on individuals which can make someone’s day.
Also, the obligatory “making of” video below.
It’s all part of an advertising campaign for the Smart car, a brand that promotes “urban joy” and safety.
Joseph Smarr’s blog post, Turns out we still need Plaxo (or something like it) had me digging through my archives for some screenshots taken from an old prototype I worked on a few years back. The concept was simple and combined the double opt-in privacy features you get from Facebook with the simplicity of a phone address book.
The story starts with two phones, Boris’ on the left and Sarah’s on the right. The owner of the phone has a public card they can edit (outlined in yellow). By tapping on it, they can add whatever information they feel comfortable sharing to the public. Updating this info on your phone copies it up to the public directory. On it you see a photo, name, and latest status.
Step One: Two phones, Boris on the left, Sarah on the right.
Boris decides he wants to search for Sarah. He begins to type and the list of matching entries narrows until Sarah’s entry is highlighted.
Boris searches for Sarah.
Tapping on Sarah’s entry, Boris can view Sarah’s public card. This info is stored on a server, tied to her phone number. Think of it as the white pages in the cloud, like a DNS record for people, matching IP addresses to domain names.
Sarah’s public card.
Boris has the option to save the public contact record to his local phone book. This action sends a notification to Sarah (it says “New Contact” below Boris’ name as a status) that Boris has saved her public card to his phone book. It’s like a Facebook friend request but more functional.
Notification shows Boris has saved Sarah’s contact card.
Tapping on Boris’ name in the list view, Sarah can pull up Boris’ contact card. Because Boris has already saved Sarah’s card to his phone, Sarah has the rights to view Boris’ full contact card with additional information such as his phone number and email address. Sarah has the option to Accept or Decline Boris’ connection request.
Boris’ full contact card is unlocked on Sarah’s phone.
Sarah accepts Boris’ connection request so now Boris has access to Sarah’s full contact card and “unlocks” additional information on Sarah’s profile such as her phone number and email address.
Boris now has access to Sarah’s full contact details.
Now that both Sarah and Boris have saved the other’s contact card to their phone, they unlock private information that is only available to their connections. The act of saving a contact card can be either via the look-up method above or even by calling someone and that person saving the phone number from their call log to their address book.
Completing double opt-in, both Boris and Sarah have full access to each others full profile.
Later, if Sarah wants to “pull back” her contact details from Boris’ phone, all she has to do is delete Boris’ contact card from her address book. Once she does so, her contact card on Boris’ phone reverts back to its public profile.
Sarah deletes Boris from her phone book, her phone number & email are hidden again.
There are many versions of this type of system. As Joseph mentioned, Facebook offers this if you look at the About section on anyone’s profile. Google+ also allows you to manage access to private information based on which circle you save someone to. Even Plaxo had the concept of Work & Home card and you could chose who had access to what.
My point is that no one manages their personal contact details as part of a social network. The only way you’re going to get people to keep their data current is if their card is in front of them every day as part of their daily interaction with people.
Every time you call or text someone using the system above, you’re going to leave a link to your public calling card on their phone. As people interact with your card, they are going to be unlocking additional details that will help build their connection with you. Let’s say your work address or busy/free space on your calendar is part of that additional information that gets unlocked. You’re going to want to keep this information accurate.
There are all sorts of holes you can poke into such a system. For example, I can write my profile to look like some celebrity and save a bunch of people to my phone book and hope to dupe someone into counter-saving my profile to their phone and thus revealing their private information. To counter this, maybe you need to verify people’s names with a text message with a link or code that ties their name to their phone number.
Also, once someone unlocks your profile, there is no real way to take it back as they can take a screenshot and save that info as a photo.
Yes, there are holes but as a start what do you think. Is it intuitive? Does it make sense? The concept of your phone number as the equivalent of an IP address tied to a directory that contains further details is attractive. If we can get over the fact that a phone number isn’t really private and should be used as one-half of a key opens up many possibilities.