Altering my RSS workflow with BlogLines

Since moving back to the East Coast, I had the luxury of managing a single-location infrastructure. All my mail, calendar, blog management, and most importantly my RSS subscriptions were in the same place: on my laptop. Now that I’ve started work, I’ve discovered some cool ways to manage the RSS part of the workflow from multiple locations.

The key is Bloglines, the online feedreading service that I knew about but had never used prior to this week. I populated Bloglines with a set of important work related feeds (a very short list, compared to my list of 200+ subscriptions). Then I used a new feature in NetNewsWire to add my BlogLines feeds to my reading list, deleting the equivalent versions from my regular subscriptions.

Now, if I read a news item in CNet from home via BlogLines, it’s not downloaded when I open NetNewsWire at home, or vice versa. This enables the best of both worlds: I get to read a subset of my feeds through a lightweight, low impact web interface, and don’t have to manage already-read content through my fuller-featured reader.

The only concern I have about the feature is following up on the items later to blog them. I don’t do very much blogging from work—at least not until I get my formal product management blog ramped up—and there’s no convenient way to keep track of items for later blogging that is preserved from BlogLines to NetNewsWire. My interim solution is to email URLs to myself; not elegant, but effective. (I can also mark memorable items as “keep new,” but since the new setting gets reset when I view the item through Bloglines that’s a less ambiguous way of keeping an item available than flagging it.)


CNET Patriot Act’s technology-related sections to be scrutinized. Declan McCullagh posts a brief summary to the three sections in question, all of which are subject to the “sunset” provisions mercifully contained in the original act. Section 209 concerns the rules for police access to voicemail stored on a provider’s system; 217 makes it easier for law enforcement to assist computer system owners in monitoring unauthorized intrusions; and 220 allows search warrants for locations anywhere in the country to be issued from the district where the crime occurs.

Declan points to a very cogent debate on 209 and 220 between Jim Dempsey and Orin Kerr, which boils down to: the need for some of the changes in these sections are clear to bring the law into the electronic world, but so is the need for extension of constitutional checks and balances on these new powers. Kerr suggests that including a suppression remedy (ensuring that improperly obtained evidence is suppressed in subsequent proceedings); extending civil action and administrative discipline guidelines to ensure that emergency exceptions are not abused; and finally some concern about how users should be notified if their electronic records are searched.