Moving to Ghost and a "login to read" model

I have been writing on this blog for years. Some of my best and worst ideas are memorialized here, and for years I have thought that I should go through and refine these ideas. My writing was available for free for people. In the area of AI vacuum cleaners, sucking up the web to make new LLMs which then regurgitate every useful thought ever published online, openly publishing anything no longer makes as much sense.
With that in mind, here are my new access models for my content.. which dates back nearly twenty years now.
- For most articles, only previews will be available without registration. This is to prevent the various AI LLM scraping bots from trying to suck my brains out.
- Most (80%) articles will be fully available once you have registered and proved that you are not a bot.
- Even more (95%) will be available with a $10 per year subscription.
- For $50 a year, you will have access to the articles that form the "book-in-progress" about how I think about healthcare technology, privacy, cybersecurity, ethics and strategy. Very often my strategic consulting results in a blog post, I have put these behind the new more expensive paywall.
I have also deleted a few posts. No one needs to know what Windows software I found useful to install in 2005. Those projects are all gone, and the version of Windows that they worked on are also gone. I have tried to keep the articles that might be remotely relevant, but truly pointless content is being removed.
With this update, if you wanted to read the following articles, you will now need to register:
- Cascading Configuration Design Pattern - Covers the idea behind a cascading configuration system like CSS, and discusses how to think about them correctly, when using a system that is not CSS.
- How to run an ethical Hackathon - How to run a coding and collaboration event that your attendees will not resent.
- The MD Problem in NPPES - This discusses the problem of publishing credentials without normalizing the underlying data.
- FOSS Sin: Pointless Duplication of Effort - An article on how the FOSS community frowns on pointless forks.
There are also articles that I have placed at the first paid-tier:
- NCVHS Testimony on Meaningful Use - My original testimony on what should be considered the "Meaningful Use" of EHR systems.
- MUMPS is modern - A defense of the MUMPS programming language used in VistA and in Epic.
- Who owns the Data - The most popular article I have ever written. It details how "ownership" is not really a useful concept for healthcare data.
- The Burden of Trust - Direct Protocol - Discusses the design of the Direct Protocols trust infrastructure.
- The Power of Push - Direct Protocol - Why a push-model is a useful exchange approach.
- Open Letter to the tiger team - TLS in the Direct Protocol - A discussion of how TLS should be used in the Direct Protocol, back when it was still being designed.
- Empathy over implementations and another straw man - Direct Protocol - Discussing how to ensure that Direct remains open to patient needs.
- NHIN-Direct leans towards HealthQuilt Security Model - The peer-to-peer CA model that I developed while doing HIE work in Houston was ultimately adopted by Direct.. and is chronicled here.
- What protocol for NHIN Direct? - Secure SMTP vs REST vs XMPP. That was the question.
- VA VistA is not "Old" - Why labeling maintained Open Source software as "old" is foolish.
- On Health IT FOSS project governance - How to run an Open Source Health IT project.
- Programmable Self Reading List - The best books on hacking yourself and your habits!
- Glen Tullman presents the Chewbacca defense - About that time the Allscripts CEO testified at the Senate.. and it did not make sense.
- You might be a cyborg.... - Like "you might be a redneck" but for people who are too attached to technology.
- A patient by any other name - How should we talk about patients who do not want to be passive?
- Expert Healthcare Hackers - The connection between e-patients and hackers!
- Hacking on the Wikipedia APIs for Health Tech - Detailing how to work with some of the better Wikipedia APIs
And here are few articles that I putting behind my "data strategy" paywall
- The Tridgell Effect - How Andrew Tridgell caused the drama that created git and the era of performant version control systems.
- The Many Eyeballs Problem and Many Eyeballs Actually Looking - A discussion about the realities of code review and security inspection.
- NoSQL and Technical Debt - How our data abstractions impact our ability to scale.
- Technology vs Policy for privacy - trying to think more carefully about how privacy protections should be implemented.
- No Shit In The Ranch House - Why some mistakes erode trust much more than others.
- On Internet Marketing - An attempt at careful thinking on how to market things on the Internet.