1. What is SimpleDB?
2. What is extrusion prevention?
3. What is hardware virtualization?
4. What is a Knol?
5. What is Brook’s Law?
6. What is the main purpose of HTML5?
7. What is frequency hopping used for?
10. What is IT?
|Did you ever wish you could delete all your email without responding? Maybe you can. It’s called email bankruptcy. You realize you are never going to dig yourself out from under the pile of email in your inbox so you just declare that you won’t. You start afresh.
Anne Zelenka, Before You Declare Email Bankruptcy…
I got another notification this morning that my mailbox is over its limit. Geesh. One of the best Facebook wall posts I read this year was from a developer at Microsoft who said that his mailbox is so out of control that he just periodically wipes everything out and just starts again — and if I wanted directions for how to do that, to email him. 🙂
|Everyone is familiar with intrusion prevention — the security technology. But now we have extrusion prevention. Data leak prevention or outbound content filtering would better describe it.
Eileen Kennedy, 2007: These buzzwords made our eyes and ears burn
At first I thought Eileen was kidding. There couldn’t possibly be an IT word called “extrusion prevention” could there? But then I Googled it and sure enough, there’s not only tons of vendors out there pushing products for extrusion prevention — there’s also tons of stuff for extrusion detection.
How did I miss this word? And what guy made it up? It had to be a guy. Yuck.
|Yahoo apologized after recipes from Surya Gayathri’s blog were used without permission on Yahoo India’s new Malayalam-language Web portal. The Indian blogging community quickly created a buzzstorm about the rights of individuals to protect their intellectual property.
A Yahoo spokesman said “Yahoo respects the blogging community and the etiquette followed by bloggers. We regret any inconvenience caused by the inadvertent posting of the recipe without attribution.”
[kml_flashembed movie="http://youtube.com/v/szLmAPW39uE" width="425" height="350" wmode="transparent" /]
Our 2007 Christmas display consists of roughly 65,000 lights which are computer controlled and synchronized to music. The lights are synchronized to several songs which are broadcast to passing vehicles over a low-power FM transmitter (92.9 FM).
This year, we are again collecting canned goods for the Frisco Food Bank / Frisco Family Services Center – your donation will go a long way to helping those in need. A collection box is located next to our mailbox. No monetary donation, please.
I started out reading about the guy in Ohio, trying to figure out what kind of controller he used to synch the lights with the music and stumbled upon the Trykoski’s house in Texas.
|In January, TJX, parent company for Marshalls and TJ Maxx announced that someone had illegally accessed one of its payment systems and successfully stolen credit data from 45 million customers .
TJX’s President and Chief Executive Officer Carol Meyrowitz apologized.
“I want our customers to know how much I personally regret any difficulties you may experience as a result of the unauthorized intrusion into our computer systems. With the help of computer security experts, we have strengthened the security of our computer systems and we believe customers should feel safe shopping in our stores. We value the trust our customers place in us and again, I’d like you to know that we sincerely apologize for any difficulties you may be caused. Thank you for continuing to shop at our stores and for your years of loyal patronage.”
|Storage disks containing names, addresses, birthdates and national insurance numbers for 25 million British adults and children disappeared on route to the government’s audit agency. The disks were password protected but the information on them was not encrypted.
Prime Minister Brown said “I profoundly regret and apologize for the inconvenience and worries that have been caused to millions of families. We have a duty to do everything that we can to protect the public.”
| It seemed like Facebook founder and CEO Mark Zuckerberg apologized over and over again for mistakes in the design and deployment of Beacon.
Beacon is a Facebook app that would let a Web site’s customers share their actions, including purchases, with their Facebook friends.
“We’ve made a lot of mistakes building this feature, but we’ve made even more with how we’ve handled them. We simply did a bad job with this release, and I apologize for it.”
|When Sun launched a 25th anniversary sale on its online direct-sales site, it left resellers out of the massive discount deals.
VAR switchboards lit up with customers wanting the same discounts on products they’d already bought and Sun had to apologize to its channel partners.
“We understand and regret that this disruption could have potentially compromised you with either trust or integrity or positioning with your clients, which is a very trusted relationship that we certainly never intended to breach.”
|In September, Verizon refused to approve a pro-choice group for a text message program. Verizon claimed the right to block any content “that, in its discretion, may be seen as controversial or unsavory.”
Then the pro-choice group joined forces with a pro-life group and the two groups started banging the drum about Verizon censoring free speech. Verizon issued an apology.
The company blamed the blocking on a “dusty internal policy,” while still reserving the right to block text messages in the future at its discretion.