Overheard: Word of the Day

A Whatis.com blog


July 10, 2009  3:32 PM

Overheard – Distributed denial of service attack



Posted by: Margaret Rouse
cyberwar, Dave Dittrich, DDoS, denial of service attack, Security
There are a lot of statements being made by people who are not involved in analyzing these attacks, and a lot of inappropriate rhetoric about ‘cyberwar.’

Dave Dittrich as quoted in Latest DDoS attacks extremely unsophisticated, experts say

DDoS attacks were aimed at several U.S. government sites this past week, including sites for the Federal Trade Commission and the U.S. Department of Transportation.  The New York Stock Exchange, the Nasdaq electronic exchange, the Washington Post and South Korean government sites were also attacked.

Researchers from the U.S. Computer Emergency Readiness Team (CERT) and the Korea Internet Security Center are busy analyzing the traffic packets and it looks like there might be a “command and control server” out there giving orders to a zombie army.  If that’s true, it should be easier to catch whoever is behind the attacks. Hopefully.

July 9, 2009  12:04 PM

Overheard – Karmic Koala comes with GRUB 2



Posted by: Margaret Rouse
bootloader, Grub, Karmic Koala, Linux, Ubuntu
“Ubuntu 9.10, codenamed Karmic Koala, is the next major release of the popular Ubuntu Linux distribution…The alpha 2 release ships with GRUB 2, the next-generation of GNU’s GRUB bootloader.”

Ryan Paul, First look: Ubuntu 9.10 alpha 2 brings Ext4, GRUB 2

There are still some aspects of GRUB 2 that are not yet working properly in this alpha release, the most notable of which is support for booting other operating systems. Users with multiboot configurations are encouraged to wait for alpha 3 or use a workaround to install GRUB 1. The Ubuntu developers are seeking help from the community to test the new version of GRUB on a wide range of hardware configurations. Testing instructions and a growing list of results can be found at the Ubuntu wiki.

If you want to test alpha 2 yourself, you can download a CD image from the Ubuntu website.


July 8, 2009  4:35 PM

Overheard – 50th anniversary of the integrated circuit



Posted by: Margaret Rouse
integrated circuit
The Computer History Museum is celebrating the 50th anniversary of the integrated circuit with a multimedia exhibit called “The Silicon Engine.”

Dan Nosowitz, The First Integrated Circuit Chip: Celebrating the 50th Anniversary

How can you resist stopping to read about the Traitorous Eight?

Using oral histories from those who experienced the creation and development of the integrated circuit, the Computer History Museum compiled a documentary on this invention that irrefutably changed the world. The year-long exhibit will feature examples of early transistors, the vacuum tubes they replaced, and early integrated circuits, as well as explaining who was behind the inventions, especially the so-called “Traitorous Eight” engineers that largely developed the IC back in 1959.


July 7, 2009  1:43 PM

Overheard – Defining kanban for programmers



Posted by: Margaret Rouse
Agile development, agile programming, kanban, kanban cards, lean programming, Microsoft Project
“We in the software community are new to kanban, and it is easy to get a bit too enthusiastic, and unintentionally change the meaning of kanban when we discuss it.”

Henrik Mårtensson, Defining Kanba

Kanban is used by in both lean and agile software development methodologies. Henrik explains that the kanban boards filled with sticky notes used by software developers are work-in-progress (WIP) kanban cards.

Scott Miller says

Each sticker or card represents a task at a small level – design login screen, develop reservation stored procedure, test login (the smaller the task the better). The stickers/cards may also be agile user stories. In addition, there are usually columns for “To Do”, “Active”, “Failed Test”, and “Complete”. There may also be columns for the different teams that are touching the task.

The task is moved along from one column to the next and everyone on the team can see what the status is and what task is due next, without everyone needing a copy of Microsoft Project on their PC’s (not that there’s anything wrong with that…). This also empowers the development team to be a “pull” system. A developer can pull a card from the “To Do” column and work on it. The project manager can see what the status is at any moment.


July 6, 2009  4:28 PM

Overheard – continuous data protection is like video



Posted by: Margaret Rouse
lauren-whitehouse CDP is like video and snapshots are like photos.

Lauren Whitehouse, as quoted in How continuous data protection is used today

As a result, CDP minimizes the loss of data in case of a failure. With snapshots, all data between a failure and the latest snapshot is lost.


July 2, 2009  6:48 PM

Overheard – Transformers in real life



Posted by: Margaret Rouse
degrees of freedom, Robotics
Autonomous, intelligent robots are great, but when they look like classic Transformers characters they’re even better.

Chris Davies, Chiara Robot with WiFi b/g, articulated claw & Pico-ITX brain [Video]

The handiwork of Mellon University’s Tekkotsu lab, the Chiara Robot has six independent legs, a claw arm with six degrees of freedom, and a combination of webcam and IR rangefinder for spotting objects and obstacles.  Even better, this is no simple lab project: the Chiara Robot will actually be manufactured and sold by RoPro Design.

I admit, Chiara is cool, but I don’t think it’s got the beat when it comes to looking like a classic Transformer character.  The WR-07, created by Nakamura san at Himeji Soft Works, is a robot that morphs from car to humanoid and back.

[kml_flashembed movie="http://www.youtube.com/v/STQ3nhXuuEM" width="425" height="350" wmode="transparent" /]


July 2, 2009  12:59 PM

Overheard – Who cares what a browser is?



Posted by: Margaret Rouse
browser, Chrome, Google
Google intern Scott Suiter went to Times Square and asked 50 random people three simple questions:

“What is a browser?”

“Do you know the difference between a browser and a search engine?”

“What browser do you use?”

It wasn’t exactly JayWalking, but to read some of the comments as this Google video makes its way around the blogosphere, you might be tempted to think it was.

JayWalking, if you’re not a Tonight Show fan, was a popular man-on-the-street interview segment where former host Jay Leno would stop pedestrians and ask them questions about American history, current events and other things a fifth grader would probably know. The more stupid the answers, the funnier the segment.

It’s pretty clear just from this little micro-survey that people were confused about the difference between a browser and a search engine.

The question is, does it really matter?

I don’t type in “http://” anymore.  I rarely type in “www.”  What I do instead sets my husband’s teeth right on edge because it’s so lazy. You see, sometimes I’ll search right from my browser window.

If you’re still pulling up the Google home page to begin your search, try skipping that step.  Open IE or Firefox and in the browser toolbar where it says “address,” type in your query –

And then imagine a whole generation of kids growing up doing the same thing.  They don’t care if they’re using the right window or the right word.  Would you be embarrassed because you called a generic bathroom tissue a “Kleenex?”  Or feel stupid if you called the HP office machine that copies and collates a “Xerox machine” instead of a photocopier?  Nah.  And that’s about how important any of this stuff is going to be to the next generation.

[kml_flashembed movie="http://www.youtube.com/v/o4MwTvtyrUQ" width="425" height="350" wmode="transparent" /]

The video ends by saying “Less than 8% of the people who were interviewed on this day knew what a browser was.”


July 1, 2009  1:29 PM

Overheard – Bugging HTML email



Posted by: Margaret Rouse
HTML email, Security, web beacon, web bug
eric lai Hewlett-Packard Co. admitted several years ago to using Web bugs to spy on reporters during an internal investigation of news media leaks by board members.

Eric Lai, Analysis: Is HTML e-mail dangerous for your PC, or just your eyeballs?

There’s some buzz right now about whether or not HTML email is so insecure that it’s never a good idea. That means that Web bugs are back in the news.  If you missed the HP story the first time around, a company rep testified in front of a House of Representatives subcommittee about bugging emails to find corporate leaks to the press. They used a service called readnotify.com

ReadNotify’s service makes bugging e-mail a matter of pointing and clicking. The ReadNotify Web page will generate a document with an image. This image, a green check mark, can simply be dragged and dropped into the document that needs to be traced. The check mark becomes transparent after being dropped.

Web bugs aren’t illegal. Marketers use them to track email blasts to see how many emails were actually opened and synchronize browser cookies so a returning visitor gets served relevant ads.


June 30, 2009  1:33 PM

Overheard – VMware vs. Microsoft



Posted by: Margaret Rouse
apologize, Hyper-V, Microsoft, VMware

“The video has ignited a longstanding debate within the partner communities of Microsoft and VMware over which company has the better approach to virtualization. In Microsoft’s view, virtualization is a feature of the operating system, while VMware represents an unnecessary — and expensive — extra layer. VMWare counters that Microsoft’s virtualization isn’t sophisticated enough for the needs of enterprises.”Kevin McLaughlin, VMware Apologizes To Microsoft For Hyper-V Bashing

Scott Drummonds, a technical marketing manager at VMware, admitted that he exercised bad judgment in posting the video and said he has removed it from Youtube. “Unfortunately, my intention to stir the pot with eye-poking banter has put my credibility and by association VMware’s credibility in question among some of you. For this I apologize,”


June 29, 2009  3:40 PM

Overheard – server virtualization



Posted by: Margaret Rouse
server sprawl, server virtualization, virtualization sprawl
In the absence of standards, users and administrators configure virtual machines on spec, often overallocating resources to VMs, which creates waste and inefficiency. This problem is exacerbated in a virtual desktop infrastructure (VDI), in which large volumes of VMs are often created over a short period of time.

Jeff Byrne, Curbing virtual server sprawl in growing virtualized environments


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: