Overheard: Word of the Day


October 8, 2008  11:02 AM

Overheard: Clickjacking can turn your computer into a remote surveillance device

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
jeremiah_grossman.jpg The bad news is that with clickjacking, any computer with a microphone and/or a web camera attached can be invisibly coaxed into being a remote surveillance device.

Jeremiah Grossman, Clickjacking: Web pages can see and hear you

October 7, 2008  2:32 PM

What is IT? First GUI desktop

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

[kml_flashembed movie="http://www.youtube.com/v/6_X04XwrUY8" width="425" height="350" wmode="transparent" /]


October 6, 2008  2:11 PM

Overheard: Geva Perry explains PaaS

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
geva_perry.jpg Another dimension PaaS vendors should think about is who is the target user of the platform. The typical choices are programmers versus so-called business users (non-programmers). Bungee, Google App Engine and 10gen are all clearly targeting programmers. Ning, on the other hand, allows people without any code-writing skills to quickly create their own social network.

Geva Perry, Thoughts on Platform-as-a-Service


October 6, 2008  12:49 PM

Overheard: LTE is like Alex P. Keaton

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
alexpkeaton.jpg If WiMax is the hippie, grass-roots parents on “Family Ties,” LTE is closer to Alex P. Keaton.

Stacey Higginbotham, LTE vs WiMAX: A Little 4G Sibling Rivalry

This is a great quote. If you’re confused about all the mobile acronyms, Gizmodo has put together a good list.


October 3, 2008  1:11 PM

Overheard: The bigger the prime number, the more secure the encryption

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
nuno_morgadinho.jpg Mathematicians at UCLA have discovered a 13 million-digit prime number, a long-sought milestone that makes them eligible for a $100,000 prize given out by the Electronic Frontier Foundation. The group found the 46th known Mersenne prime last month on a network of 75 computers running Windows XP. The number was then verified by a different computer system.

Nuno Morgadinho, New Prime Number Discovered

What’s the big deal about finding very large prime numbers? Encryption.

RSA encryption is based on prime numbers — two prime numbers multiplied together. The original two prime numbers are known as your ‘private key’.  When you multiply them together, the product (a number that’s only divisible by one, itself and those two prime numbers) is called the ‘public key’.


October 2, 2008  4:36 PM

Overheard: Wall Street, the election and your tech job

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
pambaker.jpg The CIO Executive Board, a division of the Corporate Executive Board, polled 50 participants in a CIO conference call last Thursday to discuss the impact of turmoil in the financial markets and economic uncertainty on Q4 spending and 2009 plans.

According to the poll, 61% of CIOs are currently re-evaluating their 2009 budget plans and 59% are already re-negotiating IT vendor contracts. Almost half, 49%, are cutting spend on consultants and contractors and a majority, 59% are putting non-essential IT projects on hold. Twenty four percent (24%) are considering a hiring freeze.

Pam Baker, Wall St. and Elections Piling on the Uncertainty

Interesting article by Pam Baker — it’s not suprising that 24% are considering a hiring freeze. I’m curious to know how many would have said they’re considering staff reductions.


October 1, 2008  2:13 PM

Overheard: Who does Microsoft view as its competitors?

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

jeff_bussgang.jpg

Interestingly, he [Ballmer] identified his top competitors as Google, Apple and Linux.  Secondary foes included IBM, Oracle, Amazon and SAP.Jeff Bussgang, Microsoft VC Conference – Steve Ballmer’s View On The World

I started out reading an article on Microsoft’s new Research and Development center for enterprise search, went on to read what Steve Ballmer said about the economy and how it’s going to affect IT and ended up at Jeff Bussgang’s blog. I think Jeff’s is the only blog post I’ve read in ages that gives Ballmer credit for all he’s accomplished.


October 1, 2008  12:06 PM

Overheard: Richard Stallman and cloud computing

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
richard_stallman.jpg One reason you should not use web applications to do your computing is that you lose control. It’s just as bad as using a proprietary program. Do your own computing on your own computer with your copy of a freedom-respecting program. If you use a proprietary program or somebody else’s web server, you’re defenseless. You’re putty in the hands of whoever developed that software.

Richard Stallman, Cloud computing is a trap, warns GNU founder Richard Stallman

Two thoughts. First, Happy Birthday to Gnu. Second…Richard Stallman is pretty predictable, isn’t he?


September 30, 2008  6:40 PM

Overheard: Slap “cloud computing” on it and call it new

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
The interesting thing about cloud computing is that we’ve redefined cloud computing to include everything that we already do.

Larry Ellison, as quoted in Oracle’s Ellison nails cloud computing

The problem is that every tech company now wants to be associated with cloud computing, no matter if their products and services meet the basic criteria. At least Ellison isn’t afraid to address the hijacking of the phrase by marketers.

I think they have it backwards. The term was INVENTED for marketers and tech media, not hijacked by them.


September 30, 2008  1:12 PM

Overheard: Google Chrome and the principle of least privilege

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
g_andrew_duthie.jpg The most important reason for limiting the security privileges your code requires to run is to reduce the damage that can occur should your code be exploited by a malicious user.

G Andrew Duthie, The Importance of the Principle of Least Privilege

Google Chrome uses the principle of least privilege. Each tab in Chrome is sandboxed (isolated) to prevent malware from installing itself or allowing what happens in one tab to affect what happens in another.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: