|Here’s the thing with cloud computing — it has awesome potential for good, but it’s really going to complicate some of our current thoughts on security as your company’s data gets thrown into a giant data gumbo with everyone else’s data. I feel pretty confident that we’ll see a good amount of enterprising hackers enjoying that gumbo.
Nathan McFeters, AV in the cloud… wait, what?
|One good reason to use disposable email addresses is that it makes it easy to identify who has sold your details to spammers. If you use a unique address for each site you sign up with, then you will know instantly who to point the finger at. You will soon find out who can be trusted with your data – and who can’t.
Sharon Hurley Hall, Disposable Email Addresses
|The door to the room simply reads “the lab.” Inside are racks of hundreds of processors and terabytes of disk drives needed to capture the digital evidence that must be logged as carefully as evidence is maintained by crime scene investigators.
John Markoff, A Robot Network Seeks to Enlist Your Computer
John Markoff gives a nice overview of what Microsoft is doing to help fight cybercrime — and why:
Just as gangs will often force a recruit to commit a crime as a test of loyalty, in cyberspace, bot-herders will test recruits in an effort to weed out spies. Microsoft investigators would not discuss their solution to this problem, but said they avoided doing anything illegal with their software.
One possible approach would be to create sensors that would fool the bot-herders by appearing to do malicious things, but in fact not perform the actions.
In 2003 and 2004 Microsoft was deeply shaken by a succession of malicious software worm programs with names like “Blaster” and “Sasser,” that raced through the Internet, sowing chaos within corporations and among home computer users. Blaster was a personal affront to the software firm that has long prided itself on its technology prowess. The program contained a hidden message mocking Microsoft’s co-founder: “billy gates why do you make this possible? Stop making money and fix your software!!”
|By disguising layoffs as negative reviews, Yahoo management may push employees to leave, sans severance.
Yahoo’s stealth layoffs
The Company’s goal is to reduce its current annualized cost run rate of approximately $3.9 billion by more than $400 million before the end of 2008. The Company anticipates that both headcount and non-headcount-related costs will be reduced by these actions. Because the majority of expenses are headcount-related, Yahoo! expects to reduce its global workforce by at least 10 percent during the fourth quarter of 2008.
Whenever I read about reducing head counts and see the photo above, a little tune runs through my head.
“It’s the most – wonderful – time – of – the – year!”
I’m glad I’m not working at Yahoo. If their press release says they’re letting 1500 employees go, you can bet it’ll be closer to twice that number by the time the Christmas carnage is over.
And with all the “crisis of confidence” sound bytes in the media, I’m also going to bet that the commenter over at Valleywag hit the nail on the head. This year, as never before, there will be some creative aspects to the traditional laying off of employees before the holidays.
Of course we all know the words to the song as we gather round the water cooler around the beginning of December . You can expect the traditional “downsizing” and “reorganizing” verses that we’ve come to associate with garland and mistletoe. But this year don’t be surprised if employers introduce some new lyrics to the song and we find ourselves singing about “stealth layoffs.”
Stealth layoffs sounds much more hi-tech than “pushing an employee out so we don’t have to pay him benefits, severance or unemployment insurance.” For the latest numbers in layoffs, be sure to check out Rafe Needleman’s Tech Layoff Scorecard.
|Drizzle will target the MySQL core users, the web users whose requirements have been ignored for years while the core MySQL developers have added features that they don’t need.
Michael Widenius, What if
|The hardware failed, it’s unrecoverable. They did testing and it’s no longer fixable from the ground.
Allard Beutel, as quoted in Hubble Space Telescope Suffers Serious Failure
|To really solve these VoIP problem, Wi-Fi systems must be able to constantly choose transmission paths between the AP and voice device that deliver the strongest signal, fewest delays and lowest packet error rates, while simultaneously attenuating any interference or noise.
David Callisch, Minding the VoIP…
Wi-Fi Multimedia (WMM) is four traffic queues (voice, video, data and background) that are shared among all users. The problem is if one VoFi device is lost (for whatever reason) the AP typically retransmits to that device before servicing other devices. The solution is to have a wireless LAN system that uses a per-client, per-traffic class QoS scheme so every client and traffic flow is fairly serviced.
|IPTV is a system where video content is transmitted in the form of IP-data packages over a closed secure network. The infrastructure is configured such that viewers can only receive the IPTV provider’s own TV-channels. IPTV focuses primarily on the TV-set in the living room, generally a wide-screen TV with high image quality. A Set Top Box (STP) is required to receive the signal.
Rob van den Dam, IPTV AND INTERNET TV DEVELOPMENT – Let the TV-battle begin
|Fittingly, the NEOSSat project was announced just a few days before the 100th anniversary of the Tunguska event, when a meteorite blasted into the Earth’s atmosphere over a Siberian forest, scorching and knocking down millions of trees over 2,000 square kilometres.
Dawn Walton, A Canadian gadget that may save the world
|When you enable Mail Goggles, it will check that you’re really sure you want to send that late night Friday email. And what better way to check than by making you solve a few simple math problems after you click send to verify you’re in the right state of mind?
Jon Perlow, New in Labs: Stop sending mail you later regret