Word of the Day: Tech Definitions from WhatIs.com

October 22, 2008  7:06 PM

Overheard: Using disposable email accounts to see who’s selling your name

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
sharon-hurley-hall.jpg One good reason to use disposable email addresses is that it makes it easy to identify who has sold your details to spammers. If you use a unique address for each site you sign up with, then you will know instantly who to point the finger at. You will soon find out who can be trusted with your data – and who can’t.

Sharon Hurley Hall, Disposable Email Addresses

October 22, 2008  3:34 PM

Overheard: Where do you keep your honeypot?

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
john_markoff.jpg The door to the room simply reads “the lab.” Inside are racks of hundreds of processors and terabytes of disk drives needed to capture the digital evidence that must be logged as carefully as evidence is maintained by crime scene investigators.

John Markoff, A Robot Network Seeks to Enlist Your Computer

John Markoff gives a nice overview of what Microsoft is doing to help fight cybercrime — and why:

Just as gangs will often force a recruit to commit a crime as a test of loyalty, in cyberspace, bot-herders will test recruits in an effort to weed out spies. Microsoft investigators would not discuss their solution to this problem, but said they avoided doing anything illegal with their software.

One possible approach would be to create sensors that would fool the bot-herders by appearing to do malicious things, but in fact not perform the actions.

In 2003 and 2004 Microsoft was deeply shaken by a succession of malicious software worm programs with names like “Blaster” and “Sasser,” that raced through the Internet, sowing chaos within corporations and among home computer users. Blaster was a personal affront to the software firm that has long prided itself on its technology prowess. The program contained a hidden message mocking Microsoft’s co-founder: “billy gates why do you make this possible? Stop making money and fix your software!!”

October 22, 2008  2:57 PM

Overheard: Stealth layoffs at Yahoo

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
pink_slip.jpg By disguising layoffs as negative reviews, Yahoo management may push employees to leave, sans severance.
Yahoo’s stealth layoffs

The Company’s goal is to reduce its current annualized cost run rate of approximately $3.9 billion by more than $400 million before the end of 2008. The Company anticipates that both headcount and non-headcount-related costs will be reduced by these actions. Because the majority of expenses are headcount-related, Yahoo! expects to reduce its global workforce by at least 10 percent during the fourth quarter of 2008.

Whenever I read about reducing head counts and see the photo above, a little tune runs through my head.
“It’s the most – wonderful – time – of – the – year!”

I’m glad I’m not working at Yahoo. If their press release says they’re letting 1500 employees go, you can bet it’ll be closer to twice that number by the time the Christmas carnage is over.

And with all the “crisis of confidence” sound bytes in the media, I’m also going to bet that the commenter over at Valleywag hit the nail on the head.  This year, as never before, there will be some creative aspects to the traditional laying off of employees before the holidays.

Of course we all know the words to the song as we gather round the water cooler around the beginning of December .  You can expect the traditional “downsizing” and “reorganizing” verses that we’ve come to associate with garland and mistletoe. But this year don’t be surprised if employers introduce some new lyrics to the song and we find ourselves singing about “stealth layoffs.”

Stealth layoffs sounds much more hi-tech than “pushing an employee out so we don’t have to pay him benefits, severance or unemployment insurance.”  For the latest numbers in layoffs, be sure to check out Rafe Needleman’s Tech Layoff Scorecard.

October 21, 2008  11:43 AM

Overheard: Drizle will target MySQL users

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
monty.jpg Drizzle will target the MySQL core users, the web users whose requirements have been ignored for years while the core MySQL developers have added features that they don’t need.

Michael Widenius, What if

October 15, 2008  4:28 PM

Overheard: Hubble telescope hardware failure

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
allard_beutel1.gif The hardware failed, it’s unrecoverable.  They did testing and it’s no longer fixable from the ground.

Allard Beutel, as quoted in Hubble Space Telescope Suffers Serious Failure

October 14, 2008  7:28 PM

Overheard: Wi-Fi Multimedia (WMM) QoS

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
david_callisch.jpg To really solve these VoIP problem, Wi-Fi systems must be able to constantly choose transmission paths between the AP and voice device that deliver the strongest signal, fewest delays and lowest packet error rates, while simultaneously attenuating any interference or noise.

David Callisch, Minding the VoIP…

Wi-Fi Multimedia (WMM) is four traffic queues (voice, video, data and background) that are shared among all users. The problem is if one VoFi device is lost (for whatever reason) the AP typically retransmits to that device before servicing other devices. The solution is to have a wireless LAN system that uses a per-client, per-traffic class QoS scheme so every client and traffic flow is fairly serviced.

October 14, 2008  11:28 AM

Overheard: IPTV vs Internet TV – What’s the difference?

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
van_den_dam_rob2.jpg IPTV is a system where video content is transmitted in the form of IP-data packages over a closed secure network. The infrastructure is configured such that viewers can only receive the IPTV provider’s own TV-channels. IPTV focuses primarily on the TV-set in the living room, generally a wide-screen TV with high image quality. A Set Top Box (STP) is required to receive the signal.

Rob van den Dam, IPTV AND INTERNET TV DEVELOPMENT – Let the TV-battle begin

October 9, 2008  4:52 PM

Overheard: NEOSSat project announced on 100th anniversary of meteorite crash

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
dawn_walton.jpg Fittingly, the NEOSSat project was announced just a few days before the 100th anniversary of the Tunguska event, when a meteorite blasted into the Earth’s atmosphere over a Siberian forest, scorching and knocking down millions of trees over 2,000 square kilometres.

Dawn Walton, A Canadian gadget that may save the world

October 8, 2008  5:35 PM

Overheard: Mail Goggles are a sobriety CAPTCHA

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
jonathan_perlow.jpg When you enable Mail Goggles, it will check that you’re really sure you want to send that late night Friday email. And what better way to check than by making you solve a few simple math problems after you click send to verify you’re in the right state of mind?

Jon Perlow, New in Labs: Stop sending mail you later regret

October 8, 2008  11:02 AM

Overheard: Clickjacking can turn your computer into a remote surveillance device

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
jeremiah_grossman.jpg The bad news is that with clickjacking, any computer with a microphone and/or a web camera attached can be invisibly coaxed into being a remote surveillance device.

Jeremiah Grossman, Clickjacking: Web pages can see and hear you

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: