|When it takes just a mouse click to open Gmail and have the message saved with the prospect record, it won’t take long before Gmail becomes the default email system for most Salesforce users…
For Google, the combination brings Google Apps into big enterprise accounts and also expands its footprint among smaller businesses. For Salesforce.com, it expands the reach of its Salesforce application and further validates its Force.com integration and development platform. But more importantly for both of them — and for the rest of us who are committed to the on-demand model — it puts extra weight behind the gathering trend towards running business applications and computing in the cloud.
Phil Wainewright, Salesforce and Google team to conquer the enterprise
I’m not so sure about the first statement I grabbed from Phi’s excellent post — but I’m pretty sure he’s got it right about us looking back and seeing this as the beginning of the tipping point for enterprise computing in the cloud.
|OpenDNS released a free tool today called fixmylinksys.com that lets Linksys users easily change their default password to protect themselves from the [DNS rebinding] hack Kaminsky will demo.
Kelly Jackson Higgins RSA Session Features Live Linksys Router Hack
I bet you still know people who use admin or 123456 as a router password. Let them know about DNS binding attacks.
|We rarely talk about people being “book addicts” – we say “book worms”, because reading a book is an activity we associate with intellectual exercise.
Bobbie Johnson, Addicted? Not quite
Lots of buzz lately about Internet addiction being a mental illness. I found it interesting that South Korea and China are often mentioned as countries having problems with this particular addiction. Hmmmm….aren’t they also two countries that have been accused of Internet censorship? Promoting the dangers of IAD (Internet Addiction Disorder) might be a good way for the government to protect people for their own good. I love conspiracy theories.
|“Many folks in the anti-virus and broader Internet security space say Damballa is trying to make a name for itself by hyping this threat, and that Kraken is nothing more than a renamed and repackaged “Bobax,” a worm of similar lineage and methods that was discovered several years ago.”
Brian Krebs, Kraken Spawns a Clash of the Titans
The Computer History Museum has put together a great series of video tours. Here’s a peek at the IBM 7030, the first “supercomputer.”
[kml_flashembed movie="http://www.youtube.com/v/HTs9JZ7OMYQ" width="425" height="350" wmode="transparent" /]
The product name is the Power 575. IBM is promoting is as a hydro-cluster supercomputer. To paint it green, the literature says the Power 575 requires 80 percent fewer air conditioning units and reduce total cooling costs by 40%. (It’s water-cooled).
[kml_flashembed movie="http://www.youtube.com/v/ioCZojN4A0g" width="425" height="350" wmode="transparent" /]
Key points discussed at last visit to IBM:
1. Water cooling is 4,000 times more efficient than air cooling.
2. Air cooling has become too expensive and there’s a finite limit to how much power you can bring in.
3. It’s tough to budget ahead for air cooling — power costs are a big unfriendly variable.
4. Heated water is easier to recycle than heated air.
|“Google could parlay its search and advertising technology, market dominance, and its infrastructure prowess into a powerful engine that runs and monetizes thousands or millions of externally developed applications.
Salesforce.com provides a more mature example today with its Force.com platform. It allows developers to write applications, mostly CRM-oriented, in a variety of languages that can run natively on the Salesforce.com software platform and data centers.”
Dan Farber, Web 2.5: The emergence of platforms-as-a-service
I like this analogy. Hadn’t thought of Salesforce this way before.
|“What is different is that we’re going to have comprehensive coverage across federal networks, and that all the information about potential intrusions or malicious code would flow to a central point, the U.S. Computer Emergency Readiness Team at the Department of Homeland Security.”
Scott Charbo, as quoted in Analysis: Einstein and U.S. cybersecurity
Mr. Charbo is the Chief Information Officer at the Department of Homeland Security. He’s talking about EINSTEIN, a federal government’s intrusion detection software application. It’s been available since 2004, but now the DHS is going to make it mandatory.
What took them so long, you ask? Well, apparently there wasn’t a single “business owner” with enough power to mandate EINSTEIN’s global use until February, when President Bush signed that multi-billion-dollar cybersecurity initiative. EINSTEIN has received its share of criticism. Some detractors point out that it’s not robust enough. Some worry that if everyone’s using the same software, everyone shares the same vulnerabilities. Some people just seem content to make Bush/Einstein jokes.
I’m not sure what I think about this yet.
See also: Einstein keeps an eye on agency networks
|“QoE measurement is about being able to reconstruct the voice signal in a measurement device, and to then run signal processing algorithms to determine the call quality. This type of QoE measurement will deliver a score that much more accurately reflects the true user experience than results by just watching the network packet characteristics.”
– John Bartlett Quality of Experience (QoE)
|Both finger prints and iris patterns can be more prone to copying by a third person. But finger veins are not directly visible to a third person, which makes them more suitable for security use.
Hitachi spokesman Atsushi Konno, as quoted in Vein recognition touted for ID systems
I wonder if the finger has to be attached to a live person for this technology to work? That makes it even MORE suitable.