|The most important reason for limiting the security privileges your code requires to run is to reduce the damage that can occur should your code be exploited by a malicious user.
G Andrew Duthie, The Importance of the Principle of Least Privilege
Google Chrome uses the principle of least privilege. Each tab in Chrome is sandboxed (isolated) to prevent malware from installing itself or allowing what happens in one tab to affect what happens in another.
|As short as a few years ago, B2B marketers were limited to search and targeted email marketing. Now you have RSS, podcasts, videocasts, blogs, wikis, mashups, widgets the list goes on. The big opportunity here is for B2B marketers to have a lead nurturing platform in place and then start layering on these tactics to keep the conversation going with potential prospects.|
First, you have to have a lead nurturing platform in place. One that allows you to segment lists, send specific messages, score activities and profile behavior of those that have expressed interest in your company. Then you can bolt on more search traffic, and then you can serve special ads to those in your database.
You gotta know what’s happening on your website if you EVER hope to be able to calculate an ROI. Second, once you have that in place you can begin to layer on more types of media syndicated podcasts, third party wikis, external blogs and see if your database is going there and interacting with these sites were you are placing your content.
|Have you heard of “net pollution”? If not, you soon will, because it’s a term being pushed by Arts+Labs, the new group backed by AT&T, Viacom, NBC Universal, Cisco, and Microsoft.
Nate Anderson, AT&T, NBC lump piracy in with spam, malware as net pollution
“The problem with malware being served through advertisements is starting to become a serious one, with attackers seeming to enjoy it more and more because websites are not rushing to take steps to prevent it.”
Lucian Constantin, Clipboard Hijack Spreads Panic
This particular attack is copying a link to the computer clipboard, which seems to be persistent and cannot be removed by simple means, in most cases a computer reboot being necessary. The link in question redirects the user to a website that promotes a rogue antivirus program that is itself a spyware application.
So what can you do if your clipboard has been hijacked? Shut down your computer immediately and wait 30 seconds before rebooting.
|Previously, www.business.com, an online resource that has been very popular for many years and that has over 600,000 web pages in its root index was banned and penalized in Google, simply because it was using the wrong kind of redirect method. Getting a site banned in a search engine because of the wrong class of redirect happens more often than some people think.
Serge Thibodeau, The Rundown on 301 and 302 Redirects
Serge provides a good overview of the problems bad redirects can cause — and how to make sure your redirects are the kind Google tolerates.
|PON (Passive Optical Network) and Active Ethernet have falsely been cast as competitive technologies when, in fact, they are complementary.
David Russell, marketing director at Calix
Increasingly, GPON and Active Ethernet are being viewed as complementary technologies based on the application. GPON is ideal for mass residential and small business deployments, while Active Ethernet is sometimes preferred for larger businesses that demand dedicated fiber access.
|Individual blogs are not very interesting in themselves. What is important is how they link to each other to create a massive network.
Professor Henry Farrell, as quoted in In which I muse about what “Oracle blogging” means
|Microsoft really is losing it. I can’t help but notice that the evil empire keeps making one business mis-step after another since Bill has left. May I suggest firing Ballmer once more? It really is for your own good.
Steven J. Vaughan-Nichols, You can put lipstick on a pig but it’s still Vista
Have you ever wanted to make up a word? Now’s the time. Just make sure it has something to do with a cloud. Play a little Rolling Stones and get those neurons firing (Hey, hey, hey, hey — get off of my cloud)
I just want to jot these down before I forget. Seems like every day I stumble across more newly-coined cloud terms. Did you know how cloud computing got its name? From flow charts, where a cloud is used to represent the Internet.
cloud app – a software application that is never installed on a local machine — it’s always accessed over the Internet.
cloud arcs – short for cloud architectures. Designs for software applications that can be accessed and used over the Internet. (Cloud-chitecture is just too hard to pronounce.)
cloud bridge – running an application in such a way that its components are integrated within multiple cloud environments (which could be any combination of internal/private and external/public clouds).
cloudcenter – a large company, such as Amazon, that rents its infrastructure.
cloud client – computing device for cloud computing. Updated version of thin client.
cloud enabler – vendor that provides technology or service that enables a client or other vendor to take advantage of cloud computing.
cloud envy – used to describe a vendor who jumps on the cloud computing bandwagon by rebranding existing services.
cloud OS – also known as platform-as-a-service (PaaS). Think Google Chrome.
cloud portability – the ability to move applications and associated data across multiple cloud computing environments.
cloud provider – makes storage or software available to others over a private network or public network (like the Internet.)
cloud service architecture (CSA) – an architecture in which applications and application components act as services on the Internet
cloud storage – (just what it says) Sometimes compared to leasing a car – you’ll have monthly payments but hopefully you’ll always have the lastest/greatest technology. You’ll never own the technology though.
cloudburst – what happens when your cloud has an outage or security breach and your data is unavailable.
cloud as a service (CaaS) – a cloud computing service that has been opened up into a platform that others can build upon.
cloud-oriented architecture (COA) – IT architecture that lends itself well to incorporating cloud computing components.
cloudsourcing – outsourcing storage or taking advantage of some other type of cloud service.
cloudstorm – connecting multiple cloud computing environments. Also called cloud network.
cloudware – software that enables building, deploying, running or managing applications in a cloud computing environment.
cloudwashing – slapping the word “cloud” on products and services you already have.
external cloud – a cloud computing environment that is external to the boundaries of the organization.
funnel cloud – discussion about cloud computing that goes round and round but never turns into action (never “touches the ground”)
hybrid cloud – a computing environment that combines both private and public cloud computing environments.
internal cloud – also called a private cloud. A cloud computing-like environment within the boundaries of an organization.
personal cloud – synonymous with something called MiFi, a personal wireless router. It takes a mobile wireless data signal and translates it to wi-fi. It’s pronounced ME-fi, as in “the personal cloud belongs to me — but if you’re nice I’ll let you connect.”
private cloud – an internal cloud behind the organization’s firewall. The company’s IT department provides softwares and hardware as a service to its customers — the people who work for the company. Vendors love the words “private cloud.”
public cloud – a cloud computing environment that is open for use to the general public.
roaming workloads– the backend product of cloudcenters.
vertical cloud – a cloud computing environment optimized for use in a particular vertical industry
virtual private cloud (VPC) – similar to VPN but applied to cloud computing. Can be used to bridge private cloud and public cloud environments.
Have you run into a cloud word that’s not on this list or have an addition/correction to my notes above? Drop a comment below or write to me — mrouse at techtarget dot com.
|The CX1 is Cray’s new personal supercomputer. The unit is small — it’s meant to fit beside a desk — and it can be plugged into a wall socket on standard office power.
Ian Miller, as quoted in Cray Unveils Personal Supercomputer
Lots of buzz about the Cray CX1 this week, although the idea of an office supercomputer is nothing new. NEC is probably the leader on that front. What’s different about this announcement is that Cray teamed up with Microsoft and these little babies come pre-installed with Windows HPC Server 2008.