|In a move apparently designed to reduce poor alignment and create strategic opportunity, Bausch & Lomb, the eye care company, has merged its customer service and information technology functions together under CIO Alan Farnsworth.
Michael Krigsman, Bausch & Lomb reduces IT boundaries
Is this the first harbinger of what the future holds for CIOs around the world? Was Nicholas Carr right after all? Has IT become so integrated into business that the CIO not only doesn’t have to have a technical background — he also has to have a second job within the company?
|If there’s one thing you do not want to be on fire, it’s your DNS server. Nothing makes a network go wobbly faster.
Dan Kaminsky, Here Comes The Cavalry
Recently, a significant threat to DNS, the system that translates names you can remember (such as www.doxpara.com) to numbers the Internet can route (126.96.36.199) was discovered, that would allow malicious people to impersonate almost any website on the Internet. Software companies across the industry have quietly collaborated to simultaneously release fixes for all affected name servers.
Dan has posted a very handy DNS Test Widget on his site that allows you to find out if the DNS server you use is vulnerable. On a totally unrelated note, I wonder what made him pick this photo for his blog?
|A new Harris Interactive study suggests 25 percent of users with mobile Internet access now use their devices to buy goods and services online with a credit card, and nearly one in five saying they would like to someday use cell phones as a “mobile wallet,” where charges would be billed directly to their mobile accounts.
Gary Kim, Growing Interest in Mobile Transactions
Besides requiring the right internet log-in password, the user must also have a mobile phone which is registered with Qpay’s system. Next is voice bio-metrics, which only recognizes the authorized user’s voice. Additionally, automated random questions on personal details are posed to the user and would vary each time. Finally, the user must say a random word correctly.
|Security people are often the black-and-white kind of people that I can’t
stand. I think the OpenBSD crowd is a bunch of masturbating monkeys, in
that they make such a big deal about concentrating on security to the
point where they pretty much admit that nothing else matters to them.
Linus Torvalds, in an email to the Linux kernel developer mailing list
The man has a way with words. Here’s his explanation.
|“I built my entire life around a facade. I’m very embarrassed and I’m ashamed.”
Robert Soloway, as quoted in Spammer sentenced to 47 months in prison
The Zombie “Spam King” was sentenced to four years behind bars and has to pay over $700,000 in restitution. It wasn’t the CAN-SPAM act that got him. Like Al Capone before him, Soloway was busted for failing to pay taxes. Soloway, who already had a $7 million judgement against him from Microsoft and a $10 million judgement against him from an ISP in Oklahoma, pleaded guilty to mail fraud, fraud in electronic mail and failure to file a tax return.
Ironically, the spam this guy sent out was all about how to send spam. His company’s name? Newport Internet Marketing. For $495, Soloway’s customers could have an ad sent to 20,000,000 e-mail addresses. He also sold $150 software for sending out unsolicited bulk email.
|“The first thing I want you to know, Mr. Mayor, is that when you walk out of this room, you will have the computer codes.”
Terry Childs, as quoted in S.F. mayor gets keys to city’s computer
The city of SanFrancisco had Cisco engineers working round the clock, but they weren’t getting anywhere. Terry Childs really had things locked down. The fall-out from this is going to be interesting.
|While some cities have seen their dreams of providing wireless Internet access for all fade, others have forged ahead with wireless networks for an altogether different purpose: surveillance.
Joshua Brockman, Cities Gone Wireless: Safety Or Surveillance?
Today, public safety is the “largest and most successful sector” in the municipal wireless market, according to MuniWireless.com, a Web site devoted to tracking wireless broadband projects and technologies.
|I shoot video using my cell phone all the time. Transferring it to other sites was a major pain until Qik came around. Using Qik, any video you shoot is streamed live, and also archived at the same time, so you can watch it again later.|
I can see this really taking off — it makes much more sense to me than Twitter does.
I wonder how they’re going to handle the pro-privacy backlash — it’s bound to be an issue.
When people hear about Twitter, their immediate reaction is that it’s the simplest and stupidest idea in the world. They do not want to know that their brother is eating a hot dog right now, but then they discover that their friends are on it. And so are the L.A. Fire Department, NASA and JetBlue. Then they get it.
Biz Stone, as quoted in Twitter took off from simple to ‘tweet’ success
Biz Stone used to work for Google — I wonder what his parents look like? Who would name their kid Biz Stone? It’s like they knew he’d be famous.
|HA clusters are deployed for the purpose of improving accessibility to the application, in the event of a hardware failure. They do this by incorporating redundant nodes that provide the capability.
Ken Milberg, Linux clusters vs. grids