|If WiMax is the hippie, grass-roots parents on “Family Ties,” LTE is closer to Alex P. Keaton.|
This is a great quote. If you’re confused about all the mobile acronyms, Gizmodo has put together a good list.
|Mathematicians at UCLA have discovered a 13 million-digit prime number, a long-sought milestone that makes them eligible for a $100,000 prize given out by the Electronic Frontier Foundation. The group found the 46th known Mersenne prime last month on a network of 75 computers running Windows XP. The number was then verified by a different computer system.
Nuno Morgadinho, New Prime Number Discovered
What’s the big deal about finding very large prime numbers? Encryption.
RSA encryption is based on prime numbers — two prime numbers multiplied together. The original two prime numbers are known as your ‘private key’. When you multiply them together, the product (a number that’s only divisible by one, itself and those two prime numbers) is called the ‘public key’.
| The CIO Executive Board, a division of the Corporate Executive Board, polled 50 participants in a CIO conference call last Thursday to discuss the impact of turmoil in the financial markets and economic uncertainty on Q4 spending and 2009 plans.
According to the poll, 61% of CIOs are currently re-evaluating their 2009 budget plans and 59% are already re-negotiating IT vendor contracts. Almost half, 49%, are cutting spend on consultants and contractors and a majority, 59% are putting non-essential IT projects on hold. Twenty four percent (24%) are considering a hiring freeze.
Interesting article by Pam Baker — it’s not suprising that 24% are considering a hiring freeze. I’m curious to know how many would have said they’re considering staff reductions.
Interestingly, he [Ballmer] identified his top competitors as Google, Apple and Linux. Secondary foes included IBM, Oracle, Amazon and SAP.Jeff Bussgang, Microsoft VC Conference – Steve Ballmer’s View On The World
I started out reading an article on Microsoft’s new Research and Development center for enterprise search, went on to read what Steve Ballmer said about the economy and how it’s going to affect IT and ended up at Jeff Bussgang’s blog. I think Jeff’s is the only blog post I’ve read in ages that gives Ballmer credit for all he’s accomplished.
|One reason you should not use web applications to do your computing is that you lose control. It’s just as bad as using a proprietary program. Do your own computing on your own computer with your copy of a freedom-respecting program. If you use a proprietary program or somebody else’s web server, you’re defenseless. You’re putty in the hands of whoever developed that software.
Richard Stallman, Cloud computing is a trap, warns GNU founder Richard Stallman
Two thoughts. First, Happy Birthday to Gnu. Second…Richard Stallman is pretty predictable, isn’t he?
|The interesting thing about cloud computing is that we’ve redefined cloud computing to include everything that we already do.|
The problem is that every tech company now wants to be associated with cloud computing, no matter if their products and services meet the basic criteria. At least Ellison isn’t afraid to address the hijacking of the phrase by marketers.
I think they have it backwards. The term was INVENTED for marketers and tech media, not hijacked by them.
|The most important reason for limiting the security privileges your code requires to run is to reduce the damage that can occur should your code be exploited by a malicious user.
G Andrew Duthie, The Importance of the Principle of Least Privilege
Google Chrome uses the principle of least privilege. Each tab in Chrome is sandboxed (isolated) to prevent malware from installing itself or allowing what happens in one tab to affect what happens in another.
|As short as a few years ago, B2B marketers were limited to search and targeted email marketing. Now you have RSS, podcasts, videocasts, blogs, wikis, mashups, widgets the list goes on. The big opportunity here is for B2B marketers to have a lead nurturing platform in place and then start layering on these tactics to keep the conversation going with potential prospects.|
First, you have to have a lead nurturing platform in place. One that allows you to segment lists, send specific messages, score activities and profile behavior of those that have expressed interest in your company. Then you can bolt on more search traffic, and then you can serve special ads to those in your database.
You gotta know what’s happening on your website if you EVER hope to be able to calculate an ROI. Second, once you have that in place you can begin to layer on more types of media syndicated podcasts, third party wikis, external blogs and see if your database is going there and interacting with these sites were you are placing your content.
|Have you heard of “net pollution”? If not, you soon will, because it’s a term being pushed by Arts+Labs, the new group backed by AT&T, Viacom, NBC Universal, Cisco, and Microsoft.
Nate Anderson, AT&T, NBC lump piracy in with spam, malware as net pollution
“The problem with malware being served through advertisements is starting to become a serious one, with attackers seeming to enjoy it more and more because websites are not rushing to take steps to prevent it.”
Lucian Constantin, Clipboard Hijack Spreads Panic
This particular attack is copying a link to the computer clipboard, which seems to be persistent and cannot be removed by simple means, in most cases a computer reboot being necessary. The link in question redirects the user to a website that promotes a rogue antivirus program that is itself a spyware application.
So what can you do if your clipboard has been hijacked? Shut down your computer immediately and wait 30 seconds before rebooting.