Word of the Day: Tech Definitions from WhatIs.com

June 4, 2008  11:16 AM

Overheard: India faces “employability” problem

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
34820384.jpg Recent statistics show that the job opportunities in India have outnumbered the available hands. The problem is more of “Employability” rather than employment.  

vidyai, The Soft Skills Training – Where it begins!!

June 3, 2008  12:29 PM

Overheard: More than token opposition to tokenization

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
credit_cards.jpg The most popular reason for not implementing tokenization is that companies have already implemented data encryption and key management systems costing hundreds of thousands of dollars, and either they did not feel they needed tokenization or they were unwilling to be perceived by upper management as “changing course” by recommending the removal of the data they just spent all this money to protect.

Evan Schuman, Opposition To Tokenization A Lot More Than Token

June 2, 2008  12:12 PM

Overheard: Enterprise Web 2.0 inbreeding

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
martin_kloos.jpg Spending too much time with the ‘in crowd’ who ‘get’ Enterprise 2.0 can result in serious over-enthusiasm and lack of realism.

Martin Kloos, The state of Enterprise 2.0 and why we need new stories

Ever since Forrester released a report last month saying that Web 2.0 technologies will have a world-wide market value of $4.6 billion by the year 2013, the early adopters have been patting themselves on the back, saying “I told you so.”

Not so fast, bucko. 2013 is a long way away and enterprise IT is not just going to open its doors to the new kids on the block just because a new generation is entering the workplace. What’s more likely to happen is that legacy IT applications will make updates, incorporating Web 2.o features that work for a particular industry or software application.

At the very least…those Web 2.0 apps wanting consideration will need respectable names. Manly names. Serious names. Names IT professionals don’t feel embarrassed talking about at manager’s meetings. Twitter? Tweets? I don’t think so.

May 29, 2008  12:45 PM

Overheard: Visual Studio Express — Hello World

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
dan_fernandez.jpg The reason we’re able to offer Express for free and even let developers build commercial applications with Express is because we limit 3rd party extensibility of Express, specifically by removing support macros, add-ins, and VSIP packages.

Dan Fernandez, Visual Studio Express and TestDriven.NET

Microsoft wasn’t happy when developers began to extend what was freely given to them. Dan’s post above could have been called “We give you an inch and you take a mile.”


On another totally unrelated Dan Fernandez note:

Wow! He’s blonde in this interview. I’m a big Dan Fernandez fan — but I had a hard time watching this video because I kept thinking “why did you bleach your hair?”

In spite of my hair distraction, I liked the interview. Dan is a great evangelist for Visual Studio Express. He’s able to capture and convey that feeling of accomplishment we all felt when we made those magical words “Hello World” appeared on the monitor. He’s not a snob. He appreciates the hobbyist, the hacker and the curious.

Ok…I can’t resist.

Q: What do you call a swimming pool full of blonde Visual Studio Express evangelists?
A: Frosted Flakes.

May 28, 2008  10:35 AM

Overheard: Leveraging rich presence — a marketer’s dream

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
phoneboy.jpg Ignoring the fact that I find the whole concept of “presence management” a solution in search of a problem for most people, there’s the whole technical problem of trying to work within the various walled gardens…Until we have a single identity across networks, no method of managing presence will be effective.

Dameon D. Welch-Abernathy,  Presence And Identity

Rich presence is simply networking on steroids. And people are right to be wary about how the information aggregated from rich presence opt-ins could be used by marketers.  Sure, Facebook backed down on Beacon — but you know its just a matter of time before the “tweet” saying you wish you were in Hawaii brings you snail mail brochures.  Our best protection right now is that there isn’t a way for marketers to leverage rich presence effectively.  We have too many networking identities.

May 27, 2008  2:21 PM

Overheard: Your PUE number is like golf

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
mfontecchio.jpg “Your PUE number is like golf — the closer to 1, the better. At least that has always been the common wisdom. The goal, says experts, is to reduce your PUE. But sometimes an IT energy efficiency project can play games with that number.”

Mark Fontecchio, How a virtualization and server consolidation project could hurt your PUE

May 23, 2008  7:58 PM

Overheard: AT&T and American Idol

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
om-malik.jpg You have to hand it to the hit FOX reality series: It’s putting SMS systems to maximum use, turning them into a giant cash machine.

Om Malik, “American Idol” — Cook-ed by TXT Messages

Om Malik asks a good question. How much did AT&T make off those 78 million text messages? That’s a revenue stream I’ve never even considered. It’ll be awhile though. According to a survey by ExactTarget, 95% of U.S. online consumers have given at least one company permission to deliver messages to them by email — compared to 7% for text messaging. That may change when this next generation enters the workplace.

I’m guilty of sending a few txts earlier on. By the end, I was ok with whichever David won. In fact — I loved the duet they did together. It blew me away how well the timbre of their voices blended.

[kml_flashembed movie="http://youtube.com/v/kGnE2wcdClE" width="425" height="350" wmode="transparent" /]

May 23, 2008  5:42 PM

Overheard: I don’t want to ever have to wait for Java to load

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
rupert_goodwins.jpg Java doesn’t do anything by itself. It’s a programming language. Programming languages are like sewage plants: if the average user becomes aware of them, something’s gone wrong.

Rupert Goodwins, Gallery: 10 most annoying programs on the Internet

Love it!  When I see that Orange Java box come up, I go get a cup of coffee.

May 23, 2008  7:34 AM

Overheard: Who invented the Internet?

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

During my service in the United States Congress, I took the initiative in creating theInternet.
– Al Gore describing his 1986 legislation to interconnect five supercomputer centers (17 years after thefirst Internet servers hooked up)

If Gore invented the Internet, I invented spell-check.
– Former Vice President J. Danforth Quayle

The day I made that statement, I was tired because I’d been up all night inventing the Camcorder.
– Al Gore attempting damage control

Those days were funny, weren’t they? Actually, the Internet is just a grown-up version of ARPANET.

May 21, 2008  1:21 PM

Overheard: Why would anyone want to attack the firmware?

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
dept_justice.jpg The danger with embedded devices is that they are often forgotten. They don’t always get patched or audited, and they can contain application-level vulnerabilities, such as flaws in the remote management interface that leave the door open for an attacker.

Rich Smith as quoted in Permanent Denial-of-Service Attack Sabotages Hardware

We aren’t seeing the PDOS attack as a way to mask another attack, such as malware insertion, but as a logical and highly destructive extension of the DDOS [dedicated denial of service] criminal extortion tactics seen in use today.

So this is about corporate sabatoge? Or criminals wiping out a few routers and extorting money for keeping the rest of the company’s network operational? Wow.  Sounds like a good plot for a John Grisham book. 

Rich Smith (HP System Security Lab)  has even come up with a cool name for the attacks: phlashing.  And the fuzzing tool he developedfor either launching an attack or detecting vulnerabilities? PhlashDance. 

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: