|The bad news is that with clickjacking, any computer with a microphone and/or a web camera attached can be invisibly coaxed into being a remote surveillance device.
Jeremiah Grossman, Clickjacking: Web pages can see and hear you
[kml_flashembed movie="http://www.youtube.com/v/6_X04XwrUY8" width="425" height="350" wmode="transparent" /]
|Another dimension PaaS vendors should think about is who is the target user of the platform. The typical choices are programmers versus so-called business users (non-programmers). Bungee, Google App Engine and 10gen are all clearly targeting programmers. Ning, on the other hand, allows people without any code-writing skills to quickly create their own social network.
Geva Perry, Thoughts on Platform-as-a-Service
|If WiMax is the hippie, grass-roots parents on “Family Ties,” LTE is closer to Alex P. Keaton.|
This is a great quote. If you’re confused about all the mobile acronyms, Gizmodo has put together a good list.
|Mathematicians at UCLA have discovered a 13 million-digit prime number, a long-sought milestone that makes them eligible for a $100,000 prize given out by the Electronic Frontier Foundation. The group found the 46th known Mersenne prime last month on a network of 75 computers running Windows XP. The number was then verified by a different computer system.
Nuno Morgadinho, New Prime Number Discovered
What’s the big deal about finding very large prime numbers? Encryption.
RSA encryption is based on prime numbers — two prime numbers multiplied together. The original two prime numbers are known as your ‘private key’. When you multiply them together, the product (a number that’s only divisible by one, itself and those two prime numbers) is called the ‘public key’.
| The CIO Executive Board, a division of the Corporate Executive Board, polled 50 participants in a CIO conference call last Thursday to discuss the impact of turmoil in the financial markets and economic uncertainty on Q4 spending and 2009 plans.
According to the poll, 61% of CIOs are currently re-evaluating their 2009 budget plans and 59% are already re-negotiating IT vendor contracts. Almost half, 49%, are cutting spend on consultants and contractors and a majority, 59% are putting non-essential IT projects on hold. Twenty four percent (24%) are considering a hiring freeze.
Interesting article by Pam Baker — it’s not suprising that 24% are considering a hiring freeze. I’m curious to know how many would have said they’re considering staff reductions.
Interestingly, he [Ballmer] identified his top competitors as Google, Apple and Linux. Secondary foes included IBM, Oracle, Amazon and SAP.Jeff Bussgang, Microsoft VC Conference – Steve Ballmer’s View On The World
I started out reading an article on Microsoft’s new Research and Development center for enterprise search, went on to read what Steve Ballmer said about the economy and how it’s going to affect IT and ended up at Jeff Bussgang’s blog. I think Jeff’s is the only blog post I’ve read in ages that gives Ballmer credit for all he’s accomplished.
|One reason you should not use web applications to do your computing is that you lose control. It’s just as bad as using a proprietary program. Do your own computing on your own computer with your copy of a freedom-respecting program. If you use a proprietary program or somebody else’s web server, you’re defenseless. You’re putty in the hands of whoever developed that software.
Richard Stallman, Cloud computing is a trap, warns GNU founder Richard Stallman
Two thoughts. First, Happy Birthday to Gnu. Second…Richard Stallman is pretty predictable, isn’t he?
|The interesting thing about cloud computing is that we’ve redefined cloud computing to include everything that we already do.|
The problem is that every tech company now wants to be associated with cloud computing, no matter if their products and services meet the basic criteria. At least Ellison isn’t afraid to address the hijacking of the phrase by marketers.
I think they have it backwards. The term was INVENTED for marketers and tech media, not hijacked by them.
|The most important reason for limiting the security privileges your code requires to run is to reduce the damage that can occur should your code be exploited by a malicious user.
G Andrew Duthie, The Importance of the Principle of Least Privilege
Google Chrome uses the principle of least privilege. Each tab in Chrome is sandboxed (isolated) to prevent malware from installing itself or allowing what happens in one tab to affect what happens in another.