|If this [ARAX] is about using Silverlight to host client-side browser scripting in Ruby, it’s definitely an appealing notion, but the problem will always be about Silverlight being a Microsoft technology.
“All the browser needs to have is Silverlight installed and then developers can take advantage of these languages,” on the client, he said. Silverlight provides rich experiences with capabilities like video and graphics, Goldfarb said. It is viewed as rival to the Adobe Flash platform.
I can hardly keep these straight, although I’m thankful the names are so logical!
ARAX – asynchronous Ruby and XML
APAX – asynchronous Python and XML
APhpAX – asynchronous PHP and XML
|In a study released Thursday, Google and MediaVest used NeuroFocus findings to show that overlay ads appearing in YouTube videos grab consumers’ attention and boost brand awareness.
Mark Walsh, Google: This Is Your Brain On Advertising
With revenue from YouTube ads falling short of company expectations at an estimated $200 million this year–mostly from display ads–the pressure grows to find new ways to monetize the Web’s largest video site.
I had to look up overlay ad. They’re semi-transparent overlays that cover the bottom fifth of the screen and then disappear after 10 seconds. If you click the ad, a pop-up with a full commercial plays right in the main player. At the end of the commercial — or when you click the close icon — the original clip resumes playing. Overlay ads come in two flavors, video and plain text. If marketers were observing my brain waves, they’d see that my emotional response to such an ad was favorable. Unlike a pre-roll ad, you don’t have to sit through a commercial to see the content.
Today’s word is neuromarketing.
|A month or so ago the question of whether the next president should have a CTO came up in a work conversation among a diverse group of tech policy folks. We all agreed that the title is nice, but you would need to establish and delineate real power for it. Of course, the best way to do this would be to create a cabinet position for technology and innovation. People rolled their eyes at this until it was reminded to them that we do have a Secretary of Agriculture.
Sean Garrett, The Case for a National CTO
It’s about time the White House acknowledged that we’ve moved from the agrarian age to the information age. Having a national CTO is a great idea — I bet that we could learn a lot about pitfalls from going back and learning how the position of Secretary of Agriculture came about. First, we’ll need to define what a CTO’s responsibilities are. (At some companies right now, the CTO reports to the CIO — at others, the CIO reports to the CTO.) Then we’ll need to decide whether the CTO should actually have experience in technology or whether he/she should come from business.
On May 15, 1862, President Abraham Lincoln established the independent Department of Agriculture to be headed by a Commissioner without cabinet status. Lincoln called it the “people’s department”. In the 1880s, varied special interest groups were lobbying for Cabinet representation. Business interests sought a Department of Commerce and Industry. Farmers tried to raise the Department of Agriculture to Cabinet rank. In 1887, the House and Senate passed bills giving cabinet status to the Department of Agriculture and Labor, but farm interests objected to the addition of labor, and the bill was killed in conference. Finally, on February 9, 1889, President Grover Cleveland signed a bill into law elevating the Department of Agriculture to Cabinet level.
|Here’s the thing with cloud computing — it has awesome potential for good, but it’s really going to complicate some of our current thoughts on security as your company’s data gets thrown into a giant data gumbo with everyone else’s data. I feel pretty confident that we’ll see a good amount of enterprising hackers enjoying that gumbo.
Nathan McFeters, AV in the cloud… wait, what?
|One good reason to use disposable email addresses is that it makes it easy to identify who has sold your details to spammers. If you use a unique address for each site you sign up with, then you will know instantly who to point the finger at. You will soon find out who can be trusted with your data – and who can’t.
Sharon Hurley Hall, Disposable Email Addresses
|The door to the room simply reads “the lab.” Inside are racks of hundreds of processors and terabytes of disk drives needed to capture the digital evidence that must be logged as carefully as evidence is maintained by crime scene investigators.
John Markoff, A Robot Network Seeks to Enlist Your Computer
John Markoff gives a nice overview of what Microsoft is doing to help fight cybercrime — and why:
Just as gangs will often force a recruit to commit a crime as a test of loyalty, in cyberspace, bot-herders will test recruits in an effort to weed out spies. Microsoft investigators would not discuss their solution to this problem, but said they avoided doing anything illegal with their software.
One possible approach would be to create sensors that would fool the bot-herders by appearing to do malicious things, but in fact not perform the actions.
In 2003 and 2004 Microsoft was deeply shaken by a succession of malicious software worm programs with names like “Blaster” and “Sasser,” that raced through the Internet, sowing chaos within corporations and among home computer users. Blaster was a personal affront to the software firm that has long prided itself on its technology prowess. The program contained a hidden message mocking Microsoft’s co-founder: “billy gates why do you make this possible? Stop making money and fix your software!!”
|By disguising layoffs as negative reviews, Yahoo management may push employees to leave, sans severance.
Yahoo’s stealth layoffs
The Company’s goal is to reduce its current annualized cost run rate of approximately $3.9 billion by more than $400 million before the end of 2008. The Company anticipates that both headcount and non-headcount-related costs will be reduced by these actions. Because the majority of expenses are headcount-related, Yahoo! expects to reduce its global workforce by at least 10 percent during the fourth quarter of 2008.
Whenever I read about reducing head counts and see the photo above, a little tune runs through my head.
“It’s the most – wonderful – time – of – the – year!”
I’m glad I’m not working at Yahoo. If their press release says they’re letting 1500 employees go, you can bet it’ll be closer to twice that number by the time the Christmas carnage is over.
And with all the “crisis of confidence” sound bytes in the media, I’m also going to bet that the commenter over at Valleywag hit the nail on the head. This year, as never before, there will be some creative aspects to the traditional laying off of employees before the holidays.
Of course we all know the words to the song as we gather round the water cooler around the beginning of December . You can expect the traditional “downsizing” and “reorganizing” verses that we’ve come to associate with garland and mistletoe. But this year don’t be surprised if employers introduce some new lyrics to the song and we find ourselves singing about “stealth layoffs.”
Stealth layoffs sounds much more hi-tech than “pushing an employee out so we don’t have to pay him benefits, severance or unemployment insurance.” For the latest numbers in layoffs, be sure to check out Rafe Needleman’s Tech Layoff Scorecard.
|Drizzle will target the MySQL core users, the web users whose requirements have been ignored for years while the core MySQL developers have added features that they don’t need.
Michael Widenius, What if
|The hardware failed, it’s unrecoverable. They did testing and it’s no longer fixable from the ground.
Allard Beutel, as quoted in Hubble Space Telescope Suffers Serious Failure
|To really solve these VoIP problem, Wi-Fi systems must be able to constantly choose transmission paths between the AP and voice device that deliver the strongest signal, fewest delays and lowest packet error rates, while simultaneously attenuating any interference or noise.
David Callisch, Minding the VoIP…
Wi-Fi Multimedia (WMM) is four traffic queues (voice, video, data and background) that are shared among all users. The problem is if one VoFi device is lost (for whatever reason) the AP typically retransmits to that device before servicing other devices. The solution is to have a wireless LAN system that uses a per-client, per-traffic class QoS scheme so every client and traffic flow is fairly serviced.