|One reason you should not use web applications to do your computing is that you lose control. It’s just as bad as using a proprietary program. Do your own computing on your own computer with your copy of a freedom-respecting program. If you use a proprietary program or somebody else’s web server, you’re defenseless. You’re putty in the hands of whoever developed that software.
Richard Stallman, Cloud computing is a trap, warns GNU founder Richard Stallman
Two thoughts. First, Happy Birthday to Gnu. Second…Richard Stallman is pretty predictable, isn’t he?
|The interesting thing about cloud computing is that we’ve redefined cloud computing to include everything that we already do.|
The problem is that every tech company now wants to be associated with cloud computing, no matter if their products and services meet the basic criteria. At least Ellison isn’t afraid to address the hijacking of the phrase by marketers.
I think they have it backwards. The term was INVENTED for marketers and tech media, not hijacked by them.
|The most important reason for limiting the security privileges your code requires to run is to reduce the damage that can occur should your code be exploited by a malicious user.
G Andrew Duthie, The Importance of the Principle of Least Privilege
Google Chrome uses the principle of least privilege. Each tab in Chrome is sandboxed (isolated) to prevent malware from installing itself or allowing what happens in one tab to affect what happens in another.
|As short as a few years ago, B2B marketers were limited to search and targeted email marketing. Now you have RSS, podcasts, videocasts, blogs, wikis, mashups, widgets the list goes on. The big opportunity here is for B2B marketers to have a lead nurturing platform in place and then start layering on these tactics to keep the conversation going with potential prospects.|
First, you have to have a lead nurturing platform in place. One that allows you to segment lists, send specific messages, score activities and profile behavior of those that have expressed interest in your company. Then you can bolt on more search traffic, and then you can serve special ads to those in your database.
You gotta know what’s happening on your website if you EVER hope to be able to calculate an ROI. Second, once you have that in place you can begin to layer on more types of media syndicated podcasts, third party wikis, external blogs and see if your database is going there and interacting with these sites were you are placing your content.
|Have you heard of “net pollution”? If not, you soon will, because it’s a term being pushed by Arts+Labs, the new group backed by AT&T, Viacom, NBC Universal, Cisco, and Microsoft.
Nate Anderson, AT&T, NBC lump piracy in with spam, malware as net pollution
“The problem with malware being served through advertisements is starting to become a serious one, with attackers seeming to enjoy it more and more because websites are not rushing to take steps to prevent it.”
Lucian Constantin, Clipboard Hijack Spreads Panic
This particular attack is copying a link to the computer clipboard, which seems to be persistent and cannot be removed by simple means, in most cases a computer reboot being necessary. The link in question redirects the user to a website that promotes a rogue antivirus program that is itself a spyware application.
So what can you do if your clipboard has been hijacked? Shut down your computer immediately and wait 30 seconds before rebooting.
|Previously, www.business.com, an online resource that has been very popular for many years and that has over 600,000 web pages in its root index was banned and penalized in Google, simply because it was using the wrong kind of redirect method. Getting a site banned in a search engine because of the wrong class of redirect happens more often than some people think.
Serge Thibodeau, The Rundown on 301 and 302 Redirects
Serge provides a good overview of the problems bad redirects can cause — and how to make sure your redirects are the kind Google tolerates.
|PON (Passive Optical Network) and Active Ethernet have falsely been cast as competitive technologies when, in fact, they are complementary.
David Russell, marketing director at Calix
Increasingly, GPON and Active Ethernet are being viewed as complementary technologies based on the application. GPON is ideal for mass residential and small business deployments, while Active Ethernet is sometimes preferred for larger businesses that demand dedicated fiber access.
|Individual blogs are not very interesting in themselves. What is important is how they link to each other to create a massive network.
Professor Henry Farrell, as quoted in In which I muse about what “Oracle blogging” means
|Microsoft really is losing it. I can’t help but notice that the evil empire keeps making one business mis-step after another since Bill has left. May I suggest firing Ballmer once more? It really is for your own good.
Steven J. Vaughan-Nichols, You can put lipstick on a pig but it’s still Vista