Blog Directory Finance Blogs - Blog Catalog Blog Directory blog directory Top Finance blogs Blogdup Blog Directory Blogarama - The Blog Directory

Tuesday, September 18, 2007

Are Double Digit Rates Coming?

Former Federal Reserve Chairman Alan Greenspan said in an interview published on Monday the Fed would have to raise interest rates to double-digit levels in coming years to thwart inflation.

But double-digit rates, which have not been seen since the 1980s, would not be a long-term fixture, Greenspan said in an interview with USA Today conducted on Friday.

"Double digit is something that is likely to happen for a short period of time," he said, adding it was hard to predict when such a big rate increase would be needed.

The U.S. central bank meets on Tuesday and is widely expected to cut the benchmark federal funds rate by at least a quarter-percentage point to help the economy weather a housing downturn and credit crunch.

Tuesday, July 24, 2007

On antitrust, is Google the next Microsoft?

Not too long ago, nearly every move that Microsoft made seemed to draw complaints that the company was abusing its market dominance.

Now another market-leading technology company is under fire in Washington as well. An unlikely combination of onetime antitrust defendants like Microsoft and AT&T and liberal consumer groups that have been their traditional antagonists are taking aim at Google.
Interviews by CNET News.com last week show that Microsoft and its occasional allies have met separately with key congressional committees that deal with consumer protection and antitrust issues--both of which announced last week that they will hold hearings on Google's plan to spend $3.1 billion to buy DoubleClick.

The Federal Trade Commission, which must review the merger on antitrust grounds, has also been meeting with Google, Microsoft and those nonprofit consumer groups, according to sources familiar with the meetings. The European Union, egged on by American consumer groups like the Electronic Privacy Information Center and the pro-regulation Center for Digital Democracy, is reviewing the merger too.

All this amounts to the first serious political threat to a company that has grown to a market capitalization of $162 billion by worrying more about serving customers than catering to the whims of bureaucrats and politicians. Longtime Washington observers believe that even if the DoubleClick acquisition is eventually permitted, federal scrutiny will only increase.

In addition to its full-time staff lobbyists, also involved in Google's efforts to fend off antitrust bureaucrats are four newly hired lobbyists in the Washington office of the law firm Brownstein Hyatt & Farber (including Makan Delrahim, a former top Justice Department antitrust official). Google's earlier hires include the now-renamed PodestaMattoon, which draws its name from longtime Democratic dealmaker Tony Podesta, and King and Spalding, home to former Republican Sens. Connie Mack and Dan Coats.

A Google representative said there had not, however, been any personal visits to Washington in support of the DoubleClick deal by top executives like CEO Eric Schmidt and co-founders Larry Page and Sergey Brin, who famously showed up in blue jeans and sneakers when he arrived on Capitol Hill for meetings with politicians last summer.

Citing confidentiality concerns, an FTC representative declined to comment on anything beyond the fact that the investigation is continuing. AT&T, which has made public statements in opposition to the merger before, would not comment. Time Warner, which reportedly has voiced concerns about the deal, also would not comment.

Microsoft spokesman Jack Evans declined to offer details about his employer's attempts to sink the DoubleClick deal. "As a general rule, we don't comment on specific lobbying efforts," he said Friday. "Microsoft continues to believe the Google-DoubleClick acquisition raises a number of serious questions about the effects it will have on advertisers, publishers and consumers, and we believe it warrants closer scrutiny."

By any measure, Google is seriously outgunned in Washington. Its spending on lobbyists in 2006 amounted to a mere $720,000--a fraction of what the Google co-founders spent on their personal jet. By comparison, last year AT&T wrote checks for at least $27 million to buy political influence and Microsoft spent $8.9 million.

The disparity is even greater over a longer period. Starting in the late 1990s, when Google was moving into its first office, AT&T and Microsoft spent a combined $179 million while Google spent a mere $540,000. (That's counting lobbying and political contributions through 2005, as calculated in News.com's special report last year.)

It's no surprise that Google has paid little attention to Washington and hired a government
relations director just over two years ago: it's not in a heavily regulated industry like AT&T. Microsoft, of course, began writing fat checks to lobbyists--including Rick Rule, a former top Justice Department antitrust official--only after its antitrust headaches began in 1997.

Monday, July 9, 2007

Why is yawning contagious?

Rather than being a precursor to sleep, yawning is designed to keep us awake, say US researchers. But why does seeing someone else yawn make you to do the same?
Yawning is an involuntary action that everyone does. We start before we are born and most creatures on the planet do it - even snakes and fish.


New research suggests rather than being a precursor to sleep, the purpose of yawning is to cool the brain so it operates more efficiently and keeps you awake.

The theory could explain a puzzling question about subconscious human behaviour - why many of us yawn when we see or hear another person doing it, or even read about it or even just think about it?

The brain cooling theory says that when we contagiously yawn we are participating in an ancient, hardwired ritual that evolved to help groups stay alert and detect danger.

'Herding behaviour'

It's not copying another person's sleepiness, say scientists at the University of Albany in New York, who are behind the latest research.

"We think contagious yawning is triggered by empathic mechanisms which function to maintain group vigilance," says Dr Gordon Gallup, a leading researcher at the university.

The belief is further supported by the observation of University of Maryland's Robert Provine that paratroopers report yawning before jumping.

But there are other theories. It's been suggested contagious yawning could be a result of an unconscious herding behaviour - a subtle way to communicate to those around us, similar to when flocks of birds take flight at the same time.

Another theory suggests contagious yawning might have helped early humans communicate their alertness levels and co-ordinate sleeping times.

Basically, if one decided it was time to sleep they would tell the others by yawning and they would do it in return to show they agreed.

Chimpanzees also suffer from contagious yawning, according to researchers at Kyoto University in Japan. They are thought to be the only other creatures, apart from humans, who do so.
The rest of the animal kingdom - including birds, snakes and hippos - yawn for other reasons. Dogs yawn to stay calm in certain situations, says Turid Rugaas, author of On talking Terms with Dogs.

Anyone who gets to the end of this article without yawning may wish to think of themselves as a medical apparition. In fact, only about half of adult humans are prone to contagious yawning.

Tuesday, July 3, 2007

Internet Error Codes

Sometime you are browsing the internet and trying to open any website, your e-mail and any FTP sites , but you see different error codes there. You should be familiar with these error codes. You can solve these problems if you are well-known with the meaning of error codes.

400
This is bad request error, First check you may be typing wrong URL name and server could not understand your request.

401
You are trying to open any unauthorized access site or page. Check your username and password if you are trying to open any webpage.

402
Payment Required Error

403
You are trying to open any forbidden page and you are blocked by that domain.

404
Here you are trying to open the webpage that was removed or re-named, also check the URL spelling.

408
This is time out error. you should send the request with in time that the server set for you.

Study Reveals Why We Learn From Mistakes

Researchers have pinpointed an area in the brain that alerts us in less than a second of an impending mistake so we don’t repeat it.

Scientists have long known that mistakes are conducive to learning, suggesting the reason lies in the element of surprise upon finding out we are wrong. But how the brain manages to learn from mistakes and how quickly it does so have been unknowns.

“It's a bit of a cliché to say that we learn more from our mistakes than our successes,” said lead author of the study Andy Wills, a psychologist at the University of Exeter, “but for the first time we’ve established just how quickly the brain works to help us avoid repeating errors.”

The scientists monitored the brain activity of a group of volunteers as they made predictions based on information each read on a computer screen. Then, they were given new information that made many of the predictions incorrect. The participants had to learn from the mistake in order to repeat the error next time around.

The researchers measured activity in the lower temporal region of the brain, near the temples, which is responsible for processing visual information. “By monitoring activity in the brain as it occurs, we were able to identify the moment at which this mechanism kicks in,” Wills said.

Activity increased immediately after the individual saw the new information flash onto the computer screen—within 0.1 seconds—before there was time for any conscious consideration.
Most previous research had focused on the brain’s frontal lobes, which are associated with complex thought processes, such as planning and conscious decision-making. This study, announced today and published in the Journal of Cognitive Neuroscience, indicates the brain reacts to mistakes before information even gets processed consciously. The scientists call it an "early warning signal" from a lower region of the brain.

Tuesday, June 26, 2007

Go Daddy Assumes 850,000 Domains

Embattled registrar RegisterFly will transfer 850,000 domain names to GoDaddy.com, the world's largest domain registrar under an agreement brokered by ICANN, the parties announced today. The move will be welcome news to domain owners who have been unable to manage their names since RegisterFly collapsed into financial and management turmoil in February.

"We worked with ICANN to effect a migration of the RegisterFly domains to GoDaddy.com and help those customers left in limbo,” said GoDaddy.com CEO and Founder Bob Parsons. “It’s what many RegisterFly customers asked us to do. After they are moved over to GoDaddy.com, all RegisterFly customers will once again be able to manage and renew their domain names with confidence and will also enjoy the world-class support we provide all our customers. We expect the move to be completed over the next week."

"The RegisterFly situation has been extremely difficult -- first and foremost for registrants, as well as for the entire registry and registrar community," said Dr Paul Twomey, ICANN's President and CEO. "The GoDaddy.com agreement is the best possible solution for RegisterFly customers since it’s a direct and automatic transfer to a competent and experienced customer service oriented organization."

Go Daddy says it now manages more than 20 million domain names, and more than 4 million customers using its domain name registration, Web site hosting, SSL certificates and related products.

RegisterFly's web site management system stopped working properly in February during a business dispute between company founder Kevin Medina and business partner John Naruzewicz, who claimed that he owned 50 percent of RegisterFly and said the company's board had fired Medina. At the direction of "new CEO" Naruzewicz, the company filed a lawsuit accusing Medina of mismanagement and misuse of company funds. Medina denied all charges, saying he remained the sole owner of RegisterFly. A Newark, N.J. court agreed, awarding sole control of the company to Medina.

The resolution of RegisterFly's ownership issues didn't resolve its operational problems. ICANN stripped RegisterFly of its accreditation, but had to resort to court action to force Medina to accept a transfer to another registrar. On Friday United States District Court Judge Manuel L. Real issued a permanent injunction against RegisterFly, clearing the way for today's transfer.

Wednesday, June 20, 2007

FAT vs NTFS

To NTFS or not to NTFS—that is the question. But unlike the deeper questions of life, this one isn't really all that hard to answer. For most users running Windows XP, NTFS is the obvious choice. It's more powerful and offers security advantages not found in the other file systems. But let's go over the differences among the files systems so we're all clear about the choice. There are essentially three different file systems available in Windows XP: FAT16, short for File Allocation Table, FAT32, and NTFS, short for NT File System.

FAT16
The FAT16 file system was introduced way back with MS–DOS in 1981, and it's showing its age. It was designed originally to handle files on a floppy drive, and has had minor modifications over the years so it can handle hard disks, and even file names longer than the original limitation of 8.3 characters, but it's still the lowest common denominator. The biggest advantage of FAT16 is that it is compatible across a wide variety of operating systems, including Windows 95/98/Me, OS/2, Linux, and some versions of UNIX. The biggest problem of FAT16 is that it has a fixed maximum number of clusters per partition, so as hard disks get bigger and bigger, the size of each cluster has to get larger. In a 2–GB partition, each cluster is 32 kilobytes, meaning that even the smallest file on the partition will take up 32 KB of space. FAT16 also doesn't support compression, encryption, or advanced security using access control lists.

FAT32
The FAT32 file system, originally introduced in Windows 95 Service Pack 2, is really just an extension of the original FAT16 file system that provides for a much larger number of clusters per partition. As such, it greatly improves the overall disk utilization when compared to a FAT16 file system. However, FAT32 shares all of the other limitations of FAT16, and adds an important additional limitation—many operating systems that can recognize FAT16 will not work with FAT32—most notably Windows NT, but also Linux and UNIX as well. Now this isn't a problem if you're running FAT32 on a Windows XP computer and sharing your drive out to other computers on your network—they don't need to know (and generally don't really care) what your underlying file system is.

The Advantages of NTFS
The NTFS file system, introduced with first version of Windows NT, is a completely different file system from FAT. It provides for greatly increased security, file–by–file compression, quotas, and even encryption. It is the default file system for new installations of Windows XP, and if you're doing an upgrade from a previous version of Windows, you'll be asked if you want to convert your existing file systems to NTFS. Don't worry. If you've already upgraded to Windows XP and didn't do the conversion then, it's not a problem. You can convert FAT16 or FAT32 volumes to NTFS at any point. Just remember that you can't easily go back to FAT or FAT32 (without reformatting the drive or partition), not that I think you'll want to.

The NTFS file system is generally not compatible with other operating systems installed on the same computer, nor is it available when you've booted a computer from a floppy disk. For this reason, many system administrators, myself included, used to recommend that users format at least a small partition at the beginning of their main hard disk as FAT. This partition provided a place to store emergency recovery tools or special drivers needed for reinstallation, and was a mechanism for digging yourself out of the hole you'd just dug into. But with the enhanced recovery abilities built into Windows XP (more on that in a future column), I don't think it's necessary or desirable to create that initial FAT partition.

When to Use FAT or FAT32
If you're running more than one operating system on a single computer (see Dual booting in Guides), you will definitely need to format some of your volumes as FAT. Any programs or data that need to be accessed by more than one operating system on that computer should be stored on a FAT16 or possibly FAT32 volume. But keep in mind that you have no security for data on a FAT16 or FAT32 volume—any one with access to the computer can read, change, or even delete any file that is stored on a FAT16 or FAT32 partition. In many cases, this is even possible over a network. So do not store sensitive files on drives or partitions formatted with FAT file systems.

Monday, June 11, 2007

Google PageRank Explained

What is PageRank?

PageRank was developed at Stanford University by Larry Page (hence the name Page-Rank) and Sergey Brin as part of a research project about a new kind of search engine. The project started in 1995 and led to a functional prototype, named Google, in 1998. Shortly after, Page and Brin founded Google Inc., the company behind the Google search engine. While just one of many factors which determine the ranking of Google search results, PageRank continues to provide the basis for all of Google's web search tools

PageRank is a numeric value that represents how important a page is on the web. Google figures that when one page links to another page, it is effectively casting a vote for the other page. The more votes that are cast for a page, the more important the page must be. Also, the importance of the page that is casting the vote determines how important the vote itself is. Google calculates a page's importance from the votes cast for it. How important each vote is is taken into account when a page's PageRank is calculated. PageRank is Google's way of deciding a page's importance. It matters because it is one of the factors that determines a page's ranking in the search results. It isn't the only factor that Google uses to rank pages, but it is an important one.

First, let me explain in more detail why the values shown in the Google toolbar are not the actual PageRank figures. According to the equation, and to the creators of Google, the billions of pages on the web average out to a PageRank of 1.0 per page. So the total PageRank on the web is equal to the number of pages on the web * 1, which equals a lot of PageRank spread around the web.

The Google toolbar range is from 1 to 10. (They sometimes show 0, but that figure isn't believed to be a PageRank calculation result). What Google does is divide the full range of actual PageRanks on the web into 10 parts - each part is represented by a value as shown in the toolbar. So the toolbar values only show what part of the overall range a page's PageRank is in, and not the actual PageRank itself. The numbers in the toolbar are just labels.

Whether or not the overall range is divided into 10 equal parts is a matter for debate - Google aren't saying. But because it is much harder to move up a toolbar point at the higher end than it is at the lower end, many people (including me) believe that the divisions are based on a logarithmic scale, or something very similar, rather than the equal divisions of a linear scale.
Let's assume that it is a logarithmic, base 10 scale, and that it takes 10 properly linked new pages to move a site's important page up 1 toolbar point. It will take 100 new pages to move it up another point, 1000 new pages to move it up one more, 10,000 to the next, and so on. That's why moving up at the lower end is much easier that at the higher end.

In reality, the base is unlikely to be 10. Some people think it is around the 5 or 6 mark, and maybe even less. Even so, it still gets progressively harder to move up a toolbar point at the higher end of the scale.

Note that as the number of pages on the web increases, so does the total PageRank on the web, and as the total PageRank increases, the positions of the divisions in the overall scale must change. As a result, some pages drop a toolbar point for no 'apparent' reason. If the page's actual PageRank was only just above a division in the scale, the addition of new pages to the web would cause the division to move up slightly and the page would end up just below the division. Google's index is always increasing and they re-evaluate each of the pages on more or less a monthly basis. It's known as the "Google dance". When the dance is over, some pages will have dropped a toolbar point. A number of new pages might be all that is needed to get the point back after the next dance.

The toolbar value is a good indicator of a page's PageRank but it only indicates that a page is in a certain range of the overall scale. One PR5 page could be just above the PR5 division and another PR5 page could be just below the PR6 division - almost a whole division (toolbar point) between them.

Wednesday, May 30, 2007

Have an online "Box" for your files

Box makes it easy to get your files from anywhere you have an internet connection. Access important documents from your desktop, laptop, or even mobile phone on the go. Once you've uploaded your files to Box, you can also share them with anyone, or just keep them safe for as long as you want.

Send large documents, presentations, and zip files to contacts and clients. Forget the hassle of emailing attachments - just send them a link to download! Best of all, you can be notified when they download the file.

Upload files to your Box by sending an email to upload@box.net. The next time you receive an attachment you'd like to save or work on later, forward it to us and it will be sent to your account!

If you have a website or eBay auctions, you can host your photos on Box. Best of all, there are no bandwidth limits and it's as easy as uploading your files to Box! Next time you're on the road, try accessing "m.box.net". It's a quick, lightweight version of Box that lets you access your files from any internet-compatible phone or PDA.

Castle Point Mortgage Achieves Implementation of Cadence Lending Platform

Eight-Month Implementation Accomplished at Hands of Mortgage Company's IT Experts Utilizing Implementation Methodology of Implementation Contractor.

DENVER -- Mortgage Cadence, a leading provider of enterprise lending solutions (ELS) for the mortgage industry, and Castle Point Mortgage, Inc. are pleased to announce the implementation of the Mortgage Cadence Orchestrator[TM] ELS application. Headquartered in Elkridge, Md., Castle Point is a retail lender, operating in multiple states and handling a variety of product types.

Following an extensive due diligence process, Castle Point chose the Mortgage Cadence Orchestrator application as their lending platform. We are pleased to have chosen a software system that is easily customizable to our needs, commented Gerald Infantino, president of Castle Point Mortgage. There was no other system that we found during our selection process that provided the breadth of functionality while offering us the ability to cost effectively implement ourselves. The Mortgage Cadence system will help bring Castle Point Mortgage to the next level and assist us in achieving our long term strategic goals.

Castle Point has seen a substantial amount of growth over the past three years. As of October 2006, Castle Point has increased its loan origination by over 300% compared to its 2003 year-end loan volume. Due to this substantial growth, the Castle Point executives began their search for a new software system in early 2006. The Castle Point team was looking for an application that would handle all of the company's product lines, increase process times and efficiency, as well as a lending platform that would is scalable to meet their future needs. Their decision on the application also needed to be supported by the software company's proven staying power in the market.

Friday, May 25, 2007

Dude their getting Linux

As of 5 pm (Eastern Time), you'll be able to order two new Dell desktop systems and one Dell laptop configuration with Ubuntu Linux 7.04 installed instead of Windows. Dell product manager Lionel Menchaca has the details in his post on Dell's corporate blog this morning. (A posting earlier in the week has more technical details about these new configurations.)

This is a fairly amazing event. I can't remember any big-name vendor of Windows machines ever offering individual consumers the option of buying its hardware with the free, open-source Linux operating system preinstalled.

Two quick thoughts about the news:

* Microsoft has lost its power to intimidate everybody else in the PC industry. Remember when this company would threaten to yank a computer manufacturer's Windows license if it had the temerity to remove desktop shortcuts to Internet Explorer? Now think about how that version of Microsoft would have reacted to Dell's latest move.

* Good things happen when companies make it easy for their customers to suggest ideas and are prepared to act on them. Dell's IdeaStorm Web site allowed Linux users to document their long-standing wishes; it's to Dell's credit that it's making this major revision to its consumer product line in response. Now let's see how the company responds to other popular IdeaStorm suggestions, like making Firefox the default Web browser or letting customers opt out of having their new Dell machine loaded up with the usual trialware junk.

I plan on trying out one of Dell's Linux models in the next month or so. Do you plan on buying one yourself? (I'm especially interested in hearing from people who haven't put Linux on one of their own personal computers before.)

Thursday, May 24, 2007

Dynamic Partitioning: Windows Server 2008

Computerworld has an interesting article about a new feature of Windows Server 2008: Dynamic Partitioning. A hardware partitionable server can have isolated hardware partitions comprising CPU, memory and I/O. Each of these segments runs its own Windows instance. It allows you to add, replace and remove hardware without rebooting Windows. This not only improves fault tolerance, but also scalability. In a way, it is RAID for CPU, memory and I/O. This certainly important feature is not a new revolutionary technology, though. Mainframe systems always had similar capabilities. Therefore, it will be one further step for Microsoft in pushing Windows into the datacenter. Unfortunately, this feature will only be supported by the Datacenter and the Itanium editions of Windows Server 2008. By the way, Windows Server 2003 already supports hot-add memory. It is interesting to note, that the white paper about the new features of Windows Server 2008, I linked to earlier, doesn’t mention this new capability. If you want to know more technical details about Dynamic Partitioning, or about the “hot swap feature” as some call it.

Tuesday, May 22, 2007

Dell Joins Microsoft and Novell Collaboration

Microsoft Corp. and Novell Inc. have announced that Dell Inc. is the first major systems provider to join the business collaboration that was formed by Microsoft and Novell in response to customer demand for greater interoperability and intellectual property (IP) assurance. As part of the agreement, Dell will purchase SUSE Linux Enterprise Server certificates from Microsoft and establish a services and marketing program to migrate existing Linux users who are not Dell Linux customers to SUSE Linux Enterprise Server. Read more

Windows 2003 Access-based Enumeration (ABE)

ABE filters shared folders visible to a user based on that individual user's access rights, preventing the display of folders or other shared resources that the user does not have rights to access. ABE can be accessed via graphical user interface (GUI), command-line executable tool, and a robust advanced programming interface (API). After download and installation of the MSI on the desired Windows Server 2003 server, you just need to go to the shares where you want to enable ABE. Each share controls whether ABE will be used for the files and folders contained under it. To control if ABE is enabled, you only need to access the Properties sheet for the shared folder. There you will find a new tab named Access-based Enumeration. As seen below.

Access-based Enumeration is a welcome addition to any network. For the longest time, administrators and security professionals have created elaborate workarounds to hide resources from users. Now ABE solves this problem by hiding resources that users don't have explicit access to. It works great for networks that have Windows Server 2003 SP1 servers with any client viewing the resource.

Monday, May 21, 2007

Quick SAMBA tutorial

I needed to setup SAMBA on one of my servers and i came across this quick tutorial which had information to what main parts i was looking for. Giving you a brief run through of the samba.conf file and how PAM works along with SAMBA. This was all in all definatly a good Tutorial.

Thursday, May 17, 2007

Vulnerability in Microsoft Office

A remote code execution vulnerability exists in the way Microsoft Office handles a specially crafted drawing object. This update resolves a privately reported vulnerability. The vulnerability is documented in its own subsection in the Vulnerability Details section of this bulletin.An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.When using vulnerable versions of Office, if a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the system. An attacker could then install programs; view, change, or delete data; or create new accounts with the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

New Top-Level Domains

ICANN wants public input on its development of a new process for creating, approving, and adding new gTLDs (generic top-level domains like .com, .org etc) to the Internet.

“This is all about choice. We want the diversity of the world’s people, geography and business to be able to be represented in the domain name system,” said Dr Paul Twomey, President and CEO of ICANN. “That is why it’s so important for people to participate in the development of a new gTLD process. We will get input from businesses, governments, and the public at large in the coming months and at the ICANN meeting in Puerto Rico on 25-29 June 2007.”

The new process will lay out how gTLDs are proposed and approved, and should allow for a much wider variety of them to be added in a timely, predictable, and efficient manner. ICANN expects that with the public input, the system for approving new gTLDs should be completed by the end of the year, and applications for new top-level domains could be accepted starting in early 2008.

“If the new approval process comes on-line as planned, the global Internet could see new top-level domains added and available between June and August 2008,” Dr Twomey added. ICANN has overseen two previous extensions of the Internet space: first in 2000 when seven TLDs including .info and .name were added to the domain name system (DNS); the second started in 2004 leading to six more being approved, including .asia.

“When ICANN was founded in 1998, only a few TLDs, including .com, were generally available to the public for registration of domain names. Our mission has been to expand the number of TLDs available to users – and we have made great progress,” Dr Twomey said. “When the new approval process is complete, Internet users around the globe will have more choice in the TLD market.”
Currently there are 120 million registered domain names (unique web addresses) in the world. Of these, 80 million are gTLDs (as opposed to country code top-level domains like .de for Germany or .ca for Canada). The most commonly used gTLD is “.com”, with 62 million domains. There are another 15 gTLDs in existence including .aero to .travel.

Development of the new gTLD process began in December 2005. ICANN’s Generic Names Supporting Organisation (GNSO) has guided the policy development process and its work will be used as the basis for discussion on creating a new approval process. Materials used in meetings, plus minutes and audio recordings, are available on ICANN’s website at http://gnso.icann.org/calendar/.

University of Missouri Hacked

COLUMBIA, Mo. - A computer hacker accessed the Social Security numbers of more than 22,000 current or former students at the University of Missouri, the second such attack this year, school officials said Tuesday. The FBI is investigating. University officials said campus computer technicians confirmed a breach of a database last week by a user or users whose Internet accounts were traced to China and Australia. The hacker accessed personal information of 22,396 University of Missouri-Columbia students or alumni who also worked at one of the system's four campuses in St. Louis, Kansas City, Rolla or Columbia in 2004. The hacker obtained the information through a Web page used to make queries about the status of trouble reports to the university's computer help desk, which is based in Columbia. The information had been compiled for a report, but the data had not been removed from the computer system. In January, a hacker obtained the Social Security numbers of 1,220 university researchers, as well as personal passwords of as many as 2,500 people who used an online grant application system.

Linux: Sharp Zaurus SL-C3200

The Zaurus is in a class by itself, being a cross between a PDA and a handheld computer. Rather than running a somewhat limited PDA operating system, it runs Linux which means the CPU and RAM are the only real limit for running Linux applications. Linux apps must be recompiled to run on the Zaurus but that's not a daunting task, and we've seen many useful ports and open source software for the Z emerge over the years. In fact, there are several ROMs available for the Z as well (modified versions of the OS and even different Linux distros).


It seems that we're in an evolutionary rather than revolutionary period when it comes to PDAs. Witness the Sharp Zaurus SL-C3200 which is basically the same as the Zaurus C3100 it replaces, and the C3100 was quite similar to the Zaurus C30000 it replaced. In fact all three are very, very similar to the now discontinued Zaurus C8600 but the C860 lacked the hard drive. And so from the C3100 to the 3200 we get a 6 gig rather than 4 gig hard drive. For upgraders, there's nothing terribly compelling save the additional hard drive space which is nice for those who want to carry a collection of MP3s or videos for playback on the go.

Wednesday, May 16, 2007

Vertical Workstation??


Did you know you could lose as much as 66 pounds by sweating on you PC? Well using the Mayo Clinic's vertical workstation, that just might be the weightloss wave of the future.

The vertical workstation is basically a desk mounted over a treadmill that lets office workers to kill two birds with one stone - send emails, check invoices and write reports and burn calories at the same time, say Professors James Levine and Jennifer Miller of the Mayo Clinic in Rochester, Minnesota, who came up with the machine/desk.

A study conducted at the Mayo Clinic and published in the British Journal of Sports medicine found the average obese person burned 100 calories an hour while walking about one mile an hour while working. The treadmill desks cost about $1,600.

The desk isn't exactly a new idea. The Mayo Clinic has been working on such a prototype as part of its Office of the Future research.In fact in a Network World article from 2005 Levine said that instead of sitting on conventional desk chairs, workers in the Mayo Clinic's prototype environment stand at their desks with a moving treadmill surface underfoot.

MySQL reference guide

Recently i needed a quick rundown of commands in MySQL to browse through some Databases that i needed to check for work. Only using MySQL a few times prior, i searched the net and came up with this quick command reference.

Talk about Stunt Driving!

This might be one of the most crazy driving videos i have ever seen. Between the skill level of the drivers, Trust between the two, and flawless execution by both.

What is the Magnetosphere?


The Earth's magnetosphere was discovered in 1958 by Explorer I during the research performed for the International Geophysical Year. Before this, scientists knew that electric currents flowed in space, because solar eruptions sometimes led to "magnetic storm" disturbances. No one knew, however, where those currents flowed and why, or that the solar wind existed. In August and September of 1958, Project Argus was performed to test a theory about the formation of radiation belts that may have tactical use in war.

The magnetosphere of Earth is a region in space whose shape is determined by the extent of Earth's internal magnetic field, the solar wind plasma, and the interplanetary magnetic field (IMF). In the magnetosphere, a mix of free ions and electrons from both the solar wind and the Earth's ionosphere is confined by magnetic and electric forces that are much stronger than gravity and collisions. In spite of its name, the magnetosphere is distinctly non-spherical. On the side facing the Sun, the distance to its boundary (which varies with solar wind intensity) is about 70,000 km (10-12 Earth radii or RE, where 1 RE=6371 km; unless otherwise noted, all distances here are from the Earth's center). The boundary of the magnetosphere ("magnetopause") is roughly bullet shaped, about 15 RE abreast of Earth and on the night side (in the "magnetotail" or "geotail") approaching a cylinder with a radius 20-25 RE. The tail region stretches well past 200 RE, and the way it ends is not well-known.

The outer neutral gas envelope of Earth, or geocorona, consists mostly of the lightest atoms, hydrogen and helium, and continues beyond 4-5 RE, with diminishing density. The hot plasma ions of the magnetosphere acquire electrons during collisions with these atoms and create an escaping "glow" of fast atoms that have been used to image the hot plasma clouds by the IMAGE mission. The upward extension of the ionosphere, known as the plasmasphere, also extends beyond 4-5 RE with diminishing density, beyond which it becomes a flow of light ions called the polar wind that escapes out of the magnetosphere into the solar wind. Energy deposited in the ionosphere by auroras strongly heats the heavier atmospheric components such as oxygen and molecules of oxygen and nitrogen, which would not otherwise escape from Earth's gravity. Owing to this highly variable heating, however, a heavy atmospheric or ionospheric outflow of plasma flows during disturbed periods from the auroral zones into the magnetosphere, extending the region dominated by terrestrial material, known as the fourth or plasma geosphere, at times out to the magnetopause.

Tuesday, May 15, 2007

New BlackBerry 8300 Curve



When it comes to BlackBerrys, you have the really tiny one, the one with GPS, and now you can add to that list the one that just rocks. And we're not just talking about the Curve's music player or fully integrated stereo Bluetooth. RIM's latest fun-loving smart phone (available for AT&T later this spring) boasts a sharp two-megapixel camera and a much-improved multimedia software package for taking your favorite songs, pictures, and videos to go--all without sacrificing the long battery life that's made BlackBerry the device of choice for e-mail addicts.

Design Features:
It sports the kind of sleek design that will make BlackBerry Pearl owners say "D'oh!" The Curve is just as slim as the Pearl (0.6 inches), and at 3.9 ounces it's only 0.7 ounces heavier. It slips easily into a pocket, no geeky hip holster required. Granted, at first glance this device doesn't seem as deserving of an iconic name as the Pearl, but the Curve's liquid-silver finish with chrome accents and rounded edges make it an attractive alternative to the Samsung BlackJack.

More important, RIM managed to squeeze in a full-sized backlit keyboard, one that makes the Curve noticeably wider than but also much more reliable than the Pearl, whose not-so-SureType keyboard doesn't always accurately guess the word you're trying to peck. In just a few minutes we were typing e-mails and entering Web addresses at a brisk pace, thanks to the Curve's well-spaced layout. Just like the Pearl and the 8800, the Curve has a trackball for simple (if sometimes erratic) menu navigation.

Monday, May 14, 2007

Microsoft claims Linux is infringing on 235 patents

Microsoft claims that free software like Linux, which runs a big chunk of corporate America, violates 235 of its patents. It wants royalties from distributors and users. Users like you, maybe.

Free software is great, and corporate America loves it. It's often high-quality stuff that can be downloaded free off the Internet and then copied at will. It's versatile - it can be customized to perform almost any large-scale computing task - and it's blessedly crash-resistant.

A broad community of developers, from individuals to large companies like IBM, is constantly working to improve it and introduce new features. No wonder the business world has embraced it so enthusiastically: More than half the companies in the Fortune 500 are thought to be using the free operating system Linux in their data centers.

"It's a tinderbox. Patent law's going to be the terrain on which a big piece of the war's going to be fought. Waterloo is here some where." --Eben Moglen, Executive director, Software Freedom Law Center

But now there's a shadow hanging over Linux and other free software, and it's being cast by Microsoft (Charts, Fortune 500). The Redmond behemoth asserts that one reason free software is of such high quality is that it violates more than 200 of Microsoft's patents. And as a mature company facing unfavorable market trends and fearsome competitors like Google (Charts, Fortune 500), Microsoft is pulling no punches: It wants royalties. If the company gets its way, free software won't be free anymore.

The conflict pits Microsoft and its dogged CEO, Steve Ballmer, against the "free world" - people who believe software is pure knowledge. The leader of that faction is Richard Matthew Stallman, a computer visionary with the look and the intransigence of an Old Testament prophet.

Supreme Court eases patent standards


Caught in the middle are big corporate Linux users like Wal-Mart, AIG, and Goldman Sachs. Free-worlders say that if Microsoft prevails, the whole quirky ecosystem that produced Linux and other free and open-source software (FOSS) will be undermined.

Microsoft counters that it is a matter of principle. "We live in a world where we honor, and support the honoring of, intellectual property," says Ballmer in an interview. FOSS patrons are going to have to "play by the same rules as the rest of the business," he insists. "What's fair is fair."

It's a breathtaking number. (By comparison, for instance, Verizon's (Charts, Fortune 500) patent suit against Vonage (Charts), which now threatens to bankrupt the latter, was based on just seven patents, of which only three were found to be infringing.) "This is not a case of some accidental, unknowing infringement," Gutierrez asserts. "There is an overwhelming number of patents being infringed."

Furthermore, FOSS has powerful corporate patrons and allies. In 2005, six of them - IBM (Charts, Fortune 500), Sony, Philips, Novell, Red Hat (Charts) and NEC - set up the Open Invention Network to acquire a portfolio of patents that might pose problems for companies like Microsoft, which are known to pose a patent threat to Linux.

So if Microsoft ever sued Linux distributor Red Hat for patent infringement, for instance, OIN might sue Microsoft in retaliation, trying to enjoin distribution of Windows. It's a cold war, and what keeps the peace is the threat of mutually assured destruction: patent Armageddon - an unending series of suits and countersuits that would hobble the industry and its customers.

Friday, May 11, 2007

hackers good for business?

It’s an interesting question, I feel, and one that seems to split both the IT security business and, well, business, asunder. I guess that some clarification is required before going any further, to save myself from needless big stick grief. I am not talking about the kind of penetration testing that allows security consultants to employ talented white hat hackers in an effort to expose holes within a security strategy and implementation. That kind of thing is obviously a given, and many large enterprises might not admit to it in public but it’s pretty common practise.

And there is the hook for my argument, the word public. The reason those enterprises do not go public with the holes that the hackers find is simply because it is nothing to do with us. They identify a weakness, they resolve the situation and reinforce the security infrastructure, the bad guys are kept out, the customers are not troubled by tales of the ‘we used to have a security problems but it’s all better now, honest’ variety. Now let’s take a look at a recent example where a marketing exercise, disguise it as public vulnerability research or an open approach to security all you will, at the end of the day it is still usually just a PR stunt, went wrong.

A security company undertook a high profile hacker contest in which a prize of $10,000 was put on offer for anyone who could successfully hack the Mac. Great, lots of cool publicity for that security company (but not from me, here, you will note) before the event, during it, and afterwards when one hacker managed to uncover a vulnerability in QuickTime for which a patch does not exist and collect the cash. What’s the problem with that? Well how about the resulting publicity leaving thousands of QuickTime users open to potential compromise because the company itself was not informed first and given the chance to block the hole before it was announced. The hacker would not do that, of course, because then he might not have got his money because Apple could have closed that particular door real quick for all anyone knew.

There can be no doubt that any kind of public vulnerability research effort will have the opportunity to turn sour, both for the company promoting it and the users of whatever software or service finds itself exposed to attack without any chance to defend itself. Throw a financial reward into the mix and the lure of the hunt, the scent of blood, is going to be too much for all but the most responsible of hackers. There really is no incentive to report their findings to the vulnerable company, and plenty not to.

Which is why, especially in the IT security business, there needs to be a code of conduct with regard to responsible disclosure. There, I have said it, and probably run the risk of being kicked out of the media reporters club as a direct result. After all, how are we meant to report on security vulnerabilities if we don’t know they exist in the first place? True, but along with a duty to report there also comes a duty to be responsible. So when I have uncovered such a story in the past, before I go to press I have always contacted the company concerned to give them a chance to respond. I gain because I get a quote to add to the story, they gain because they get a heads up at least 24 hours before the story breaks.

Thursday, May 10, 2007

5 Future IT Jobs

1. Information steward
Reporting to the CIO, the information steward is responsible for how information is handled and stored across the company. The information steward determines who has read, write and copy access to information. This person is also in charge of how information is secured, backed up and archived. The position involves compliance with industry-specific regulations, as well as the new e-discovery rules for litigation. In an era of stolen laptops and exposed credit card numbers, the information steward is responsible for keeping the CIO out of the headlines.

2. Service delivery manager
The service delivery manager takes all the components of a company’s technology — networking, servers, software and storage — and delivers them to a business unit or a group of users as a service. These managers are responsible for setting prices and defining service-level agreements (SLA) for their services. They need to measure their performance against these SLAs and calm down unhappy customers. This job requires a jack-of-all-trades mentality: A service delivery manager is part project manager, part application developer and part contracting specialist.

3. Technology-business relationship manager
The technology-business relationship manager serves two masters: the CIO and the business-unit head. (Sometimes these folks have a desk in both departments to make sure they are working for both teams.) This manager helps the CIO understand the business perspective and serve business customers better, and jazzes up business executives about the capabilities that new technology can bring. Good communications skills and solid relationships throughout the company are key attributes of this manager. Here’s what this position shouldn’t be: a bottleneck.

4. Outsourcing relationship manager
The biggest change in IT shops in recent years is the rise of outsourcing. IT shops outsourcing domestically or offshore need someone on staff who knows how to manage these relationships. This position is best thought of as vendor management on steroids. An outsourcing relationship manager must hold outsourcing vendors to their agreements and fix problems when they arise. This person has to understand the technology links, communication and workflow between the company and the vendor, as well as how outsourcing affects the company’s overall business processes. Strong diplomatic and negotiating skills are essential

5. Mobile-application developer
Mobile-application development is as hot today as Web development was in the late ‘90s. This new discipline involves pulling together all the latest technologies — handheld devices, wireless networks, security, unified communications and collaboration tools — to support on-the-go executives, telecommuters and other virtual workers. Mobile-application developers need to understand the limitations of popular mobile devices and cell phones. Having a healthy paranoia about security is a plus. So is being a quick study: People who are too set in their ways will not be right for this fast-changing position.

Wednesday, May 9, 2007

Yahoo! - How It All Started...

Yahoo! began as a student hobby and evolved into a global brand that has changed the way people communicate with each other, find and access information and purchase things. The two founders of Yahoo!, David Filo and Jerry Yang, Ph.D. candidates in Electrical Engineering at Stanford University, started their guide in a campus trailer in February 1994 as a way to keep track of their personal interests on the Internet. Before long they were spending more time on their home-brewed lists of favorite links than on their doctoral dissertations. Eventually, Jerry and David's lists became too long and unwieldy, and they broke them out into categories. When the categories became too full, they developed subcategories ... and the core concept behind Yahoo! was born. The Web site started out as "Jerry and David's Guide to the World Wide Web" but eventually received a new moniker with the help of a dictionary. The name Yahoo! is an acronym for "Yet Another Hierarchical Officious Oracle," but Filo and Yang insist they selected the name because they liked the general definition of a yahoo: "rude, unsophisticated, uncouth." Yahoo! itself first resided on Yang's student workstation, "Akebono," while the software was lodged on Filo's computer, "Konishiki" - both named after legendary sumo wrestlers. Jerry and David soon found they were not alone in wanting a single place to find useful Web sites. Before long, hundreds of people were accessing their guide from well beyond the Stanford trailer. Word spread from friends to what quickly became a significant, loyal audience throughout the closely-knit Internet community. Yahoo! celebrated its first million-hit day in the fall of 1994, translating to almost 100 thousand unique visitors. Due to the torrent of traffic and enthusiastic reception Yahoo! was receiving, the founders knew they had a potential business on their hands. In March 1995, the pair incorporated the business and met with dozens of Silicon Valley venture capitalists. They eventually came across Sequoia Capital, the well-regarded firm whose most successful investments included Apple Computer, Atari, Oracle and Cisco Systems. They agreed to fund Yahoo! in April 1995 with an initial investment of nearly $2 million. Realizing their new company had the potential to grow quickly, Jerry and David began to shop for a management team. They hired Tim Koogle, a veteran of Motorola and an alumnus of the Stanford engineering department, as chief executive officer and Jeffrey Mallett, founder of Novell's WordPerfect consumer division, as chief operating officer. They secured a second round of funding in Fall 1995 from investors Reuters Ltd. and Softbank. Yahoo! launched a highly-successful IPO in April 1996 with a total of 49 employees. Today, Yahoo! Inc. is a leading global Internet communications, commerce and media company that offers a comprehensive branded network of services to more than 345 million individuals each month worldwide. As the first online navigational guide to the Web, www.yahoo.com is the leading guide in terms of traffic, advertising, household and business user reach. Yahoo! is the No. 1 Internet brand globally and reaches the largest audience worldwide. The company also provides online business and enterprise services designed to enhance the productivity and Web presence of Yahoo!'s clients. These services include Corporate Yahoo!, a popular customized enterprise portal solution; audio and video streaming; store hosting and management; and Web site tools and services. The company's global Web network includes 25 World properties. Headquartered in Sunnyvale, Calif., Yahoo! has offices in Europe, Asia, Latin America, Australia, Canada and the United States.

Tuesday, May 8, 2007

DELL going to Open-Source?

The adoration for Linux that has been flowing from Round Rock lately is both refreshing and curious, and Dell has just taken its respect for the open-source OS to another level by signing on with Microsoft and Novell. While Linux users have long griped (and protested) about Microsoft, it's been no secret that Michael Dell has a thing for Ubuntu, and now it sounds like Dell will be "buying SUSE Linux Enterprise Server certificates from Microsoft," and moreover, "will be setting up a services and marketing program aimed at getting users of open-source platforms to switch to the new SUSE Linux offering." With the agreement inked, the Texas Powerhouse becomes the "first major systems provider to align with Microsoft and Novell in the collaboration," and judging by all the other recent Linux happenings in the Dell arena, we'd say this deal aligns perfectly with its current strategy.

One of my Favorite!

This Pretty much says it all, never annoy the geeks!

Buy It Here

Thursday, May 3, 2007

Reasons NOT to work in IT

Reason #10 - Most Of Your Accomplishments Are Invisible

The computer guy never hears anyone tell him, “I just want to let you know … everything is working fine!”

The reality is that people call the computer guy when something is wrong.

As a computer guy, if you work really hard to make everything work the way that it should, and things work fine, then people believe you don’t do anything. Everything you manage to get working correctly or do perfectly will forever remain unnoticed by computer users. They’ll only ever notice that you do anything when something isn’t working correctly, and you are called upon to fix it.

Reason #9 - Every Conversation You Have Is Roughly The Same

When the computer guy dares to mention what he does for a living, the typical response is, “I have a question about my home computer…”

Or when the computer guy first hears about a widespread problem within the computer network he’s responsible for, he can barely begin to assess the problem before a dozen other people call to report the same problem.

Or when the computer guy explains a certain process on a computer to a user who is incapable of retaining the process, he will inevitably need to reinstruct the user of this same process — indefinitely.

Reason #8 - You’re An Expert Of Bleeding-Edge Technology Products, Aren’t You?


The computer guy often finds himself in situations where someone is asking him for advice on a pending investment of the technological variety.

“I heard about (some hardware or software product) that can do (something desirable) for me. I brought you these (advertisements/reviews/printouts) because I wanted your recommendation. Which would you buy?”

Although the inquiring person sincerely trusts the computer guy’s judgment over their own, in almost every instance the real objective of these meetings is to ensure their own immunity from making a risky purchase.

If it turns out to be a bad investment, and they cannot get (the hardware or software product) to do (anything desirable), then you will be their personal scapegoat — “But honey, the computer guy said I should buy it!”

Reason #7 - Your Talents Are Forcibly Undervalued

Thanks to the constantly declining price of new computers, the computer guy cannot charge labor sums without a dispute. If he asks to be paid what he is worth, he will likely be met with the “why not buy new?” argument.

That is, desktop computers are always getting smaller, faster, and cheaper. It’s possible to purchase a new desktop computer for under $400. If the computer guy spends five hours fixing a computer and wants $100/hour for his time, his customer will be outraged, exclaiming “I didn’t even spend this much to BUY the computer, why should I pay this much just to FIX it?”

Reason #6 - You’re Never Allowed A Moment’s Peace

The computer guy is so prone to interruption that he rarely finds an opportunity to work on his own problems. This is because:

Computers never sleep.
Computer problems aren’t scheduled.
Every problem takes time to diagnose.
The computer guy can only give one problem his full attention.
Each user believes their problem deserves attention now.
Consequently, the computer guy has a 24/7 obligation to keep critical computer systems running, while simultaneously juggling everyone’s problems. He’ll often need to forfeit any opportunities to tend to his own needs for the sake of others — because at any moment, of any day, he can be interrupted by someone who wants to make their problem his problem.

Reason #5 - People Ask You To Perform Miracles

The computer guy is often mistaken for someone who possesses the combined skills of an old priest and a young priest. I’ll sum this up easily by example:

“No, I really can’t recover any files from your thumb drive, even if you did find it after it passed through your dog.”

Reason #4 - Your Assumed “All-Knowing” Status Sets You Up To Let People Down

There is no common understanding that there are smaller divisions within the computer industry, and that the computer guy cannot be an expert in all areas. What makes things worse, is when the computer guy attempts to explain this to someone asking for help, the person will often believe that the computer guy is withholding the desired knowledge to avoid having to help.

This is somewhat related to the next reason:

Reason #3 - You Possess Unlimited Responsibility


The computer guy is expected to solve problems. It is difficult to determine the boundaries of that expectation.

Some of the oddest things that I’ve been asked to do include:

Use pirated software to undelete important company files.
Create an Intranet, after explaining I didn’t know how to.
Teach someone how to hide their pornography collection.
Solving problems can range from replacing batteries in a wireless keyboard to investigating why the entire building loses power at the same time every morning. Resolutions can necessitate weaving a 50-foot cable through a drop ceiling, or wriggling under a house on your belly to add an electrical outlet.

Reasons #4 and #3 boil down to this: no matter how often you want to play the role of a hero, there will always be circumstances that test the limits of your ability to be one. It’s difficult to judge when helping someone means doing something immoral, and it’s even harder to admit you are unable to solve someone’s problem — and chances are, that someone will view you as incompetent because you were unable to help them.

Reason #2 - A Life Of Alienation

People only talk to the computer guy when they need him to fix something. Also, when the computer guy approaches a user, they’ll hop up out of their chair under the presumption that he’s there to fix something — as if it would never be expected that he only wants to strike up a conversation.

The fact that the computer guy never gets a moment’s peace can also practically force him to withdraw into solitude. His co-workers don’t understand that he doesn’t want to hear about their computer problems during his lunch hour — he does that every other hour of the day. That’s why the computer guy eats lunch alone with his door closed, or goes out to eat every day — not because he’s unfriendly, but because he needs to escape the incessant interruptions.

Reason #1 - You Have No Identity

It’s an awful experience when the computer guy shows up at a neighbor’s doorstep with a plate of Christmas cookies, only to have the child who answered the door call out, “Mom, the computer guy is here!” He begs for an identity that is not directly associated with computers, but “the computer guy” label walks ahead of him — it simply cannot be avoided. I was given a name and I’d love to be addressed by it.

Having read these reasons, you may believe that I’m complaining. It’s true that I was upset with many aspects of my life as the computer guy, but I’m past the point of complaining.

I took a good hard look at my existence and realized that things were not likely to change in the line of work I had chosen. Instead of just complaining, I took action and began making positive changes in my life.

Working in the computer industry isn’t for everybody. It wasn’t for me. I’ve compiled my reasons for putting it behind me and placed them here, so that anyone who is unsatisfied with their life working in computers might recognize it’s not for them either.

Tuesday, May 1, 2007

Cryptography at its best...


It's always only a matter of time. A little less than a year after the first quantum cryptographic network was demoed, a group of researchers at MIT have announced a working implementation of a hack that's been around in theory since 1998 but never implemented. Skirting around ol' Wernie Heisenberg and that Principle of his, the team exploited quantum entanglement to read the encryption keys encoded in photon polarizations from their momentums, avoiding detection by either end -- in other words, doing what was once thought impossible by cryptographers. The system isn't perfect, however -- in this early incarnation it can only nab 40% of transmitted data before giving itself away, and more importantly, it requires the invention of a "quantum non-demolition box" before the attacker can be anywhere but the same room as the receiver, since right now both attacker and receiver need to be using the same photon detector. Sounds like that might put a damper on that whole "undetectable" thing. Still, the researchers sound upbeat -- they're saying the work proves that no secret is truly safe. We're just wondering if they're pushing MIT to rename their department SETEC ASTRONOMY

Monday, April 30, 2007

New High Tech Passport



The NY Times reviews the new U.S. e-passport today (if you didn't want one, apparently you're too late). It mostly focuses on how ugly the pastiche of American iconography is, but it mentions the new embedded RFID chip holding all of your biographical info and "a digital image of the passport photograph, which will facilitate the use of face recognition technology at ports-of-entry," according to the State Department's website.

While the gold bars and circle marking your passport as a magical "e-passport" are on the front cover, the chip is embedded somewhere on the back page. To alleviate fears of skimming the chip's info, it only works within four inches of a reader—the cover contains shielding material—and the passports use Basic Access Control, which requires a printed PIN to read the chip, which seems like a pretty good idea.

That said, no one can skim my plain paper passport, which is thankfully good for another seven years.

Search Engine War!

Searching the Web on a mobile phone has been a lot like getting online via dial-up modem circa 1995: slow, tedious and not terribly useful. Typing on tiny buttons, squinting at a list of links and clicking through to a page that won’t display properly is enough to test anyone’s patience.

But that is beginning to change. Google, Microsoft and Yahoo have all trained their sights on cellphones, which they see as the next great battleground in the Internet search wars. They have thrown tens of millions of dollars and armies of programmers at the problem, seeking to develop tools that people on the move can actually use.

In recent months, the three search giants have introduced a new breed of search services that emphasize quick answers to urgent questions: Where is the best local pizzeria? How did the Yankees do against the A’s? What’s the fastest way to get to the airport?

The services are beginning to carry small ads related to searches like those that have turned desktop Internet search into a gold mine.

“The biggest growth areas are clearly going to be in the mobile space,” Eric E. Schmidt, chief executive of Google, said when asked about new opportunities at a conference here this week. In case his point wasn’t clear, Mr. Schmidt drove it home: “Mobile, mobile, mobile.”

The new offerings from the search companies are just the beginning. Search services that pinpoint a phone’s location using the Global Positioning System or that accept voice commands are coming out of the labs. Google has gone so far as to build a prototype phone with its own software inside, according to one person who has seen it.

But between the search giants and phone users stand some powerful gatekeepers — cellphone carriers like Cingular, Sprint and Verizon. On the PC, Web surfers can easily go to the search engine of their choice, but this takes longer on a cellphone. Carriers have the ability to dictate which search engine is easy to access and which is not through placement in their phones’ menus.

“Search will be even more of a choke point on the mobile device than on the PC because navigation is so hard,” said Marco Boerries, the senior vice president in charge of Yahoo’s wireless efforts.

After spending billions of dollars building wireless networks, building relationships with consumers and subsidizing the cost of phones, the last thing carriers want is to miss out on profits from the mobile search business. By and large, they have been eyeing the major search engines with a bit of foreboding.

“In the U.S., the carriers have complete authority over what happens on the phone,” said Sam Jadallah, a venture capitalist who has invested in mobile phone technology start-ups. For the nation’s wireless carriers, Google, Yahoo and Microsoft “are much bigger threats than they are partners,” he added.

The tension between the two sides is reflected in the scarcity of major alliances between carriers and big-name search companies. Among the big American cellphone operators, only Sprint has a wide-ranging partnership with a top search provider, Microsoft. Most other large carriers are working with small technology companies that offer generic search services, which the carriers can stamp with their own brand.

Thursday, April 26, 2007

Zero G Flight

The zero gravity flight is in a modified jet that creates the experience of microgravity during 25-second plunges over the Atlantic Ocean which should come close for a few seconds.

The jet's interior is padded to protect the weightless fliers and equipped with cameras to record their adventure. Normally, the plane conducts 10 to 15 plunges for its passengers who pay $3,750 for the ride.

Monday, April 23, 2007

Whos got the Golden Ticket?


Ok, so about 3/4 of the population has an iPod. Who in their right mind would pay the excessive amount of money for this thing? Lets put this into some sort of perspective. A Normal plain ole iPod will run you what, $250? These puppies right here will set you back a decent amount. A 30GB, 24ct, iPod will cost you a mere $600, and the 80GB, 24ct, anyone want to guess? A whopping $800, Can anyone tell me who would spend this money on something so absurd?

Walking on water

This actually made me bust out alittle chuckle while i was sitting in the office. So why not share it. Link

Friday, April 20, 2007

DELL offers XP again! YAY

Like most computer makers, Dell switched nearly entirely to Vista-based systems following Microsoft's mainstream launch of the operating system in January. However, the company said its customers have been asking for XP as part of its IdeaStorm project, which asks customers to help the company come up with product ideas.

"We heard you loud and clear on bringing the Windows XP option back to our Dell consumer PC offerings," Dell said on its Ideas in Action page. Users get to vote on various suggestions, and the notion of bringing back XP got 10,000 "points," making it among the most popular requests but well below top picks such as adding Linux or OpenOffice.org to its PCs.

Windows XP systems became scarce, but not impossible to find, after Vista arrived. For example, Hewlett-Packard said it would continue selling XP on some machines aimed at small and midsize businesses, while CompUSA still stocks a couple of business-oriented XP systems in its retail stores. Lenovo has also continued shipping XP on many of its business systems.

Starting immediately, Dell said, it is adding XP Home and Professional as options on four Inspiron laptop models and two Dimension desktops.

Earlier this month, Dell added XP back as an option for small-business customers, but at the time, it said it would not add it back for home users.

"Dell does not have plans to launch Windows XP for home users as the preference, and demand is for the 'latest and greatest' technology, which includes Windows Vista," Tom West, director of small-business marketing at Dell, said in a blog posting at the time.

Analysts say Dell's move is not a good sign for Windows Vista.

"That there is remaining demand from some segment of (the) consumer market points to the inability of Vista to resonate with consumers," IDC analyst Richard Shim said.

There was an initial bump for Vista sales right after its launch, Shim said, but some of that may have been from consumers who delayed purchasing a PC late last year. Sales in the later part of the first quarter were less strong, he said. The overall response to Vista will become clearer throughout the year, he said.

Tuesday, April 17, 2007

Firewall Check List

It’s fairly easy to misconfigure your firewall if you don’t have strong technology expertise among your staff. Though with Linux (and BSD) deployed it does indeed get’s easier to protect your computers hooked to internet, it is still something you should seriously care about.

1. If you have a network and don’t have it firewalled, get it done as soon as possible.

2. Use a firewall device or software to provide your firewall service. Don’t use some other device that may provide some hint of security. The capability can be built into a server or a router or something else, but make sure what you are getting is a firewall.

3. Protect each individual device in your network, or that might be used on your network, with device level security tools.

4. Make sure you properly “wall off” applications from unintended external and internal use.

5. Think of security is an ongoing process, not something you do once and can forget about. Make sure you are installing patches for your network as they are made available. Consider investing in an annual security assessment from a reputable IT consultant or solution provider.

6. Look to an IT consultant, or solution provider, to help you with your implementation. They have the expertise to guide you through the process and ensure that you are able to protect yourself and balance that with making sure you have the ability to run your business.
For desktop users: some Linux distributions do not have firewall installed by default, or activated, so make sure that there is one. For example openSUSE uses iptables as it’s firewall application with Yast Firewall frontend which makes it easier to manage your firewall settings.

No matter which OS you are using on your servers (and desktops/notebooks) the above list is to be followed if you want to be sure that you are safe and secure 99.99% (0.01% - there is a always a key to any lock.

Vacuum Shoes



Ever want to walk around the house and do some house cleaning at the same time? Well now you can, with these shoes. Although they are still in a concept stage. Look for these hot kicks on the market soon!

IT security firm trusts open source inside and out

In 1996, entrepreneur Richard Campbell started a company to help other entrepreneurs in East Asia become Internet service providers. His "ISP in a box" concept worked with Slackware as its base. The more experienced Campbell became with open source, a concept he originally discovered in college, the more he began to appreciate tools like Snort, a GPLed network intrusion detection system. "I became a strong proponent of it," Campbell says, and shortly after that he founded the Atlanta Snort Users Group.

Campbell had so much confidence in Linux and Snort that he decided to launch a new company called Securiant. As its flagship product, Campbell created a network appliance that runs on a custom Linux kernel with a big suite of open source security applications, including Squid, Snort, Dan's Guardian, Nessus, Shorewall, and Argus. The SpiderISA appliance plugs into the network and provides up-to-the-minute information about vulnerabilities, necessary patches, and intrusion attempts..... Article

Gspace: Unlimited Online Storage!

One thing that's made Google's free Gmail online messaging service popular is its multiple gigabytes of storage space. There are several tools that let you use the more than 2GB of space as a virtual Internet drive, the most popular being GmailFS. If you'd prefer to use software that's independent of your base operating system, try Gspace instead. It's a Firefox extension that's easy to install and use.

Sunday, April 15, 2007

Check your eyes!


Take a good ole look at this picture. Now take about 8 steps backwards and see whats up.

(pay attention to which side the faces are on)

Novell's regret in Microsoft deal

If Novell's chief executive has any regrets about slipping between the sheets with Microsoft, it's around Microsoft's push for IP protection.

Ron Hovsepian's alliance with Microsoft, announced last November, saw Microsoft agree to sell SuSE Enterprise Linux (SLES) coupons, while the companies worked on interoperability between SLES and Windows on virtualization, directories and file formats between Office and Open Office. Coupons apply specifically to SLES running as a virtual guest in a host Windows operating system or vice versa.

However, it was Novell's tacit recognition of the existence of intellectual property in Linux - by accepting Microsoft's promise not to prosecute developers whose open source code is used by Novell - that really rankled the community.

According to Hovsepian in eWeek, the IP covenant was a Microsoft - not a Novell - idea, and the companies' original proposal did not include a covenant not to sue. "That was one of the business things [Microsoft] wanted out of it," Hovsepian said.

And you can see why. It put Microsoft's chief executive Steve Ballmer back on form in the weeks following the deal, claiming Linux infringes Microsoft IP and that Microsoft wanted to "get the appropriate economic return for our shareholders from our innovation." Novell agreed to pay Microsoft $40m in protection.

Which brings us onto Hovsepian's only genuine - public at least - regret: his delay in responding to a storm of community criticism through an open letter. Hovsepian believes a timelier letter would have cleared up concerns.

That letter said Novell's agreement with Microsoft was "in no way an acknowledgment that Linux infringes upon any Microsoft intellectual property." Rather than clarify, though, Hovsepian's letter left people baffled over why Novell signed the covenant, given both companies held diametrically opposed views

Red Hat in the agencies.

Red Hat has sealed a potentially lucrative marketing and technology deal that could see its open source and Linux software land in more government and defense locations.

The company is partnering with Science Applications International Corporation (SAIC), an $8.3bn systems and solutions provider that lists NATO and the Department of Homeland Security (DHC) among its roster of clients.

Red Hat and SAIC have agreed to partner on development of technology and marketing to promote Red Hat and open source code to defense, federal and commercial users.

SAIC expects to bring its experience in systems integration, software development, database architecture and management of large projects to Red Hat Linux and middleware deployments. Red Hat said it expects the deal will help speed-up the move to open source by the US military, intelligence community, homeland security and other federal agencies.

IRS warns late tax filers of scam sites

The IRS issued an alert late today, warning of a "new tax scam... that lures taxpayers into filing tax information on a site masquerading as a member of the Free File Alliance".

Stay well away: the only place for US taxpayers to access the Free File program is through the official IRS.gov website.

According to the IRS, the latest twist on tax scams involves tax preparation websites that masquerade as members of the Free File Alliance, a partnership of 19 tax software firms and the IRS.

The IRS is investigating allegations that the unnammed websites "accepted tax information from taxpayers, changed the taxpayers’ bank account numbers to their own and then filed the return through a legitimate Free File partner".

Hi, im Linux

If you are a linux user, you will definatly enjoy these videos. And if your not, then take this as a learning experience. Video

Saturday, April 14, 2007

Social Security: Is Early Retirement the Way to Go?

Social Security is perhaps one of the most interesting results of the New Deal during the great depression. Some believe that its nothing more than a very bad retirement savings program, whereas others believe that it's a safety net to keep seniors from living in poverty. Regardless about how you feel about it, you will have to pay into it whether you like it or not, and you will get money out upon retirement. Social Security is essentially a system which redistributes wealth from those who are workers to those who are retired. The Social Security Administration takes 11.2% of your income and places it in the Social Security Trust fund and then when you reach age 62 or age 67, you can retire and receive monthly payments from the Social Security Administration. Social Security also provides a disability benefit and a death benefit.

Social Security is really not a very good deal for most people mathematically. People should focus on making it the best deal they can though. Retirees have the option of taking their money at age 62 or age 67. If you take it early at age 62, you will start getting paid immediately, but have a reduced benefit for the rest of your life. If you take the full retirement at age 67, you will receive a higher payment.

Before making a decision as to whether you should take early retirement or not, we have to make sure we're taking early retirement for the right reasons. Never take out early retirement because you absolutely need the money. If this is the case, your lower social security payment is going to haunt you for the rest of your life and you will be forced to live on next to nothing until your death. Take the time, and work for an extra five years, it's not going to kill you. This way you won't have to eat beans and rice throughout all of your retirement.

Assuming your finances are in order, now we can determine whether or not it makes sense to take early retirement or not. The Social Security website offers a calculator which will help you determine which option is best. There is really only one factor to determine whether or not if it's the best option. How long do you think you are going to live? Let's say we assume we are going to live until 82, and can receive a Social Security payment of $9000 at early retirement, or a payment of $1200 at age 67. We would receive a total of $360,000 at regular retirement and a $324,000 at early retirement. You will want to use the social security calculator or call a social security representative toll free at 1-800-772-1213, which will help you determine which is the best option for you based on your income and life expectancy.

Friday, April 13, 2007

Windows XP GONE as of 2008

Microsoft will stop selling Windows XP to PC makers such as Dell, Lenovo and Hewlett-Packard by January 31, a company representative confirmed Thursday. The software maker will stop selling XP to system builders, the smaller custom PC makers, a year later, the representative said.

"This has been the practice at Microsoft for some time, and this process provides a gradual transition away from a previous version of an OS, from full availability, to availability only through a distributor, and finally availability via downgrade rights," the Microsoft representative said in an e-mail.

Windows Vista, the successor to XP, became broadly available at the end of January. Microsoft has worked hard to promote Vista as a safer, easier to use, better connected and more entertaining version of Windows than any of its predecessors. However, there s still a lack of Vista-compatible applications and hardware drivers, hurdles for broad adoption.

Despite those words of caution, many PC shoppers already have no choice beyond Vista. PC makers have already moved almost everything they sell to consumers--and some businesses--over to Vista, both in stores and online.

Wednesday, April 11, 2007

Verizon Wireless Gets its Mitts on BlackBerry 8830 World Phone



Being a Verizon customer, I'm always complaining about their lack of phones, but it looks like the boys in red just got first dibs on RIM's BlackBerry 8830 (aka the Cyclone), which is a CDMA/GSM hybrid. In other words, it'll work here in the States and overseas on GSM networks. It's Verizon's second phone with that super feature. Personally, I think Verizon needs more "hybrid" models like that.

The 8830 looks like the 8800 and will pack a QVGA screen, microSD slot, and 3G EV-DO support. The bad news is that there's no camera. Even though I don't take a lot of cell phone pics, that's a deal-killer for me. Otherwise, corporate types should fair well with this baby in their pocket

Zune 2.0 Details Leaked


So we knew the red (and pink and orange) Zunes were coming, but surprise surprise, the red Zune will include some interesting sports content to cater to the sports nuts out there, or so the rumor hounds at Crunchgear say. Supposedly you will be able to select your favorite team and the Zune will be able to download games as podcasts, which could be handy if you miss a game or don't live in the area of your favorite team and miss all of the regional broadcasts on TV.

There are definite perks to something like this, especially for sports fans, but there are all kinds of problems that could be associated. Is it full games or just highlights? I don't see myself wanting to actually download a three hour baseball game and then proceed to watch it on a Zune screen. The jury is still out, but I'll try to give it a shot as soon as I can, given these rumors are correct.

Tuesday, April 10, 2007

Home-loan demand soars

U.S. mortgage applications skyrocketed during the first week of 2007 as interest rates fell for the first time in five weeks, lending support to the view that the housing market is stabilizing, an industry trade group said Wednesday.

The Mortgage Bankers Association said its seasonally adjusted index of mortgage application activity, which includes both refinancing and purchasing loans, jumped 16.6 percent to 671.1 for the week ended Jan. 5.

However, the monthly average shows a decline in the volume of applications for home loans, with the four-week moving average down 2 percent.

Borrowing costs on 30-year fixed-rate mortgages, excluding fees, averaged 6.13 percent, down 0.09 percentage point from the previous week. Interest rates were above year-ago levels of 6.08 percent.

The MBA's seasonally adjusted purchase index, widely considered a timely gauge of U.S. home sales, soared 16.2 percent to 472.8, its highest since the week ended Jan. 20, 2006 when it reached 473.7. The index was also above its year-ago level of 457.4.

The group's seasonally adjusted index of refinancing applications surged 17.3 percent to 1,923.8. A year earlier the index stood at 1,497.5.

The refinance share of applications increased to 48.4 percent from 48.1 the previous week.

Fixed 15-year mortgage rates averaged 5.85 percent, down from 5.93 percent. Rates on one-year adjustable-rate mortgages (ARMs) decreased to 5.79 percent from 5.84 percent.

The ARM share of activity decreased to 20.1 percent from 20.4 percent the previous week, its lowest since July 2003.

The MBA's survey covers about 50 percent of all U.S. retail residential loans. Respondents include mortgage banks, commercial banks and thrifts.

Information About Investment Property

Any property that is purchased with the intent of gaining a return is considered investment property. Investment property can be an apartment building, a duplex, a single-family dwelling, vacant land, commercial property -- basically any type of real estate. The term investment property usually describes property that the owner does not occupy, but in some cases, the owner may occupy a portion of it.

Purchasing investment property can be a lucrative venture, whether one simply hopes to purchase a home or plans to make a business out of such investments. One strategy for beginners is to purchase an investment property such as a duplex, or other multiple family dwelling, and live in one unit while renting out the other(s). This way, monies collected from the renter or renters covers the note, leaving the owner without a mortgage payment. Eventually the property is paid off, and the purchaser continues collecting the rent for a profit.

The owner may also purchase another investment property, using the equity in the first property to finance the purchase. Equity simply means the fair market value of the property minus the amount still owed, including any liens. It is common to borrow against the equity in a property. Rates for such loans are fairly competitive because the property acts as collateral to secure the loan. The less risk there is in lending, the better the rates are.

Valuable Information About Liquidation

Liquidation is the process of taking a business real assets and turning them into cash, either to pay off debt or to reap a personal profit. Liquidation may be done either voluntarily by a company or individual, or in response to a declaration of bankruptcy as a way of repaying a portion of debtors.

Compulsory liquidation is ordered by a court, and the laws vary in different countries. Usually a court-appointed receiver takes over to analyze the company s assets and determine the best way to handle them. Originally, recovered cash from a compulsory liquidation was distributed evenly amongst debtors. Now certain debtors may take precedence over others, depending on the terms of the loans.

Voluntary liquidation may be done for a number of reasons. Some companies elect to undergo liquidation while their assets still outweigh their liabilities, if they believe their business will continue to degrade. By selling off assets early, these corporations may pay off debtors and still give a final dividend to shareholders.

A corporation with liabilities outweighing assets may also undergo voluntary liquidation, expecting a compulsory liquidation should they fail to pay off a significant portion of their debt. This type of voluntary liquidation is considered an appropriate response to an insolvent situation.

Tuesday, April 3, 2007

Inspector Lists Computers With Atomic Secrets as Missing

WASHINGTON, March 30 — The office in charge of protecting American technical secrets about nuclear weapons from foreign spies is missing 20 desktop computers, at least 14 of which have been used for classified information, the Energy Department inspector general reported on Friday.

This is the 13th time in a little over four years that an audit has found that the department, whose national laboratories and factories do most of the work in designing and building nuclear warheads, has lost control over computers used in working on the bombs.

Aside from the computers it cannot find, the department is also using computers not listed in its inventory, and one computer listed as destroyed was in fact being used, the audit said.

“Problems with the control and accountability of desktop and laptop computers have plagued the department for a number of years,” the report said.

In January, Linton F. Brooks was fired as the administrator of the National Nuclear Security Agency, the Energy Department agency in charge of bombs, because of security problems. The agency was created in the 1990s because of security scandals.

When the most recent audit began, the Counterintelligence Directorate was unable to find 141 desktop computers. In some cases, documents were found indicating that the computers had been taken out of service.

Previous incidents of wayward computers have also involved nuclear weapons information. But the office involved in this breach has a special responsibility, tracking and countering efforts to steal bomb information. Its computers would have material on what the department knew about foreign operatives and efforts to steal sensitive information.

The report includes a response from the security agency that generally agrees with the findings. But the inspector general, Gregory H. Friedman, noted in his report that “the comments did not include planned corrective actions with target completion dates.”

A spokesman for the department, Craig Stevens, said Energy Secretary Samuel W. Bodman “recognizes that we need to manage this place better.”

The counterintelligence office was recently merged with the intelligence office to improve operations, Mr. Stevens said.