background preloader

Novell Defends SUSE Against MS-Sponsored Study

Novell Defends SUSE Against MS-Sponsored Study
Hewlett-Packard will apparently need close to two months to start fulfilling backorders for the (temporarily) revived TouchPad tablet. "It will take 6-8 weeks to build enough HP TouchPads to meet our current commitments, during which time your order will then ship from this stock with free ground shipping," read an email sent to customers and reprinted in a Sept. 7 posting on the Precentral.net blog. "You will receive a shipping notification with a tracking number once your order has shipped."That would place the new TouchPads in consumers' hands sometime in either late October or early November. The reduced-price devices are not returnable, according to the email. Nicholas Kolakowski is a staff editor at eWEEK, covering Microsoft and other companies in the enterprise space, as well as evolving technology such as tablet PCs.

Bam! Boom! Onomatopoeia! Onomatopoeia is not a word you use everyday, yet hardly a day goes by that we don't use several onomatopoeic words and phrases in daily conversation. Onomatopoeia refers to words that imitate the sound they represent such as "kerplunk" or "boing" in English or "doki doki" in Japanese. We might not hear onomatopoeic words used in formal written speeches so often, but we certainly hear them used in everyday conversation. I knew of Emeril's "Bam!" There is really nothing educational about this post of mine today. LinkOnomatopoetic English-Japanese Dictionary

ACM Queue - A Conversation with Phil Smoot - An engineer at Hotmail discusses the challenges of keeping one of the Web’s largest and oldest Internet services running 24/7. A Conversation with Phil Smoot The challenges of managing a megaservice In the landscape of today’s megaservices, Hotmail just might be Mount Everest. One of the oldest free Web e-mail services, Hotmail relies on more than 10,000 servers spread around the globe to process billions of e-mail transactions per day. What’s interesting is that despite this enormous amount of traffic, Hotmail relies on less than 100 system administrators to manage it all. To understand how they do it, and to learn more about what it takes to manage such an enormous service, we invited Hotmail engineer Phil Smoot to speak with us. Smoot is interviewed by Queue editorial board member Ben Fried, who has his own experience managing a large IT infrastructure. Fried’s background in IT includes stints as a dBASE II programmer, front-line support manager, Windows 1.0 programmer, and Unix systems programmer. BEN FRIED Let’s start by talking about how you got into this job. PS The big thing you think about is cost.

User:Piecraft/Dieselpunk Description[edit] A manipulation on an alternate version of a future 1950s from the developed technology and society of the 1930's, where the Great Depression never arrived and World War II is still being fought as a prolonged Cold War. In turn, Japan continues its progress towards technological modernization, developing the earliest computers and terminals. Nazi scientists continue experimenting by taking the route of biotechnology, sparking off a genetic revolution of bio-mods, clones, and organ harvesting. Whilst the Americans and British take both of these technologies to develop mind-control devices, spawning man-machine interfaces and sparking the atomic-powered machine age. Themes that usually surface in the genre relate to: The Red Scare - fear of intrusion sparking mass hysteria.Space Race - conquest of Outer Space. see also: Diesel cycle Dieselpunk post-apocalypse[edit] Art & Culture[edit] Examples: the cinema of Fritz Lang, F.W. Dieselpunk politics[edit]

State of Application Security: Immature Practices Fuel Inefficiencies, but Positive ROI Is Attainable - A Forrester Consulting Thought Leadership Paper Commissioned by Microsoft In November 2010, Microsoft commissioned Forrester Consulting to conduct a survey study of 150 North American software development influencers. The purpose of the study is to understand the current state of application security development practices and identify key trends and market directions for application security. In November 2010, Microsoft commissioned Forrester Consulting to conduct a survey study of 150 North American software development influencers. 01DirectX End-User Runtime Web InstallerThe Microsoft DirectX® End-User Runtime provides updates to 9.0c and previous versions of DirectX — the core Windows® technology that drives high-speed multimedia and games on the PC. 02Malicious Software Removal ToolThis tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found. Loading your results.

computer parts, computer hardware, laptop computers, desktop computers - Geeks Security Analysis for Single-Sign-On (SSO) Websites clever algorithms Welcome to Clever Algorithms! This is a handbook of recipes for computational problem solving techniques from the fields of Computational Intelligence, Biologically Inspired Computation, and Metaheuristics. Clever Algorithms are interesting, practical, and fun to learn about and implement. This introductory chapter provides relevant background information on Artificial Intelligence and Algorithms. What is AI Artificial Intelligence The field of classical Artificial Intelligence (AI) coalesced in the 1950s drawing on an understanding of the brain from neuroscience, the new mathematics of information theory, control theory referred to as cybernetics, and the dawn of the digital computer. Russell and Norvig provide a perspective that defines Artificial Intelligence in four categories: 1) systems that think like humans, 2) systems that act like humans, 3) systems that think rationally, 4) systems that act rationally [Russell2009]. Neat AI Scruffy AI Natural Computation Computation with Biology

Bill Gates' Farewell - Microsoft at CES 2007 The Nice programming language Project Server 2007 VSTS Connector - Home JavaScript Implementation of AES Advanced Encryption Standard in Counter Mode AES is a ‘symmetric block cipher’ for encrypting texts which can be decrypted with the original encryption key. For many purposes, a simpler encryption algorithm such as TEA is perfectly adequate – but if you suspect the world’s best cryptographic minds, and a few million dollars of computing resource, might be attempting to crack your security, then AES, based on the Rijndael algorithm, is the tightest security currently available (approved by the US government for classified information up to ‘Secret’ – and in in 192 or 256 key lengths, up to ‘Top Secret’). AES was adopted by NIST in 2001 as FIPS-197, and is the replacement for DES which was withdrawn in 2005. I developed this JavaScript implementation to to illustrate the original AES standard (NIST FIPS-197) as closely as possible. Much of the Rijndael algorithm is based on arithmetic on a finite field, or Galois field (after the mathematician). (In counter mode, a text could decrypt correctly even if the cipher routine was flawed).

Secure Habits: 8 Simple Rules For Developing More Secure Code -- MSDN Magazine, November 2006 Secure Habits 8 Simple Rules For Developing More Secure Code Michael Howard I have been lucky enough to work with thousands of good developers over the years who wanted to learn how to write more secure software. During this time, I've also learned a great deal from people who are very good at building secure systems, and this got me thinking. I wondered if there were common skills or habits the "secure developers" share. Now one thing I know for sure is that anyone reviewing this list will immediately see missing habits. Habit #1: Take Responsibility This is a variation of the classic "There is no silver bullet" comment made over 25 years ago by Fred Brookes in The Mythical Man Month. Secure products are built by developers who create secure designs and write secure code. Figure 1 Vulnerable Code is Written by Individuals Remember that all code will be scrutinized and possibly attacked. If at all possible, have your code peer-reviewed by a security expert. Habit #2: Never Trust Data

Related: