Making the world a nicer place; one technology, one app, one idea, one release, one team, one song, one friend at a time.
Thursday, December 30, 2004
Monday, December 06, 2004
Monday, November 08, 2004
Monday, October 25, 2004
Yet 84% stored personal data on their home PCs, and 72% routinely used the Internet for sensitive transactions, such as banking and medical data exchanges.
When technicians examined their PCs, they found 80% loaded with dozens of spyware programs that track the user's Web-browsing habits. Cybercrooks also have begun spreading a more invasive kind of spyware, called keystroke loggers, that steal logins and passwords as the user types them in. " [USATODAY.com]
Friday, October 22, 2004
Some of the flawed browsers have already been repaired or will be fixed shortly. Konqueror, for instance, closed the vulnerability in the version shipped with KDE 3.3.1, while the newest versions of the Mozilla/Firefox browsers have been patched against the second of the vulnerabilities. Opera said it will correct the issue in the upcoming version 7.60 (the current version of Opera is 7.54).
According to Secunia, users should either disable JavaScript within their browsers, or not visit trusted Web sites--such as financial institutions or retail sites--when tabs showing untrusted sites are also open. "
Thursday, October 21, 2004
Monday, October 18, 2004
Sun is betting it can make money from service and support agreements, not unlike Red Hat Inc.'s approach to Linux. "'f you want it fully supported or want input into new features, then you might have to pay for that,' Loiacono says.
It's part of a broader push into a software-as-services model. Sun provides hosted storage on an as-needed basis, and, in January, it established a $100-per-seat model for its Java Enterprise development platform, which has attracted more than 345,000 customers. Sun also introduced in September hosted grid computing for $1 per processor per hour and this week will disclose details of a plan for third-party hosting.
November's Solaris 10 launch comes after much work to optimize the operating system to run on x86 microprocessors from Intel and Advanced Micro Devices Inc. Sun finally hopes to smash the perception that Solaris' quality and performance come at a steep premium. Solaris is 'cheaper than Windows and less expensive than any of the major Linux distributions,' Loiacono contends.
In addition, Sun is almost ready to play its Microsoft card. Having reached earlier this year a $2 billion legal settlement that included cross-licensing of technology and a joint-development agreement, Sun and Microsoft have identified up to 20 areas of potential collaboration. Within the next 90 days, they'll deliver the first fruits of that work.
The companies will provide single-sign-on capability for Microsoft's Active Directory and the Java Enterprise LDAP Directory. Sun's CTO, Greg Papadopoulos, and Microsoft's chairman and chief software architect, Bill Gates, have been working closely the past few months on a road map to bridge the Sun and Microsoft environments. The companies say they'll unveil integration products a few times a year over the next 10 years, concentrating initially on interoperability among their messaging services, applications, and systems management. 'I don't anticipate that Microsoft is going to do any kind of similar deal with any of our major competitors,' Loiacono says. 'We have the inroad into technology and interoperability with them. Red Hat's not going to have this capability.'"
Thursday, October 14, 2004
Tuesday, October 12, 2004
Big software projects -- whether to manage supply chains, handle payroll, track inventory, prepare finances -- tend to begin with high expectations and the best intentions. They're all about efficiency, reliability, cost-savings, competitiveness.
Companies might develop their own programs internally, outsource the job or buy from a company such as SAP AG, Oracle Corp. or PeopleSoft Inc. Regardless of the route, it's usually a major undertaking to get things right. Often, however, the first step toward total disaster is taken before the first line of code is drawn up. Organizations must map out exactly how they do business, refining procedures along the way. All this must be clearly explained to a project's technical team.
"The risk associated with these projects is not around software but is around the actual business process redesign that takes place," said Bill Wohl, an SAP spokesman. "These projects require very strong executive leadership, very talented consulting resources and a very focused effort if the project is to be successful and not disruptive."
A 2002 study commissioned by the National Institute of Standards and Technology found software bugs cost the U.S. economy about $59.5 billion (euro48.35 billion) annually. The same study found that more than a third of that cost -- about $22.2 billion (euro18.04 billion) -- could be eliminated by improving testing.
Wednesday, October 06, 2004
However the HTML 4.0 Recommendation and Terena's Guide to Network Resource Tools describe URI's as simply the protocol + host + path-within-host. Which leaves me wondering Is a URL any different from a URI? "URLs form a subset of the more general URI naming scheme."
The definitive clarification would be the w3C report URIs, URLs, and URNs: Clarifications and Recommendations 1.0 which "addresses how URI space is partitioned and the relationship between URIs, URLs, and URNs.... URL is a useful but informal concept: a URL is a type of URI that identifies a resource via a representation of its primary access mechanism (e.g., its network "location"), rather than by some other [identifying] attributes it may have. " By adding that "an http URI is a URL, " this puts our minds at rest -- we do not need to look for a distinction in http-space. "urn:isbn:n-nn-nnnnnn-n" is also a URI, but one based on an identifier (ISBN) rather than a location, and hence is not commonly referred to as a URL.
So we may as well just use the term URI universally, but there's nothing wrong with using URL in the context of location-oriented mechanisms like http. Some useful historical context is outlined at the http://www.w3.org/Addressing/.
Thursday, September 30, 2004
Tuesday, September 28, 2004
Saturday, September 25, 2004
Monday, September 20, 2004
• Reflection: More than 20 times faster
• Java Native Interface (JNI)
– 78% faster to call native code
– 38% for C code to call Java code
• Serialization: 30–300% faster
• Better GC sizing out of the box
• JIT Improvements
– Array bounds check eliminations, more loop optimization, better inlining
Saturday, September 18, 2004
Friday, September 17, 2004
Sunday, September 12, 2004
RENTthesite.com ... a Website that you manage yourself in 48 hours! - pricing at 75/month for a solution like intellisite... Wonder how they'll compare?
1. WYSIWYG web page editing where you control the layout of the entire page including the font, color, placement, and size of both pictures and text
2. Unlimited user-defined editors each assigned with specific editing privileges
3. Unlimited user-defined dropdown cascading menus
4. Unlimited user-defined announcements that display between selected dates
5. Unlimited pictures and files uploaded using drag and drop and organized in folders just like Windows Explorer™
6. Unlimited user-defined private areas of your website that require a password to login
7. Control of user-defined POP3 and web-based email (i.e. office@myorganization.com)
Plus a money back guarantee, training videos, professional design, hosting, and more
According to the FAQ: Hosting and the one-time setup are determined based on your needs. The goal is to keep the ongoing hosting amount low. The other part is the one-time setup fee for professional design, integrating all these powerful tools into your website, setting up your email, and providing support for your staff.
Get more information from www.christianchurchwebsites.com or call 888-997-9947
The Classification & Evaluation of Content Management Systems: "websites vary from individual user weblogs (personal web publishing), through organizational news-oriented portals and e-commerce sites, to massive enterprise portals that are the public front end for a complex of intranet corporate portal sites"
Monday, September 06, 2004
Friday, May 14, 2004
Wednesday, May 12, 2004
A confluence of factors could conspire to make Workplace the first legitimate mass-market competitor to Microsoft's Office software suite. That, in turn, could have far ranging consequences. It might open up a wave of competition to the core Windows operating system itself. Should either of these possibilities transpire, the Colossus of Redmond could find itself having to cut prices and slash margins to compete."
Wednesday, April 28, 2004
Thursday, April 08, 2004
Sun is signing business at a profit in many divisions, even in low-end software where Sun is very price competitive with Linux. John Loiacono, formerly in charge of Sun's operating platforms, and the company's newly named head of software, says Sun is selling Unix-based software for $790 a year on an Intel-based server, a price that drops to $540 a year after the first year. In comparison, Red Hat Linux (RHAT) is sold with a service contract that costs $795 a year, he says. 'And I make money on those,' Loiacono says. 'Stay tuned. I'm going to get more aggressive on pricing.'
Sun is very focused right now on what its executives call low-hanging fruit. The company is spending marketing dollars only on specific projects where Sun has its best chance of success.
One near-term sales opportunity is an old, but refined message: Sun's hardware can make hosting mainframe applications cheaper. Companies like Austria-based steel manufacturer Boehler Edelstahl are choosing to host major applications such as its production planning system off of IBM zSeries mainframes and on to Unix-based Sun systems. Sun says such deals are proof that it's starting to see a payoff from mainframe rehosting software it bought from Critical Path in 2001 that's supposed to ease mainframe transitions to Sun systems.
Sun is also targeting sales to some telecom companies, formerly its bread and butter. Revenue is picking up in some areas, Loiacono says. Every time a cell phone company wants to add more features such as instant-messaging or a package of games, it has to write server-based software for it. Sun sells the Java-based infrastructure software that allows companies to more easily deliver such services over wireless networks."
Pointers to some tools for keeping track of what's running in your process list and IE scripting extensions, which are helpful for finding adware / spyware.
Modeling starts with business concepts and works its way down. When you're all done you end up with an application. But when you first talk with your client you don't start by discussing what programming languages you'll use. That would be a sure way to lose them. The beauty of UML models is that even technically unsophisticated clients can understand them. And non-technical stakeholders can readily understand the inherent value of modeling: It gives the project team tools and techniques to ensure they're doing the right thing -- that is, building the system the client actually needs. With modeling, they'll be sure they have the right information flow, the right architecture, the right data structures, and the right algorithms -- before they start worrying about the details of the implementation. "
Wednesday, April 07, 2004
Code for the tool set, which consists of a compiler, linker, a library tool, and a decompiler, has been posted to SourceForge.net, a hosting site for open-source projects and code. "
Friday, March 26, 2004
- It's easy to switch engines, so the competition to be best is intense. Google employs more than 60 PhDs.
- There is little infrastructural advantage to perpetuate dominance at Google, but watch out for what Microsoft could do - building search into the operating system, and searching across your hard drive, email, intranet, and the web.
- Google uses PageRank.
- Teoma uses a page's standing among recognized authorities on a topic.
- There is open-source work on search, e.g. Doug Cutter.
- About a quarter of users don't find their answer in the first set of links returned. That sounds pretty good to me.
Thursday, March 25, 2004
"The bulk of demands by [HP's] largest customers are in relatively specialized areas. 'They're talking about call centers, help desks, and support centers that run E-mail and a Web browser and a single application,' said Martin Fink, HP's VP for Linux. 'They're looking for a client alternative [to Windows]. That's where the interest is right now in the large corporate customers.' "
"[RedHat] 'have made the decision to not pursue the client market at this time. From a desktop and laptop perspective, then, Red Hat is a null set,' he said in explaining why HP turned to SuSE instead. "
Novell acquired SUSE in January.
"With analysts predicting annual growth rates for Linux on the desktop in the 25% to 30% range, HP sees an opportunity, and won't let its competitors--Sun and IBM, especially--get the jump on it. ... Earlier in the day, Novell said it had reached a broader agreement with IBM to pre-install its SuSE Linux Enterprise Server on all IBM server hardware. IBM will now pre-load SuSE's Linux on all its servers at customer request, including the eServer iSeries, pSeries, xSeries, and zSeries lines, as well as IBM's eServer BladeCenter systems."
Wednesday, March 24, 2004
Saturday, March 20, 2004
Friday, March 19, 2004
What’s The Danger?
As a parent, there are two things to be concerned about with the Internet: things you don’t want your kids to see and people you don’t want your kids to meet.
If you’ve spent any time surfing the web, you’ve no doubt stumbled onto sites with kid-inappropriate content. Even an innocent search on common terms that children might use (e.g. Barbie, White House), can lead directly to adult content.
In the early days of the web (just five years ago!), this problem was solved with the installation of “blocking” software. Blocking software does its job by maintaining continually updated lists of “bad sites,” and preventing an Internet browser from visiting any site on the list.
That worked well way back when, however with an estimated 3 billion web sites on the Internet today, it’s no longer possible to keep the lists updated.
Today, protection from inappropriate content is done mostly with a “filtering” approach. Rather than simply blocking certain sites from a list, “intelligent filters” look for combinations of words, phrases, patterns and even images, and deny access to sites on a real time, case-by-case basis as a child browses.Filtering software isn’t perfect - some bad things will be missed and some legitimate sites will be erroneously blocked - but it’s a lot better than having nothing in place. With that in mind, my first recommendation is that you do as we did and purchase a commercial filtering software product. There are many available, and most are easy to install, simple to use, and relatively inexpensive (around $40 each). A few examples are CyberPatrol, CyberSitter, NetNanny and Weemote.Net.
Parental Supervision is the Key
When it comes to protecting your kids, keep in mind that filtering software is a lot like skateboard safety equipment: necessary but not sufficient! That’s where the parental supervision comes in.
In terms of the second danger - keeping your kids away from potentially harmful people – you need to oversee the Internet as you would a trip to the mall or any other public place. In other words, get involved in managing where your kids are going and what they’re doing.
In our house, we’ve taught our kids a few, simple rules: No sharing of personal information; no arranging of face-to-face meetings with people you meet on the web; and no “aimless surfing” (i.e. no wandering around the Internet without a specific objective in mind, such as research for a school project).
We also take it one step further by keeping the kids’ computer right smack in the middle of our downstairs family room, so that everything that happens is out in the open.
If you’re thinking of establishing some family rules of your own, take a look at this example put together by the folks at SafeKids.com.
More Resources
...your head may already be spinning from all the options to consider! It’s a big topic, and believe me our family certainly didn’t figure it all out in one sitting.
With that in mind, I’d like to direct you to three exceptional resources for learning about child safety on the web: the Internet Safety Resource page at TechCorps, the Parents' Guide at Yahooligans and GetNetWise, a public service site funded by an assortment of public and Internet industry corporations. All are worth spending time on and all will help clarify the issues and tradeoffs involved.
Thursday, March 18, 2004
Wednesday, March 17, 2004
Line: 35
Char: 3
Error: Microsoft JScript runtime error
Object doesn't support this property or method
line = 9, col = 3 (line is offset from the start of the script block).
Error returned from property or method call.
Code: 0
URL: https://booktravel....
It was on Windows 2000, with the latest IE and Windows 2000 security roll-ups MS04-004 (Feb. 2004).
Resolution: reinstall sp1 of IE 6, to force a reinstall of the scripting engine and all the JScript bits. Only outstanding question is whether all the security hotfixes have to be reinstalled?? They appear to still be present in the IE "About" dialog.
And here are some of the fun links I found along the way:
- Windows Explorer - Errors: "EXPLORER caused an error in module..." This looks like a helpful site for resolving Windows Explorer and maybe related IE crashes.
- Microsoft's main Internet Explorer site
- Wininet retries POST requests with a blank header. This problem occurs after you apply the Feb. 2004 832894 security update (MS04-004) or the 821814 hotfix.
- Transitioning from the Microsoft Java Virtual Machine
- Wininet retries POST requests with a blank header. This problem occurs after you apply the Feb. 2004 832894 security update (MS04-004) or the 821814 hotfix.
- The IE 6 sp1 download site.