Tag: security


  • Rock Eagle 2007 Keynote – David Cearley, Gartner Way too many unfamiliar acronyms an terminology. It moved really fast without spending much time to explain anything. Disruptive trends selected by timing, speed, and likelihood. Multricore to fabric – Core on processors will double every two years through 2015. Applications will have to adapt to multi-cores.…

  • So, you are a teaching an online class. Students cheating naturally is a concern. How does one prevent them from stealing answers? Code in the online class system? Unfortunately, the makers of the learning management systems lag behind the creativity of cheaters. Plus, they can only control their systems. How do they enforce security in…

  • Congresspedia – Congresspedia (tags: government politics wiki) Google Reader keyboard shortcuts (tags: google) Get live updates as programmers, designers, security experts and the like jam Portland, Oregon, for O’Reilly’s ninth annual Open-Source Convention. (tags: opensource computers O’Reilly conferences)

  • Website Design: Choosing The Right Colors For Your Website | OutsourcingTemps.com (tags: design webdesign) WordPress › Support » Adding an author picture (tags: wordpress) User Datagram Protocol – Wikipedia, the free encyclopedia (tags: wikipedia network) Transmission Control Protocol – Wikipedia, the free encyclopedia (tags: wikipedia network) The Chronicle: Wired Campus Blog: Blackboard Video Mocks Second…

  • Early in the history of the WWW, people thought a document which did not have an inbound link, a link from some external location to the file, was private. Search engines looked for content on web sites in locations for which there was not a link already pointing. To truly respect the privacy of those…

  • Ready to Switch?

    I was disappointed the only IE competitor mentioned was Firefox. Opera, Safari, and Netscape are well known enough that it would behoove a more balanced view to mention them as well. My only use of IE lately is replicating a user problem I can’t replicate in Firefox and the very, very infrequent case a web…

  • Security Watch: The myth of online anonymity – CNET reviews: In his talk, Kazwetz mentioned several studies on gender use of keywords which, when weighted–with specific numerical values for male and different numerical values for female–can determine the gender of the author. Sounds too simple to be true, but research (including Gender, Genre, and Writing…

  • USDOEd’s Turn

    Yikes! These are not the kinds of people who need to have their information disclosed. Students are just building their credit. For them to go through someone trashing them so early could be really detrimental. 🙁 Federal student loan program exposes data on 21,000 users: The U.S. Department of Education has disabled its Direct Loan…

  • Guns For Hire – Part 1 Originally uploaded by cszar. I found this photo at Flickr really hilarious! Photographer’s description: “After the Muppet Show was canceled the main characters had to find other jobs. Dr. Bunsen, Kermit and Ms. Piggy opened their own security firm.” In case you can’t find the link to my Flickr…