July 29, 2012

Can Creativity be Automated?
Music lends itself naturally to being parsed by algorithms—mathematics is mixed up in every chord, beat, and harmony that we hear. But can computer programming hack something as subjective as grading English papers?

Captchas Are Becoming Ridiculous
Andrew Munsell is having tough time with CAPTCHAs. Read on to see how it is and may be we all are experiencing the same trouble.

Vertical Is The New Horizontal: How The Cloud Makes Domain Expertise More Valuable In The Enterprise
While there are still a few providers for whom the “all-things-to-all-people” approach is quite successful (Microsoft, Oracle), the vast majority of successful cloud solution providers have struck gold by picking one thing and doing it extremely well.

Human Error Cited in Hosting.com Outage
Hosting.com said human error was responsible for a data center power outage that left more than 1,100 customers without service. The downtime occurred as the company was conducting preventive maintenance on a UPS system in the company’s data center in Newark, Del.

University of Groningen Offers Repertory Grid Tool for Capturing Architecture Decisions
Dan Tofan from the University of Groningen provides the open source software tool RGT (Repertory Grid Tool) to software architects for capturing and evaluating their architecture decisions. Using the tool architects can better document their decisions and reflect about them.

The Titleless Leader
Leading without a title is about taking personal responsibility. We—the world—is in desperate need of people who will choose to lead whenever and wherever they can.

Database Security Testing In the Light of SQL Injection Attack
This article basically focuses on providing clear, simple, actionable guidance for preventing SQL Injection flaws in the database applications under test.

How Companies Will Googlefy Your Career
Global giants like IBM, Amazon and Google have already begun importing predictive performance analytics to manage their human capital portfolios. Their efforts are arguably more sophisticated than these new college tries.

Introduction to Security Troubleshooting
This post is the first part of a multi-part series (I haven't decided how many parts there will be) on effective Cisco security deployment troubleshooting. While later posts will focus more on either a particular device or technology, I'll cover some general guidelines and concepts here.



Quote for the day:

"Practice Golden-Rule 1 of Management in everything you do. Manage others the way you would like to be managed." ~Brian Tracy