May 07, 2013

Hackers: From innocent curiosity to illegal activity
The researchers divided the process of evolving into a criminal hacker into three stages: initiation, growth, and maturation. ... Published studies focus primarily on the middle stage — growth — of the evolutionary path of computer hackers, in which hackers organize into loosely connected groups and virtual or real communities; acquire technical skills through mentoring and sharing; and establish social orders, group norms, and individual and social identities.


11 signs your IT project is doomed
Whether you're looking to avoid being saddled to a dud or to steer a doomed rollout out of the ditch, you must be able to recognize the signs of imminent failure well before a project comes apart at the seams. It can be a career-saver. We have gathered 11 red flags to look for in assessing IT project health. Be proactive whenever you encounter one -- or if you can, simply walk away. You career depends on it.


Up close and personal: VMware's Duncan Bennet
"I can still swim pretty well and still do rescues, but I do more of the directing," Bennet said. Sitting across from Bennet, who was dressed in a neat suit and clean-cut white hair, it was hard to imagine him listing surf lifesaving as a hobby outside of work. It seemed rather left of field for a man who is an integral part of a multibillion-dollar company.


Building an Interactive Navigation Bar
While you probably already have a design in mind that fits with the rest of your site, concentrating on HTML first, before worrying about the presentation and CSS, will help you keep your markup clean and tight. This results in better front-end performance and aids in organization as you continue your development.


Gates sticks to company line on tablets, knocks iPad
"With Windows 8, Microsoft is trying to gain market share in what has been dominated by the iPad-type device," Gates said. "But a lot those users are frustrated. They can't type. They can't create documents. They don't have Office there. So we're providing them something with the benefits they've seen that has made that a big category but without giving up what they expect in a PC."


Take back your power
As gifted as you might be, sometimes you might feel powerless. The larger organization asks a lot of you. Expectations are high, and you must continually find a way to navigate the politics, bureaucracy and naysayers while staying strong and committed to your work. Does this sound like you? If so, you might not be fully aware of the times that powerlessness grips you. Watch for these signs in your thoughts and words.


In an age of hacks, PA Senate addresses data breach security
“There’s no good reason to delay public notification after a data breach,” Pileggi said. “Potentially affected residents should know what happened as soon as possible when personal information is stolen so they can take steps to protect themselves from identity theft.” ... the bill requires state and local agencies involved in a beach to notify the state Office of Administration or local district attorney within three days.


Intel unveils low-power SoC architecture: Silvermont
Intel touts that the 22-nanometer System-on-a-Chip platform offers three times more performance for five times less power than the current Atom core generation. Some of the key enhancements include power sharing between GPUs and SoC IPs along with being able to manage burst frequency based on thermal, electrical, and power delivery constraints.


EU data law changes offer opportunities for Asia's datacenter markets
The challenge, however, is not many countries meet Europe's stringent data protection requirements, which effectively excludes them from being data transfer partners with the region, he noted. In Asia-Pacific, for example, only Australia and New Zealand meet the European Commission's criteria of having the adequate level of protection "by reason of its domestic law or of the international commitments it has entered into", according to the EC's Web site.


Dealing With Data and Customer Complexity
The explosion in channels, platforms, devices and other consumer touchpoints – not to mention the huge volumes of data produced as a result – has fundamentally changed the way companies approach the customer. Since changing its name from PPR to Kering ... has been focusing on an omnichannel approach that aims to develop closer relationships with consumers and present more of a seamless experience across its entire portfolio. How? By leveraging data. Why? Because customers are already operating that way.



Quote for the day:

"Every exit is an entry somewhere else." -- Tom Stoppard