April 08, 2014

Yahoo email anti-spoofing policy breaks mailing lists
The specification introduces the concept of aligned identifiers, which requires the SPF or DKIM validation domains to be the same as or sub-domains of the domain for the email address in the "from" field. The domain owners can use a DMARC policy setting called "p=" to tell receiving email servers what should happen if the DMARC check fails. The possible values for this setting can be "none" or "reject." Over the weekend Yahoo published a DMARC record with "p=reject" essentially telling all receiving email servers to reject emails from yahoo.com addresses that don't originate from its servers, Levine said.


Scientists apply physics to biology to create uncrackable encryption scheme
The way your heart and lungs interact is an example of “coupling functions;” both organs carry out separate jobs to keep you alive, yet they must also communicate back and forth with each other -- cardiorespiratory interactions -- to coordinate their rhythms. The paper on Physical Review X included this handy-dandy visual aid.  “Here we offer a novel encryption scheme derived from biology, radically different from any earlier procedure,” stated Dr. Stankovski. “Inspired by the time-varying nature of the cardio-respiratory coupling functions recently discovered in humans, we propose a new encryption scheme that is highly resistant to conventional methods of attack.”


Microsoft Shows Off 'Power Of The Cloud' With Azure Servers
This is the sort of thing that Microsoft has been talking about since the Xbox One reveal, but we’ve yet to get much of an idea of how it will work when the rubber hits the road. The video below is a demonstration of two high-end gaming machines, one of which is connected to Azure’s cloud server, one of which isn’t. When the Microsoft presenter starts loading the scenario up with some complex physics, the unconnected machine struggles to maintain framerate while the connected one clips along at 32 fps. It should be noted that this is not Xbox One footage, but rather a PC prototype. The recording is courtesy of Arekkz Gaming.


All that a CIO needs to know about CRM was said already by the Dalai Lama
There is no beginning or end to the Magic Quadrant – it is not a cycle with a beginning, middle and end. It is not a novel or story with character, setting, plot, problem and resolution neatly bent around a beginning, a middle or an end. Nor are the dots random positions of Brownian Motion. Positions grow, decline, evolve based on the readiness of the market and the prowess of the software suppliers and the consultancies and integrators to bring the vision into reality. And here the thoughts that I heard long ago from the Dalai Lama, who will be 80 next year, are helpful.


Entrepreneurship Always Leads to Inequality
Inequality, in the broadest sense, is precisely, and perhaps paradoxically, what entrepreneurship is all about: entrepreneurs use their wit and grit to burst into new markets and generate extraordinary wealth, sometimes very quickly, more often over decades. Along the way, entrepreneurship rewards smart and risk-tolerant investors (who helped build the success) with wildly above-market (read: unequal) financial returns. The most successful entrepreneurship is disruptive — a term entrepreneurs these days have donned as a magic mantle: “We have a disruptive business model, a disruptive technology, and will disrupt the market” goes the startup pitch.


Microsoft shows off next-gen Windows for connected cars
Microsoft has been in the automotive space for a very very long time—probably more than 15 years, according to Steve Teixeira, who works in the developer division at Microsoft. A good chunk of cars on the road run either Windows CE or Windows Automotive, including BMW, Fiat, Ford, Kia, and Nissan. Now, Microsoft is prepping yet another version, Teixeira revealed at last week’s Build event. The company has already tested its new version of Windows for the car, both in simulators that model eye-tracking, as well as in actual cars in a local Seattle raceway.


How MDM works -- or doesn't work -- for SMBs
Right off the bat, things are tricky given that smaller companies often implement BYOD since they can't afford to provide employees with devices. "In some ways, it changes the landscape a little bit, because users may be hesitant to allow corporate control of their devices," says Tyler Shields, lead mobile analyst for Forrester. "But if you propose the trade off as, 'If you want access to sensitive material, you have to have MDM,' the user will almost always accept MDM on there for the convenience." With BYOD in place, SMBs either opt for endpoint security or simply ask that employees have "something on their devices, some sort of security," adds Shields.


The Science and Art of Customer Matching for MDM
The best customer MDM systems do not exist in a vacuum. They are continually updated with the latest and greatest data available, whether that be from a customer change request, an internal CRM system or a partner data feed. But in order for this data to be meaningful and accurate, it must be integrated with existing data so as not to create duplicates or apply updates to the wrong record. The challenge with customer MDM is that names are not unique. In addition, persons may change their name and customers may shift addresses.


China obtains patent concessions in return for approving Microsoft-Nokia deal
China's commerce ministry, however, fears the patent enforcement could go too far. Because Microsoft is entering the smartphone business, the company has the incentive to raise its patent licensing fees as a way to stifle the competition. Android makers could be forced out of the market, or pass the costs on to the consumer, the ministry added. To prevent the patent abuse, Microsoft has promised it won't use so-called "fundamental patents" to seek a product ban on Android handset makers. Nor will the company seek to increase their patent licensing fees following the acquisition.


Modern C++ and Visual Studio
One of the features that Modern C++ offers is simplified (from the programmer’s perspective) memory management when using new-> make_unique or new->make_shared. No need for delete, automatic lifetime management exception-safe. Another area is how values types are handled more efficiently for move operations. C++11 added the idea of moving object-like types. Building on this approach, the ability exists to take ownership instead of making copies that have to then be deleted. The improved move semantics can improve the speed of legacy code simply by recompiling with C++14 capable compiler.



Quote for the day:

“Keep your fears to yourself, but share your courage with others.” -- Robert Louis Stevenson