-
Gary Gygax, RIP
Hot news from Geoff Arnold: http://www.woot.com/Blog/BlogEntry.aspx?BlogEntryId=4118 I particularly liked: “When I heard, I cried 2d10 tears.â€
-
links for 2008-03-04
The Technocrat » Bluetooth Proximity Detection on OS X Using Proximity to sense Bluetooth devices on MacOS (tags: bluetooth osx proximity hacks) Apple – Downloads – System/Disk Utilities – Proximity Proximity (tags: bluetooth osx proximity mac hacks)
-
US seeks terrorists in web worlds – Bring back Real MUAs
Sigh… BBC NEWS | Technology | US seeks terrorists in web worlds The US government has begun a project to develop ways to spot terrorists who are using virtual worlds. Codenamed Reynard it aims to recognise “normal” behaviour in online worlds and home in on anomalous activity. It is likely to develop tools and techniques
-
links for 2008-03-03
A Guide to Web Typography | i love typography, the typography blog makes some clear points 🙂 (tags: typography design web fonts) YouTube – Helpmann awards shadow puppets Deeply cool video, to Louis Armstrong’s “Wonderful World”. (tags: fun performance video animation) YouTube – 12 turns in a wheel !!! © My poor hamster … admit it,
-
links for 2008-03-02
ThinkGeek :: Hello My Name Is Inigo Montoya Too cool. How to deal with conferences which require you to wear stupid nametags. via Bart. (tags: funny princessbride inigomontoya) Bethel Park School District – William Penn Elementary School I went here 36 years ago, and they haven’t torn it down yet. (tags: school) Bethel Park School
-
links for 2008-03-01
Teblog: Vendor Relationship Management UK-style Tebbo gets his first taste of VRM. (tags: vrm) So this VRM thing Review of the last VRM meeting from an attendee (tags: vrm) Macworld | Mac Gems | USB 2.0 Universal Drive Adapter redux At last month’s Macworld Expo, Newer Technology announced a new, updated version of the Drive
-
ten mistakes that C*Os consistently make that weaken [the] enterprise
Via a circuitous route I came across “Ten Mistakes that CIOs consistently make that weaken enterprise security” – and I have to say that having read it, albeit bitter and hard, most of it applies much more broadly than just the field of security. Quoted from The Enterprise Architecture Blog: 1: Use process as a
-
The Secret Diary of Steve Jobs: Entire developer tools team placed on super-duper lockdown
The Secret Diary of Steve Jobs: Entire developer tools team placed on super-duper lockdown Look, I’ve gotta admit, I’m pretty disappointed with the developer tools engineers. These guys have really let me down. We were supposed to have the iPhone SDK out by February and let’s be honest — it ain’t gonna happen. They’re all
-
Chip’n’Pin is not Security Story Of The Day?
My ol’ buddy and former colleague Steve Lodin mailed me to chide that I hadn’t yet passed comment on the Chip’n’Pin scandal that my-favourite-anarchist-in-a-dickie-bow-tie Professor Ross Anderson has splatted all over the news. The thing is: I feel my opinions are kinda redundant in this matter. The wise person will read Ross’s team’s blog, watch
-
New Muffett Video: Security and the UltraSPARC T2
Regards my recent trip to Germany (with resultant podcast) to present about CMT and Security, I lucked out when I did the actual presentation: Literally as I stood to present, in the hope of getting an audio recording I plunked my dinky, go-everywhere Canon IXUS 900 on the table and left it recording video at
-
New York Merchants Embrace Euro – washingtonpost.com
Via Geoff’s blog I find this fascinating, chiefly wondering what the IRS will do if it becomes popular. Through friends and my trips through Europe I’ve learned a more flexible approach to payment-in-local-currency (USD in Ethiopia, GBP and EUR in non-eurozone Denmark) – but somehow the notion of that flexibility being available in the home