Forgot your password?
typodupeerror

Comment: Re:Who else is using Epsilon? (Score 1) 185

by stilwebm (#35695396) Attached to: Hackers Steal Kroger's Customer List

So far I've seen the following brands/companies affected:

McKinsey, Brookstone, U.S. Bank, Capital One, Citibank, JP Morgan Chase, Kroger, New York & Co, and Tivo.

Some additional clients of theirs include Best Buy, Fender, TIAA-CREF, MD Anderson, Visa, Kraft, Marriott International, and Johnston & Murphy/Genesco.

I expect that client list to shrink as more notifications go out.

Iphone

Apple Just Says Yes To iPhone Smoking Game 192

Posted by kdawson
from the thought-they-were-banning-e-cigs dept.
ZosX sends along a puff piece from Wired's Brian X. Chen: "Apple on Monday approved Puff Puff Pass, a $2 game whose objective is to pass a cigarette or pipe around and puff it as many times as you can within a set duration. So much for taking the high road, Apple. The game allows you to choose between smoking a cigarette, a cigar, and a pipe. Then you select the number of people you'd like to light up with (up to five), the amount of time, and a place to smoke (outdoors or indoors). And you're ready to get right on puffing."

Comment: Re:LOL. (Score 4, Interesting) 278

by stilwebm (#30452416) Attached to: Boeing's 787 Dreamliner Takes Flight

The A380 is not a competitor or substitute for the 787. The A380 is Airbus's bold bet on hub-and-spoke flight operations, and most closely competes with the Boeing 747 series. The 787 is designed for a smaller number of passengers than the A380 while having long range options, making longer point-to-point routes possible. Airbus's answer to the 787 is the A350, which has been redesigned several times. The A350 has 505 "firm" orders, while the 787 has 840 "firm" orders.

Comment: Re:I'd say (Score 1) 264

by stilwebm (#30193414) Attached to: Best Practices For Infrastructure Upgrade?

Having managed old infrastructure boxes in the past, I know it's harder than it sounds. The reliability was rock solid, but as demands of the network grew - not only in numbers of nodes but the way the nodes were used - and security concerns mounted, it was no longer feasible to maintain the boxes as-is.

Compiler, library, and package management changes over that time period makes it difficult on *nix boxes and Windows support expirations likewise make it difficult in Windows land. You reach a point where the time invested to patch a system exceeds the cost of replacing the system. Additionally, the downtime from the patch process (good luck finding a decent staging server for something seven years old) offsets the purported reliability of the setup. Lose a major component on one of those machines and you'll get a crash course in starting over and modernization.

Comment: Re:Online Banking (Score 1) 291

by stilwebm (#28340075) Attached to: MS Money Poll

Scheduling a credit card payment and mortgage payment for the end of the month, before you leave the country for a month won't show up until they hit the accounts affected. Nor will a check you write and mail to someone who might take anywhere from 5 to 30 days to deposit it. By putting transactions in on the anticipated date, you can see both the current, real bank balance, and the virtual balance at points in the future. This makes it easy to manage your cash flow, especially if you want to maximize your return on cash rather than just keeping large balances in a checking account. It also makes it easy to avoid negative balances, overdraft fees, and late fees.

Comment: Re:missing option (Score 1) 291

by stilwebm (#28339869) Attached to: MS Money Poll

If you signed your card and reported it stolen immediately (within 48 hours), most banks would give you zero liability and legally the maximum liability is $50. Your liability is $0 if you report its loss/theft before it is used. Carrying a credit/debit cart has less risk potential than carrying any amount of cash over $50.

Cellphones

Why Your Clock Radio Is All Abuzz About iPhones 397

Posted by CmdrTaco
from the i-hate-that-sound-so-much dept.
blackbearnh wrote in with a story that's not really about the iPhone, but if your office speakerphones beep like mine does, read on: "If you own an iPhone, you may have noticed that it has a distinct and very annoying effect on clock radios, computer speakers, car radios, and just about anything else with a speaker. The folks at O'Reilly Media aren't immune, so they set out to discover just what is it about iPhones that makes them such bad RF citizens. The iPhones aren't the only bad apples in the cell phone basket and there's not much you can do about the problem. We're really in an interesting time in that there has never been so many high-powered personal transmitters just wandering loose in the world."
Cellphones

Software Holds Cell Phone Calls While Driving 452

Posted by kdawson
from the hang-up-and-drive dept.
An anonymous reader writes "Canadian company Aegis Mobility has developed software that detects if a cell phone is moving at 'car' speeds. If so, the software, DriveAssistT, will alert the cellular network, telling it to hold calls and text messages until the drive is over. Calls are not blocked entirely; callers will be notified that the person appears to be driving, but they can still leave an emergency voice mail, which will be sent through immediately."
Communications

+ - iPhone sales figures released. AAPL down 6%

Submitted by
Whiney Mac Fanboy
Whiney Mac Fanboy writes "Forbes is reporting on AT&T's figures for iPhone activations over the release weekend. Many analysts had predicted 500,000 activations (and many slashdotters predicted million plus sales). Unfortunately, AT&T reported only 146,000 activations. Following this news, Apple shares fell $US8.81, or more than 6 per cent, to $US134.89, wiping out more than $US7 billion of Apple's market value. Does an over-hyped product always lead to a stock bubble?"
Security

+ - The Year's Biggest IT Security Train Wrecks

Submitted by
talkinsecurity
talkinsecurity writes "Man, there have been some royal screwups in IT security over the past year. When you put them all together in a list like this, it makes you wonder how these companies stay in business. This is a good, easy-to-read synopsis of the biggest security breaches and foulups since last May. Personally, I could think of a few they left off the list, like the .ani bug or about a million other Microsoft problems. But this is not bad, and could be useful if you ever have to show your boss or users what *could* happen at your company. http://www.darkreading.com/document.asp?doc_id=123 021&WT.svl=news1_1"
Linux Business

+ - Ten Bleeding-Edge Open Source Companies

Submitted by jammag
jammag (1021683) writes "Is "open source" overtaking Linux as the buzzword du jour? VC money is pouring into open source. Outfits like GroundWork (operations management) and Mulesource (ESB platform) are getting funded, and getting customers, by basing their apps/services on open source. Datamation has an article about it called Ten Bleeding-Edge Open Source Companies."

Make headway at work. Continue to let things deteriorate at home.

Working...