JBoom writes: The Duct Tape Server was build entirely from four rolls of gray Nashua duct tape, a quarter roll of translucent 3M duct tape, and these computer components: Pentium P4 2.4 GHz, Intel SFF Motherboard, 1GB twinned DDR RAM, 80GB SATA HDD, 350W PSU, CDROM and (2) 80mm LED fans.
destinyland writes: "YouTube promised CNN they'd supply questions for a July debate of the Presidential candidates — by letting users upload video questions. But five days in they've only received 50 submissions — and
a lot of them were pretty stupid. The Washington Post rounded up the best videos they could find. But if this experiment with interactive democracy is doomed to fail, what's the ultimate lesson? Maybe it's that if you're going to unveil an interactive democracy online, you need to make sure you actually promote it!"
kfogel writes: "Ben Collins-Sussman wrote a very perceptive blog post after reading the "Microsoft Pleads With Consumers to Adopt Vista Now" story today. He notes that a similar situation spelled the beginning of the end of IBM's dominance in the 1980's: although IBM set the hardware standards for a while, the market eventually moved beyond them, and the day came when IBM introduced a standard and *everybody ignored it*. Ben was in high-school then, and writes: "I remember thinking to myself 'Wow, this is a big deal. It's the beginning of the end for IBM.' And I was right!... Well, I just had that same moment again [about Microsoft]".
An excellent read and a spot-on analogy, IMHO. The URL is:
Dave Cullinane, CISO, eBay
Dan Lohrmann, CISO, State of Michigan
Michael Yaffe, Director of Marketing, Core Security Technologies
June 28, 2007 @ 1-3PM EDT
Core Security Technologies
Is your Business Prepared?
Learn about computer security breaches and their devastating consequences on an agency and its constituents. CSO's, CIO's, CISO's and IT Security Professionals are making cyber security a priority concern. Given the recent events, everyone understands the grave impact of security vulnerabilities and communication disruptions to the agency's business if cyber vigilance is not exercised fully.
Now more than ever, CIOs, CSOs, and CISOs have to stay 2 steps ahead to ensure the security of their systems and company data. While many struggle to manage this cyber menace, others have initiated proactive strategies to meet this challenge.
There are always hackers, cyber attacks, and other threats coming from both outside and inside the organization and these threats keep getting more and more sophisticated. Systems are always vulnerable to new attacks or new internal security measure failures.
Listen to recognized practitioners who understand all too well that security is a business issue, and IT is a tool to drive business results. Speakers will share how they are addressing these threats strategically.
Take Away Points Include:
-Demonstrating a Return on Investment in Security
-Strategic Cyber Security Project Case Studies — specifically looking at
-IT Security Awareness
-Cyber Emergency Exercises — testing your defenses with a case study on Michigan's involvement in DHS's global exercise called Cyber Storm
Program Is Intended For:
-IT Security Professionals, CSOs, CISOs, CIOs, VPs, Directors, Heads of IT, VPs, Directors, Heads of Planning and Network Administrators
Registration for live webcast is free and via email. Complimentary streaming is available. Webinar will also be made available as an archive. Dont miss this informative webinar.