Sunday, June 11, 2006

Microsoft chatting about buying Ebay

THE New York Post has confirmed that Microsoft has been involved in top secret discussions to buy eBay. Apparently the Vole wants to merge eBay into its MSN portal as part of its war on Google. Talks have ... Read More

Saturday, June 10, 2006

Forensic Felonies

A new law in Georgia on private investigators now extends to computer forensics and computer incident response, meaning that forensics experts who testify in court without a PI license may be committing a felony....Read More

Dell and Google team up in bid to break Windows

MICROSOFT'S dominance of the computer software market came under attack today after PC giant Dell and internet search engine Google reached a landmark deal....Read More

How A Criminal Might Infiltrate Your Network

One of the great mysteries in security management is the modus operandi of criminal hackers. If you don't know how they can attack you, how can you protect yourself from them? Prepare to be enlightened....Read More

Monday, May 29, 2006

Bloggers can shield sources

In a decision that could set the tone for journalism in the digital age, a California appeals court ruled Friday that bloggers, like traditional reporters, have the right to keep their sources confidential. ...Read More

Proof

The daughter of a brilliant but mentally disturbed mathematician, recently deceased, tries to come to grips with her possible inheritance: his insanity. Complicating matters are one of her father's ex-students who wants to search through his papers and her estranged sister who shows up to help settle his affairs. read more

Friday, May 26, 2006

Brute Force: Cracking the Data Encryption Standard

Brute Force: Cracking the Data Encryption Standard is the story of the life and death of DES (data encryption standard)In the early 1970s, the U.S. government put out an open call for a new, stronger encryption algorithm that would be made into a federal standard, known as FIPS (Federal Information Processing Standard.). Numerous solutions were submitted as the DES candidate, including one from IBM. The IBM solution, originally called Lucifer, was chosen to be used as the encryption algorithm. After that, it became known as DES....Read More

Friday, May 19, 2006

REALITY IS A SHARED HALLUCINATION

Howard Bloom 04.12.1997


HISTORY OF THE GROUP BRAIN VIII - 35,000 B.P. and Beyond.

The artificial construction of reality was to play a key role in the new form of global intelligence which would soon emerge among human beings. If the group brain's "psyche" were a beach with shifting dunes and hollows, individual perception would be that beach's grains of sand. However this image has a hidden snag - pure individual perception does not exist. read more »

Tuesday, May 16, 2006

UN Sabotaging US Dangerous

Eric Shawn: UN Sabotaging US Dangerous


From NewsMax.com

By Joan Swirsky


"The U.N. Exposed: How the United Nations Sabotages America's Security and Fails the World" by Eric Shawn. Penguin Press, 336 pages.


Eric Shawn's new book "The U.N. Exposed" is a blistering attack on the world body's corruption, hypocrisies, greed, ineptitude, scandals and crimes against humanity - and it delivers knockout punches on every page.


Shawn, a veteran Fox News Network anchor who has covered the United Nations for years, mourns the demise of the organization that, in his childhood and adolescence, stood for everything he stood for: "world peace, cooperation, compassion and goodness."

Sunday, May 14, 2006

Al Franken, Hillary, Kennedy, Michael Moore Caught!

A new book by a top investigative journalist exposes the blatant hypocrisy of liberals who loudly espouse principles they disregard in their own personal lives.



In "Do As I Say (Not As I Do): Profiles in Liberal Hypocrisy," Hoover Fellow Peter Schweizer reveals the glaring contradictions between the public stances and real-life behavior of prominent liberals including Michael Moore, Ted Kennedy, Al Franken, Hillary Clinton, Nancy Pelosi and Ralph Nader – among others.


NewsMax has a free offer for this new book – Go Here Now.

Wayne LaPierre Dreads A Hillary Presidency

He notes with disbelief that the U.N. just held a conference on the Internet that was chaired by a delegate from China.


"China has just shut down 47,000 Internet cafés," he recalls. "They just hired 4,000 more Internet security police to jail anyone in China that writes anything critical of the government on the Internet, and yet their delegate is chairing the U.N. conference on the Internet, and they held it in Tunisia, a country that is jailing journalists for free speech.


"If the U.N. gets control of the Internet, we are going to have an iron curtain around the world descend on free speech," he concludes. read more »

Thursday, April 27, 2006

Oracle Database and Grids:

Oracle Database 10g runs on all industry-standard platforms and moves from a single instance to Grid Computing without changing a single line of code. As a result, you can adopt Oracle grid technology with minimal investment, zero disruption, and fast ROI. Oracle Database 10g lowers the cost of ownership through automated management while providing the highest possible quality of service, making it the ideal choice for large enterprises and small and midsize businesses alike. Learn more »

Tuesday, April 25, 2006

NOTICE TO THE PUBLIC

CITY OF JACKSONVILLE, NC


The City of Jacksonville’s Water System (System) recently violated a drinking water standard. There is no reason for concern for the water quality . Although there is no need for alarm, our customers have a right to know what happened and what is being done to correct this situation.


Pursuant to 40 CFR §§ 141.140(a)(1)(ii)(A) and 141.40 (a)(5)(ii)(A), the System is required to collect two samples of the Unregulated Contaminant Monitoring Regulation (UCMR) List 1 contaminants in one twelve-month period during the years of 2001-2003. The System failed to collect two samples six months apart of the UCMR List 1 contaminants during the required time frame. The System collected only one sample in June 2002, which showed no evidence of any List 1 Contaminants and was not aware of the requirement for a 2nd test within 6 months. Therefore, the System is in violation of 40 CFR §§ 141.140 (a)(1)(ii)(A) and 141.40 (a)(5)(ii)(A). There is no reason for concern for the water quality . The System will be performing the two required samples during January 2005 and June 2005.


Please direct any questions to Ray Holder at (910)938-5272 from 8:00am – 5:00pm weekdays.

Asperger syndrome

From Wikipedia, the free encyclopedia



Asperger syndrome (sometimes called Asperger's syndrome, AS, or the more common shorthand Asperger's), is characterized as one of the five pervasive developmental disorders, and is commonly referred to as a form of high-functioning autism. In very broad terms, individuals with Asperger's have normal or above average intellectual capacity, with IQ's at least 80 and atypical or poorly developed social skills, (Social IQ's lower than 75) often with emotional/social development or integration happening later than usual as a result. read more

Sunday, April 23, 2006

Building the Feng Shui Way

sponsored by K Hovnanian Homes
K. Hovnanian Adds Certified Feng Shui Consultant to Resources for Homebuyers

Feng Shui - the art of building homes in harmony with the owners' surroundings and personalities - has moved from the topic of jokes to such importance that one of the nation's largest builders has added a certified Feng Shui consultant to the resources available to customers and salespeople. more »

Friday, April 21, 2006

Gates on Google - News - ZDNet:

How Microsoft will compete in the "new Web"


CNET News.com exclusive: At Microsoft MIX 06 in Las Vegas, reporter Martin LaMonica asks Bill Gates what the software maker is doing to challenge Google and IBM.

Wednesday, April 19, 2006

Airborne Laser

The Boeing-led Airborne Laser team exposes the Airborne Laser's conformal window during a test flight. Such an exposure is necessary for the weapon system to complete its mission of shooting down a ballistic missile during the boost phase of flight.

Beowulf (computing)

(Redirected from Beowulf cluster)

The Borg, a 52-node Beowulf cluster used by the McGill University pulsar group to search for pulsations from binary pulsars.


The Borg, a 52-node Beowulf cluster used by the McGill University pulsar group to search for pulsations from binary pulsars.


Beowulf is a design for high-performance parallel computing clusters on inexpensive personal computer hardware. Originally developed by Donald Becker at NASA, Beowulf systems are now deployed worldwide, chiefly in support of scientific computing.


A Beowulf cluster is a group of usually identical PC computers running a FOSS Unix-like operating system, such as Linux or BSD. They are networked into a small TCP/IP LAN, and have libraries and programs installed which allow processing to be shared among them.


There is no particular piece of software that defines a cluster as a Beowulf. Commonly used parallel processing libraries include MPI (Message Passing Interface) and PVM (Parallel Virtual Machine). Both of these permit the programmer to divide a task among a group of networked computers, and recollect the results of processing.


The name comes from the legend of Beowulf.
read more »