Friday, August 27, 2004
The Search Engine Belt Buckle is a PDA which shows 24 hours of all the bizarre and banal things people are looking for on the web. Art project or pointless hack? That's for you to decide, but all we know is that people are searching for some pretty freaky stuff out there, so why not put in a belt buckle..."
Thursday, August 26, 2004
Wednesday, August 25, 2004
"Programmers are outsourcing their software modules to cheap and efficient labour in India. This way they get the best of both worlds- more money and more time. They earn doubly - one from the outsourced job, other from the new job they undertake.
Says a programmer on Slashdot.org who outsourced his job: 'My employer thinks I'm telecommuting. Now I'm considering getting a second job and doing the same thing.'"
Monday, August 23, 2004
"only 23 out of 56 young Americans knew the whereabouts of the Pacific Ocean."
"The company [Microsoft] has now launched geography classes for its staff to avoid further bloomers which have caused embarrassment and cost money on a grand scale"
· A game called Age of Empires 2 offended the Saudi Arabian authorities because it showed victorious Muslim armies turning churches into mosques. The game was withdrawn from sale in the kingdom
· The Korean government, objected because Microsoft software showed the national flag in reverse. The software had to be changed.
Friday, August 20, 2004
"If the human body did patch management the way (companies do), we'd all be dead." - Fred Baumhardt. Microsoft Security Consultant
According to the SANS Internet Storm Center, an unprotected PC connected to the net to get patches, updates, and security fixes will last about 20 minutes, on average, before becoming compromised. Last year, the number was 40 minutes.
SANS offers a helpful guide called Windows XP - Surviving the First Day. ZDNet has a brief overview of this recent analysis."
Thursday, August 19, 2004
"You probably know those onboard testers found on Energizer and Duracell batteries : press the two white dots printed on the wrapper, and magically the battery's state appears on a yellow bar. No need for a separate battery tester, everything is included on the battery itself. While not very precise, it's good enough to know if a battery is brand new, so-so, or completely dead.
Here are instructions to turn such a tester into a not-so-precise analog display to monitor the CPU load on a Linux system, controlled by a serial port."
After a recent brush with (I believe) cyber squatting, I found this link. It explained the fundamentals to me very well. There may be other iems of law that interest you. obviously this is a USA bviased site, but the principles may apply to global issues, but what do I know - I'm not a lawyer.
Wednesday, August 18, 2004
Tuesday, August 17, 2004
Monday, August 16, 2004
The problem: You have a question. You need an answer. You know the person or group of people who can answer the question. You ask them the question, but you never hear back... you might have to continually checkin every few days or weeks, you might have to cc their manager, etc... but that's an awful lot of work just to get the answer to a question.
The solution: Send the mail to the person or group of people, but rather than asking the question, state what you know is the wrong answer. 'I think the way it works is Foo, right Bob?' You'll be amazed at how quickly someone will take the time to correct you, particularly if the question was aimed at more than one person, since it's an opportunity for that person to prove their knowledge in front of others (which is just human nature).
Brilliant. Absolutely brilliant. Of course, it's not without consequences... you need to have a thick skin (or be willing to grow one), and be willing to live with the consequences should you use this trick so frequently that others start to think you don't know what you're talking about."
Friday, August 13, 2004
The Microsoft SQL Server Health and History Tool (SQLH2) allows you to collect information from instances of SQL Server, store this information, and run reports against the data in order to determine how SQL Server is being used."
Whenever I hear about a 'Long Running Transaction', I wonder about where it ends. Let's consider the following example:
1) I decide to take a trip to Europe so I book some airline and hotel reservations.
2) The hotel in London hits a threshold of occupancy and decides to increase staffing and food for the restaurant.
3) The hotel orders more food from the Green Grocer.
4) The Green Grocer hits a threshold and orders another delivery from its shipper.
5) The shipping company hits a thresold and orders more diesel fuel for its trucks...
6) Two weeks later, I cancel my trip.
So, if I believe in long-running-transactions, the shipping company doesn't need any more diesel fuel! I don't think so!
Thursday, August 12, 2004
This posting is GoMeme 4.0. It is part of an experiment to see if we can create a blog posting that helps 1000's of blogs get higher rankings in Google. So far we have tried 3 earlier variations. Our first test, GoMeme 1.0, spread to nearly 740 blogs in 2.5 days. This new version 4.0 is shorter, simpler, and fits more easily into your blog.
Why are we doing this? We want to help thousands of blogs get more visibility in Google and other search engines. How does it work? Just follow the instructions below to re-post this meme in your blog and add your URL to the end of the Path List below. As the meme spreads onwards from your blog, so will your URL. Later, when your blog is indexed by search engines, they will see the links pointing to your blog from all the downstream blogs that got this via you, which will cause them to rank your blog higher in search results. Everyone in the Path List below benefits in a similar way as this meme spreads. Try it!
Instructions: Just copy this entire post and paste it into your blog. Then add your URL to the end of the path list below, and pass it on! (Make sure you add your URLs as live links or HTML code to the Path List below.)
1. Minding the Planet
2. Luke Hutteman's public virtual MemoryStream
4. MrDee Office Zealot
5. (your URL goes here! But first, please copy this line and move it down to the next line for the next person"
Wednesday, August 11, 2004
Tuesday, August 10, 2004
Monday, August 09, 2004
"Ironically, the New Zealand event this year is larger than Tech Ed in Australia.
Microsoft's Doug Pratt says speakers won't have to fly out next year, because the Australian event will be held a week before New Zealand's conference. "
Friday, August 06, 2004
"All opinions are my own. All content is provided 'AS IS' with no warranties, and confers no rights. Use code samples at your own risk.
Posts may contain information that is confidential, privileged or unsuitable for overly sensitive persons with low self-esteem, no sense of humour or irrational religious beliefs. Any dissemination, distribution or copying of this post is not authorised (either explicitly or implicitly) and constitutes an irritating social faux pas. Unless the word absquatulation has been used in its correct context somewhere other than in this warning, it does not have any legal or grammatical use and may be ignored. No animals were harmed in the preparation of this post. Those of you with an overwhelming fear of the unknown will be gratified to learn that there is no hidden message revealed by reading this warning backwards, so just ignore that Alert Notice from Microsoft: However, by pouring a complete circle of salt around yourself and your computer you can ensure that no harm befalls you and your pets. If you have read this post in error, please add some nutmeg and egg whites and place it in a warm oven for 40 minutes. Whisk briefly and let it stand for 2 hours before icing. "
Thursday, August 05, 2004
Steve Riley at his best. BTW the auction for may password starts here (and begins at more than one chocolate bar)
ARC305 Improving Application Performance and Scalability
Good solid, sensible advice. Glad I went.
DEV403 .NET Framework: Writing Faster Managed Code
Nic Wise, recipient of the TechEd purple heart for continuing under fire. Next year can we please have a venue that is finished.
"The one thing you need to do is (insert mind altering screetch noise from the heavens that makes your eyes rattle) and that is it."
Sorry Nic, I could not get much more that this out of your session (and I lost the link to Quake :( )
DEV322 Using Web Services Enhancements v2.0 to secure Web services
Torture. One of the 'features' of v2.0 is ease of use. These guys need a dictionary.
I am sure Gabe is a great guy, it is the session that should be put out of our misery
DEV307 Visual C# Best Practices: What's Wrong With this Code?
Should have gone to the dentist. Even if I WANTED to feel like I was trapped in a C# for dummies book or a Hi-5 TV show I would not have come here.
DEV311 Secure coding best practices (or Writing Secure Code 2nd Edition)
What a way to finish. Michael has passion, skill and an ability to make me REALLY scared. Please come back.
WOW I wish I had been to his first session. Electric, Informative.
no wonder this is the session that will not die.
and yes, he is a good as steve riley
SMT205 Smart Clients in a Service-Oriented World: Thomson Financial Case Study
Wierd opening, content that swung from a 100 to a 300 level - Interesting overview, just needed a little focus.
DotNet User Group
this is a must not miss, must support local talent - shame it conflicted with
SEC404 Security Expert Panel
Jesper Johansson, Steve Riley, Ben Smith
but there is one one of me - I'm sure they missed me (NOT)
DEV201 .NET Framework: Exploring What's new in the CLR 2.0
Nice overview, The map was a little strange, he seemed a little eagre, but very sincere - and a good topic helps.
DEV310 Threat modeling of possible software exploits
He is the MAN. He wrote the book on security at microsoft (well co-authored at least)
Writing Secure Code and he knows how to interest an audience. I did not want to leave.
note to sponsers. WE NEED MORE STUFF. my haul so far - pens=2. t-shirts=1, balls=2 and I had to WORK hard for these. c'mon guys t-shirts are cheap adverting. Geeks wear these everywhere. and if you want to buy something technical who do you ask? why not make them a moving billboard. I will wear a t-shirt long after I have forgotten the eye-candy air-heads you have manning your stalls.
DEV316 Visual Studio Team System Part 1
this could be good, this could be bloat, this could be another hoop to jump through before you an get to DOING something useful. I will wait for time to tell.
This one saw WAY too few seats. Can abyone explain why pre-registration is not mandatory so that sensible room sizes are allocated?
Then again Commnet would have to be reliable... maybe next year.
Oh yeah, annoyance number somthing - session times changed - I had the whole 3 days planned and the world shifted resulting in conflicts with cool sessions and dead periods with blah content.
methinks sharing speakers with Australia was the problem. I wonder if having NZ wed-fri and OZ mon-wed might work?
Hire people who care about users.
Hire people who understand the difference between a job and a hobby.
Hire people who want to contribute in lots of different ways to the success of the product.
It's okay to be in awe of these great hackers. But as a practical matter, small ISVs would be much better off hiring professionals."
Wednesday, August 04, 2004
Monday, August 02, 2004
Tech Ed started with a bang and a roar. SOOO many people. I would have traken notes but, there was no pen supplied. Can you believe that? you pay an arm and a leg and no pen... or pad.. or eval forms.... note to self - pick these up later... too much to see.
ARC301 Metropolis: Envisioning the Service-Oriented Enterprise
Harry Pierson presented this fabulously - if you watch nothing else on the DVD set, this will give you a fresh perspective on where IT is going
ARC303 Business value of Enterprise Architecture
Mark Carroll - WARNING buzz word alert!
however when you actually understand what he is saying the value is obvious. I am looking forward to getting the slide deck (still no pen)
ARC401 Data in Services-Oriented Architecture
Harry Pierson - This guy is on fire. I will ahve to digest this session futher, but to see some flesh on the fiefdoms concept has made TechEd worth coming to this year (yay a pen was found, and a t-shirt, squeeze ball etc - must say though meagre pickings for geek pack-rats)
SEC402 Network Threat Modeling
Jesper Johansson - Such a shame I missed this gut earlier - tomorrow I will not miss him (despite 8:30 start) Animated, funny, INFORMATIVE. why are security guys so entertaining? Steve Riley et al.
did I mention the food - Not bad.
If they could find a way of letting us get from one seminar to the next without risking life an limb (bad queues due to sponsers on bith sides of narrow corridor, and a VERY dodgy escalator) I would be happier.)
don't you just love Tech Ed? I know I do.