Essential vocabulary additions for the workplace (and elsewhere)!!!
1. BLAMESTORMING: Sitting around in a group, discussing why a deadline was missed or a project failed, and who was responsible.
2. SEAGULL MANAGER: A manag er, wh o flies in, makes a lot of noise, craps on everything, and then leaves.
3. ASSMOSIS: The process by which some people seem to absorb success and advancement by kissing up to the boss rather than working hard
4. SALMON DAY: The experience of spending an entire day swimming upstream only to get screwed and die in the end.
5. CUBE FARM : An office filled with cubicles.
You know it has to be said, first sentence, first paragraph: the best way to win a fist fight is not to get into one in the first place.
No shit, sherlock.
Every single mens magazine who has ever attempted to publish an article like this has started (and ended) exactly that way and is usually devoid of any real information – sometimes because someone on the editorial staff wanted to avoid putting the periodical at risk for a lawsuit; other times because the author has absolutely no clue what theyâ€™re talking about, so they cop out with this â€œVerbal Judo Wins The Day!â€ crap.
The government then made competing with the USPS illegal… LOL
Super-delegates explained: How the nomination could still be in doubt after all the primaries, and why your vote matters less than you think
WASHINGTON – Itâ€™s called the Democratic Party, but one aspect of the partyâ€™s nominating process is at odds with grass-roots democracy.
Voters donâ€™t choose the 842 unpledged â€œsuper-delegatesâ€ who comprise nearly 40 percent of the number of delegates needed to clinch the Democratic nomination.
The category includes Democratic governors and members of Congress, former presidents Bill Clinton and Jimmy Carter, former vice president Al Gore, retired congressional leaders such as Dick Gephardt, and all Democratic National Committee members, some of whom are appointed by party chairman Howard Dean.
The Republicans do not have a similar super-delegate system.
These super-delegates donâ€™t have superhuman powers, but unlike rank-and-file Democrats, they do automatically get to cast a vote at the convention to decide who the partyâ€™s nominee will be.
Although dubbed â€œunpledgedâ€ in Democratic Party lingo, the super-delegates are free to come out before their stateâ€™s primary and pledge to support one of the presidential contenders.
Follow the link below to read the rest of this interesting and disturbing article
Excellent linux packages 101 writeup by DownloadSquad. it seems Ubuntu-rific but some of the info is universal.
“Your shiny new Linux system has it all — except that one program you really needed it to install. You get online, you find the program’s website, and click ‘download’. Except there’s not just a link to the program there.
There are four, or five, or more links to the program. Each has a slightly different format, ending with .rpm, .deb, .tgz, or possibly even .ebuild.
Some include x86 in the name, while others say ppc or amd64. What’s the difference? What’s actually included in these packages?
Packages are pre-compiled programs for your system (the exception being Gentoo’s .ebuild). You’ve got to know a bit about your system to install them.
It’s not enough to know just that you need an .rpm or .deb. You should know your computer’s architecture (32 or 64 bit chip? PowerPC?), as well as the architecture of the distribution you installed. Don’t panic if you have a 64 bit chip and installed an x86 distribution (backwards compatibility is a good thing), but keep in mind you’ll have to install x86 packages. It’s best to use a package labeled for your distribution, though in some cases it is possible to install packages across similar Linux systems. For instance, many Slackware packages are able to install on Zenwalk.
Package management refers to the way your distribution installs and configures (as well as manages and removes) software applications and libraries on your system. When Windows installs an .exe (which is the closest thing in Windows to a package) it usually places it in a single specific place within a directory. Linux installs across a few directories, leaving many new Linux users scratching their heads as to where their .rpm actually went. Most distributions install the executables in /usr/bin, and the libraries in /usr/lib. You may notice related files in /usr/share or /etc.
With its new Google Gears functionality, Buxfer might finally be the answer for people who want the bells and whistles of an online personal finance website (hello Mint!)â€”charts, pretty colors, and general infoporn goodnessâ€”without having to blindly trust an unknown company with sensitive data such as bank account or credit card numbers (goodbye Mint!). The service uses Google Gears to store account login information and credentials on your own computer, then syncs the data collected with the Buxfer servers, writes VentureBeat.
Buxfer has been around for a whileâ€”both Consumerist and Lifehacker wrote about it nearly a year agoâ€”but the Google Gears functionality is a new component added just last month, and at least at first glance it seems like a good answer to the “sensitive data” issue.
A friend tipped me off to a Domain State thread that warns you not to look up a domain name at Network Solutions. If you go to the Networks Solutions site and look up a domain name to see if itâ€™s registered then Network Solutions, within seconds, will buy the domain name, causing you to have to go buy it from them.
Let me explain, using a specific example, exactly what Network Solutions is doing and what is wrong with what theyâ€™re doing.
First, I went to the NetworkSolutions.com home page and filled out their form to see if RonPaulIsGod.com was available. According to Network Solutions, RonPaulIsGod.com was available. (It is my contention that within seconds of my inquiring about the RonPaulisGod.com domain name Network Solutions automatically registered that domain name.)
But, my friend called me on my cell phone and I had to step away from my computer for a few minutes. A few minutes later, I realized that I could buy that same domain name for $6.99 over at another registrar and decided to go with them, rather than paying Network Solutions the $34.99 for the domain name. After all, I could think of a lot of things that I could spend the savings of $28 dollars on, mainly 3 other domain names.
Then I come to find out, Network Solutions had already purchased the domain name and I am forced to buy it from them. Not only did Network Solutions buy the domain name after I looked it up, they automatically put up a â€œdomain parking pageâ€ on the site, telling me that I must buy it from them.
Network Solutions may call this a service of theirs. Frankly, I would not call this a â€œserviceâ€ or even a bad business practiceâ€“I would call it extortion. There are thousands of registrars out there, and we all have the right to register a domain name at any registrar. Itâ€™s called â€œfair competitionâ€. If I check to see if a domain name is available at Network Solutions, I should not be required to purchase that domain name from them for $34.99. I should be able to go to another registrar and register it for $6.99 or even $14.99. A domain lookup is absolutely not an agreement to buy.
Â This might be pretty interesting as long as someone doesnt just steal the guys drive.
Q. What is this?
A. A challenge to confirm whether or not a professional data recovery firm or any individual(s) or organization(s) can recover data from a hard drive that has been overwritten with zeros once. I used the 32 year-old Unix dd command using /dev/zero as input to overwrite the drive. Three data recover companies were contacted. All three are listed on this page. Two companies declined to review the drive immediately upon hearing the phrase ‘dd’, the third declined to review the drive after I spoke to second level phone support. Here is their response… paraphrased from a phone conversation:
“According to our Unix team, there is less than a zero percent chance of data recovery after that dd command. The drive itself has been overwritten in a very fundamental manner. However, if for legal reasons you need to demonstrate that an effort is being made to recover some or all of the data, go ahead and send it in and we’ll certainly make an effort, but again, from what you’ve told us, our engineers are certain that we cannot recover data from the drive. We’ll email you a quote.”
The chart, compiled from data provided by the American and Iraqi governments and news media organizations, gives information on the type and location of each attack responsible for the 2,592 recorded deaths among American and other coalition troops, Iraqi security forces and members of the peshmerga militias controlled by the Kurdish government.
Warning: Large Graphic
Ever been on PC where Internet Explorer was blocked? One solution would be to use a portable version of Firefox on a USB drive, or you can access a hidden browser in Microsoft HTML Help program if removable media is not an option. This was tested on Windows XP SP2 with Internet Explorer 6.
Federal government claims it has the power to search citizens’ laptops upon re-entry into US. Ugh.
A couple of years ago, Michael T. Arnold landed at the Los Angeles International Airport after a 20-hour flight from the Philippines. He had his laptop with him, and a customs officer took a look at what was on his hard drive. Clicking on folders called â€œKodak picturesâ€ and â€œKodak memories,â€ the officer found child pornography.
The search was not unusual: the government contends that it is perfectly free to inspect every laptop that enters the country, whether or not there is anything suspicious about the computer or its owner. Rummaging through a computerâ€™s hard drive, the government says, is no different than looking through a suitcase.
One federal appeals court has agreed, and a second seems ready to follow suit.
There is one lonely voice on the other side. In 2006, Judge Dean D. Pregerson of Federal District Court in Los Angeles suppressed the evidence against Mr. Arnold.
â€œElectronic storage devices function as an extension of our own memory,â€ Judge Pregerson wrote, in explaining why the government should not be allowed to inspect them without cause. â€œThey are capable of storing our thoughts, ranging from the most whimsical to the most profound.â€
Top Gear TV presenter Jeremy Clarkson has lost money after publishing his bank details in his newspaper column.
The Top Gear host revealed his account numbers after rubbishing the furore over the loss of 25 million people’s personal details on two computer discs.
He wanted to prove the story was a fuss about nothing.
Itâ€™s all the latest rage â€“ vehicle cloning. And rage is just what youâ€™ll feel if you are the victim. Here is how it works. Thieves steal a car, usually a high-end â€œdesirableâ€ car or SUV. Then they take the vehicle identification number or VIN from a similar vehicle and slap it on the stolen car. Because each VIN is unique like a fingerprint, the stolen vehicle become a clone of a legitimate vehicle. Add some fake papers, and the thieves are ready to sell you a vehicle that looks perfectly legal.
When the police come knocking on your door, you have no legal recourse â€“ you have to hand over the stolen property. Statistics show that this horror story is happening to more and more people ever year. In 2007 there were over 1.3 million cars stolen cars in the US, with over 250,000 or 1 in 5 of these stolen vehicles sold to unsuspecting victims. In the UK, this is being called that fastest growing car crime. And Canadians are being hit just as hard.
But you can avoid being a car clone victim. Here are nine tips to protect you from ending up the proud owner of a stolen car.
Indiana University researchers say densely populated wireless routers could be the next method for spreading pharming, script injection, and bot infections
By Kelly Jackson Higgins Senior Editor, Dark Reading
Your crazy next-door neighbor could also be your biggest WiFi security risk: If his wireless router gets infected, it could spread malware to your router as well.
Researchers at Indiana University in Bloomington recently built an epidemiological model of the feasibility of malware rapidly spreading among WiFi routers in a densely populated area. They found in their simulations that tens of thousands of WiFi routers could be infected in two weeks — and most were infected within 24 to 48 hours.