Categories
Big Data Standards

NoSQL “movement” roadblocks HTML5 WebDB

Today’s rant is coming between me and a day of skiing so I’ll keep it brief. While trying to get to the bottom of why I can’t enjoy offline access to Google Apps & other web-based applications with Gears on Snow Leopard I came across a post noting Chrome, Opera to support html5 webdb, FF […]

Categories
Australia Cloud

Press Release: Cloud computing consultancy condemns controversial censorship conspiracy

SYDNEY, 24 December 2009: Sydney-based Australian Online Solutions today condemned the government’s plans to introduce draconian Internet censorship laws in Australia. Senator Stephen Conroy (Minister for Broadband, Communications and the Digital Economy) recently announced the introduction of mandatory Internet Service Provider (ISP) level filtering of Refused Classification (RC)-rated content as well as grants to encourage […]

Categories
Australia Internet Politics

A word on the Australian Internet censorship scandal

I’ve had a quick scan over Senator Stephen Conroy‘s infamous, long-awaited report on the efficacy of current Internet filtering technology and find it to be nothing short of scandalous. Without getting into the nitty gritty details (for example, how a filtering solution can achieve the impossible by improving rather than degrading the performance of encrypted, random transfers), it […]

Categories
Internet Security

HOWTO: Fix OS X by uninstalling Adobe Flash

Adobe Flash just ruined my day for the last time… I’ve just arrived in Paris and needed to do some work before a meeting this afternoon. As it’s noisy here I didn’t hear the MacBook’s fans running at full speed trying to compensate for a single rogue Flash ad in a tab in Google Chrome. […]

Categories
Big Data Internet Standards

An open letter to the NoSQL community

Following some discussion on Twitter today I posted this thread to the nosql-discussion group. You can see the outcome for yourself (essentially, and unsurprisingly I might add, “please feel free to take your software and call it whatever you want“). While I don’t want to mess with their momentum (it’s a good cause, if branded […]

Categories
Internet Security Standards

Twitter’s down for the count. What are we going to do about it?

What’s wrong with this picture? There’s not a single provider for telephony (AT&T, T-Mobile, etc.) There’s not a single provider for text messaging (AT&T, T-Mobile, etc.) There’s not a single provider for instant messaging (GTalk, MSN, AIM, etc.) There’s not a single provider for e-mail (GMail, Hotmail, Yahoo!, etc.) There’s not a single provider for […]

Categories
Internet Politics

How lobbyists are denying you a voice and destroying democracy

I came across an unsurprising but nonetheless disconcerting revelation today that is gives a very good example of what most of us knew all along: that “public comment” process are routinely subverted by commercial interests, generally at the public’s expense. It comes in the form of a smoking gun courtesy DSL Reports: Who Knew Senior […]

Categories
Cloud

Cloud or Not?

As it seems people still just don’t get what is, and what is not (coughSidekickcough) cloud computing, I’ve put together a (tongue-in-cheek) flowchart to help you decide:

Categories
Cloud

If it’s dangerous it’s NOT cloud computing

Having written something similar over the weekend myself (How Open Cloud could have saved Sidekick users’ skins) I was getting ready to complement this post, but fear-mongering title aside (Cloud Computing is Dangerous) I was dismayed to see this: “Let’s call it what it is, it’s a cloud app — your data when using a Sidekick is […]

Categories
Cloud Security

How Open Cloud could have saved Sidekick users’ skins

The cloud computing scandal of the week is looking like being the catastrophic loss of millions of Sidekick users’ data. This is an unfortunate and completely avoidable event that Microsoft’s Danger subsidiary and T-Mobile (along with the rest of the cloud computing community) will surely very soon come to regret. There’s plenty of theories as […]