Lab Security

HOWTO: Set up OpenVPN in a VPS

If, like me, you want to do any or all of the following things, you’ll want to tunnel your traffic over a VPN to a remote location: Access media services restricted by geography (Hulu, FOX, BBX, etc.) Bypass draconian censorship Conceal your identity/location/etc. Protect your machine from attackers etc. You could of course use a […]

Big Data Standards

NoSQL “movement” roadblocks HTML5 WebDB

Today’s rant is coming between me and a day of skiing so I’ll keep it brief. While trying to get to the bottom of why I can’t enjoy offline access to Google Apps & other web-based applications with Gears on Snow Leopard I came across a post noting Chrome, Opera to support html5 webdb, FF […]

Australia Cloud

Press Release: Cloud computing consultancy condemns controversial censorship conspiracy

SYDNEY, 24 December 2009: Sydney-based Australian Online Solutions today condemned the government’s plans to introduce draconian Internet censorship laws in Australia. Senator Stephen Conroy (Minister for Broadband, Communications and the Digital Economy) recently announced the introduction of mandatory Internet Service Provider (ISP) level filtering of Refused Classification (RC)-rated content as well as grants to encourage […]

Australia Internet Politics

A word on the Australian Internet censorship scandal

I’ve had a quick scan over Senator Stephen Conroy‘s infamous, long-awaited report on the efficacy of current Internet filtering technology and find it to be nothing short of scandalous. Without getting into the nitty gritty details (for example, how a filtering solution can achieve the impossible by improving rather than degrading the performance of encrypted, random transfers), it […]

Internet Security

HOWTO: Fix OS X by uninstalling Adobe Flash

Adobe Flash just ruined my day for the last time… I’ve just arrived in Paris and needed to do some work before a meeting this afternoon. As it’s noisy here I didn’t hear the MacBook’s fans running at full speed trying to compensate for a single rogue Flash ad in a tab in Google Chrome. […]

Big Data Internet Standards

An open letter to the NoSQL community

Following some discussion on Twitter today I posted this thread to the nosql-discussion group. You can see the outcome for yourself (essentially, and unsurprisingly I might add, “please feel free to take your software and call it whatever you want“). While I don’t want to mess with their momentum (it’s a good cause, if branded […]

Internet Security Standards

Twitter’s down for the count. What are we going to do about it?

What’s wrong with this picture? There’s not a single provider for telephony (AT&T, T-Mobile, etc.) There’s not a single provider for text messaging (AT&T, T-Mobile, etc.) There’s not a single provider for instant messaging (GTalk, MSN, AIM, etc.) There’s not a single provider for e-mail (GMail, Hotmail, Yahoo!, etc.) There’s not a single provider for […]

Internet Politics

How lobbyists are denying you a voice and destroying democracy

I came across an unsurprising but nonetheless disconcerting revelation today that is gives a very good example of what most of us knew all along: that “public comment” process are routinely subverted by commercial interests, generally at the public’s expense. It comes in the form of a smoking gun courtesy DSL Reports: Who Knew Senior […]


Cloud or Not?

As it seems people still just don’t get what is, and what is not (coughSidekickcough) cloud computing, I’ve put together a (tongue-in-cheek) flowchart to help you decide:


If it’s dangerous it’s NOT cloud computing

Having written something similar over the weekend myself (How Open Cloud could have saved Sidekick users’ skins) I was getting ready to complement this post, but fear-mongering title aside (Cloud Computing is Dangerous) I was dismayed to see this: “Let’s call it what it is, it’s a cloud app — your data when using a Sidekick is […]