No, this is not a joke folks. Steve “Mac Daddy” Wozniak will be featured on the next season of Dancing With The Stars. We have no idea if Steve actually knows how to dance, but I predict this will spread through the Web like wildfire, bringing endless hours of mirth to hackers worldwide.
What can I say, this one was so darn cute I had to post it. I really think Microsoft has a winner on their hands here. I’m not saying that it makes Windows the better platform, but from a marketing point of view, I think this is way better than anything Apple has ever come up with. Hmmmm, I have to admit, I’m probably just a little biased here… anything related to cute kids usually do that to parents.
Pablos Holman is a futurist, IT security expert, and notorious hacker with a unique view into both breaking and building new technologies. In the following presentation, he explains what drives computer hackers to do what they do best: break into gadgets, networks, and systems.
As promised when we pointed out the romantic properties of flash drives, here are some ideas for Valentine’s Day gifts for or from the geeky guy or gal. If you think that flowers and candy are too boring for your significant other, maybe you’ll find something here to inspire you. (And hey, if you’re single like me, then this might not be a bad time to treat yourself to something fun!)
Yesterday at TED2009, Bill Gates made a passionate and funny case for solving the world’s problems by asking us to consider two big questions and how we might answer them. He even goes to the point of unleashing a swarm of mosquitoes upon his audience to make his point.
Way back in the dark ages when I first started programming in BASIC, the first stumblingblock I encountered on my quest for programmerhood was the statement:
X = X + 1
My High School algebra training screamed out, “That’s an unsolvable equation!” I soon learned that the above is not an equation at all, but rather a command. It’s not a statement of fact, it’s an instruction to alter a fact. This command begins with an implied “LET” (in some BASIC versions, “LET” is even required) and the correct interpretation of the command relies not only on the previous value of X, but also on the fact that the right side is evaluated before the assignment occurs.
Science fiction meets chick lit? Not exactly, but your sweetheart might get a real kick out of Starstruck, one of the romance novels you can personalize from Book By You. I’ve never bought any of their products, but I’ve had fun a time or two slipping my name into the free preview they offer. Their newest bodice ripper could be a hoot for Valentines Day, since it blends geekiness with cheesy romance.
In Starstruck, James Kirk is a starship commander with a reputation as a daredevil who embarks on his toughest mission yet: escorting Miss Cellania, a famously demanding diplomat, to negotiate a high-stakes treaty between warring alien nations. But our couple’s clashing personalities and instant chemistry spark a battle of their own!
While reading the paper version of ComputerWorld this morning, I stumbled an article reporting that more than half of Gen Y employees regularly bypass corporate IT usage policies at their workplace, and a quarter of them face no repercussions for doing so. These results came out of a study performed by Toronto-based research firm Harris/Decima, which surveyed more than 1000 workers with ages between 18 and 29 about their attitude towards technology.
Now, I’m a sysadmin, and I don’t know about you, but I think the percentage of 18-30 year old IT workers violating IT policies is probably much higher than that. Ballpark figure? Probably around 100%.
Social media sites have became part of everyday life for most people under 30, yet most of the time these sites are classified as “forbidden” by corporations. It’s easy to understand why the reported percentage is so high. While CIO might see the situation in a different eye, for most IT employees, using Facebook or twitter is just like placing a phone call to a friend; they see nothing wrong with it.
What do you think? Is Gen Y too lax, or IT policies too strict?