On July 31st, 2012 the Java debacle struck me, so this is old news to some. The Java Runtime environment was assembled to run similarly to visual basic only in its portable simplicity; write once and package the appropriate runtime engine for the associated operating system. -> Pretty simple and effective method to gain programmer momentum. The programmer is still bound to an English written/language and as such, is difficult to master more than one. Once seasoned, a single-threaded programmer could write complex code that just worked and cleaned up after itself. After several revisions of Java, they have apparently the “worst” or #1 infection vector on PC’s and Macs. So the situation deteriorates with “Sandbox breaches” where Java jumps into the operating system of the hosting virtual machine and contaminates all of the other critical sessions on the host hardware. This situation is very bad. As a purveyor of virtual machines very early on in my career, I continue to encounter more uses for virtual machines (which were the first real implementation of “Cloud” computing). Multiple hosted locations are now standard features of hosted business websites, mirror/load balance/virtualization all providing a seamless, consistent user experience across the globe. If your website isn’t ready for multiple locations, that may be good if you are a hosted user as the providers are beefing up their offering for a competitive shopping market.
Archive for the ‘Technology’ Category
I just found Lastpass.com -> has a plugin for IE and Chrome Firefox to capture your password and securely transmit them for safe keeping at their site. I need this on my machines as I frequently uswe several machines and concentrate on one or two for days at a time. I will keep you posted as to my progress if bad, otherwise, I’ll be there.
HINT: strongest passwords are ones with combinations of numbers and letters and special charactersl. I like to think of mine as a combination lock with text. I don’t receive anything from anyone that I sponsor or recommend, so if its free, you didn’t pay anything for it.
To get started, please see the steps we’ve laid out below.
Step #1 - Review topics at www.sbtdc.org/technology/newsletter/12-05/dod-solicitation-topics-042812.pdf. This will give you a good idea of what DoD’s current interests are.
Step #2 – Refine your search at www.dodsbir.net/Topics/CusTopicsSearch.asp. Be sure to conduct a search on EACH of the key words separately, or use the search tips at www.dodsbir.net/Topics/TopicsSearchScoop.htm if inputting multiple words.
Step #3 – Communication: Once a solicitation is identified, you are strongly encouraged to call and discuss your proposed project with the Topic Author. You have until May 23rd to communicate directly with him/her. After May 23rd, for reasons of competitive fairness, direct communication between proposers and topic authors is not allowed when DoD begins accepting proposals for each solicitation.
However, proposers may still submit written questions about solicitation topics through the SBIR/STTR Interactive Topic Information System (SITIS), in which the questioner and respondent remain anonymous and all questions and answers are posted electronically for general viewing until the solicitation closes. All proposers are advised to monitor SITIS during the solicitation period for questions and answers, and other significant information, relevant to the SBIR/STTR topic under which they are proposing.
Step #4 – Presentation: Review the presentation at www.sbtdc.org/technology/newsletter/12-05/dod-overview.ppt presented by Nicole Fox of the Army Research Office. It provides a clear overview of the DoD SBIR program.
Since I have been playing with RC2 on my Acer W500 I Love it. It will byte with a non-touch interface. Might have to come up with at portable tablet screen….
Microsoft last week for the first time revealed specifics about Windows 8 versions and features, confirming that the operating system will come in three, traditional desktop editions and a version built specifically for tablets that run chips based on ARM’s reference design.
Windows 8, Windows 8 Pro, and Windows 8 Enterprise will run on traditional desktops and laptops, as well as ultrabooks. Windows 8 RT will run on tablets that use ARM-based chips manufactured by Qualcomm, Motorola, and Nvidia. Windows 8 RT will only be available as a preinstalled OS on tablets and other mobile devices. Those tablets will also come with a touch-optimized version of Office 15 preinstalled.
The Windows 8 lineup represents a streamlining of sorts by Microsoft. By comparison, Windows 7 was available in six editions, including Starter, Home Basic, Home Premium, Professional, Ultimate, and Enterprise. Microsoft did not release pricing details of the various Windows 8 versions.
Windows 8 marks Microsoft’s most significant redesign of its franchise OS since Windows 95. The new OS gives users the option of ditching the familiar Windows Explorer interface in favor of the touch-based Metro UI, which first appeared on Windows Phone.
…stop subscribing to deal sites and guys stay away from slickdeals.net and newegg
A new study by ExactTarget found more than two-thirds of Americans shopping online are baited with email first nearly twice the rate brought in from Facebook and text messages.
It makes sense why we’re partial to the email route. It’s easy enough to mark messages as spam and ignore ones we don’t feel like reading straightaway.
But for a shopaholic, email is basically the gateway drug to overspending.
When the time comes that I actually need to shop, I’ll prowl CouponSherpa.com or Retailmenot.com for discount codes first and check to see if Ebates has a cashback offer available. I rarely turn up empty-handed.
The Department of Homeland Security has enlisted a San Francisco company to help crack open the encrypted data in consoles, which it claims may hold key evidence in cases ranging from the exploitation of children to terrorism. Link
According to forensic experts, pedophiles are increasingly using gaming systems to exploit children, while terrorists are using it for communication. With this evidence, a contract was awarded on April 5 by the Naval Supply Systems Command to Obscure Technologies for the research and development of hardware and software tools that can be used for extracting data from video game systems.
Obscure Technologies, a small San Francisco-based company that performs computer forensics and which has just been awarded a $177,237 sole-source research contract to develop “hardware and software tools that can be used for extracting data from video game systems,” and “a collection of data (disk images; flash memory dumps; configuration settings) extracted from new video game systems and used game systems purchased on the secondary market,” according to the contract award from the U.S. Navy.
N00244 NAVSUP Fleet Logistics Center San Diego Seal Beach Office 800 Seal Beach Blvd. Bldg 239 Seal Beach, CA
These high power Galium Nitride edge devices are bright!
As much as I don’t like Cree (I have hired many ex-Cree engineers who were very unhappy, but some of the most talented engineers in the semiconductor business) they have a profitable (lucrative) manufacturing process and are SECURELYpatented.
1,598 family groups, 2,267 patent records in the above link
The Japanese are not far behind, but they are behind.
For the record, I have tried many LED indoor bulbs of different temperature (color) and prefer the Honeywell dimmable bulbs.
Self: Positive affirmation – I am smart!
world: the economy is weak, jobs are hard to come by
You: Can get as free as free money gets by investing your time by writing precise answers to topics that the (DOD) Department of Defense is interested in.
Four times a year a list of topics is solicited by the government for written phase one proposals. These proposals range from 20 to 40 pages and are not simple to write (usually requiring advanced engineering degrees) as few acceptable solutions exist. This is an entrepreneur’s dream! Written reports and follow-up progress reports can yield up to 60+% for the business owner/inventor. Awards can be up to $100K and matched at 30% from the state of North Carolina. Phase 2 awards, if invited are up to 1.5 million dollars over 3 years. I am currently waiting on an invitation for a Phase II. I know it is hard, but it can be done. We submitted underwater GPS algorithms for divers using portable communicating lasers!
Here are my bookmarks: