Berkeley CSUA MOTD:Entry 18141
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/11/23 [General] UID:1000 Activity:popular
11/23   

2000/4/28-29 [Computer/SW/OS/Windows] UID:18141 Activity:nil
4/28    Microsoft gets smacked:
        http://www.zdnet.com/pcweek/stories/news/0,4153,2557484,00.html
        AFAIK, this is just a recommendation.  What is the likelihood that
        it will be carried out? -dans
2024/11/23 [General] UID:1000 Activity:popular
11/23   

You may also be interested in these entries...
2011/12/23-2012/2/6 [Computer/Rants] UID:54271 Activity:nil
12/23   http://venturebeat.com/2011/12/22/uc-berkeley-google-apps
        Oh noes! What Would Bill Gates Do?
        \_ http://lauren.vortex.com/archive/000701.html
           Microsoft to Transition Corporate IT to Google Apps
	...
2011/11/27-2012/1/10 [Computer/HW/Drives] UID:54244 Activity:nil
11/27   CalMail has been down for a few days (hardware failure and database
        corruption -- sounds like fun!) and is starting to come back online.
        Looks like they're planning to outsource all campus mail to either
        Google Apps or Microsoft 365 as part of Operational Excellence.
        <DEAD>kb.berkeley.edu/jivekb/entry!default.jspa?externalID=2915<DEAD>
        \_ http://ist.berkeley.edu/ciocalmailupdates/november-30-2011
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2010/4/28-5/10 [Computer/SW/OS/Windows] UID:53807 Activity:nil
4/28    Win 3.1 was more widely adopted than Win 3.0.  Win XP (5.1) was more
        widely adopted than Win 2k (5.0).  Now it looks like Win 7 (6.1) is
        going to be more widely adopted than Vista (6.0).  Is this a trend on
        Microsoft x.0 versions being bad?
        \_ duh.
        \_ "more widely adopted" ... well... what are you basing these numbers
	...
2009/12/2-9 [Computer/SW/WWW/Browsers] UID:53556 Activity:nil
12/2    IE usage down but still kicking the majority ass. Chrome is also
        rising up high, almost at the Safari level. Firefox isn't
        doing badly either. Sorry Opera, you had your chance.
        http://arstechnica.com/microsoft/news/2009/12/november-2009-browser-stats-ie8-passes-ie7.ars
        \_ As long  as Opera is the only browser you can use on your Wii,
           I see a fine long life ahead of it.
	...
Cache (2417 bytes)
www.zdnet.com/pcweek/stories/news/0,4153,2557484,00.html -> techupdate.zdnet.com
The top IT priorities in May 2004 are 22 Wired & Wireless, 23 Hardware Upgrades, 24 Software Infrastructure, 25 Security, and 26 Web Technology. Digital information and services will be delivered by trillions of RFID sensors to almost everything we touch-kiosks, airplane seats, newspapers and a broad array of new devices. The privacy issue will prove to be the most daunting challenge in bringing about the fully connected world. Users focusing on lean maintenance management should realize significant savings against an often-ignored budget line item. Following dozens of interviews, The Yankee Group assembled a set of best practices for systems licensing and negotiations. This is particularly true for PCs and other end-user devices. Organizations should strive to keep the number of active vendors low. However, the current reality remains decidedly less tantalizing. RFID tags and networked readers will ultimately replace bar codes and (human) handheld readers. A few key technology trends will impact user decisions during 2004/05. Start-up Fortify Software is pioneering an automated inside-out, root-cause approach that could improve the security of software by systematically weeding out vulnerabilities as an integral part of the software development process. Gartner analyst Richard Hunter says the only defense is for individuals to gain control of their digital information. For companies, the potential for more profits and long-term customers should be enough of an incentive to build competency around the concepts of privacy and trust. The extended enterprise forces organizations to allow onto the corporate network computers (including home PCs, those belonging to business partners and remote employee laptops) with uncontrolled configurations. In fact, Google may become as relevant within enterprises in the future as Microsoft or Cisco are today. In the same announcement, Kumar was appointed to the newly created position of chief software architect. Along with analytics, UAN is critical to Siebel's strategy of expanding and deepening its application and technology footprint within enterprise accounts. To address the authentication issues, Microsoft and Yahoo are advocating their proprietary technologies, while a third, caller-ID-like spec known as Sender Policy Framework is proving why open may be the way to go. Enter SMTPi, a unique and promising if misleadingly named solution.