Nice summary here:
- Upfront planning requires upfront knowledge
- Business does not need perfection, it wants action
>>>ITwacht<<<
Nice summary here:
Installing a new laptop today. Here's the software I put on it:
Amazon advertizes itself as a book shop. That's correct for hard copies.
For e-books it's different: you can only borrow them.
Amazon is an e-book library.
And they can take back your books as they see fit.
Without warning, without explanation, without an independent judge.
Here's the story about a customer who had her kindle e-reader books removed,
because Amazon linked her account to another account that was closed for abuse of policy.
The customer asked:
... except JBoss, WebLogic and WebSphere.
My colleague, Romain, found this beauty in the features supported by Magnolia CMS Community Edition:
Feature | Description | CE | EE Std | EE Pro |
---|---|---|---|---|
100% Java/J2EE compliance | Magnolia is developed in Java and runs on any J2EE compliant application server. | ✔ | ✔ | ✔ |
Compatibility with Tomcat | All editions of Magnolia are compatible with Tomcat application server. | ✔ | ✔ | ✔ |
Compatibility with JBoss | Standard and Pro versions of Enterprise Edition are compatible with JBoss application server. | ✔ | ✔ | |
Compatibility with Websphere, Weblogic | Only the Pro version of Magnolia Enterprise Edition can be deployed on Websphere or Weblogic application server. | ✔ |
NIST has selected Keccak as the new SHA-3 cryptographic hash standard.
Keccak was designed by Guido Bertoni (Italy),Joan Daemen (Belgium), Michaƫl Peeters (Belgium) and Gilles Van Assche (Belgium).
Joan Daemen previously co-designed Rijndael, which was selected as the AES symmetrical cipher standard in 2001.
The Object | Relational Gap |
transient | persistent |
classes | tables |
| |
attributes | columns |
objects | rows |
|
|
relations | relations |
|
|
behaviour centric | data centric |
|
|
|
|
| |
|
This is the most aggressive scam i received until now.
Similar to this report.
________________________________________
From: Hakeem Mohammad [Hakeem@killer.pk]
Sent: monday 1 october 2012 16:55
To: Recipients
Subject: Reply Me Immediately
To your attention
I want you to read this message very carefully and that you keep the secret until further notice. You do not need to know or who I am or where I come from. I was paid an advance of $50,000 to eliminate you. My sponsors one of which is what we can call a friend gave me the reasons I noted. I am more than ten days and now I know that you are innocent of what you are accused. Do not try to warn or send this message to the FBI or the police because I know that I'll have to do the job for which I was paid. Note that this is the first time that I betrayed my employer.
Look, I'll do everything I can so that we can meet before but I need $20,000. You have nothing to afraid of me, I can come see you in your office or home, it is up to you to decide. Never attempt recording or filming our upcoming meeting. It will pay $20,000 to the account I will tell you, this before our first meeting. Once payment is made, I will give you the file that contains the names and queries sponsors. This is a good evidence that can be used to sue if you wish. The balance of the payment will be settled later. For the moment this is not the trouble I give you my phone number because you will cooperate. I have your picture and other important information about you. I was involved with my team in the Yemen
Arab Republic. You must not ask me any questions.
Quickly confirm for your good.