Feeds

A reading from the second book of Codh

Embarcadero takes on the Sons of Kahnanrado

3 Big data security analytics techniques

Stob

  1. And it had come to pass that the Sons of Kahn were, to make no bones about it, being flogged off.
  2. For the Borland Leadership Team had looked upon the works of the Sons of Kahn, and had posed a question unto them.
  3. And the question of the Borland Leadership Team was this: In what respect does your input enhance the four phase application lifecycle management delivery system threshold holistic architecture initiative deployment validation baseline best practice success driver?
  4. But the Sons of Kahn had answered not.
  5. Wherefore the Borland Leadership Team conferred one with another. And they spake out, saying: Let's dump the bit twiddlers.
  6. But in line with the predictions of this column, and despite the psalming of Senior Son of Kahn and occasional correspondent David 'David I' Intersimone, the rush of purchasers cameth not.

They languish in anguish

  1. So the Sons of Kahn languishèd in the Valley of the Scotts.
  2. And while they languishèd, it was observed that some changes fell upon them.
  3. For it was noticed that the Sons of Kahn were openly using Subversion (like nearly everybody else in the world except Linus) rather than dogfooding Borland's StarTeam.
  4. And this was considered significant. For it is wisely written in the Book of SourceSafe: if the owners of a VCS use not their software, thou hast to be as mad as a foaming, rabid dog to entrust it with thine own code.
  5. Then the Sons of Kahn started doing techy-friendly things to their products, like not changing the .dcu format every upgrade, and putting a bit of Unicode into Delphi, which is about bloody time, and even fixing up poor old C++ Builder so that it worked better with VCL.
  6. (For although a fixed up C++ Builder is not ideal, it surely compares favourably with MFC for making Win32 apps, yea even with the updated Scribble demo with 'fluent ribbon interface and enhanced discoverability'.)
  7. And a lot less was said about .NET, to the extent that a shiny new 'roadmap' omitted it, and concentrated on Win32. And it was wondered if .NET stuff was going to be 'kylixed'.
  8. For the verb 'to kylix' meaneth 'very slightly deemphasise with extreme prejudice'.
  9. Such were the changes in the behaviour of the Sons of Kahn, as they languishèd. And although they did release Blackfish SQL, the Little Database That Nobody Much Wanted, it was generally thought that they had finally put aside the eccentricities of the past and turned a corner.

Return of the Users of Delphi

  1. Then it happened that the Users of Delphi marched down into the Valley of the Scotts for one last time.
  2. And their number was diminished from days of yore (and indeed of mye), and they were not in top fettle.
  3. But nonetheless they sang a song as they came. And here is their song, which had a familiar Winehouse-ish lilt:
    They tried to make me go to VisBas
    I said no no no,
    I know it's .NET but they can't make me forget
    That it's slow slow slow,
    I won't brook delay, and if Nick Hodges says ok,
    I'll stick with Delphi 7 for the mo mo mo.

    Chorus: Pint of Tanqueray shandy with a cocaine top please barman.
  4. And the Users of Delphi cried out to the Sons of Kahn saying: What news? We see you are putting a bit of Unicode in. About bloody time.
  5. But the Sons of Kahn replied, saying: Very exciting news, actually. We finally have a buyer. Embarcadero.
  6. Then the Users of Delphi revealed their ignorance, saying: Encheladoramawhat?
  7. Wherefore the Sons of Kahn elaborated, saying: They are makers of high end database development tools for drawing entity relationship diagrams, and change management and the like.
  8. And the Users of Delphi spoke a word these days only regularly used by the Microsoft marketing department, saying: Cool.
  9. Then the Users of Delphi asked: How much didya go for?
  10. And the Sons of Kahn mumbled: Two thirds of a mess of pottage.
  11. (Readers will recall that a US mess of pottage is approximately 0.51 of a British mess of pottage, without commission.)
  12. Then the Users of Delphi exclaimed: How much? Is that all? You should have asked. We could have had a whip round.
  13. Then the Sons of Kahn said: No, you don't understand. The money is of no importance. It is much more than going from being owned by one maker of high end tools to another maker of high end tools. It is a symbiotic catalytic mutually beneficial arrangement that implies milk and honey and pottage all round. Let us explain.
  14. And whilst the Sons of Kahn wittered on in this vein, those Users of Delphi who were followers of the great prophet M'andee-rice Davies busied themselves brushing up their JavaScript.
  15. For it is written in the apocrypha of that prophet: It doth harm thou not that thou hast another string to thy bow, especially if that string be a modern cross-platform language, which garnereth a mighty hoard of search hits on all the job websites.

Personal note: all Linux users smell of poo.

I admit this is not in fact my experience; but the circulation manager suggested I stuck it in after the frenzy successfully generated last month when I implied Ubuntu may not be perfect. Actually my idea was to write 'Crystal Reports is a wonderful product', but I was inhibited in this plan by my own recollections of using Crystal and by a teeny shard of innate honesty to which I am a martyr. ®

3 Big data security analytics techniques

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Apple inaugurates free OS X beta program for world+dog
Prerelease software now open to anyone, not just developers – as long as you keep quiet
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.