Feeds

DARPA to pay hackers and hobbyists for help

Your tax dollars at rest

Remote control for virtualized desktops

Internet grandfather DARPA (US-based Defense Advanced Research Project Agency) is throwing open its doors and wallet in an attempt to solicit unconventional security solutions.

It is reaching out past the usual huge, multinational technology consulting firms and egghead think tanks and trying to engage with small start-ups – and even hackers – to get some new ideas into the mix. Looks like they’re willing to throw some cash at them, too.

So far, so good – and a reasonable strategy to pursue. What brought me up short was a brief mention of their asking ‘hobbyists’ for input … do they have any idea what they’re getting themselves into?

I can see it now: thousands of emails from Mac-tards saying that the whole internet could run on a handful of small clusters running Snow Leopard. They’d talk about how much faster the net would run, and how it would provide impenetrable security.

Spam would be a thing of the past, and the internet would boot much faster in the morning, too. Over time, the average height of users would increase, and they’d develop a propensity for red wine and designer cheese.

Of course, there will be folks pushing other ideas too… I think a meeting would end up much like this video, which has quickly become one of my favorites. The portrayals of Mac, PC, Linux, Google are chillingly true-to-life. Particularly “Unix Guy" ... ®

Intelligent flash storage arrays

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.