What would a 'software guarantee' look like in practice?
I commented favourably on Managed Object's "software guarantee" here - but also commented that such a "guarantee" has to be worded carefully if it isn't to have unintended consequences.
Chemical weapons are not WMDs
CommentI remember the last time I handled a Weapon of Mass Destruction (WMD). It was in 2003, not long after the invasion of Iraq. I was serving as a bomb-disposal officer in the British armed forces. I was dressed in a full protective suit and gas mask, and a boffin from Porton Down stood next to me, likewise clad.
DRM-free music: EMI calls the tune and Apple takes the credit
CommentHaving been a big believer in DRM and its necessity, although dismissive of its inflexibility and lack of sophistication, we, Rethink Research, have to interpret the big news of last week that EMI will offer its catalog DRM-free, as at least dangerous and potentially disastrous. But that's only if it is looked at in the long term. In the short term it might even be beneficial to both EMI and Apple.
IBM and Higgins
Although IBM was one of the original backers when the Higgins identity project started up last year, the company is only now contributing its first code, something it’s been working on since early 2000.
AMD's Q1 revenue goes missing
AMD has walloped investors with its second revenue warning in as many months.
Vendors causing confusion on business intelligence
Reg Reader WorkshopThe term “business intelligence”, “BI” for short, is one of those phrases that pretty much everyone working in IT will have heard of, and the concept is fundamentally very simple. It’s simple enough, in fact, that even Wikipedia is able to sum it up reasonably effectively as “a business management term which refers to applications and technologies which are used to gather, provide access to, and analyse data and information about their company operations”.
StobBefore I start, please take a moment or two to identify your exits, in the unlikely event of the alarm sounding during this article. These are clearly marked with a blue underline like this (nb this is not an actual exit, but just a demonstration of what an exit would look like if this were an exit.
Laptop thefts expose 40,000 Chicago teachers
A thief walked into the headquarters of Chicage Public Schools (CPS) on Friday, April 6 and grabbed two laptops containing the names and social security numbers of 40,000 teachers.
Xyratex to vendors: dense RAID is 4U
OEM storage supplier Xyratex is adding a larger, much denser RAID system to its product line.