Are you still using IE? According to statcounter, Google Chrome has finally overtaken IE last week. It also shows a slow decline on Firefox usage. It would be interesting to follow this chart once Windows 8 comes out. Maybe in windows tablet they will force us to use Internet explorer? Maybe in this browser war… Continue reading Are you still using IE?
Quoted from Wikipedia: “Enterprise Content Management (ECM) is the strategies, methods and tools used to capture, manage, store, preserve, and deliver content and documents related to organizational processes. ECM covers the management of information within the entire scope of an enterprise whether that information is in the form of a paper document, an electronic file,… Continue reading What is ECM? Document workflow work in an ECM?
Today I got real excited seeing this WiFi blocking wall paper block in Gizmodo. I see these wall papers giving us capability of having scalable network in an enterprise environment. Most of the blogs I have come across is mainly about keeping home WiFi network single out of neighbor reach (security). This is a good… Continue reading Wifi blocking wallpapers from a different point of view, for enterprise users
A random number generator (RNG) is a computational or physical device designed to generate a sequence of numbers or symbols that lack any pattern. There are many methods of generating randomness, existed from ancient time like dice, coin flipping shuffling or playing cards. Among many use of random number, in computer cryptography is probably the most important one in modern technology… Continue reading Subatomic Noise in a Vacuum is truly random:
An organization needs to maintain a repository of information. This includes common knowledge or business specific information such as white papers, user manuals, policy document, knowledge tags, or answers to frequently asked questions. A general purpose document management system can fill the void, however a single purpose knowledge base system will be a far better fit. A… Continue reading Knowledge base Systems, a review on phpMyFAQ
What is a Zero day exploit? A zero-day (or zero-hour or day zero) attack or threat is a computer threat that tries to exploit application vulnerabilities that are unknown to others or the software developer A life cycle of the Zero-day exploit The developer creates software containing an unknown vulnerability The attacker finds the vulnerability before the developer does The attacker writes and distributes an exploit while the vulnerability is… Continue reading Economics of the Zero day exploit
First I read about this firefox addon called Collusion at Gzimodo. This addon enables us to watch, how we are getting tracked using our own browser. Internet privacy is a widely talked about issue, however we have a little tangible understanding on how it works or how it effects us individually or as a society.… Continue reading Who is tracking you online? The BIG Brothers? So many of them?