A Collection of Thoughts & Discoveries


Technology, Business, Giving, Etc.

  • “There is nothing noble in being superior to your fellow man; true nobility is being superior to your former self.” Ernest Hemmingway
  • “Judge each day not by the harvest you reap, but by the seeds you plant.” Robert Louis Stevenson
  • “We must be the change we wish to see in the world.” Gandhi
  • “Noble deeds that are concealed are most esteemed.” Blaise Pascal
  • “A creative man is motivated by the desire to achieve, not by the desire to beat others.” Ayn Rand
  • “If you want to succeed you should strike out on new paths, rather than travel the worn paths of accepted success.” John D. Rockefeller
  • “Honesty is the first chapter in the book of wisdom.” Thomas Jefferson
  • “Sense shines with a double luster when it is set in humility. An able yet humble man is a jewel worth a kingdom.” William Penn
  • “There is a great satisfaction in building good tools for other people to use.” Freeman Dyson
  • “You don't know what you can learn until you try to learn.” Ronald Coase
  • “Let us so live that when we come to die even the undertaker will be sorry.” Mark Twain
  • “Create more value than you capture.” Tim O'Reilly

Flaw Found in Online Encryption Method

I found this article interesting, but have been swamped and didn’t get around to writing a post about it. It’s been sitting in my to-do pile, so I’ll just punt and link to it here.

A team of European and American mathematicians and cryptographers have discovered an unexpected weakness in the encryption system widely used worldwide for online shopping, banking, e-mail and other Internet services intended to remain private and secure.

Security is so important in web application design, but cryptography quirks and nuances can affect even well conceived designs. Yet another reason to maintain “best practice” coding and use “belt and suspenders” security design whenever possible. The researchers’ technical paper is available here (as a pdf). end of article icon

Posted on Sunday, March 11, 2012 in Technology • (0) Comments

Comments

Name (required):

Email (required, hidden from view):

URL (optional):

Your Comment:

Remember my personal information

Notify me of follow-up comments?

Enter this text:

Here: