Jon Isbell

Why Yahoo!’s Stalker 2.0 service is a turn-off February 27, 2008

This one is for Jason Why Yahoo!’s Stalker 2.0 service is a turn-off

No Comments on Why Yahoo!’s Stalker 2.0 service is a turn-off
Categories: Uncategorized

IP Tax

Interesting article in the LA Times that asks the question if IP is property why isn’t it taxed? Copyright this via Slashdot: If IP Is Property, Where Is the Property Tax?

No Comments on IP Tax
Categories: Uncategorized

Social Networking Popularity Contest February 26, 2008

In Europe apparently we like Bebo, I’ve never used it! But its still a very interesting map. Réseaux sociaux :desaudiences différentes selon l continents. On the subject of maps here is another cool one! Who has the oil?

No Comments on Social Networking Popularity Contest
Categories: Uncategorized

Speedcabling February 25, 2008

Today is full of “geek leisure activities”, first we had music from Ben and now sport courtesy of Allan! Close to the wire – the joys of speedcabling

No Comments on Speedcabling
Categories: Uncategorized

Web 2.0 Rockstars

A guest appearance from Ben, this link is quite awesome! 😉 Here Comes Another Bubble v1.1 – The Richter Scales. But Web 2.0 is actually useful too! The Machine is Us/ing Us.

No Comments on Web 2.0 Rockstars
Categories: Uncategorized

Networking that really is wireless! February 22, 2008

This is crazier than Mikes Bongo networking stack and google might be doing it soon! Google floating wireless balloon idea? Space Data. At least its more feasible than Googles Toilet Broadband

No Comments on Networking that really is wireless!
Categories: Uncategorized

Cold boot attacks on Encryption Keys February 21, 2008

Ok, this is the kind of link you’ve all been waiting for! Its demonstrates the ability to retrieve keys for disc encryption from memory. The researchers crash the computer, dump the memory and then use a algorithm to scan for potential key. It works because the contents of DRAM remains available for a short period after power is cut and the time can be extended by cooling it. Lest We Remember: Cold Boot Attacks on Encryption Keys

No Comments on Cold boot attacks on Encryption Keys
Categories: Uncategorized

A Funky Recipe February 19, 2008

Watch it and see 😉 Kitchen diaries

No Comments on A Funky Recipe
Categories: Uncategorized

Sed February 15, 2008

As we all know I love sed! So its only fitting that my first link of the day involves it 😉 SED emulating UNIX commands

No Comments on Sed
Categories: Uncategorized

Welcome February 13, 2008

Due to popular demand I have started a blog. Its only an rss feed atm but stay tuned!

No Comments on Welcome
Categories: Uncategorized