I wonder how many people, as I did, found themselves thrown into confusion by
the death last week of Jean Ichbiah (pictured), inventor of Ada.
Learning that the inventor of a computer programming language is already old
enough to have lived 66 years (Ichbiah was 66 when he succumbed to brain
cancer) is a little like learning that your 11-year-old daughter has grown up
and left home or that the first car you ever bought no longer is legal
because it runs on gasoline in an age where all automobiles must run on
water. How can something as novel, as new, as a computing language possibly
already be so old-fangled that an early practitioner like Ichbiah can
already no longer be with us?
The thought was so disquieting that it took me immediately back to the last
time I wrote about Ichbiah, and indeed about Ada Lovelace for whom his
language was named. It was in the context ... (more)
This is a checklist of items you need for an all-encompassing personal
branding strategy. Personal branding is the process of marketing and selling
yourself as a brand in order to gain success in business. Personal branding
is a continual process just as knowing yourself is a continual process. As
you grow, so does your brand. The need for personal branding arises from the
fact that globalization has increased competition in the workplace. As the
wheat is separated from the chaff, if you are left standing, you are left
standing with others of good caliber. The playing field is no... (more)
Why do a physical inventory? A physical inventory count is necessary to
reconcile the quantity on hand stored in a database versus what is really on
the shelf. In a retail environment, this process is typically done once a
year. In a perfect world, these values would always be in sync.
The value would be decremented when items are sold and incremented when items
are received. Unfortunately, this is not always the case. Consider shrinkage,
shoplifting, and, my personal favorite, software bugs.
Through a case study, this article will show how easy it is to architect a
wireless real... (more)
In most cases I'm a patient and tolerant person. Once you get to know me, I'm
easy to get along with, occasionally complex, but not very often. My patience
and tolerance has pretty much gone out the window in the last week or so. It
all stems from two technologies: Ruby On Rails (RoR) and AJAX.
Now let's be fair, no one really gave a garbage-collected object about AJAX
until those boffins at Google brought us the "suggest" and maps utilities
(this is what happens when you give programmers spare time; they come up with
good stuff). What followed were Web sites, APIs, tutorials, and... (more)
Organizations that gather and store critical information have to protect it.
While there are tried and true techniques for data protection, there are also
new and innovative ones. These new practices and tools greatly enhance an
organization's ability to protect mission-critical data. Linux and Open
Source users are specially challenged when trying to take advantage of much
of this new technology.
We asked technology analyst Tom Petrocelli about what is new and interesting
in data protection. Tom is president of Technology Alignment Partners
(www.techalignment.com) and author of... (more)
Guy Aharonovsky's Blog
It is said that by 2013, 31 percent of all mobile phones will be smart
phones, and by then, a smart phone might be almost like a full blown PC.
Meanwhile it seems like everyone is trying to push their feet into the
blooming mobile phone market. We’ve seen a lot of ups and downs in this
area, lots of promises that haven’t been fulfilled. In fact only since the
arrival of the iPhone has surfing the web become reasonable on a mobile
I refer to RIA, not just as rich applications that runs inside the mobile
Internet browser, but, also as reach applicatio... (more)