An Activist's Vision of Cloning. Randolfe Wicker has made quite a name for himself in his pursuit of making human cloning legal and accepted. His views are a lot more mainstream than they used to be, however. By Kristen Philipkoski. [Wired News] 3:35:34 PM ![]() |
HyperCard: What Could Have Been. Creating HyperCard was one of the greatest achievements of software genius Bill Atkinson's long career at Apple. So why does he think he missed the mark? By Leander Kahney. [Wired News] 3:35:13 PM ![]() |
HyperCard Forgotten, but Not Gone. Apple is famous for great software, but HyperCard, one of its best, is programma non grata within the company. Remarkably, the 20-year-old programming environment still has a strong following. By Leander Kahney. [Wired News] 3:35:00 PM ![]() |
G.M. Version of Fuel-Cell Car. General Motors released the first pictures of a prototype car called the Hy-wire, a fusion of technologies that re-imagines how cars look, operate and drive. By Danny Hakim. [New York Times: Business] 3:34:47 PM ![]() |
Security is on peoples' minds. Internet pioneer David Reed, responding to Richard Clarke's recent comments, implies that the government should take its share of the blame. Software pioneer Bob Frankston says that we should learn how to take reasonable risks, and how to protect ourselves after things go wrong as they inevitably will, and security sage Bruce Schneier, in a fascinating Atlantic article by Charles Mann, explains why our traditional approaches to security are flawed. Although David has some good points, I believe that there is enough blame to go around, and that we all need to be shaken into a state of greater awareness. The government surely set up roadblocks, but technologists continue to be focused on outdated approaches, and user complacency is rampant. I've been frustrated by years of of time spent DC fighting the Crypto wars, and years of observing real-world use of the security features in Lotus Notes. I continue to be frustrated watching supposedly expert technologists pitch VPNs and enterprise "boundary-oriented" security products, seemingly ignorant of the fact that boundaries between organizations are disappearing. I continue to be amazed that we fret about WiFi's lack of effective encryption, when we've known for years that end-to-end security at the application or middleware level is the only real answer: communications systems should just worry about communications. This is what led me to a radically different, "cellular" approach to security in Groove, which is being viewed by our government customers as more of a security tool than a collaboration tool. I've been writing up some thoughts; more to come... [Ray Ozzie's Weblog] |
Samsung starts on 1GB flash memory. New manufacturing process allows for cheaper and smaller chips [InfoWorld: Top News] 3:34:01 PM ![]() |
Verizon sees $2 billion in costs [IDG InfoWorld] 3:33:35 PM ![]() |
Amid drought, businesses adapt: "Businesses across this region are spending millions of dollars and carefully studying even the simplest tasks in an effort to adapt to a four-year drought." [From the Desktop of Dane Carlson] 3:32:25 PM ![]() |
SF Gate: Not a Moment Too Soon. In essence, ChoiceMail's software turns your e-mail box into the equivalent of your front door. If strangers want to enter, they have to knock and identify themselves first. Anyone who won't do that is automatically turned away without you being bothered. [Tomalak's Realm] 3:32:00 PM ![]() |