Thursday, 28 June 2007

Identity and Access Management (often referred to by identity geeks as IAM) is a field I have come to know and love. There's been a resurgence in the past few years in this space, brought on by a number of builders of critical mass. One of those drivers, in the financial services industry, was some "guidance" issued by the FFIEC (United States federal government agency that regulates banks) in 2005 that requires banks to use stronger authentication for online banking services (better than just user name and password). In addition, the general discomfort across all industries that use the Internet as a true platform for doing business has become a motivator, especially in the wake of multiple news cycles about fraud and data theft. In a nutshell, The Internet is a technology platform that is being used for something it was not originally architected to do, and as a result there are some critical gaps from a technology perspective - especially in the area of security. Many defensive "point" solutions have been cobbled together over the years to plug holes in the metaphorical levee, but at some point you have to start thinking about either building some serious reinforcements or - quite possibly - building a whole new dam to serve the needs.

Over the past couple years the open source community, Microsoft, and a number of other companies large and small have embarked on a bit of a shared crusade (and a good one, at that) to first redefine and then re-architect identity on the Internet, how it works and what the principles are that guide and drive Identity going forward. It's been a rare and refreshing community effort, and as a result we are starting to see some real-world traction in markets like financial services; Interest is growing outside the circle of academics and programmers that are implementing the new systems. Interoperability is being seen as critical and that's likely the one things that will drive success. And while we can design a great system that can solve all the world's ills, adoption is the second-to-final gauge of success in this case (longevity and strength are the final-final determining factor, but we can't truly get there without meaningful and across-the-industry adoption).

One of the architects of this whole concept in redefining and improving Identity on the Internet is Kim Cameron. He writes the Identity Blog (worth a subscription if you're not already there) and was the publishing author of his "Laws of Identity," or what he refers to as "the missing layer of the Internet." I had the good fortune to play host to Kim and his compadre, Rich Turner (both work for Microsoft) when they spoke at a security conference I hosted a couple months ago. They discussed identity in general as well as CardSpace, Microsoft's effort in the larger community effort to add this missing layer to the Internet schema.

Richard Turner is the Product Manager for Microsoft's Identity Platform Developer Marketing group and owns Windows CardSpace Product Management there. While at the Microsoft TechEd conference in Orlando a few weeks back, I found him and pulled him aside for about 45 minutes to chat with Richard Campbell and me for the RunAs radio show we do each week. You can hear the interview here:

RunAs Radio Show #12 | 6/27/2007 (47 minutes)
Richard Turner Checks Our Identity

Another Tech Ed US 2007 interview from Orlando, Richard and Greg sit down with Richard Turner and discuss how CardSpace impacts the IT professional. CardSpace (formerly code-named "InfoCard") is a key technology in Microsoft's Identity Platform.

Links: RunAs Radio web site and RSS feed

As always, we welcome your input and ideas for the show - Just email info@runasradio.com and let us know what's on your mind! We might even read your email on the air, and we are always interested to know what you would like to hear more about as we book our guests.



Add/Read: Comments [0]
IT Security | RunAs Radio | Tech
Thursday, 28 June 2007 07:47:08 (Pacific Standard Time, UTC-08:00)
#  Trackback

I recently ran up against a self-induced application disaster on my Blackberry 8800 (that's what I get for messing with stuff I know will probably break), so I needed to do a clean reset of the device to it's factory defaults and then start over again from scratch. I'm not too keen on the idea of reloading the OS if I don't have to (with over the air configuration I have not used a USB cord on my blackberry except for once since I got it), so I started poking around trying to find the on-board reset capability (they call it "wipe" the handheld device). Nothing like trying to find a command deep in the bowels of a multi-layered system. But, this is one that people should not find it easy to accidentally choose...

So, since I finally found it, note to self for the next time I need it:

Blackberry "Wipe-Handheld" command list (at least for my 8800 - same or similar for other models)

  • Options menu 
  • Security Options
  • General Settings
  • Menu
  • Wipe handheld
  • Enter password ("Blackberry" or your business-assigned security password)

Useful if you're like me an have a tendency to muck around under the hood too much and gak things up. And yeah, that's a word. Gak.



Add/Read: Comments [89]
Mobile | Tech
Thursday, 28 June 2007 06:43:08 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Wednesday, 27 June 2007

dasBlogv1.9.7releasefinal.NE.1version_8FF9/image.png" target="_blank">dasBlogv1.9.7releasefinal.NE.1version_8FF9/image_thumb.png" width="240" align="right" border="0"> Scott posts about the latest dasBlog release, v1.9.7, which you can download and use now. He also discusses the pending (within a week) release of dasBlog v2.0, which will be compiled using the 2.0 .NET framework, and even additional versions planned under framework v3.5. Lots happening in dasBlog land. 

Among the new, improved and changed stuff in v1.9.7 (the below list is quoted from Scott's blog):

  • Fixed a metric buttload of bugs (ed: Scott's word, not mine, heh)
  • Taken in more patches from the public than any other release (Thanks public!)
  • Category and Home Page Paging Macros
  • LiveComment Preview (thanks SubText!)
  • Emailed Daily Activity Reports
  • Windows Live Writer Custom Integration
  • Support for Akismet Comment Spam Support
    • Go get a WordPress account, without a blog, and use the API key they'll send you.
  • Optionally show comments on the Permalink Page
  • Even more performance gains (4x+) in the Macro engine
  • New Internationalized Languages, including Swedish (Thanks Per Salmi!)
    • This brings our total supported language count up to 15! Although we can ALWAYS use more, and we really need double-checkers and updaters to put in localized strings for some of the new features!
  • Support for Blogging directly from Word 2007
  • Many fixes in our Blogger API and MetaWebLog API support
  • Better detection of referrals from Search Engines
  • CSS fixes and additions like highlighting of the Blog Author's comments
    • Make the comment email address match the email address in sitesecurity.config for this feature.
  • DHTML Timeline of Posts from the MIT Simile project
  • Support for SMTP Servers like Gmail for notifications
  • New themes
  • Support for THREE Rich Editors - FreeTextBox, FCKEditor and TinyMCE (in DasBlog Contrib, see the source)


Add/Read: Comments [0]
Blogging | Tech
Wednesday, 27 June 2007 09:25:43 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Monday, 25 June 2007

Ah, fireworks. It's that time of year again. Some of you probably know that I'm a licensed pyrotechnician here in Oregon, where I live. That's what lets me run and operate public fireworks displays - the big ones, you know? Like here and here and here. Not the stuff you buy at the local stand or up on the reservation (common way around purchasing issues in these here parts), but rather the kind of explosives that make for huge (and expensive) shows. It's something I've been involved with for several years now, and a number of my friends like to help out on the Independence Day shows I do each year as well as the occasional other occasion. It's a lot of fun.

Well this year the fireworks display company I work for needs me to do a somewhat larger show in Walla Walla, Washington (yep it's a real town, not just a Bugs Bunny reference). So, in order to be able to run a show in Washington, I took my exam recently to be licensed in that state. Today (just in time, I might add), I got my license in the snail mail. I guess I passed the test. :)

Operating these shows is a big responsibility, and there's a lot of critical safety items to watch out for every time, but it's also a lot of fun and I do enjoy it when I get the chance to blow up someone else's stuff and not get in trouble in the process. I mean, where else can you destroy what someone else buys for thousands of dollars and have everyone cheering when you're finished? Heh.

For anyone in the Portland area that might be interested in spending your July 4th this year helping with a show, let me know and I will put you in touch with my friend Norm at Western Display and he'll probably be able (and glad) to set you up to assist with a show somewhere. Or, if you want to join me in Walla Walla for a couple days and don't mind making the hike over there, let me know as well and we'll see what we can work out. Or if you're in Walla Walla, even better. I'll be making a three-day deal out of it, including travel and setup and stuff. My cell phone is 503-970-1753. Call or text me. And you can find out a little more about what's involved in being a crew member at this link from a show last year as well as the links above.

Ker-freakin-boom. Heh.



Add/Read: Comments [0]
Personal Stories | Random Stuff
Monday, 25 June 2007 20:39:42 (Pacific Standard Time, UTC-08:00)
#  Trackback

In my line of work, we spend a lot of our time writing software that catches bad guys and keeps them out of systems that require protection. So, in the course of building good security and forensics software I often work closely with partner companies that bring something valuable to the table - technology that we might include or integrate with but would not build ourselves. One of the technology areas that adds value to what we do is the business of Internet Protocol (IP) address intelligence and geolocation. The ability to glean a variety of valuable information about any given IP address or block provides the opportunity for both intelligent and - if the partner does their job well - reliable decision making, in a manner not otherwise possible. Imagine your application being able to present information or make decisions based on the actual physical location of a user, or base don the type of connection they are making. In the case of the software I've been involved with creating, IP intelligence is a key capability that helps to enhance the products.

So, for last week's RunAs Radio interview, we sat down with an expert in the field, Bill Varga, who works for a company out of Mountain View, California called Quova - one of the partners I have worked with for a few years now. They do IP geolocation and IP intelligence - and that's their business. They're focused on that market and they're very good at it. IP intelligence is a world that is growing quickly and always generates ideas and thought when brought up for discussion. The applications of IP-related metadata are many, and Bill effectively describes them in our interview. He also discusses some of the new things Quova is doing in the field.

RunAs Radio Show #11 | 6/20/2007 (38 minutes)
Bill Varga Makes Us IP Intelligent

Richard and Greg talk to Bill Varga about what IP (that's Internet Protocol) Intelligence is all about. They also dig into how IP geolocation helps with regulatory compliance and fraud detection. Bill also talks about the new technology Quova (his employer) has developed that can deal with geolocation of satellite and megaproxy IP addresses.

Links: RunAs Radio web site and RSS feed

We welcome your input and ideas for the show - Just email info@runasradio.com and let us know what's on your mind! We might even read your email on the air, and we are always interested to know what you would like to hear about as we book our guests.



Add/Read: Comments [0]
IT Security | RunAs Radio | Tech
Monday, 25 June 2007 07:37:43 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Saturday, 23 June 2007

apple_iphone eWeek has a good summary in their article "Analysts: iPhone Has Neither Security nor Relevance" with a number of links to other resources of the likely security problems introduced by (of not in - we'll see) the iPhone. Certainly the iPhone is not the only device where we have to worry about these types of problems, but let's face it: iPods and other mass storage devices are already too loosely allowed at many companies and organizations, and the hype surrounding the iPhone and the potential excitement of iPod owners can cloud judgement. Read Andrew Storm's article on the topic.

In contrast, Blackberry's enterprise services are well-secured and provide a whole slew of workable and effective controls that the iPhone can't even begin to match up with. In a nutshell, the iPhone is a consumer device that probably doesn't belong in the enterprise - at least not in it's first version. Gartner plans to recommend businesses keep the iPhone out of the enterprise.

Also - sounds like typing on the on-screen keyboard is an index-finger exercise, not for thumb typers. So again, not so much an enterprise device. But we'll see all this stuff for ourselves in just a few days. The iPhone debuts on June 29th.

Note: I think the iPhone is a cool looking device and probably a great consumer item. I'm not knocking the device for consumers, just pointing out it's not appropriate for use in the enterprise. So before anyone starts with "iPhone/Apple-Hater" rhetoric, you can just stop. :)



Add/Read: Comments [1]
IT Security | Mobile | Tech
Saturday, 23 June 2007 13:44:00 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Sunday, 17 June 2007

Kent Newsome started a "help me rebuild my feed list" project recently, and I was pinged to contribute a short list.

This is an update on my swivel feeds experiment, in which I ask bloggers I read to help me rebuild my reading list.  I've had a great response so far, and my new reading list is coming together nicely, with a diverse and interesting mix of bloggers.

A good list has formed and when all is said and done he plans to create an OPML list to share.

Here are my five (or so) blogs for the recommendation list. I've tried to find ones that I would recommend highly but which are not already on Kent's list (there is one repeat though). Also, ones where the author published often. They're all listed for their own individual reasons, and no - not all of them are tech-related. Three of these people I have met in person, one I have interacted with on the 'net, and one I have only read. All get my attention in FeedDemon.

  • Rory Blyth - Often described in the past as a train wreck in progress, mostly his blog is just plain real - sometimes very much so. And he's a great writer.
  • Trevin Chow - A Microsoftie I know and appreciate, he's worked on a number of cool products and projects.
  • Adam Gaffin - He writes quick and topical links at computerworld.com on pretty much a daily basis.
  • Scott Adams - Yes, the author of Dilbert and a couple very good books. Scott's blog is incredibly smart and funny and smart and sarcastic and smart and ... Well, just go read it. I'd be shocked if you were not to become a regular.
  • Scott Hanselman - Yeah, he's already on Kent's list but let's face it, Scott's top notch and his blog bears repeating.

Of course, I subscribe to a lot more than those five, but they are among the ones I look at and read new content on nearly every day.



Add/Read: Comments [2]
Blogging | Random Stuff
Sunday, 17 June 2007 11:39:46 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Thursday, 14 June 2007

image Over the past several years I realize I am spending less often. Not sure I am spending less, heh, but at least not as many times in any given, oh, month or whatever. Last week I broke down after much consternation over a few months and picked up one of the Xbox 360 HD-DVD drives. I took it home and hooked it up and popped in the HD version of King Kong.

As many have written similarly in the past, the picture and sound are pretty incredible. But, since I have an older DLP projector (an InFocus X1), I am not getting the full fidelity of a HD image.

So, long story short, even on the X1 the quality is noticeably and substantially better than standard DVDs. But it's  not what it can be, so I find my self leaning toward a decision point: I need a new projector. I don't want a flat screen, I don't think. I have a 120-inch (or more) diagonal image on the wall now, and I like it that way. One room is there just for the theater-like experience. It's not my living room, in other words.

 There are a number of newer 1080p projectors out there now, as it turns out, and they don't cost a zillion bucks anymore. I have been researching newer models and have found a couple that look interesting. But I figured there might be some readers of this here site that would have some experience and input.

imageHere is what I have found so far - what do you think, and what am I missing?

Any ideas anyone?

UPDATE (July 28, 2007): Epson also has a real contender out that I am considering in their PowerLite Home Cinema 1080 model.



Add/Read: Comments [5]
Tech
Thursday, 14 June 2007 13:12:00 (Pacific Standard Time, UTC-08:00)
#  Trackback

The FBI is contacting more than one million computer owners and operators whose computers have been victimized and taken over by fraudsters and other criminals who have installed "bots" which they then use to launch distributed criminal computer attacks and fraud scams.

“The majority of victims are not even aware that their computer has been compromised or their personal information exploited,” said FBI Assistant Director for the Cyber Division James Finch. “An attacker gains control by infecting the computer with a virus or other malicious code and the computer continues to operate normally. Citizens can protect themselves from botnets and the associated schemes by practicing strong computer security habits to reduce the risk that your computer will be compromised.”

So, if the FBI calls you might want to cooperate. But - exercise some common sense and a little caution: if you get a call or contact, be sure to confirm it's actually the FBI. The classic technique used by scammers is to take commonly used communication methods and closely mirror or duplicate them in order to make you think you're providing sensitive data to a legitimate business or agency, when in fact it's the bad guy in disguise. So verify, verify, verify.

The FBI press release is here. Snipped from the press release, an important warning about being wary of potential malicious information requests:

"The FBI will not contact you online and request your personal information so be wary of fraud schemes that request this type of information, especially via unsolicited emails. To report fraudulent activity or financial scams, contact the nearest FBI office or police department, and file a complaint online with the Internet Crime Complaint Center, www.ic3.gov."



Add/Read: Comments [0]
IT Security | Safe Computing | Tech
Thursday, 14 June 2007 08:43:02 (Pacific Standard Time, UTC-08:00)
#  Trackback

RunAs Radio Show Number Ten is now online. While at Tech Ed US 2007 in Orlando last week, we sat down to chat with Isaac Roybal for the RunAs audio podcast, a Microsoft Product Manager on the Windows Server team working on the next version of Internet Information Services - IIS7.

Put simply, IIS7 includes a large number of significant improvements and enhancements for both developers and for the IT pros and hosting providers that have to implement, support, secure and maintain the servers. Tons of great information and interaction around IIS7 is available at the new community web site, IIS.NET. Many of the improvements and changes to IIS are listed on that site, as well. You can download Windows Server Beta 3 and go live with IIS7 now, and Microsoft has a program for doing so. If nothing else, you should be starting your lab work so you can plan, get familiar and see what the future of IIS holds.

RunAs Radio Show #10 | 6/13/2007 (41 minutes)
Isaac Roybal Shows Us IIS7

Isaac Roybal is a Product Manager on the Windows Server team who is deeply involved in Web Workload, especially IIS 7. Isaac digs into the details of the new management features in IIS 7, now available as part of Windows Server 2008 Beta 3. His responsibilities cover all things Web related with Windows Server and has been involved with IT for over ten years. Five of those years have been with Microsoft.

Links: RunAs Radio web site and RSS feed

We welcome your input and ideas for the show - Just email info@runasradio.com and let us know what's on your mind! We might even read your email on the air, and we are always interested to know what you would like to hear about as we book our guests.



Add/Read: Comments [0]
IT Security | RunAs Radio | Tech
Thursday, 14 June 2007 08:23:18 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Tuesday, 12 June 2007

I got a new Canon compact digital camera recently for taking snapshots (in places and at times when I don't want to carry my digital SLRs around). What better place to try out your new Canon camera than Cannon Beach on the Oregon coast? Overall the new camera does a nice, respectable job - especially for a compact model. Not too shabby. I'll do a more detailed review soon. My friend also bought one, a Kodak model, which cost half as much and took some truly terrific images. Click the images below to view larger sizes, blah blah.

For some reason I like birds flying over mountains and rocks and stuff. Some Jonathan Livingston Seagull psychological thing or something maybe, I dunno.

         Bird over Haystack Rock, Connon Beach Oregon 

Haystack is the big rock that looks like - well, duh. Next to it in the water are two other smaller (but still quite large) rocks, called the Needles. One of them is in this pic.

       Needle at Haystack Rock, Cannon Beach Oregon



Add/Read: Comments [1]
Photography | Random Stuff
Tuesday, 12 June 2007 22:31:18 (Pacific Standard Time, UTC-08:00)
#  Trackback

IMG_0203From the What The Heck Were They Thinking Department:

I get a lot of "free" business magazines in my position at work. It's one of those inevitable and unavoidable facts of being in a job with "chief" and "executive" in the title. Some of them are actually useful. Many of them are not. A few have absolutely nothing to do with my job or areas of expertise. Those ones tend to get the virtual toilet flush, without so much as being reviewed.

Speaking of which, a new magazine arrived in my office mailbox today, and upon first glance the cover made me wonder, "Why in the world would someone actually name their magazine that?" Specifically, the acronym.

And for what it's worth, the magazine actually has some good stuff in it. But in an English speaking world, well...

I'd just go with the full name, myself.



Add/Read: Comments [4]
Humor | Random Stuff
Tuesday, 12 June 2007 21:58:20 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Monday, 11 June 2007

I just upgraded my Blackberry 8800's TeleNav GPS software to v5.1.0.29 (an update from the the preinstalled v4.7), which was just recently released by TeleNav. It was really darn good before and  it's even better now. Included in this release is the until-now-missing-on-the-at&t-network feature of real-time traffic routing updates (dubbed "TeleNav Traffic alerts"). This added capability uses available traffic congestion and hazard feeds to update your route to the quickest available in real-time. In addition, the new version includes improved business listings in the search options and the ability to click on addresses right in the calendar and address book contacts, launching the GPS service automatically. That's something I can easily be grateful for, what with all those hotel addresses embedded in my Outlooks calendar for my travel days.

The UI is also greatly improved. The menus are much shinier and there's now a signal strength meter in the GPS software, a small but welcome addition. Note that when you install and run the first time you'll need to allow the software to set up several hardware and network access permissions, and you'll need to provide your TeleNav account password (which you used the first time you set up) as well. It appears I lost all my favorites in the upgrade process, so just be aware that something like that might happen to you as well. My recent locations list was still up to date. I had to change my map view from overhead back to the 3D birds-eye view as well. None of these things were a big deal for me.

If you have the Blackberry 8800 from at&t and use the TeleNav service, it's a free update for you. Just browse to http://ota.telenav.com/ota/at with your 8800 and download the new version. Note that the update requires a fairly long reboot after it's installed.

From the press release:

TeleNav Traffic alerts users through voice and on-screen prompts to traffic slowdowns and incidents along their programmed travel route. With just one click, customers can choose an alternative route or can remain on the original course. TeleNav Traffic calculates and provides an ongoing estimated time of arrival based on the customer’s current route and the latest traffic information. Subscribers can also view traffic information on a map and see details of surrounding traffic situations.

TeleNav Traffic is a feature of the latest version of TeleNav GPS Navigator™ and is offered as a free feature upgrade for TeleNav GPS Navigator subscribers. TeleNav GPS Navigator v5.1 also includes enhanced business listings, which identify more retailers and office parks. The TeleNav GPS Navigator now allows BlackBerry users to click addresses inside calendar invitations or contact lists for real-time navigation to that location.

Thanks to at&t and TeleNav for making this update happen. My $9.95 a month is going even further now. I have to say, always up to date maps, a small single device and turn-by turn instructions with Traffic is a pretty great deal. Even after say 24 months of using this service you would not have paid as much as you would to buy a GPS unit, and maps on a stand-along unit would be out of date before too long. I'm convinced.

Now I just need to find a way to record video and/or make screenshots from the Blackberry 8800 screen so I can illustrate this stuff...

Add/Read: Comments [3]
Mobile | Tech
Monday, 11 June 2007 12:02:47 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Wednesday, 06 June 2007

Catching up on announcing a few new RunAs RunAs Radio shows that I've neglected to mention here over the past couple weeks. We publish a new episode each and every Wednesday. The show has been live since mid-April and it's been pleasantly surprising to see how quickly it's taken off!

Anyhow - RunAs Radio Shows 7, 8 and 9 are now online. Discussions in these shows include disk and file encryption and the TrueCrypt open source software, Public Key Infrastructure (PKI) and what it means to you as an IT professional, and Microsoft Operations Manager (MOM) 2007, a great tool for managing and monitoring your enterprise, whether small or large.

Links: RunAs Radio web site and RSS feed

We always welcome your input and ideas for the show - Just email info@runasradio.com and let us know what's on your mind! We might even read (and answer) your email "on the air," and we are always interested to know what you would like to hear about as we book our guests.



Add/Read: Comments [2]
IT Security | RunAs Radio | Tech
Wednesday, 06 June 2007 13:15:17 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Monday, 04 June 2007

I just arrived in Florida this evening for TechEd, so I am catching up on some news, and found this at BetaNews.com. It's good news in the "let's make effective security easier and better" category:

At TechEd 2007 this morning, Microsoft's senior vice president Bob Muglia generated the biggest applause of the day (not related to the Christopher Lloyd cameo) by announcing the new Server Core installation option in the forthcoming Windows Server 2008 will have as one of its ready-made "roles" the ability to rapidly appropriate Internet Information Services in a command-line-only environment.

The Server Core option allows you to run Windows Server without all the fancy Windows stuff - I other words, it's truly bare-bones and includes only what you really need.

UPDATE: On the TechEd floor today I learned that the "server core" implementation of IIS7 won't support ASP.NET applications - just HTML and ASP type stuff. Hopefully ASP.NET will be an option in the future.

From Microsoft, here is a description of the concepts behind the Server Core installation option:

The Server Core installation option of the Microsoft Windows Server 2008 operating system is a new option for installing Windows Server 2008. A Server Core installation provides a minimal environment for running specific server roles that reduces the maintenance and management requirements and the attack surface for those server roles.

The Server Core installation option of Windows Server 2008 provides the following benefits:

  • Reduced maintenance - Because a Server Core installation installs only what is required to have a manageable DHCP, File, Print, DNS, Media Services, AD LDS, or Active Directory server, less maintenance is required.
  • Reduced attack surface - Because Server Core installations are minimal, fewer services and applications run on the server, thereby decreasing the attack surface.
  • Reduced management - Because fewer applications and services are installed on a server running the Server Core installation, there is less to manage.
  • Less disk space required - A Server Core installation only requires about 1 gigabyte (GB) of disk space to install and approximately 2 GB for operations after the installation.

You can keep up to date with the Server Core team's efforts on their blog, and participate in the Server Core TechNet forum.

Reference Link: TechEd 2007: IIS7 to Become Seventh Server Core Role



Add/Read: Comments [0]
IT Security | Tech
Monday, 04 June 2007 19:23:04 (Pacific Standard Time, UTC-08:00)
#  Trackback
 Sunday, 03 June 2007

Google holds it secrets close, as it should. One of its most valuable assets (probably its most valuable) is still its search engine, and because it's the end-all-be-all of Internet searching, how well it works is very important to the company. Add to that the relevance and accuracy of searching as it relates to Google advertising revenues, and the importance becomes quite huge.

The New York Times published a story this morning about the Google search inner sanctum, a bunch of people who tweak and adjust the search algorithms used to get people what they're looking for on the web. It's a good article and dives deep into the work the team does and how much more accurate search has become.

“Expectations are higher now,” said Udi Manber, who oversees Google’s entire search-quality group. “When search first started, if you searched for something and you found it, it was a miracle. Now, if you don’t get exactly what you want in the first three results, something is wrong.”

It's an interesting read, well worth the time. And think about how much storage is required for this:

And Google does more than simply build an outsized, digital table of contents for the Web. Instead, it actually makes a copy of the entire Internet — every word on every page — that it stores in each of its huge customized data centers so it can comb through the information faster. Google recently developed a new system that can hold far more data and search through it far faster than the company could before.

Find out more about Google's PageRank as well as a little of what they call "signals" - cues and other information the search engine algorithms generate and use to determine what you see when you search and why.

Article reference: Google Keeps Tweaking Its Search Engine (NY Times Online)



Add/Read: Comments [0]
Tech
Sunday, 03 June 2007 09:08:13 (Pacific Standard Time, UTC-08:00)
#  Trackback