Home | My Links | About Me | My Twitter | Email: rodolfojreregia[at]yahoo.com

Thursday, November 6, 2008

The World's Greatest Brand Names and Where they came from


I made a comprehensive list of the world's greatest brand names and the reason why they were named like that and where the it basically came from. Here are just the few and the most famous:

Adobe - named after Adobe Creek, a river located and ran behind the house of its founder, John Warnock.

Apache - it got its name from 'A PAtCHy' server, a result when its founders applied patches to code written for NCSA's httpd daemon, in which the program started from. Thus, the name Apache.

Apple Computers - the name came from Steve Jobs' favorite fruit. The issue was he was actually late for filling a name for his business, he threatened his colleagues that if they did not suggest any better name by 5 o'clock, he is going to call the company Apple Computers.
CISCO - short for San Francisco.

Google - it was originally named 'Googol', a word for the number represented by 1 followed by 100 zeros. But is was later changed by its founders when they got their cheque after presenting the project to its investors, which was made out to "Google".

Hotmail - its founders formulated the best name for the service that would end with "mail". They settled with Hotmail, originally because it had HTML on it. And it was originally written as HoTMaiL with the uppercasses on it.

HP - its founders, Bill Hewlett and Dave Packard tossed a coin to decide whether they would name the company as Hewlett-Packard or Packard-Hewlett.

Intel - Bob Noyce and Gordon Moore wanted to name their new company 'Moore Noyce' but that was already trademarked by a hotel chain, so they had to settle for an acronym of INTegrated ELectronics.

Lotus (Notes) - Mitch Kapor, who used to be a teacher of Transcendental Meditation got the name for his company from 'The Lotus Position' or 'Padmasana'.

Microsoft - coined by Bill Gates to represent the company that was devoted to MICROcomputer SOFTware. Originally christened Micro-Soft, the dash was later removed.
Motorola - the name came originally from the company Victrola, which manufactures radios for cars and was the where Paul Galvin started.

ORACLE - Larry Ellison and Bob Oats were working on a consulting project for the Central Intelligence Agency. The code name for the project was called Oracle which stands for "One Real Asshole Called Larry Ellison".

Red Hat - Company founder Marc Ewing was given the Cornell lacrosse team cap, with red and white stripes, while at college by his grandfather. He lost it and had to search for it desperately. The manual of the beta version of Red Hat Linux had an appeal to readers to return his Red Hat if found by anyone !
SAP - "Systems, Applications, Products in Data Processing", formed by 4 ex-IBM employees who used to work in the "Systems/Applications/Projects"

SUN - the acronym for Stanford University Network.

Xerox - came from the Greek word "xer" which means dry. The inventor, Chestor Carlson, named his product trying to say "dry", as it was dry copying, markedly different from the then prevailing wet copying.

Yahoo! - the word was invented by Jonathan Swift and used in his book 'Gulliver's Travels'. It represents a person who is repulsive in appearance and action and is barely human. Yahoo! founders Jerry Yang and David Filo selected the name because they considered themselves yahoos.


These are just a few but it was fun to know that some of these company names where actually formulated with weird reasons. A proof that indeed technology has a human side.

DISCLAIMER: The following information used was not approved by its founders and I do not own any of these images. The logo is copyrighted by its preceding companies.
.

Wednesday, November 5, 2008

The Laws Microsoft has set on Computer Security

This information is quite old yet just want to post it and share it again.

The Microsoft Security Response Center has received before a lot of reports with regard to users experiencing a lot of errors and breach of security even they have updated their anti-virus softwares and they always turn on their firewall. And with their investigation, they found out that most of these cases were because of the owner's fault. As a step to help prevent future problems like these, Microsoft has released a list on what they think is the fact with regard to computer security. They called the list The 10 Immutable Laws of Security.

The following is the content of that specific list.

Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore

It is true that a program is designed to run as what it was supposedly programmed to do even it would be something negative. It is also a fact that when a program is running, it could do a lot of changes on your computer, changes that even could go beyond the limit of what you can do for your computer. But it is also a fact that a program cannot run without one's approval. That is the reason why it is not advisable to install, run or even download softwares and computer programs from a untrusted source.

Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore

Operating Systems is just running with a series of ones and zeroes, and if it would break down, one cannot blame the OS, because it was right all along to follow inputs. Therefore it is always best to give restrictions and privileges to other users of your computer, to ensure that only trusted individuals can alter and make changes on your computer's operating system.

Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore

I mean, why the hell would you let your computer to be used by an untrusted individual!

Law #4: If you allow a bad guy to upload programs to your website, it's not your website any more

See rule #1, only in this case, uploading untrusted files to your site is the case. The end result of these is that there actually no difference between users that has been tricked and users who has voluntarily did it.

Law #5: Weak passwords trump strong security

In choosing a password, it is advised the we develop a complex one, one that is not easily forgot and not to be able to be guessed by others. And please don't use predictable passwords like you dog's name, or you favorite superhero, anniversary dates and worse, your name! Consider special character enriched passwords and random capitalized or not capitalized letters and numbers. A good password contains atleast one capital letter, another letter which is not capitalized, two numbers and, importantly, atlease one special character.

Always remember, even though you have the best security in your computer but you do not have a strong password, you are as marginally vulnerable as those who do not have security at all.

Law #6: A computer is only as secure as the administrator is trustworthy

Microsoft has stated that "Every computer must have an administrator: someone who can install software, configure the operating system, add and manage user accounts, establish security policies, and handle all the other management tasks associated with keeping a computer up and running." Thus, a computer is secured when its administrator is someone who warrants trust. Take steps to keep honest people honest. Diversify task as effectively as possible, it is always best to divide task to more than one administrator, limited to only a few number of people.

Law #7: Encrypted data is only as secure as the decryption key

No better way to say this than how it was posted in the Microsoft website about the 10 Immutable Laws of Security which goes:

"Suppose you installed the biggest, strongest, most secure lock in the world on your front door, but you put the key under the front door mat. It wouldn't really matter how strong the lock is, would it? The critical factor would be the poor way the key was protected, because if a burglar could find it, he'd have everything he needed to open the lock. Encrypted data works the same way—no matter how strong the crypto algorithm is, the data is only as safe as the key that can decrypt it.

Many operating systems and cryptographic software products give you an option to store cryptographic keys on the computer. The advantage is convenience – you don't have to handle the key – but it comes at the cost of security. The keys are usually obfuscated (that is, hidden), and some of the obfuscation methods are quite good. But in the end, no matter how well-hidden the key is, if it's on the computer it can be found. It has to be – after all, the software can find it, so a sufficiently-motivated bad guy could find it, too. Whenever possible, use offline storage for keys. If the key is a word or phrase, memorize it. If not, export it to a floppy disk, make a backup copy, and store the copies in separate, secure locations. (All of you administrators out there who are using Syskey in "local storage" mode—you're going to reconfigure your server right this minute, right?)"
Law #8: An out of date virus scanner is only marginally better than no virus scanner at all

One should make it a standard operating procedure to always update your virus archive signatures as often as everyday if possible. Not only that, one should also update the anti virus itself on a period of time that would range from three months until eighteen months, the more often, the better. While, it is a must to have this software, keep it as minimal as possible. By this, I mean it is also unwise to install five different softwares on your computer, in which would be a reason why your computer would be very vulnerable to the outside world.

Law #9: Absolute anonymity isn't practical, in real life or on the Web

Human interaction in the web is as safe as we want it to be. It is not always recommended, although at times it is best, to stay anonymous. As long as one would only give information, personal and pertinent, to trusted individuals and sites, one does not have to fear about violation of privacy.

Law #10: Technology is not a panacea

Technology can do many great things. It can be very very helpful, especially in our world today that computing and communication's best medium is technology. But just like, everything, it is not perfect. Nothing in technology is perfect. Even the most secured computer will have flaws. Even if it is paired with the best administrator.

Keep your expectations low on your security and high on its vulnerability.; But always keep in mind the two main things that would keep a good security, its technology and its policies.

There you have it guys. For more related information, it is best to check the 10 Immutable Laws of Security in Microsoft. Yadda!
.

Tuesday, November 4, 2008

McCain and Obama’s battle for my vote…

Just posting about the update I made on another blog of mine at wordpress, which is titled McCain and Obama’s battle for my vote…

This is about my point of view about who deserves to win the current presidential election. Thanks for checking it out...

Monday, November 3, 2008

Learn How Not to Use Powerpoint!

Here is a presentation by Don McMillan, called The Life and Death by Powerpoint. I know This has been posted everywhere in the internet, but go check it out.



Funny, yet many of us still commit most of the mistakes that were mentioned in the presentation. Haha, can't stop laughing every time I view this video.

The main lesson of the presentation that it is always best to simplify your presentation. A good presentation does not need too many animated figures or illustrations. You do not need to over emphasize things by putting excessive bullets, or unnecessary font styles and unlikely color background.

Keep your presentation simple, use light color schemes, formal font styles, use bullets only when you want to emphasize important key point, do not over crowd your graphical presentations and lastly, avoid distractive animations. The content of your presentation must also be relevant and focused on the topic, needs to be direct (except on times needed not to) and must easily be understood. After all, that is the objective on making a presentation. To be understood.

+++++
Don McMillan graduated last 1982 from Stanford University with a Master's Degree in Electrical Engineering. He is famous for his works on making Corporate Comedies. Learn more of Don McMillan.