New Breach Laws

by adam on August 12, 2009

Missouri adds a law with a “risk of harm trigger” aka the full-employment provision for lawyers and consultants. Texas adds health data to their notification list. Most importantly, North Carolina requires notice to their attorney general for breaches smaller than (…)

Read the rest of this entry »

Information Security-Don’t sweat it

by adam on August 11, 2009

So-called clinical-strength antiperspirants …come with instructions that they be applied before bed for “maximum” protection from wetness and odor. … Even regular-strength antiperspirants work best when applied to underarms at night, experts told us. Bedtime application “really is the best (…)

Read the rest of this entry »

Quantitative Analysis of Web Application Usefulness (Or Why Your ROSI is wRONG)

by alex on August 5, 2009

The amazing (in both quality and quantity of blog post production) Lori MacVittie of f5 has a blog post up on their corporate blog called,  “A Formula for Quantifying Productivity of Web Applications.” Basically, Lori proposes that we study web (…)

Read the rest of this entry »