113518731735288484
...I guess that's funny, but isn't Pac-Man the one that says "waka waka," not the ghosts?
-ryan
...I guess that's funny, but isn't Pac-Man the one that says "waka waka," not the ghosts?
-ryan
Well boys and girls in case you didn't notice, this is significant because this is the first time AIM will interface with another IM client other than a 3rd party piggybacker(trillian/gaim/etc) IE, all you AIM users can uninstall AIM and use google IM and still talk to aim users. I see this as one more nail in the coffin for AOL because this is one of the only few apps they have dominance in.
Seagate Technology to buy rival Maxtor
Reuters reports that Seagate Technology would buy rival computer disk-drive maker Maxtor Corp. for $1.9 billion. Seagate is already world's largest hard drive manufacturer and Maxtor is the third largest after Seagate and Western Digital.
Good riddance maxtor.
Really cool links:
Censure motion introduced in House over Iraq, torture.
Ranking House Judiciary Democrat Rep. John Conyers (D-MI) has introduced a motion to censure President Bush and Vice President Cheney for providing misleading information to Congress in advance of the Iraq war, failing to respond to written questions and potential violations of international law.
The resolutions were quietly introduced Sunday evening along with a third resolution (HR 635) to create a Select Committee to investigate the administration�s intent to go to war prior to congressional authorization. The committee would also be charged with examining manipulation of pre-war intelligence, thwarting Congressional oversight and retaliatory attacks against critics. As part of this resolution, House Judiciary Democrats seek also to explore violations of international law as pertaining to detainee abuse and torture of prisoners of war.
Read more.Oracle, recently under fire from security researchers for the state of its product security, is further automating its bug-checking process.
The Redwood Shores, Calif.-based enterprise software maker has started using technology from Fortify Software to analyze the source code of some of its products for potential security vulnerabilities, the companies announced Tuesday.
Read more - go Jacob!To listen to the 20 minute podcast by Leo Laporte and Steve Gibson explaining how it works and why it kicks ass, go here.
I've got a VPN setup with it. If you want to connect to it (and you should) then contact me within the usual methods im/email/telephone/voip.