This is some stuff I’ve read recently and thought of sharing.
The spat between IRDA and SEBI on ULIPs has been ugly and the only victim is the common investor. This article by Jeff Gerth on Propublica shows how such spats are more common (than at least I thought) and lead to sub-optimal outcomes for the common man.
A lot of people get very confused on legal aspects of software licensing. Here is a checklist for buyers which would be useful for entrepreneurs too. Do note its a good starting point but isn’t exhaustive.
We all have had our own frustrating experiences with Corporate IT and most of the time we have just given up for the sake of “reliability, scalability and security”. Here is a very comprehensive and pithy rant/counterpoint against the Corporate IT. I like it because it covers it all and makes a persuasive case. Also because James is a CTO with Dept of Works and pensions in UK. He’s arguing for change from inside the heart of the beast!
Retweets are excellent predictors of Google’s pace at recognising content
Here’s the top line, though: “Pay What its Worth” works less well than the Tip scheme, and I think its because people don’t like having to make a decision on value AND tell me what they think it is. When I told them what the fixed amount was, they were far easier with it.
This is a description of a Facebook based phishing attack conducted by a security consultant for its client as a penetration test. While the consultant makes his points about remedies, I think a crucial point is missed
Another interesting finding is that targeted users will often provide more than one login and password when a displayed page indicates “Under Construction.” Frequently, a respondent will enter a relatively hard password, but with a numerical sequence like Summer1, Summer2, and so on
Isn’t this behavior a result of the security policy of password reset every 3 weeks and it can’t be any of past 5 passwords etc coupled with no single sign on? I think most people have many passwords to remember and to make it easy they end up making up passwords that a computer thinks as “strong” but really is weak for a human mind.
Here are some interesting insights and data from the Mobile world: