PING! Open Source Federated Identity Management

Ping Identity Pre-Announces Hostile Takeover of Microsoft in 2050

The plan, as laid bare by Ping’s CEO Andre Durand, is as follows:

1. Hit a yearly revenue of $100 million
2. Grow that to a yearly revenue of $1 billion
3. Grow that to a yearly revenue of $100 billion (and go public somewhere in there).
4. Assume that Microsoft’s star has faded some and launch takeover efforts.”

Visual Thinking

Some people produce characteristic, recurring writing problems as a result of inappropriately applying visual thinking to writing. This paper proposes that the writing problems of such visual thinkers derive from three factors:

a lack of words,
unfamiliarity with the kind of analysis that leads to the logical sequencing of prose, and
difficulty understanding that context must be communicated.
Continue reading

Bush for president? You bet!

Bush for president? You bet!

By James Arnold
BBC News business reporter

The polls were off-beam, the pundits were caught napping, the press didn’t cover itself in glory – did anyone confidently predict the result of the US election?

The gambling community, perhaps. A glance at the returns of some of the world’s biggest betting exchanges shows that President George W Bush remained a clear favourite with punters right down to the wire.

On the Iowa Electronic Markets (IEM), run by the University of Iowa as a forum for experimental online betting, participants gave Mr Bush a 51.2% chance of re-election on the eve of the poll – a score that tallied precisely with his eventual share of the popular vote, at the last count.

Indeed, electronic gambling is proving so uncanny a predictor of everything from oil prices to football results, that experts reckon it could be harnessed for more wholesome purposes than making money.

Iowa Electronic Markets (IEM)

Beat spam using hashcash

If they want to send spam, make them pay a price
Level: Intermediate

David Mertz, Ph.D. (
Developer, Gnosis Software, Inc.
09 Nov 2004

Built on the widely available SHA-1 algorithm, hashcash is a clever system that requires a parameterizable amount of work on the part of a requester while staying “cheap” for an evaluator to check. In other words, the sender has to do real work to put something into your inbox. You can certainly use hashcash in preventing spam, but it has other applications as well, including keeping spam off of Wikis and speeding the work of distributed parallel applications. In this article, you’ll meet David’s own Python-based hashcash implementation.

HashCash article continued


Circling the wagons: the net politics of exclusion

By Will Davies
Published Monday 8th November 2004 18:36 GMT

Election 2004 Here’s a fable. In summer 2004, a vacancy comes up in a London office, and the manager sets about recruiting. He interviews a blue man and a green man. The blue man has impeccable qualifications and very good experience. The green man’s qualifications are weak, and he is under-experienced – but he’s witty and he gets on well with the manager.

After more background research, the manager reflects on their qualifications and experience, and he also reflects on their personalities and reputations. He decides that although the blue candidate is clearly better on paper, that he got on so well with the green candidate, that he will give him the job. He reckons he’ll fit in well, despite the fact that he isn’t an especially strong candidate. That’s the politics of groups for you.

Open Source Currency

Or, how mobile phones can break the money monopoly.

In the midst of discussing wireless data business plans, cell phone technology developments, and the moment-to-moment success of the mobile media industry, it’s sometimes easy to forget the bigger picture. Just as early Internet enthusiasts seemed to focus on ad banners and animated GIFs instead of what turned out to be the much more momentous power of blogs to influence the direction of culture, those of us covering mobile data may have also taken our eyes off the bigger prizes in store for this new medium.


Int’l Jrnl o Community Currency Research

Case ID – 199-Eye WF 213 589. 199

This transcript is produced from the teletext subtitles that are generated live for Newsnight. It has been checked against the programme as broadcast, however Newsnight can accept no responsibility for any factual inaccuracies. We will be happy to correct serious errors.

Has someone been sitting on the FBI? 6/11/01

The CIA and Saudi Arabia, the Bushes and the Bin Ladens. Did their connections cause America to turn a blind eye to terrorism?

There is a hidden agenda at the very highest levels of our government.

The sad thing is that thousands of Americans had to die needlessly.

How can it be that the former President of the US and the current President of the US have business dealings with characters that need to be investigated?

In the eight weeks since the attacks, over 1,000 suspects and potential witnesses have been detained. Yet, just days after the hijackers took off from Boston aiming for the Twin Towers, a special charter flight out of the same airport whisked 11 members of Osama Bin Laden’s family off to Saudi Arabia. That did not concern the White House.

Their official line is that the Bin Ladens are above suspicion – apart from Osama, the black sheep, who they say hijacked the family name. That’s fortunate for the Bush family and the Saudi royal household, whose links with the Bin Ladens could otherwise prove embarrassing. But Newsnight has obtained evidence that the FBI was on the trail of other members of the] Bin Laden family for links to terrorist organisations before and after September 11th.

This document is marked “Secret”. Case ID – 199-Eye WF 213 589. 199 is FBI code for case type. 9 would be murder. 65 would be espionage. 199 means national security. WF indicates Washington field office special agents were investigating ABL – because of it’s relationship with the World Assembly of Muslim Youth, WAMY – a suspected terrorist organisation. ABL is Abdullah Bin Laden, president and treasurer of WAMY.
Continue reading

Letters Only LM Hash Database

Posted by CmdrTaco on Tuesday November 02, @12:19PM
from the need-new-security dept.
Peter Clark writes “Disk storage has increased tremendously in the past 5 years and the blatant insecurities in the antiquated LM hashing technique have not gone away; though functionality has been added to disable LM hashes, this is not set by default. With some help from Elcomsoft, simple flat files have been created that hold every combination of LM hash for letters only passwords. Jesko has coded a server application which allows you to access this database. Simply telnet to: on port 2501 and paste in a LM hash. So how does this differ from Rainbow tables? Well this will return a password 100% of the time, using minimal processor power, in approximately less than 0.2 seconds.”