The Illustrated Primer

Author: Yaacov Apelbaum

The Anti-Virus Virus

Another interesting observation—which is not without its irony—is that large vendors such as Microsoft are completely unaware of the malware distribution platforms and are aggressively purchasing advertising space on these sites.

Read More »

Developers Just Wanna Have Fun

The greatest engineering feats are the ones we don’t notice. The hallmark of a great designer is his ability to translate complexity into simplicity. The automatic transmission in a car represents significantly more engineering effort than a manual transmission, but it positively transforms the average user experience. The best consumer electronics always focus on hiding complexity, not showcasing it.

Read More »

To Make Errors is Human, to Handle Them is Divine

Its not enough to capture and display errors. Real quality of service goes beyond just acknowledging your application’s faults. My rule of thumb is that there is no such thing as an “informative error message”. A good error is one that has been eliminated through error-handling code and product design.

Read More »

Only the Racially Pure Need Apply

On February 20, 1939, over 20,000 American supporters of the Nazi party packed Madison Square Garden in New York City. They anxiously awaited the appearance of Fritz Julius Kuhn, the newly anointed American Führer of the German-American Bund. The event took place two days before George Washington’s birthday and a 30-foot-high portrait of the first president (who was described by Fritz as the first Fascist) hung behind the podium along with Nazi flags and swastikas.

Read More »

Let There Be Light

When I first watched the clip, I really thought that it was another Borat promotional, but after a few seconds, I realized that it was actually the real thing. Many men were in suits, moms, dads and grandparents were there with their young kids in tow, clearly, not a lynch mob wielding pitch forks. At least not judging from the dress code.

Read More »

Windows Live Credit Card Phishing

In many cases, the objective of phishing is to just recover your webmail credentials since the resale value of a legitimate web mail account on the black market can be as high as $2-$3—twice the amount one can get for a stolen credit card number.

Read More »

Mortgage Refinancing Shysters I

In what is further proof of the principal of horror vacui, it seems that the legitimate banking mortgage industry has now given way to a new breed of entrepreneurial ventures. These con-corporations have smelled the blood in the water and are aggressively following Mr. Bigweld’s motto: “See a need, Fill a need”.

Read More »

Social Networks vs. the Enterprise

But alas, every garden has its resident snake, and such is the A grade serpent found in social network’s Garden of Eden. What many of us don’t realize is that the same characteristics that make the social networks so attractive are also their greatest limitation.

Read More »

The Death March

To those unfamiliar with the term, a death march is not a walk through Ezekiel’s valley of dry bones. Rather, it is a reference to a development project where requirements exceed the realistic deliverables by at least 50 percent.

Read More »

An Afternoon with a Fraudster

It was only after I played back the recording and listened to it several times that I realized how sophisticated and polished the scam was. The planners had thought of everything and had prepared for even the minutest of details.

Read More »