Choosing between people you want to invite to a function and people you
have to invite is sometimes difficult.
Say Alice wants to invite Tom, Dick, and Harry to a party, but she'd actually
prefer if Dick didn't show up.
Here's how Alice can send invitations by email from an email-capable
Unix system to achieve the desired result,
while covering her scheming with plausible deniability.
Continue reading "Pretend Invitations"
Advice from Successful Greek IT Startups
Members of the
Hellenic Association of Mobile Application Companies
Hellenic Semiconductor Industry Association,
assorted biotechnology companies, and representatives from
Greek and US-based venture capital funds gathered on Friday
December 17, 2011 in a meeting
to exchange advice, tips, and war stories on venturing abroad.
It was one of the most inspiring meetings I've attended for some time.
These are my notes from the meeting.
Continue reading "Advice from Successful Greek IT Startups"
Apps are the New Users
Some facilities provided by mature multi-user operating systems appear arcane today. Administrators of computers running Mac OS X or Linux can see users logged-in from remote terminals, they can specify limits on the disk space one can use, and they can run accounting statistics to see how much CPU time or disk I/O a user has consumed over a month. These operating systems also offer facilities to group users together, to specify various protection levels for each user's files, and to prescribe which commands a user can run.
Continue reading "Apps are the New Users"