Whoohoo! Its alive!
Below is a blurb from the press release for the project that I have been working on.
Hosted offering gives small and medium-sized businesses access to mobile communication and collaboration services through a cost-effective Scale-on-Demand model
DES MOINES, IA, October 7, 2008 – LightEdge Solutions, the leading hosted services partner dedicated to the full breadth of communications and IT needs for small and medium-sized businesses (SMB), announced today the launch of a new Hosted Microsoft Exchange 2007 platform.
Berkeley Breathed is putting his penguin on ice. The 51-year-old cartoonist said he will pull the plug on his comic-strip career and “Opus” after Nov. 2.
In an e-mail to the Los Angeles Times, the 51-year-old Breathed wrote, “30 years of cartooning to end. I’m destroying the village to save it. Opus would inevitably become a ranting mouthpiece in the coming wicked days, and I respect the other parts of him too much to see that happen.
I typically don’t read the Huffington Post. At least not on a regular basis anyway. But this article caught my eye on digg so I hoped over there.
First, read the article. Its rather shocking.
Then, contact your state Senators and Representatives and express the outrage you now have for the fact that the executive branch can spend 700 billion dollars of our money on bailing out their idiot friends.
Apple has sent out invites to a Special Event taking place on September 9, which is exactly one week from today. The invite features the iconic iPod silhouette along with the tagline “Let’s Rock.” It will be taking place at the Yerba Buena Center for the Arts in San Francisco—just down the street from the Moscone Center—at 10am Pacific Time next Tuesday.
source
Well, this is interesting. This may be only iPods, but there I’d be pumped if there is an iPhone announcement.
A new security hole in the Internet Protocol is potentially the most severe ever discovered, according to a presentation by security experts Anton Kapela and Alex Pilosov. The two have revealed that the inherent nature of the Border Gateway Protocol (BGP), which is essential for optimizing and routing traffic on the Internet, allows a hacker to redirect traffic to his own servers and forward it along without interrupting connections or otherwise immediately exposing the attack.