I realize how out-of-shape I am for this upcoming triathlon relay I'm signed up to do with my family. 4 miles of running after not running in forever... Well, today is March 31st and, although not yet April, I thought I would start running and logging my time. I could use my fancy athlete logs, but they can sometimes take the fun out of working out. Besides, knowing that the world could read about my progress, I might as well live up to my past as a "good" triathlete by getting back in the game with the pressure of everyone watching.
Well, that's it! I'm on the hook to run 4 miles in a Triathlon relay on April 30, 2006 with my oldest sister and dad. If you're in town, travel down to Tempe and feel free to boo at the slow runner... me. You may even get to see a physical collapse!
Random quotes hit me in the noggin all the time, so I'm officially making a place to record them: (personally, I don't care if you like them or not)
All I ask is that you remember where the quote came from if you decide to use it.
How rude of me to ignore the fact that you may have stumbled upon my site looking for another Eric Swanson! Well, I have compiled a list, although not entirely comprehensive, of others that carry my name:
A suggestion to ALL e-mail programs... keep your "Junk E-mail" folder working the way it works, but add a "Really Bad Grammer" folder as well and dump everything that has more than N grammer errors (user defined) in it.
I just got a piece of junk e-mail in my inbox that passed 1) my company's expensive SPAM filters and 2) Outlook's junk e-mail rules engine. It started something like this:
"subside sill as transpire a is agreeable southern but annexation, blackmailer a altar a was medication an playmate humid become the of peak, ..."
Now, sure, all of my sisters', friends', and boss' e-mails will get thrown in the "Really Bad Grammer" folder from now on, but I'm willing to accept the consequences.
|Great for beginners or old codger pros, though the pros might want to simply read it at the bookstore like I did. This book got me quickly acquainted with new features in the 2.0 and allowed me to skim over older features. Theming/skinning, personalization, new providers, built-in site navigation controls, new authorization controls, etc.|
I just remembered a conversation that I had years ago with my boss... "Why don't companies provide the software developers with some shared responsibility in the product they develop? Depending on the projected success of the product, why not replace stock options, bonuses, and even future raises with the option to have a share in the product itself? For example, Joe was reponsible for nearly 60% of the functionality of the end-product, so, since we allocated 10% of the profits to our development team, Joe gets 6% of every profit dollar once expenses for the product. So, for every $100 in profit, Joe gets paid $6! He has an investment to keep that product selling!" The developer has a direct interest in the product's success as does the company — unifying coporate objectives.
I've written about cloning before and have had difficulty making the decision if it is right or wrong. Well, for some reason today, I'm feeling that it's right...
Aoccdrnig to a rscheearch at Cmabrigde Uinervtisy, it deosn't mttaer in waht oredr the ltteers in a wrod are, the olny iprmoetnt tihng is taht the frist and lsat ltteer be at the rghit pclae. The rset can be a toatl mses and you can sitll raed it wouthit porbelm. Tihs is bcuseae the huamn mnid deos not raed ervey lteter by istlef, but the wrod as a wlohe.
I have seen the above so many times, I thought I would make a firm record of it.
Until each individual has effectively learned and adopted best security practices for the task they are performing and can be reasonably assured that all others involved in the task have also done the same, there will never be an effective means of security. The very fact that personal security can never be fully guarded against the concerted efforts of determined individuals is an indicator that effective counter-measures and the risks involved must be 1) reasonable and 2) acceptable. One can never fully trust their own security, including the security placed upon them. This includes all forms of security; physical, mental, informational, communicational, etc.
I realized my 10-year reunion is only a year away... Mountain Pointe High School Alumni. So many people have posted short summaries of what they've been doing since high school. Let's see, what have I been doing?...
Folks, when developing automated, computer solutions, security hasn't changed much. Although the concept has been around for a while, AJAX is considered on the edge right now and people are about to expose their applications to even more vulnerabilities. Why? In the development rush, less-experienced programmers will forget to always validate requests to the web server ON the web server and will start moving validation on to the client, thinking that it will provide a better user experience. It will, but you have to duplicate your efforts on the server too as a back-up for hacks around your client-side solutions. My recent post to the Open Web Application Security Project outlines my concerns...
My list of personal websites has grown and shrunk like a roller-coaster of whimsical domain name purchases. Here is a list of what they were / are and what has happened or will be happening to them:
Recently I've been actively involved in many discussions on the internet about Microsoft's release of .NET 2.0 and the impact both the upgrade as well as the original transition to .NET has had on development...
Anything you type can and may be saved. If you're walking down the street and you get the feeling that someone is shadowing your steps, don't you get nervous? What could they possibly want from you? Why?! Well, the same goes for internet browsing...
Tools are contantly evolving to expose difficult or "hidden" tasks. Computers are only 1 example. A method for gaining entry to a secure location and / or information. Devices for enabling malicious intent. There's always a spike in illegal or mischievous activity when something comes along that makes it easier for the general public to perform an activity deemed unacceptable by society.
Work is alright. Working 50-55 hour weeks, which sucks more than 40, but whatcha gonna do? I need to finalize my SalesTimeMaker.com v2.0 product for release. We did a lot of work on it last year and pretty much abandoned it to work on other projects. I hope to "steal some time" to work on it so that I can have it ready for any new clients.
I am excited for the end of my work week because I FINALLY get to upgrade a development server to ASP.NET 2.0 with SQL Server 2005 + Reporting Services. Then, I'll be able to install Visual Studio 2005 and take advantage of everything I've been reading about this past year.
I have built several link directory engines in the past, but until I can get around to implementing one on my own website... This will have to do...
*Keep in mind that this is not a thorough resource of links on my behalf. I'm simply posting them when I 1) remember and 2) get the opportunity.
Your privacy is important.
I recognize your right to confidentiality and are committed to protecting your privacy. I will never give, rent, loan, or sell any identifiable personal information to any other third party, unless legally required to do so.
I may store and process that information to better understand your needs and how I can improve our products and services. In addition, I may use that information to contact you.
In some cases, I may collect information about you that is not personally identifiable. Examples of this type of information include the type of Internet browser you are using, the type of computer operating system you are using, and the domain name of the Web site from which you linked to our Web site.
Every computer connected to the Internet is given a domain name and a set of numbers that serve as that computer's "Internet Protocol," or IP, address. When a visitor requests a page from any Web site within the Eric Swanson domain family, our Web servers automatically recognize that visitor's domain name and IP address. The domain name and IP address reveal nothing personal about you other than the IP address from which you have accessed our site. I use this information to examine our traffic in aggregate, but do not collect and evaluate this information for individuals. Our Web servers do not record email addresses of the visitors.
If you have any questions about this privacy statement, the practices of this Web site, or your experience with this site, please contact me.
We're all going to see a radical shift in the way most websites look and function in the next few years... The concepts of personalizing a website to meet your own needs is no longer a desired feature that only major website portals can afford to implement. Both the experience of people involved coupled with the evolution of web technologies is going to allow people like me to build websites unlike those regular internet visitors have ever experienced.
I should be used to fad crazes on the internet by now, but I simply can't seem to get over this web programming term "mashup". I already have to deal with REST, "Web 2.0" and all of the wonderful acronyms that come along with technology and American industry. It will never end...
But why (ohhhh why) "Mashup"?! I don't want to be known as a "mashup" programmer. I want nothing to do with the term. I guess beggers can't be choosers. World Wide Web, Hyperlink, Website, Portal, Wiki, Blog, ... "Mashup".