Data Shredding, Updating the Status Bar, and More Edited by Nancy Michell QLast month data formats QLast month data formats you mentioned data shredding in a question about converting from relational to XML. What exactly is data shredding and what do I need to know about it? you mentioned data shredding in a question about converting from relational to XML. What exactly is data shredding and what do I need to know about it? AHere shredding refers to extracting relevant data out of hierarchical XML and putting it into flat relational storage. AHere shredding refers to extracting relevant data out of hierarchical XML and putting it into flat relational storage. Shredding is an open problem with many different solutions, but in general, the more hierarchical the XML is (that is, the more deeply nested the data), the more joins are required to turn the flat, shredded data back into XML. Joins are expensive, so the more deeply nested the original XML, the more expensive the data's reconstitution becomes. XML also has other context information, like in-scope namespaces, that accumulates on the stack during parsing and therefore also contributes to performance slowdown. (msdn.microsoft) Works Cited msdn.microsoft. 12 February 2009 <http://msdn.microsoft.com/enus/magazine/cc188772.aspx>. Keep Hackers Out: Part One, Personal Edition 11.19.02 Total posts: 20 by Konstantinos Karagiannis and Matthew D. Sarrel As we rely more on our computers, the potential for hackers to hurt us through them likewise has grown, threatening to expose or destroy our private data and personal records. Current hacker tools are sophisticated, automated, and more difficult to spot. In addition, broadband connections have made us more vulnerable; always-connected computers, typically with static or rarely changing IP addresses (the addresses computers on the Internet use to find you), give would-be attackers unlimited time to discover and exploit system vulnerabilities. With a few tricks and tools, however, you can secure your home or small-office computer against the average hacker searching for the low-hanging fruit. (pcmag) Works Cited pcmag. 12 February 2009 <http://www.pcmag.com/article2/0,4149,653189,00.asp>. Keeping private data private One of the things at Google that impresses me most (besides the quality of the food, of course) is the level of commitment and energy that the company puts into keeping its user's data secure. From the classic story about not handing out search data to its latest face blurring technology for street view, these guys do whatever they can to keep private data private. With the launch of App Engine, the company opens up its data centers to you and me, so I think it's only fair to strive for the same standard of quality. There are many small things we can do in our applications to decrease the chance of leaking data. In this post, I would like to talk about one of them. Take a look at the following example application. Ignore the lack of transactions or that I hardcode my html and focus on the security aspect. Do you see anything wrong? (blog.appenginefan) Works Cited blog.appenginefan. 12 February 2009 <http://blog.appenginefan.com/2008/06/keepingprivate-data-private.html>. Should Anti-Spyware Programs Fight Snooping I.S.P.s? By Saul Hansell The efforts of Internet service providers to keep track of what their customers do online poses an interesting question for the makers of anti-spyware software: Should they find a way to help users block these systems from monitoring their surfing or showing them advertising that relates to their interests? The Anti-Spyware Coalition is setting up a project to help address those issues. It’s potentially an important step because the coalition, run by the Center for Democracy and Technology, has created standards used by the major vendors of anti-virus and antispyware technology to help define how dangerous certain software and cookies are. Most anti-spyware programs scan users’ computers and sort the findings into high-, medium- or low-risk threats. Users can define their own settings to tell the programs how to deal with various sorts of threats and potential privacy invasion (bits.blogs.nytimes) Works Cited bits.blogs.nytimes. 12 February 2009 <http://bits.blogs.nytimes.com/2008/04/25/shouldanti-spyware-programs-fight-snooping-isps/>. system Restore is a component of Microsoft's Windows Me, Windows XP and Windows Vista operating systems that allows for the rolling back of system files, registry keys, installed programs, etc., to a previous state in the event of malfunctioning or failure. (wikipedia) The Windows Server operating system family does not include System Restore. The System Restore built into Windows XP can be installed on a Windows Server 2003 machine, [1] although this is not supported by Microsoft. (wikipedia) In Windows Vista, System Restore features an improved interface and is based on Shadow Copy technology. In prior Windows versions, it was based on a file filter that watched changes for a certain set of file extensions, and then copied files before they were overwritten.[2] The advantage of using Shadow Copy is that block-level changes in files located in any directory on the volume can be monitored and backed up regardless of their location. [3] (wikipedia) Works Cited wikipedia. 12 February 09 <http://en.wikipedia.org/wiki/System_Restore>.