Sorry Kim …

Reading Time: 2 minutes… Kim Cameron has linked and quoted my previous post on browser identification based on its characteristics available in public. There is EFF project which focus on checking how unique Your browser is against others based on public information. As it turned out Kim's browser has even higher score (19.29) in this test then my … Continue reading "Sorry Kim …"

One subnet to catch them all

Reading Time: 4 minutesThis post is probably first of TEC 2009 follow-up series, at least partially as I thought about covering it just before going to TEC. However Brian Desmond has touched this topic during his session so it is good reason to follow-up on it. This will be about usage of catch-all subnets in AD topology design. … Continue reading "One subnet to catch them all"

Identity in real life … and I don’t mean net ;)

Reading Time: 2 minutesDiscussions about identity and privacy are often treated as some sorts of theoretical debates. At least by so called “ordinary user” on the Internet. If we will think about adoption rate for technologies like OpenID or CardSpace we can get an impression that also people who are designing and developing web pages are not concerned … Continue reading "Identity in real life … and I don’t mean net ;)"

Windows Server 2008 on a laptop

Reading Time: 3 minutesThis topic is buzzing on the Internet for some time, result of this buzz is a web site which is related only for this topic – how to convert Windows Server 2008 in a client OS. To be honest, I was rather skeptical to this idea. I share the same concerns which Sander has expressed … Continue reading "Windows Server 2008 on a laptop"