Delicious dessert blog

Married to Chocolate

Subscribe to Married to Chocolate: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Married to Chocolate: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories

B2B marketing is no easy task. There’s a constant battle between: do I target my exact buyer with account-based marketing or do I go after the larger audience in the hope that my end buyer finds me? The reality is that generating demand for your B2B service or product has become a juggling act of meshing different tactics across different mediums to increase marketing qualified leads (MQLs) and fill up your pipeline. Unfortunately, as you are doing your research there isn’t one simple resource that can supply you with new ideas and tactics to execute. The purpose of this piece is to give you actionable ways to execute a B2B marketing and demand generation strategy over a six month period. Part 1: Building Your Team Part 2: Understanding Your Audience Part 3: Focusing Your Brand Part 4: Content Marketing Part 5: Search Engine Optimization Part 6: Pay Per Click Advertis... (more)

How I Dated Three Amazing Cookies

I searched high and low for them and my standards were high. One main requirement: they had to be unique. Eventually I picked three, and of the three I picked one I love best. So, I broke up with the other two. Three Pretty Amazing Cookies 1. Red Velvet Cupcake Cookies, Byrd Cookie Company, $7/box You're an amazing cookie. Really, you are. Major props to the Byrd Cookie Company for introducing an awesome cupcake flavor into the cookie world. Plus, you look hot in pink and I like how your cream cheese-flavored sugar topping is cool on the tongue. The flavor comes close to the real thing. But why are you so tiny?? I would love to see a bigger, freshly-baked version of you one day that's soft and chewy--then maybe I won't feel bad for shelling out $7/box. Momofuku's Cornflake Marshmallow Chocolate Chip Cookie 2. Chocolate Walnut Chewies, Whole Foods $4.99 for 4 You had me ... (more)

Testing the Limits with Jack Margo SVP of Developer Shed, (part 1)

In recent months, we’ve ‘tested the limits’ with QA notables like  James Whittaker, Rosie Sherry and Andrew Muns.  This month, we’re jumping over to the dev side of the aisle by sitting down with Jack Margo, SVP of Internet Operations at Developer Shed . Developer Shed is owned by Ziff-Davis and manages a bunch of tech sites — many devoted to open source technologies and communities.  They serve millions of visitors per month, for every breed of developer. Topics range from troubleshooting an Apache web server to programming a complicated Java application to successfully marketing a website.  Their tagline says it all: “Tools for Geeks!” Today, we talk about what developers really think about testers, Jack’s take on Microsoft vs. open source, the reason he’s mad at Java, why net books are a fad, and which programming language has the biggest upside.  Check back to... (more)

Christmas Card ToonUps Now Available on Facebook

ToonUp Snippets, a multi-media company in Wayne, PA., is introducing animated holiday e-cards for Facebook in the nick of time for those who have yet to mail greeting cards. ToonUps e-cards let Facebook members select holiday-oriented, animated, cartoon videos; add any photo of themselves or their friends from their Facebook albums or their PCs; add personal messages, and send e-cards to multiple Facebook friends at once. To access the Christmas e-cards directly, a Facebook member can go to the Christmas Card ToonUps application. Members also can check out the Christmas Card ToonUps Fan Page click the “Become a Fan” button. By becoming a fan of Christmas Card ToonUps, Facebook members can be notified when new e-cards are available for future holidays. “We want to spread as much good cheer and good will as possible this holiday season, and what better way than send... (more)

Following Google's Lead on Security? Don't Forget to Encrypt Cookies

In the wake of Google’s revelation that its GMail service had been repeatedly attacked over the past year the search engine goliath announced it would be moving to HTTPS (HTTP over SSL) by default for all GMail connections. For users, nothing much changes except that all communication with GMail will be encrypted in transit using industry  standard SSL, regardless of whether they ask for it by specifying HTTPS as a protocol or not. In the industry we generally refer to this as an HTTPS redirect, and it’s often implemented by automatically rewriting the URI using a load balancing / application delivery solution. Widely regarding as a good idea, and I’m certainly not disagreeing with that opinion, SSL secures data exchanged between the client and the server by encrypting every request and response using a private/public key exchange. This is a Good Idea and the gener... (more)

DevCentral Top5 01/22/2010

Wow! What a whirlwind it's been the past few weeks. Between holidays and vacation and people traveling out of town, it's been an absolute zoo around here. Though I've been out the past week or so there has been an avalanche of content. I've hemmed and hawed and finally managed to slim my picks down to just five, though there are at least a dozen awesome things worth checking out on DevCentral in the past week or so. So don't be shy, get out there and poke around for yourself. For now, though, here are my top 5 picks for the week: v10.1 - The table Command - The Basics The new table command introduced in 10.1 is so hawesome and powerful it's hard for me to decide where to even begin describing the grandeur that is the table command. I've decided to begin at the beginning, and point y... (more)

REST API Developers Between a Rock and a Hard Place

A recent blog on EBPML.ORG entitled “REST 2010 - Where are We?” very aggressively stated: “REST is just a "NO WS-*" movement.” The arguments presented are definitely interesting but the most compelling point made is in the way that REST APIs are constructed, namely that unlike the “ideal” REST API described where HTTP methods are used to define action (verb) and the path the resource (noun), practical implementations of REST are using a strange combination of both actions (verbs) and resources (nouns) in URIs. What this does is simulate very closely SOA services, in which the endpoint is a service (resource) upon which an action (method) is invoked. In the case of SOAP the action is declared either in the HTTP header (old skool SOAPaction) or as part of the SOAP payload. So the argument that most REST APIs, in practice, are really little more than a NO WS-* API is fa... (more)

The IP Address - Identity Disconnect

The advent of virtualization brought about awareness of the need to decouple applications from IP addresses. The same holds true on the client side – perhaps even more so than in the data center. I could quote The Prisoner, but that would be so cliché, wouldn’t it? Instead, let me ask a question: just which IP address am I? Am I the one associated with the gateway that proxies for my mobile phone web access? Or am I the one that’s currently assigned to my laptop – the one that will change tomorrow because today I am in California and tomorrow I’ll be home? Or am I the one assigned to me when I’m connected via an SSL VPN to corporate headquarters? If you’re tying identity to IP addresses then you’d better be a psychiatrist in addition to your day job because most users have multiple IP address disorder. IP addresses are often utilized as part of an identification pr... (more)

When Everything Is a Threat Nothing Is a Threat

The current threat level is … the same as it was yesterday, and the day before, and will be tomorrow. We’ve all been in the airport before and heard the announcement. “The current threat level is orange. Blah blah blah blah yada yada whatever.” At least that’s what I hear today because I’ve become immune to the fact that “orange” means there’s a threat. There’s always a threat, it seems, and the announcement simply conveys what appears to many of us to be the “status quo.” We have effectively been desensitized to a “higher” threat level as it is now treated as nothing out of the ordinary. It is the norm, rather than something that grabs our attention. The same is true in the enterprise, where the threat level is always high. Although most organizations likely don’t have a “threat level announcement” the effect is the same: personnel and infrastructure alike treat... (more)

There Are Several I's in This Team

Posted a new article last night on configuring BIG-IP LTM VE In a VMWare Team environment with servers (DevCentral login required) and just wanted to let you all know. It’s a relatively complex topic, considering that the pieces all work well separately, but if you’ve configured networks in VMWare before it isn’t too bad to get going. I chose CENT-OS as the server OS because then if any of you decide you want to toy with the team, you can email me and I’ll get you a copy somehow. You’ll need VMWare, and a license key for the BIG-IP VM, but otherwise you should be able to mess with it as-is. I prefer though that you use the article, which tells you how to set up the same environment, so if you’ve already got BIG-IP LTM VE and VMWare, just follow the steps. For my part, I’d like to thank Jason and Lori for their JIT help with two different issues I ran into. They’re s... (more)

Turning the Pushdo Bot into the Push-oh-no-you-don’t Bot

Options to put a stop to the latest mutation of the Pushdo trojan The Pushdo bot is a malevolent little beast that is nothing new to Infosec professionals. What might be new, however, is that it recently changed its code and now creates junk SSL connections. Lots of them. I mean you are likely seeing an unexpected increase in traffic by several million hits spread out across several hundred thousand IP addresses. No you didn't read that wrong that is millions of hits and hundreds of thousands of IP addresses. This might be a big deal if you're used to only getting a few hundred or thousands of hits a day or you don't have unlimited bandwidth. -- ShadowServer 01/29/2010 Pushdo is usually classified as a "downloader" trojan - meaning its true purpose is to download and install additional malicious software. (SecureWorks, Analysis of a Modern Malware Distribution System... (more)