Delicious dessert blog

Married to Chocolate

Subscribe to Married to Chocolate: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Married to Chocolate: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories

The personal and professional lives of your customers and other consumers around the world increasingly take place online in the digital realm. It’s therefore not a surprise that data privacy is now such an urgent topic of concern. Countries around the globe have adopted various regulations to ensure the protection of their citizens’ personal information, and more regulation is certainly on the way. Your responsibilities for ensuring data privacy As a software vendor, it’s key that you be familiar with all applicable laws in your region and that you comply with these regulations. For us at Dynatrace, this means that we must ensure that our real user monitoring capabilities are implemented in a way that doesn’t compromise the privacy of your personal data or the data of your customers. Browser cookies Cookie usage is an important aspect of data privacy. Certain governm... (more)

Microsoft Exchange 2010: HELO New Architecture

Microsoft has made some fairly substantial changes to the core architecture of Exchange 2010. Given that messaging can only be described as business critical today, it’s no surprise that many new aspects of Exchange 2010 and in particular its new architecture are designed to improve availability and management of its messaging systems. Exchange 2010 includes many changes to its core architecture. In Exchange 2010, new features such as incremental deployment, mailbox database copies, and database availability groups work with other features such as shadow redundancy and transport dumpster to provide a new, unified platform for high availability and site resilience.[1] The core change in architecture will be felt not just by server and Exchange administrators, but by network and application delivery network administrators as well. With Exchange 2010 users no longer co... (more)

What Is Your Favorite Case Study? Why Do You Like It?

Case studies come in all shapes and forms. Our Panel of Case Study Experts have written and reviewed thousands of case studies over the years. Which case study stands out in their mind? We have invited Case Study Experts to answer this query: "Give one example of your most favorite case study and why you like it". Cindy King Blog CindyKing Twitter CindyKing “Highlight business impact” Cindy King's Bio Cindy King is a Cross-Cultural Marketer & International Sales Specialist based in France.  She uses her dual background in sales & marketing, in international business development, to help businesses improve their international sales conversion. She is also adept at content marketing, international web marketing and social media marketing. Cindy King's Tip My favorite case study is a blog post on Social Media Examiner: Social Media Marketing Lowers Acquisition Costs 39 P... (more)

The Application Delivery Spell Book

The long, lost application delivery spell compendium has been found! Its once hidden, arcane knowledge is slowly being translated for the good of all web applications. Luckily, you don’t have to be Elminster or Gandalf or to cast this spell over your infrastructure Detect Invisible (Application) Stalkers School of Magic: Abjuration (Protective Spells) Components: Somatic (requires gestures), Material (requires physical component) Casting Time: special Range: Layers 3-7 Area: global Duration: Until discharged Saving Throw: Special Spell Resistance: No Invisible (application) stalkers are creatures native to the Internet. They sometimes serve miscreants, corporate spies, and script kiddies, who summon them to perform attacks against specific targets. A summoned invisible stalker undertakes the form of a legitimate application... (more)

DevCentral Top5 01/22/2010

Wow! What a whirlwind it's been the past few weeks. Between holidays and vacation and people traveling out of town, it's been an absolute zoo around here. Though I've been out the past week or so there has been an avalanche of content. I've hemmed and hawed and finally managed to slim my picks down to just five, though there are at least a dozen awesome things worth checking out on DevCentral in the past week or so. So don't be shy, get out there and poke around for yourself. For now, though, here are my top 5 picks for the week: v10.1 - The table Command - The Basics The new table command introduced in 10.1 is so hawesome and powerful it's hard for me to decide where to even begin describing the grandeur that is the table command. I've decided to begin at the beginning, and point y... (more)

There Are Several I's in This Team

Posted a new article last night on configuring BIG-IP LTM VE In a VMWare Team environment with servers (DevCentral login required) and just wanted to let you all know. It’s a relatively complex topic, considering that the pieces all work well separately, but if you’ve configured networks in VMWare before it isn’t too bad to get going. I chose CENT-OS as the server OS because then if any of you decide you want to toy with the team, you can email me and I’ll get you a copy somehow. You’ll need VMWare, and a license key for the BIG-IP VM, but otherwise you should be able to mess with it as-is. I prefer though that you use the article, which tells you how to set up the same environment, so if you’ve already got BIG-IP LTM VE and VMWare, just follow the steps. For my part, I’d like to thank Jason and Lori for their JIT help with two different issues I ran into. They’re s... (more)

Are You Scrubbing the Twitter Stream on Your Web Site?

Web 2.0 is as much about integration as it is interactivity. Thus it’s no surprise that an increasing number of organizations are including a feed of their recent Twitter activity on their site. But like any user generated content, and it is user generated after all, there’s a potential risk to the organization and its visitors from integrating such content without validation. A recent political effort in the UK included launching a web site that integrated a live Twitter stream based on a particular hashtag. That’s a fairly common practice, nothing to get excited about. What happened, however, is something we should get excited about and pay close attention to because as Twitter streams continue to flow into more and more web sites it is likely to happen again. Essentially the Twitter stream was corrupted. Folks figured out that if they tweeted JavaScript instead... (more)

Practical ARM Exploitation Course Offered 9 Oct in Sterling VA

Friends and associates at Kyrus (  recently announced they will be hosting Practical ARM Exploitation Course.  This is the extremely popular course maintained by Stephen C. Lawler and Stephen A. Ridley. Exploitation is harder and a bit more nuanced today than it was in the past with the advent of protection mechanisms like XN, ASLR, stack cookies, etc. As such we aim to teach exploitation on ARM under the real-world circumstances in which the exploit developer will encounter (and have to circumvent) these protection mechanisms. The course materials focus on advanced exploitation topics (circumventing protection mechanisms) using Linux as the platform as a basis to learn the ARM architecture but with the obvious applications being platforms running on mobile phones, tablets, embedded devices, etc. Ideally, students with some previous exploitation expe... (more)

OSUG's 20th Birthday!

Normal 0 false false false EN-CA X-NONE X-NONE MicrosoftInternetExplorer4     The Ottawa Sybase User Group has been in existence since 1992 and was formerly known as the Ottawa PowerBuilder User Group until its current name change in 2003. OSUG's mission is to create a Sybase community in the National Capital of Canada where users can share knowledge, experiences, and best practices on various Sybase products. The group is composed of various IT members that represent Database, Design, Architecture, Application Server, Mobility and Development Tool product lines. The strongest representation currently is in the PowerBuilder area as there were (in its “hay day”) over 4,000 licenses of the PowerBuilder product alone in the Canadian Federal Government. Normal 0 false false false EN-CA X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {ms... (more)

AdTheorent Introduces Traktion(TM) Post-Click Tracking for Mobile Advertising

NEW YORK, NY -- (Marketwire) -- 11/05/12 -- AdTheorent, Inc. (, the only intelligent Real Time Bidding (RTB)-enabled mobile ad network, today announced the recent deployment of its Traktion™ tracking and analytics platform. Traktion offers advertisers a superior method for tracking post-click behavior across a wide variety of mobile advertising tactics, delivered in a manner that is technically seamless to mobile users and protective of their privacy. With the rise of mobile web browsing on smartphones and tablets, advertisers have scrambled to replicate the powerful analytics that drive traditional and digital marketing. However, the technology involved in delivering and tracking mobile advertising is much different, and presents new obstacles. Unlike traditional Internet browsers, most mobile web browsers don't use cookies (small text files use... (more)

Girl Scouts Go Mobile: Cookie App Now Available

Thin Mints have gone mobile. Even though it’s the largest girl-led business enterprise in the world, with a $750 million business, the Girl Scouts’ longtime tradition of selling cookies has remained one of the more analog operations around. But, as of last week, the new Girl Scout cookie app is now available for Apple iOS and Google Android smartphones. It shows users how to buy cookies from scouts, meet all 16 types of cookies and, most importantly, find the nearest Samoa by letting you know when and where the closest cookie booth is set up. “We know that people love these tasty treats, but we really want them to realize that these girls learn some incredible skills,” said Girl Scout USA spokeswoman Michelle Tompkins. More than just satisfying your sweet tooth, Tompkins said, buying a box of cookies supports the Girl Scout cookie program. Read the full story at Al... (more)