- Google Revealed: The IT Strategy That Makes It Work by Thomas Claburn (Management News by InformationWeek)
Fascinating article on google's unconventional buisness practices. Google is different. And it's different not only because its thinking is original and its applications unique--witness search queries morphed into a lobby display of bursting color--but because the company's unconventional IT strategy makes it so. Commodity hardware and free software hardly seem like the seeds of an empire, yet Google has turned them into an unmatched distributed computing platform that supports its wildly popular search engine, plus a burgeoning number of applications. We used to call them consumer applications, but Google changed that. Businesses also use them because, well, Google is different.
A unique mix of internally developed software, open source, made-to-order hardware, and people management is the secret behind the search engine.
brin douglas google googles management merrill sergey strategy technology
in Computing > World Wide Web > Google with applications buisness empire google google.com jelly lobby practice software strategy thinking unconventional
- How to install ANYTHING in Ubuntu!
Having problems installing something on your new Ubuntu operating system? "Where's the EXE?", "Where do I need to extract this to?", "How do I run it?", "Where did it go?" - have you been thinking questions like these? Don't worry, installing software, themes and other things on Ubuntu is actually very easy! This guide will help you understand with screenshots, instructional videos and to-the-point language.
in Computing > Linux > Howto with computer computing extract guide how howto installing instructional linux operating problems questions screenshots softare software system themes thinking to-the-point tutoraial ubuntu videos by 7 users
- Is it Time to Start Encrypting Your E-mail?
Longing for a little privacy? Thinking it might be time to start encrypting your e-mail? This article looks at the pros and cons, examines e-mail encryption technologies, and provides some tips for getting the most out of e-mail encryption.
Longing for a little privacy? Thinking it might be time to start encrypting your e-mail? This article looks at the pros and cons, examines e-mail encryption technologies, and provides some tips for getting the most out of e-mail encryption.
digital e-mail email encryption good hushmail key pgp pretty privacy private public thawte
in Computing > Tutorials/walkthrough's/howto's with computing howtos little longing privacy thinking tutorials walkthroughs
thinking from all users