Spend Matters Afternoon Coffee

Hi-ho pay Intel-o, Corruption's in the Dell

Dell's Shame: Intel Payola Propped Up Company's Earnings, SEC Says -- In the wake of the dot-com crash, Dell was the darling of the media and investment worlds. While other companies were struggling to survive, good old Dell was a paragon of success. Unlike its competitors, Dell used aggressive supply-chain management to deliver value to its investors. But now we know, courtesy of an SEC investigation, that the Dell secret sauce was payments from Intel that kept rival AMD's chips out of Dell boxes.

Put on your crown, Apple.

IPad King Due To Supply-Chain Stranglehold -- Even before Apple rivals have had a chance to debut their iPad alternatives, Computerworld's Jonny Evans is declaring the software giant king of the tablets. "Apple has already won," he writes. In slightly less stark terms, he adds: "Apple has stolen the tablet/netbook industry to the extent competitors face a pretty tough time in even manufacturing their 'iPad killers'." In other words, component suppliers -- of everything from flash memory to displays -- unable to keep up with Apple's demand won't have any time or resources to devote its rivals.

People of Illinois: Prepare to actually know what's going on with the DOT.

IDOT Launches Procurement Reform Website -- Illinois Transportation Secretary Gary Hannig and Illinois Department of Transportation (IDOT) Chief Procurement Officer Bill Grunloh today announced the launch of IDOT's new Procurement Reform website, designed to give the public an overview of changes in IDOT's procurement process. This website provides IDOT's business partners with a high-level view of the functional changes under way at IDOT, including new restrictions on vendors, subcontractor requirements, transparency provisions and disclosures regarding lobbyists.

Cloud code cracker.

WPA Cracker cracks WiFi passwords in the cloud -- WPA Cracker is a WiFi security compromiser in the cloud, running on a high-performance cluster. Send them a dump of captured network traffic and $35, and they will try 136 million passwords in 40 minutes, tops (for $17, they'll run the same attack at half speed) -- the same crack would take five days on a "contemporary desktop PC." They also have an extended, 284 million word dictionary that you can run for $55 in 40 minutes. They'll also use the same process to crack the passwords on encrypted ZIP archives.

Sheena Moore

Share on Procurious

Discuss this:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.