
February 28, 2013
Today I would like to give you an idea on how to implement a spam system that can reduce some kind of spam.
The problem
Sometimes a company or a politician, that does not respect the usual privacy policy, continues to send e-mails even if the user already tried to unsubscribe.
My postulates
- The people who usually send this kind of e-mail are not very familiar with how e-mail work or how the privacy policy works. Obviously there is the case in which they are malicious, but I prefer to think that the biggest part of these people are in the first two cases.
- These people probably will have issues removing a person from a mailing list, therefore they will tend not doing it, unless they have an advantage.
- Is really annoying sending an e-mail to 10 contacts and receive 8 mail-delivery-subsystem errors.
My approach
My approach is dividable in two directions that have to be implemented as features from the e-mail provider:
Read More 
February 26, 2013
This book does cover one of the hardest topic that are present in digital photography.
In fact, the photographies in the dark are the are the ones which are more frequently bad looking.
The book provides with a big amount of techniques and tips covering equipment, the actual taking of the image, and post-production.
A lot of these techniques and tips are easily found on photography specific magazines and articles, but a book grouping all these techniques is really good since it’s an organic and easy to found and read collection.
Also, unlike many articles, the book contains a lot of reasoning on the techniques so it’s not a mere how-to book.
Despite usually the author does provide this kind of enhancements over the how-to techniques, this is not always true, and - I think - this should be corrected/improved in the next version of the book.
Read More 
February 19, 2013
It’s Make! I think Make is one of the greatest, if not the greatest magazine available worldwide.
I think that this is a really cool number of Make.
As it usually happens to me, the part I like the most i the “Projects part”, in which I always find awesome ideas.
The article I liked the most is “Growing the Ghost” by Gabriel Nagmay.
This article speaks about the growing of the Bhut Jolokia, one of the world most powerful chili flavour.
I really liked it since I really like peppers and the author gave me a lot of ideas and tips on how to feed the peppers properly.
Read More 
February 12, 2013
This book initially shocked me. When I downloaded it, it was a 140 Mb so I thought it was full of drawings and comics. As soon as I opened the file I saw it was nothing I thought it would have been.
The book is mainly written (it can seem tautological but I think that’s right to point it out) with a lot of photos. I think the reason of the “hugeness” of the file is given by the photos. Speaking of them, I think that some of them are really useful to understand the concepts that are being explained in the text, while others can be removed without removing any value from the book.
Speaking of the authors, it’s really interesting to spend a few words on their biography. James H. Carrott is really interested in history, while Brian David Johnson is a futurist at Intel. Two people with such a different background have been able to create a very high-level book.
Read More 
February 5, 2013
When I read the first lines of the description “Ready to give your design skills a real boost? This eye-opening book helps you explore the design structure behind most of today’s hit video games. You’ll learn principles and practices for crafting games that generate emotionally charged experiences—a combination of elegant game mechanics, compelling fiction, and pace that fully immerses players.” on the O’Reilly website I thought it was a very well thought eye-catcher phrase to sell more books. Reading the book I understand that the phrase is 100% truthful.
This is a must-have book to anyone interested in the Theory of Games and in designing a game of any kind (not only computer game).
Read More 
January 29, 2013
I come to this book less than a month after reviewing the 70-410 Exam Ref.
As the title may suggest, this book is tailored to the preparation of the Microsoft 70-413 exam.
Speaking of the exam, I have to advice that the book does cover any exam objective, but does not cover every exam question.
The book is split into an introduction, 5 chapters and the index.
The first chapter helps to understand how to plan and deploy a server infrastructure. The other four are focused on the designing and implementation of the various components: network infrastructure services (chapter 2), network access services (chapter 3), Active Directory logical infrastructure (chapter 4) and Active Directory physical infrastructure (chapter 5).
A thing I liked about this book is the presence of questions (with detailed answers).
What is improvable for these question is the number.
I think they should put way more questions.
So, the questions, are a good idea not well implemented.
The only thing I hoped to see on this book but is missing is the emphasis on the security.
Read More 
January 22, 2013
When I’ve seen this book I had no idea about what I was going to find inside it.
As the title suggests, the book is pretty short (the PDF version count 161 pages) and so it’s really a few reading hours.
The book is divided in 5 chapters:
- Planning: this chapter covers the Business Plan and all the accessories planning. From my experience (and the author too) a good plan is mandatory if you don’t want see your great idea failing.
- Getting Financed: this short chapter (only 12 pages long) gives you some information and advice about the financial part of the company.
- Getting started: here you can find a lot of good advice and general information about marketing, patenting, copyright and other important things you should know.
- Staying alive: here you’ll find information and advice on taxes, press releases and other things that will keep your company going.
- When tomorrow becomes today: in this short chapter (only 5 pages long) are highlighted some differences between ordinary business and web business.
The book is written with no specific sector in mind. This book can be read and found useful to a person that wants to open a pub or a person that wants to open an IT start-up. If this is good because anyone will find something for him, is bad because no one will find all information she needs.
Read More 
January 15, 2013
Reading this book has helped me a lot understanding better how the A+ exam works. This book is tailored for the CompTIA A+ certification (and this led me to this book instead of another one, since I’m looking forward to take this certification).
I really liked the fact that every chapter does cover conclusively an argument. In this way, you can choose which arguments read based on your interests and your needs.
Read More 
January 8, 2013
This book is pretty short (258 pages long) but is very dense. It is divided into 6 chapters + one appendix.
For each atomic argument, the author does propose 1 to 3 True-or-False questions, their answer and the explanation. I did like the question-answer approach, since you understand immediately which is your level, therefore you can understand which parts you have to cover more and which less. What I did not liked at all about this structure is the layout. Every question is answered right below the question itself. I think this is a very bad approach, since is really hard to answer to a True-or-False question without looking at the answer that you know is there. I think they should have putted all the chapter questions and after all the chapter answers.
Read More 
January 3, 2013
Have you ever had to develop a script in UNIX that has to send an email?
If you have, probably you have used the “mail” function since this program is the standard program to send e-mails in UNIX environments if you are using the CLI (Command Line Interface).
The manual for mail reports this as mail usage prototype:
mail -r [sender] -s [subject] receiver-1[,receiver-2,...,receiver-n] > [File with the body]
I think all the parameters are pretty straightforward except the “File with the body” one. This has to be an ASCII file (ie: .txt) with the e-mail body content in the text-only mode.
Read More