1/27/08

How Can Software be Perfect?

Add to iTunes | Add to YouTube | Add to Google | RSS Feed What do we need in order to have “perfect” software? ... from getting her identity stolen or her computer infected with <strong class="keyword">malware</strong>. Virus-like behavior shouldn’<br /><br />Posted in <strong><a rel="nofollow" target="_blank" href="http://technorati.com/blogs/http://chris.pirillo.com">Chris Pirillo</a></strong> (<a rel="nofollow" target="_blank" href="http://technorati.com/search/http%3A%2F%2Fchris.pirillo.com" style="color:#390;"><img src="http://static.technorati.com/images/bubble_h11.gif" alt="View Technorati URL search" style="border:none;"/> 5,993 links from 1,838 sites</a>) by <a rel="nofollow" class="byline" title="View pirillo's profile">pirillo</a><br /><br /><img width="1" height="1" src="http://static.technorati.com/y/664476632.gif?anM9MCZyZWY9YXBpfC9zZWFyY2g/cXVlcnk9bWFsd2FyZSZsYW5ndWFnZT1lbiZrZXk9YmYyMjQ5ZjVhOTRmMzY1MmZjNjc0ODBjZWExYjg0MjQmZm9ybWF0PXJzc3wyMHxodHRwOi8vY2hyaXMucGlyaWxsby5jb20vMjAwOC8wMS8yNy9ob3ctY2FuLXNvZnR3YXJlLWJlLXBlcmZlY3QvJnZpc2l0b3JpZD0tJnVzZXJpZD0tJnNlc3Npb25pZD03YzU4ZDkzNzRiZjNkZDU0ZmI5OTJjNGM2YjQxNjMxMCZ1c2VyY2xhc3M9MSZhYmNsYXNzPWImYWJzd2l0Y2g9OCZtZW1iZXI9LQ=="/>