Fault Tolerant Design, True Privacy and Efficient Versioning

Fault Tolerant Design, True Privacy and Efficient Versioning – SpiderOak.com.

Speaking simply in terms of technical proficiency, there exists a dramatic difference between SpiderOak and other back up systems – both online backup and offline solutions. Below we highlight these differences through a discussion of our philosophy and approach.

Oracle thinks you can copyright a programming language, Google disagrees

Google then goes on to explain that “a given set of statements or instructions may be protected, but the protection does not extend to the method of operation or system — the programming language — by which they are understood by the computer.” Google is arguing that a computer language is “inherently a utilitarian, nonprotectable means by which computers operate” and merely provides the structure, selection and organization of the software.

via Oracle thinks you can copyright a programming language, Google disagrees | The Verge.

Voxer

Turn your phone into a Walkie Talkie

Voxer.

Hmmmm. Again with the walkie talkies.

Voxer is a Walkie Talkie application for smartphones. Voxer lets you send instant audio, text and photo messages to your friends (one or more!). Messages stream live as you talk and your friends join you live or listen later.

Voxer is available for iPhone, iPod touch, iPad and Android devices.

.epub eBooks Tutorial – Part 1: Format Your Source Content

Speaking of CSS, that’s where you want to do all your styling. It’s the preferred way to stylize things in both XHTML and the ePub standard. (There are a very few reader programs out there that won’t recognize CSS. Mot of them do by now though, and if you keep the HTML to the basics, the book will still be readable if the reader program doesn’t recognize CSS.

via .epub eBooks Tutorial – Part 1: Format Your Source Content.

Mosh: the mobile shell

Remote terminal application that allows roaming, supports intermittent connectivity, and provides intelligent local echo and line editing of user keystrokes.

Mosh is a replacement for SSH. It’s more robust and responsive, especially over Wi-Fi, cellular, and long-distance links.

Mosh is free software, available for GNU/Linux, FreeBSD, and Mac OS X.

via Mosh: the mobile shell.

HP Ships Network Switches With Malware Infected Flash Cards

HP has warned of a security vulnerability associated with its ProCurve 5400 zl switches that contain compact flash cards that the company says may be infected with malware. The company warned that using one of the infected compact flash cards in question on computer could result in the system being compromised.

via HP Ships Network Switches With Malware Infected Flash Cards | SecurityWeek.Com.

In March 2012, a consortium of experts published a preview of standards meant to improve the security of the global supply chain for commercial software and hardware products. The standards are the work of The Open Group, and are supported by companies ranging from Boeing to Oracle to IBM. The document has been dubbed the Open Trusted Technology Provider Standard (O-TTPS) Snapshot. The standards are being aimed at providers, suppliers and integrators with the goal of enhancing the security of the supply chain and allowing customers to differentiate between providers who adopt the standard’s practices and those who don’t.

Amazon experimenting with front-lit display for next Kindle

With the display and battery life being such strong selling points, you may be surprised to hear Amazon is experimenting with adding a light source. In fact, Devin Coldewey of TechCrunch has actually seen a prototype new Kindle in action using a front-lit lighting method.

The result? Apparently the E Ink display is lit very evenly and softly. So this isn’t the same type of light you get from a typical tablet LCD unit. He describes it as a “blue-white glow” which may seem a bit peculiar, but could work when just viewing text and on a display lit from the front.

via Amazon experimenting with front-lit display for next Kindle – New Tech Gadgets & Electronic Devices | Geek.com.

Everything You Wanted to Know About Data Mining but Were Afraid to Ask

With data mining it is possible to let the data itself determine the groups. This is one of the black-box type of algorithms that are hard to understand. But in a simple example – again with purchasing behavior – we can imagine that the purchasing habits of different hobbyists would look quite different from each other: gardeners, fishermen and model airplane enthusiasts would all be quite distinct. Machine learning algorithms can detect all of the different subgroups within a dataset that differ significantly from each other.

via Everything You Wanted to Know About Data Mining but Were Afraid to Ask – Alexander Furnas – Technology – The Atlantic.