Cyberlocker Offered To Help Prosecute Users To Settle $34.8m Copyright Suit

A cyberlocker being sued for $34.8 million by an adult studio agreed in principle to a remarkable set of demands to settle a copyright infringement lawsuit. TorrentFreak has learned that file-hosting service Oron said it would turn over the IP addresses, banking details and email addresses of users alleged to have infringed copyright. The troubled cyberlocker then offered to assist plaintiff Liberty Media in civil prosecutions against its own customers.

via Cyberlocker Offered To Help Prosecute Users To Settle $34.8m Copyright Suit | TorrentFreak.

Telefonica Shows Off Firefox OS Prototype, Reveals Plans

Telefonica has shown a prototype phone using Firefox OS, the new open  HTML5-based operating system from Mozilla, and explained its reasons for adopting a fledgling OS in the face of huge competition from iPhone and Android.

Firefox OS will let the operator balance its “strategic dependence on Android” and allow for the creation of cheaper devices that offer the same user experience, claimed Telefonica Digital chairman and CEO Matthew Key, at an event in London.

via Telefonica Shows Off Firefox OS Prototype, Reveals Plans | TechWeekEurope UK.

Natural Language Toolkit — NLTK 2.0 documentation

NLTK is a leading platform for building Python programs to work with human language data. It provides easy-to-use interfaces to over 50 corpora and lexical resources such as WordNet, along with a suite of text processing libraries for classification, tokenization, stemming, tagging, parsing, and semantic reasoning.

via Natural Language Toolkit — NLTK 2.0 documentation.

From: http://www.cloudera.com/blog/2010/03/natural-language-processing-with-hadoop-and-python/

NLP is a highly interdisciplinary field of study comprising of concepts and ideas from Mathematics, Computer Science and Linguistics. Naturally occurring instances of human language, be it text or speech, are growing at an exponential rate given the popularity of the Web and social media. In addition, people are increasingly becoming more and more reliant on internet services to search, filter, process and, in some cases, even understand the subset of such instances they encounter in their daily lives.

NLP = Natural Language Processing

New Windows Server 2012 puts virtualization front and center

That’s no longer the case with Windows Server 2012. Both Standard and Datacenter editions will support the same set of features and the same hardware limits. Both will require CALs for authenticated server access. Both will be licensed on a per-socket-pair basis. The only difference will be in virtualization rights: Standard edition can be run in up to two virtual machines (in addition to the host operating system); Datacenter edition can be run in an unlimited number of virtual machines.

via New Windows Server 2012 puts virtualization front and center | Ars Technica.

The Pauls’ New Crusade: “Internet Freedom”

The manifesto, obtained yesterday by BuzzFeed, is titled “The Technology Revolution” and lays out an argument — in doomsday tones —for keeping the government entirely out of regulating anything online, and for leaving the private sector to shape the new online space.

via The Pauls’ New Crusade: “Internet Freedom”.

Let’s see here, the government gives away public rights of ways to run wires and fibre to large telecoms yet should have no say in making sure those public resources aren’t used to exploit the public through monopolistic practices?

Who paid off Ron Paul?

Apple Shutting Down iWork.com July 31

Apple’s shift to iCloud continues with all due haste. On the heels of shutting down MobileMe, its previous-generation cloud platform, the company has announced that the iWork.com public beta will end on July 31, 2012.

As of that date, “you will no longer be able to access your documents on the iWork.com site or view them on the Web,” reads Apple’s note on the matter, followed by a recommendation that anyone with documents on iWork download them to the desktop. Apple, ever conscious of those tiny details, also included a link in the note to a support article titled, “How to save your documents to a computer.”

via Apple Shutting Down iWork.com July 31.

SNESDev-RPi: A SNES-Adapter for the Raspberry Pi

There are several things that have to be done for this:

  • Decide for a stable working Linux distribution that provides access to the video and sound hardware.
  • Make the emulator(s) work.
  • Build a launch menu that allows for selecting the console and or the video game.
  • Build a hardware controller interface that allows you to connect real video game controllers.
  • Build a case that contains the Raspberry and the connector(s) for the controller(s).

via SNESDev-RPi: A SNES-Adapter for the Raspberry Pi | petRockBlog.

This leads us to the end of this post. So far, I did not speak about a case yet. Having some experience with other laser-cut cases I already started to design a case for the Raspberry that also contains ports for two SNES connectors. When this is finished I will write about it in another post.

Askozia

Askozia provides a highly intuitive telephone system for businesses. This is accomplished by combining our popular software AskoziaPBX with standard PC hardware or numerous embedded platforms. AskoziaPBX is incredibly easy to use, supports VoIP, ISDN, analog and GSM, is multilingual and costs less than a single VoIP phone.

via Askozia – Intuitive Telephony – Welcome!.

Call Flow Editor

A lot more than just an IVR tool. Completely integrated in Askozia’s web interface, you use drag-and-drop to build your own dial plans. Create highly sophisticated dial plans with Queues, If, Switch and Goto modules. Simply record announcements with your desk phone. Use the included templates if you don’t like to start from scratch. See more.

Choosing the Right Security Tools to Protect VMs

As enterprises move towards virtualizing more of their servers and data center infrastructure, protective technologies—plentiful and commonplace in the physical world—become few and far between. When your Windows Server or SQL database is running in a virtual machine (VM), you still need to protect it from viruses and other attacks while providing the same level of access controls you have for physical servers. Let’s look at the different approaches to protecting your VMs, as well as the major issues involved with deploying these technologies.

via Choosing the Right Security Tools to Protect VMs.

Anyone seriously invested in virtualization is going to need more than one protection product. So before you dive into this marketplace, you should carefully consider the types of protective features you really need at present, and where you want to end up in the next 12 months. You should look at covering five different functional areas: