Netlog is the online community for more than 95 million members.
via Netlog.
Netlog is the online community for more than 95 million members.
via Netlog.
MySQL :: MySQL Cluster 7.2 GA Released, Delivers 1 BILLION Queries per Minute.
70x Higher JOIN Performance, NoSQL Key-Value API & Cross Data Center Sharding with Replication
Oracle is delighted to announce the immediate availability of the production-ready, GA release of MySQL Cluster 7.2, available for download under the GPL, and as part of the commercial MySQL Cluster Carrier Grade Edition, including management tools, product certifications and 24×7 global support.
“This makes the future of SSDs cloudy: While the growing capacity of SSDs and high IOP rates will make them attractive for many applications, the reduction in performance that is necessary to increase capacity while keeping costs in check may make it difficult for SSDs to scale as a viable technology for some applications,” Grupp, lead author of the study, wrote in a research paper.
via SSDs have a ‘bleak’ future, researchers say – Computerworld.
Because SSDs have no moving parts, the time needed to write and read data is more than 100 times faster than that of hard disk drives that use read-write heads on actuator arms to find data on a spinning platter. But as NAND flash circuitry continues to shrink in size, the performance gap with hard disk drives will become more narrow, Grupp said.
yum install php-xml
via PHP Fatal error: Class ‘DOMDocument’ not found in bla..bla.. | :: HawkEYE Expression ::.
Or yum install php53-xml
We have been able to remotely compromise about 0.4% of all the public keys used for SSL web site security. The keys we were able to compromise were generated incorrectly–using predictable “random” numbers that were sometimes repeated. There were two kinds of problems: keys that were generated with predictable randomness, and a subset of these, where the lack of randomness allows a remote attacker to efficiently factor the public key and obtain the private key. With the private key, an attacker can impersonate a web site or possibly decrypt encrypted traffic to that web site. We’ve developed a tool that can factor these keys and give us the private keys to all the hosts vulnerable to this attack on the Internet in only a few hours.
The last time I was at this blog was many years ago when he showed how to hack electronic voting machines.
Firstly, take an iPad and restore it to factory settings. We used spare iPads for this but you could equally back up and erase the pupil’s own iPad for the duration of the exams.
Next, install PDF Expert from the App Store.
via Fraser Speirs – Blog – Digital Exams on the iPad.
Interesting.
This may present some messaging problems for the big commercial Linux vendors, by the way: if the distribution underneath becomes less important, then Red Hat Enterprise Linux RHEL and SUSE Enterprise Linux Server may soon have a serious fight on their hands. In the past, one of the big differentiators has been that these “big” distros provide solid infrastructures in which business applications can be developed. If this Linux-is-Linux-is-Linux idea takes root, that will undercut a big marketing tool for Red Hat and SUSE Linux.
via Move to mobile will bring big changes for Linux | ITworld.
But I don’t think that’s going to last. The Linux community may be cocky now, but let’s think through this Linux-is-everywhere scenario a bit. If the operating system becomes just a background component that runs more web than native apps and app development for the platform itself becomes de-emphasized, then the obvious question then becomes: what does it matter it it’s Linux running on the operating system layer?
You still need a reliable OS to run the web servers which is the space RHEL and SUSE enterprise sell into.
Blue box is a nice front end gui for Freeswitch.