Yahoo: Expect Ads On Tumblr To Ramp Up Significantly In 2014

In the conference call, Mayer made an early reference to how Tumblr would be able to make good use of Yahoo’s advertising technology, in ways that fit Tumblr’s so-far successful, image-based, quick-blogging, youth-oriented format — what she called “native advertising formats.”

via Yahoo: Expect Ads On Tumblr To Ramp Up Significantly In 2014 | TechCrunch.

When should you open source your code

As an organization or even individual there always seem to be questions when considering whether or not to make your project or code snippet open source. Many times, it starts with trying to figure out which license to use. But there are many other things to consider. We derived a list for you the next time you ask yourself: Should I open source my code?

via When should you open source your code? | opensource.com.

Connectify Launches Switchboard Kickstarter Project

Connectify Switchboard divides the user’s traffic between Wi-Fi, 3G/4G and Ethernet-based connections on a packet-by-packet basis. Even a single stream — such as a Netflix movie — can be split between two or three Internet connections for a higher resolution and faster buffering. This method promises 95 percent of the speed stemming from the combined Internet connection. Thus, users could see a single 19 Mbps stream when separate 10 Mbps and 10 Mbps connections are merged together.

via Connectify Launches Switchboard Kickstarter Project.

If It Ain’t Broke, Don’t Fix It: Ancient Computers in Use Today

Sparkler Filters of Conroe, Texas, prides itself on being a leader in the world of chemical process filtration. If you buy an automatic nutsche filter from them, though, they’ll enter your transaction on a “computer” that dates from 1948.

via If It Ain’t Broke, Don’t Fix It: Ancient Computers in Use Today | PCWorld.

The key punch isn’t the only massive accessory in Sparkler’s arsenal. The 402 also links to an IBM 514 Reproducing Punch, which has been broken for three years. When it works properly, the 514 spits out punched “summary cards,” which typically contain the output of the 402’s operation (such as sum totals) for later reuse. Sparkler stores all of its punched data cards–thousands and thousands of them–in stacks of boxes.

Inside Google’s Software-Defined Network

The concept of software-defined networking has captured the attention of network engineers and the trade press, but very few examples of a live SDN implementation exist. One of those few is Google. The search giant presented details about its SDN network at the 2013 Open Networking Summit. Let’s take a look.

via Inside Google’s Software-Defined Network – Network Computing.

Newegg nukes “corporate troll” Alcatel in third patent appeal win this year

At trial in East Texas Cheng took the stand to tell Newegg’s story. Alcatel-Lucent’s corporate representative, at the heart of its massive licensing campaign, couldn’t even name the technology or the patents it was suing Newegg over.

via Newegg nukes “corporate troll” Alcatel in third patent appeal win this year | Ars Technica.

This is big win #2 in recent times for Newegg.  Here’s their win against the shopping cart patent.

How Twitter Rebuilt Google’s Secret Weapon

Borg is a way of efficiently parceling work across Google’s vast fleet of computer servers, and according to Wilkes, the system is so effective, it has probably saved Google the cost of building an extra data center. Yes, an entire data center. That may seem like something from another world — and in a way, it is — but the new-age hardware and software that Google builds to run its enormous online empire usually trickles down to the rest of the web. And Borg is no exception.

via Return of the Borg: How Twitter Rebuilt Google’s Secret Weapon | Wired Enterprise | Wired.com.

At Twitter, a small team of engineers has built a similar system using a software platform originally developed by researchers at the University of California at Berkeley. Known as Mesos, this software platform is open source — meaning it’s freely available to anyone — and it’s gradually spreading to other operations as well.

New Skype malware spreading at 2,000 clicks per hour makes money by using victims’ machines to mine Bitcoins

To avoid this threat and others like it, don’t click on random links you receive on Skype. You’ll be doing yourself a favor, helping stop the spread of malware, and ensuring criminals get a smaller pay day.

via New Skype malware spreading at 2,000 clicks per hour makes money by using victims’ machines to mine Bitcoins – The Next Web.

At least it’s just bitcoin mining and not stealing credentials.  This is why I always have three performance monitors on my dashboard; CPU usage, bandwidth, and memory.  With this piece of malware you would immediately see a problem because the CPU monitor shouldn’t be full of color.  Then simply take the PC offline and do some investigation or bring it to someone.  On Windows machines there’s Perfmon to look at these performance monitors.  Just like a car has its fuel and temperature guages, computer users would be far more secure getting used to performance monitor guages.  I often wonder why distributors don’t display these somewhere as a default option much like they have for the clock.

Intel’s Haswell Takes A Major Step Forward; Integrates Voltage Regulator

Haswell incorporates a refined VRM on-die that allows for multiple voltage rails and controls voltage for the CPU, on-die GPU, system I/O, integrated memory controller, as well as several other functions. Intel refers to this as a FIVR (Fully Integrated Voltage Regulator), and it apparently eliminates voltage ripple and is significantly more efficient than your traditional motherboard VRM. Added bonus? It’s 1/50th the size.

via Intel’s Haswell Takes A Major Step Forward; Integrates Voltage Regulator – HotHardware.