Category: Syndicated
-
auto post jm.org (weekly)
-
YouTube – Using Influence in Understanding Complex Systems
Professor Alex Aiken, from Stanford, gives an interesting talk about finding anomalous data and being able to correlate anomalies.
-
auto post jm.org (weekly)
-
nice reference
-
-
auto post jm.org (weekly)
Posted from Diigo. The rest of my favorite links are here. -
auto post jm.org (weekly)
Posted from Diigo. The rest of my favorite links are here. -
auto post jm.org (weekly)
-
MUNI Community Vocabulary Ontology | A Community Instance of theOpen Semantic Framework
-
Puppet Labs: The Leading Open Source Data Center Automation Solution
-
Parallel NFS: breaking the NFS performance bottleneck | Panasas
-
Openfiler — Openfiler – Open Source Storage Management Appliance
-
KVM is a Linux-based hypervisor
-
Eucalyptus | Your environment. Our industry leading cloud computing software.
Eucalyptus is an EC2 clone – elastic computing
-
ganeti – Project Hosting on Google Code
“Ganeti is a cluster virtual server management software tool built on top of existing virtualization technologies such as Xen or KVM and other Open Source software.”
-
-
What is ‘Open Cloud’?
I’ve read a bit of angst about cloud lock-in, a lot of weed pulling in the form of interoperability standards for the cloud, and a manifesto or two about ‘Open Cloud’. And in between, I’ve seen lots of interesting new tools for cloud computing, and lots of narratives about how the tools, combined with the formalization of use cases, pave the way for open clouds.
But what, exactly, does “Open Cloud” mean? And what role does open source play? Jim Zemlin, Executive Director of the Linux Foundation, likes to say that open source and the cloud go together like peanut butter and chocolate. But does open source necessarily mean open cloud, and vice-versa?
Read the complete article on OStatic.
-
Schneier Makes Uncorroborated Claims About Google Hack
Bruce Schneier has built a successful career as a computer security guru – one who gets it right most of the time and has a wonderful ability to translate security concerns to the layman. But sometimes an author’s great reputation makes him less likely to criticize his own work, and the editorial staff of whatever media organization he happens to be writing for, in this case CNN, lazy.So when Bruce Schneier asserts that Chinese hackers exploited a government-mandated backdoor to abscond with information on human rights activists, you kind of take it for granted that there is, in fact, a back door that they exploited. Except when there’s not. Or there might be, but Schneier unfortunately offers few facts and cites no sources, and I haven’t found any other report to corroborate his assertion.Read the article:
in reference to:“Schneier Makes Uncorroborated Claims About Google Hack”- Schneier Makes Uncorroborated Claims About Google Hack (view on Google Sidewiki)