Skip to main content

Home/ Future of the Web/ Group items matching "containers" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Page 2 - The Woman Behind the Microsoft Cloud - 0 views

  • One Microsoft data center that is not getting a lot of attention is one the company is building in Chicago, which is the Microsoft's first container-based facility, Chrapaty said, showing a mock-up of a data center container on an 18-wheeler that could be unloaded and added to an existing facility to add capacity.
  • Moreover, Chrapaty said the Chicago data center is the first Microsoft data center to use shipping containers as a primary server packaging and deployment unit. When both phases of the data center are complete, it will total more than 707,000 square feet on a 16-acre site. It will hold hundreds of thousands of servers to deliver on the Microsoft software-plus-services initiative.  The company claims the Chicago facility will be one of the largest data centers in the world and the largest deployment of the use of containers to date.
Gonzalo San Gil, PhD.

What is Docker? How Does it Work? - DevopsCube [# ! + Note] - 0 views

  •  
    "By devopscube - December, 24th 2014 [# ! it's important to get it...] Before understanding Docker, lets have a look at Linux containers." [+ http://devopscube.com/getting-started-with-docker-contianers/]
  •  
    "By devopscube - December, 24th 2014 Before understanding Docker, lets have a look at Linux containers."
  •  
    "By devopscube - December, 24th 2014 [# ! it's important to get it...] Before understanding Docker, lets have a look at Linux containers." [+ http://devopscube.com/getting-started-with-docker-contianers/]
Gonzalo San Gil, PhD.

How to set up networking between Docker containers - Xmodulo - 1 views

  •  
    "Last updated on March 20, 2015 Authored by Dan Nanni 2 Comments As you may be aware, Docker container technology has emerged as a viable lightweight alternative to full-blown virtualization."
Gary Edwards

Wolfram Alpha is Coming -- and It Could be as Important as Google | Twine - 0 views

  • The first question was could (or even should) Wolfram Alpha be built using the Semantic Web in some manner, rather than (or as well as) the Mathematica engine it is currently built on. Is anything missed by not building it with Semantic Web's languages (RDF, OWL, Sparql, etc.)? The answer is that there is no reason that one MUST use the Semantic Web stack to build something like Wolfram Alpha. In fact, in my opinion it would be far too difficult to try to explicitly represent everything Wolfram Alpha knows and can compute using OWL ontologies. It is too wide a range of human knowledge and giant OWL ontologies are just too difficult to build and curate.
  • However for the internal knowledge representation and reasoning that takes places in the system, it appears Wolfram has found a pragmatic and efficient representation of his own, and I don't think he needs the Semantic Web at that level. It seems to be doing just fine without it. Wolfram Alpha is built on hand-curated knowledge and expertise. Wolfram and his team have somehow figured out a way to make that practical where all others who have tried this have failed to achieve their goals. The task is gargantuan -- there is just so much diverse knowledge in the world. Representing even a small segment of it formally turns out to be extremely difficult and time-consuming.
  • It has generally not been considered feasible for any one group to hand-curate all knowledge about every subject. This is why the Semantic Web was invented -- by enabling everyone to curate their own knowledge about their own documents and topics in parallel, in principle at least, more knowledge could be represented and shared in less time by more people -- in an interoperable manner. At least that is the vision of the Semantic Web.
  • ...1 more annotation...
  • Where Google is a system for FINDING things that we as a civilization collectively publish, Wolfram Alpha is for ANSWERING questions about what we as a civilization collectively know. It's the next step in the distribution of knowledge and intelligence around the world -- a new leap in the intelligence of our collective "Global Brain." And like any big next-step, Wolfram Alpha works in a new way -- it computes answers instead of just looking them up.
  •  
    A Computational Knowledge Engine for the Web In a nutshell, Wolfram and his team have built what he calls a "computational knowledge engine" for the Web. OK, so what does that really mean? Basically it means that you can ask it factual questions and it computes answers for you. It doesn't simply return documents that (might) contain the answers, like Google does, and it isn't just a giant database of knowledge, like the Wikipedia. It doesn't simply parse natural language and then use that to retrieve documents, like Powerset, for example. Instead, Wolfram Alpha actually computes the answers to a wide range of questions -- like questions that have factual answers such as "What country is Timbuktu in?" or "How many protons are in a hydrogen atom?" or "What is the average rainfall in Seattle this month?," "What is the 300th digit of Pi?," "where is the ISS?" or "When was GOOG worth more than $300?" Think about that for a minute. It computes the answers. Wolfram Alpha doesn't simply contain huge amounts of manually entered pairs of questions and answers, nor does it search for answers in a database of facts. Instead, it understands and then computes answers to certain kinds of questions.
Paul Merrell

EU files antitrust charges against Amazon over use of data | The Seattle Times - 1 views

  • European Union regulators filed antitrust charges Tuesday against Amazon, accusing the e-commerce giant of using its access to data from companies that sell products on its platform to gain an unfair advantage over them.The charges, filed two years after the bloc’s antitrust enforcer began looking into the company, are the latest effort by European regulators to curb the power of big technology companies. Margrethe Vestager, the EU commissioner in charge of competition issues, has slapped Google with antitrust fines totaling nearly $10 billion and opened twin antitrust investigations this summer into Apple. The EU’s executive Commission also opened a second investigation Tuesday into whether Amazon favors product offers and merchants that use its own logistics and delivery system.
  • The EU investigation found that Amazon is accessing and analyzing real-time data from other vendors that sell goods on its platform to help it decide which new products of its own to launch and how to price and market them. That “appears to distort genuine competition,” Vestager said.Investigators focused on that practice in France and Germany, the company’s two biggest markets in the EU, but Vestager didn’t give specific examples of merchants affected by Amazon’s behavior.The stakes have risen for retailers as many European countries have shut nonessential shops temporarily to try to contain the coronavirus pandemic, pushing more shopping online, where Amazon is a major presence. Advertising Skip AdSkip AdSkip Ad Amazon faces a possible fine of up to 10% of its annual worldwide revenue. That could amount to as much as $28 billion, based on its 2019 earnings. The Seattle-based company rejected the accusations.
Paul Merrell

Long-Secret Stingray Manuals Detail How Police Can Spy on Phones - 0 views

  • Harris Corp.’s Stingray surveillance device has been one of the most closely guarded secrets in law enforcement for more than 15 years. The company and its police clients across the United States have fought to keep information about the mobile phone-monitoring boxes from the public against which they are used. The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages and meticulously detailing how to create a cellular surveillance dragnet. Harris has fought to keep its surveillance equipment, which carries price tags in the low six figures, hidden from both privacy activists and the general public, arguing that information about the gear could help criminals. Accordingly, an older Stingray manual released under the Freedom of Information Act to news website TheBlot.com last year was almost completely redacted. So too have law enforcement agencies at every level, across the country, evaded almost all attempts to learn how and why these extremely powerful tools are being used — though court battles have made it clear Stingrays are often deployed without any warrant. The San Bernardino Sheriff’s Department alone has snooped via Stingray, sans warrant, over 300 times.
  • The documents described and linked below, instruction manuals for the software used by Stingray operators, were provided to The Intercept as part of a larger cache believed to have originated with the Florida Department of Law Enforcement. Two of them contain a “distribution warning” saying they contain “Proprietary Information and the release of this document and the information contained herein is prohibited to the fullest extent allowable by law.”  Although “Stingray” has become a catch-all name for devices of its kind, often referred to as “IMSI catchers,” the manuals include instructions for a range of other Harris surveillance boxes, including the Hailstorm, ArrowHead, AmberJack, and KingFish. They make clear the capability of those devices and the Stingray II to spy on cellphones by, at minimum, tracking their connection to the simulated tower, information about their location, and certain “over the air” electronic messages sent to and from them. Wessler added that parts of the manuals make specific reference to permanently storing this data, something that American law enforcement has denied doing in the past.
  • One piece of Windows software used to control Harris’s spy boxes, software that appears to be sold under the name “Gemini,” allows police to track phones across 2G, 3G, and LTE networks. Another Harris app, “iDen Controller,” provides a litany of fine-grained options for tracking phones. A law enforcement agent using these pieces of software along with Harris hardware could not only track a large number of phones as they moved throughout a city but could also apply nicknames to certain phones to keep track of them in the future. The manual describing how to operate iDEN, the lengthiest document of the four at 156 pages, uses an example of a target (called a “subscriber”) tagged alternately as Green Boy and Green Ben:
  • ...2 more annotations...
  • In order to maintain an uninterrupted connection to a target’s phone, the Harris software also offers the option of intentionally degrading (or “redirecting”) someone’s phone onto an inferior network, for example, knocking a connection from LTE to 2G:
  • A video of the Gemini software installed on a personal computer, obtained by The Intercept and embedded below, provides not only an extensive demonstration of the app but also underlines how accessible the mass surveillance code can be: Installing a complete warrantless surveillance suite is no more complicated than installing Skype. Indeed, software such as Photoshop or Microsoft Office, which require a registration key or some other proof of ownership, are more strictly controlled by their makers than software designed for cellular interception.
Gonzalo San Gil, PhD.

Sony Sued For Not Protecting Leaked Movie From Pirates - TorrentFreak [# ! Note] - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! Hollywood knows that '#Piracy' is #Promotion -> more #sales. # ! #Antipiracy #pantomime is just a #way to #manipulate #laws... and the #market (of #ideas) itself
  •  
    " Andy on July 29, 2016 C: 39 News In 2014, Sony was subjected to a massive cyberattack which resulted in the leak of huge quantities of data. The trove contained several movies, all of which appeared online for anyone to download for free. Now the owner of one of the titles is suing Sony, claiming that company failed in its obligation to protect the movie from Internet pirates."
  •  
    " Andy on July 29, 2016 C: 39 News In 2014, Sony was subjected to a massive cyberattack which resulted in the leak of huge quantities of data. The trove contained several movies, all of which appeared online for anyone to download for free. Now the owner of one of the titles is suing Sony, claiming that company failed in its obligation to protect the movie from Internet pirates."
Gonzalo San Gil, PhD.

Fedora 24 shows off new visions of the Linux desktop, cloud, and containers | ZDNet - 0 views

  •  
    "Fedora adds multiple Linux desktops, OpenShift cloud Origin and Fedora Atomic Host to drive containerized application development and deployment. Steven J. Vaughan-Nichols By Steven J. Vaughan-Nichols for Linux and Open Source | June 21, 2016 -- 17:29 GMT (18:29 BST) | Topic: Enterprise Software "
Gonzalo San Gil, PhD.

Export - Support - WordPress.com (Backup) - 0 views

  •  
    "Export Your Content to Another Blog or Platform It's your content; you can do whatever you like with it. Go to Tools -> Export in your WordPress.com dashboard to download an XML file of your blog's content. This format, which we call WordPress eXtended RSS or WXR, will contain your posts, pages, comments, categories, and tags."
  •  
    "Export Your Content to Another Blog or Platform It's your content; you can do whatever you like with it. Go to Tools -> Export in your WordPress.com dashboard to download an XML file of your blog's content. This format, which we call WordPress eXtended RSS or WXR, will contain your posts, pages, comments, categories, and tags."
Gonzalo San Gil, PhD.

Stop Censorsip, Stop TPP | Join The Internet Vote - 0 views

  •  
    " Congress just introduced legislation to "Fast Track" the Trans-Pacific Partnership, or TPP. It's a secretive deal, negotiated behind closed doors by government bureaucrats and corporate lobbyists, containing dangerous provisions (like SOPA) that threaten Internet freedom everywhere. Internet users deserve a say in decisions that affect us. Email Congress now. "
  •  
    " Congress just introduced legislation to "Fast Track" the Trans-Pacific Partnership, or TPP. It's a secretive deal, negotiated behind closed doors by government bureaucrats and corporate lobbyists, containing dangerous provisions (like SOPA) that threaten Internet freedom everywhere. Internet users deserve a say in decisions that affect us. Email Congress now. "
Gonzalo San Gil, PhD.

How to Run Kali Linux 2.0 In Docker Container | LinuxPitstop - 0 views

  •  
    ["August 24, 2015 by Aun Introduction Kali Linux is a well known operating system for security testers and ethical hackers. It comes bundled with a large list of security related applications and make it easy to perform penetration testing. Recently, Kali Linux 2.0 is out and it is being considered as one of the most important release for this operating system. On the other hand, Docker technology is getting massive popularity due to its scalability and ease of use. Dockers make it super easy to ship your software applications to your users. Breaking news is that you can now run Kali Linux via Dockers; let's see how :) ]"
Gonzalo San Gil, PhD.

Conservative Party Pirated Labour Leader Supporter's Video - TorrentFreak [# ! Note] - 0 views

  •  
    " Andy on September 15, 2015 C: 22 Breaking A controversial UK Conservative party video portraying the Labour party's new leader in a negative light has been taken down by YouTube. The advert, which attacked incoming Labour leader Jeremy Corbyn, contained copyrighted content not authorized for use by the Tories. In fact, the footage is owned by a staunch Corbyn supporter."
  •  
    " Andy on September 15, 2015 C: 22 Breaking A controversial UK Conservative party video portraying the Labour party's new leader in a negative light has been taken down by YouTube. The advert, which attacked incoming Labour leader Jeremy Corbyn, contained copyrighted content not authorized for use by the Tories. In fact, the footage is owned by a staunch Corbyn supporter."
Gary Edwards

Flex/Flash: About Singleton, Threads and Flex | Blogging about Software Development - 0 views

  • Flex applications are, like Flash applications, compiled into an SWF file. Once a user visits the webpage containing your Flex application, the SWF file is downloaded to and run from the client computer. Instead of a seperate session each user receives their own copy of your Flex application. The client computer runs the Flash VM, which in turn fires up the local copy of your Flex application. Furthermore, Flex uses the Actionscript scripting language. The current version is Actionscript 3. Actionscript 3 is single-threaded. By now you probably already see where this is going. The single-threaded nature of Flex applications means synchronization is not required.
  •  
    Flex applications are, like Flash applications, compiled into an SWF file. Once a user visits the webpage containing your Flex application, the SWF file is downloaded to and run from the client computer. Instead of a seperate session each user receives their own copy of your Flex application. The client computer runs the Flash VM, which in turn fires up the local copy of your Flex application. Furthermore, Flex uses the Actionscript scripting language. The current version is Actionscript 3. Actionscript 3 is single-threaded. By now you probably already see where this is going. The single-threaded nature of Flex applications means synchronization is not required.
  •  
    Live Roulette from Australia, Fun and Free! Now you can play Real "www.funlivecasino.com.au" Live Roulette for Fun in Australia on a brand new website, FunLiveCasino.com.au. Using the latest internet streaming technologies, Fun Live Casino lets you join a real game happening on a real table in a real casino, all broadcast Live! You can see other real players in the casino betting on the same results you do giving you ultimate trust in the results as they are not generated 'just for you', like other casino gaming products such as 'live studios' or computer generated games. Its amazing to think next time your really in the casino that you might be on camera, and people online might be watching! The future is scary! Imagine that one day soon this will be the only way people would gamble online because the internet is full of scams, you have to be super careful, and why would you play Online Roulette any other way except from a Real Casino you can visit, see, hear and trust! Amazingly this site is completely Free and has no registration process, no spam, no clicks and no fuss. Just Instant Fun "www.funlivecasino.com.au" Free Live Roulette! Give it a try, its worth checking out! "www.funlivecasino.com.au" Australia's Online Fun Live Casino! Backlink created from http://fiverr.com/radjaseotea/making-best-156654-backlink-high-pr
Paul Merrell

Sun's Advanced Datacenter (Santa Clara, CA) - System News - 0 views

  • To run Sun’s award-winning data centers, a modular design containing many "pods" was implemented to save power and time. The modular design aids the building of any sized datacenter. Inside of each pod, there are 24 racks. Each of these 24 racks has a common cooling system as does every other modular building block. The number of pods is limited by the size of the datacenters. Large and small datacenters can benefit from using the pod approach. The module design makes it easy to configure a datacenter to meet a client's requirements. As the datacenter grows over time, adding pods is convenient. The module and pod designs make it easy to adapt to new technology such as blade servers. Some of the ways that Sun’s datacenter modules are designed with the future in mind are as follows:
  • To run Sun’s award-winning data centers, a modular design containing many "pods" was implemented to save power and time. The modular design aids the building of any sized datacenter. Inside of each pod, there are 24 racks. Each of these 24 racks has a common cooling system as does every other modular building block. The number of pods is limited by the size of the datacenters. Large and small datacenters can benefit from using the pod approach. The module design makes it easy to configure a datacenter to meet a client's requirements. As the datacenter grows over time, adding pods is convenient. The module and pod designs make it easy to adapt to new technology such as blade servers.
  • An updated 58-page Sun BluePrint covers Sun's approach to designing datacenters. (Authors - Dean Nelson, Michael Ryan, Serena DeVito, Ramesh KV, Petr Vlasaty, Brett Rucker, and Brian Day): ENERGY EFFICIENT DATACENTERS: THE ROLE OF MODULARITY IN DATACENTER DESIGN. More Information Sun saves $1 million/year with new datacenter Take a Virtual Tour
  • ...3 more annotations...
  • An updated 58-page Sun BluePrint covers Sun's approach to designing datacenters. (Authors - Dean Nelson, Michael Ryan, Serena DeVito, Ramesh KV, Petr Vlasaty, Brett Rucker, and Brian Day): ENERGY EFFICIENT DATACENTERS: THE ROLE OF MODULARITY IN DATACENTER DESIGN.
  • Take a Virtual Tour
  • Other articles in the Hardware section of Volume 125, Issue 1: Sun's Advanced Datacenter (Santa Clara, CA) Modular Approach Is Key to Datacenter Design for Sun Sun Datacenter Switch 3x24 See all archived articles in the
  •  
    This page seems to be the hub for information about the Sun containerized data centers. I've highlighted links as well as text, but not all the text on the page. Info gathered in the process of surfing the linked pages: [i] the 3x24 data switch page recomends redundant Solaris instances; [ii] x64 blade servers are the design target; [iii] there is specific mention of other Sun-managed data centers being erected in Indiana and in Bangalore, India; [iv] the whiff is that Sun might not only be supplying the data centers for the Microsoft cloud but also managing them; and [v] the visual tour is very impressive; clearly some very brilliant people put a lot of hard and creative work into this.
Paul Merrell

International Digital Publishing Forum (formerly Open eBook Forum) - 0 views

shared by Paul Merrell on 29 May 08 - Cached
  • EPUB Support from list of Publishers An Open Letter from AAP to IDPF
  • What is EPUB, .epub, OPS/OCF & OEB? ".epub" is the file extension of an XML format for reflowable digital books and publications. ".epub" is composed of three open standards, the Open Publication Structure (OPS), Open Packaging Format (OPF) and Open Container Format (OCF), produced by the IDPF. "EPUB" allows publishers to produce and send a single digital publication file through distribution and offers consumers interoperability between software/hardware for unencrypted reflowable digital books and other publications. The Open eBook Publication Structure or "OEB", originally produced in 1999, is the precursor to OPS. For the latest on IDPF standards, sample files and companies who have implemented our specifications, please visit our public forums.  Getting started? Visit our FAQ's.
  •  
    Will ePub be the standard that converges the desktop, the server, devices, and the Web? ePub is an implementation of the W3C Compound Document Formats interoperability framework with excellent packaging, container, and markup components. ePub is also strongly integrated with Daisy XML for accessibility, "talking books," and document structure, hinting at a voice-interactive future for publishing. ePub has been developed as a vendor-neutral standard and is being implemented by a large number of major book publishers globally, a factor that should spur major development of both editing and rendering software and devices.
  •  
    Like this http://www.hdfilmsaati.net Film,dvd,download,free download,product... ppc,adword,adsense,amazon,clickbank,osell,bookmark,dofollow,edu,gov,ads,linkwell,traffic,scor,serp,goggle,bing,yahoo.ads,ads network,ads goggle,bing,quality links,link best,ptr,cpa,bpa
Gonzalo San Gil, PhD.

How microservices and containers are changing applications | Opensource.com - 0 views

  •  
    "The microservices architecture is far from a new trend; it's generally accepted as a better way to build apps these days."
  •  
    "The microservices architecture is far from a new trend; it's generally accepted as a better way to build apps these days."
Gonzalo San Gil, PhD.

Linux Distribution Chooser - 0 views

  •  
    [# ! Por cortesía de vinagreasesino.com a través de Google Alerts 'Linux'] "This test should help you while choosing the best Linux Distribution for you. The test contains several question to find the suitable distribution for you. Please note that the result is only a suggestion." [# ! #choose # ! … #Your #Perfect #FreeSoftware #Match. (# And don't scare about the opening home page written in #German… # ! #English version available, too)]
  •  
    [# ! Por cortesía de vinagreasesino.com a través de Google Alerts 'Linux'] "This test should help you while choosing the best Linux Distribution for you. The test contains several question to find the suitable distribution for you. Please note that the result is only a suggestion."
Gonzalo San Gil, PhD.

Highly critical "Ghost" allowing code execution affects most Linux systems | Ars Technica - 1 views

  •  
    ""A lot of collateral damage on the Internet" The glibc is the most common code library used by Linux. It contains standard functions that programs written in the C and C++ languages use to carry out common tasks. The vulnerability also affects Linux programs written in Python, Ruby, and most other languages because they also rely on glibc."
  •  
    ""A lot of collateral damage on the Internet" The glibc is the most common code library used by Linux. It contains standard functions that programs written in the C and C++ languages use to carry out common tasks. The vulnerability also affects Linux programs written in Python, Ruby, and most other languages because they also rely on glibc."
Gonzalo San Gil, PhD.

On net neutrality, Internet providers are betrayed by one of their own | Ars Technica - 2 views

  •  
    "They're not happy anymore, especially not after Wheeler yesterday all but confirmed at the Consumer Electronics Show (CES) that he will propose reclassifying Internet providers as common carriers in order to impose net neutrality rules. This would expose broadband to some of the FCC's strongest powers contained in Title II of the Communications Act, usually reserved for wireline phone service." [# ! The saddest... # ! ... of this story is that , one more time, is clearly shown that, # ! in the #Internet issues, #citizens are the least #important.... (# ! and it's yet to be seen if that, finally, Internet providers are reclassified as "common carriers in order to impose net neutrality rules". )]
  •  
    "They're not happy anymore, especially not after Wheeler yesterday all but confirmed at the Consumer Electronics Show (CES) that he will propose reclassifying Internet providers as common carriers in order to impose net neutrality rules. This would expose broadband to some of the FCC's strongest powers contained in Title II of the Communications Act, usually reserved for wireline phone service."
Paul Merrell

MaidSafe - The New Decentralized Internet - 0 views

  • The New Decentralized Internet MaidSafe is a fully decentralized platform on which application developers can build decentralized applications. The network is made up by individual users who contribute storage, computing power and bandwidth to form a world-wide autonomous system. Read more... Calling Decentralized Application Developers How would you like to create the next Dropbox, Facebook, Google, LinkedIn, Twitter, Candy Crush, or secure email service? The SAFE network offers every developer the opportunity to create applications without any infrastructure costs and without any barrier to entry. Read more...
‹ Previous 21 - 40 of 149 Next › Last »
Showing 20 items per page