Skip to main content

Home/ Groups/ MOBIUS Libraries
anonymous

New Attack Breaks Confidentiality Model of SSL, Allows Theft of Encrypted Cookies | thr... - 0 views

    • anonymous
       
      It's worth noting that to execute this attack you have to be on the network of your target and have the ability to execute a man in the middle attack.
  •  
    Two researchers have developed a new attack on TLS 1.0/SSL 3.0 that enables them to decrypt client requests on the fly and hijack supposedly confidential sessions with sensitive sites such as online banking, e-commerce and payment sites. The attack breaks the confidentiality model of the protocol and is the first known exploitation of a long-known flaw in TLS, potentially affecting the security of transactions on millions of sites.
anonymous

Survey Finds Secure Sites Not So Secure | threatpost - 0 views

  •  
    There is quite a bit of alarming data in what the project has gathered, and one of those pieces of information is that more than 148,000 of the sites surveyed are vulnerable to the BEAST attack, which was developed by researchers Juliano Rizzo and Thai Duong and disclosed last year. Their attack uses what's known as a chosen-plaintext attack against the AES implementation in the TLS 1.0 protocol and enables them to use a custom tool they wrote to steal and decrypt supposedly secure HTTPS cookies. The attacker can then hijack the victim's secure SSL session with a site such as an e-commerce site or online banking site.
Scott Peterson

IUG Conference - 1 views

  •  
    I couldn't find a way to link directly to presentations or their materials. Probably the most interesting sessions I attended were: Solving the Complexities of Ebook Record Management in Millennium INN-Reach: Implementing Peer to Peer Functionality Between two INN-Reach Systems The Ebooks presentation was about checking for duplication, quality control, and making sure all the records an institution paid for are present and have valid links. There were a lot of good techniques that could be relayed to our members as a group of best practices. The Peer-To-Peer INN-Reach is a new product that allows two INN-Reach systems to share materials as if they were one. It was a done in Ohio as a response after one consortium added two public libraries and began to see their single INN-Reach server overwhelmed. From what I could tell it works well, with each INN-Reach server able to retain it's own loan rules and identity, but did require all the libraries and pickup locations to be added to both servers, which quickly would present patrons with a very long list of libraries to choose from. I wasn't very clear where the super-union webpac resided; whether on it's own server or produced from both of them. The users that were present seemed happy with it.
Scott Peterson

Decline and Fall of the Library Empire - 0 views

  •  
    It looked at several of the recent themes in the library world such as "Library 2.0" and how they've failed or the ideas have been accomplished better outside of libraries. What I found interesting is it was written by the Vice President of Library Support Services for LSSI, the private company that has started to run many public library systems, so I'm curious what his intent was with this article.
Scott Peterson

If Harvard Can't Afford Academic Journal Subscriptions, Maybe It's Time for an Open Acc... - 0 views

  •  
    Time Magazine reported on how even Harvard is having trouble affording academic journal subscriptions, and how it may be time for an open access model. Some journals cost up to $40,000 a year, and single articles cost $30-$40.
Scott Peterson

Oxford Union Debate at Harvard University - 0 views

  •  
    Harvard also had an Oxford style debate about the future or purpose of libraries. While interesting it didn't really cover anything new:
Scott Peterson

Dog Lending Coming to Harvard Library - 1 views

  •  
    A tagent from the seed lending library...how would one catalog this?
  • ...1 more comment...
  •  
    First, I want to see the bib record for the dog (would things like leashes and crates be attached records?). Secondly, I'm sort of reminded of this: http://humanlibrary.org/
  •  
    "When not in circulation, the dogs will be kept in a shared exercise area, where they most commonly play poker together." - Well played.
  •  
    Lastly, Harvard is also lending dogs now at one of their libraries. This is one of several experiments in lending things other than books (everything from tools to people) but I still question the relevance:
anonymous

Open Source Bridge: The conference for open source citizens / June 26-29, 2012 / Portla... - 1 views

  •  
    Open Source Bridge is a conference for developers working with open source technologies and for people interested in learning the open source way.
anonymous

Closure Tools - Google Developers - 0 views

  • The Closure Compiler is a tool for making JavaScript download and run faster. It is a true compiler for JavaScript. Instead of compiling from a source language to machine code, it compiles from JavaScript to better JavaScript. It parses your JavaScript, analyzes it, removes dead code and rewrites and minimizes what's left. It also checks syntax, variable references, and types, and warns about common JavaScript pitfalls.
  •  
    This works amazingly well. The javascript we use to send text messages in the webpacs went from 8.5k to 4.3k. Also this works to combine multiple scripts and optimize them all together.
anonymous

Software Engineering: How often do major software companies push code to production? - ... - 0 views

  •  
    I love the idea of automatically pushing to production after a new commit is made to master.
Jennifer Parsons

Tor/Forge E-book Titles to Go DRM-Free | Tor.com - 0 views

  • “Our authors and readers have been asking for this for a long time,” said president and publisher Tom Doherty. “They’re a technically sophisticated bunch, and DRM is a constant annoyance to them. It prevents them from using legitimately-purchased e-books in perfectly legal ways, like moving them from one kind of e-reader to another.”
  •  
    This is pretty darn huge.  Keep in mind that Tor says nothing about whether piracy is bad, or whether or not electronic books should be cheaper, or more expensive.  But they do concede with this decision that DRM is more a hindrance than a help.
Jennifer Parsons

"Why I break DRM on e-books": A publishing exec speaks out - paidContent - 0 views

  • Here at paidContent, independent e-bookstore Emily Books‘ Emily Gould and Ruth Curry have argued that DRM is crushing indie booksellers online. And Hachette VP, digital Maja Thomas recently described DRM as “a speedbump” that “doesn’t stop anyone from pirating.”
  • He argues that DRM is a way for the Amazons of the world to create lock-in to their platforms.
  •  
    And why would they do it?  Probably because as it stands, it doesn't work as intended. As people realize that what they're doing isn't buying content so much as leasing it, it's interesting to see how their attitudes have changed towards DRM. 
anonymous

How LibreOffice Writer Tops MS Word: 12 Features: Page 3 - Datamation - 0 views

  • In the same way, LibreOffice's extension PDF Import gives it an ability utterly lacking in Word. However, since many users are unaware of these extras, I have left them out for simplicity’s sake.
    • anonymous
       
      I need to try this. PDF import?
anonymous

How LibreOffice Writer Tops MS Word: 12 Features - Datamation - 0 views

    • anonymous
       
      This. I hate that headers and footers in Word are all or nothing.
  • when you examine LibreOffice and MS Office without assumptions, the comparison changes dramatically. That's especially true when looking at the word processors, LibreOffice's Writer and MS Office's Word.
  • these advantages not only suggest a very different design philosophy from Word, but also demonstrate that, from the perspective of an expert user, Writer is the superior tool.
  • ...1 more annotation...
  • Since headers and footers are also attached to page style, you can also use different header and footer styles automatically.
anonymous

Computers powered by swarms of crabs - 0 views

  • The crab swarms were placed at the entrances of the logic gates and encouraged to move by a looming shadow that fooled them into thinking a predatory bird was overhead. The results closely matched the simulation, suggesting that crab-powered computers could indeed be possible.
  •  
    Unbelievable. And probably delicious.
anonymous

Why Your IT Spending Is About to Hit the Wall - Wall Street & Technology - 0 views

  • Between 2006 and 2010, demand for processing cycles (MIPS, servers and the like) has slowly approached an 18 erpcent annual growth rate in the big banks. Storage, by the way, has hit 45 percent per year -- the advent of Big Data is here -- and although the unit cost of storage is still dropping, storage cost pools around the financial industry are expanding out of control. The growth phenomenon is now exacerbated by market conditions, and Moore's Law just isn't enough.
  • Taking a step back, you will likely ask, "How can this be true?" The answer involves yet another "law" -- actually, a paradox observed in the late 1800s -- "Jevons paradox," which states:Technological progress that increases the efficiency with which a resource is used tends to increase (rather than decrease) the rate of consumption of that resource. William Stanley Jevons developed this hypothesis in 1865, based on his observations of coal consumption vis-à-vis the technology advances designed to improve the efficiency of coal usage. It was his argument that these improvements alone could not be relied on to reduce consumption; rather, they would lead to increased consumption -- and he was right. Today we talk about elastic computing; in 1865 Jevons focused on "elastic coal" – well, at least the demand was elastic.
  • So the aforementioned growth in demand (passing the 20 percent mark per year) is actually fueled in part by the inherent efficiencies created by Moore's Law. Through 2010 we were in the Moore's Law zone of managing IT costs downward. Now we are a new world governed by the effects noted by Jevons.
  •  
    Because of Moore's Law - the decreasing costs of computing power, we've become a world of Big Data and are now consuming ever more computing power at a rate that exceeds Moore's Law.
anonymous

Google Drive cloud storage launch planned for early April, sources tell GigaOm | The Verge - 0 views

  •  
    I'm just learning of this today. Apparently they are only offering 1GB of free storage, which puts them at half of what Dropbox offers for free. That said, Dropbox is painfully slow at upload and download and Google storage is insanely cheap. I just bought 20GB of storage for my photo archive and it costs me a WHOPPING $5/year - and the extra storage is shared by all my Google apps which I'm guessing will include Drive. 
« First ‹ Previous 541 - 560 of 587 Next › Last »
Showing 20 items per page