Announcement

Total Page:16

File Type:pdf, Size:1020Kb

Announcement Announcement 19 articles, 2016-04-11 12:03 1 News News for the Open Source Professional 2016-04-11 12:03 480Bytes www.linux.com 2 CW@50: Storage – From punched cards to flash and the cloud Since the launch of Computer Weekly in 1966, we have moved from a world of punched cards and paper tape to one where flash and the cloud have revolutionised data storage. 2016-04-11 09:32 2KB www.computerweekly.com 3 Security Think Tank: Tackle vital patching challenge with risk- based approach What strategies can companies adopt to help keep up with and deal with the huge volume of software updates they are facing? 2016-04-11 08:40 3KB www.computerweekly.com 4 Logitech G900 Chaos Spectrum Wireless Gaming Mouse Review The Logitech G900 Chaos Spectrum has been designed with an emphasis on reducing as much weight as possible. From the thin wall molding to the hollow "spoked" hyper-fast scroll wheel design. The result is a wireless gaming mouse that weighs just 107g, which should... 2016-04-11 08:35 7KB www.techspot.com 5 Google glitch translates 'Russian Federation' into 'Mordor'; it has a ring to it Irony alert: Google Translate bug brands Russians as occupiers when translating from Ukrainian 2016-04-11 07:24 3KB www.v3.co.uk 6 Microsoft delivers enterprise-class ERP to the cloud REDMOND, Wash. — March 9, 2016 — Microsoft Corp... 2016-04-11 10:33 7KB news.microsoft.com 7 Microsoft outlines intelligence vision and announces new innovations for Windows 10 SAN FRANCISCO — March 30, 2016 — Wednesday at Build 2016, Microsoft CEO Satya Nadella and Terry Myerson, executive vice president of... 2016-04-11 10:33 8KB news.microsoft.com 8 FileHippo News - powered by FeedBurner “We have a tool that works on a narrow slice of phones,” Comey said at an encryption and surveillance conference at Kenyon University in Ohio... 2016-04-11 04:22 22KB feeds2.feedburner.com 9 Tech leader to establish roots at uCity Square: Microsoft Innovation Center comes to Philadelphia PHILADELPHIA — (April 4, 2016) — A new Microsoft Innovation Center (MIC) will open to the public at uCity Square... 2016-04-11 01:52 7KB news.microsoft.com 10 Apple patent shows hypothetical touchpad keyboard Apple has filed a patent for a hypothetical new keyboard. The touch-based keyboard will be harder to damage, includes a backlight, and has the ability to transform to different situations. 2016-04-11 02:50 1KB feedproxy.google.com 11 Now that’s a suitor! The Daily Mail talks to private equity firms as it FLIRTS WITH YAHOO BID The parent company of U. K. tabloid Daily Mail may make a bid for Yahoo’s news and media businesses. According to the WSJ, the Daily Mail and General Trust.. 2016-04-10 20:16 2KB feedproxy.google.com 12 Can Israel build big, sustainable companies? For all the "Start-up Nation" fanfare, Google's acquisition of Waze - Israel's highest profile start-up exit to date - was valued at just $1.1B. And, while.. 2016-04-10 20:16 2KB feedproxy.google.com 13 The open web is not going away Dries Buytaert and Matt Mullenweg recently posted calls to arms in defense of the "open web. " I, too, am a believer in the open web. It delivers on the.. 2016-04-10 20:16 5KB feedproxy.google.com 14 INNOVATE2016: Silicon Valley needs to address equality or risk being vilified in the U. S. Entrepreneurs and investors need to build innovative products and services that benefit everyone, and not just the privileged. Unless Silicon Valley becomes.. 2016-04-10 20:16 774Bytes feedproxy.google.com 15 Embracing the sharing economy for growth in China China's track record for economic growth has been impressive in the last several decades, with China accounting for up to one-third of global growth in recent.. 2016-04-10 20:16 12KB feedproxy.google.com 16 Ground delivery robots: Passing fancy or next wave? “Every failed on demand startup will reappear as a successful robotics driven business in five to 10 years.” So tweeted Jeremy Conrad, founding partner of.. 2016-04-10 20:16 7KB feedproxy.google.com 17 Tagging may be the best way to make IoT contextually relevant and usable With language like this, social networks become a natural point of interaction between people and things, and TAGs will make it seem effortless for us all... 2016-04-10 20:16 8KB feedproxy.google.com 18 Buying @Haje: How I got my given name as my Twitter handle for $250 You'll never guess how I got my given name as my Twitter handle. It involved a six-month campaign that included some light Internet stalking, badgering staff.. 2016-04-10 20:16 9KB feedproxy.google.com 19 Google Fiber free service ends in Kansas City Google has pulled the plug on its free offering in Kansas City. Existing customers of the service can continue to use the plan until May 19, after which they'll have to switch to a paid tier. 2016-04-10 16:54 1KB feedproxy.google.com Articles 19 articles, 2016-04-11 12:03 1 News Brought to you by The Linux Foundation is a non-profit consortium enabling collaboration and innovation through an open source development model. Learn More © 2016 The Linux Foundation 2016-04-11 12:03 www.linux 2 CW@50: Storage – From punched cards to flash and the cloud The relationship of storage to the architecture of computing is all about capacity, latency and throughput. In other words, how much data can be kept, how quickly it can be accessed and at what rate. Since the launch of Computer Weekly in 1966, the world of storage has gone through transformations as remarkable as aviation’s progression from the Wright brothers to supersonic flight. And just as the pioneers of flight would recognise the fundamentals of today’s aircraft in basic design, from the viewpoint of 1966, the speeds and magnitudes of storage now would seem utterly alien. In the 1960s, the key methods of data storage centred on two media: paper and cardboard, and magnetic media. Magnetic tape and even the spinning hard drive had already been invented for data, but punched cards and paper tape were used to run programs and store data in most of the nation’s datacentres. Punched cards – which dated back to textile and fairground organ applications from the 19th century and beyond – were usually the IBM-derived standard 7 3 / 8 in x 3 1 / 4 in with 80 columns and 12 rows (0-9 and 11 and 12), although there were variants of card size and column width from other computer makers, such as the UK’s ICL . Data was represented by punched holes in each column that were read by shining a light on the card. Initially, combinations of punched holes had represented analogue forms of information, but as the 20th century progressed, they came to represent binary data. Information about the data set – metadata – was represented in rows 11 and 12 and sometimes in unused columns. One IBM card held 72 x 10 bits. State-of-the-art punched-card hardware in 1966 was the IBM 2540 (a peripheral to the System/360 mainframe ), which could read 1,000 cards per minute (giving a throughput of 720Kb per minute; write speed/cards punched was 300 per minute) and an input hopper that held 3,100 cards. That is just over 2MB of capacity, but that was theoretically infinitely scalable as long as there was a human available to unload and reload the hoppers. 2016-04-11 09:32 Antony Adshead 3 3 Security Think Tank: Tackle vital patching challenge with risk- based approach Patching is one of the areas where organisational security is frequently under strain and struggling to attain good quality processes in the face of increased threats and the resulting high volume of patches. According to the Centre for the Protection of National Infrastructure (CPNI), disregard for patching represents a significant and growing problem for all businesses. Patch management is part of an overarching configuration management regime, and should be harmonised with it and with the risk management regime. However, we know from experience that this is seen as too difficult and left in the capable – but laden – hands of the IT team. In effect, many businesses are in a totally reactive, “patch everything as it comes” mode. This is stressful and inefficient and is no guarantee of a quality patch management system. Businesses use a vast array of systems and applications, and starting from a risk perspective will help triage how we build our patch management regime. In risk assessing each server and application, find out what information it uses/ holds and how critical this information is – how important is the CIA ( confidentiality, integrity and availability ) of the information and what would be the impact of its compromise. Some areas may be more critical than others and the necessity of patching therefore raised higher in the patching regime. The same risk-based approach should be applied to the patches themselves. With the understanding of each application and its CIA in mind, the next stage is to understand how critical (or not) the patches are so that their application can be prioritised. For instance, a critical security patch on a payroll application should take priority over a new feature for a marketing email system. Without this system of risk assessing the effect of not patching (or delaying and scheduling all non-critical updates and fixes) and understanding the criticality of the system or application being patched, the continuation of patch pandemonium is assured.
Recommended publications
  • SMM Panorama
    Seven Boats Info-System Pvt. Ltd. presents SMM Panorama Social media marketing tricks & hacks! made with Table of Contents 1. New Warning Alerts on Facebook for Fake News 2. Social Media Lessons to Learn from BuzzFeed 3. Social Influence Network: Do You Need It? 4. Your New Online Reputation Management Buddy: Facebook 5. Monetize Fan Frenzy on Facebook: Doing it Differently 6. The Rules of Getting Retweets on Twitter 7. Driving Facebook Traffic to your Website: Some Path-breaking Ways 8. Hashtags: What to Do with Them 9. Picking Influencers for Your Content 10. Facebook Engagement: How to Do it Best 11. Trivia to Make More from Twitter 12. Use Facebook Wisely for Content Marketing 13. Worry Less about Customers Engagement in Facebook 14. Thinking about B2B Social Media Strategy? Follow these 4 steps 15. Orange is the New Black: Social Media Lessons 16. Social Proofs: Why Have them and How 17. Facebook Lessons to Learn from Big Brands 18. Social Media Methods You Should Never Apply 19. 7 Tips to use social media in selling process 20. Make Use of Twitter Trends 21. Coming Up: New Video Metrics on Facebook 22. Video Marketing: Why to Bother; How to Prosper 23. A Few Social Media Mistakes that Can Cost Your Marketing Dear 24. Measuring Social Engagement Responsible for The Company’s Growth 25. How to Use Google+ for Business 26. Facebook or Twitter: More Value for your Ads 27. Want to Pull Up Twitter Popularity? Top 5 Tips to Do It! 28. Top Three Twitter Trackers 29. Social Media Metrics: What to Measure 30.
    [Show full text]
  • Researching Candidates' Use of Twitter During the European Parliamentary Elections
    11 Hailed by many as a game-changer in political communication, Twitter has made its way into election campaigns all around the world. The European Parliamentary elections, tak- ing place simultaneously in 28 countries, give us a unique comparative vision of the way the tool is used by candidates in different national contexts. This volume is the fruit of a research project bringing together scholars from 6 countries, specialised in communication science, media studies, linguistics and computer science. It seeks to characterise the way Twitter was used during the 2014 European election campaign, providing insights into communication styles and strategies observed in different languages and outlining meth- odological solutions for collecting and analysing political tweets in an electoral context. Tweets from the Campaign Trail the Campaign from Tweets Alex Frame / Arnaud Mercier / Gilles Brachotte / Caja Thimm (eds.) Tweets from the Campaign Trail Caja Thimm (eds.) · (eds.) Thimm Caja / Researching Candidates’ Use of Twitter During the European Parliamentary Elections Gilles Brachotte / Alex Frame is Associate Professor in Communication Science at the University of Burgundy (Dijon) where he works within the TIL research group (EA4182). Arnaud Mercier is Professor in Communication Science and member of the French Press Arnaud Mercier Institute (IFP, Paris). / Gilles Brachotte is Associate Professor in Communication Science at the University of Bur- gundy (Dijon) and member of the CIMEOS-3S research group (EA4177). Bonner Beiträge zur Medienwissenschaft Caja Thimm is Professor in Media Studies and Intermediality at the University of Bonn. Band 11 Alex Frame Alex BBM 11-Frame 267009_HOF_A5HCk-VH.indd 1 17.11.16 KW 46 12:48 11 Hailed by many as a game-changer in political communication, Twitter has made its way into election campaigns all around the world.
    [Show full text]
  • Using Sentiment from Twitter Optimized by Genetic Algorithms to Predict the Stock Market Electical and Computer Engineering
    Using Sentiment from Twitter optimized by Genetic Algorithms to Predict the Stock Market Carlos Vieira Simões Thesis to obtain the Master of Science Degree in Electical and Computer Engineering Supervisors: Prof. Rui Fuentecilla Maria Ferreira Neves Prof. Nuno Cavaco Gomes Horta Examination Committee Chairperson: Prof. António Manuel Raminhos Cordeiro Grilo Supervisor: Prof. Rui Fuentecilla Maria Ferreira Neves Member of the Committee: Prof. João Miguel Duarte Ascenso April 2017 Resumo Actualmente, na rede social Twitter, são criados, em media, cerca de 6000 tweets por segundo. Isto corresponde a cerca de 500 milhões de tweets por dia. Com toda esta informação torna-se interessante saber que partido se pode tirar dela. Neste trabalho propomos usar o Twiter para encontrar empresas que tenham um grande potencial de crescimento e que, por isso, sejam boas oportunidades de investimento. Para chegar a esse fim nós construímos um modelo de sentimento usando o texto contido em tweets. Para garantir que o nosso modelo de sentimento contém tweets que foram criados em contextos emocionais diferentes utilizámos hashtags do Twitter. Por exemplo, usámos as hashtags #sad e #happy para obter tweets que foram criados em ambientes emocionais distintos, ou seja, triste e feliz. Para nos certificarmos de que obtivemos tweets de um vasto leque de sentimentos usámos com permissão as emoções apresentadas pelo Circumplex Model of Affect e os seus sinónimos. São essas palavras que foram utilizadas como termos de pesquisa na API do Twitter. As emoções foram agrupadas em quatro classes. Por exemplo, emoções como feliz e orgulhoso foram incluídas na classe 1; calmo e sereno na classe 2; nervoso e ansioso na classe 3 e; triste e deprimido na classe 4.
    [Show full text]