Saturday, February 28, 2015

Top carnivores increase their kill rates as a response to human-induced fear

Comments



from Hacker News http://bit.ly/1AIJUxV

Interview with Iculus (Ryan Gordon) about Linux Game Development

Comments



from Hacker News http://bit.ly/1G5BrZa

The Coming of Age of Millennials

Comments



from Hacker News http://bit.ly/17Hkupd

Why Nintendo Doesn’t Release Mario on the App Store

Comments



from Hacker News http://bit.ly/17Hkrtv

Hyperloop is coming to california

Comments



from Hacker News http://wrd.cm/1DEYx5j

Silicon Valley Shuttle Drivers Vote to Join Union

Comments



from Hacker News http://nyti.ms/1wz6HwK

Silicon Valley Shuttle Drivers Vote to Join Union

Comments



from Hacker News http://nyti.ms/1vMq4Sg

Checkr (YC S14) is hiring engineers to build its background check API

Comments



from Hacker News http://bit.ly/1EB9DKx

8cc: A Small C Compiler

Comments



from Hacker News http://bit.ly/1FJbqLo

Most Down-Voted Stack Overflow Questions

Comments



from Hacker News http://bit.ly/1EB9B5c

The Wellness Warrior, Jess Ainscough, Has Passed Away

Comments



from Hacker News http://bit.ly/1K1TuSM

Beware the Pretty People

Comments



from Hacker News http://tcrn.ch/1K1TsKO

Add Chrome bookmarks like a boss

Comments



from Hacker News http://bit.ly/1CbaH81

New Data Show How Firms Like Infosys and Tata Abuse the H-1B Program

Comments



from Hacker News http://bit.ly/1AHMu7v

Generate SSH config files from AWS EC2 inventory

Comments



from Hacker News http://bit.ly/1LYxBPV

Underwear Startups Have Investors Hot and Bothered

Comments



from Hacker News http://tcrn.ch/1LYxyUn

First Go challenge – binary decoding

Comments



from Hacker News http://bit.ly/1LYnBWQ

Xfce 4.12 released

Comments



from Hacker News http://bit.ly/1K1idXu

Harry Potter and the Methods of Rationality, Chapter 113: Final Exam

Comments



from Hacker News http://bit.ly/1LYnBGm

Boris – A tiny REPL for PHP

Comments



from Hacker News http://bit.ly/18a5PCP

Remember when, on the internet, no one knew who you were?

Comments



from Hacker News http://bit.ly/18a5NuH

Top carnivores increase their kill rates as a response to human-induced fear

Comments



from Hacker News http://bit.ly/1zsuXuQ

Swift and C# Quick Reference – Language Equivalents and Code Examples [pdf]

Comments



from Hacker News http://bit.ly/1AH6rev

Why the F.C.C.’s Municipal-Broadband Ruling Matters, Too

Comments



from Hacker News http://nyr.kr/1AH6qYc

The Linx 10“ Tablet

Comments



from Hacker News http://bit.ly/1AH6tD8

Bitcoin is not for goverment. Bitcoin is digital currency of the internet

Comments



from Hacker News http://tcrn.ch/1AoH64q

V8pp: Header-only library to expose C++ classes and functions into V8

Comments



from Hacker News http://bit.ly/1N3Huzl

Live Sails.js Course

Comments



from Hacker News http://bit.ly/1K0Nmu2

CRlibm: an efficient and proven correctly-rounded mathematical library

Comments



from Hacker News http://bit.ly/1K0Nk5s

Technical “whitepaper” for afl-fuzz

Comments



from Hacker News http://bit.ly/1vL35XC

Researchers have achieved wireless speeds of 1 Tb per second

Comments



from Hacker News http://bit.ly/1vL385W

The rise and fall of cosmetic surgeries in the US

Comments



from Hacker News http://bit.ly/1vL35H9

Up your CSS-Game with Math

Comments



from Hacker News http://bit.ly/1vL35H2

A Slippery New Rule for Gauging Fiscal Policy

Comments



from Hacker News http://nyti.ms/1AojCwd

Friday, February 27, 2015

Venmo Was Ordered in July by California Regulators to Address Security Issues

Comments



from Hacker News http://nyti.ms/1JXR080

The Trans-Pacific Partnership clause everyone should oppose

Comments



from Hacker News http://wapo.st/187GIR2

Show HN: Advertising-Free Search-Engine

Comments



from Hacker News https://deusu.org/

Show HN: OneSet, the Vine for Fitness (Android Beta)

Comments



from Hacker News http://bit.ly/1LTotw3

Airbnb Is Raising a Round at a $20B Valuation

Comments



from Hacker News http://tcrn.ch/1JXdW7h

How to Speak Startup

Comments



from Hacker News http://tcrn.ch/1zNaK42

Zend PHP JIT open sourced

Comments



from Hacker News http://bit.ly/1zNaK40

Have We Drawn the Wrong Lessons from Epigenetics?

Comments



from Hacker News http://bit.ly/1zNaMsS

Uber Database Breach Exposed Information of 50,000 Drivers, Company Confirms

Comments



from Hacker News http://tcrn.ch/187gHBp

Engineers Wanted: iCracked (YC W12) to double it's staff size this year

Comments



from Hacker News https://www%20icracked.com/careers

3 Common Myths About Training

Are you interested in designing a VMware vSphere® 5 virtual infrastructure? Then be sure to register for the next installment of the ViewPoint Webinar Series on Wednesday, March 4, 2015 at 9am PT.


In this free webinar, Brian Watrous, a VMware Certified Instructor will discuss the issues and technologies involved in designing a virtual infrastructure architecture, and will teach you how to:



  • Identify the requirements, constraints, and assumptions that factor into a virtual infrastructure architecture

  • Determine the major architectural components and deliverables likely to be included in a design


Webinar details:
Designing a Virtual Infrastructure Architecture

Wednesday, March 4, 2015

9:00 AM PT


Featured speaker:

Brian Watrous

VMware Certified Instructor at VMware

Register today


The free ViewPoint Webinar Series connects you with VMware experts and is a great addition to your VMware training. You’ll have the opportunity to learn from VMware Certified Instructors and find out how VMware Training can extend your VMware expertise.






via VMware Blogs http://bit.ly/1N0p56s

3 Common Myths About Training

It’s a busy world and training is often the last thing on your list. Who has the time or money when there’s so much else to do? The real question is, “Can you afford not to?” Training may be the most important thing you do this year and, with new options, it’s now faster and […]]> It’s a busy world and training is often the last thing on your list. Who has the time or money when there’s so much else to do? The real question is, “Can you afford not to?” Training may be the most important thing you do this year and, with new options, it’s now faster and easier to increase the value of your certification and boost your career.

Recognize These Excuses?
You probably have the perfect reason to avoid training. You’re busy. You can’t leave the office. You’re already certified and there’s nothing more to learn. We’ve heard them all and, luckily for your career, not one of them holds true. Here’s a quick look at new ways to incorporate training into your overscheduled life.


Myth #1: It Takes Too Much Time Away from Work
You’ll never have to leave your desk with online training that’s available when and where you are. VMware Learning Zone is a new subscription-based service with a full year of unlimited, 24/7 video-based training. Top VMware experts discuss the latest technologies to help you resolve issues, extend functionality and increase productivity.


There are other options for custom, cost-effective training. VMware Lab Connect provides self-paced access to technical training labs so you can continue practicing your skills. On Demand Courses deliver modular training and labs with the option to try a course before you buy. And our Onsite Training services are the perfect option for organizations that need to train a large number of employees. The cost per student is lower than a public class, you can tailor the content to your specific needs and class is planned around your schedule, not ours.


Training when and where you need it:



  • VMware Learning Zone

  • VMware Lab Connect

  • On Demand Courses

  • Onsite Training


Myth #2: It’s Too Expensive
Training budgets may have been cut but that doesn’t mean you should stop learning. The good news is there are a lot of ways to make the most of your training dollars and keep your career on track.


VMware often has special offers including discounts on top classes, special deals for VMUG Advantage Members, and much more. Our Beta classes are available to anyone wanting to participate in a near-complete course at 50% off the course price. Plus, there’s always free training, such as our self-paced eLearning in local languages and our free webinars for quick and easy knowledge.


Affordable training options:



  • Special Offers

  • Beta Classes

  • Free Self-paced eLearning in Local Languages

  • Free Webinars


Myth #3: Training Offers Me Few Benefits
Technical training is one of the best ways to advance your career and set you up for future opportunities. Employers generously reward people who have kept up-to-date on the latest technologies. A VCP certification helps you be successful with official recognition of your technical knowledge, special invitations to beta exams and classes and discounts on events and other services.


Certification and training gives you an advantage:



  • VMware Certification Benefits

  • Why You Should Invest in Training Your IT Team


Now that you’ve run out of reasons to avoid training, take a look at what’s available today. With these affordable options designed to fit your busy schedule, you’ll get advanced training on the subjects that make sense for your career.






from VMware Blogs http://bit.ly/1N0p56s

NetScaler Master Class -- April 2013


















Descriptions are required to be a minimum of 45 characters long. It is very important to provide a detailed description of the video so that viewers understand what the video is about. The description information is used to drive search results on internal and external sites and for creating associations to related videos that are displayed on the video player page.


Views:0

Length:1:54:56






from CitrixTV RSS Feed http://bit.ly/17EBht5

Uber admits database breach putting driver data at risk

Uber said it is notifying impacted drivers now, but it hasn't seen the compromised data actually misused yet.



from Latest topics for ZDNet in Security http://zd.net/1ACKiy1

Russia opposition politician Boris Nemtsov shot dead outside Kremlin

Comments



from Hacker News http://bbc.in/1FHlDrR

Getting Superfish Out of Firefox

Comments



from Hacker News http://mzl.la/1axuu61

NetScaler Master Class - March 2013


















Descriptions are required to be a minimum of 45 characters long. It is very important to provide a detailed description of the video so that viewers understand what the video is about. The description information is used to drive search results on internal and external sites and for creating associations to related videos that are displayed on the video player page.


Views:0

Length:2:23:12






from CitrixTV RSS Feed http://bit.ly/1axeelA

An alternative introduction to Rust

Comments



from Hacker News http://bit.ly/1FH6Z3G

Google, Our Patron Saint of the Closed Web

Comments



from Hacker News http://bit.ly/1FH6W88

Vuln: OpenEMR 'validateUser.php' SQL Injection Vulnerability

OpenEMR 'validateUser.php' SQL Injection Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1wsWYT0

Vuln: OpenKM Authentication Bypass Vulnerability

OpenKM Authentication Bypass Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1ACo5QH

Vuln: NetDecision HTTP Server Stack-Based Buffer Overflow Vulnerability

NetDecision HTTP Server Stack-Based Buffer Overflow Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1wsWYCu

Vuln: PHP Address Book Multiple SQL Injection and Multiple Cross Site Scripting Vulnerabilities

PHP Address Book Multiple SQL Injection and Multiple Cross Site Scripting Vulnerabilities



from SecurityFocus Vulnerabilities http://bit.ly/1ACo2V9

Nordstroms Wins for Strangest Robots.txt

Comments



from Hacker News http://bit.ly/1LStjcY

Linode Critical Xen Maintenance

Comments



from Hacker News http://bit.ly/1BJgouy

LLVM 3.6 Release Notes

Comments



from Hacker News http://bit.ly/1LShFP8

Make a Lisp

Comments



from Hacker News http://bit.ly/1BJ4sbW

The Philosophy of Digital Art

Comments



from Hacker News http://stanford.io/1LShCTv

Adware Bundler IronSource Raises $105M to Buy Startups Ahead of IPO

Comments



from Hacker News http://onforb.es/1BJ4rVz

Karojisatsu – Leaving the DevOps Community

Comments



from Hacker News http://bit.ly/1LShCCU

Aspiring Israeli Singer Indicted for Hacking Madonna Since 2012

Aspiring Israeli Singer Indicted for Hacking Madonna Since 2012

An Israeli man arrested last month for allegedly hacking Madonna’s private accounts and stealing demos of her unreleased album first began targeting the singer way back in 2012, according to authorities. He apparently hacked not only cloud storage accounts to steal and sell her music but also breached more than a dozen email accounts associated […]


The post Aspiring Israeli Singer Indicted for Hacking Madonna Since 2012 appeared first on WIRED.




















from WIRED » Threat Level http://wrd.cm/1MZOSvp

Mattermark is hiring their first DevOps Engineer to lead the charge

Comments



from Hacker News http://bit.ly/1DAGihs

When Multitasking Makes You Happy and When It Doesn’t

Comments



from Hacker News http://bit.ly/1DAGihm

Linux Profiling at Netflix

Comments



from Hacker News http://bit.ly/1DAGfC9

Leonard Nimoy's final tweet

Comments



from Hacker News http://bit.ly/1DAGflS

The Siberian crater saga is more widespread than previously thought

Comments



from Hacker News http://wapo.st/1E0umXy

NetScaler Master Class - February 2013


















Descriptions are required to be a minimum of 45 characters long. It is very important to provide a detailed description of the video so that viewers understand what the video is about. The description information is used to drive search results on internal and external sites and for creating associations to related videos that are displayed on the video player page.


Views:0

Length:1:50:29






from CitrixTV RSS Feed http://bit.ly/1awIzkf

Enterprise mobility news recap: Feb 23 – 27

The hourly countdown has begun for Mobile World Congress as technology journalists line up their predictions for new releases and anticipate keynote sessions from Mark Zuckerberg and Tom Wheeler of the FCC. The public sector had its fair share of industry news considering new FCC regulations and the U.S. Department of Treasury’s newly accepted monetary […]]> http://vmw.re/18vwYRK 0 AirWatch to integrate with Android for Work http://vmw.re/1AiL5PP http://vmw.re/18vwYRN Wed, 25 Feb 2015 19:04:25 +0000

Enterprise mobility news recap: Feb 23 – 27

The hourly countdown has begun for Mobile World Congress as technology journalists line up their predictions for new releases and anticipate keynote sessions from Mark Zuckerberg and Tom Wheeler of the FCC. The public sector had its fair share of industry news considering new FCC regulations and the U.S. Department of Treasury’s newly accepted monetary […]]> http://vmw.re/18vwYRK 0 AirWatch to integrate with Android for Work http://vmw.re/1AiL5PP http://vmw.re/18vwYRN Wed, 25 Feb 2015 19:04:25 +0000
Lanier Norville




from VMware Blogs http://bit.ly/1AiL3HG

Vuln: WordPress Frontend Uploader Plugin 'errors' Parameter Cross Site Scripting Vulnerability

WordPress Frontend Uploader Plugin 'errors' Parameter Cross Site Scripting Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1JWbNsx

Vuln: b2evolution 'admin.php' Cross-Site Scripting Vulnerability

b2evolution 'admin.php' Cross-Site Scripting Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1DiRPiW

Breach costs at $162 million, Target reports

Retailer has collected $90 million in payouts on $100 million of network-security insurance coverage



from Latest topics for ZDNet in Security http://zd.net/1wssJeK

Vuln: Ekahau Real-Time Location System CVE-2014-2716 Multiple Security Weaknesses

Ekahau Real-Time Location System CVE-2014-2716 Multiple Security Weaknesses



from SecurityFocus Vulnerabilities http://bit.ly/1wvmH2A

Vuln: Papoo Light Multiple HTML Injection Vulnerabilities

Papoo Light Multiple HTML Injection Vulnerabilities



from SecurityFocus Vulnerabilities http://bit.ly/1DAzOPx

Vuln: X7 Chat 'lib/message.php' Arbitrary Code Execution Vulnerability

X7 Chat 'lib/message.php' Arbitrary Code Execution Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1wvmFrN

Did Grief Give Him Parkinson’s?

Comments



from Hacker News http://bit.ly/1MZG9cO

Google's HQ Redesign

Comments



from Hacker News http://wrd.cm/186E3ak

Type 2 diabetes, fatty liver disease reversed in rats

Comments



from Hacker News http://bit.ly/1MZG88H

Celebrating Engineers Week 2015 | #eweek2015

Happy Engineers Week! Here at Tribal Knowledge we believe that Engineers Week is more than a single event. It’s a year-round commitment to celebrate how engineers make a difference in our world. In partnership with the VMware Careers Blog, Tribal Knowledge is using this special week to kick off theVMware Innovation Series. Each month we’ll […]]> http://vmw.re/1LSNbOW 0 VMware Heads to Mobile World Congress http://vmw.re/1E0mZ27 http://vmw.re/1E0mVQa Fri, 27 Feb 2015 17:17:37 +0000

Celebrating Engineers Week 2015 | #eweek2015

Happy Engineers Week! Here at Tribal Knowledge we believe that Engineers Week is more than a single event. It’s a year-round commitment to celebrate how engineers make a difference in our world. In partnership with the VMware Careers Blog, Tribal Knowledge is using this special week to kick off theVMware Innovation Series. Each month we’ll […]]> http://vmw.re/1LSNbOW 0 VMware Heads to Mobile World Congress http://vmw.re/1E0mZ27 http://vmw.re/1E0mVQa Fri, 27 Feb 2015 17:17:37 +0000
Morgan OLeary




from VMware Blogs http://bit.ly/1LSNdGs

Thursday, February 26, 2015

Are tablets falling out of favour?

Comments



from Hacker News http://bbc.in/1FBCWKS

White and gold, or blue and black

Comments



from Hacker News http://bit.ly/1vEwse7

Five new undisclosed Xen vulnerabilities

Comments



from Hacker News http://bit.ly/1E22xj3

In the “web vs. apps” debate for online publishers, apps are on a run

Comments



from Hacker News http://bit.ly/1E22xj0

Linux Perf_events Off-CPU Time Flame Graph

Comments



from Hacker News http://bit.ly/1DfViPe

My ISP has poor service record. I made a tool to test how shitty it is

Comments



from Hacker News http://bit.ly/1DfViP2

Kalzumeus Podcast Episode 11: Bootstrapping vs. Raising Money

Comments



from Hacker News http://bit.ly/1DfVhKZ

Surveillance law prompts shift for Google-sponsored SDN test-bed

Penalties levied under a New Zealand surveillance law have proved too risky for a leading software defined networking collaboration.



from Latest topics for ZDNet in Security http://zd.net/1wtiMDF

The second-class internet? You're soaking in it

Forget about net neutrality and balkanisation; Lenovo's Superfish idiocy proves that we already have a dual-class internet -- and most of us are proles.



from Latest topics for ZDNet in Security http://zd.net/1FAT27A

A Decentralized Lie Detector

Comments



from Hacker News http://bit.ly/1EvOK3d

Bundler Issue: Remove code of conduct from generated gems

Comments



from Hacker News http://bit.ly/1AdOJua

Changes to Transparent Page Sharing completed and updated VMware Security Advisories

A new VMware Product Security White Paper highlighting the various ways VMwareminimizes product security risks for it’s customershas been published and is available via the VMware security web site:


http://vmw.re/16Jyj5M






via VMware Blogs http://bit.ly/18rDMQi

Changes to Transparent Page Sharing completed and updated VMware Security Advisories

As previously posted (Oct 16,Nov 24,Dec 4and Jan 27), VMware has introduced new TPS (Transparent Page Sharing) management options. Today’s ESXi 5.0 patch restricts TPS to individual VMs and disablesinter-VM TPSby defaultunless an administrator chooses to re-enable it. Please seeKB 2097593for full details on the functionality. Additionally VMware has today updated advisoryVMSA-2015-0001.1. Customers should review […]]> As previously posted (Oct 16,Nov 24,Dec 4and Jan 27), VMware has introduced new TPS (Transparent Page Sharing) management options. Today’s ESXi 5.0 patch restricts TPS to individual VMs and disablesinter-VM TPSby defaultunless an administrator chooses to re-enable it. Please seeKB 2097593for full details on the functionality.

Additionally VMware has today updated advisoryVMSA-2015-0001.1.


Customers should review the updated security advisory and direct any questions to VMware Support.


Please sign up to theSecurity-Announce mailing listto receive new and updated VMware Security Advisories.







from VMware Blogs http://bit.ly/18rDMQi

Love Python? Join Us and Build the Next Generation Phone Company, SendHub YC W12

Comments



from Hacker News http://bit.ly/1AdBjyp

Labor to cave on mandatory data retention

MPs of the Australian Labor Party are expected to vote for mandatory data-retention legislation when it is debated in parliament in March.



from Latest topics for ZDNet in Security http://zd.net/1E1vBah

Io.js and Node.js reconciliation proposal

Comments



from Hacker News http://bit.ly/1BjdJG0

Bertha, the Giant Borer That Broke, May Be Sinking Seattle's Downtown

Comments



from Hacker News http://n.pr/1EvE9Wb

Understanding the Engima machine from “The Imitation Game” with 30 Lines of Ruby

Comments



from Hacker News http://bit.ly/1EvE9W5

The Soviet Science System

Comments



from Hacker News http://bit.ly/1zM5az8

The Robots Are Coming

Comments



from Hacker News http://bit.ly/1zM59Lk

The Americas Virtual Partner Town Hall is March 4th @ 8am PT

If you earned both the Desktop and the Business Continuity competencies prior to Sep. 30, 2014, then you have been automatically grand-fathered in to the Software-Defined Storage Solution Competency. You will have until Sep. 30, 2015 to complete the competency requirements.






via VMware Blogs http://bit.ly/1BCXtkR

The Americas Virtual Partner Town Hall is March 4th @ 8am PT

If you haven’t already, register now to join this virtual Town Hall. Frank Rauch, VP Americas Partner Organization, and other key Business Unit leaders will share product updates and key announcements released at Partner Exchange. They will also cover the 2015 selling motions and how your company can drive revenues and increase profitability within these […]]> If you haven’t already, register now to join this virtual Town Hall. Frank Rauch, VP Americas Partner Organization, and other key Business Unit leaders will share product updates and key announcements released at Partner Exchange. They will also cover the 2015 selling motions and how your company can drive revenues and increase profitability within these growing solutions.



from VMware Blogs http://bit.ly/1BCXtkR

React JavaScript Tutorial and Guide to the Gotchas

Comments



from Hacker News http://bit.ly/1zM1Jbx

Booktrope (YC W15) Rethinks Book Publishing

Comments



from Hacker News http://tcrn.ch/1zM1Jbs

Mornings Don't Make You Moral

Comments



from Hacker News http://nyr.kr/1zM1GfV

Vuln: Oracle Java SE CVE-2015-0400 Remote Java SE Vulnerability

Oracle Java SE CVE-2015-0400 Remote Java SE Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/18qVoM7

Yes, You’re Irrational, and Yes, That’s OK

Comments



from Hacker News http://bit.ly/1LLFCrA

Understanding Uniprocessor OS Scheduling Policies

Comments



from Hacker News http://bit.ly/1LLFCrs

Push events, NAT TCP connection timeouts, and device sleep

Comments



from Hacker News http://bit.ly/1LLFEj9

Aptible (YC S14) Is Hiring Senior Platform Engineers

Comments



from Hacker News http://bit.ly/1AxpJD0

The truly personal computer

Comments



from Hacker News http://econ.st/1wlMrJj

Show HN: Daybook – A new take on personal journaling

Comments



from Hacker News http://bit.ly/1wlMuoj

The Running Novelist (2008)

Comments



from Hacker News http://nyr.kr/1AxpI1Y

The girl who gets gifts from birds

Comments



from Hacker News http://bbc.in/1wlMu7I

CassTcl, a Tcl C extension providing a Tcl interface to the Cassandra database

Comments



from Hacker News http://bit.ly/1AxpHLr

The Path to Parallel JavaScript

Comments



from Hacker News http://mzl.la/1FzxWXc

Invented here syndrome

Comments



from Hacker News http://bit.ly/1aqKxmc

Albertus and the Prisoner

Comments



from Hacker News http://bit.ly/1FzxTuy

London's poor fetish: commodifying working class culture

Comments



from Hacker News http://bit.ly/18qEvkP

Keybase.io Vulnerability

Comments



from Hacker News http://bit.ly/1ziU8jw

The Rise and Fall of the Comanche Empire (2010)

Comments



from Hacker News http://n.pr/18qEsoZ

Viewpoint: Advising students for success (2009)

Comments



from Hacker News http://bit.ly/18qEuNN

Your Bank's Interest In Hybrid Cloud






EMC logo


















The Financial Services Industry has been leveraging technology and new innovative software to improve customer experiences and build direct relationships with users. See why CIO's have been...


From: EMC

Views: 0


0 ratings

Time: 05:03 More in Science & Technology








via EMC Feeds http://bit.ly/1JRFDOY

#BigData can teach us two things about climate change: why it's happening, and w...






EMC logo
#BigData can teach us two things about climate change: why it's happening, and what we can do about it http://emc.im/1Gn4fK0










via EMC Feeds http://bit.ly/1ziTdzH

In 2014, the hyper-converged market grew 140% - find out why: http://bit.ly/1JRFECs






EMC logo
In 2014, the hyper-converged market grew 140% - find out why: http://bit.ly/1JRFECs






via EMC Feeds http://bit.ly/1ziTdja

Your Bank's Interest In Hybrid Cloud






EMC logo


















The Financial Services Industry has been leveraging technology and new innovative software to improve customer experiences and build direct relationships with users. See why CIO's have been...


From: EMC

Views: 0


0 ratings

Time: 05:03 More in Science & Technology








via EMC Feeds http://bit.ly/1JRFDOY

#BigData can teach us two things about climate change: why it's happening, and w...






EMC logo
#BigData can teach us two things about climate change: why it's happening, and what we can do about it http://emc.im/1Gn4fK0










via EMC Feeds http://bit.ly/1ziTdzH

In 2014, the hyper-converged market grew 140% - find out why: http://bit.ly/1JRFECs






EMC logo
In 2014, the hyper-converged market grew 140% - find out why: http://bit.ly/1JRFECs






via EMC Feeds http://bit.ly/1ziTdja

Vuln: ISC BIND CVE-2015-1349 Remote Denial of Service Vulnerability

ISC BIND CVE-2015-1349 Remote Denial of Service Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1FzkBxS

Vuln: Google Android 'GraphicBuffer::unflatten()' Function Multiple Integer Overflow Vulnerabilities

Google Android 'GraphicBuffer::unflatten()' Function Multiple Integer Overflow Vulnerabilities



from SecurityFocus Vulnerabilities http://bit.ly/1vDbexe

Wednesday, February 25, 2015

Micro-Apartments, Tiny Homes Prefabricated in Brooklyn

Comments



from Hacker News http://nyti.ms/1AsK78g

From exec to indie: One family’s wild ride ends today with debut of dream game

Comments



from Hacker News http://bit.ly/1AsK8JD

Trail of Tools Reveals Modern Humans' Path Out of Africa

Comments



from Hacker News http://bit.ly/1AsK8Js

​Lenovo website DNS record hijacked

Lenovo's Superfish debacle seems to have drawn the ire of the Lizard Squad hackers.



from Latest topics for ZDNet in Security http://zd.net/1Dc1RlJ

Socialcast + Workday: HR’s Dream Come True

With 2014 in our rearview mirrors, many workplace conversations are turning to performance reviews. Employees are racking their brains trying to document all of their accomplishments over the past 12 months, and people managers have the equally daunting task of acknowledging the successes of all of their direct reports. At VMware, we’ve developed an integration between Socialcast and Workday that is helping us to alleviate these very real pain points, and save countless man hours in the process.


Read more on Socialcast + Workday: HR’s Dream Come True…






from VMware Blogs http://bit.ly/1Et8t3H

Socialcast + Workday: HR’s Dream Come True

With 2014 in our rearview mirrors, many workplace conversations are turning to performance reviews. Employees are racking their brains trying to document all of their accomplishments over the past 12 months, and people managers have the equally daunting task of acknowledging the successes of all of their direct reports. At VMware, we’ve developed an integration between Socialcast and Workday that is helping us to alleviate these very real pain points, and save countless man hours in the process.


By integrating our 18,500-member Socialcast community with our HR platform, we’ve made it easy for both employees and people managers to account for all of the hard work performed across the organization over the course of the year.


Socialcast comes built with a feature called Thanks, which allows members of the community to publicly recognize others for exemplary work by sending them a personalized badge. On average, about 700 Thanks badges are distributed to community members each month in the VMware community. There are many different kinds of Thanks badges, including 5 that align with VMware’s company values — execution, passion, integrity, customers and community — and others that recognize innovative thinking, problem solving skills, and leadership. Each time a VMware employee exhibits one of these traits, his or her colleagues will publicly recognize that individual in the community for a job well done.


Our custom integration allows us to then take these badges and import them into Workday, making it very easy for employees to recall their company-wide contributions and incorporate that feedback into their self-reviews. For managers, these Thanks badges provide insight into how their direct reports have gone above and beyond the call of duty that year, often assisting with projects unrelated to their job description.


The integration process is very straightforward. Socialcast has a Thanks API that provides an output of all the Thanks badges shared in a given community. We also provide the option to set a time range for the response. For example, you can request an export of all Thanks badges received in January 2014. In our case, the VMware IT team performed a one time mass upload of all “Thanks” badges sent in our Socialcast community on or after 1/1/2013, and we officially launched the integration in February 2014.


From an operational standpoint, the team that manages the integration receives a weekly delta “Thanks” file by email that is then uploaded into Workday on Fridays. They upload “Thanks” given to an employee by either another employee or a contractor. The employee can then view the Thanks badges that they’ve received on the Career > Professional Profile and Feedback pages in Workday.


As a manager, you can view Thanks badges given to your direct reports by going to the person’s Feedback page. This allows you to gain insight into your employee’s company-wide contributions without needing to conduct 360-degree reviews, which — as every manager knows — can be very time-consuming. Having this type of feedback at your fingertips enables you as a manager to be that much more thorough and effective in the annual performance review process.


In a very short amount of time, the impact on the VMware organization has been considerable. Senior HR Director Amy Gannaway says that “by integrating this data into our core HR processes, we encourage a culture that reinforces recognition and strives for ongoing conversations around contribution.” This wouldn’t be possible without Socialcast and Workday working in concert with one another.


Here at Socialcast we believe that simply checking the “Enterprise Social Network” box at your company is not enough. It’s clear that with approximately 80% of companies using ESN’s today, this type of technology has become an integral part of annual budget conversations. The real challenge is leveraging an ESN to simplify existing workflows or increase operational efficiency, which is what we help our customers do every day with integrations such as the one with Workday. Contact us anytime for more details at services@socialcast.com.






via VMware Blogs http://bit.ly/1Et8t3H

Artemis pCell: Wireless Reinvented [pdf]

Comments



from Hacker News http://bit.ly/1AsBDhA

Google Develops AI That Is Entirely Self Learning

Comments



from Hacker News http://bit.ly/1GwQet4

This World of Ours (2014) [pdf]

Comments



from Hacker News http://bit.ly/1AsBCtZ

The plan to resurrect ToeJam and Earl

Comments



from Hacker News http://bit.ly/1GwQbNS

Genome Architecture in Twists of DNA

Comments



from Hacker News http://bit.ly/1zfCKfw

Taking Screenshots from Memory Dumps (2012)

Comments



from Hacker News http://bit.ly/1zfCKfr

White House Doesn't Want You to Know the TPP's Effects on U.S. Copyright Laws

Comments



from Hacker News http://bit.ly/1ALORVF

Kvikkalkul: the secret programming language of the Swedish Navy

Comments



from Hacker News http://bit.ly/1ALOPx3

'Bright Spot' on Ceres Has Dimmer Companion

Comments



from Hacker News http://1.usa.gov/1ALOPwZ

YC's Female Founders Conference Doodles

Comments



from Hacker News http://bit.ly/1DWV8Bx

Show HN: DonglePi, a USB Stick Giving You the Raspberry Pi IOs on a PC

Comments



from Hacker News http://bit.ly/1DWV6cP

Sharelock – Securely share data

Comments



from Hacker News https://sharelock.io

Astronomers find an ancient black hole the size of 12B suns

Comments



from Hacker News http://wapo.st/1ALOREZ

Y Combinator-Backed Bright Aims to Bring Solar Power to Mexico

Comments



from Hacker News http://tcrn.ch/1ALOREU

De-Anonymizing alt.anonymous.messages [pdf]

Comments



from Hacker News http://bit.ly/1ALOPgo

5G researchers manage record connection speed

Comments



from Hacker News http://bbc.in/1DWV5FU

Better machine learning

Comments



from Hacker News http://bit.ly/1DWV5px

Henry VIII's evidence to support break with Rome turns up in Cornish library

Comments



from Hacker News http://bit.ly/1DWV4Sq

SiriusXM to Launch “Startup School Radio” with YC Partner Aaron Harris

Comments



from Hacker News http://on.mktw.net/1DWV2d3

Time Bandit: Pebble’s new weapon in its battle with Apple and Android watches

Comments



from Hacker News http://bit.ly/1DWV1WA

AirWatch to integrate with Android for Work

AirWatch is working with Google to integrate with Android for Work, a Google program that brings together OEMs, ISVs and EMMs to ensure organizations can confidently manage devices running Android. Android for Work securely separates business and personal data and applications – and simplifies management of work-related policies, profiles and data – on tablets and […]]> http://vmw.re/1LIZdKK 0 VMware and AirWatch, one year later http://vmw.re/1LIZdKL http://vmw.re/1DWNSWk Tue, 24 Feb 2015 15:03:02 +0000

USN-2505-1: Firefox vulnerabilities

Ubuntu Security Notice USN-2505-1


25th February, 2015


firefox vulnerabilities


A security issue affects these releases of Ubuntu and its derivatives:



  • Ubuntu 14.10

  • Ubuntu 14.04 LTS

  • Ubuntu 12.04 LTS


Summary


Firefox could be made to crash or run programs as your login if it opened a malicious website.


Software description



  • firefox - Mozilla Open Source web browser


Details


Matthew Noorenberghe discovered that whitelisted Mozilla domains could

make UITour API calls from background tabs. If one of these domains were

compromised and open in a background tab, an attacker could potentially

exploit this to conduct clickjacking attacks. (CVE-2015-0819)


Jan de Mooij discovered an issue that affects content using the Caja

Compiler. If web content loads specially crafted code, this could be used

to bypass sandboxing security measures provided by Caja. (CVE-2015-0820)


Armin Razmdjou discovered that opening hyperlinks with specific mouse

and key combinations could allow a Chrome privileged URL to be opened

without context restrictions being preserved. If a user were tricked in to

opening a specially crafted website, an attacker could potentially exploit

this to bypass security restrictions. (CVE-2015-0821)


Armin Razmdjou discovered that contents of locally readable files could

be made available via manipulation of form autocomplete in some

circumstances. If a user were tricked in to opening a specially crafted

website, an attacker could potentially exploit this to obtain sensitive

information. (CVE-2015-0822)


Atte Kettunen discovered a use-after-free in the OpenType Sanitiser (OTS)

in some circumstances. If a user were tricked in to opening a specially

crafted website, an attacker could potentially exploit this to cause a

denial of service via application crash. (CVE-2015-0823)


Atte Kettunen discovered a crash when drawing images using Cairo in some

circumstances. If a user were tricked in to opening a specially crafted

website, an attacker could potentially exploit this to cause a denial of

service. (CVE-2015-0824)


Atte Kettunen discovered a buffer underflow during playback of MP3 files

in some circumstances. If a user were tricked in to opening a specially

crafted website, an attacker could potentially exploit this to obtain

sensitive information. (CVE-2015-0825)


Atte Kettunen discovered a buffer overflow during CSS restyling in some

circumstances. If a user were tricked in to opening a specially crafted

website, an attacker could potentially exploit this to cause a denial of

service via application crash, or execute arbitrary code with the

privileges of the user invoking Firefox. (CVE-2015-0826)


Abhishek Arya discovered an out-of-bounds read and write when rendering

SVG content in some circumstances. If a user were tricked in to opening

a specially crafted website, an attacker could potentially exploit this

to obtain sensitive information. (CVE-2015-0827)


A buffer overflow was discovered in libstagefright during video playback

in some circumstances. If a user were tricked in to opening a specially

crafted website, an attacker could potentially exploit this to cause a

denial of service via application crash, or execute arbitrary code with

the privileges of the user invoking Firefox. (CVE-2015-0829)


Daniele Di Proietto discovered that WebGL could cause a crash in some

circumstances. If a user were tricked in to opening a specially crafted

website, an attacker could potentially exploit this to cause a denial of

service. (CVE-2015-0830)


Paul Bandha discovered a use-after-free in IndexedDB. If a user were

tricked in to opening a specially crafted website, an attacker could

potentially exploit this to cause a denial of service via application

crash, or execute arbitrary code with the privileges of the user invoking

Firefox. (CVE-2015-0831)


Muneaki Nishimura discovered that a period appended to a hostname could

bypass key pinning and HSTS in some circumstances. A remote attacker could

potentially exloit this to conduct a Man-in-the-middle (MITM) attack.

(CVE-2015-0832)


Alexander Kolesnik discovered that Firefox would attempt plaintext

connections to servers when handling turns: and stuns: URIs. A remote

attacker could potentially exploit this by conducting a Man-in-the-middle

(MITM) attack in order to obtain credentials. (CVE-2015-0834)



Carsten Book, Christoph Diehl, Gary Kwong, Jan de Mooij, Liz Henry, Byron

Campen, Tom Schuster, Ryan VanderMeulen, Christian Holler, Jesse Ruderman,

Randell Jesup, Robin Whittleton, Jon Coppeard, and Nikhil Marathe

discovered multiple memory safety issues in Firefox. If a user were

tricked in to opening a specially crafted website, an attacker could

potentially exploit these to cause a denial of service via application

crash, or execute arbitrary code with the privileges of the user invoking

Firefox. (CVE-2015-0835, CVE-2015-0836)


Update instructions


The problem can be corrected by updating your system to the following package version:



Ubuntu 14.10:

firefox 36.0+build2-0ubuntu0.14.10.4

Ubuntu 14.04 LTS:

firefox 36.0+build2-0ubuntu0.14.04.4

Ubuntu 12.04 LTS:

firefox 36.0+build2-0ubuntu0.12.04.5


To update your system, please follow these instructions: http://bit.ly/1aJDvTw.


After a standard system update you need to restart Firefox to make

all the necessary changes.


References


CVE-2015-0819, CVE-2015-0820, CVE-2015-0821, CVE-2015-0822, CVE-2015-0823, CVE-2015-0824, CVE-2015-0825, CVE-2015-0826, CVE-2015-0827, CVE-2015-0829, CVE-2015-0830, CVE-2015-0831, CVE-2015-0832, CVE-2015-0834, CVE-2015-0835, CVE-2015-0836






from Ubuntu Security Notices http://bit.ly/1A7KpfX

Gemalto Confirms It Was Hacked But Insists the NSA Didn’t Get Its Crypto Keys

Gemalto Confirms It Was Hacked But Insists the NSA Didn’t Get Its Crypto Keys

As the the company confirmed the hacks, it downplayed their significance, insisting that the attackers failed to get inside the network where cryptographic keys are stored to protect mobile communications.


The post Gemalto Confirms It Was Hacked But Insists the NSA Didn’t Get Its Crypto Keys appeared first on WIRED.




















from WIRED » Threat Level http://wrd.cm/1ERwLlJ

AirWatch to integrate with Android for Work

AirWatch is working with Google to integrate with Android for Work, a Google program that brings together OEMs, ISVs and EMMs to ensure organizations can confidently manage devices running Android. Android for Work securely separates business and personal data and applications – and simplifies management of work-related policies, profiles and data – on tablets and […]]> http://vmw.re/1LIZdKK 0 VMware and AirWatch, one year later http://vmw.re/1LIZdKL http://vmw.re/1DWNSWk Tue, 24 Feb 2015 15:03:02 +0000
Maddie Cook




from VMware Blogs http://bit.ly/1LIZc9E

You May be Grand-fathered into the SDS Competency….

If you earned both the Desktop and the Business Continuity competencies prior to Sep. 30, 2014, then you have been automatically grand-fathered in to the Software-Defined Storage Solution Competency. You will have until Sep. 30, 2015 to complete the competency requirements.



from VMware Blogs http://bit.ly/1BdBj77

You May be Grand-fathered into the SDS Competency….

If you earned both the Desktop and the Business Continuity competencies prior to Sep. 30, 2014, then you have been automatically grand-fathered in to the Software-Defined Storage Solution Competency. You will have until Sep. 30, 2015 to complete the competency requirements.






via VMware Blogs http://bit.ly/1BdBj77

Vuln: WordPress Photo Gallery Plugin 'wp-admin/admin-ajax.php' SQL Injection Vulnerability

WordPress Photo Gallery Plugin 'wp-admin/admin-ajax.php' SQL Injection Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1ERnWZc

HelloSign is hiring its first API Evangelist

Comments



from Hacker News http://bit.ly/1alaFyK

FedEx and UPS Refuse to Ship a Digital Mill That Can Make Untraceable Guns

Comments



from Hacker News http://wrd.cm/1alaHqk

How to pick startup ideas

Comments



from Hacker News http://bit.ly/1alaH9P

Programming a Computer for Playing Chess (1950) [pdf]

Comments



from Hacker News http://bit.ly/1alaGTs

Small Introduction to Markov Chains

Comments



from Hacker News http://bit.ly/1ERm3M9

End to end encryption though Kafka: our proof of concept

Comments



from Hacker News http://bit.ly/1ERm6aE

Soylent 1.4 begins shipping today

Comments



from Hacker News http://bit.ly/1ERm3vH

Google announces Android for Work

Comments



from Hacker News http://bit.ly/1A7ssyj

Boston’s astounding month of snow a 1-in-26,315 year occurrence

Comments



from Hacker News http://wapo.st/1A7ss1k

SN 1006

Comments



from Hacker News http://bit.ly/1BvvQKE

Google's DeepMind publishes Nature paper on deep Q-network (DQN)

Comments



from Hacker News http://bit.ly/1BvvQtX

Kaspersky Labs Launches Online Bootcamp to Eye Security Startups

Comments



from Hacker News http://tcrn.ch/1BvvNOQ

Why We Killed Off Code Reviews

Comments



from Hacker News http://bit.ly/1DqSrWj

Show HN: $1 Meal for Grand Opening in SLU, Downtown Seattle by SpoonRocket

Comments



from Hacker News http://bit.ly/1DqSpxD

Real Resume Examples from 1000's of Top Paid Professionals

Comments



from Hacker News http://bit.ly/1BddUCC

Lisp implemented in under 1K of JavaScript

Comments



from Hacker News http://bit.ly/1BddTij

How Madden Ratings Are Made

Comments



from Hacker News http://53eig.ht/1DqSp0B

Tuesday, February 24, 2015

Synchronous Execution and Filesystem Access in Emscripten

Comments



from Hacker News http://mzl.la/1zEP3Dl

Overhydration and Endurance Running

Comments



from Hacker News http://bit.ly/1zEP3Da

As Republicans Concede, F.C.C. Is Expected to Enforce Net Neutrality

Comments



from Hacker News http://nyti.ms/1afQDWl

CISOs: Our Organizations are Wide-Open for Cyber-Terrorism

66% believe senior leaders in their organization do not perceive cybersecurity as a strategic priority,



from http://bit.ly/1GqpOcH

(ISC)2 Opens GISLA Nominations

This year’s GISLA program will recognize government information security professionals who see opportunity in crisis, whether in federal or state/local service.



from http://bit.ly/1GqpOcq

The College of Lost Arts

Comments



from Hacker News http://bit.ly/1EOk1MI

Perceptiv’s SHIFT (YC W15) Turns Drones into Smart Dollies for Filmmakers

Comments



from Hacker News http://bit.ly/1vwJVVq

This Is Your Avatar Speaking

Comments



from Hacker News http://nyr.kr/1EOjYR3

Vuln: Wireshark '.pcap' File Memory Corruption Vulnerability

Wireshark '.pcap' File Memory Corruption Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1DQ0kqR

A Story About ‘Magic'

Comments



from Hacker News http://bit.ly/1Dmqu1z

Why the world needs collectors

Comments



from Hacker News http://bit.ly/1vwCr4Q

FBI "close" to identifying Anthem hackers, as dozens of state-sponsored groups identified

The federal agency is cracking down on state-sponsored cyber-threat groups.



from Latest topics for ZDNet in Security http://zd.net/1wlPAOL

Samba Remote Code Execution Vulnerability

Original release date: February 24, 2015

Linux and Unix based operating systems employing Samba versions 3.5.0 through 4.2.0rc4 contain a vulnerability in the Server Message Block daemon (smbd). Exploitation of this vulnerability may allow a remote attacker to take control of an affected system.


US-CERT recommends users and administrators refer to their respective Linux OS vendor(s) for an appropriate patch if affected. Patches are currently available from Debian, Red Hat, Suse, and Ubuntu. A Samba patch is available for experienced users and administrators to implement.




This product is provided subject to this Notification and this Privacy & Use policy.








from US-CERT: The United States Computer Emergency Readiness Team http://1.usa.gov/1BPat6u

Kaspersky Lab presents Kaspersky Security System and its availability with SYSGO’s PikeOS

The innovative Kaspersky Security System platform is a dedicated solution designed to ensure the safety of information systems that demand enhanced security.



from http://bit.ly/1BnXJ7o

Luka: A.I. recommending restaurants in a chat interface

Comments



from Hacker News https://luka.ai

A Brief Introduction to Termios (2009)

Comments



from Hacker News http://bit.ly/1w9iSdL

Characterizing the Spatial Structure of Defensive Skill in Pro Basketball [pdf]

Comments



from Hacker News http://bit.ly/1FUTa5e

Pyston 0.3 released

Comments



from Hacker News http://bit.ly/1w9iQTh

'Gerbils replace rats' as main cause of Black Death

Comments



from Hacker News http://bbc.in/1FUT9OJ

Five Analytics Features Every Socialcast Admin Should Use

Social Business Intelligence (SBI), Socialcast’s in-app analytics platform, is enabled for all Socialcast communities and has many great features that add tremendous value for community administrators. Today, we would like to highlight some of the most useful SBI features that we think every admin should leverage to increase adoption and engagement in their Socialcast community. […

Social Business Intelligence (SBI), Socialcast’s in-app analytics platform, is enabled for all Socialcast communities and has many great features that add tremendous value for community administrators.


Today, we would like to highlight some of the most useful SBI features that we think every admin should leverage to increase adoption and engagement in their Socialcast community.


People Dashboard


The People Dashboard is a powerful tool to track community growth and adoption. This chart allows you to stay informed on community growth by looking at the number of invitations sent and new accounts created. You can easily see if your community is growing with increasing vigor or if you should take action to catalyze growth.


#protip One of the best ways to increase growth is to identify power users and work with them to invite their teams and business units to join the Socialcast community.


Engagement metrics are another set of critical metrics displayed on the People Dashboard. You can quickly see how many members have signed-in to your community that same day, as well as in the last week, month and all time. As your community becomes more active, members should sign-in more frequently.


#protip If adoption is lower than expected, we encourage community admins to focus on improving the Profile Photos and Connections Made metrics on the People Dashboard as they are drivers for higher adoption. In fact, studies conducted by our data science team have shown that members that upload profile photos and connect with team members during their first week in the community are more likely to become long-term, highly engaged, Socialcast users.


Most Active Members


In the last section, we recommended working with power users to spur adoption of your Socialcast community. So how do you identify who the super users are in your community? The “Activity by Individual” page. You can ask your power users to invite their team members to Socialcast. You can also partner with power users to help transform internal collaboration within their teams and business units by leveraging Socialcast.


#protip Be sure to also sort by Comments and Likes to identify additional super users.


Most Active Groups


The Activity By Groups page is another useful way to drive engagement by identifying hotbeds of activity in your community.


#protip Our internal data analysis shows that most content is posted to groups, so members should be encouraged to join groups in order to join the Socialcast conversation. Using the data you gather, you can ensure that the most active groups are available for new users to join during the activation flow. This will make plenty of fresh content available to the user in their home stream immediately upon their first login and make clear to them the benefits of Socialcast.


Most Active Group Members


If you are wondering which users are driving the activity in the most active groups, you can click into a specific group’s activity page. The historical activity chart lists the group members who have posted the most messages and comments. These are great people to partner with as you work to evangelize Socialcast within your organization.


Applications Dashboard


The Application Dashboard shows usage by application, allowing you to target specific apps for awareness campaigns.


#protip Our internal studies show that mobile users are more likely to become long-term engaged users of Socialcast, so community admins should encourage users to download the mobile apps from the app store.


Additionally, you can use this page to monitor the use of other applications that you have integrated with Socialcast. For instance, if you have connected your Sharepoint instance to Socialcast (via a Socialcast Reach extension), you can monitor engagement via that platform and understand the level of collaboration around files within your organization.


Reach Dashboard


Socialcast customers use our Reach feature to extend the Socialcast discussion into external business systems (such as Jira, Salesforce or Sharepoint) and to bring work being done in those systems back into the Socialcast community. These types of integrations can aid in various use cases, including exception handling and knowledge capture. The Reach Dashboard allows community administrators to monitor how individual Reach integrations are performing to better understand user engagement.


We’ve only highlighted a few SBI pages above, but there are many more that provide additional insight into end user engagement. Check out information on trending discussions to promote content that your most active users are discussing. Our data shows that highly involved community administrators that leverage features based on key metrics in SBI prove to have the most successful Socialcast communities.


A great example is Dennis Agusi at Philips. He recently published a blog post about his use of advanced analytics, which he uses in addition to what is found in SBI.


Explore SBI today and help make your Socialcast community an even bigger success.






from VMware Blogs http://bit.ly/1FUM8h6

Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird

Original release date: February 24, 2015

The Mozilla Foundation has released security updates to address multiple vulnerabilities in Firefox, Firefox ESR, and Thunderbird. Exploitation of these vulnerabilities may allow a remote attacker to obtain sensitive information or execute arbitrary code on an affected system.


Updates available include:



  • Firefox 36

  • Firefox ESR 31.5

  • Thunderbird 31.5


Users and administrators are encouraged to review the Security Advisories for Firefox, Firefox ESR, and Thunderbird and apply the necessary updates.




This product is provided subject to this Notification and this Privacy & Use policy.








from US-CERT: The United States Computer Emergency Readiness Team http://1.usa.gov/1w9eUSk

Health insurance hack hit up to 19M non-Anthem customers

The health insurance company said that millions of people who weren't enrolled in its services were affected by a hack earlier this year.



from Latest topics for ZDNet in Security http://zd.net/1Gq85lz

Zapier is hiring a Product Designer. Remote welcome

Comments



from Hacker News http://bit.ly/1zEnqu4

Tuning machine learning models

Comments



from Hacker News http://bit.ly/1afgaPC

Game Theory Calls Cooperation into Question

Comments



from Hacker News http://bit.ly/1afgayZ

Apache HBase 1.0 released

Comments



from Hacker News http://bit.ly/1afgdei

Five Analytics Features Every Socialcast Admin Should Use

Social Business Intelligence (SBI), Socialcast’s in-app analytics platform, is enabled for all Socialcast communities and has many great features that add tremendous value for community administrators. Today, we would like to highlight some of the most useful SBI features that we think every admin should leverage to increase adoption and engagement in their Socialcast community. […]]>

Social Business Intelligence (SBI), Socialcast’s in-app analytics platform, is enabled for all Socialcast communities and has many great features that add tremendous value for community administrators.


Today, we would like to highlight some of the most useful SBI features that we think every admin should leverage to increase adoption and engagement in their Socialcast community.


People Dashboard


The People Dashboard is a powerful tool to track community growth and adoption. This chart allows you to stay informed on community growth by looking at the number of invitations sent and new accounts created. You can easily see if your community is growing with increasing vigor or if you should take action to catalyze growth.


#protip One of the best ways to increase growth is to identify power users and work with them to invite their teams and business units to join the Socialcast community.


Engagement metrics are another set of critical metrics displayed on the People Dashboard. You can quickly see how many members have signed-in to your community that same day, as well as in the last week, month and all time. As your community becomes more active, members should sign-in more frequently.


#protip If adoption is lower than expected, we encourage community admins to focus on improving the Profile Photos and Connections Made metrics on the People Dashboard as they are drivers for higher adoption. In fact, studies conducted by our data science team have shown that members that upload profile photos and connect with team members during their first week in the community are more likely to become long-term, highly engaged, Socialcast users.


Most Active Members


In the last section, we recommended working with power users to spur adoption of your Socialcast community. So how do you identify who the super users are in your community? The “Activity by Individual” page. You can ask your power users to invite their team members to Socialcast. You can also partner with power users to help transform internal collaboration within their teams and business units by leveraging Socialcast.


#protip Be sure to also sort by Comments and Likes to identify additional super users.


Most Active Groups


The Activity By Groups page is another useful way to drive engagement by identifying hotbeds of activity in your community.


#protip Our internal data analysis shows that most content is posted to groups, so members should be encouraged to join groups in order to join the Socialcast conversation. Using the data you gather, you can ensure that the most active groups are available for new users to join during the activation flow. This will make plenty of fresh content available to the user in their home stream immediately upon their first login and make clear to them the benefits of Socialcast.


Most Active Group Members


If you are wondering which users are driving the activity in the most active groups, you can click into a specific group’s activity page. The historical activity chart lists the group members who have posted the most messages and comments. These are great people to partner with as you work to evangelize Socialcast within your organization.


Applications Dashboard


The Application Dashboard shows usage by application, allowing you to target specific apps for awareness campaigns.


#protip Our internal studies show that mobile users are more likely to become long-term engaged users of Socialcast, so community admins should encourage users to download the mobile apps from the app store.


Additionally, you can use this page to monitor the use of other applications that you have integrated with Socialcast. For instance, if you have connected your Sharepoint instance to Socialcast (via a Socialcast Reach extension), you can monitor engagement via that platform and understand the level of collaboration around files within your organization.


Reach Dashboard


Socialcast customers use our Reach feature to extend the Socialcast discussion into external business systems (such as Jira, Salesforce or Sharepoint) and to bring work being done in those systems back into the Socialcast community. These types of integrations can aid in various use cases, including exception handling and knowledge capture. The Reach Dashboard allows community administrators to monitor how individual Reach integrations are performing to better understand user engagement.


We’ve only highlighted a few SBI pages above, but there are many more that provide additional insight into end user engagement. Check out information on trending discussions to promote content that your most active users are discussing. Our data shows that highly involved community administrators that leverage features based on key metrics in SBI prove to have the most successful Socialcast communities.


A great example is Dennis Agusi at Philips. He recently published a blog post about his use of advanced analytics, which he uses in addition to what is found in SBI.


Explore SBI today and help make your Socialcast community an even bigger success.







via VMware Blogs http://bit.ly/1FUM8h6

CrowdMed: We've solved hundreds of the world's most difficult medical cases

Comments



from Hacker News http://bit.ly/1vwm73Y

How renewables are changing the way we operate the grid

Comments



from Hacker News http://bit.ly/1vwm9c3

A hybrid cloud in 28 days: that’s the promise of the Federation Enterprise Hybri...






EMC logo
A hybrid cloud in 28 days: that’s the promise of the Federation Enterprise Hybrid Cloud Solution http://emc.im/1DMAu7h










via EMC Feeds http://bit.ly/1LDjIbQ

Need a Data Lake Foundation? We can help http://emc.im/1Gn3uAD






EMC logo
Need a Data Lake Foundation? We can help http://emc.im/1Gn3uAD










via EMC Feeds http://bit.ly/1LDjIbC

"It’s only with XtremIO that you get more capacity, throughput, and I/O." http://bit.ly/1LDjHEH http://bit.ly/1DPyURZ






EMC logo
"It’s only with XtremIO that you get more capacity, throughput, and I/O." http://bit.ly/1LDjHEH http://bit.ly/1DPyURZ






via EMC Feeds http://bit.ly/1LDjHV7