Sunday, November 30, 2014

NET Binary Modification Walkthrough

Comments



from Hacker News http://bit.ly/1w8xRJp

The complete archive for DOOM for the 3DO

Comments



from Hacker News http://bit.ly/1rIVCXB

Left-leaning red-black trees are hard to implement

Comments



from Hacker News http://bit.ly/1v0SZL8

FastMail's Email Search Architecture

Comments



from Hacker News http://bit.ly/11Gosv2

Towards a more perfect link underline

Comments



from Hacker News http://bit.ly/1y628I7

Why Eric Schmidt doesn’t know how Google works

Comments



from Hacker News http://bit.ly/1zGVTca

Great Works in Programming Languages

Comments



from Hacker News http://bit.ly/1zGVTbZ

The Upcoming Jack and Jill Compilers in Android

Comments



from Hacker News http://bit.ly/12aCmGK

【SE必見】vSphere 最新バージョンを使おう!~簡単移行方法のご案内~メリット編

こんにちは!VMwareの中村です。 突然ですが、皆様お使いのVMware vSphereですがどのバージョンをお使いでしょうか? 現在(執筆時点)VMware vSphereの最新バージョンは5.5 u2ですが、VMware vSphere 4.x をお使いのユーザ様も多いのではないのでしょうか?HWとして実装するとコスト高になってしまう機能も、VMware vSphere 5.5 環境では、その機能をVMware vSphereで実装することにより、コスト的に敷居が下がるかもしれません。とはいいつつも移行するのは大変ですよね。本記事ではまずVMware vSphere 5.5 においてどのようなことができるのか?をご紹介し、シリーズ2回目以降に簡単な移行方法をご紹介していきます。 〜第1回ブログの内容〜 ★vCPU数の制限緩和について ★VMware vSphere 4.x をお持ちの方は…(特にstandard エディションをお持ちの方) ★サポート期間について ★主な新機能やエンハンス機能について ★データ保護機能 ★消費電力の違い… では、改めて….になりますが、VMware vSphere 5.5 で何ができるようになったのか?等ご紹介していきます。 ★vCPU数の制限緩和について まずVMware vSphere 5.5ではvCPU数の制限が緩和された事をご紹介します。 VMware vSphere 5.5 からvCPU数(仮想マシンで認識できるCPU数)の制限がなくなっております。 古いバージョンですと、ライセンスのエディションに依存したvCPU数制限がありましたが、 VMware vSphere 5.5ではエディションに依存した制限がなくなっております。 http://vmw.re/1A5d2Nr 図1 vCPU数について ★VMware vSphere 4.x Standard をお持ちのお客様は…. VMware vSphere 5.x に移行していただくと、Storage vMotionの機能が使用できます。VMware […]]> こんにちは!VMwareの中村です。

突然ですが、皆様お使いのVMware vSphereですがどのバージョンをお使いでしょうか?

現在(執筆時点)VMware vSphereの最新バージョンは5.5 u2ですが、VMware vSphere 4.x をお使いのユーザ様も多いのではないのでしょうか?HWとして実装するとコスト高になってしまう機能も、VMware vSphere 5.5 環境では、その機能をVMware vSphereで実装することにより、コスト的に敷居が下がるかもしれません。とはいいつつも移行するのは大変ですよね。本記事ではまずVMware vSphere 5.5 においてどのようなことができるのか?をご紹介し、シリーズ2回目以降に簡単な移行方法をご紹介していきます。


〜第1回ブログの内容〜

★vCPU数の制限緩和について

★VMware vSphere 4.x をお持ちの方は…(特にstandard エディションをお持ちの方)

★サポート期間について

★主な新機能やエンハンス機能について 

★データ保護機能

★消費電力の違い…


では、改めて….になりますが、VMware vSphere 5.5 で何ができるようになったのか?等ご紹介していきます。


★vCPU数の制限緩和について


まずVMware vSphere 5.5ではvCPU数の制限が緩和された事をご紹介します。

VMware vSphere 5.5 からvCPU数(仮想マシンで認識できるCPU数)の制限がなくなっております。

古いバージョンですと、ライセンスのエディションに依存したvCPU数制限がありましたが、

VMware vSphere 5.5ではエディションに依存した制限がなくなっております。

http://vmw.re/1A5d2Nr




図1 vCPU数について


★VMware vSphere 4.x Standard をお持ちのお客様は….


VMware vSphere 5.x に移行していただくと、Storage vMotionの機能が使用できます。VMware vSphere 4.x ですと

Storage vMotionの機能はStandardエディションでは使用できませんでしたが、VMware vSphere 5.x 以上では使用できます♪

この機能は仮想マシンをストレージ間(データストア間)で無停止移行することができる便利な機能です。VMware vSphereで

よく使用されている機能の一つとなっております。


また VMware vSphere 5.1 からクロスホストvMotionといって、共有ストレージがない環境でもvMotionをすることが可能です。


★サポート期間について


vSphere 5.5 に移行することによって、サポート期間が更新されます。このサポート期間についても少しみていきましょう。

ジェネラルサポートはメジャーリリースの一般発売日から指定された期日で終了します。

vSphereの場合、このジェネラルサポートは5年となっておりvSphere 5.0 / 5.1 のお客様において、ジェネラルサポートの終了が

2016年8月24日となっておりますが、vSphere 5.5 においてはメジャーリリース扱いとなっておりますので、ジェネラルサポートの終了が2018年9月19日までとなっております。


サポートポリシーのフェーズについて

製品ライフサイクルマトリックス




図2 vSphere 5.5 のサポート期間


★主な新機能やエンハンス機能について


ここではvSphere 5.5 から加わった新機能3つをご紹介します。

-パフォーマンスの向上:vFlash Read Cache (vFRC)

-アプリケーションまで監視: App HA

-ESXiのメモリ信頼性の向上: Reliable Memory


VMware vSphere 5.5から新しい機能として主に上記の機能が加わっております。

vFRC についてはホストでキャッシュしパフォーマンス向上をはかる仕組みです。

また可用性の向上としてアプリケーションの状態まで監視できる App HA という機能も加わっております。

インフラレベルではPSOD (Purple Screen of Death) の予防として Reliable Memory の機能が追加されております。


パフォーマンスの向上や信頼性の向上、という意味では他の方法で実装することもできますが、vFRC や App HA 等

vSphere = ソフトウエアで実現することによって、よりコスト的に敷居が下がるかもしれません。

是非VMware vSphere 5.5 で実装できる機能をご活用ください。

vSphere 5.5 の機能概要過去ブログ


★エンハンスされたデータ保護機能概要


vSphereにはデータ保護機能がありますが、vSphere 5.5からエンハンスされた内容をみてみましょう。

-管理DRの実現: vSphere Replication (vR)

-データ保護の実現: vSphere Data Protection (vDP)


大分おなじみになってきた vSphere Replication。

仮想マシン単位に遠隔地へデータをコピーし、システムに何かしら不測の事態が起きた際等に

瞬時に切り替える機能です。こちらはvSphere 5.5 から複数の復帰ポイントが保持できるようになっております。

これにより、どの時点のイメージで切り替えたい等、柔軟なオペレーションができるようになっております。


またvSphereに盛り込まれているバックアップ機能vSphere Data Protection (vDP) では

バックアップ開始時間のスケジューリングが分単位で設定できるようになっております。

-簡易DRを実現する、vSphere Replicationの概要

-データ保護を実現するvSphere Data Protectionの概要


★VMware vCenter Server Appliance (vCSA) のエンハンス


vCenter Appliance (vCSA) も5.5からパワーアップしております。vCSA 5.1 まではあくまでも小規模向けでしたが

vCSA 5.5はそこそこの規模 (ESXi 100台/仮想マシン規模3000台)をカバーできる仕様になっております。

もちろん、データベース、AutoDeploy Server やSyslog Collecter もはインストールされております。また Windows 版の vCenter に関しては、OS部分に関するパッチ適用作業も必要になるかと思いますが、その作業も減らすこともできますので、運用にもやさしいです。VMware vSphere 5.5 になってから、この vCSA を使用されるお客様が増えてきております。


★注目の VMware NSX の機能を使うためには?


また、いま注目度No1のネットワーク仮想化におけるNSXですが、NSXをご使用するには vCenter のバージョン 5.5が必須です。

また推奨としては分散仮想スイッチバージョン (vDS) も5.5となりますのでNSXが気になる…という方は是非こちらもご検討ください。


★最後に


あまり話しにでることが多くはないのですが、vSphere 5.5 は消費電力にも優しいです。負荷によっては、節電効果も大きくなってきております。台数が多くなればこちらの効果も大きくなってきておりますので、こちらもぜひご参照ください。


図3 各vSphereにおいて負荷と消費電力の関係

参照:http://vmw.re/1A5d08d


vSphere 5.5 にするとどのようなことができるようになったのか?を簡単にご紹介してまいりました。

では次回からは実際にどのように5.5 環境へ移行するかをご紹介してまいりますのでお楽しみに!!


〜本シリーズの流れ〜

-第1回 vSphere 最新バージョンを使おう!~簡単移行方法のご案内~ メリット編 本記事

-第2回 vSphere 最新バージョンを使おう!~簡単移行方法のご案内~ vCenter Server 編 Coming soon!

-第3回 vSphere 最新バージョンを使おう!~簡単移行方法のご案内~ 便利ツール vSphere Update Manager 編 Coming soon!






from VMware Blogs http://bit.ly/1vyq8To

Chariot (YC W15) Is Hiring Python, iOS, COO

Comments



from Hacker News http://bit.ly/1y0zBjs

AEG: Automatic Exploit Generation on Source Code (2011)

Comments



from Hacker News http://bit.ly/1y5wXga

Poll: What is your primary editor?

Comments



from Hacker News http://bit.ly/1y0zzbf

A New Software Engineering

Comments



from Hacker News http://bit.ly/12aurcF

A Different Eulogy for RadioShack

Comments



from Hacker News http://bit.ly/12aupkU

How Fragile Is Our Intellect?

Comments



from Hacker News http://bit.ly/12aup4z

2014: The year everyone's security took a hit

The past year has shown that each and every person is less secure than they thought on January 1, 2014, and for popping that bubble, we should be thankful.



from Latest Topic for ZDNet in Security http://zd.net/1w7F1xu

Nobody expects CDATA sections in XML

Comments



from Hacker News http://bit.ly/1rKjxA3

Rust borrow and lifetimes

Comments



from Hacker News http://bit.ly/1w7EpYF

ASCII Cam

Comments



from Hacker News http://bit.ly/1w7EnA8

Ispc: A SPMD Compiler for High-Performance CPU Programming (2012) [pdf]

Comments



from Hacker News http://bit.ly/1w7EnA7

Anemomind: Digital Advisor for Sailors

Comments



from Hacker News http://bit.ly/1rKjww9

Updating Centuries-Old Folklore with Puzzles and Power-Ups

Comments



from Hacker News http://n.pr/1w7EprK

In France, New Review of 35-Hour Workweek

Comments



from Hacker News http://nyti.ms/1rKju7p

Sorting Algorithm Animations

Comments



from Hacker News http://bit.ly/1w7Epbg

Discovering How Greeks Computed in 100 B.C (2008)

Comments



from Hacker News http://nyti.ms/1rKjtQT

Use Cases for Thread-Local Storage

Comments



from Hacker News http://bit.ly/1rKjtQQ

How to Make Your Own Smart AC

Comments



from Hacker News http://bit.ly/1rKjvZ9

Show HN: Memfinity.org – Social, spaced-repetition web service

Comments



from Hacker News http://memfinity.org

Sphinx Text Processing Pipeline

Comments



from Hacker News http://bit.ly/1w7EmMk

Fee-Based Libraries Were Like Netflix for Books, 200 Years Ago

Comments



from Hacker News http://on.wsj.com/1w7EoEe

Why Atom Can't Replace Vim

Comments



from Hacker News http://bit.ly/1w7EmvT

Note to self (2009)

Comments



from Hacker News http://bit.ly/1z5Hjed

Again with the emacs

Comments



from Hacker News http://bit.ly/1HPFWq1

Google offers teachers $1K to get 10 kids coding – Asian/White boys don't count

Comments



from Hacker News http://bit.ly/1z5Hje4

Firefly Space Systems charges full-speed toward low Earth orbit

Comments



from Hacker News http://bit.ly/1vDBq7w

An expert system outperforms mere mortals conquering the Dungeons of Doom (1985) [pdf]

Comments



from Hacker News http://bit.ly/1v7X6tI

Hacking file uploaders with race condition

Comments



from Hacker News http://bit.ly/1v7X6do

The Machine: A new kind of computer

Comments



from Hacker News http://bit.ly/1FItYMQ

Java for Everything

Comments



from Hacker News http://bit.ly/1FItZjZ

Flip Flop Operator in Ruby

Comments



from Hacker News http://bit.ly/1FItZjW

Kernel Philosophy in Natural Language Processing (NLP)

Comments



from Hacker News http://bit.ly/1w7peyy

Gmail message retention bypasses Mailvelope encryption

Comments



from Hacker News http://bit.ly/1FItYfG

Memes made by a bot

Comments



from Hacker News http://bit.ly/1rK3Fxw

The menace of memes: how pictures can paint a thousand lies

Comments



from Hacker News http://bit.ly/12a4yJY

Fake Operator Overloading in JavaScript (2011)

Comments



from Hacker News http://bit.ly/1pCSjjk

Multimodal Recurrent Neural Networks that describe images with sentences

Comments



from Hacker News http://bit.ly/1pCSjjf

First Infocom Z-machine implemented in hardware

Comments



from Hacker News http://bit.ly/1pCSgUt

Discover tools and frameworks in the DevOps landscape

Comments



from Hacker News http://bit.ly/1FInj5k

People Who Make Me Feel Stupid: Ezra Zygmuntowicz (2010)

Comments



from Hacker News http://bit.ly/1y58lUD

The History of IRC

Comments



from Hacker News http://bit.ly/1y58jw7

Saturday, November 29, 2014

Psychology of a VC and how to take advantage of it

Comments



from Hacker News http://bit.ly/1ywl1E9

Millennials Might Be 'Generation Twin.' Is That a Bad Thing?

Comments



from Hacker News http://n.pr/1ywl0A2

Can Mushrooms Treat Depression?

Comments



from Hacker News http://nyti.ms/1ypqefS

The Internet Turned Kratom, a Medical Plant, into an Oxy-Adderall Lovechild

Comments



from Hacker News http://bit.ly/1ypqefO

Nine hard-won lessons about money and investing

Comments



from Hacker News http://bit.ly/1FHcali

The Web Is Getting Slower, at Least in How We All Experience It

Comments



from Hacker News http://wrd.cm/1v5JK1d

Ask HN: What are your favorite scholarly papers? Why?

Comments



from Hacker News http://bit.ly/1vwSCwB

Wanderers: a short film of humanity's expansion into the Solar System

Comments



from Hacker News http://bit.ly/1zG1lMe

Music publishers sue an ISP over piracy

Comments



from Hacker News http://bit.ly/1w5pLBa

How to Fight Corruption with Game Theory

Comments



from Hacker News http://thebea.st/1tAOvu9

How electric superchargers went from fantasy to feasibility

Comments



from Hacker News http://bit.ly/1tAOsyB

What do all the controls in an aeroplane cockpit do?

Comments



from Hacker News http://bit.ly/1tAOvdL

Autonomous agents + Genetic algorithms = Fish

Comments



from Hacker News http://bit.ly/1tAOvdE

Hack4ac: Text-mining and analyzing author contributions in PLOS articles

Comments



from Hacker News http://bit.ly/1tqH8q5

How speakers make sound

Comments



from Hacker News http://bit.ly/1tqH89G

Does your webapp really need network access?

Comments



from Hacker News http://bit.ly/15LbJtD

Why C.E.O.s Are Growing Beards

Comments



from Hacker News http://nyti.ms/1FGUplW

An argument against call/cc

Comments



from Hacker News http://bit.ly/1FGUp5H

Fontspots: Eurostile

Comments



from Hacker News http://bit.ly/1FGUpCC

Show HN: Simple IT Asset Management – No More Spreadsheets

Comments



from Hacker News http://bit.ly/1FGUp5u

Interoperating Between Objective-C and Rust

Comments



from Hacker News http://bit.ly/1rGAi4U

Show HN: GitBook Webeditor

Comments



from Hacker News http://bit.ly/1uXEaci

Is Firefox really that bad?

Comments



from Hacker News http://bit.ly/1pADCNy

- php.tools – tooling for formatting, testing and code coverage

Comments



from Hacker News http://bit.ly/1FGrWLm

RNG Party Tricks

Comments



from Hacker News http://bit.ly/1vwGknX

Microsoft is converted to love ! Can you imagine how THAT is amazing?

Comments



from Hacker News http://bit.ly/1vwGk7E

Cases and controversies: Not your typical grand jury investigation

Comments



from Hacker News http://bit.ly/1FGrZ9X

What's wrong with statistics in Julia?

Comments



from Hacker News http://bit.ly/11EACVg

New optimizations for X86 in upcoming GCC 5.0

Comments



from Hacker News http://intel.ly/11EACEZ

Finally a social network focused on sharing real stock trades

Comments



from Hacker News http://bit.ly/11EACoo

The world's smallest self-replicating program

Comments



from Hacker News http://bit.ly/1xXdw5i

Alchemist Release v0.8.0 Elixir Tooling Emacs Integration

Comments



from Hacker News http://bit.ly/1y3G6FV

Show HN: Labster – Virtual Labs for School and Colleges

Comments



from Hacker News http://bit.ly/1FGiSpQ

The History of Sitting Down (1967)

Comments



from Hacker News http://bit.ly/15KWHnr

Attacking Suggest Boxes in Web Applications Over HTTPS [pdf]

Comments



from Hacker News http://bit.ly/15KWG39

Evil 32: Check Your GPG Fingerprints

Comments



from Hacker News https://evil32.com/

Concept for a Lightweight Mars Glider [pdf]

Comments



from Hacker News http://bit.ly/1FGiQyj

Ruby Symbols Are Not Lisp Symbols

Comments



from Hacker News http://bit.ly/15KWH6Z

Epigrams in programming

Comments



from Hacker News http://bit.ly/1yvt8kn

Show HN: Building a Game with a 6-Year-Old

Comments



from Hacker News http://bit.ly/1yoOGhA

Experimental Ebola vaccine appears safe, prompts immune response

Comments



from Hacker News http://1.usa.gov/1yoOGht

Google Play Store in Numbers. Open Source Crawler for Mobile Apps Data

Comments



from Hacker News http://bit.ly/1yvt9EV

Testing Legal Highs Would Save Lives

Comments



from Hacker News http://bzfd.it/1vwujPw

The Seven Deadly Sins of Cloud Computing Research

Comments



from Hacker News http://bit.ly/1FGePcZ

Ask HN: How did Microsoft hold back Internet 6-7 years?

Comments



from Hacker News http://bit.ly/1FGd5jY

This Christmas, Give Cash

Comments



from Hacker News http://bit.ly/1rG6LZ6

Ask HN: Asking to co-own a web app with employer

Comments



from Hacker News http://bit.ly/1rG6LYX

Why Markdown Is Not My Favourite Language

Comments



from Hacker News http://bit.ly/1uWNoFE

Zfs support for docker (beta)

Comments



from Hacker News http://bit.ly/15KMWG1

Visual 6502 – wow at coolest chip ever

Comments



from Hacker News http://bit.ly/1uWNn4x

Friday, November 28, 2014

WhatWG JavaScript streams standard

Comments



from Hacker News http://bit.ly/15JtGbP

The secret life of the octothorpe

Comments



from Hacker News http://bit.ly/1w2UxL5

Why the West should be worried about Chinese Eugenics (2013)

Comments



from Hacker News http://bit.ly/1FEI1D5

Twitter Co-Founder Sells Shares for First Time

Comments



from Hacker News http://on.wsj.com/1vv4lfe

Call/Return Microbenchmarking and Call Frame Allocation

Comments



from Hacker News http://bit.ly/1ytm6MM

Understanding McLuhan (In Part)

Comments



from Hacker News http://nyti.ms/1yn7z4c

FreeBSD's init (rc.d) system. See also: rcorder(8)

Comments



from Hacker News http://bit.ly/1yn7yNT

Nintendo Patents Game Boy Emulation

Comments



from Hacker News http://tcrn.ch/1rFqqmb

Hypervelocity Stars Approach Speed of Light

Comments



from Hacker News http://ti.me/1rFqq5U

Black Beauty: a shiny, scaly-skinned, 4.4B years old rock from Mars

Comments



from Hacker News http://bit.ly/1258UBU

Deep Learning Master Class (Tel Aviv University)

Comments



from Hacker News http://bit.ly/1xU5Y3o

Hacker humor

Comments



from Hacker News http://bit.ly/1y1NCB6

Social assistance computer error sees millions paid out by mistake

Comments



from Hacker News http://bit.ly/1y1IhK4

Retsu – JavaScript Array micro library focused on speed

Comments



from Hacker News http://bit.ly/1y1IeOD

Light-weight Python Templating Engine

Comments



from Hacker News http://bit.ly/1y1IgGe

Debian is forked over systemd, and it's called 'Devuan'

Comments



from Hacker News http://bit.ly/1ymLKBO

Roberto Gómez Bolaños ‘Chespirito’ Dies

Comments



from Hacker News http://bit.ly/1tzbQwk

Restructuring Society with the Blockchain

Comments



from Hacker News http://bit.ly/1tzbQwf

Monolithic Nodejs (2013)

Comments



from Hacker News http://bit.ly/1FDsL7w

Development of billing system with Django framework

Comments



from Hacker News http://bit.ly/1pxnpJ2

Phoenix (elixir) vs. Martini (go) vs. Express vs. Rails Benchmarks

Comments



from Hacker News http://bit.ly/1rCDm1K

Metaprogramming with Modern C++: The Haskell Metaphor

Comments



from Hacker News http://bit.ly/1B0gvA1

Ask HN: I've learned a programming language – how do I solve problems with code?

Comments



from Hacker News http://bit.ly/1B0gvjG

Riecoin breaks world record for prime sextuplets, twice [pdf]

Comments



from Hacker News http://bit.ly/1rChdRb

Locating Books in the Medieval Library

Comments



from Hacker News http://bit.ly/1rChdkq

New F.A.A. Report Tallies Drone Sightings, Highlighting Safety Issues

Comments



from Hacker News http://nyti.ms/1rChfIW

Tim Tang Test – the longest online riddle game

Comments



from Hacker News http://bit.ly/1ymdwP3

Chisel: Constructing Hardware in a Scala Embedded Language

Comments



from Hacker News http://bit.ly/1rChcN8

Infosec checklists becoming common, but they're not magic

Security checklists like the Australian Signals Directorate's Top 4 Mitigation Strategies are valuable, but to treat them as universal compliance mechanisms is a mistake. A risk-based approach is essential.



from Latest Topic for ZDNet in Security http://zd.net/1zF24xd

Compromising the safety of your data can be a dangerous business. http://bit.ly/1zEWyuz






EMC logo
Compromising the safety of your data can be a dangerous business. http://bit.ly/1zEWyuz






via EMC Feeds http://bit.ly/1ys6cT5

Compromising the safety of your data can be a dangerous business. http://bit.ly/1zEWyuz






EMC logo
Compromising the safety of your data can be a dangerous business. http://bit.ly/1zEWyuz






via EMC Feeds http://bit.ly/1ys6cT5

Zero Day Weekly: Sony's epic hack, Home Depot lawsuits, Regin malware

A collection of notable security news items for the week ending November 28, 2014. Covers enterprise, controversies, reports and more.



from Latest Topic for ZDNet in Security http://zd.net/15I4frd

Where Are the Hardest Places to Live in the U.S.?

Comments



from Hacker News http://nyti.ms/1uT4tQO

Introducing MakeSchool

Comments



from Hacker News http://bit.ly/15I1jec

Reverse-engineering facial recognition

Comments



from Hacker News http://bit.ly/1w0tEau

Reading the Book of Life in Prehistoric Dung

Comments



from Hacker News http://bit.ly/1rEcfOs

Where Are the Hardest Places to Live in the U.S.?

Comments



from Hacker News http://nyti.ms/1rEchpn

MPL – Motorola's M6800 Programming Language

Comments



from Hacker News http://bit.ly/1yrMBlZ

Shuffling

Comments



from Hacker News http://bit.ly/1uSPJ4p

Show HN: Implementing Truncated Matrix Decompositions for Core.Matrix

Comments



from Hacker News http://bit.ly/1xSk3OK

It's All About Time – Remote timing attacks in PHP

Comments



from Hacker News http://bit.ly/1xSk3OA

Trailblazer: A new architecture for Rails

Comments



from Hacker News http://bit.ly/1xSk2du

Using Doctors with Troubled Pasts to Market a Painkiller

Comments



from Hacker News http://nyti.ms/1y0BH6y

Phoenix – Elixir Web Framework

Comments



from Hacker News http://bit.ly/1xSk319

HOTEL 22: The Dark Side of Silicon Valley

Comments



from Hacker News http://read.bi/1rBbnQh

Apple's $100B Waste: Tim Cook's Single Biggest Mistake as CEO

Comments



from Hacker News http://onforb.es/1rBblaV

Random feedback weights support learning in deep neural networks

Comments



from Hacker News http://bit.ly/1rBbn2y

A castaway from ancient Mars

Comments



from Hacker News http://bit.ly/1rBbkni

Top 5 things to see at HP Discover with VMware

Yes, we’re back in Barcelona (love the weather here) Continuing …



Read More



from VMware Blogs http://bit.ly/1uSwpnK


Vuln: Mojolicious Command Line Parameter Injection Vulnerability

Mojolicious Command Line Parameter Injection Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1yrvhNQ

Thursday, November 27, 2014

The Society of Mind Video Lectures

Comments



from Hacker News http://bit.ly/1FxBOJ1

Unreal Mode: Breaking Protected Processes [pdf]

Comments



from Hacker News http://bit.ly/1AXCqIg

We should be able to see George Brandis' metadata

There is a major difference between law-enforcement agencies and media accessing metadata, but arguably that changes when it comes to politicians using taxpayer-funded phones.



from Latest Topic for ZDNet in Security http://zd.net/1zBeG8C

Finding John Updike, and Taking His Trash

Comments



from Hacker News http://bit.ly/1xXxGjm

Future of Programming Languages

Comments



from Hacker News http://bit.ly/1xXxDEh

The Emperor's Turkey (2013)

Comments



from Hacker News http://bit.ly/1zB49KH

The Psychology of Color in Marketing and Branding

Comments



from Hacker News http://entm.ag/1twDEBC

“A Japanese based multinational made a CD based console once”

Comments



from Hacker News http://bit.ly/1vVfJmc

Eight weeks to a better brain

Comments



from Hacker News http://bit.ly/1vV8hre

Arthur C. Clarke Predicts the Internet and PC

Comments



from Hacker News http://bit.ly/1ruo3s2

‫‬‏‮Bi-directional text

Comments



from Hacker News http://bit.ly/1ruo3bD

A Billion Here, a Billion There: The Cost of Making a Drug Revisited

Comments



from Hacker News http://onforb.es/1ruo2UV

New with ECMAScript 6: Map – a built-in dictionary/hashtable

Comments



from Hacker News http://bit.ly/1AX9TCw

Metadata needs to be defined in law: Committee

The Australian Senate committee for the scrutiny of Bills has slammed the government's decision to leave the data set out of mandatory data-retention legislation.



from Latest Topic for ZDNet in Security http://zd.net/1vpFqZn

How Not to Write a Signal Handler

Comments



from Hacker News http://bit.ly/1uND2aV

The Unreasonable Effectiveness of C

Comments



from Hacker News http://bit.ly/1rtY6ZG?

In which an undercover TSA agent interrogated me in Charlotte last night

Comments



from Hacker News http://bit.ly/11yIs2X

Thanksgiving Travel? Vermont Turkeys Used to Walk to Boston

Comments



from Hacker News http://bit.ly/1ymZcqk

How Clojure deals with objects

Comments



from Hacker News http://bit.ly/1zAflXT

ACMA hones in on malware with internet security portal

The Australian Communications and Media Authority has launched its Australian Internet Security Initiative portal to give internet service providers access to information about what IPs in their networks are infected by malware.



from Latest Topic for ZDNet in Security http://zd.net/1HJm4Vy

Vuln: WordPress Password Check Denial of Service Vulnerability

WordPress Password Check Denial of Service Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1uNmuzK

Vuln: WordPress Multiple Unspecified Cross Site Scripting Vulnerabilities

WordPress Multiple Unspecified Cross Site Scripting Vulnerabilities



from SecurityFocus Vulnerabilities http://bit.ly/1uNmrE4

USN-2427-1: Libksba vulnerability

Ubuntu Security Notice USN-2427-1


27th November, 2014


libksba vulnerability


A security issue affects these releases of Ubuntu and its derivatives:



  • Ubuntu 14.10

  • Ubuntu 14.04 LTS

  • Ubuntu 12.04 LTS


Summary


Libksba could be made to crash or run programs if it opened a specially crafted file.


Software description



  • libksba - X.509 and CMS support library


Details


Hanno Böck discovered that Libksba incorrectly handled certain S/MIME

messages or ECC based OpenPGP data. An attacker could use this issue to

cause Libksba to crash, resulting in a denial of service, or possibly

execute arbitrary code.


Update instructions


The problem can be corrected by updating your system to the following package version:



Ubuntu 14.10:

libksba8 1.3.0-3ubuntu0.14.10.1

Ubuntu 14.04 LTS:

libksba8 1.3.0-3ubuntu0.14.04.1

Ubuntu 12.04 LTS:

libksba8 1.2.0-2ubuntu0.1


To update your system, please follow these instructions: http://bit.ly/1aJDvTw.


In general, a standard system update will make all the necessary changes.


References


CVE-2014-9087






from Ubuntu Security Notices http://bit.ly/1vUkzjs

LLVM and LLVM Bitcode Introduction (2013) [pdf]

Comments



from Hacker News http://bit.ly/1zA78mJ

Free Kindle Book – Create Good Habits Using Psychology and Technology

Comments



from Hacker News http://amzn.to/1zA78mE

Ken Burns Tackles Lincoln, Education and Money in 'The Address'

Comments



from Hacker News http://n.pr/1Fw7uyy

How to write a PhD thesis your committee will Not approve

Comments



from Hacker News http://bit.ly/1Fw7rCR

HTTP2 [pdf]

Comments



from Hacker News http://bit.ly/1Fw7tL8

USN-2426-1: FLAC vulnerabilities

Ubuntu Security Notice USN-2426-1


27th November, 2014


flac vulnerabilities


A security issue affects these releases of Ubuntu and its derivatives:



  • Ubuntu 14.10

  • Ubuntu 14.04 LTS

  • Ubuntu 12.04 LTS

  • Ubuntu 10.04 LTS


Summary


FLAC could be made to crash or run programs as your login if it opened a specially crafted file.


Software description



  • flac - Free Lossless Audio Codec


Details


Michele Spagnuolo discovered that FLAC incorrectly handled certain

malformed audio files. An attacker could use this issue to cause FLAC to

crash, resulting in a denial of service, or possibly execute arbitrary

code.


Update instructions


The problem can be corrected by updating your system to the following package version:



Ubuntu 14.10:

libflac8 1.3.0-2ubuntu0.14.10.1

libflac++6 1.3.0-2ubuntu0.14.10.1

Ubuntu 14.04 LTS:

libflac8 1.3.0-2ubuntu0.14.04.1

libflac++6 1.3.0-2ubuntu0.14.04.1

Ubuntu 12.04 LTS:

libflac8 1.2.1-6ubuntu0.1

libflac++6 1.2.1-6ubuntu0.1

Ubuntu 10.04 LTS:

libflac8 1.2.1-2ubuntu0.1

libflac++6 1.2.1-2ubuntu0.1


To update your system, please follow these instructions: http://bit.ly/1aJDvTw.


In general, a standard system update will make all the necessary changes.


References


CVE-2014-8962, CVE-2014-9028






from Ubuntu Security Notices http://bit.ly/1psm2Lw

Vuln: Raritan PowerIQ Multiple SQL Injection Vulnerabilities

Raritan PowerIQ Multiple SQL Injection Vulnerabilities



from SecurityFocus Vulnerabilities http://bit.ly/1vUc8Vw

Why browse the Web in Emacs?

Comments



from Hacker News http://bit.ly/1zzVQ1E

Ruby Threads and the Global Interpreter Lock in C

Comments



from Hacker News http://bit.ly/1zzVQ1y

Scheme Workshop 2014

Comments



from Hacker News http://bit.ly/11Zhh23

Fun with Lisp: Programming the NES

Comments



from Hacker News http://bit.ly/11ZhgLz

Bugtraq: [ MDVSA-2014:233 ] wordpress

[ MDVSA-2014:233 ] wordpress



from SecurityFocus Vulnerabilities http://bit.ly/1ymwvK8

Vuln: Libksba 'ksba_oid_to_str() Function Buffer Overflow Vulnerability

Libksba 'ksba_oid_to_str() Function Buffer Overflow Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1uMYBIS

Vuln: Squid 'src/icmp/Icmp4.cc' Remote Denial of Service Vulnerability

Squid 'src/icmp/Icmp4.cc' Remote Denial of Service Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1ymwt54

Syrian Electronic Army Hacks UK based Media Websites

Syrian Electronic Army (SEA), a pro-hacker group supposed to be aligned with Syrian President Bashar al-Assad has again gain media attention by compromising a number of popular news websites and displayed a Thanksgiving popups informing people that they've been hacked. The Forbes, The Independent, The Chicago Tribune, The Daily Telegraph, The London Evening Standard, broadcaster CNBC, PC





from The Hacker News http://bit.ly/11Zag16

Getting Organized with Org Mode

Comments



from Hacker News http://bit.ly/1Fx33S4

Reconceptualizing major depressive disorder as an infectious disease

Comments



from Hacker News http://bit.ly/1Fx360n

Transnational Consensus Supported Suppressing Prisoners’ Communication

Comments



from Hacker News http://bit.ly/1rt1lAD

Some light reading on lock-free programming

Comments



from Hacker News http://bit.ly/1rt1jIX

Patient handover: using Formula 1 pit-stop models to improve safety and quality [pdf]

Comments



from Hacker News http://bit.ly/1rt1jsk

The Role of Composition in Computer Programming (1995) [pdf]

Comments



from Hacker News http://bit.ly/1rsR1bV

Clues to Bees’ History, Tucked Away in Drawers

Comments



from Hacker News http://nyti.ms/1rsR2wn

Scientists predict green energy revolution after new graphene discoveries

Comments



from Hacker News http://ind.pn/1uMQPi3

Steve Jobs Lives on at the Patent Office

Comments



from Hacker News http://bit.ly/1uMQMmc

Show HN: netboard.me - Combine all your content into a beautiful single webpage

Comments



from Hacker News http://netboard.me

Light paper

Comments



from Hacker News http://bit.ly/1rsQVAS

Qt Weekly #21: Dynamic OpenGL implementation loading in Qt 5.4

Comments



from Hacker News http://bit.ly/1rsQWVz

Wednesday, November 26, 2014

Mozilla accepting Bitcoin donations

Comments



from Hacker News http://mzl.la/1yd6pII

NASA's Van Allen Probes Spot an Impenetrable Barrier in Space

Comments



from Hacker News http://1.usa.gov/1yd6qMG

Ken Thompson on GitHub

Comments



from Hacker News http://bit.ly/1yd6pIB

The crazy world of stripping diacritics

Comments



from Hacker News http://bit.ly/1yd6qwj

Is John Nash Satoshi Nakamoto?

Comments



from Hacker News http://bit.ly/1poZhrW

Guess which EMC all-flash array is purpose-built for both price and density? htt...






EMC logo
Guess which EMC all-flash array is purpose-built for both price and density? http://emc.im/1tqwoXR










via EMC Feeds http://bit.ly/1vl6gBF

Need agile IT for SAP? Discover the business impact with EMC #HybridCloud. http://bit.ly/15AzTXq http://bit.ly/1vl6hFL






EMC logo
Need agile IT for SAP? Discover the business impact with EMC #HybridCloud. http://bit.ly/15AzTXq http://bit.ly/1vl6hFL






via EMC Feeds http://bit.ly/15AzTXw

Who's keeping an eye on your video surveillance storage? http://bit.ly/15AzVic http://bit.ly/1vl6h8Q






EMC logo
Who's keeping an eye on your video surveillance storage? http://bit.ly/15AzVic http://bit.ly/1vl6h8Q






via EMC Feeds http://bit.ly/1vl6hpa

Guess which EMC all-flash array is purpose-built for both price and density? htt...






EMC logo
Guess which EMC all-flash array is purpose-built for both price and density? http://emc.im/1tqwoXR










via EMC Feeds http://bit.ly/1vl6gBF

Need agile IT for SAP? Discover the business impact with EMC #HybridCloud. http://bit.ly/15AzTXq http://bit.ly/1vl6hFL






EMC logo
Need agile IT for SAP? Discover the business impact with EMC #HybridCloud. http://bit.ly/15AzTXq http://bit.ly/1vl6hFL






via EMC Feeds http://bit.ly/15AzTXw

Who's keeping an eye on your video surveillance storage? http://bit.ly/15AzVic http://bit.ly/1vl6h8Q






EMC logo
Who's keeping an eye on your video surveillance storage? http://bit.ly/15AzVic http://bit.ly/1vl6h8Q






via EMC Feeds http://bit.ly/1vl6hpa

IOUG Survey Webcast Replay Site

The permanent home for the IOUG “Oracle on vSphere” survey webcast is listed below along with the actual survey itself. The “Oracle on vSphere” VMware press book link is also listed. IOUG Survey http://vmw.re/1tI5tMZ IOUG Survey Webcast http://bit.ly/15yBbSZ IOUG Survey blogs http://vmw.re/1puFW2T The official VMware press book and the definitive authority on the subject of […]]> The permanent home for the IOUG “Oracle on vSphere” survey webcast is listed below along with the actual survey itself. The “Oracle on vSphere” VMware press book link is also listed.

IOUG Survey


http://vmw.re/1tI5tMZ


IOUG Survey Webcast


http://bit.ly/15yBbSZ


IOUG Survey blogs


http://vmw.re/1puFW2T


The official VMware press book and the definitive authority on the subject of Oracle on vSphere:


http://amzn.to/1qC7581






from VMware Blogs http://bit.ly/1ycHm8z

Wikipedia’s ‘complicated’ relationship with net neutrality

Comments



from Hacker News http://wapo.st/1y2vs3q

DNA Can Survive Reentry from Space

Comments



from Hacker News http://bit.ly/1y2vpoq

Monty Hall, Erdos, and Our Limited Minds

Comments



from Hacker News http://wrd.cm/1tjUIeV

Virginia Woolf on Movies (1926)

Comments



from Hacker News http://bit.ly/1y2vrwz

IOUG Survey Webcast Replay Site

The permanent home for the IOUG “Oracle on vSphere” survey webcast is listed below along with the actual survey itself. The “Oracle on vSphere” VMware press book link is also listed. IOUG Survey http://vmw.re/1tI5tMZ IOUG Survey Webcast http://bit.ly/15yBbSZ IOUG Survey blogs http://vmw.re/1puFW2T The official VMware press book and the definitive authority on the subject of […]]> The permanent home for the IOUG “Oracle on vSphere” survey webcast is listed below along with the actual survey itself. The “Oracle on vSphere” VMware press book link is also listed.

IOUG Survey


http://vmw.re/1tI5tMZ


IOUG Survey Webcast


http://bit.ly/15yBbSZ


IOUG Survey blogs


http://vmw.re/1puFW2T


The official VMware press book and the definitive authority on the subject of Oracle on vSphere:


http://amzn.to/1qC7581






via VMware Blogs http://bit.ly/1ycHm8z

Bugtraq: [ MDVSA-2014:229 ] libvncserver

[ MDVSA-2014:229 ] libvncserver



from SecurityFocus Vulnerabilities http://bit.ly/1yi8sfm

Vuln: MantisBT 'view_all_set.php' Multiple SQL Injection Vulnerabilities

MantisBT 'view_all_set.php' Multiple SQL Injection Vulnerabilities



from SecurityFocus Vulnerabilities http://bit.ly/1yi8pQI

Vuln: Linux Kernel 'espfix64' Local Denial of Service Vulnerability

Linux Kernel 'espfix64' Local Denial of Service Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1FsQ9ER

10 seconds of math

Comments



from Hacker News http://bit.ly/1vOIeln

A Eulogy for RadioShack

Comments



from Hacker News http://bit.ly/1vOIcde

Seven Molecules’ Claim to Fame (2013)

Comments



from Hacker News http://bit.ly/1uIIQm4

Tech Toys That Can Make the Video Screen Passé

Comments



from Hacker News http://nyti.ms/1vOIbGi

Scale Model WWII Craft Takes Flight With Fuel From the Sea Concept

Comments



from Hacker News http://1.usa.gov/1uIBiQh

Reflections on Trusting Trust (1984)

Comments



from Hacker News http://bit.ly/1uIBkHP

The Six Million Dollar LibC

Comments



from Hacker News http://bit.ly/1uIBkb0

Renting a 1-bedroom apartment near BART (transit) in San Francisco

Comments



from Hacker News http://bit.ly/15zMI4r

Publishing: The peer-review scam

Comments



from Hacker News http://bit.ly/15zMJ8r

Female termites found to clone themselves via asexual reproduction

Comments



from Hacker News http://bit.ly/15zMGJW

Moondust and Duct Tape (2008)

Comments



from Hacker News http://1.usa.gov/15zMFpc

Say hello to x86_64 Assembly [part 5]

Comments



from Hacker News http://bit.ly/1vkvdgy

Give thanks they haven't forced net neutrality yet

Worse than a solution looking for a problem, the campaign to regulate ISPs aggressively is based on lies. Netflix and one transit ISP were the source of performance problems earlier this year.



from Latest Topic for ZDNet in Security http://zd.net/1vko4gr

Tracing bare-metal systems: a multi-core story

Comments



from Hacker News http://bit.ly/1Frh1H1

Regulex – JavaScript Regular Expression Visualizer

Comments



from Hacker News http://bit.ly/1Frh3yF

PostgreSQL Hardware Performance Tuning

Comments



from Hacker News http://bit.ly/15zAb0S

Autodafé, an act of software torture (2006)

Comments



from Hacker News http://bit.ly/15zA7hB

‘Right to Be Forgotten’ Should Apply Worldwide, E.U. Panel Says

Comments



from Hacker News http://nyti.ms/1zvmbhg

Tachyon – A memory-centric distributed file system

Comments



from Hacker News http://bit.ly/1vlSuA8

War and Peace in the Bhagavad Gita

Comments



from Hacker News http://bit.ly/1zvmaKd

Nuvola IT Self Data Center: EMC, Telecom Italia e VMware






EMC logo


















La soluzione Cloud Computing di Telecom Italia basata su tecnologia EMC e VMware.


From: EMC

Views: 0


0 ratings

Time: 02:05 More in Science & Technology








via EMC Feeds http://bit.ly/1vk6QQ7

EMC ViPR now leverages Cinder to extend third party array support http://bit.ly/15zdoSJ http://bit.ly/1vk6NE1






EMC logo
EMC ViPR now leverages Cinder to extend third party array support http://bit.ly/15zdoSJ http://bit.ly/1vk6NE1






via EMC Feeds http://bit.ly/1vk6Q2B

Guess which EMC all-flash array is purpose-built for both price and density? http://bit.ly/15zdo5h http://bit.ly/1vk6N76






EMC logo
Guess which EMC all-flash array is purpose-built for both price and density? http://bit.ly/15zdo5h http://bit.ly/1vk6N76






via EMC Feeds http://bit.ly/15zdlGy

RT @GWR: You'll believe a truck can fly... http://bit.ly/15zdmKM http://bit.ly/1vk6M2V






EMC logo
RT @GWR: You'll believe a truck can fly... http://bit.ly/15zdmKM http://bit.ly/1vk6M2V






via EMC Feeds http://bit.ly/1vk6MQw

Nuvola IT Self Data Center: EMC, Telecom Italia e VMware






EMC logo


















La soluzione Cloud Computing di Telecom Italia basata su tecnologia EMC e VMware.


From: EMC

Views: 0


0 ratings

Time: 02:05 More in Science & Technology








via EMC Feeds http://bit.ly/1vk6QQ7

EMC ViPR now leverages Cinder to extend third party array support http://bit.ly/15zdoSJ http://bit.ly/1vk6NE1






EMC logo
EMC ViPR now leverages Cinder to extend third party array support http://bit.ly/15zdoSJ http://bit.ly/1vk6NE1






via EMC Feeds http://bit.ly/1vk6Q2B

Guess which EMC all-flash array is purpose-built for both price and density? http://bit.ly/15zdo5h http://bit.ly/1vk6N76






EMC logo
Guess which EMC all-flash array is purpose-built for both price and density? http://bit.ly/15zdo5h http://bit.ly/1vk6N76






via EMC Feeds http://bit.ly/15zdlGy

RT @GWR: You'll believe a truck can fly... http://bit.ly/15zdmKM http://bit.ly/1vk6M2V






EMC logo
RT @GWR: You'll believe a truck can fly... http://bit.ly/15zdmKM http://bit.ly/1vk6M2V






via EMC Feeds http://bit.ly/1vk6MQw

We just set a world record with our technical partner, Lotus F1 Team! See for yo...






EMC logo
We just set a world record with our technical partner, Lotus F1 Team! See for yourself: http://bit.ly/1uI5FGC





Video: Watch behind the scenes footage of record breaking truck jump over Lotus F1 car

http://bit.ly/1uI5FX0

Truck flies through the air over an F1 racing car, landing safely to set a new world record for the longest ramp jump by a truck and trailer.






via EMC Feeds http://bit.ly/1uI5IlB