Saturday, January 31, 2015

The Ongoing Quest for the ‘Brain’ Chip

Comments



from Hacker News http://tcrn.ch/1BGs1MD

Measuring Brainwaves to Make a New Kind of Bike Map for NYC

Comments



from Hacker News http://wrd.cm/1BGs37s

Scientist by Nature

Comments



from Hacker News http://bit.ly/1CYEW0U

Groot Programming Language

Comments



from Hacker News http://bit.ly/1BGs2QI

The Pinocchio Problem (2007)

Comments



from Hacker News http://bit.ly/1BGs0Iz

A Child's Machiavelli

Comments



from Hacker News http://bit.ly/1CYETlH

Cron as a filesystem

Comments



from Hacker News http://bit.ly/1CYEVtU

Yalz77: an LZ77 compression algorithm designed for code simplicity and clarity

Comments



from Hacker News http://bit.ly/1CYESOM

Smarking Drives Big Data to Parking Industry

Comments



from Hacker News http://tcrn.ch/1LwkXuc

Mailpile

Comments



from Hacker News http://bit.ly/1zlio9r

Redditor explains the unknown malicious past of Intel

Comments



from Hacker News http://bit.ly/1zlinT0

Interview with JavaScript

Comments



from Hacker News http://bit.ly/1zlinCy

WhatsApp Starts Rolling out Voice Calling Feature

WhatsApp is again in news but this time not for any security holes, but for its all new and, of course, much-awaited Free Voice Calling feature — similar to other instant messaging apps like Skype and Viber allow users to make voice calls using Internet. After launching its much-awaited Web client (dubbed WhatsApp Web) to Android users, the most popular mobile messaging application WhatsApp has





from The Hacker News http://bit.ly/1ykOpdv

Suggestion for Interviewing Technical Hires





from TaoSecurity http://bit.ly/1DrbezP

Windows 10: Re-Crappifying Windows 8

Comments



from Hacker News http://bit.ly/1Dr74YC

Snapchat Recording and Monitoring SMS's in Latest Update on Android??

Comments



from Hacker News http://bit.ly/1CLWw7W

Project Euler's 500th problem

Comments



from Hacker News http://bit.ly/1Dr76Q4

How reintroducing wolves saved Yellowstone National Park

Comments



from Hacker News http://bbc.in/1CLWvRm

Airware (YC W13) – Code and Fly

Comments



from Hacker News http://bit.ly/1AbPdHm

Bundler alike project for python – Pundler

Comments



from Hacker News http://bit.ly/1BJlnYt

Swift programming January Issue

Comments



from Hacker News http://bit.ly/1AbPdqI

Modernize your C++ code

Comments



from Hacker News http://bit.ly/1zkImtB

Show HN: TK Checker – A WordPress plugin that helps you edit your posts

Comments



from Hacker News http://bit.ly/1yTc7fT

Node.js package to access serial ports for reading and writing

Comments



from Hacker News http://bit.ly/1yTc4Rj

Why I hate Google, or some thoughts about “open” technologies

Comments



from Hacker News http://bit.ly/1yTc4AH

With Dropcam Founder and Technology VP Exits, Nest Restructures Management

Comments



from Hacker News http://tcrn.ch/1zkIn0K

7 Mistakes I made while launching my side project (Non-app Calendar)

Comments



from Hacker News http://bit.ly/1yTc2ZG

Estimate the latency from your browser to each AWS region

Comments



from Hacker News http://bit.ly/1zkIkSK

Robert Scoble to take 2 months off

Comments



from Hacker News http://on.fb.me/1JXdQJw

Amazing(Gamer)Home Is Up for Sale:I Guarantee You Haven’t Seen Anything Like It

Comments



from Hacker News http://bit.ly/1JXdQJq

Reactive programming by example

Comments



from Hacker News http://bit.ly/18Dr9S6

Recursive Programming [pdf] (1960)

Comments



from Hacker News http://bit.ly/18Dr8h2

Facebook’s insane mobile takeover

Comments



from Hacker News http://bit.ly/18Dr8gT

Global Forecast System source code

Comments



from Hacker News http://1.usa.gov/1ySU35G

CIA and Mossad killed senior Hezbollah figure in car bombing

Comments



from Hacker News http://wapo.st/1ySU2i3

HTTPie v0.9.0 (cURL replacement) with client SSL certificate support, etc.

Comments



from Hacker News http://bit.ly/1ySU21t

Install an ArchLinux distro in userspace with no root privileges

Comments



from Hacker News http://bit.ly/1zks4B6

2015: The Year of the OpenBSD Desktop

Comments



from Hacker News http://bit.ly/1zklQ42

Thick Pollution Layer from the U.S. Over Iceland

Comments



from Hacker News http://bit.ly/1yk0srC

Ask HN: Someone raised money by claiming my project as their own

Comments



from Hacker News http://bit.ly/1yk0srv

The story of a pivot

Comments



from Hacker News http://bit.ly/1yk0uj3

What We Can Learn About Systems from W. Edwards Deming

Comments



from Hacker News http://bit.ly/1zklMBi

The Decline of the Xerox PARC Philosophy at Apple Computers

Comments



from Hacker News http://bit.ly/1wNbHqS

Ask HN: Could you share your general purpose development contracts?

Comments



from Hacker News http://bit.ly/1wNbJ1I

High accuracy algorithm to separate unstructured text into topics

Comments



from Hacker News http://bit.ly/1wNbHqH

For alleged Russian hacker, a visit to Amsterdam is a costly trip

Comments



from Hacker News http://wapo.st/1BEPE8x

Quine-relay: An uroboros program with 100 programming languages

Comments



from Hacker News http://bit.ly/16b5645

The Abandoned Rollercoasters of Nara Dreamland

Comments



from Hacker News http://bit.ly/16b54JL

China's Great Firewall Gets Taller

Comments



from Hacker News http://on.wsj.com/16b52S1

New Ruby and Ruby on Rails Blog

Comments



from Hacker News http://bit.ly/16b52l2

Friday, January 30, 2015

Finnish phoenix: The startups rising from Nokia's ashes

Comments



from Hacker News http://bbc.in/1yUSmJu

How Network Science Is Changing Our Understanding of Law

Comments



from Hacker News http://bit.ly/1yMoZV5

NIST Fails to Address Concerns on Derived Credentials

Comments



from Hacker News http://bit.ly/1yUSmcD

Jawbone: The trials of a 16-year-old can’t-miss startup

Comments



from Hacker News http://for.tn/1yUSlW6?

RethinkDB 1.16: cluster management API, realtime push

Comments



from Hacker News http://bit.ly/1tFUcxv

Surviving Data Science at the Speed of Hype

Comments



from Hacker News http://bit.ly/1wJgsl9

China’s Pearl River Delta overtakes Tokyo as world’s largest megacity

Comments



from Hacker News http://bit.ly/1wJguJG

The Thompson M1A1 Submachine Gun

Comments



from Hacker News http://bit.ly/1tFUc0E

Computational Geometry in Python

Comments



from Hacker News http://bit.ly/1tFUc0v?

Speeding Up PS1 Emulation with OMAP’s DSP

Comments



from Hacker News http://bit.ly/1wJgs4x....

What neuroscience is learning from code-breakers and thieves

Comments



from Hacker News http://bit.ly/1wJgut6

The cold fusion race just heated up

Comments



from Hacker News http://bit.ly/1tFUdBv

Show HN: Primrose – a text editor that runs in a WebGL texture

Comments



from Hacker News http://bit.ly/1wJgrO2

PCBmodE – A printed circuit board design tool with a twist

Comments



from Hacker News http://pcbmode.com/

Cultivated Disinterest in Professional Sports

Comments



from Hacker News http://bit.ly/1wJgtFM

Ask HN: I got let go this morning. What should I do next?

Comments



from Hacker News http://bit.ly/1tFUaWv

Largest Digital Camera Ever Constructed Will Be Pointed at the Skies in 2022

Comments



from Hacker News http://bit.ly/1tFU9Su

Il messaggio del nuovo Vice President of Channel and Alliances EMEA ai partner VMware

Il nuovo Vice President of Channel and Alliances in EMEA, …



Read More



from VMware Blogs http://bit.ly/1tFQTX9


In which I am crabby about viral archery videos

Comments



from Hacker News http://bit.ly/1vfYqx9

Advanced Session Hijacking

Comments



from Hacker News http://bit.ly/1vfYqwT

Ask HN: How Should I Market This Thing?

Comments



from Hacker News http://bit.ly/1yf8Mc2

On Mechanical Keyboards

Comments



from Hacker News http://bit.ly/1yf8MbV

Where is Philae? When will it wake up?

Comments



from Hacker News http://bit.ly/1yf8LVD

A new wave of videogames offers lessons in powerlessness, scarcity and failure

Comments



from Hacker News http://bit.ly/1yTAnVX?

Configuring ShareFile Enterprise to use a customer-managed Azure StorageZone


















In this video we will configure our ShareFile Enterprise account to use the customer-managed Azure StorageZone configured in video 1 of this series.


Views:1

Length:07:01






from CitrixTV RSS Feed http://bit.ly/1yLZ0wZ

Топ 5 причин, почему вам стоит посмотреть наш вебинар!

Ждать осталось недолго …


Как вы, наверное, уже знаете, Пэт Гелсингер …



Read More



from VMware Blogs http://bit.ly/1zn8JO8


Show HN: Think Tank – Web design and development inspiration and project ideas

Comments



from Hacker News http://bit.ly/1EUfgSc

Ask HN: An SEO startup is impersonating a physician. What should I do?

Comments



from Hacker News http://bit.ly/1EUfgBD

Ageing whales: Scars reveal social secrets

Comments



from Hacker News http://bbc.in/1CHNitt

Sophia – A modern embeddable key-value database

Comments



from Hacker News http://sphia.org

Google Earth Pro Now Free

Comments



from Hacker News http://bit.ly/1CHNiK0

Question of the Week (VSA)

This week’s question comes from the VMware View video series.


The Connection Server comes with:

A. a CA-signed certificate

B. a self-signed certificate

C. a gift certificate

D. no certificate




Click through to thecommentsfor the answer.


Follow@VMwareEducationon Instagram to see more #TechTrivia every Friday andvisual updates from the VMware Education and Certification community.






via VMware Blogs http://bit.ly/1yeZ3Ta

Question of the Week (VSA)

This week’s question comes from the VMware VSA video series. With which of the following does the vSphere Storage Appliance work? A. vSphere Fault Tolerance B. Distributed Resource Scheduler (DRS) C. Storage vMotion and Storage I/O Control (SIOC) D. All of the above Click through to thecommentsfor the answer. Follow@VMwareEducationon Instagram to see more #TechTrivia […]]>

This week’s question comes from the VMware VSA video series.


With which of the following does the vSphere Storage Appliance work?

A. vSphere Fault Tolerance

B. Distributed Resource Scheduler (DRS)

C. Storage vMotion and Storage I/O Control (SIOC)

D. All of the above




Click through to thecommentsfor the answer.


Follow@VMwareEducationon Instagram to see more #TechTrivia every Friday andvisual updates from the VMware Education and Certification community.






from VMware Blogs http://bit.ly/1yeZ3Ta

Open letter to the German readers: That which you were never told about Greece

Comments



from Hacker News http://bit.ly/162W2gX

Student fury over 'impossible' economics exam

Comments



from Hacker News http://bbc.in/162W20d

The man who studies everyday evil

Comments



from Hacker News http://bbc.in/162W1JC

Warum ich den großen Launch live verfolge – IT-Admin Christian Stankowic berichtet

Am 3. Februar um 10 Uhr deutscher Zeit wird VMware …



Read More



from VMware Blogs http://bit.ly/1Lr8WpN


Warum ich den großen Launch live verfolge – IT-Admin Christian Stankowic berichtet

Am 3. Februar um 10 Uhr deutscher Zeit wird VMware …



Read More



from VMware Blogs http://bit.ly/1Lr8W9c


Black holes do not exist where space and time do not exist, says new theory

Comments



from Hacker News http://bit.ly/162KOc7

Radiant Media Player 1.4.0 (HTML5) with video ads, MPEG-DASH, free starter edition

Comments



from Hacker News http://bit.ly/1zeCDFC

AOL to Lay Off About 150 People, Folding Joystiq, TUAW into Engadget

Comments



from Hacker News http://tcrn.ch/1DePK8W

The History of the Future of Skyscrapers: Thomas Nast, 1881 (2009)

Comments



from Hacker News http://bit.ly/1DePK8P

Outlook for iOS app "breaks" corporate security, developer says

The worst part? Microsoft will take (and store) your email account credentials in its cloud if you use the app, released this week.



from Latest topics for ZDNet in Security http://zd.net/1Bzp9kA

Bugtraq: [SECURITY] [DSA 3145-1] privoxy security update

[SECURITY] [DSA 3145-1] privoxy security update



from SecurityFocus Vulnerabilities http://bit.ly/1yLlwGh

ST15-001: IRS and US-CERT Caution Users: Prepare for Heightened Phishing Risk This Tax Season

Original release date: January 30, 2015








Overview


Throughout the year, scam artists pose as legitimate entities—such as the Internal Revenue Service (IRS), other government agencies, and financial institutions—in an attempt to defraud taxpayers. They employ sophisticated phishing campaigns to lure users to malicious sites or entice them to activate malware in infected email attachments. To protect sensitive data, credentials, and payment information, US-CERT and the IRS recommend taxpayers prepare for heightened risk this tax season and remain vigilant year-round.


Remain alert


Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. In many successful incidents, recipients are fooled into believing the phishing communication is from someone they trust. An actor may take advantage of knowledge gained from research and earlier attempts to masquerade as a legitimate source, including the look and feel of authentic communications. These targeted messages can trick any user into taking action that may compromise enterprise security.


Spot common elements of the phishing lifecycle



  1. A Lure: enticing email content.


  2. A Hook: an email-based exploit.

    • Email with embedded malicious content that is executed as a side effect of opening the email

    • Email with malicious attachments that are activated as a side effect of opening an attachment

    • Email with “clickable” URLs: the body of the email includes a link, which displays as a recognized, legitimate website, though the actual URL redirects the user to malicious content.



  3. A Catch: a transaction conducted by an actor following a successful attempt.

    • Unexplainable charges

    • Unexplainable password changes




Understand how the IRS communicates electronically with taxpayers



  • The IRS does not initiate contact with taxpayers by email, text messages or social media channels to request personal or financial information.

  • This includes requests for PIN numbers, passwords or similar access information for credit cards, banks or other financial accounts.

  • The official website of the IRS is www.irs.gov.


Take action to avoid becoming a victim


If you believe you might have revealed sensitive information about your organization or access credentials, report it to the appropriate contacts within the organization, including network administrators. They can be alert for any suspicious or unusual activity.


Watch for any unexplainable charges to your financial accounts. If you believe your accounts may be compromised, contact your financial institution immediately and close those accounts.


If you believe you might have revealed sensitive account information, immediately change the passwords you might have revealed. If you used the same password for multiple accounts, make sure to change the password for each account and do not use that password in the future.


Report suspicious phishing communications



  • Email: If you read an email claiming to be from the IRS, do not reply or click on attachments and/or links. Forward the email as-is to phishing@irs.gov, then delete the original email.

  • Website: If you find a website that claims to be the IRS and suspect it is fraudulent, send the URL of the suspicious site to phishing@irs.gov with subject line, “Suspicious website”.

  • Text Message: If you receive a suspicious text message, do not reply or click on attachments and/or links. Forward the text as-is to 202-552-1226 (standard text rates apply), and then delete the original message (if you clicked on links in SMS and entered confidential information, visit the IRS’ identity protection page).


If you are a victim of any of the above scams involving IRS impersonation, please report to phishing@irs.gov, file a report with the Treasury Inspector General for Tax Administration (TIGTA), the Federal Trade Commission (FTC), and the police.


Additional Resources


For more information on phishing, other suspicious IRS-related communications including phone or fax scams, or additional guidance released by Treasury/IRS and DHS/US-CERT, visit:



To report a cybersecurity incident, vulnerability, or phishing attempt, visit US-CERT.gov/report.




Author: US-CERT and IRS


This product is provided subject to this Notification and this Privacy & Use policy.






from US-CERT: The United States Computer Emergency Readiness Team http://1.usa.gov/1DeLpCx

America’s new aristocracy

Comments



from Hacker News http://econ.st/1yLcklk

How much do indie PC devs make, anyways?

Comments



from Hacker News http://ubm.io/1yLcitL

A Brief History of Databases (2014)

Comments



from Hacker News http://bit.ly/1yLcid4

SnapDocs (YC W14) is looking for a well-rounded engineer with a sense of product

Comments



from Hacker News http://bit.ly/1JUlUdS

NYC Space/Time Directory

Comments



from Hacker News http://bit.ly/1JUlTH9

Thursday, January 29, 2015

Results of the python 2.x and 3.x use survey, 2014 edition

Comments



from Hacker News http://bit.ly/1z8TLg7

Humankind’s Most Ambitious Search for Life’s Beginnings

Comments



from Hacker News http://bit.ly/1DkIPeA

VMware SDDC Management Highlights at Partner Exchange 2015

As part of the Power Play initiative, you can continue to earn up to 20% additional margin for vSphere with Operations Management and up to 25% for Virtual SAN sales until June 30, 2015. Make sure your opportunities are registered in Advantage+ with the relevant Solution Competency in place to benefit.






via VMware Blogs http://bit.ly/1yamrky

VMware SDDC Management Highlights at Partner Exchange 2015

VMware SDDC Management – vSphere with Operations Management, vCloud Suite, and the vRealize Suite – has fueled tremendous growth for our partners in 2014. To help you make the most out of your visit to San Francisco next week, download/reference this sheet for more detail so that you don’t miss these important management activities: Hands […]]> VMware SDDC Management – vSphere with Operations Management, vCloud Suite, and the vRealize Suite – has fueled tremendous growth for our partners in 2014. To help you make the most out of your visit to San Francisco next week, download/reference this sheet for more detail so that you don’t miss these important management activities:

  • Hands On Labs

  • Sessions

  • vSphere Optimization Assessment (VOA) Showcase

  • VOA Pod in the Solutions Exchange






from VMware Blogs http://bit.ly/1yamrky

Fünf Gründe, weshalb Sie unsere große Online-Ankündigung nicht verpassen sollten

Bald ist es soweit…


Wie Sie vielleicht bereits erfahren haben, werden …



Read More



from VMware Blogs http://bit.ly/1yampJt


Fünf Gründe, weshalb Sie unsere große Online-Ankündigung nicht verpassen sollten

Bald ist es soweit…


Wie Sie vielleicht bereits erfahren haben, werden …



Read More



from VMware Blogs http://bit.ly/1yampsW


How IFTTT, Mandrill, and Twilio is helping me find an apartment in SF

Comments



from Hacker News http://bit.ly/15WAqmc

A Computer Scientist Tells Mathematicians How to Write Proofs

Comments



from Hacker News http://bit.ly/15WAnqG

Byte Magazine Volume 20 Number 09: 20 Years

Comments



from Hacker News http://bit.ly/1EsjJOz

Glibc Adventures: The Forgotten Chunks [pdf]

Comments



from Hacker News http://bit.ly/15WAjXN

Yitang Zhang’s Discovery – An Attack on the Twin-prime Conjecture [video]

Comments



from Hacker News http://nyr.kr/15WAjHf

What neuroscience is learning from code-breakers and thieves

Comments



from Hacker News http://bit.ly/15WAjqQ

San Diego Hacker News Meetup 58 Tomorrow (1/30)

Comments



from Hacker News http://bit.ly/1JOmnOY

Powerstrip: prototype Docker extensions today

Comments



from Hacker News http://bit.ly/1JOmoSR

Comcast thinks my husband is an a**hole – and they put it in writing

Comments



from Hacker News http://bit.ly/1JOmn1f

AnalyticsMD Applies AI to Optimize the ER

Comments



from Hacker News http://tcrn.ch/15ZA1Ai

Crate.IO, Docker, Weave, Flocker and Powerstrip at SnowSprint

Comments



from Hacker News http://cr8.is/1A2neK7

Bugtraq: Blubrry PowerPress Security Advisory - XSS Vulnerability - CVE-2015-1385

Blubrry PowerPress Security Advisory - XSS Vulnerability - CVE-2015-1385



from SecurityFocus Vulnerabilities http://bit.ly/15WqCbL

Bugtraq: CVE-2014-8779: SSH Host keys on Pexip Infinity

CVE-2014-8779: SSH Host keys on Pexip Infinity



from SecurityFocus Vulnerabilities http://bit.ly/1EsgVB0

Vuln: Drupal Context Module Open Redirection Vulnerability

Drupal Context Module Open Redirection Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/15WqBEV

PlayStation 4 System Compiler Support Landing in LLVM

Comments



from Hacker News http://bit.ly/15ZlVio

iTunes Connect Issue Logging Developers into Other Accounts

Comments



from Hacker News http://tcrn.ch/1JO7VGz

Expensive Placebos Work Better

Comments



from Hacker News http://bit.ly/1JO7V9J

Image Kernels Explained Visually

Comments



from Hacker News http://bit.ly/15ZlUuW

Datadog raises $31M for cloud monitoring

Comments



from Hacker News http://tcrn.ch/1v9RKk0

Show HN: PolyGen App, turn gradients and photos into pretty low poly patterns

Comments



from Hacker News http://bit.ly/1uFn9EX

Capital One Fraud Researchers May Also Have Done Some Fraud

Comments



from Hacker News http://bv.ms/1v9RMZ8

Remote Working – 3 Year Retrospective

Comments



from Hacker News http://bit.ly/1v9RMIE

Do You have Vulnerability Research to Showcase?

Call for papers for Infosecurity Intelligent Defence 2015



from http://bit.ly/1A2DwTj

Parsing command line arguments using a finite state machine and backtracking

Comments



from Hacker News http://bit.ly/1wEvWqv

Talking Machines Episode 3: Learning About Machine Learning

Comments



from Hacker News http://bit.ly/1wEvWa5

Build Static Websites

Comments



from Hacker News http://bit.ly/1wEvYid

Why Every Movie Looks Sort of Orange and Blue

Comments



from Hacker News http://bit.ly/1Bud4NQ

Codecademy (YC S11) Is Hiring a Community Manager for Its 25m+ Learners

Comments



from Hacker News http://bit.ly/1Bud6VI

Google Tried for Years to Challenge Wikileaks Gag Order

Comments



from Hacker News http://wapo.st/1Bud4xl

Visualizing BMI's “Blind Spots”

Comments



from Hacker News http://bit.ly/1Bud6oV

Every building in DC, Arlington, and Alexandria mapped by predominant race

Comments



from Hacker News http://bit.ly/1CCPJNJ

People Will Spend the Majority of Waking Time in Virtual Reality by 2020

Comments



from Hacker News http://bit.ly/1Bud40j

Today’s VMware and Google Announcement

By:Mathew Lodge Today Google and VMware announced an agreement to integrate selected Google Cloud Platform services into VMware vCloud® Air™. Google Cloud Storage–Distributed low-cost object storage service Google BigQuery –A real-time analytics service suitable for ad-hoc business intelligence queries across billions of rows of data in seconds Google Cloud Datastore–A schemaless NoSQL database service Google […]]> By:Mathew Lodge

Today Google and VMware announced an agreement to integrate selected Google Cloud Platform services into VMware vCloud® Air™.


Google Cloud Storage–Distributed low-cost object storage service



  • Google BigQuery –A real-time analytics service suitable for ad-hoc business intelligence queries across billions of rows of data in seconds

  • Google Cloud Datastore–A schemaless NoSQL database service

  • Google Cloud DNS–A globally-distributed low-latency DNS service


For more information about the integration of selected Google Cloud Platform Services into vCloud Air, visitTribal Knowledge.






via VMware Blogs http://bit.ly/1Chlcqc

Today’s VMware and Google announcement

By Mathew Lodge,Vice President, Cloud Services at VMware Today Google and VMware announced we

Today’s VMware and Google Announcement

By:Mathew Lodge Today Google and VMware announced an agreement to integrate selected Google Cloud Platform services into VMware vCloud® Air™. Google Cloud Storage–Distributed low-cost object storage service Google BigQuery –A real-time analytics service suitable for ad-hoc business intelligence queries across billions of rows of data in seconds Google Cloud Datastore–A schemaless NoSQL database service Google […]]> By:Mathew Lodge

Today Google and VMware announced an agreement to integrate selected Google Cloud Platform services into VMware vCloud® Air™.


Google Cloud Storage–Distributed low-cost object storage service



  • Google BigQuery –A real-time analytics service suitable for ad-hoc business intelligence queries across billions of rows of data in seconds

  • Google Cloud Datastore–A schemaless NoSQL database service

  • Google Cloud DNS–A globally-distributed low-latency DNS service


For more information about the integration of selected Google Cloud Platform Services into vCloud Air, visitTribal Knowledge.






from VMware Blogs http://bit.ly/1Chlcqc

Today’s VMware and Google announcement

By Mathew Lodge,Vice President, Cloud Services at VMware Today Google and VMware announced we�ve reached an agreement to integrate selected Google Cloud Platform services into vCloud® Air™: Google Cloud Storage– Distributed low-cost object storage service Google BigQuery – A real-time analytics service suitable for ad-hoc business intelligence queries across billions of rows of data in […]]> http://vmw.re/1JNvvDi 4 VMware End-User Computing 2014 Recap and 2015 Predictions http://vmw.re/1ChleOW http://vmw.re/1JNvtve Wed, 28 Jan 2015 13:00:48 +0000
Sanjay Poonen




from VMware Blogs http://bit.ly/1Chlcqb

What Silicon Valley Thinks of Women

Comments



from Hacker News http://bit.ly/1uEZODB

The Long Tail of the English Language

Comments



from Hacker News http://bit.ly/1v9rV3p

LibreOffice 4.4, the Most Beautiful LibreOffice Ever

Comments



from Hacker News http://bit.ly/1uEZQv7

US military explores biometric replacement for passwords

The US military hopes recording human behavior can replace the traditional password.



from Latest topics for ZDNet in Security http://zd.net/1HjZJQG

Bugtraq: KL-001-2015-001 : Windows 2003 tcpip.sys Privilege Escalation

KL-001-2015-001 : Windows 2003 tcpip.sys Privilege Escalation



from SecurityFocus Vulnerabilities http://bit.ly/1yDPc8o

Bugtraq: AST-2015-001: File descriptor leak when incompatible codecs are offered

AST-2015-001: File descriptor leak when incompatible codecs are offered



from SecurityFocus Vulnerabilities http://bit.ly/18yF2AV

Bugtraq: Cisco Security Advisory: GNU glibc gethostbyname Function Buffer Overflow Vulnerability

Cisco Security Advisory: GNU glibc gethostbyname Function Buffer Overflow Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1yDPaxk

Bugtraq: [slackware-security] glibc (SSA:2015-028-01)

[slackware-security] glibc (SSA:2015-028-01)



from SecurityFocus Vulnerabilities http://bit.ly/18yF0ZL

Wednesday, January 28, 2015

Use ReactJS to Build Native Apps

Comments



from Hacker News http://bit.ly/1z3GhCe

Towards a Transformative Hermeneutics of Quantum Gravity

Comments



from Hacker News http://bit.ly/1z3GhlJ

New Rules in China Upset Western Tech Companies

Comments



from Hacker News http://nyti.ms/1y68cNQ

Google: YouTube is so overloaded staff cannot filter content

Comments



from Hacker News http://apne.ws/1y68cNJ

CommonJS require for the browser in just 1k

Comments



from Hacker News http://bit.ly/1y68cxi

VMware reports record earnings, significant AirWatch growth

VMware passed the $6 billion mark in revenues for the first time in 2014, company representatives reported on yesterday’s earnings call. (Listen to the call and view accompanying slides here.) VMware reported a 16 percent increase in annual revenues over 2013 and elaborated on the effects of the AirWatch acquisition, a “key milestone” for the […]]> http://vmw.re/1DbneF3 0 BYOD’s effect on the IT help desk http://vmw.re/1trS64d http://vmw.re/1DbngN8 Tue, 27 Jan 2015 20:12:00 +0000

VMware reports record earnings, significant AirWatch growth

VMware passed the $6 billion mark in revenues for the first time in 2014, company representatives reported on yesterday’s earnings call. (Listen to the call and view accompanying slides here.) VMware reported a 16 percent increase in annual revenues over 2013 and elaborated on the effects of the AirWatch acquisition, a “key milestone” for the […]]> http://vmw.re/1DbneF3 0 BYOD’s effect on the IT help desk http://vmw.re/1trS64d http://vmw.re/1DbngN8 Tue, 27 Jan 2015 20:12:00 +0000
Lanier Norville




from VMware Blogs http://bit.ly/1trS64g

HackerSurfing: Free Housing and Food for Engineers Visiting SF

Comments



from Hacker News http://bit.ly/1trOdwk

Show HN: Cliptext, a tool for sharing pre-selected text as images on Twitter

Comments



from Hacker News http://bit.ly/1trOcs1

Screenhero is joining Slack

Comments



from Hacker News http://bit.ly/1y62N9u

Bugtraq: Multiple vulnerabilities in MantisBT

Multiple vulnerabilities in MantisBT



from SecurityFocus Vulnerabilities http://bit.ly/1zcqIGU

Bugtraq: Two XSS Vulnerabilities in SupportCenter Plus

Two XSS Vulnerabilities in SupportCenter Plus



from SecurityFocus Vulnerabilities http://bit.ly/1zYuAhv

Bugtraq: [CVE-2015-1394] Photo Gallery (Wordpress Plugin) - Multiple XSS Vulnerabilities Version 1.2.8

[CVE-2015-1394] Photo Gallery (Wordpress Plugin) - Multiple XSS Vulnerabilities Version 1.2.8



from SecurityFocus Vulnerabilities http://bit.ly/1zYuA16

Bugtraq: [CVE-2015-1393] Photo Gallery (Wordpress Plugin) - SQL Injection in Version 1.2.8

[CVE-2015-1393] Photo Gallery (Wordpress Plugin) - SQL Injection in Version 1.2.8



from SecurityFocus Vulnerabilities http://bit.ly/1zYuuqa

Netflix Likes React

Comments



from Hacker News http://nflx.it/1yy2PG5

Self-Driving Tractor (1978) [video]

Comments



from Hacker News http://bit.ly/1yy2PpF

Slack Acquires Screenhero (YC W13)

Comments



from Hacker News http://tcrn.ch/1yxX9vN

The Hitchhiker's Guide to the Galaxy Game – 30th Anniversary Edition

Comments



from Hacker News http://bbc.in/1yxX9vB

Milestones for SaaS Companies

Comments



from Hacker News http://bit.ly/18uXZod

29 years ago, Challenger had a catastrophic failure 73 seconds into flight

Comments



from Hacker News http://1.usa.gov/18uY1fE

How companies test their mobile apps

Comments



from Hacker News http://bit.ly/1uBm2WO

Obama Shocks Reps and Expands Wilderness Protection in Alaska

Comments



from Hacker News http://bit.ly/1tr90QA

Lessons Learned Shark Tank Survivor

Comments



from Hacker News http://bit.ly/1uBm556

Hear our new EMEA channel head’s message to VMware’s partners

Our new vice president of channel and alliances in EMEA, …



Read More



from VMware Blogs http://bit.ly/1DaNYWc


Cisco Prime Service Catalog XML External Entity Processing Vulnerability

A vulnerability in the configuration of the XML parser of Cisco Prime Service Catalog could allow an authenticated, remote attacker to access sensitive data stored on the host operating system or cause system resource consumption that could cause a denial of service condition.



Cisco has released free software updates that address this vulnerability.



This advisory is available at the following link:

http://bit.ly/1LhH8nL



from Cisco Security Advisory http://bit.ly/1LhH8nL

Design and Implementation of CSV/Excel Upload for SaaS

Comments



from Hacker News http://bit.ly/1BoVVVz

Creating a CSV/Excel uploader

Comments



from Hacker News http://bit.ly/1BoVVVz

Life as a Bionic Woman

Comments



from Hacker News http://bit.ly/1zzsgOD

AI will not kill us, says Eric Horvitz (Microsoft Research chief)

Comments



from Hacker News http://bbc.in/1BoVY3Q

Bugtraq: [CORE-2015-0003] - FreeBSD Kernel Multiple Vulnerabilities

[CORE-2015-0003] - FreeBSD Kernel Multiple Vulnerabilities



from SecurityFocus Vulnerabilities http://bit.ly/1DgXWG1

Bugtraq: FreeBSD Security Advisory FreeBSD-SA-15:03.sctp

FreeBSD Security Advisory FreeBSD-SA-15:03.sctp



from SecurityFocus Vulnerabilities http://bit.ly/1zzifAS

Bugtraq: FreeBSD Security Advisory FreeBSD-SA-15:02.kmem

FreeBSD Security Advisory FreeBSD-SA-15:02.kmem



from SecurityFocus Vulnerabilities http://bit.ly/1zzifkm

One Week of Harassment on Twitter

Comments



from Hacker News http://bit.ly/1zzeF9T

Ask HN: When was your last time you lived 24 hours without the Internet?

Comments



from Hacker News http://bit.ly/1BoLKjO

Comcast: Simulating shitty network connections so you can build better systems

Comments



from Hacker News http://bit.ly/1BoLIsh

Nobody Knows What an iPad Is Good for Anymore

Comments



from Hacker News http://wrd.cm/1zzeEml

Memebox (YC W14) Is Hiring for Engineering and Business Development

Comments



from Hacker News http://bit.ly/1zz0v8O

Not So Spooky: Linux “Ghost” Vulnerability

Comments



from Hacker News http://bit.ly/1BoBJ68

Sind Sie ein VMware Partner? Verfolgen Sie unser Launch Event und gewinnen Sie einen digitalen Code von iTunes im Wert von 10 €!

Wie Sie vielleicht bereits wissen, sind es nur noch wenige …



Read More



from VMware Blogs http://bit.ly/1tqhibt


Sind Sie ein VMware Partner? Verfolgen Sie unser Launch Event und gewinnen Sie einen digitalen Code von iTunes im Wert von 10 €!

Wie Sie vielleicht bereits wissen, sind es nur noch wenige …



Read More



from VMware Blogs http://bit.ly/1uAUH7g


VMware End-User Computing 2014 Recap and 2015 Predictions

By Sanjay Poonen, EVP and GM, End-User Computing, VMware Looking back on my first full year leading the End-User Computer (EUC) team at VMware, I can�t help but echo Pat Gelsinger�s comments at VMworld: what a difference a year makes! Since joining the team in August 2013, we have been working to fulfill our vision […]]> http://vmw.re/1tqhfMK 0 3 Reasons Hybrid Cloud is Much More Secure Than You Think http://vmw.re/1uAUGQK http://vmw.re/1tqhffG Tue, 27 Jan 2015 16:17:47 +0000
Morgan OLeary




from VMware Blogs http://bit.ly/1uAUGQN

Sind Sie ein VMware Partner? Verfolgen Sie unser Launch Event und gewinnen Sie einen digitalen Code von iTunes im Wert von 10 €!

Wie Sie vielleicht bereits wissen, sind es nur noch wenige Tage bis zu unserem großen Online Launch Event. Vor allem wenn Sie ein VMware Partner sind, wird das Webinar Neuigkeiten für Sie bereithalten, die Sie nicht verpassen sollten.


Und nebenbei können Sie ganz einfach einen digitalen Code von iTunes im Wert von 10€ gewinnen. Wie? Ganz einfach: registrieren Sie sich und verfolgen Sie unser Webinar. Allerdings müssen Sie schnell sein, denn nur die ersten 2500 Partner können gewinnen. Für die Registrierung und die Teilnahme am Gewinnspiel klicken Sie hier.


Weiterhin erhalten alle registrierten Teilnehmer über unsere Online Event-Plattform Zugang zu zusätzlichen Inhalten und Aktivitäten. Außerdem können Sie so auch Ihr Ticket für die VMworld 2015 gewinnen. Es lohnt sich also mitzumachen!


Und nicht vergessen: das EMEA Webinar findet am 3. Februar um 10:00 Uhr statt!


iTunes is a trademark of Apple, Inc., registered in US and other countries. Apple is not a participant in or sponsor of this promotion






via VMware Blogs http://bit.ly/1tqhibt

Sind Sie ein VMware Partner? Verfolgen Sie unser Launch Event und gewinnen Sie einen digitalen Code von iTunes im Wert von 10 €!

Wie Sie vielleicht bereits wissen, sind es nur noch wenige Tage bis zu unserem großen Online Launch Event. Vor allem wenn Sie ein VMware Partner sind, wird das Webinar Neuigkeiten für Sie bereithalten, die Sie nicht verpassen sollten.


Und nebenbei können Sie ganz einfach einen digitalen Code von iTunes im Wert von 10€ gewinnen. Wie? Ganz einfach: registrieren Sie sich und verfolgen Sie unser Webinar. Allerdings müssen Sie schnell sein, denn nur die ersten 2500 Partner können gewinnen. Für die Registrierung und die Teilnahme am Gewinnspiel klicken Sie hier.


Weiterhin erhalten alle registrierten Teilnehmer über unsere Online Event-Plattform Zugang zu zusätzlichen Inhalten und Aktivitäten. Außerdem können Sie so auch Ihr Ticket für die VMworld 2015 gewinnen. Es lohnt sich also mitzumachen!


Und nicht vergessen: das EMEA Webinar findet am 3. Februar um 10:00 Uhr statt!


iTunes is a trademark of Apple, Inc., registered in US and other countries. Apple is not a participant in or sponsor of this promotion






via VMware Blogs http://bit.ly/1uAUH7g

VMware End-User Computing 2014 Recap and 2015 Predictions

By Sanjay Poonen, EVP and GM, End-User Computing, VMware Looking back on my first full year leading the End-User Computer (EUC) team at VMware, I can

Show HN: WYSIWYG CNC wood carvings

Comments



from Hacker News http://bit.ly/1zyMLuT

Does the Front Page of Hacker News (Going Viral) Create Sales? Eh

Comments



from Hacker News http://bit.ly/1zyMLek

Zuckerberg:“je suis Charlie”, Facebook censors images of Muhammad

Comments



from Hacker News http://wapo.st/1BorChX

Drone Maker to Prevent Some Device Flights Over D.C

Comments



from Hacker News http://on.wsj.com/1zyMKqL

Netflix’s Secret Special Algorithm Is a Human

Comments



from Hacker News http://nyr.kr/1zyMKag

Show HN: Powerful 2D Transformation Matrix for JavaScript

Comments



from Hacker News http://bit.ly/1zyMGY5

Tuesday, January 27, 2015

Kythe: a new approach to making developer tools

Comments



from Hacker News http://bit.ly/18pUCyF

Why the snow forecast for New York City was so bad, and what should be done

Comments



from Hacker News http://wapo.st/1BuZMTK

'Snoopers' charter' revival on hold as redraft demanded

Comments



from Hacker News http://bbc.in/18pUzD0

Illumio's new security foundations can enable a new era of agility

Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world



from Latest topics for ZDNet in Security http://zd.net/1LeVmWo

What the Flux?

Comments



from Hacker News http://bit.ly/1zqYwU1

From 0 to $1B – Slack's Founder Shares Their Epic Launch Strategy

Comments



from Hacker News http://bit.ly/1zqYxYb

Next-Gen Email Platform Nilas Grabs $8M, Preps Its Own Email Client

Comments



from Hacker News http://tcrn.ch/1BuWcJ3

How I Got a Job in Web Development

Comments



from Hacker News http://bit.ly/1BuWcsK

Nu är det inte långt kvar…

Som du nu har hört vid det här laget, så kommer Pat Gelsinger och Ben Fathi att presentera vår största lansering online det här året 3 februari kl 10.00 (CET). Den här lanseringen är också starten på vår kampanj: 28 dagar i februari, då vi varje dag i februari kommer att dela med oss av events, tävlingar med toppenpriser och mycket mer – du måste vara med på allt det här!


Varför? Jo, här är fem väldigt goda anledningar till att du ska anmäla dig till vårt STORA online-event:


1. Var först med att höra om våra senaste nyheter, direkt från vår CEO och CTO och vad nyheterna kommer att innebära för din verksamhet


2. Du får reda på hur du ligger steget före dina konkurrenter genom att förändra din IT-infrastruktur


3. Partners, lär er mer om hur innovationer gör det möjligt för dig att leverera stabila lösningar och tjänster till dina kunder i 2015


4. Ta chansen och vinn en iPad och andra priser på #CloudCred och #vmw28days webbsida


5. Och slutligen, tre lyckliga deltagare på webbinaret kommer att vinna fribiljetter till VMworld 2015 – USA eller Europa. Se bara till att du har anmält dig!


Anmäl dig här






via VMware Blogs http://bit.ly/1BuUxn2

USN-2485-1: GNU C Library vulnerability

Ubuntu Security Notice USN-2485-1


27th January, 2015


eglibc vulnerability


A security issue affects these releases of Ubuntu and its derivatives:



  • Ubuntu 12.04 LTS

  • Ubuntu 10.04 LTS


Summary


The GNU C Library could be made to crash or run programs.


Software description



  • eglibc - GNU C Library


Details


It was discovered that a buffer overflow existed in the gethostbyname

and gethostbyname2 functions in the GNU C Library. An attacker could

use this issue to execute arbitrary code or cause an application crash,

resulting in a denial of service.


Update instructions


The problem can be corrected by updating your system to the following package version:



Ubuntu 12.04 LTS:

libc6 2.15-0ubuntu10.10

Ubuntu 10.04 LTS:

libc6 2.11.1-0ubuntu7.20


To update your system, please follow these instructions: http://bit.ly/1aJDvTw.


After a standard system update you need to reboot your computer to make

all the necessary changes.


References


CVE-2015-0235






from Ubuntu Security Notices http://bit.ly/1zqTjvk

Nu är det inte långt kvar…

Som du nu har hört vid det här laget, så …



Read More



from VMware Blogs http://bit.ly/1BuUxn2


Reducing the Attack Surface: Takeaways from the 2015 Annual Security Report

As the Cisco 2015 Annual Security Report shows, current security approaches aren’t sufficient. Attackers are shifting methods and becoming more sophisticated in their approaches, users [...]



from Cisco Blog » Security http://bit.ly/18pKyFX

John Carmack's adolescent years (2003)

Comments



from Hacker News http://bit.ly/1DdwtVx

That Didn’t Need to Take an Hour

Comments



from Hacker News http://bit.ly/1zqOjH6

Auschwitz 70th anniversary: Survivors warn of new crimes

Comments



from Hacker News http://bbc.in/1zqOhiC

CVE-2015-0235 glibc gethostbyname Overflow writeup

Comments



from Hacker News http://bit.ly/1zqOh1T

Coffee In the Cafe with Vic Bhagat — Israel Center of Excellence






EMC logo


















http://iblog.emc.com In the latest edition of his "Coffee in the Café" series, EMC CIO Vic Bhagat and Orna Berry, VP of Growth and Innovation, EMC COE, discuss how tapping into and harnessing...


From: EMC

Views: 0


0 ratings

Time: 05:34 More in Science & Technology








via EMC Feeds http://bit.ly/15FOpgg

Need some help getting to EMC World 2015? Let us help you! We’ve created a Convi...






EMC logo
Need some help getting to EMC World 2015? Let us help you! We’ve created a Convince Your Boss email with the most important information about EMC World 2015. Copy, Paste, Attend: http://emc.im/1xKWMP6










via EMC Feeds http://bit.ly/15FOoJm

EMC for SAPs HANA Platform - Convenience of an Appliance with the Flexibility of TDI






EMC logo


















Top Reasons Why EMC for SAP HANA What if you could have the convenience of an appliance with the flexibility of SAP tailored data center integration? Watch this video to learn how EMC can...


From: EMC

Views: 0


0 ratings

Time: 03:15 More in Film & Animation








via EMC Feeds http://bit.ly/1EoO2Wv

EMC Data Protection for SAP HANA; Backup and Restore






EMC logo


















Top Reasons Why EMC Backup for SAP HANA Data protection for SAP is always an important topic for customers. EMC offers various solutions for SAP HANA depending on RPO/RTO requirements.


From: EMC

Views: 0


0 ratings

Time: 04:04 More in Film & Animation








via EMC Feeds http://bit.ly/15FOlgG

EMC for SAPs HANA Platform - Introduction Why - What - Impact.mp4






EMC logo


















Top Reasons Why EMC for SAP HANA EMC offers choice for deploying infrastructure for SAP's HANA platform. Watch this video providing an overview of EMC's deployment options for datacenter...


From: EMC

Views: 0


0 ratings

Time: 03:23 More in Film & Animation








via EMC Feeds http://bit.ly/1EoO2pt

5 things you need to know about Microservices:






EMC logo
5 things you need to know about Microservices:





Five Things You Need To Know About Microservices | EMC

infocus.emc.com

Microservices bring benefits in innovation, manageability, resiliency and scalability, but there are tradeoffs.






via EMC Feeds http://bit.ly/15FOiS4

Coffee In the Cafe with Vic Bhagat — Israel Center of Excellence






EMC logo


















http://iblog.emc.com In the latest edition of his "Coffee in the Café" series, EMC CIO Vic Bhagat and Orna Berry, VP of Growth and Innovation, EMC COE, discuss how tapping into and harnessing...


From: EMC

Views: 0


0 ratings

Time: 05:34 More in Science & Technology








via EMC Feeds http://bit.ly/15FOpgg