Showing posts with label net. Show all posts
Showing posts with label net. Show all posts

2012-09-23

www.i-programmer.info

7.10: news.cyb/dev/I Programmer:
Programming news, projects,
articles and book reviews:
· www.i-programmer.info;
iProgrammer news is written
for programmers by same .
iProgrammer news also doesn't aim to be
the first or up-to-the-minute.
Our news does cover the latest releases,
intentions and developments
but in depth and with a
commentary that aims to explain
the significance of the event.
It also marks significant anniversaries
with links to relevant articles.
9.6: web:
. it has a table of subject-specific pages;
notable subject-specific lists of articles
include theory
(eg, a better way to program
-- see my article about this cp4e heroism .
and security
(eg, 2012.2 Google's $1 million for Chrome Hack
2012.3: Chrome Hacked Twice at CanSecWest)

2010-06-30

library mgt integrated with torrent client

6.1: adde/library mgt integrated with torrent client:
. I had this idea that all components
should be torrented by default
with the torrent client built into the apt-get service
but a problem with torrents generally,
is that when getting service from an isp,
the isp is a bottleneck;
because,
you're a subnode of the isp;
the isp can efficiently flow only when
not everyone is streaming at once;
whereas, torrenting expects the opposite:
if any streaming occurs,
all nodes should be streaming until the job is done .
. nevertheless, if it's good eno' for large downloads,
it should also be helpful with
masses of small downloads, [right?]
. when you open the torrent client,
it's listing all the modular packages
you got from the debian library,
having them in original form .
todo:
. do the packages get modified during installation?
if so, this would double the amount space
needed for this to work .

. another problem is that with smaller loads,
it may not be easy to convince people to give
when they're not getting as much .
. I got the idea from
hearing that skype is a torrent;
when you sign in to take calls,
you are also volunteering to torrent calls .
. the apt-get client could at least torrent
for the time it was downloading .
. the client could explain
this is one way you could help with
paying for the cost of
streaming packages and updates .
. there could be an adjustment for
stopping when the fan got noisy, etc .

2010-05-18

graphics for google'knol

4.19: sci.addn/net.knol/graphic html is ok:
. does google'knol display picts from the web?
ie, can I create some html with graphics
that will work the same in a knol page
as it does from my desktop browser?
eg, will knol show links to picts
that are stored on the picasa website?
yes:
. I took an url from picasa
made an html image with adjusted size in seamonkey.composer,
and was able to paste-in that html
into knol's html mode .
(this practice image is in my knol home page)
. the tag, with a typical picasa url:
img style="width: 346px; height: 259px;" alt="dig-it!"
src="http://lh4.ggpht.com/_v2G-__eT7bA/S0lMhrqQ4vI/
AAAAAAAAAk0/kSx5k7V56lk/
IMG_2425%20spear%20 beside%20me%20shows%20depth%20of%20holes.jpg"

2009-12-30

cloud computing

11.21: news.addx/security/cloud computing:
. If a full cryptographic solution is far-off,
what would a near-term solution look like?
WD: A practical solution will have several properties.
It will require an overall improvement in computer security.
Much of this would result from
care on the part of cloud computing providers
--choosing more secure operating systems such as Open BSD and Solaris--
and keeping those systems carefully configured.
A security-conscious computing services provider
would provision each user with
its own processors, caches, and memory at any given moment
and would clean house between users,
reloading the operating system and zeroing all memory.

A serious potential danger will be any laws intended to
guarantee the ability of law enforcement
to monitor computations that they suspect of supporting criminal activity.
Back doors of this sort complicate security arrangements
with two devastating consequences.
Complexity is the enemy of security.
Once Trojan horses are constructed,
one can never be sure by whom they will be used.
1439:
. afraid of gmail? the dod's internet eavesdropping machine
will pick it up anyway;
even crypts will be cracked in a couple years,
and when they are,
they give some insight into who we are,
which in turn may signal
who needs closer survailence via other means .

2009-12-27

google's knol

8.3: mis.addn/net.knol.google.com/shifting url's:
. I had an url at linkedin.com for my knol:
http://knol.google.com/k/philip-torrance/hormonics-the-zone-diet-revisited/q7wcrbfxokxg/3#
but it would give an error now unless I shortened it to this:
http://knol.google.com/k/philip-torrance/hormonics-the-zone-diet-revisited/
. which then expands to .../4#
so I guess that number might be for versioning .
[12.20: later I'd find the numbers are perm's not versions;
get a link from the perm'link widget ! ]