136 private links
I now officially feel old: "For more than two decades, the floppy disk was the primary external writable storage device used. Most computing environments before the 1990s were non-networked and floppy disks were the primary means of transferring data between computers, a method known informally as sneakernet. Unlike hard disks, floppy disks are handled and seen; even a novice user can identify a floppy disk. Because of these factors, a picture of a 3 1⁄2" floppy disk has become an interface metaphor for saving data. The floppy disk symbol is still used by software on user interface elements related to saving files, such as the release of Microsoft Office 2010, even though such disks are largely obsolete."
Unter der Moderation von Dean Reuter von Federalist Society diskutieren der ehemalige Staatssekretär des Office of Policy im Ministerium für Innere Sicherheit der Vereinigten Staaten Stewart Baker sowie der Jura-Professor Orin Kerr über das ‘Zurück-Hacken’ nach einem Angriff und über rechtliche Grenzen.
I blame the internet" has become the new "I blame Thatcher" – a cliché that stretches across newspapers (the latest in last week's New York Times in a piece about "gorging"), blogs, dinner tables, the conversations overheard on delayed train platforms; a cliché that slots neatly into the amorphous hole behind every problem. I've been compiling my favourites. From the internet.
Die Medizinisierung sozialer Konflikte schreitet scheinbar unaufhaltsam voran und erweist sich als ein riesiges Feld der Bereicherung. ADHS, Burnout, Depression, Stress sind im Kern soziale Leidenserfahrungen, die zu individualpsychologischen oder medizinischen Problemen umetikettiert werden. Als solche erscheinen sie ungefährlich und handhabbar.
I would love to hear the take of out education minister on that....
The pursuit of criminal sanctions for use of the middle finger infringes on First Amendment rights, violates fundamental principles of criminal justice, wastes valuable judicial resources, and defies good sense.”
Over the last decade plus, this procurement pattern has been increasingly challenged by a variety of disruptive technology adoption models: among them Open Source Software (OSS), cloud computing, Software-as-a-Service (SaaS) and Bring-Your-Own-Device (BYOD). Developers, as we have asserted previously, are increasingly the New Kingmakers.
One of the biggest challenges for vendors built around traditional procurement patterns is their tendency to undervalue convenience. Developers, in general, respond to very different incentives than do their executive purchasing counterparts. Where organizational buyers tend to be less price sensitive and more focused on issues relating to reliability and manageability, as one example, individual developers tend to be more concerned with cost and availability – convenience, in other words. Because you are who you build for, then, enterprise IT products tend to be more secure and compliant and less convenient than developer-oriented alternatives.
Das Internet ist heute eines der wichtigsten Mittel des Einzelnen für die Ausübung des Rechts der freien Meinungsäußerung und der Informationsfreiheit. Das hat der Europäische Gerichtshof für Menschenrechte (EGMR) in seinem heute veröffentlichten Urteil Yıldırım gegen Türkei (Appl. no.3111/10) festgestellt, in dem er (einstimmig) eine Verletzung des Art 10 EMRK durch die Türkei wegen einer generellen Sperre des Zugangs zu Google Sites feststellte.
Einer der Gründe, warum ich meine Musik nicht "in der Cloud" habe...
ZZ-Top-Star Billy Gibbons: "Ich liebe rosa Weihnachtsteddys" - SPIEGEL ONLINE - Nachrichten - Kultur
SPIEGEL ONLINE: Nach neun Jahren Auszeit ist vor kurzem Ihr aktuelles Album "La Futura" erschienen. Was haben Sie denn so lange gemacht?
Gibbons: Mit Interesse verfolgt, wie die Musikindustrie dem Abgrund entgegenstolpert. Die massiven Veränderungen unserer Branche haben wir als Band sozusagen von der Seitenlinie aus beobachtet. Es war ja keine Auszeit vom Musikmachen. Wir sind regelmäßig aufgetreten, es war nur nicht klar, ob sich noch die Mühe lohnt, eine neue Platte anzugehen.
Deutschen Psy-Fans können den Originalclip allerdings nicht anschauen: Das Video ist hierzulande wegen eines Gebührenstreits zwischen YouTube und der Verwertungsgesellschaft Gema gesperrt.
Eltern vom Internet abhalten ist wie Flöhe hüten, weil sie sich wie Kinder benehmen. Kinder müssten frühzeitig mehr Macht über die Eltern haben. Diese Macht bekommen sie viel später natürlich auch, aber dann ist es ja schon passiert, dann sind sie digital dement, und auch so.“
This isn't our web today. We've lost key features that we used to rely on, and worse, we've abandoned core values that used to be fundamental to the web world. To the credit of today's social networks, they've brought in hundreds of millions of new participants to these networks, and they've certainly made a small number of people rich.
But they haven't shown the web itself the respect and care it deserves, as a medium which has enabled them to succeed. And they've now narrowed the possibilites of the web for an entire generation of users who don't realize how much more innovative and meaningful their experience could be.
Whitman said Apotheker and Shane Robison, HP's former head of strategy, are to blame, and she noted that they are both gone. Whitman said that the board -- of which she was a part at the time of the purchase -- "feels terribly" about missing Autonomy's accounting fraud. But she said the purchase was thoroughly audited by consulting giant Deloitte, which itself was audited by KPMG -- and neither of those companies found anything suspicious about the deal.
This tutorial explains how to set up and use IBM Global Security Kit (GSKit) for typical certificate management tasks such as self-signed certificate generation, creation of a Certificate Authority (CA), requesting a certificate from a third-party CA, and installing certificates for use in SSL protocols.
Storm is an open source, big-data processing system that differs from other systems in that it's intended for distributed real-time processing and is language independent. Learn about Twitter Storm, its architecture, and the spectrum of batch and stream processing solutions.
Garbage collection can be freeing. It lets us focus on application logic rather than memory management. However, garbage collection is not magic. Understanding how it works, and how it can be tricked into maintaining memory long after it should have been released, results in faster and more reliable applications. In this article, learn about a systematic approach for locating memory leaks in JavaScript applications, several common leaking patterns, and appropriate methods to address those leaks.
If your application needs to generate PDF documents dynamically, you need the iText library. The open source iText library makes PDF creation a snap. This article introduces iText and gives a step-by-step guide to using it to generate PDF documents from Java technology applications. We create a sample application to better understand iText.
30 Oct 2012 - Authors updated article to reflect changes for iText version 5.3.0 (original article used iText version 1.3).
Fefe meint: Tauschbörsenbenutzer haben eine um den Faktor 5 größere Musiksammlung, aber die Liste der gekauften Musikstücken darin ist auch um den Faktor 3 größer. Das sind also die Großkunden der Musikindustrie, die sie da abmahnen, und dann rumheulen, dass ihnen der Absatzmarkt wegbricht.