February 09, 2014

Quantum Internet: First Teleportation to a Solid-State Quantum Memory
One of the building blocks of the quantum Internet will be quantum routers that can receive quantum information from location and route it on to another without destroying it. So the race is on to demonstrate this kind of technology, which has the potential to revolutionize communications. Today, Felix Bussières at the University of Geneva in Switzerland and a few pals say they’ve taken an important step towards this. But crucially they’ve done it for the first time over the kind of ordinary optical fiber that telecommunications that are in use all over the world.


Managing product binaries in virtual application pattern workloads
When you develop your virtual application pattern workload to be installed on IBM PureApplication System, IBM SmartCloud Orchestrator, or IBM Workload Deployer, you will encounter situations where your plug-in needs to manage product binaries. The product binaries may be yours or from a third party vendor such as IBM, SAP®, or Oracle®. In this article, you will see different strategies that you can follow to manage the product binaries and how your plug-in can access and install the binaries. You will also understand the relative advantages and disadvantages of these different strategies.


Interview: Ubuntu Takes on Hyperscale Using Open Source Technology
Ubuntu makes it easy to deploy and use the widest range of applications possible: from nginx to memached. We focus on making Ubuntu the best quality we can – everything should work beautifully. Not only do we deliver the widest range of applications, but we deliver them like clockwork every six months. This means that anybody who needs the most recent version of an application can get it easily. Another quality that users like is that Ubuntu is available everywhere – both on the desktop and on the server – making it an ideal OS for developers.


Why Wearable Computing is Waiting for A.I.
You could be eating in a restaurant, and Google Glass could, for example, tell you that it's the spot where your father proposed to your mother. Or that your friend will be late because of traffic, the salmon got bad reviews online, your parking meter will expire in 20 minutes, or the bathroom is through the bar and up the stairs to the right. Imagine that such knowledge could simply appear into your field of vision at the exact moment when you want to know it. That's where wearable computing is going. That's why the wearable revolution is mostly an artificial intelligence revolution.


How LinkedIn Uses Apache Samza
The most basic element of Samza is a stream. The stream definition for Samza is much more rigid and heavyweight than you would expect from other stream processing systems. Other processing systems, such as Storm, tend to have very lightweight stream definitions to reduce latency, everything from, say, UDP to a straight-up TCP connection. Samza goes the other direction. It wants its streams to be, for starters, partitions. It wants them to be ordered. If you read Message 3 and then Message 4, you are never going to get those inverted within a single partition. It also wants them to replayable, which means you should be able to go back to reread a message at a later date.


3 Ways To Be An Effective Self-Leader
As a self-leader, this is where you take the initiative to get the direction and support you need to do an activity or achieve a goal. Depending on the amount of competence and commitment you have in any one area, you need varying degrees of support and direction from others. On my fitness journey, I realized that there were some areas of fitness where I needed close supervision and direction because I was an enthusiastic beginner with very little competence.


Heat System Called Door to Target for Hackers
Over the last two years, Mr. Rios and Terry McCorkle, also of Qualys, said that they found 55,000 HVAC systems connected to the Internet. In most cases, they said, the systems contained basic security flaws that would allow hackers a way into companies’ corporate networks, or the companies installing and monitoring these systems reused the same remote access passwords across multiple clients.


Cloud computing defined: Characteristics & service levels
“Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” Although this widely-adopted description of what makes a cloud computing solution is very valuable, it is not very tangible or easy to understand. So let’s dive a little deeper into cloud computing and why it’s different than just visualization alone, which is commonly mistaken to be cloud computing as well.


Bitcoin’s Political Problem
Money is always political. This is obvious enough when we argue about Federal Reserve policy in the United States, or who should next chair the interest rate-setting body. But for over 1,000 years, we have argued about the nature of our monetary systems and shifted between different ways of making payments. Seen in this historical context, Bitcoin and other cryptocurrencies are just the latest in a long line of challenges to prevailing technology—and to current political arrangements.


Anonymous targets Singapore govt with second tweetstorm
Anonymous has stepped up efforts to raise awareness over ongoing criminal procedings in alleged hackers in Singapore linked to the hacktivist group. ... The arrests included those of James Raj Arokiasamy, alleged to be the hacker under the moniker "Messiah", linked to the defacement of at least one government Web site; what it dubbed the "Singapore 5", comprising 5 men accused of civil disobedience involving pro-Anonymous graffiti on a wall; and also "the plight of all the anons involved".



Quote for the day:

"Those who know how to win are much more numerous than those who know how to make proper use of their victories" -- Polybius

No comments:

Post a Comment