With Hazel, DropBox, OpenShift and my iPad and I managed to create a little “Cloud IDE” to enable editing and deployment to OpenShift from my iPad.
(Full Story: Deploy to the OpenShift cloud from an iPad)
1. Big Company Bureaucracy.
2. Failing to Find a Project for the Talent that Ignites Their Passion.
3. Poor Annual Performance Reviews.
4. No Discussion around Career Development.
OwnCloud is an open-source cloud program. You use it to set up your own cloud server for file-sharing, music-streaming, and calendar, contact, and bookmark sharing project. As a server program it’s not that easy to set up. OpenSUSE, with its Mirall installation program and desktop client makes it easier to set up your own personal ownCloud, but it’s still not a simple operation. That’s going to change.
(Full Story: OwnCloud: An open-source cloud to call your own | ZDNet)
“average players need rules. Special players need guidelines.”
a privately ran site that tracks torrent download sites and every IP number that plugs in. If you think someone on your network has been downloading illegal torrents and want to know, check this out.
(Full Story: You Have Downloaded – Shows what you torrented)
So you’re saying that if plumbers or if IT designers or engineers, or writers, or presidents, performed at the level, at the objective level that New York City teachers did, we’d either get rid of all of them, or radically change the job?…
All the learning modalities –
Large live instruction, small live instruction, virtual live instruction (which we call virtual tutoring, colloquially) independent practice, small group collaboration and independent virtual instruction.
1. Source code is text in a file! (1960s)
2. Humans can manually keep track of versions of code! (1960s)
3. You can keep lots of versions in one file! (1972, 1982)
4. You can each have your own copy checked out! (1982)
5. Wow! You can version multiple files at once! (1986)
6. Two people can edit the same file at the same time, and it merges what they both did! (1986)
7. The shared repository can be on a remote machine! (1994)
8. Free open source version control hosting! (1999)
9. You can distribute it all so there’s no central repository! (2005)
10. When you checkout that’s a fork too, and you can do that in public! (2008)
(Full Story: The history of version control)
While the scale of this particular ring may be significant, the methods used by the attackers were hardly sophisticated. According to the indictment, the systems attacked were discovered through a targeted port scan of blocks of IP addresses to detect systems with a specific type of remote desktop access software running on them. The software provided a ready-made back door for the hackers to gain entry to the POS systems—which is why remote access software is banned from systems that handle payment cards by the PCI Security Standards Council, which governs credit card and debit card payment systems security.
“With PCI compliance, those apps shouldn’t be on those systems,” said Konrad Fellmann, audit and compliance manager for SecureState, an IT security firm with a practice in retail security auditing, in an interview with Ars. But because small retailers who don’t store credit card data, they’re not required to have the same level of auditing as larger companies, Fellmann said.