Monthly Archives: July 2008

Use tcpdump for traffic analysis

Source: http://blogs.techrepublic.com.com/…1 Author: Chad Perrin The tcpdump tool is an old mainstay of network debugging and security monitoring, and security experts all over the world swear by its usefulness. It is a command line tool that eschews all the makeup … Continue reading

Posted in opensource, script, shell | Tagged , , , , | Comments Off on Use tcpdump for traffic analysis

Inside the Cloud: 9 Sectors to Watch

Source: http://gigaom.com/2008/07/20/9-cloud-computingsectors-to-watch/ Author: Alistair Croll There’s already a ton of activity taking place in the cloud computing space, so much so that it can be hard to know who to watch. In many cases, it’s too early to pick winners. … Continue reading

Posted in cloud | Tagged , , , | Comments Off on Inside the Cloud: 9 Sectors to Watch

A combination of Cloud, Web2.0 and Infrastructure

Facebook, Joyent and Sun have partnered to provide free scalable, on-demand infrastructure from Joyent to Facebook developers. Joyent’s Accelerator on-demand infrastructure (peered with Facebook’s datacenter!) provides the very best load balancers, routing and switching fabric, x86 servers and storage from … Continue reading

Posted in cloud, innovation, web2.0 | Tagged , , , , , , , , , , | Comments Off on A combination of Cloud, Web2.0 and Infrastructure

Gartner: Seven cloud-computing security risks

Source: http://www.infoworld.com/…/Gartner_Seven_cloudcomputing_security_risks_1.html … Cloud computing is fraught with security risks, according to analyst firm Gartner. Smart customers will ask tough questions and consider getting a security assessment from a neutral third party before committing to a cloud vendor, Gartner says … Continue reading

Posted in cloud, innovation, security | Tagged , , , , , | Comments Off on Gartner: Seven cloud-computing security risks

Tag Database Schema

Source: http://www.pui.ch/phred/archives/2005/04/tags-database-schemas.html … In this solution, the schema has got just one table, it is denormalized. This type is called “MySQLicious solution” because MySQLicious imports del.icio.us data into a table with this structure. Intersection (AND) Query for “search+webservice+semweb”: SELECT * … Continue reading

Posted in innovation, internet, social network, web2.0 | Tagged , , , , , | Comments Off on Tag Database Schema

3 Layers in Cloud

Source > http://refresh.gigaom.com/…defogging-cloud-computing-a-taxonomy/ Applications in the cloud (Salesforce and other SaaS vendors exist here today) provide turnkey end-user software, normally browser-based, with a specific functional focus. They are the easiest to start ‘consuming,’ but also the least flexible. They grow … Continue reading

Posted in cloud, web2.0 | Tagged , , , , , , , | Comments Off on 3 Layers in Cloud