EC2 SecurityEC2 Security
One thing that concerns me about using any online service is the security. When that service is a virtual server running in another country the risks are greater than average.[...]
One thing that concerns me about using any online service is the security. When that service is a virtual server running in another country the risks are greater than average.[...]
I’ve updated my package of the Amazon EC2 API Tools for Debian [1]. Now it uses the Sun JDK. Kaffe doesn’t work due to not supporting annotations, I haven’t filed[...]
A couple of days ago I attended a lecture about the Drizzle database server [1]. Drizzle is a re-write of MySQL for use in large web applications. It is only[...]
I just watched an interesting TED.com talk about video games [1]. The talk focussed to a large degree on emotional involvement in games, so it seems likely that there will[...]
A recent news item is the “hacking” of the Yahoo mailbox used by Sarah Palin (the Republican VP candidate) [1]. It seems most likely that it was a simple social-engineering[...]
One ongoing problem with TCP networking is the combination of RPC services and port based services on the same host. If you have an RPC service that uses a port[...]
The first thing you need to do to get started using the Amazon Elastic Compute Cloud (EC2) [1] is to install the tools to manage the service. The service is[...]
Currently we have a problem with the Debian list server and Gmail. Gmail signs all mail that it sends with both DKIM and DomainKeys (DomainKeys has been obsoleted by DKIM[...]
There is a lot of discussion and speculation about The Singularity. The term seems to be defined by Ray Kurzweil’s book “The Singularity Is Near” [1] which focuses on a[...]
Currently we have a huge husing crisis in the US which involves significant political corruption including the federal government preventing state governments from stopping predatory banking practices [1]. The corrupt[...]