Jump to content

Fi8sVrs

Active Members
  • Posts

    3206
  • Joined

  • Days Won

    87

Everything posted by Fi8sVrs

  1. Fi8sVrs

    cheta

    /// deleted
  2. Concept Cabin by Airbus Aviation firm Airbus have unveiled a conceptual aeroplane with a transparent cabin and virtual golf course. Proposed for the year 2050, the plane would offer passengers seats that change shape, aromatherapy and antioxidant-enriched air. Onboard entertainment would include holographic games of golf and virtual changing rooms for shopping. The concept was unveiled in London yesterday and will be on show at the Paris Airshow from 20 to 26 June. Watch our movie about trends in aircraft design on Dezeen Screen » More stories about transport on Dezeen » The information below is from Airbus: Intelligent interiors replace class system for a bespoke flying experience Leading aircraft manufacturer Airbus, in advance of the Paris Airshow “Le Bourget”, today invited the passengers of 2050 to discover its Concept Cabin – a whole new flying experience inspired by nature. Personalised zones replace traditional cabin classes to offer tailored levels of experience. While taking a hop between destinations, according to Airbus, passengers in 2050 could join an interactive conference; enjoy a game of virtual golf; read the kids back home a bedtime story; and recharge in a ‘vitalising seat’ whilst watching the planet spread out beneath their feet. This latest instalment of The Future by Airbus – a vision of aviation in 2050 – follows last year’s unveiling of the revolutionary Airbus Concept Plane, packed with technologies to reduce fuel burn, emissions, waste and noise. The Airbus Concept Cabin now gives further insight into some of the innovations and technologies that will shape future passenger experiences on board. The aircraft’s bionic structure mimics the efficiency of bird bone which is optimised to provide strength where needed, and allows for an intelligent cabin wall membrane which controls air temperature and can become transparent to give passengers open panoramic views. The Concept Cabin has an integrated ‘neural network’ creating an intelligent interface between passenger and plane. It can identify and respond to passenger needs and enables bespoke features such as morphing seats which change to your body shape. New personalised zones replace the traditional cabin classes in the Airbus Concept Cabin to offer new tailored levels of experience. The “vitalising zone” is all about wellbeing and relaxation allowing you to proactively recharge your batteries with vitamin and antioxidant enriched air, mood lighting, aromatherapy and acupressure treatments whilst taking in the infinite view of the world around you. There are no limits to the kinds of social scenarios in the centre zone of the concept cabin – the “interactive zone”. The virtual pop up projections in this area can transform you to whichever social scene you want to be in, from holographic gaming to virtual changing rooms for active shoppers. The “smart tech zone” is tailored towards the more functional oriented passenger with a chameleon style offering, to meet individual needs ranging from a simple to a complete luxury service, but all allowing you to continue life as if on the ground. By offering different levels of experience within each zone, airlines would be able to achieve price differentials and give more people access to the benefits of air travel with minimal environmental impact. Showcasing the innovative interior design, Charles Champion, Airbus Executive Vice President Engineering, said: “Our research shows that passengers of 2050 will expect a seamless travel experience while also caring for the environment. The Airbus Concept Cabin is designed with that in mind, and shows that the journey can be as much a voyage of discovery as the destination. Whichever flight experience is chosen, the passenger of 2050 will step out of the Airbus Concept Cabin feeling revitalised and enriched.” More than 90 percent of Airbus’ annual research & development investment of over €2 billion has environmental benefits for current and future aircraft. For example, due to advances in technologies the concept cabin will be 100% recyclable. It will have self-cleaning materials made from sustainable plant fibres which reduce waste and maintenance and will harvest passenger body heat to power cabin features. Such technologies are already being developed and, while they may not be seen in the exact same manner as in the Airbus Concept Plane and Cabin, some of them could feature in future Airbus aircraft programmes. Visitors to Le Bourget International Airshow in Paris will also be able to experience the Airbus’ Future of Flight film, a 360 planetarium movie – a vision of the transformations in air transport between now and the middle of the century which not only focuses on aircraft designs and innovations, but also addresses passenger expectations. The movie will be part of the planetarium’s programme at the Musee de l’Air et de l’Espace from 20 – 26 June. Concept Cabin by Airbus
  3. The hacker group LulzSec is at it again. This time, the targets are the U.S. Senate and gaming company Bethesda Softworks, publisher of the popular shoot-'em-up video game Brink. LulzSec -- whose name is a combination of "lulz," an Internet term often used to denote laughter at the victim of a prank, and "sec," short for "security" -- said it holds the personal information of more than 200,000 players of Brink. "Bethesda, we broke into your site over two months ago," the group announced Monday over Twitter. "We've had all of your Brink users for weeks. Please fix your junk, thanks! ^_^" The group also released a statement Monday, bragging about its hacking prowess and sketching out in basic terms how it went about "pillaging" the Bethesda servers in "ninja mode" with "heavy artilery Lulz Cannons." "After mapping their internal network and thoroughly pillaging all of their servers, we grabbed their source code and database passwords, which we proceeded to shift silently back to our storage deck," the statement said. It wasn't anger or justice driving the Bethesda hack, LulzSec said, but rather admiration. The group loves the company's games and wants to help "speed up the production" of The Elder Scrolls V: Skyrim, a role-playing game currently under development. But the group might release user data if the game developer is not open about how Skyrim is doing, LulzSec said. The group had no love for the Senate, however, and on Monday released a "small, just-for-kicks" amount of data it said was from the hacked Senate website. The data made public is relatively harmless but could signify that the hackers have more sensitive information in hand. "We don't like the U.S. government very much," LulzSec said in a separate statement. "Their boats are weak, their lulz are low, and their sites aren't very secure." "Is this an act of war, gentlemen?" it taunted. The group -- previously known for posting false reports on the PBS website that dead rappers Tupac and Biggie Smalls were alive and well in New Zealand -- have been busy of late, claiming responsibility for hacks on websites for Sony, Nintendo, PBS and a site affiliated with the FBI. Source
  4. NEWS RELEASE: Xi3 Corporation Announces its ChromiumPC Modular Computer – the World’s First Desktop Computer Running Google’s Chrome Operating System Based upon the patented Xi3 Computer Architecture, the ChromiumPC computer is a cube-like, small form factor, low-power (20Watts) dual-core modular computer that can be adapted to run other operating systems or to perform specialized functions. Xi3 Corp. has been developing the ChromiumPC since 2009. Pricing will be disclosed later this year, with General Availability expected in the second half of 2011 SALT LAKE CITY--Xi3® Corporation today announced its ChromiumPC™ modular computer, the world's first desktop computer designed to run Google's Chrome operating system. First disclosed by Xi3 Corp. in 2009, the ChromiumPC is a version of the company's Xi3 Modular Computer™ which was formally unveiled in 2010 and named by the Consumer Electronics Association (News - Alert) as an Innovations Award Winner in the Computer Hardware category for the 2011 International CES (News - Alert) trade show. "The Xi3 Computer Architecture is designed to support any x86-based operating system, including Windows, Linux, Unix, and other open source-based operating systems," said Jason A. Sullivan, president and CEO of Xi3 Corp. "Although we've been promoting, discussing and working on modular computers for some time, we feel the market is now ready for a desktop computer with a cloud-based operating system like the one offered by Google. If someone chooses to switch their ChromiumPC to run a different operating system, it's as easy as swapping out one of the three boards inside the computer. "Historically, the vast majority of operating systems have been installed and run locally on computers. But as technology has advanced and people have become more and more comfortable with using Web-based applications and storing data away from their computer, specifically 'in the cloud,' it only makes sense that operating systems will become cloud-based. In fact, we expect that over time we'll see many operating systems that are wire-bound and require the computer to be connected to the Internet to run, and we will likely support these new operating systems as well." Modularity Explained for the ChromiumPC and Xi3 Modular Computer Each Xi3 Modular Computer, including the ChromiumPC, is housed in an aluminum chassis that holds three small but interconnected boards (or modules), namely The Processor Module™, The Primary I/O Module™, and The Secondary I/O Module™. Taken in concert these three modules form the basis of what has been the classic motherboard, with the Processor Module housing the microprocessor and RAM, the Primary I/O Module typically housing the majority of the external communications ports, and the Secondary I/O Module typically housing Ethernet, video and power connections. Unlike traditional computers, however, the Xi3 Computer Architecture makes it possible to change the so-called personality and/or functionality of an Xi3 Modular Computer, including the ChromiumPC. This is done in eight easy steps: Power down and disconnect the Modular Computer from all external connections Remove the four screws from one of the honeycomb-shaped and chrome-plated sideplates Remove the sideplate from the Modular Computer chassis Slide the three interconnected modules out of the chassis Remove one of the I/O Modules and replace it with a new I/O Module Reinsert the three interconnected modules back inside the chassis Reattach the sideplate to the chassis Reconnect all external connections and power-up the Modular Computer "Based upon feedback and interest from our initial proof-of-concept and evaluation customers, we have already begun developing new Primary and Secondary I/O Modules," Sullivan explained. "We also have partners beginning to develop their own proprietary I/O Modules as well. We expect to have the first of our new I/O Modules available during this summer, each of which will work with the ChromiumPC, as well as Xi3 Modular Computers that run other operating systems." The ChromiumPC will be powered by a dual- or single-core 64-bit, x86-based processor, housed in a chassis measuring 4.0- x 3.656- x 3.656-inches and available in multiple colors, including a chrome-plated chassis. ChromiumPC pricing will be announced later this year, with additional specifications announced at that time. General availability for the ChromiumPC is expected in the second half of 2011. General Availability of the Xi3 Modular Computer Slated for the 4th of July "Given today's announcement about our plans for the ChromiumPC, we felt it important to also let our friends know that formal sales of the Xi3 Modular Computer will begin on July 4, 2011," Sullivan said. "Since the Xi3 Computer Architecture allows owners of the Xi3 Modular Computer to declare their independence from the built-in obsolescence of other computers, we felt that American Independence Day would be a great day to begin selling the 5 Series model of the Xi3 Modular Computer." More details about the General Availability of the Xi3 Modular Computer (5 Series model) will be available before the 4th of July. About Xi3 Corporation Formed in 2010 and headquartered in Salt Lake City, Utah, Xi3 Corporation has brought a new type of computing to the world - modular computing - initially in the form of the Xi3 Modular Computer. For more information on Xi3 Corporation (an ISYS TechnologiesSM company), please visit Xi3 | Introducing Xi3 Architecture. About ISYS Technologies, Inc. Formed in 2002 and headquartered in Salt Lake City, Utah, ISYS Technologies is an intellectual property management company. {NOTE: The shape of the three-sided single piece casing, the end plate, and the overall shape of the Xi3 Modular Computer, as well as Xi3, ChromiumPC, Modular, Xi3 Modular, Processor Module, Primary I/O Module, and Secondary I/O Module are trademarks and unique trade dress of ISYS Technologies, Inc. ISYS and ISYS Technologies are service marks of ISYS Technologies, Inc. All other trademarks are the property of their respective owners.} Xi3 | Xi3 News
  5. ma incadrez?
  6. Fi8sVrs

    Agnito

    Agnito is a cool tool to help developers and security professionals conduct manual security code reviews in a consistent and repeatable way. It aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting. Here's the screenshot of Agnito in action Agnito is free tool created by Davidrook and it is released under GPL license. For more details visit Angnito home page @ sourceforge.net Download Link : Agnito v1.2 Source
  7. Today’s new stable release of Chrome brings improvements in security, privacy, and graphics to Chrome’s .Chrome is now more secure, thanks to enhancements to our Safe Browsing technology. In addition to protecting you from certain malware and phishing websites, Chrome now warns you before downloading some types of malicious files. We’ve carefully designed this feature so that malicious content can be detected without Chrome or Google ever having to know about the URLs you visit or the files you download. Chrome also now gives you more control over the data that websites store on your computer. This includes Flash Player’s Local Shared Objects (LSOs), which were previously only manageable using an online settings application on Adobe’s website. We’ve worked closely with Adobe to integrate Flash LSO deletion directly into Chrome, making it easier for you to manage your online privacy. Finally, Chrome’s graphics capabilities continue to improve. This release includes support for hardware-accelerated 3D CSS, which means you’ll get a snazzier experience in some web pages and web apps that choose to implement 3D effects. To see hardware-accelerated 3D CSS in action, check out this Chrome Experiment on Windows Vista / Mac OS X 10.6 or above, featuring clips from Aardman Studio's “Shaun the Sheep.” In this simple experiment, you can rotate the video, scale it up and down, toggle the reflection on and off, and activate a rotating carousel of videos. Of course, you can also just enjoy the animated antics of a few funny animals. As always, Chrome users will be automatically updated to this new version of Chrome in the coming days. As Chrome continues executing on its six-week release schedule, we’ve got many more improvements coming your way. Check back in a few weeks for our next beta channel release! Google Chrome Blog: A new stable release of Chrome: safer and snazzier
  8. We’ve been working on a bunch of features to make Twitter easier to use. Today, we’re releasing something that many of you have been asking for – automatic link shortening on Twitter.com. How does it work? Just paste a link of any length into the Tweet box on Twitter.com. After you’ve composed your Tweet and you hit the “Tweet” button, we’ll shorten the link so that it only takes up 19 characters. What’s in it for me? Sharing links on Twitter.com is now simple and instant. Plus, since we show a shortened version of the original link, people will know which site the link points to. This service also increases security. If users click links that are reported as malicious, we direct them to a page that warns them. What if I want analytics for my links? You can continue to use your favorite third-party link shortening services. Visit our support page if you want to learn more. Twitter Blog: Link sharing made simple
  9. Salesforce.com pays seven figure sum for Data.com domain name before it can be auctioned off. Salesforce.com has purchased the domain name Data.com from publicly traded media company UBM plc for an undisclosed price. The domain name was listed in this week’s Moniker auction with a reserve range between $ 1 million to $ 5 million. Usually when a domain name is taken out of auction early the buyer agrees to pay a premium above whatever the reserve price was. I think we can rest assured this was a seven figure sale. [update: After posting my story, Moniker issued a press release saying the domain name sold "for an amount that significantly exceeds the $ 1.5 million reserve."] Salesforce.com is no stranger to buying premium generic domain names, including buying Force.com in 2007. It has also been on the selling side. At least, its founder and CEO Marc Benioff has been on the sale side, selling Bill.com a few years ago. It’s possible that the domain name will be used in conjunction with Jigsaw, which Salesforce.com describes as “cloud-based data services”. Congrats to the Moniker/Oversee sales team on this huge sale. © DomainNameWire.com 2011. Get Certified Parking Stats at DNW Certified Stats. Source: itboxs.org
  10. Fi8sVrs

    370 links

    zl0ba.boom.ru vxchaos.6x.to freewebs.com/green-hell virusvn.com low-level.da.ru stopxaker.ru planetcreator.net mdk.iwarp.com mytoxic.20m.com groups.yahoo.com/group/SymbWarrior terabit.blogfa.com taz.newffr.com/TAZ/_VX_ pb.specialised.info/all/tapion freewebs.com/jlnh/makeyourownvirus.htm rfidvirus.org members.fortunecity.com/acid_knight/virii.html users.cjb.net/purplejumpers/virusestrojans.htm polymorphic11.tripod.com/viruses.htm vx.netlux.org/delphi psvx.co.cc malwaredomainlist.com msbasic.wordpress.com ciberia.ya.com/neodrako evilcry.netsons.org freewebs.com/pcgeeks metamodellers.com/software/epigrass epterritori.rg3.netdarkcryptor.altervista.org web.tiscalinet.it/dec_spiderman cryptovirology.com forum.hackforce.ru groups.yahoo.com/group/BLACK_SYMBIAN asm-forum.cjb.net asmatiks.wordpress.com rigacci.org/comp/virus vx.netlux.org malwaredomains.com item9.org underc0ver.com insilence.biz k0de.org ddoser.info blog.botnet.biz sharplabs.wordpress.com icarusrat.wordpress.com ss-rat.blogspot.com pingmafia.com cybershade.org anti-sec.com hackhound.org hackforums.net hacksecu.com malwarereview.com enigmagroup.org level-23.com secret-zone.net tr0jan.net/blog/ avtracker.info advancevb.com.ar cigicigi.gen.tr/anasayfa/ indetectables.net hackaday.com hackthissite.org darkc0de.com darkode.com astalavista.com h4x4u.net76.net crazycoders.com offensivecomputing.net indianhackers.ning.com elite-programmers.com opensc.ws carder.biz hackingnation.com rohitab Exploit.IN codershop.eu malwares-in.net hackingnation.org hostbooter.com zone-hacker.net dark-sc.com h7labs.org naqzo.com carder.su hack-tech.com cyberterrorists.net pakhaxors.com alboraaq.com gothack.net rstcenter.com insecurity.ro cyber-sec.org se.curity.org blacksecurity.org darkcomet-rat.com packetstormsecurity.org the-everythingsite.com mpgh.net damagelab.org zloy.bz zloy.biz web-hack.ru nuclearwintercrew.com zonartm.org securityhome.eu securityvulns.com hack0wn.com inj3ct0r.net inj3ct0r.com nullbyte.org.il inj3ct0r.org morningstarsecurity.com professional-hacker.org sibirity.com md5this.com waraxe.us infosec.org.uk portswigger.net seclists.org nmap.org ihteam.net milw0rm.com heapoverflow.com securityfocus.com learnsecurityonline.com metasploit.com vupen.com full-tr.com coresecurity.com securitytracker.com securityspace.com securityreason.com evilaliv3.org scan4you.biz hackingspirits.com coffeeandsecurity.com h4cky0u.org cih.ms globalhackers.blogspot.com insecure.tk obscurant1st.blogspot.com governmentsecurity.org illmob.org securityh4x.blogspot.com mybazaar.biz hackpedia.info ph4nt0m.org 80sec.com 80vul.com blackhathacking.com computerforensics.parsonage.co.uk leetcoders.org anubis.iseclab.org viruschief.com virscan.org scanner.virus.org filterbit.com wab.ru virtest avcheck.ru avcheck.biz virustotal.com lostdoor.cn virusscan.jotti.org foro.latinohack.com underground.org.mx skamasle.com novirusthanks.org seguridadblanca.org comunidadraw.com sswteam.wordpress.com tecnohacker.com b4ckdoor.wordpress.com hackxcrack.es podzemlje.net trojansakla.net 1x33x7.forum2x2.ru progenic.com x1machine.com hackfind.com poisonivy-rat.com ddbot.x0r.su gh0stmarket.net security-shell.ws uNkn0wn.eu viotto-security.net blackhatworld.com blackhatmoneymaker.com seoblackhat.com blackhatseo.com blackhat-forums.com fuckav.ru h7labs.wordpress.com crimenetwork.biz vxx9.cc owned-m.com zone-h.org sharp-team.org digitalmunition.com foro.elhacker.net subreption.com ghc.ru rst.ghc.ru diablohorn.wordpress.com xatrix.org leetupload.com smashthestack.org hakin9.org helith.net googlebig.com milw0rm.biz insanesecurity.info 77169.com insecure.ro undersecurity.net black-zero.com h4xxor.blogspot.com ciscozine.com insecure.in itsolutionskb.com blacknite.eu hackingstuff4u.blogspot.com maycon.hacknroll.com jbrownsec.blogspot.com bbs.isbase.net zeroidentity.org evilsocket.net mrcracker.com hackersblog.org trythis0ne.com megapanzer.com novusec.com gohacking.com forum.intern0t.net shell-storm.org hakim.ws krakowlabs.com synsecurity.net unremote.org ethicalmafia.blogspot.com devilteam.pl backd0or.wordpress.com narrowfail.blogspot.com mymegafiles.com chinesehonker.org forum-hacker.com.br pay-per-install.org digitalgangster.com prohack.in kurd-security.com/h4kurd pawelzorzan.eu techmantras.com secgeeks.com atlantiq.pl destr0y.net theuntraceable.com blackmarket.mn freewebs.com/kill3rrag3/index.htm hackerscenter.com tippingpoint.com hackingrafica.forumcommunity.net ic0de.org localroot.net jatimcrew.net roothack.org carpetboy.securibox.net fullyundetected.com nodereality.com securibox.net bottalk.us SpiralForce.eu xaknet.ru mhs.blog.ui.ac.id vulns.ru securitynewsportal.com blackhack.ru the0.co.cc secnull.org attacker.securecrash.org/shellz zero-hack.com xeka.ru hack-team.info inattack.ru k0d.cc grabberz.com defeated.ru antichat.ru gfs-team.ru exit31.forumotion.com pro-hack.ru aventgrup.net ru24-team.net soqor.org revengehack.com sa3eka.com Security-Arge.com pakbugs.com users.freenet.am/~zombie evilzone.org exploit-db.com 3asfh.net fkn0wned.com houseofhackers.ning.com secnull.info criticalsecurity.net hellknights.void.ru hack3r.com turkishajan.com dual5651.hacktizen.com/new/ xp10.me kmasecurity.net/xforce/ masterhack.com izocin.com shellshop.hit.bg vbhacker.net joomlaexploit.com atlantislover.blogspot.com security-teams.net verified.ru maza.la paycash.cc prologic.su hack-info.ru chasenet.org culturahack.com.ar mk-eleet.org thestampdown.com anatoxis-tools.net twinkle-crypt.6x.to northfox.tk northfox.dyn.hu northfox.uw.hu hackers.ath.cx ntsecurity.nu securesphere.net eccouncil.org ughabi.blogspot.com heaventeam.ru backd00red.org cybergrup.org happyhacker.org hackmeout.net sec-t.net hakerstvo.informe.com techbroker.com googlehackings.blogspot.com networksecurityjournal.com hackingalert.com sql-injection-tools.blogspot.com xssed.com cyber-ta.org technoguru.forumotion.com swerat.com secdev.org michaeldaw.org nicenamecrew.com malwareforensics.com malwareurl.com csrrt.org anti-malware-test.com hackbase.cc h4ckforu.com nvlabs.in argeniss.com bytehero.com ddanchev.blogspot.com cassandrasecurity.com d2sec.com h-online.com pentestit.com
      • 1
      • Upvote
  11. German police hold 11 after Facebook party invite goes awry Hamburg - Some 1,600 people turned up at a 16th birthday party in northern Germany after a girl accidentally posted invitations on Facebook and neglected to mark them as 'private,' police in Hamburg said Saturday. Thessa put details of her party at her parents' home in Hamburg-Bramfeld on the social networking site. The Friday night party began peacefully enough, but as the hours went by, partygoers became increasingly inebriated in the street outside the family home and a conflict with the police erupted. 'Thessa, O, Tessa, we don't know you, but it doesn't matter, we're going to get drunk as we mark your birthday,' they sang, holding up banners reading 'We love you Thessa.' The partygoers then set refuse containers alight, burnt down a garden shed and trashed parked cars. 'Stones, bottles and fireworks were thrown. Guests wrecked front gardens, trampling fences,' a police spokesman said. One officer was slightly hurt while 11 youngsters were detained. Thessa's parents had cancelled the party and employed a private security firm. Police put up riot barriers and deployed 100 officers, including some on horseback, in an unsuccessful attempt to maintain order. But Happy Birthday to You was sung at midnight, and it was not before 2 am before the unwanted celebrations came to an end. Thessa was reported to have found refuge with her grandparents during the party. Video Source
  12. e compatibil cu Yahoo Messenger ? se pot trimite fisiere?
  13. Fãrã bãnci!
  14. As the industry’s first social writing application, InboundWriter delivers access to real-time social intelligence as to what your audience is reading, sharing and discussing online during the content creation process. Free Sign Up With InboundWriter, you can easily discover what interests your target audience today by exploring what words they are using when searching for content or while sharing content via social media. Just provide InboundWriter with a few words and websites that relate to the topic you are writing about. InboundWriter then scours major search engines, popular social media sites and specified competitive websites to determine words and phrases directly relevant to your topic of choice. Based on this real-time research, InboundWriter recommends the best words that will increase your content popularity and competitiveness for each specified topic. The current popularity of the recommended keywords, as determined by search or share volume, is presented in real-time to help guide your content strategy. To help you in your quest to reach more readers, InboundWriter also provides you with specific guidance on which words and phrases to use to improve content popularity, as well as how to best structure your online content for maximum visibility. The Interactive Editor lets you experiment with different words and writing strategies and observe in real-time how your content score changes based on your word choices, content structure and other criteria. InboundWriter enables you to write compelling content to engage today’s social audience – and let you do so securely from any browser
  15. We all love high-tech gadgets, spy movies, robots, wifi, espionage and the Spykee Spy Robot gives us all of that and much more. Spykee was designed to be a transformer of sorts doing many things; providing home surveillance, internet phone via his voice-over IP function, MP3 player and of course the playful fun of a robot. Spykee can be assembled in three different forms: a moon vehicle, a robot, or a scorpion and can be controlled from anywhere in the world if connected to a wireless LAN router. Yes, that means when your on vacation you can see what’s going on in your house and you can still control the Spykee, just in case you want to have some fun with the house sitter! Spykee will not only provide hours of robot controlled fun, but it it also recharge itself when the time comes. You don’t need to worry about him, he’s here to watch over you! Spykee Functions: Photo/Video: Spykee takes pictures and records video VOIP Phone: Spykee lets you make free calls on the internet with the VOIP Phone Function Monitoring/Video Surveillance: Monitors & protects your room from intruders with his video surveillance fucntion, detects movement & sands you a picture of the intruder by email MP3 Reader: Listen to your own MP3 music Lighting effects: Spykee lights up with its fiber optics and flash lighting Video Filters: 8 filters are available to personalize your videos Sound Effects: Spykee has 6 sounds effects and you can also add your own such as your own voice! Auto recharge: Spykee automatically returns to his dock when his battery is low System requirements: PC and MAC compatible; 512 MB RAM, 100 MB available memory; wireless LAN: 802.11b, 802.11g or 802.11n; upload min. 512 Kbps; download min. 2 Mbps; Acrobat Reader Product Dimensions: 8.1? x 13? x 8.7? Weighs: 1.1 pounds There is just too much information to list about this Meccano Spykee Surveillance Spy Robot. Read all about it at Spykeeworld.com and you can purchase it from proidee.co.uk for £199.00 and from amazon.com for $399.95.
  16. The last article on this blog described our planned MySQL to MongoDB replication hackathon at the recent Open DB Camp in Sardinia. Well, it worked, and the code is now checked into the Tungsten Replicator project. This article describes exactly what we did to write the code and set up replication. You can view it as a kind of cookbook both for implementing new database types in Tungsten as well as setting up replication to MongoDB. The Team MySQL to MongoDB replication was a group effort with three people: Flavio Percoco, Stephane Giron, and me. Flavio has worked on MongoDB for a couple of years and is extremely well-informed both on database setup as well as application design. Stephane Giron is a replication engineer at Continuent and has done a substantial amount of the work on data extraction from MySQL, especially row replication. I work on the core execution framework as well as performance. Getting Started with MongoDB There were a couple of talks on MongoDB during the first morning of Open DB camp (Saturday May 7th), which Stephane and I dutifully attended to raise our consciousness. We got cracking on implementation around 2pm that afternoon. The first step was to bring up MongoDB 1.8.1 and study its habits with help from Flavio. MongoDB is definitely easy to set up. You get binary builds from the MongoDB download page. Here is a minimal set of commands to unpack MongoDB 1.8.1 and start the mongod using directory data to hold tables. $ tar -xvzf mongodb-osx-x86_64-1.8.1.tgz $ cd mongodb-osx-x86_64-1.8.1 $ mkdir data $ bin/mongo --dbpath data (... messages ...) You connect to mongod using the mongo client. Here's an example of connecting and creating a table with a single row. This is schema-less programming in action. You just insert BSON documents (BSON = Binary JSON) into collections, which is Mongolese for tables. MongoDB creates the collection for you as soon as you put something in it. The automatic materialization is quite addictive once you get used to it, which takes about 5 minutes. The MongoDB client language is really handy. It is based on JavaScript. There are what seem to be some non-Javascript commands like "show dbs" to show databases or "show collections" to list the tables. Everything else is object-oriented and easy to understand. For example, to find all the records in collection test, as we saw above, you just connect to the database and issue a command on the local db object. Collections appear as properties of db, and operations on the collection are methods. It helps that the MongoDB folks provide very accessible documentation, for example a SQL to MongoDB translation chart. I put together a little practice program using the MongoDB Java driver to insert, referring to the Javadoc for the class library when in doubt about API calls. There are also a couple of very helpful examples, like this one, included with the driver. All told, setup and orientation took us about 45 minutes. It helped enormously that Flavio is a MongoDB expert, which minimized flail considerably. Implementing Basic Replication from MySQL to MongoDB After setup we proceeded to implement replication. Here is an overview of the replicator pipeline to move data from MySQL to MongoDB. Pipelines are message processing flows within the replicator. Direct pipelines move data from DBMS to another within a single replicator. They are already a standard part of Tungsten Replicator and most of the code shown above already exists, except for the parts shown in red. Before we started, we therefore needed to set up a replicator with a direct pipeline. We first built the code according to the instructions on the Tungsten project wiki, uploaded the binary to our test host, and configured the replicator. First, we ran the Tungsten configure script to set defaults for the MySQL server (user name, extract method, etc.). Next we ran the configure-service command to set up the direct pipeline configuration file. Both commands together look like the following: ./configure ./configure-service -C --role=direct mongodb The second command created a file called tungsten-replicator/conf/static-mongodb.properties with all the information about the direct pipeline implementation but of course nothing yet about MongoDB. Now we could start the implementation. To move data to MongoDB, we needed two new components: A Tungsten RawApplier to apply row updates to MongoDB. RawApplier is the basic interface you implement to create an applier to a database. A Tungsten Filter to stick column names on row updates after extracting from MySQL. MySQL row replication does not do this automatically, which makes it difficult to construct JSON at the other end because you do not have the right property names. To get started on the applier I implemented a very simple class named MongoApplier that could take an insert from MySQL, turn it into a BSON document, and add it to an equivalently named database and collection in MongoDB. I added this to the replicator code tree, then built and uploaded tungsten-replicator.jar. (Use 'ant dist' in the replicator directory to build the JAR.) To start using the new MongoDB applier, we needed to edit the service properties file to use this component instead of the standard MySQL applier that configuration adds by default. To do this, you can open up static-mongodb.properties with your favorite editor. Add the following properties at the bottom of the APPLIERS section. Next, you need to fix up the direct pipeline so that the last stage uses the new applier. We located the direct pipeline definition (around line 208 in the properties file) and set the applier to mongodb as shown in the following example. We then started the replicator using 'replicator start.' At that point we could do the following on MySQL: mysql> create table foo(id int primary key, msg varchar(35)); Query OK, 0 rows affected (0.05 sec) mysql> insert into foo values(1, 'hello from MySQL!'); Query OK, 1 row affected (0.00 sec) ...And within a second we could see the following over in MongoDB: This kind of progress was very encouraging. It took roughly 2 hours to get to move the first inserts across. Compared to replicating to a new SQL database like Oracle that's lightning fast. However, there were still no property names because we were not adding column names to row updates. Meanwhile, Stephane had finished the column name filter (ColumnNameFilter) and checked it in. I rebuilt and refreshed the replicator code, then edited static-mongodb.properties as follows to add the filter. First put in the filter definition in the FILTERS section: Next, make the first stage of the direct pipeline use the filter: We then restarted the replicator. Thereupon, we started to see inserts like the following, complete with property names: That was better, much better! To this point we had put in exactly 2 hours and 45 minutes wall clock time. It was enough to prove the point and more than enough for a demo the next day. The hackathon was a rousing success. Further Development Over the next couple of days I rounded out the MongoApplier to add support for UPDATE and DELETE operations, as well as to implement restart. The full implementation is now checked in on code.google.com, so you can repeat our experiences by downloading code and building yourself or by grabbing one of the Tungsten nightly builds. Restart is an interesting topic. Tungsten uses a table to store the sequence number of the last transaction it applied. We do this by creating an equivalent collection in MongoDB, which is updated after each commit. There is a problem in that MongoDB does not have transactions. Each update is effectively auto-commit, much like MyISAM table type on MySQL. This means that while Tungsten can restart properly after a clean shutdown, slave replication is not crash safe. Lack of atomic transactions is a bigger issue with MongoDB and other NoSQL databases that goes far beyond replication. For now, this is just how Tungsten's MongoDB support works. Speaking of things that don't work, the current implementation is a prototype only. We have not tested it with more than a few data types. It only works with a single MongoDB daemon. It does not set keys properly or specify indexes on tables. There are no guarantees about performance, except to say that if you had more than a small amount of data it would be quite slow. (OK, that's a guarantee after all.) Epilog Overall all the hackathon was a great success, not to mention lots of fun. It went especially well because we had a relatively small problem and three people (Stephane, Flavio, and Robert) with complementary skills that we could combine easily for a quick solution. That seems to be a recipe for succeeding on future hackathons. From a technical point of view, it helped that MongoDB is schema-less. Unlike SQL databases, just adding a document materializes the table in MongoDB. This made our applier implementation almost trivially easy, because processing row updates takes only a few dozen lines of Java code in total. It also explains why a lot of people are quite attached to the NoSQL programming model. I am looking forward to learning a lot more about MongoDB and other NoSQL databases. It would take two or three weeks of work to get our prototype to work with real applications. Also, it looks as if we can implement replication going from MongoDB to MySQL. According to Flavio there is a way to search the transaction log of MongoDB as a regular collection. By appropriately transforming BSON objects back to SQL tuples, we can offer replication back to MySQL. There are many other lessons about MongoDB and NoSQL in general but it seems best to leave them for a future article when I have more experience and actually know what I'm talking about. Meanwhile, you are welcome to try out our newest Tungsten replication feature. Source: scale-out-blog.blogspot.com
  17. ...The concept of paying users to watch advertisements is nothing new and is not generally seen in a favourable light. Paying users in this way has not demonstrated any real increase in uptake from users and, very often, is favoured only by users that would otherwise be extremely unlikely to purchase the products advertised anyway. Critics of these schemes cite lazy marketing and suggest that advertising should be innovative and attention-grabbing and shouldn't need to involve a financial reward just for watching. ... Facebook now effectively paying users 10 cents to watch certain ads - by Philip Lop - Helium
  18. Transporter 1 [soundtrack] 1. Boogie 2Nite - Tweet 2. I Got Love - Nate Dogg 3. Live Big (Remix) - Sacario 4. Rock The Party - Benzino 5. Muzik - Knoc-Turn'al 6. If I Could Go - Angie Martinez 7. Be Alright - Tamia 8. Scream AKA Itchin' - Missy Elliott 9. Funny - Gerald Levert 10. I'm Cool - Hustlechild 11. One On One - Keith Sweat 12. Life Of A Stranger - Nadia
  19. Scala is one of the hottest new programming languages of the past few years. It's in use at companies like Foursquare and Twitter, and The Guardian is working on porting some of its Java code to Scala. Here are a few books and tutorials to get you started. Programming in Scala Programming in Scala by Martin Odersky (the creator of Scala), Lex Spoon and Bill Venners is the definitive guide to Scala. The first edition is available online for free, and the second edition can be purchased here. Also, A Scala Tutorial for Java Programmers by Michel Schinz and Philipp Haller is a 15 page PDF tutorial introducing Scala from the official Scala website. Scala by Example by Odersky is a 137 page PDF that goes into deeper detail than the short tutorial. It's marked as a "draft," so don't expect anything too polished. Programming Scala Programming Scala by Alex Payne and Dean Wampler is part of the O'Reilly Media Open Feedback Publishing System. Drafts of books are released online in full to solicit feedback from the community. The print edition is now for sale. Programming Scala is aimed at experienced programmers, but not necessarily Java programmers. The busy Java developer's guide to Scala A Scala Tutorial for Java Programmers is a 16 part tutorial by Ted Neward on the IBM developerWorks website. Neward starts by introducing functional programming concepts for developers used to objects oriented programming and works up to building a framework for a client library for accessing Twitter. Scala for Java Refugees Scala for Java Refugees by Daniel Spiewak is a six part series. Spiewak introduces the basics of Scala, then moves into using Scala for OOP. A Video Tutorial on Scala For those that would prefer a video tutorial, YouTube user ShadowofCatron has posted a series of Scala tutorials introducing the language, functional programming concepts, etc. Part one is embedded above. 5 Free E-Books and Tutorials on Scala
  20. FBI warning replaces three of largest poker sites in probe that could end online gambling Three of the largest online poker sites have been taken over by the FBI in a probe that could bring about the death of the internet gambling industry. The websites of Full Title Poker, Absolute Poker and PokerStars have all been shut down and replaced with warning messages after the owners were charged with bank fraud and money laundering. The messages explain that ‘this domain name has been seized by the F.B.I. pursuant to an Arrest Warrant.’ In 2006, Congress passed a law prohibiting online gambling, but most of the leading sites found ways to work around the law using foreign banks. Prosecutors allege that in doing so they broke the law. FBI assistant director Janice Fedarcyk said: ‘These defendants, knowing full well that their business with U.S. customers and U.S. banks was illegal, tried to stack the deck. ‘They lied to banks about the true nature of their business. Then, some of the defendants found banks willing to flout the law for a fee. ‘The defendants bet the house that they could continue their scheme, and they lost.’ According to the indictment, the companies arranged for money received from U.S. gamblers to be disguised as payments to non-existent websites purporting to sell merchandise such as jewellery and golf balls. The indictment said the poker companies tricked U.S. banks into processing billions of dollars but some banks were conspirators in the scheme to bypass U.S. laws that make it illegal to handle gambling proceeds. Banned: Congress passed a law prohibiting online gambling in 2006, but most of the leading sites found ways to work around the law using foreign banks The latest crackdown could finally bring the end of the online gambling industry, which has taken off over the last decade, drawing an estimated 15 million Americans to bet online. Three of the 11 executives were arrested on Friday morning in Las Vegas and Utah. Officers are searching for the others, who are all understood to be abroad. The indictment, filed in New York, seeks $3 billion in money laundering penalties and forfeiture from the defendants. In addition to the charges, restraining orders were issued against 76 bank accounts in 14 countries used by the poker firms and their payment processors. Five Internet domain names used by the companies to host their games were also seized by the authorities, who filed a complaint seeking $3 billion in money laundering penalties and forfeiture from the poker companies. Shutdown: According to the prosecutor, the companies arranged for money to be disguised as payments to non-existent websites Prosecutor Preet Bharara said: ‘These defendants concocted an elaborate criminal fraud scheme, alternately tricking some U.S. banks and effectively bribing others to assure the continued flow of billions in illegal gambling profits.’ Among those arrested was John Campos, the part owner of SunFirst Bank, a small private bank in Saint George, Utah, who agreed to process online poker transactions. U.S. authorities are seeking the assistance of Interpol and foreign law enforcement to apprehend the eight men who are currently abroad. Three of the defendants are Canadians. One of them, Isai Scheinberg, 64, the founder of PokerStars, who has dual Israeli-Canadian citizenship and lives in the Isle of Man. Read more: Poker websites shut down by FBI in probe that could end online gambling | Mail Online
  21. http://out.com/exclusives.asp?id=2726709
  22. Fi8sVrs

    Posturi duble

    Chrome iar pe butonul "Edit" tre` sa dau dublu click
×
×
  • Create New...