concealment writes: "The company guards its search platform like the crown jewels. It’s not about to release a paper describing how it all works, so producing an open source clone is more difficult. But there are options, and the push toward open source versions of the Google search engine has gathered some steam in recent months, with the arrival of a new company called ElasticSearch.
These projects aren’t trying to compete with Google’s public search engine — the one you use every day. They’re trying to compete with Google’s search appliance and other products that help enterprises — i.e., big businesses — find stuff inside their own private networks."
concealment writes: "For three years, a group of hackers from China waged a relentless campaign of cyber harassment against Solid Oak Software Inc., Milburn’s family-owned, eight-person firm in Santa Barbara, California. The attack began less than two weeks after Milburn publicly accused China of appropriating his company’s parental filtering software, CYBERsitter, for a national Internet censoring project. And it ended shortly after he settled a $2.2 billion lawsuit against the Chinese government and a string of computer companies last April."
concealment writes: "AT&T screwed up in 2010, serving up the e-mail addresses of over 110,000 of its iPad 3G customers online for anyone to find. But today Andrew Auernheimer, an online activist who pointed out AT&T’s blunder to Gawker Media, which went on to publicize the breach of private information, is the one in federal court this week.
Groups like the Electronic Frontier Foundation (EFF) worry that should that charge succeed it will become easy to criminalize many online activities, including work by well-intentioned activists looking for leaks of private information or other online security holes. Weev’s case hasn’t received much attention so far, but should he be found guilty this week it will likely become well known, fast."
concealment writes: "Walmart will use you location to provide you with an app designed specifically for that store. Head to another Walmart and your app will work for that store. It has useful features: You can make a list by speaking into the phone. You can search a product by typing in a name — tissues, say, or light bulbs — and the app will show you what aisle to go to. It has an interactive map. It lets you scan items as you shop, so you can go quickly through self-checkout. And it shows you promotions specific to that store.
Perhaps most importantly, the app lets you easily buy an item online that you don't find in the store. So if you're shopping for a pink bike, and the store you're in only has it in blue, you can tap on the app and instantly order the pink bike.
The result: Two weeks after Walmart launched "in-store mode" with its app, roughly 60 percent of its shoppers opted to use it. Moreover, about 12 percent of Walmart's online sales are now coming from customers who are inside a store and using "in-store mode." All of Walmart's 4,000 U.S. stores have an "in-store app.""
concealment writes: "Hadoop is not like other efforts to commercialize open source in some important ways. In addition, is arriving at a time in which some of the traditional advantages of open source-based business models have eroded because of cloud computing and other developments.
Most people think of Hadoop as pioneering technology that is being developed through an open source ecosystem. But if we take a closer look at Hadoop’s origins and the current structure of its community, it quickly becomes clear that Hadoop is not following the footsteps of other projects like Linux, Drupal, Alfresco, or JBoss. Hadoop started out differently and has evolved into a structure that is much different than any other project that is so prominent."
concealment writes: "I recently started studying a company called Gnodal, which creates a new kind of Ethernet-based, ASIC-accelerated switch that can dynamically optimize the flow of network traffic. Learning about this technology has convinced me that more and more companies are going to face a large bump in the road as their infrastructure becomes more virtual.
Remember, no matter what, at some point, all computing becomes physical. For anything to happen, at some point, a CPU has to load instructions and process data. That data has to arrive at the computer containing the CPU, be processed, and then be sent somewhere, often to another computer. A physical network that connects many computers together must come into play. It is in the switching layer that the bump in the road will appear as the world becomes more virtual."
concealment writes: ""I was reading an article about how 75 percent of MySQL developers work from home and I found that interesting. IBM also has huge amount of people who work from home. It made me realize that it was a possibility and I did my research," says Perlman.
After doing his research, Perlman gathered all his employees and hashed out a plan where every employee would work remotely for a month. In that month, they identified tools for communicating and collaborating as well as identified problems that they needed to deal with. The experience made Perlman decide to move his entire operation out of a traditional brick and mortar office and into remote offices."