A wealth of opinion, unsubstantiated data and rumour surrounds the Peer-to-Peer filesharing networks. CacheLogic has amassed a wealth of real-world data from the constant surveying of the leading filesharing networks. This presentation contains a summary of the findings.
Thursday, September 30, 2004
CacheLogic - P2P Traffic Analysis
A wealth of opinion, unsubstantiated data and rumour surrounds the Peer-to-Peer filesharing networks. CacheLogic has amassed a wealth of real-world data from the constant surveying of the leading filesharing networks. This presentation contains a summary of the findings.
A wealth of opinion, unsubstantiated data and rumour surrounds the Peer-to-Peer filesharing networks. CacheLogic has amassed a wealth of real-world data from the constant surveying of the leading filesharing networks. This presentation contains a summary of the findings.
Tuesday, September 28, 2004
IP-to-Country.com | 'Cause every I.P has a Home...
You can think of the IP-to-Country Database as the Internet’s telephone directory. It gives you information on the geographical location of an IP address based on Internet infrastructure information.
You can think of the IP-to-Country Database as the Internet’s telephone directory. It gives you information on the geographical location of an IP address based on Internet infrastructure information.
Saturday, September 25, 2004
MacDevCenter.com: Wireless Security and the Open1X Project
Open1X is an open-source project focusing on network security. The wireless adoption of this technology is referred to as 802.1X. In this interview, Matthew Gast travels to the University of Utah to talk to Chris Hessing and Terry Simons, who are intent on bringing standards-based wireless security to Linux, Mac OS X, and Windows clients.
Open1X is an open-source project focusing on network security. The wireless adoption of this technology is referred to as 802.1X. In this interview, Matthew Gast travels to the University of Utah to talk to Chris Hessing and Terry Simons, who are intent on bringing standards-based wireless security to Linux, Mac OS X, and Windows clients.
ONLamp.com: VPNs and Public Key Infrastructure
The virtual private network (VPN) is increasingly becoming an invaluable part of every business network. With broadband available in more and more places, small- and medium-size businesses are taking advantage of VPN technology...
The virtual private network (VPN) is increasingly becoming an invaluable part of every business network. With broadband available in more and more places, small- and medium-size businesses are taking advantage of VPN technology...
Friday, September 24, 2004
TCQ, RAID, SCSI, and SATA
Not to be confused with operating-system reordering and optimization, tagged command queuing is a hardware-level process designed to streamline the delivery of data in highly-random accesses under heavy loads. Without TCQ, a drive can only accept a single command at a time. It thus operates on a first-come, first-serve...
Not to be confused with operating-system reordering and optimization, tagged command queuing is a hardware-level process designed to streamline the delivery of data in highly-random accesses under heavy loads. Without TCQ, a drive can only accept a single command at a time. It thus operates on a first-come, first-serve...
Wednesday, September 22, 2004
Brad Fitzpatrick: Inside LiveJournal's Backend
Brad Fitzpatrick presented at OSCON with on overview of his little project. Interesting facts about the evolution of the Livejournal back-end architecture.
Brad Fitzpatrick presented at OSCON with on overview of his little project. Interesting facts about the evolution of the Livejournal back-end architecture.
ACM Queue - You Don't Know Jack about Disks - The geometric programming model that coincided with the physical organization of data posed several challenges for the programmer.
Magnetic disk drives have been at the heart of computer systems since the early 1960s. They brought not only a significant advantage in processing performance, but also a new level of complexity for programmers. The three-dimensional geometry of a disk drive replaced the simple, linear, address spacetape-based programming model.
Magnetic disk drives have been at the heart of computer systems since the early 1960s. They brought not only a significant advantage in processing performance, but also a new level of complexity for programmers. The three-dimensional geometry of a disk drive replaced the simple, linear, address spacetape-based programming model.
ACM Queue - You Don't Know Jack About VoIP - The Communications they are a-changin'.
Phil Sherburne and Cary Fitzgerald, two senior technologists over at Cisco, have written an in-depth overview of VoIP for developers and the like (not for everyone who's ever used a phone). Like Queue's earlier You Don't Know Jack about Disks, this article covers the history, the basic technologies, how they work, and where they're headed. If you found the blog post yesterday lacking, check this one out.
Phil Sherburne and Cary Fitzgerald, two senior technologists over at Cisco, have written an in-depth overview of VoIP for developers and the like (not for everyone who's ever used a phone). Like Queue's earlier You Don't Know Jack about Disks, this article covers the history, the basic technologies, how they work, and where they're headed. If you found the blog post yesterday lacking, check this one out.
Tuesday, September 21, 2004
FreeBSD 5.3-BETA Migration Guide
This article describes major differences between FreeBSD 4.X and FreeBSD 5.3-RELEASE, from the viewpoint of a user or administrator upgrading an existing system. It provides a brief overview of FreeBSD release engineering. It then describes some of the new features in FreeBSD 5.X...
This article describes major differences between FreeBSD 4.X and FreeBSD 5.3-RELEASE, from the viewpoint of a user or administrator upgrading an existing system. It provides a brief overview of FreeBSD release engineering. It then describes some of the new features in FreeBSD 5.X...
Monday, September 20, 2004
UI Patterns and Techniques: Introduction
If you've done any Web or UI design, or even thought about it much, you should say, "Oh, right, I know what that is" to most of these patterns. But a few of them might be new to you, and some of the familiar ones may not be part of your usual design repertoire.
If you've done any Web or UI design, or even thought about it much, you should say, "Oh, right, I know what that is" to most of these patterns. But a few of them might be new to you, and some of the familiar ones may not be part of your usual design repertoire.
Saturday, September 18, 2004
A visual history of spam (and virus) email
Microsoft employee Raymond Chen has saved every spam message and virus-laden e-mail he's received at work since 1997 and graphed the spams and viruses to create a cool visual representation of one man's malicious traffic.
Microsoft employee Raymond Chen has saved every spam message and virus-laden e-mail he's received at work since 1997 and graphed the spams and viruses to create a cool visual representation of one man's malicious traffic.
Friday, September 10, 2004
ONLamp.com: What's New in SpamAssassin 3.0
Many system administrators rely on SpamAssassin as part of their spam filtering strategy. Its combination of static rules for recognizing spam and its ability to adaptively learn the characteristics of spam and spammers make it appealing in many environments.
Many system administrators rely on SpamAssassin as part of their spam filtering strategy. Its combination of static rules for recognizing spam and its ability to adaptively learn the characteristics of spam and spammers make it appealing in many environments.
TESTVIRUS.org - Test your email server's virus protection
This web site allows you to send a harmless test virus to any email address. If your mail server or email hosting provider is running anti-virus software, these emails should get blocked.
This web site allows you to send a harmless test virus to any email address. If your mail server or email hosting provider is running anti-virus software, these emails should get blocked.
The Spread of the Sapphire/Slammer Worm
The Sapphire Worm was the fastest computer worm in history. As it began spreading throughout the Internet, it doubled in size every 8.5 seconds. It infected more than 90 percent of vulnerable hosts within 10 minutes.
The Sapphire Worm was the fastest computer worm in history. As it began spreading throughout the Internet, it doubled in size every 8.5 seconds. It infected more than 90 percent of vulnerable hosts within 10 minutes.
Thursday, September 09, 2004
Web Style Guide, 2nd Edition
AS IS THE CASE WITH MANY innovations, the Web has gone through a period of extremes. At its inception, the Web was all about information. Visual design was accidental at best. Web pages were clumsily assembled, and "sites" were accumulations of hyperlinked documents lacking structure or coherence. Designers then took over and crafted attractive, idiosyncratic, and often baffling containers for information. The Web became a better-looking place, but many users hit up against barriers of large graphics, complex layouts, and nonstandard coding. Every site was different, and each required users to relearn how to use the Web, because "real" designers could not be bound by standards or conventions. Instead, designers pushed the boundaries of HTML, using workarounds, kludges, and sleight of hand to design on the cutting edge.
AS IS THE CASE WITH MANY innovations, the Web has gone through a period of extremes. At its inception, the Web was all about information. Visual design was accidental at best. Web pages were clumsily assembled, and "sites" were accumulations of hyperlinked documents lacking structure or coherence. Designers then took over and crafted attractive, idiosyncratic, and often baffling containers for information. The Web became a better-looking place, but many users hit up against barriers of large graphics, complex layouts, and nonstandard coding. Every site was different, and each required users to relearn how to use the Web, because "real" designers could not be bound by standards or conventions. Instead, designers pushed the boundaries of HTML, using workarounds, kludges, and sleight of hand to design on the cutting edge.