Happened from 2015-08-09 to 2015-08-16

The state of cloud computing: 10 things you need to know

By Conner Forrest on 2015-08-10

Cloud computing has grown from a novel concept to the go-to model for many organizations. Here's what you need to know about the cloud industry.

Original post

OpenStack is overkill for Docker

By Matt Asay on 2015-08-10

New tooling is necessary for effectively managing Docker at scale. Matt Asay explains.

Original post

#NoHacked: Using two-factor authentication to protect your site

By Google Webmaster Central (noreply@blogger.com) on 2015-08-10

Today in our #nohacked campaign, we’ll be talking about two-factor authentication. Follow along with discussions on Twitter and Google+ using the #NoHacked tag. (Part 1, Part 2)

There was once a time when having a relatively strong password or answering a security question was a reasonable way to protect your online accounts. However, according to a study from Stop Badware, stolen credentials is a common way for hackers to compromise websites. Additionally, even reputable sites can fall victim to hacking, potentially exposing your personal data like passwords to attackers.

Fortunately, two-factor authentication can help you keep your accounts safer. Two-factor authentication relies on an additional source of verification, in conjunction with your password, to access your account. You might have used two-factor authentication before if you have ever been prompted for a code from your phone when logging into a social media site or from a chip card reader when logging into a bank account. Two-factor authentication makes it more difficult for someone to log into your account even if they have stolen your password.

As a website owner, you should enable two-factor authentication on your accounts where possible. A compromised account can cause you to lose important personal data and valuable reputation for your site. Two-factor authentication can give you the ease of mind that your accounts and data are safer. 

Original post

Windows 10 on the Raspberry Pi: What you need to know

By Nick Heath on 2015-08-11

Microsoft has released a version of Windows 10 for the credit card-sized machine. But just what can you do with it?

Original post

Track refactored code across files with Plastic SCM

By pablo (noreply@blogger.com) on 2015-08-11

differences, refactor, semanticmerge

You refactor some code before doing a bug fix, you clean it up to better understand how it works, and leave the code in a better status than you found it, in purest boy-scout style :P.

Then you move methods to a new class in a new file. And later make some modifications to the moved methods. Easy, uh?

Well, Plastic SCM can now track the refactor and diff it correctly, because we have just implemented multi-file semantic diff or "analyze refactors":

This is another step forward towards semantic version control as we explained about one month ago with our initial release.

Original post

Has Linux finally found a solid cloud distribution?

By Jack Wallen on 2015-08-12

The cloud is here to stay, and Jack Wallen still believes Linux is a bit behind the curve on the desktop side of things... even with the likes of Peppermint Six.

Original post

Cómodos en lo incómodo

By jmbeas on 2015-08-12

Agile, cambio, crisis, educación, rrhh, zona de confort

Las tardes de playa con los niños y los amigos a veces atraen conversaciones muy interesantes. Por ejemplo, no hace mucho tratábamos sobre cómo nuestros hijos...

Original post

Django Girls Winter of Code

By ksiedlarek on 2015-08-12

It all started with an email from Ola sent on the 11th of December 2014:

“…Django Girls main email account is regularly receiving questions from various companies asking us if we know some Django Girls alumni who might be interested in working for them. On the other hand, we also get questions from our alumni asking us if we know some companies who are looking for junior devs in city X.


Original post

Pdf made up of pictures

By Carlos Ble on 2015-08-12

Free/Libre Software

I had to embed 50 pictures in a pdf file for print - don't ask me why. Dependencies (on Debian): apt-get install imagemagickapt-get install pdftk This is the Python script. It uses commands "montage" (from imagemagick) and pdftk: from subprocess import callimport os folder = 'pictures'images_per_page=4columns=2 print "Work in progress..." files = os.listdir(folder)files.sort()pages = [files[i:i+images_per_page] for i in […]

Original post

Using C# Collections

By Carlos Ble on 2015-08-12

Clean code

There are many ways to work with collections. We are following Microsoft Guidelines for Collections  plus some ideas that Kent Beck explains in Implementation Patterns. I've created a repository with code examples so that anyone can play with them. All the unit tests in the project are green except for two, which are red on purpose to […]

Original post

Can the Name Age Calculator guess how old you are?

By Randy Olson on 2015-08-13

analysis, data visualization, age calculator, baby names, FiveThirtyEight, Social Security Administration

Can you guess someone’s age when all you know is their first name? That was the crazy idea behind one of FiveThirtyEight’s articles last year, and their surprising answer is, “Yes.” The idea behind guessing someone’s age based on theirRead more ›

Original post

Publish your GPX with Mapbox

By yamila on 2015-08-13

Open source, Tutorials, mapbox, my modus, open source

Following my learning about maps as a service, I’ve tried also Mapbox with the same very simple approach: share a GPX shown in a map, an in a nice way. After the little tutorial I’ll write some impressions comparing both … Continue reading

Original post

Do your security homework before storing big data in the cloud

By Mary Shacklett on 2015-08-14

Here's what an IT leader needs to ask cloud service providers about storage, preparation, and analytics capabilities to ensure their organization's big data is secure.

Original post

The New York Times weather chart redux

By Randy Olson on 2015-08-14

data visualization, python, New York Times, reproducibility, weather

One of my favorite pastimes is recreating and updating old New York Times graphics. It’s great practice decomposing graphs into reproducible elements, and I always learn a ton about good graphic design in the process. If you’re still learning dataRead more ›

Original post

By Randy Olson on 2015-08-14

data visualization, baby names, Social Security Administration

Around the same time I was working on the Name Age Calculator, I developed a simple tool to visualize trends in American baby names. Ever inventive, I named this web app the U.S. Baby Name Explorer. The idea behind theRead more ›

Original post

openssh-7.0p1 deprecates ssh-dss keys

By Gaetan Bisson on 2015-08-14

In light of recently discovered vulnerabilities, the new openssh-7.0p1 release deprecates keys of ssh-dss type, also known as DSA keys. See the upstream announcement for details.

Before updating and restarting sshd on a remote host, make sure you do not rely on such keys for connecting to it. To enumerate DSA keys granting access to a given account, use:

    grep ssh-dss ~/.ssh/authorized_keys

If you have any, ensure you have alternative means of logging in, such as key pairs of a different type, or password authentication.

Finally, host keys of ssh-dss type being deprecated too, you might have to confirm a new fingerprint (for a host key of a different type) when connecting to a freshly updated server.

Original post

Analyzing the health of Philadelphia’s bike share system

By Randy Olson on 2015-08-16

analysis, data visualization, bike share, Indego, machine learning, modeling, Philadelphia

Last month, I wrote about my initial attempts to model and predict the usage patterns of Indego, Philadelphia’s new bike share system. To recap: If you’ve ever used a bike share before, you know that one of the biggest fearsRead more ›

Original post


Comments powered by Disqus