MySQL File System Trick

This seems like it could come in handy. 

Linux.com :: Using MySQL as a filesystem

With MySQLfs you can store a filesystem inside a MySQL relational database. MySQLfs breaks up the byte content of files that you store in its filesystem into tuples in the database, which allows you to store large files in the filesystem without requiring the database to support extremely large BLOB fields. With MySQLfs you can throw a filesystem into a MySQL database and take advantage of whatever database backup, clustering, and replication setup you have to protect your MySQLfs filesystem.

Advertisements
Published in: on February 15, 2008 at 5:16 pm  Leave a Comment  

Harnessing the hive mind

An interesting perspective piece on the nature of and ways to harness the wisdom of crowds.

Kevin Kelly — The Technium

Howard was at the forefront in the then totally radical belief that content could be assembled entirely from the collective action of amateurs and the audience. I had no doubt that a lot of good stuff could be assembled this way. But I thought of that crowd-sourced content as just the start. I believed then, and still believe now, that the role of editors — what we might call middle people, the PSL (publishers, studios, and labels) — were NOT going to go away. I thought that by adding a mild, smart editorial choice on top of the bottom’s work, you’d have something much better. Howard believed that we’d get further faster just relying on people with strong voices, lots of passion, and the willingness to write. We’d call those bloggers now.

Published in: on February 14, 2008 at 10:33 pm  Leave a Comment  

Mobile staff computing

Some of you reading this may see this story as ironic. 

Microsoft to buy phone maker Danger | Beyond Binary – A blog by Ina Fried – CNET News.com

The software giant said Monday that it’s acquiring Danger, the Palo Alto, Calif.-based maker of the T-Mobile Sidekick for an undisclosed amount.

Published in: on February 12, 2008 at 4:32 pm  Leave a Comment  

LinkedIn has a weakness…

Its users.  A fascinating story of greed and human nature – 2.0

Notchup, LinkedIn, and the Walled Garden Dilemma – GigaOM

NotchUp let users invite their LinkedIn contacts, which made it easy to indiscriminately invite a hundred friends at a time. Hoping for a slice of their friends’ interview blood money, they did just that — not by the hundreds, however, but by the thousands. Within a week, the upstart had the business-oriented networking site threatening legal action and reconsidering how users access LinkedIn.

Published in: on February 12, 2008 at 4:20 pm  Comments (35)  

Hack your Apple Remote

I don’t have an Apple remote.  But if I did …

Gmail: Check Gmail from the Couch with Your Apple Remote

Mac only: Gmail user Vic Shih has released a set of actions for controlling Gmail via remote control. Apple remote control fans may remember our previous post on freeware iRed Lite, which lets you assign actions to the various remote buttons. Vic has done just that, and offered the files for download. Setting this up is a little tricky for iRed Lite newbs, so let me walk you through it.

Published in: on February 7, 2008 at 8:07 pm  Comments (2)  

IT Security: Six Sigma Style

The author makes the case that IT security staff should spend less time obsessively chasing and patching vulnerabilities.  Determine what moves will provide better security for your environment for the least effort. 

Antivirus Inventor: Security Departments Are Wasting Their Time – Desktop Security News Analysis – Dark Reading

For example, today’s security industry focuses way too much time on vulnerability research, testing, and patching, Tippett suggested. “Only 3 percent of the vulnerabilities that are discovered are ever exploited,” he said. “Yet there is huge amount of attention given to vulnerability disclosure, patch management, and so forth.”

Published in: on February 7, 2008 at 6:45 pm  Comments (1)  

Google Spreadsheets back Surveys

So this is great.  Publish your spreadsheet as a survey.  Capture the data, then republish the real-time results using the Spreadsheet’s feed as maybe a graph

Google Spreadsheet Surveys

Google Spreadsheets can now be officially kidnapped to hold survey data. Just click on the Share tab and pick the new “to fill out a form” option*.

Published in: on February 7, 2008 at 6:01 pm  Leave a Comment  

Google Team Edition

Thank you Google.  Just what the doctor ordered.  The first team building exercise I’m going to love.

Google Apps Team Edition Released

But now it’s easier for groups within established organizations (businesses, universities, etc.) to collaborate using Google Apps without getting their entire organization to buy into Google Apps (quite literally) first.

This edition should be useful for Google in recruiting members of
organizations who will in turn exert pressure on those organizations to
adopt a premium version of Google Apps.

Published in: on February 7, 2008 at 5:11 pm  Leave a Comment  

Google delivers data archive option

Another big step towards capturing the Enterprise.  And it begins to appear that Google won’t be paying for C Block, which should loosen up about $5 Billion to protect Yahoo’s assets from Redmond.

Google expands business options thanks to Postini acquisition

First, it signaled just how serious Google was about marketing its Google Apps towards businesses (at $625 million, Postini wasn’t exactly cheap).

Google has big plans for Postini’s software products—the company announced today that it’s now offering spam filtering and archival services to business customers.

Published in: on February 6, 2008 at 4:22 pm  Leave a Comment  

Hello TrueCrypt 5.0

The third bullet in the update notes:

TrueCrypt – Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux – Documentation

New features:

*

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts). For more information, see the chapter System Encryption in the documentation. (Windows Vista/XP/2003)

*

Pipelined operations increasing read/write speed by up to 100% (Windows)

*

Mac OS X version 

Published in: on February 6, 2008 at 4:05 pm  Comments (1)