Documentation: MySQL Reference Manuals MySQL Documentation MySQL 5.7Reference Manual MySQL 5.7Release Notes Browse MySQL Documentation by: Product Topic General Tutorial Server Administration Free Speech vs. Hate Speech There is no question that images ridiculing religion, however offensive they may be to believers, qualify as protected free speech in the United States and most Western democracies. There is also no question that however offensive the images, they do not justify murder, and that it is incumbent on leaders of all religious faiths to make this clear to their followers. But it is equally clear that the Muhammad Art Exhibit and Contest in Garland, Tex., was not really about free speech. It was an exercise in bigotry and hatred posing as a blow for freedom. That distinction is critical because the conflicts that have erupted over depictions of the Prophet Muhammad, most notably the massacre of staff members at the French satirical weekly Charlie Hebdo in January by two Muslim brothers, have generated a furious and often confused debate about free speech versus hate speech.
A Malware Anniversary to Remember Once in a while, a piece of malware will come along that grabs headlines. Rarer is malware that is talked about around the water cooler (at places other than Symantec). But the rarest of all is malware that actually makes history. Google: "Goggles Does NOT Do Face Recognition" The big news out of Hot Chips on Monday was Google's promise to have its Goggles visual search app ready for the iPhoneby the end of 2010. Google Goggles project lead David Petrous also provided the inside scoop into how Goggles deciphers your images in the cloud. But the most interesting takeaway from Petrous' talk was his repeated insistence that Google Goggles does not do facial recognition—interspersed by a long tutorial on how well it would work if it did. Augmenting your reality Augmented reality is a step toward intuitive search, like having an insightful personal assistant following your every move, answering not just "what am I looking at?" but intuiting exactly what you want to know about it and why.
Mo Data Mo Money: Open Source Business Models RedMonk co-founder and analyst Stephen O'Grady recently gave a talk at Open Source Business Conference. He's posted his notes and slides here. In the talk, he emphasized his idea that there are four generations of software companies, and that selling software is becoming harder and harder. O'Grady sees the way forward for open source companies is leveraging data. According to O'Grady, the four generations are: Using Multiple SSL Certificates in Apache with One IP Address About the TLS Extension Server Name Indication (SNI) When website administrators and IT personnel are restricted to use a single SSL Certificate per socket (combination of IP Address and socket) it can cost a lot of money. This restriction causes them to buy multiple IP addresses for regular https websites from their domain host or buy hardware that allows them to utilize multiple network adapters. However, with Apache v2.2.12 and OpenSSL v0.9.8j and later you can use a transport layer security (TLS) called SNI.
Daniel J. Solove Daniel J. Solove (/ˈsoʊloʊv/; born 1972) is the John Marshall Harlan Research Professor of Law at the George Washington University Law School. He is one of the world’s leading experts in information privacy law and is well known for his academic work on privacy and for popular books on how privacy relates with information technology. His deconstruction of the “I’ve got nothing to hide” position, and related justifications for government surveillance, has been regarded as the best brief analysis of the issue.
How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History It was January 2010, and investigators with the International Atomic Energy Agency had just completed an inspection at the uranium enrichment plant outside Natanz in central Iran, when they realized that something was off within the cascade rooms where thousands of centrifuges were enriching uranium. Natanz technicians in white lab coats, gloves and blue booties were scurrying in and out of the “clean” cascade rooms, hauling out unwieldy centrifuges one by one, each sheathed in shiny silver cylindrical casings. Any time workers at the plant decommissioned damaged or otherwise unusable centrifuges, they were required to line them up for IAEA inspection to verify that no radioactive material was being smuggled out in the devices before they were removed. The technicians had been doing so now for more than a month.