background preloader

Overview - elasticsearch

Overview - elasticsearch

modeling - Forecasting time series based on a behavior of other one An open-source distributed database built with love - RethinkDB Log Management Software Suite | Security Event Reporting, Storage & Consolidation Today’s businesses need a higher level of security intelligence and compliance readiness than ever before. To ensure data protection and compliance, you need an effective, comprehensive security program that includes advanced security event logging and storage. Such a program should equip you with five crucial capabilities: Improve Security, Compliance, and Log Management – On Any Budget Regardless of budget, size, or performance requirements, BlackStratus has a solution to protect your critical data, manage log overload, and ensure compliance. Our family of flexible, scalable event log management software solutions gives you a complete, understandable picture of your network security and compliance posture that will dramatically improve your ability to identify and rapidly respond to threats. Which Solution is Right for You? BlackStratus offers a variety of solutions to meet the unique needs of any organization – and the expertise to steer you toward the right option.

Using Tastypie With Non-ORM Data Sources — Tastypie 0.10.0 documentation Much of this documentation demonstrates the use of Tastypie with Django’s ORM. You might think that Tastypie depended on the ORM, when in fact, it was purpose-built to handle non-ORM data. This documentation should help you get started providing APIs using other data sources. Virtually all of the code that makes Tastypie actually process requests & return data is within the Resource class. ModelResource is actually a light wrapper around Resource that provides ORM-specific access. Approach¶ When working with Resource, many things are handled for you. What you don’t get out of the box are the fields you’re choosing to expose & the lowest level data access methods. detail_uri_kwargsget_object_listobj_get_listobj_getobj_createobj_updateobj_delete_listobj_deleterollback If read-only is all you’re exposing, you can cut that down to four methods to override. Using Riak for MessageResource¶ This represents a full, working, Riak-powered API endpoint.

Chromium Homepage How secure is NFC tech? - HowStuffWorks In the near future, your technological world might be overtaken by near field. No, not the corn field that's across the road. We're talking about near-field communication (NFC), which gadget manufacturers, retailers and many other organizations hope will bring powerful new features to smartphones and much more. NFC is a type of radio communication standard, much like Bluetooth, WiFi and other networking technologies. NFC isn't a newfangled technology, but it's just now beginning to filter into mainstream products like smartphones. What's more, with NFC, you can bump smartphones to exchange information with friends or business colleagues, or use your phone to read smart tags. You can even use NFC to connect to secure networks without having to enter complex authorization codes. Ultimately, NFC makes it a whole lot easier to perform a huge range of digitized tasks. Many experts say NFC really is fundamentally secure by virtue of its extremely short range.

How a Computer Program Helped Reveal J. K. Rowling as Author of A Cuckoo’s Calling “The man who wrote the note is a German. Do you note the peculiar construction of this sentence?” These were the words of Sherlock Holmes in “A Scandal in Bohemia,” analyzing a note from a client, unmasking the King of Bohemia incognito, and incidentally, establishing himself as a brilliant literary analyst. It is impossible to keep a secret from the legendary Sherlock Holmes, who can read an ocean from a drop of water. Just as the paper would have carried the marks of the royal fingers, to the skilled reader the writing carried the marks of the royal mind. Fiction has recently become fact with the improving science of stylometry, the study of writing style. Over the past decade, I have developed a computer program to do this sort of analysis of writing style, based on literally millions of different features. Language use is a set of personal choices. It is important to decide carefully what kinds of similarities to look at. Another feature was the 100 most common words.

CoreOS is Linux for Massive Server Deployments · CoreOS Network management In computer networks, network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems.[1] Network management is essential to command and control practices and is generally carried out of a network operations center. Operation deals with keeping the network (and the services that the network provides) up and running smoothly. It includes monitoring the network to spot problems as soon as possible, ideally before users are affected.Administration deals with keeping track of resources in the network and how they are assigned. It includes all the "housekeeping" that is necessary to keep the network under control.Maintenance is concerned with performing repairs and upgrades—for example, when equipment must be replaced, when a router needs a patch for an operating system image, when a new switch is added to a network. Note: Network management does not include user terminal equipment.

Free Open Source Distributed Micro-blogging There is plenty to say about Thimbl. Find out why we're doing this and how. So Thimbl, huh? What is it? Thimbl is free, open source and distributed micro-blogging. Will Thimbl be an alternative to Twitter? Well, proprietary, centralized platforms like Twitter are exactly what we're trying to illustrate as unneeded. If there can be an alternative to Twitter, a very well funded and positioned corporation, it must be a platform, not simply an alternative service or some clone-ware. That being said, pushing Thimbl as a far as we can is part of the performance. Isn't this just like identi.ca/ostatus.net? The similarity is only superficial, in that we draw upon similarities with web2.0 platforms in how we communicate our use-case. Diaspora, Crabgrass, NoseRub, StatusNet, identi.ca and the rest are just web-apps with some sort of federation bolted-on. OK, so what do I need to make this work? Finger and SSH. Will you be part of the federated web? Can this approach be used with other social networks?

chkrootkit -- locally checks for signs of a rootkit Peer-to-peer A peer-to-peer (P2P) network in which interconnected nodes ("peers") share resources amongst each other without the use of a centralized administrative system Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or work loads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes. Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts.[1] Peers are both suppliers and consumers of resources, in contrast to the traditional client-server model in which the consumption and supply of resources is divided. Historical development[edit] Therefore, a distributed messaging system that is often likened as an early peer-to-peer architecture was established: USENET. Applications[edit]

Related: