background preloader

Welcome – SUSE Studio

Clonezilla - About High Scalability - High Scalability AWS Management Console With Resource Groups, you can view collections of resources that share common tags. Streamline your use of the console by creating a resource group for each application, service, or collection of related resources that you work with regularly. Quickly navigate to each saved resource group using the “AWS” menu. Resource Groups are specific to each identity, so each user in an account can create unique Resource Groups for frequently accessed resources and common tasks. Use the Tag Editor to easily manage tags for all resource types that support tags in any region. We are eager to hear about your user experience with the AWS Management Console.

The Modernist Nerd: Vintage Science Ads from the 1950s and 1960s by Maria Popova What a “honeycomb sandwich” has to do with space travel and reconnaissance systems. The intersection of science and design has many beautiful manifestations, from data visualization to nerd tattoos. But hardly does it get more delightful than in these gorgeous vintage science and technology ads from magazines in the 1950s and 1960s, bringing the modernist aesthetic to the atomic and space ages. See more on Flickr. via iso50 Donating = Loving Bringing you (ad-free) Brain Pickings takes hundreds of hours each month. You can also become a one-time patron with a single donation in any amount: Brain Pickings has a free weekly newsletter. Share on Tumblr

Best Practices for Speeding Up Your Web Site The Exceptional Performance team has identified a number of best practices for making web pages fast. The list includes 35 best practices divided into 7 categories. Minimize HTTP Requests tag: content 80% of the end-user response time is spent on the front-end. One way to reduce the number of components in the page is to simplify the page's design. Combined files are a way to reduce the number of HTTP requests by combining all scripts into a single script, and similarly combining all CSS into a single stylesheet. CSS Sprites are the preferred method for reducing the number of image requests. Image maps combine multiple images into a single image. Inline images use the data: URL scheme to embed the image data in the actual page. Reducing the number of HTTP requests in your page is the place to start. top | discuss this rule Use a Content Delivery Network tag: server The user's proximity to your web server has an impact on response times. top | discuss this rule top | discuss this rule tag: css

Best of VIM Tips, gVIM's Key Features zzapper Tips Home Vim Tips Blog (NEW) Cygwin VimTools Buy Vim Book Support VIM Submit to Social Websites Navfree Latest Satellite Navigation Software for iPhone, iPad and Android Offline Maps - Better than Online Maps Nearly all mobile devices are constantly connected to the Internet. 3G, Wifi, LTE and 4G have become standards for smartphones. This is great for many applications such as email and web browsing, but for navigation a purely online map can cause problems. Roaming Cost – Online map applications require a constant data connection to download map data, this data is quite large and can quickly generate large phone bills when you are roaming in another country. Navmii and Navfree apps are different, they store all the map data on-board the phone itself, meaning you don’t need to use your Internet connection to navigate saving you money when you are traveling. Data Connection Reliability – We have all had the situation where even in big cities your phone’s data connection becomes very slow or doesn’t work at all. Safer driving You can download safety camera warnings for almost all countries we supply maps for. Route Guidance Intelligent Night mode Online Search

Secure Passwords Often, there is really only one thing standing between your sensitive information and criminals - your password. If they get it, they can get into banks accounts and private files, and wreak havoc. For this reason, it's important to know what makes a password strong and secure. Chances are, you use passwords everyday. To open your computer, to log into your favorite websites, to get work done. The easy route is to have a simple password that works everywhere. And if they already know information about you, it's even easier. Your first thought may be to use a pet's name, a birthdate, an address or parts of a phone number. Thankfully, there are ways to have memorable, but hard-to-guess passwords. Well, your password is there - it's the first letter of each word. But there's more. If you write it down, be careful where you keep it. Criminals may also try to fool you into handing it over via phone calls. And be careful when you get an email that asks for a password - it could be a scam.

Common Password Mistakes and How to Create Stronger Passwords « Flower Blossoms' Blog A password is a secret word or string of characters that is used for authentication to prove identity or gain access to resources. We encounter passwords in our daily lives, at the ATM, when logging onto our home or office computers, or logging into our table TV decoder when purchasing a pay-per-view event. We use passwords several times per day when we are using our computers, such as retrieving e-mail from servers; accessing programs; databases; social networking websites; or even reading the morning newspaper online. The password is easy to locate Monitors are the last place anyone should find your password. Whether the password is long or short, complex or simple, a password that is written down on a Post-it note and stuck on your monitor, beneath your keyboard, or in your desk drawer (that has no lock) offers as much protection as a system that has no password in the first place. The password is too short and simple “susan” The password is too common “Bobby” “Jenny” “Scruffy” “MrFluffy”

Hacking Into Your Account is as Easy as 123456 The big Hollywood pictures always make breaking into computers look like a fabulously hip and complicated process. It involves excitement and ingenuity and often times, because it's just so difficult and exciting, a bit of sweat on the brow. But in reality, it's as easy as "123456". And if that doesn't work, we'd suggest trying "12345", next. A report released today looks at a list of 32 million passwords and what it finds doesn't say good things about most of us and our password practices. The report, released by data security firm Imperva, works with real-world data to arrive at its finding. Like children who won't eat their vegetables, we obviously aren't doing what we're told when it comes to the basics of password security. The report goes on to give a list of recommendations that, as it points out from the beginning, you probably won't follow. According to the data, a brute force attack would likely be able to access 1000 accounts in a mere 17 minutes. Photo credit: danielleblue.

Rat Free Subways

Related: