- Welcome to Geeksww.com
categories
- Database Management Systems
- Development
- Operating Systems
- Others
- Security
- Server Administration
- Social Networks
tags cloud
High Availability Approaches for Exchange
Submitted by Webmaster on Thursday January 15, 2009
Todd Landry, Product Manager at Quest Software will explain how your organization can have: Higher Service Level Agreements (SLA) Recovery teams have the necessary time to restore their Exchange servers properly Availability control maintained in-house Significantly lower Total Cost of Ownership of geo-clustering solutions
Category:
Server Administration > MS Exchange
Tags:
Google I/O 2008 - OpenSocial, OpenID, and OAuth: Oh, My!
Submitted by Webmaster on Thursday January 15, 2009
A number of emerging technologies will soon collectively enable an open social web in which users control their information and it can flow between multiple sites and services. OpenID, OAuth, microformats, OpenSocial, the Social Graph API, friends-list portability, and more will be discussed, as well as a coherent vision for how the pieces fit together and how developers can start taking advantage of them now.
Category:
Tags:
Social networks and trust : NetTrust
Submitted by Webmaster on Thursday January 15, 2009
ABSTRACT NetTrust is a system that embeds social context in browsing by combining individual histories, social networks, and explicit ratings. NetTrust combines an implicit and explicit means of data collection. This trust based system uses shared browsing histories from a user's self-selected social networks to create both explicit and implicit data collection. NetTrust targets the human element of trust. It projects how a social network can signal meaningful trust information that can make an educative browsing experience. NetTrust allows an individual to select their own trusted sources of information and rate particular sites as trustworthy (or not). NetTrust allows an individual to select their own trusted authoritative sources of information from a market of ratings agencies and combine these ratings with the reputation information from their individual social network. This paper will present the Net Trust system; the dorm-based homophily tests with implications and the undergraduate-focused user testing. Speaker: Professor L. Jean Camp Professor L. Jean Camp is the author of Trust and Risk in Internet Commerce (MIT Press), Economics of Identity Theft (Springer) and the editor of Economics of Information Security (Kluwer Academic). She has authored over one hundred works, including seventy peer-reviewed works and eighteen book chapters. In addition to presentations at peer-reviewed venues, she has made scores of invited presentations on four continents. Her service has included the Board of Directors of Computer Professionals for Social Responsibility, the Board of Governors of the IEEE Society on Social Implications of Technology, Senior Member of the IEEE, and longstanding member of the USACM. See http://www.ljean.com/cv.html for more detailed information and full text of various publications.
Category:
Tags:
An Overview of the Coming C++ (C++0x) Standard
Submitted by Webmaster on Thursday January 15, 2009
ABSTRACT The C++ language has started the formal approval process with the recent release of its Committee Draft, i.e. Beta. This talk outlines the process, the new features, some features left out, and the procedures for formal comments. Speaker: Matt Austern Matt Austern is a long-time contributor to the C++ standard, as well as a Google engineer. Speaker: Lawrence Crowl Lawrence Crowl is a long-time contributor to the C++ standard, as well as a Google engineer.
Category:
Tags:
Developing iPhone Applications using Java
Submitted by Webmaster on Thursday January 15, 2009
ABSTRACT Apple's iPhone has resulted in significant interest from users and developers alike. Apple's SDK for the iPhone is based on Objective-C as the development language as well as Cocoa for the GUI. Unfortunately Apple's license agreement for the iPhone SDK prohibits the porting of the Java virtual machine to the iPhone. In this presentation we introduce an Open Source Java-to-Objective-C cross-compiler as well as a Java-based implementation of the Cocoa library. With the help of these tools, iPhone applications can be written in pure Java. Using the Java version of Cocoa, it is possible to run a Java-based iPhone application as a Java desktop/applet application that can be cross-compiled to run natively on the iPhone. The talk will discuss the challenges of the Java-to-Objective-C cross-compiler as well as the Java-based version of Cocoa. Details are available at http://www.xmlvm.org/ Speaker: Arno Puder Arno Puder is an Associate Professor at the San Francisco State University. Prior to his current position, he worked for AT Labs Research. His interests include middleware, ubiquitous computing, and applications for sensor networks. He is one of the founders of the Open Source CORBA implementation called MICO.
Category:
Development > Mobile/IPhone/Android
Tags:
Ruby 1.9
Submitted by Webmaster on Wednesday January 14, 2009
ABSTRACT Ruby 1.9 Speaker: Yukihiro Matsumoto Yukihiro Matsumoto (Matsumoto Yukihiro, a.k.a. Matz, born 14 April 1965) is a Japanese computer scientist and software programmer best known as the chief designer of the Ruby programming language. He was born in Osaka Prefecture, in western Honshu. According to an interview conducted by Japan Inc., he was a self-taught programmer until the end of high school. He graduated with an information science degree from Tsukuba University, where he associated himself with research departments dealing with programming languages and compilers. As of 2006, Matsumoto is the head of the research and development department at the Network Applied Communication Laboratory, an open source systems integrator company in Shimane prefecture. He is a member of The Church of Jesus Christ of Latter-day Saints and served as a missionary for the church. Matsumoto is married and has four children.
Category:
Tags:
Greg Kroah Hartman on the Linux Kernel
Submitted by Webmaster on Monday January 12, 2009
ABSTRACT The Linux Kernel, who is developing it, how they are doing it, and why you should care. This talk describes the rate of development for the Linux kernel, and how the development model is set up to handle such a large and diverse developer population and huge rate of change. It will detail who is doing the work, and what companies, if any, are sponsering it. Finally, it will go into why companies like Google, and any other that uses or depends on Linux, should care about this development. Lots of numbers and pretty graphs will be shown to keep the audience awake. Speaker: Greg Kroah Hartman Greg Kroah-Hartman is a Linux kernel maintainer for the USB, driver core, sysfs, and debugfs portions of the kernel as well as being one half of the -stable kernel release team. He currently works for Novell as a Fellow doing various kernel related things and has written a few books from O'Reilly about Linux development in the past.
Category:
Tags:
High Performance Web Sites and YSlow
Submitted by Webmaster on Tuesday December 30, 2008
ABSTRACT Yahoo!'s Exceptional Performance Team has identified 14 best practices for making web pages faster. These best practices have proven to reduce response times of Yahoo! properties by 25-50%. They focus on the front-end, for example, why it's bad to use "@import" for including stylesheets and why ETags disable browser caching. In this talk I'll go in-depth on these best practices and the research behind them. I'll also demonstrate YSlow and do some live performance analysis of popular web sites. Relevant links: Exceptional Performance: http://developer.yahoo.com/performance/ YSlow: http://developer.yahoo.com/yslow/ Speaker: Steve Souders Steve Souders holds down the job of Chief Performance Yahoo! at Yahoo! He's been at Yahoo! since 2000, working on many of the platforms and products within the company He ran the development team for My Yahoo! before reaching his current position. As Chief Performance Yahoo!, he has developed a set of best practices for making web sites faster. He builds tools for performance analysis and evangelizes these best practices and tools across Yahoo!'s product teams.
Category:
Tags:
Graph Identification and Privacy in Social Networks
Submitted by Webmaster on Tuesday December 30, 2008
ABSTRACT Graph identification refers to methods that transform observational data described as a noisy, input graph into an inferred "clean" output graph. Examples include inferring social networks from communication data, identifying gene regulatory networks from protein-protein interactions, etc. On the flip-side, there is a growing interest in anonymizing social network data, and understanding the different types of privacy threats inherent in relational data. In this talk, I will discuss some of the key processes involved in identification (entity resolution, link prediction, collective classification and group detection) and I will overview results showing that on several well-known social media sites, we can easily and accurately recover information that users may wish to remain private. Speaker: Lise Getoor Lise Getoor is an associate professor in the Computer Science Department at the University of Maryland, College Park. She received her PhD from Stanford University in 2001. Her current work includes research on link mining, statistical relational learning and representing uncertainty in structured and semi-structured data. She has published numerous articles in machine learning, data mining, database, and artificial intelligence forums. She was awarded an NSF Career Award, is an action editor for the Machine Learning Journal, a JAIR associate editor, has been a member of AAAI Executive council, and has served on a variety of program committees including AAAI, ICML, IJCAI, KDD, SIGMOD, UAI, VLDB, and WWW. More information can be found at www.cs.umd.edu/~getoor
Category:
Tags:
Tech Talk: Linus Torvalds on git
Submitted by Webmaster on Tuesday November 11, 2008
Linus Torvalds visits Google to share his thoughts on git, the source control management system he created few years ago.
Category:
Tags:
Performance Tuning Best Practices for MySQL
Submitted by Webmaster on Tuesday November 11, 2008
Jay Pipes is a co-author of the recently published Pro MySQL (Apress, 2005), which covers all of the newest MySQL 5 features, as well as in-depth discussion and analysis of the MySQL server architecture, storage engines, transaction procesing, benchmarking, and advanced SQL scenarios. You can also see his name on articles appearing in Linux Magazine and can read more articles about MySQL at his website. ABSTRACT Learn where to best focus your attention when tuning the performance of your applications and database servers, and how to effectively find the "low hanging fruit" on the tree of bottlenecks. It's not rocket science, but with a bit of acquired.
Category:
Database Management Systems > MySQL