Thursday, December 31, 2009
Writing Debug and Trace Messages :: BlackWasp Software Development
Trace messages are written using the Trace class in the same namespace. They are different to Debug messages because they are included in the code when the TRACE symbol is defined, as it is by default for Visual Studio users. Trace messages can exist in code that has been compiled in either debug or release mode. They are useful when you do wish to log information from the software that you distribute to end-users."
Friday, December 25, 2009
Jeffrey Richter's Blog : Receiving notifications when garbage collections occur
How the brain encodes memories at a cellular level
Thursday, December 24, 2009
Restaurants Use Menu Psychology to Entice Diners - NYTimes.com
Git: The Lean, Mean, Distributed Machine
Good overview presentation -- nice form, nice data.
Wednesday, December 16, 2009
Atheist Ethicist: Climate Change: The Need for Proof Argument
You are the first mate on an ocean liner, when the Captain gives the following order. "You are to proceed at full speed without any deviation in course and speed unless and until you have absolute proof that there is an iceberg straight ahead. Then and only then are you permitted to take preventative action."
Or, you are an adult supervisor on a bus trip with a bunch of school children. The bus is approaching a train crossing. Yet, the driver says, "I am not slowing down unless and until I have absolute proof that the bus will not be across the tracks before the train gets here."
We know these people to be guilty of the moral crime of reckless endangerment.
If these types of people wish to take actions that risk their own lives, we may leave that up to them. They pay the costs for their own mistakes. However, when they put the lives of others at risk, then they are guilty of a moral crime.
We have good reason to condemn people like this and to condemn them in very harsh terms. They are responsible for the deaths and suffering of a great many people every year.
Now, we have a whole slew of these types of people engaging in reckless endangerment of whole cities and whole populations. They have already maimed and killed a great many people and destroyed a great deal of property, and they seem to have no qualms about continuing along the same course of action. In all cases, they behave as people who are almost if not entirely indifferent to the death and suffering of others - because they are not motivated to take any action that would avoid potential death and suffering.
The morally responsible person would not demand proof that there is an iceberg straight ahead before slowing down and taking precautions. The mere possibility of an iceberg is good enough. His responsibilities to his passengers demands that he take precautions to reduce the possibility of catastrophe - not that he act as if there is no risk until catastrophe is certain.
The responsible bus driver will not risk racing the train at the crossing. She will take precautions to protect the well-being of the children trusted to her, which means slowing down and avoiding the possibility of harm coming to them.
These same principles of moral responsibility demands that, in the face of risk of massive destruction due to climate change, that people slow down and reduce the risk. It does not require absolute proof.
Principles of rationality give us a simple formula for determining how much caution to use in the face of risk. The basic form states that the amount that it is rational to spend avoiding risk is equal to the cost times the probability.
It is worth spending up to $250 billion to avoid a 1% chance of suffering $25 trillion in harm.
It is worth spending up to $2.5 trillion in avoiding a 10% chance of suffering $25 trillion in harm.
It is worth spending $12.5 trillion to avoid a 50% chance of suffering $25 trillion in harm.
It is worth $22.5 trillion to avoid a 90% chance of suffering $25 trillion in harm.
Tuesday, December 15, 2009
EETimes.com - How much of a lead does Intel have at 32nm?
We plotted (Figure 1 online) the minimum interconnect line pitch for all three manufacturers as a function of the technology node. All three players had comparable critical dimensions, illustrating that Moore's law is alive and well with no sign of slowing.
Interestingly, TSMC has slightly smaller dimensions than the two other manufacturers, probably because TSMC's customers are mainly SoC manufacturers, such as graphics processor and FPGA makers. With the latest graphics processors having more than a billion transistors, any reduction in chip size is highly beneficial to foundry clients, even though the individual transistors may not be as fast as Intel's or AMD's.
Every new technology node both reduces critical dimensions and improves process. Two fundamental process innovations being adopted by the main semiconductor companies are embedded silicon-germanium source/drain regions (eSiGe) and high-k metal gate technology (HKMG). eSiGe increases the performance of the slower type of transistors (PMOS), while HKMG helps the transistors switch faster and reduces the gate leakage.
Thursday, December 10, 2009
Red Hat Open Sources Desktop Application Protocol - PC World Business Center
SPICE can be used to deploy virtual desktops from a server out to remote computers, such as desktop PCs and thin-client devices.
It resembles other rendering protocols used for remote desktop management and deployment, such as Microsoft's Remote Desktop Protocol (RDP) or Citrix's Independent Computing Architecture (ICA). Brennan said SPICE has advantages over those other protocols, in that SPICE can dynamically customize desktop instances to fit specific operating environments.
Tuesday, December 01, 2009
Crossbow Virtual Wire: Network in a Box
and so on. These components can
be combined to build an arbitrarily complex virtual network
called virtual wire (vWire) which can span one or
more physical machines. vWires on the same physical
network can be VLAN-separated and support dynamic
migration of virtual machines, which is an essential feature
for hosting and cloud operators.
vWires can be reduced to a set of rules and objects
Natural selection 150 years on : Article : Nature
But can speciation be observed? Yes. Field biologists have witnessed speciation in action among several plant, amphibian, bird and fish species18. What matters for Darwin's theory is that the process by which populations of interbreeding individuals split into two non-interbreeding populations follows straightforward routes of natural selection. One good example is that females of a cichlid fish species vary genetically in their preferences for males of red and blue colours. Biologists are witnessing red males occupying the lower depths of Lake Victoria, in Africa, and females with matching preferences are following them. These mating preferences are causing this single species to split into two19.
Monday, November 30, 2009
What Does it Really Take to Maintain Weight Loss « Correct Weight Loss Blog
* 78% eat breakfast every day
* 75% weigh them self at least once a week
* 62% watch less than 10 hours of TV per week
* 90% exercise on average, about 1 hour per day"
Wednesday, November 25, 2009
HPCwire: An Ethernet Protocol for InfiniBand
The catch is that it will be based on Ethernet, so performance will initially be constrained to 10 gigabits/second throughput and multi-microsecond latencies. InfiniBand, of course, already offers much better performance, which is why it continues to expand its footprint in the HPC market. But since the technology behind lossless Ethernet is coming to resemble InfiniBand, vendors like Voltaire and Mellanox are using the convergence as an opportunity to enter the Ethernet arena. "We're not naive enough to think the entire world is going to convert to InfiniBand," says Mellanox marketing VP John Monson, who joined the company in March.
Voltaire has announced its intention to build 10 GigE datacenter switches, which the company plans to launch later this year. Meanwhile at Interop in Las Vegas, Mellanox demonstrated a number of Ethernet-centric technologies, including an RDMA over Ethernet (RDMAoE) capability on the company's ConnectX EN adapters.
RDMAoE is not iWARP (Internet Wide Area RDMA Protocol), which is currently the only RDMA-based Ethernet standard that has a following with NIC vendors like Chelsio Communications and NetEffect (now part of Intel). Mellanox never jumped on the iWARP bandwagon, claiming that the technology's TCP offload model makes the design too complex and expensive to attract widespread support, and that scaling iWARP to 40 gigabits per seconds (datacenter Ethernet's next speed bump) would be problematic. More importantly, for a number of reasons Linux support for TCP offload never materialized.
Tuesday, November 24, 2009
The Copenhagen Diagnosis
Saturday, November 21, 2009
crosby-timing2009.pdf (application/pdf Object)
Many algorithms can take a variable amount of time to complete depending on the data being
processed.
Friday, November 20, 2009
Microsoft denies it built 'backdoor' in Windows 7
The compliance management toolkit provides a set of security configurations that address additional levels of risks beyond those addressed out of the box, as well as tools to deploy these configurations and monitor what Microsoft calls "configuration drift." The toolkit is aimed at enterprises, government agencies and other large-scale organizations.
Wednesday, November 18, 2009
Microsoft and SAP Again Team Up Against Oracle - Digits - WSJ
Microsoft will name the German software maker the “preferred provider” to its customers of software for budgeting, planning and forecasting.
Monday, November 16, 2009
Levi's commercials, now starring Walt Whitman. - By Seth Stevenson - Slate Magazine
For one thing, it's a universe in which the ever-present soundtrack is Walt Whitman poetry. This spot uses a wax cylinder recording believed to be audio of Whitman himself reading from his poem 'America.' The second spot in the campaign employs a recording of an actor reading Whitman's 'Pioneers! O Pioneers!'"
Intel's newest lawyer..
http://www.wilmerhale.com/files/Publication/ad127e35-c391-4c32-af63-67a840080b61/Presentation/PublicationAttachment/e4c04a7f-c942-4923-af07-6cb5a18dca9c/Melamed_ExclusiveDealingAgreements.pdf
Market power, while a necessary condition of illegality, should not be
sufficient to condemn such exclusionary agreements because they might
be the most efficient form of distribution, even if used by a monopolist.
In that event, the market power gained by the manufacturer can be said
to be the result of its “superior skill, foresight and industry” and would
not provide a sufficient basis for condemning the agreement.
IBM Reveals New Security Product for Virtual Environments
the product provides virtual network access control as a means to prevent network access from a virtual server until its security posture is confirmed. It also features virtual infrastructure monitoring and reporting to identify vulnerabilities, as well as autodiscovery and virtual network segment protection to provide visibility and control of the virtual infrastructure.
Friday, November 13, 2009
Intel places barbed wire fence ahead of haredi protest - Israel News, Ynetnews
Thursday, November 12, 2009
Remus
* The backup VM is an exact copy of the primary VM. When failure happens, it continues running on the backup host as if failure had never occurred.
* The backup is completely up-to-date. Even active TCP sessions are maintained without interruption.
* Protection is transparent. Existing guests can be protected without modifying them in any way.
For a full description and evaluation, see our NSDI paper."
Wednesday, November 11, 2009
Samsung Launches Open Mobile Platform | bada
Twitter-equipped bathroom scale tells the world how much you weigh | Technology | Los Angeles Times
But weight, there's more. Today the French company behind the scale, Withings, announced it has added Twitter capability to the scale, enabling the user to automatically tweet the weight/fat info to followers.
Monday, November 09, 2009
Virtualization Changes Application Deployment But Not Development
Saturday, November 07, 2009
Intel's cloaking driver reveled
Intel appears to be offloading some of the work associated with the GPU tests onto the CPU in order to improve 3DMark scores. When asked for comment, Intel replied with the following:
We have engineered intelligence into our 4 series graphics driver such that when a workload saturates graphics engine with pixel and vertex processing, the CPU can assist with DX10 geometry processing to enhance overall performance. 3DMarkVantage is one of those workloads, as are Call of Juarez, Crysis, Lost Planet: Extreme Conditions, and Company of Heroes. We have used similar techniques with DX9 in previous products and drivers. The benefit to users is optimized performance based on best use of the hardware available in the system. Our driver is currently in the certification process with Futuremark and we fully expect it will pass their certification as did our previous DX9 drivers.
Thursday, November 05, 2009
The Higher Arithmetic » American Scientist
There are 1011 stars in the galaxy. That used to be a huge number. But it’s only a hundred billion. It’s less than the national deficit! We used to call them astronomical numbers. Now we should call them economical numbers."
The "NoSQL" Discussion has Nothing to Do With SQL | blog@CACM | Communications of the ACM
Using either stored procedures or embedding, the useful work component is a very small percentage of total transaction cost, for today’s OLTP data bases which usually fit in main memory. Instead, a recent paper [1] calculated that total OLTP time was divided almost equally between the following four overhead components:
Logging: Traditional databases write everything twice; once to the database and once to the log. Moreover, the log must be forced to disk, to guarantee transaction durability. Logging is, therefore, an expensive operation.
Locking: Before touching a record, a transaction must set a lock on it in the lock table. This is an overhead-intensive operation.
Latching: Updates to shared data structures (B-trees, the lock table, resource tables, etc.) must be done carefully in a multi-threaded environment. Typically, this is done with short-term duration latches, which are another considerable source of overhead.
Buffer Management: Data in traditional systems is stored on fixed-size disk pages. A buffer pool manages which set of disk pages is cached in memory at any given time. Moreover, records must be located on pages and the field boundaries identified. Again, these operations are overhead intensive.
Wednesday, November 04, 2009
What the Cisco/EMC/VMware Trinity Means For Cloud Computing
Cisco, EMC and VMware, the trifecta of companies putting their own proprietary stamp on cloud computing for the enterprise, today created a partnership to offer equipment called Vblocks and support a new joint venture called Acadia that will help business customers and service providers build out clouds based on the Vblock gear packages. The partnership can be read as an attack on hardware providers building gear for the clouds and a potential threat to cloud providers like Microsoft Azure and Amazon’s cloud services that aren’t building VMware clouds.Cisco, EMC and VMware, the trifecta of companies putting their own proprietary stamp on cloud computing for the enterprise, today created a partnership to offer equipment called Vblocks and support a new joint venture called Acadia that will help business customers and service providers build out clouds based on the Vblock gear packages. The partnership can be read as an attack on hardware providers building gear for the clouds and a potential threat to cloud providers like Microsoft Azure and Amazon’s cloud services that aren’t building VMware clouds.
Tuesday, November 03, 2009
Discovery Blog: Archives
Monday, November 02, 2009
cbrumme's WebLog : Asynchronous operations, pinning
Vastus Medialis Oblique - VMO
Sitting on a chair with the knees bent, palpate the VMO
Start to slowly straighten the knee and ensure the VMO contracts
Maintain the contraction throughout the movement as you fully straighten the knee and bend it again
Repeat this twice daily until you can maintain a strong constant contraction 10 times in a row"
Wednesday, October 28, 2009
H1N1 Flu Shot: 3 Major Fears Debunked | Magazine#&mbid=cnn#&mbid=cnn#&mbid=cnn#&mbid=cnn#&mbid=cnn
Attacks on the vaccine boil down to three major arguments, each playing on different fears. These arguments may seem persuasive on the surface, but they’re not supported by the science.
Monday, October 26, 2009
CouchDB Implements a Fundamental Algorithm : Daytime Running Lights
Friday, October 23, 2009
Technology Review: Vulnerability Seen in Amazon's Cloud-Computing
Ron Rivest, a computer science professor at MIT and pioneer in cryptography, says the four researchers have "discovered some troubling facts" about cloud-computing services, which rent out computing resources, including storage and processing power, on a by-the-hour basis. Specifically, the potential weaknesses were found in the basic computing infrastructure services that are provided by Amazon and Rackspace and are widely used within many in-house corporate datacenters.
These technologies involve "virtual machines"--remote versions of traditional onsite computer systems, including the hardware and operating system. The number of these virtual machines can be expanded or contracted on the fly to meet demand, creating tremendous efficiencies. But the actual computing is, of course, performed within one or more physical data centers, each containing thousands of computers. And virtual machines of different customers sit on the same physical servers.
The attack involves first figuring out which physical servers a victim is using within a cloud, then implanting a malicious virtual machine there, and finally attacking the victim.
Hunting down a victim who might be on any of tens of thousands of servers might seem a needle-in-haystack enterprise. But the paper concludes that with some simple detective work, "just a few dollars invested in launching [virtual machines] can produce a 40 percent chance of placing a malicious [virtual machine] on the same physical server as a target." They dub this mapping process "cartography."
Wednesday, October 21, 2009
CommsDesign - Symbian opens source microkernel, ahead of schedule ....
The release of the microkernel demonstrates three vital, guiding principles of the foundation: first, the commitment of many community members to the development of the platform - in this case, Accenture, ARM, Nokia and Texas Instruments Incorporated (TI) all made contributions; second, progress in fulfilling our commitment to a complete open source release of Symbian; and third, a tangible example of providing the most advanced mobile platform in the world," said Lee Williams, Executive Director, Symbian Foundation.
To enable the community to fully utilize the open source kernel, Symbian is providing a complete development kit, free of charge, including ARM's high performance RVCT compiler toolchain.
IBM tackles the virtual data center | The Pervasive Data Center - CNET News
The new product, IBM Systems Director VMControl Enterprise Edition, is focused on virtualized environments. It supports IBM's PowerVM and z/VM as well as x86 virtualization technologies such as VMWare, Hyper-V and open x86 virtualization solutions. IBM plans to first offer it on IBM Power Systems running AIX in December, 2009 with other platforms coming next year
Cloud Testing Comes to the Fore
CSC also provides "Testing as a Service" (TaaS) within its Trusted Cloud Services offering. Testing as a Service is available on-demand in public, private and hybrid cloud networks to meet customers' business requirements, security needs and regulatory standards."
Monday, October 19, 2009
Colleagues Finger Billionaire - WSJ.com
The criminal complaint says that in a call intercepted in 2008, Mr. Goel asked Mr. Rajaratnam to get him a job 'with one of your powerful friends,' as he was 'tired' of working at Intel."
Federal Bureau of Investigation - The New York Division: Department of Justice Press Release
Friday, October 09, 2009
Cloud Standards are Misunderstood | Cloudscaling
Dr. Dobb's | Protecting Critical Applications on Mobile Platforms | July 10, 2009
P-MAPS is a processor-measured service layer that reduces the trusted computing base and improves the runtime security of user applications
The authors are research scientists and engineers for Intel Labs. They can be contacted at ravi.sahita@intel.com, ulhas.warrier@intel.com, and prashant.dewan@intel.com, respectively. Copyright (c) 2009 Intel Corporation. All rights reserved
Tuesday, October 06, 2009
Linux and the Trusted Platform Module (TPM) - The H Open Source: News and Features
You can check a Linux machine for its level of TPM support with the following command line –
ls -la /lib/modules/$(uname -r)/kernel/drivers/char/tpm
Linux and the Trusted Platform Module (TPM) - The H Open Source: News and Features
You can check a Linux machine for its level of TPM support with the following command line –
ls -la /lib/modules/$(uname -r)/kernel/drivers/char/tpm
PGP/GPG for GMail « The Life of a Silicon Valley Rockstar
It’s a Firefox extension and pushes itself right into Gmail. I wish they’d make a solution for IE7 as well since for better or worse it’s still the de facto standard web browser. You’ll note I said it’s a firefox extension. It’s not a key manager. For that you’ll need to download GNUPG or my preference, GPG4Win which also has a file encryption plugin GPGee and an Outlook 2003 plugin, GPGol.
Getting an SMIME certificate - MozillaZine Knowledge Base
Certificate Authorities
Sources of Free SMIME Certificates
Free certificates usable for S/MIME are available from:
Thawte
Verisign
InstantSSL / Comodo
TC TrustCenter and ChosenSecurity
ipsCA
CAcert (CAcert is NOT one of the trusted authorities built-in to FireFox and ThunderBird)
StartCom
LYSP
Lisp interpreter following closely the tradition of the earliest Lisp
implementations."
http://www.piumarta.com/software/lysp/lysp-1.0/00_README
Since 2005, VMware and Xen have gradually reduced the performance overheads of virtualization, aided by the Moore’s law doubling in transistor count, which inexorably shrinks overheads over time. AMD’s Rapid Virtualization Indexing (RVI – 2007) and Intel’s Extended Page Tables (EPT – 2009) substantially improved performance for a class of recalcitrant workloads by offloading the mapping of machine-level pages to Guest OS “physical” memory pages, from software to silicon. In the case of operations that stress the MMU—like an Apache compile with lots of short lived processes and intensive memory access—performance doubled with RVI/EPT. (Xen showed similar challenges prior to RVI/EPT on compilation benchmarks.)
Some of the other performance advances have included interrupt coalescing, IPv6 TCP segmentation offloading and NAPI support in the new VMware vmxnet3 driver. However, the last year has also seen two big advances: direct device mapping, enabled by this generation of CPU’s (e.g. Intel VT-D first described back in 2006), and the first generation of i/o adapters that are truly virtualization-aware.
Before Intel VT-D, 10GigE workloads became CPU-limited out at around 3.5GB/s of throughput. Afterwards (and with appropriate support in the hypervisor), throughputs above 9.6 GB/s have been achieved. More important, however, is the next generation of i/o adapters that actually spin up mini-virtual NIC’s in hardware and connect them directly into virtual machines—eliminating the need to copy networking packets around. This is one of the gems in Cisco’s UCS hardware which tightly couples a new NIC design with matching switch hardware. We’re now at the stage that if you’re using this year’s VMwar"
The Black Art of Optimising -- www.volker-lanz.de
{
char tmp[MAX_DIGITS + 1];
char* s = tmp + MAX_DIGITS;
*s = 0;
do
{
*--s = '0123456789'[n % 10];
n /= 10;
} while (n > 0);
strcpy(p, s);
return tmp + MAX_DIGITS - s;
}"
Win32_Tpm Class (Windows)
The Win32_Tpm class represents the Trusted Platform Module (TPM), a hardware security chip that provides a root of trust for a computer system."
Windows Trusted Platform Module Management Step-by-Step Guide
Monday, October 05, 2009
Rewriting the rules: Intel's software chief challenges convention | Oregon Business News - - OregonLive.com
Even so, Intel has repeatedly sought to branch out in software as a complement to its chips and as a tool for breaking into new technologies. “The results have been very consistent,” Grove, now 73 and retired, says. “They amounted to nothing.” It’s James’ job to break that losing streak.
Saturday, October 03, 2009
Share your favourite nerd, geek, science jokes! : funny
The past, the present, and the future walk into a bar. It was tense
Improbable Research
Bertrand Meyer's technology blog » Blog Archive » The CPU Clock principle of software releases
Amicus Curiae: Bilski v. Kappos - Software Freedom Law Center
Tuesday, September 29, 2009
Windows Remote Management (Windows)
Purpose
The Windows Remote Management (WinRM) is the Microsoft implementation of WS-Management Protocol, a standard Simple Object Access Protocol (SOAP)-based, firewall-friendly protocol that allows hardware and operating systems, from different vendors, to interoperate.
The WS-Management protocol specification provides a common way for systems to access and exchange management information across an IT infrastructure. WinRM and Intelligent Platform Management Interface (IPMI), along with the Event Collector are components of the Windows Hardware Management features."
Friday, September 25, 2009
Intel SOC
But Intel continues to invest in SoCs, and there are signs it is gaining traction. A second-generation TV chip called Sodaville is said to be getting good reviews among consumer OEMs, and a new networking chip called Jasper Forest has won sockets in Hewlett-Packard storage arrays and wireless infrastructure gear from Nokia Siemens Networks and China's ZTE"
http://www.eetimes.com/rss/showArticle.jhtml?articleID=220200034&cid=RSSfeed_eetimes_newsRSS
Thursday, September 24, 2009
But melts just like a little girl (Ftrain.com)
But melts just like a little girl
Bob Dylan plans to release a collection of familiar yuletide tunes... with proceeds of the album to benefit hunger-relief charities... —"Sleigh, Lady, Sleigh: Bob Dylan to Release Christmas Album," Dave Itzkoff, the New York Times
- Snowin' in the Wind
- Reiny Deer Women #12 & 35
- If Not for Yule
- Can You Please Crawl Down Our Chimney?
- Just Like a Snowman
- Positively 34th Street
- Ain't No More Cane
- Gotta Serve Somebody Eggnog
Monday, September 21, 2009
VMware’s vCloud API Forces Cloud Standards | Cloudscaling
Deltacloud | Many Clouds. One API. No Problem.
hackers-with-attitude: Interactive Programming with Clojure, Compojure, Google App Engine and Emacs
Sunday, September 20, 2009
Download .NET Memory Profiler
Codeka.com • Got Visual Studio 2008 Professional, Want Profiling?
CLR Inside Out: Using concurrency for scalability
Thursday, September 17, 2009
Eurotech - Digital technology for a better world
Wednesday, September 16, 2009
Technorati: Discussion about “IBM gives workers ten days to switch from Microsoft Office to Lotus Symphony - OR ELSE!”
Monday, September 14, 2009
Industry Veteran Pat Gelsinger Joins EMC as President & COO of Information Infrastructure Products; Howard Elias Promoted to President & COO of Information Infrastructure and Cloud Services - Yahoo! Finance
Pat Gelsinger has joined the company from Intel Corporation as President and Chief Operating Officer, EMC Information Infrastructure Products. Gelsinger, 48, will be responsible for EMC's Information Infrastructure product portfolio, including its Information Storage, RSA Information Security, Content Management and Archiving and Ionix IT management divisions. EMC also announced the promotion of Howard Elias, 52, to President and Chief Operating Officer, EMC Information Infrastructure and Cloud Services.
Thursday, September 10, 2009
Fifth-Generation iPod Nano Teardown Posted - Mac Rumors
The main ARM processor is Apple-branded and expected to be a Samsung processor as in the past, and the 8 GB flash memory chip in the dissected unit is from Toshiba.
Wednesday, September 09, 2009
VMworld session DV2363 – CVP Tech Deep Dive « VM Junkie
CVP is a powerful client hypervisor solution, which is part of the greater VMware View offering. It is not going to be offered standalone, it is a View product only. It helps create what the presenters called a “thin” thick client.
There are two approaches to doing a client hypervisor: Direct Assignment or Advanced Device Emulation.
In Direct Assignment, technologies like Intel VT-D or other software techniques are used to pass through a physical device (such as a video card) directly into the VM. This has some advantages such as lower overhead, and if you’re running Windows in your VM then all you need is a set of Windows drivers, which are easy to find. Passthrough is also much easier to program…
It has several downsides, however. For example, it ties your VM to that particular hardware which reduces portability. It also becomes difficult to interpose on that device. For example, if the video card is owned by the VM, there’s no way for the hypervisor to access it. Same goes for the network card. The point being – if all you’re doing is passing through your physical devices, why do you need a Client Hypervisor? Just run native. You can’t add value when using passthrough on everything. For some device types (such as USB) where the O/S is expecting hardware to appear and disappear, passthrough is okay
Tuesday, September 08, 2009
Getting to grips with VDI | Client
Who’s who in VDIVMware has the most complete offering of any vendor and is widely credited with creating the term VDI. From hypervisor to client, management infrastructure to application virtualisation, VMware has a complete solutions stack and is the only vendor with a mobile offering. Citrix is the latest entrant into the VDI space. Years of experience in thin client and the purchase of XenSource give Citrix a complete stack to rival VMware. Despite being well established in the thin client space and having virtual desktop and server tools, Microsoft only has parts of the VDI solution and currently relies on Citrix and Quest Software to provide the broker and other services.Symantec purchased Altiris two years ago, becoming a major player in application virtualisation and is currently building a VDI solution: it is not known if it will include a hypervisor. Quest Software is the leading third-party broker for VDI and has tools including software preparation and virtualisation. Heavily used by Microsoft and Parallels.
Friday, September 04, 2009
Lactic Acid Is Not Muscles' Foe, It's Fuel - New York Times
The understanding now is that muscle cells convert glucose or glycogen to lactic acid. The lactic acid is taken up and used as a fuel by mitochondria, the energy factories in muscle cells.
Mitochondria even have a special transporter protein to move the substance into them, Dr. Brooks found. Intense training makes a difference, he said, because it can make double the mitochondrial mass."
Moblin Zone
PowerTOP is a Linux tool that helps you find programs that are misbehaving while the computer is idle.
Battery Life Toolkit is a Linux framework to measure battery life on a MID.
Application Energy Toolkit helps you simulate power status, graph power consumption, and measure total power consumption.
Using those techniques, your applications can make intelligent choices about when to aggressively switch devices to sleep modes, take advantage of hardware-accelerated codecs, reduce application demand for wakeups (and improve overall perceived responsiveness), and use the appropriate power policies depending on context.
In the second part of this article, we’ll explore how to optimize mobile applications for maximum performance – critical when multithreading, doing a lot of network IO, engaging in CPU-intensive tasks, or displaying multimedia.
Inside the Intel Atom Processor
When it comes to power management, there are some cool features in the Intel Atom processor (pun intended). The first is the C6 power state, mentioned above. Intel calls that Deep Power Down Technology. To quote Dileep Bhandarkar, an Intel engineer,
We save away the entire processor state for the cores and turn off the caches and put the cores in an extremely low power state. This significantly reduces processor power consumed in idle mode and extends battery life. The OS initiates this with an MWAIT instruction and the CPU works with the chipset VRM to enter the deep power down state. On a wake up event (interrupt), voltage is increased, clocks and CPU state re"
Get ready for virtualization to affect you, too | Deep Tech - CNET News
--virtualization could become more widely used as a way to smooth the differences between people's own computer preferences and their employers' needs.
In the "employee-owned IT" vision, virtualization could let people put a corporate-managed virtual machine on an personal computer. The corporate partition would run only company-approved applications and could connect to the company network; the personal half could run the chaos of other programs that cause corporate IT folks to grind their teeth.
...VMware also is trying to stake a claim on another facet of cloud computing, in which companies can shift workload from their own data center's virtualization foundation to one housed at a remote data center operated by a third party. At VMworld, the company announced that AT&T, Savvis, Terremark, and Verizon Business all are offering that cloud service. VMware also said it's trying to standardize its cloud-foundation interfaces through a standards group called the Distributed Management Task Force.
Wednesday, September 02, 2009
The Keene View on Web 2.0, Ajax and SaaS
Evaluating SaaS Platforms For ISVs
Here are important criteria for ISVs to consider in evaluating SaaS platforms (sometimes called Platform as a Service, or PaaS):
Open hosting: can I move applications I build to another SaaS hosting providers? Many SaaS platforms lock the ISV into a proprietary hosting provider (e.g., SalesForce). ZDNet says that ISVs need to offer their SaaS software both on demand and on premises.
Full platform: does the SaaS platform offer a complete development solution with presentation layer, business logic, security, database and web services? Some SaaS platforms only offer part of the development stack (e.g., DabbleDB, Tibco GI)
Standard language: does the SaaS platform support development using a standard language such as Java? Many SaaS platforms are based on proprietary languages (e.g., Apex, the proprietary language for SalesForce).
Tuesday, September 01, 2009
Linus Torvalds, Patterson and different views (or different worlds?) « Multicore NZ
Designing future hardware around the needs of scientific computing seems ass-backwards. It’s putting the cart in front of the horse."
System.Diagnostics.PerformanceData Namespace ()
Use the classes in this namespace to provide counter data. The counters are used to expose performance metrics to consumers such as the Performance Monitor. The namespace does not contain classes for consuming the counter data. For a complete description of the performance counters architecture, see Performance Counters."
Providing Counter Data Using a Performance DLL (Windows)
A service, driver, or application that wants to provide counter data can write a performance DLL to provide the data."
vmware vsphere counters..
The vSphere Client Online Help has this to say about Virtual Machine Performance:
“In a virtualized environment, physical resources are shared among multiple virtual machines. Some virtualization processes dynamically allocate available resources depending on the status, or utilization rates, of virtual machines in the environment. This can make obtaining accurate information about the resource utilization (CPU utilization, in particular) of individual virtual machines, or applications running within virtual machines, difficult. VMware now provides virtual machine-specific performance counter libraries for the Windows Performance utility. Application administrators can view accurate virtual machine resource utilization statistics from within the guest operating system’s Windows Performance utility.”
Did you notice the explicit statement about Perfmon? Perfmon is Microsoft Windows Performance Monitor or perfmon.exe for short. Whereas the legacy VMware Descheduled Time Accounting Service supported both Windows and Linux guest VMs, its successor currently supports Perfmon ala Windows guest VMs only. It seems we’ve gone backwards in functionality from a Linux guest VM perspective. Another pie in the face for shops with Linux guest VMs.
Rant…
hot chips..
"How would you like a single-chip microprocessor with more than four times the performance (on some applications) of Intel's best Core i7?
Then consider that up to 32 of these chips can be directly connected to form a single server, achieving four times the built-in scalability of Intel's next-generation Nehalem-EX processor.
That's IBM's widely anticipated Power7, which it described at last week's Hot Chips conference. But if you're interested, you'd better be prepared to spend a lot more than four times as much per chip. IBM isn't talking about pricing, but large Power servers can cost more than $10,000 per processor"
Sunday, August 30, 2009
On Being a Writer: Scene & Sequel
Simply put, a scene defines a goal, presents conflict, ends in disaster, thus driving the story forward. The sequel ties that scene to the next, gives the reader and your hero a bit of a rest. It’s much like inserting peaks and valleys in your writing. In the scene we climb to the peak and descend to the valley which is the sequel, then we climb up to the next peak or conflict that is going to fall into the valley on the next disaster. Others relate the sequel to the bridge between scenes.
The three things a scene should include are:
Goal: A hero wants to posses something, wants revenge for something or wants to be relieved of something. Thus she wants to achieve something or she wants to resist something.
Conflict: Not argument between characters as some might believe, but rather is what happens in opposition to what hero wants.
Disaster: Something happens to prevent the hero from reaching her goal. It need not be disastrous in the strict sense of the word. It might simply be someone showing up she did not expect with information she did not know that puts an entirely new light on her struggle to achieve her goal. Or it can simply be a dark hint of what may happen if she pursues her goal, rather than a specific disaster.
Saturday, August 29, 2009
VLDB09 Overview, part 2 « Technofeel
Wednesday, August 26, 2009
EETimes.com - Sun, IBM push multicore boundaries
Sun Microsystems claimed a new watermark for server CPUs, unveiling Rainbow Falls, a 16-core, 128-thread processor at the Hot Chips conference Tuesday (August 25). But analysts gave the IBM Power7 kudos as the more compelling achievement in the latest round of high-end server processors.
Power7 packs as many as 32 cores supporting 128 threads on a four-chip module with links to handle up to 32 sockets in a system. "It is scaling well beyond anything we've ever really seen before," said Peter Glaskowsky, a technology analyst for Envisioneering Group (Seaford, NY).
China Daily Website - Connecting China Connecting the World
Tuesday, August 25, 2009
Fred Hahn: How Do We Become Fat?
YouTube - Lisp for High-Performance Transaction Processing
Linux-Kernel Archive: Re: Implementing NVMHCI...
lose binary compatibility on x86, for example. The 4kB thing is encoded in
mmap() semantics.
In other words, if you have sector size >4kB, your hardware is CRAP. It's
unusable sh*t. No ifs, buts or maybe's about it."
Water before meals
when combined with a hypocaloric diet, consuming 500 ml water prior to each main meal leads to greater weight loss than a hypocaloric diet alone in middle-aged and older adults.
DBMS2--Database management and analytic technologies in a changing world - Part 2
Meanwhile, the RAM:data ratio is around 1:11 It’s clear that ParAccel’s early TPC-H benchmarks ran entirely in RAM; indeed, ParAccel even admits that. And so I conjecture that ParAccel’s latest TPC-H benchmark ran (almost) entirely in RAM as well. Once again, this would illustrate that the TPC-H is irrelevant to judging an analytic DBMS’ real world performance.
More generally — I would not advise anybody to consider ParAccel’s product, for any use, except after a proof-of-concept in which ParAccel was not given the time and opportunity to perform extensive off-site tuning. I tend to feel that way about all analytic DBMS, but it’s a particular concern in the case of ParAccel."
The Cost of Not Understanding Probability Theory | Math-Blog
An increased awareness of probability and statistics can only improve society and its ability to assess situations and make rational decisions. How do we begin to remedy this situation, not only in Italy, but around the world? We can start by devoting far more time in grade, middle and high school math classes, in order to teach students about this important subject and the implications that it can have on their everyday lives, understanding of society, and ability to make wise financial decisions.
Monday, August 24, 2009
The Old New Thing : Common gotchas when writing your own p/invoke
Friday, August 21, 2009
CMN90091_virt_swit_728x90
Client partitioning, in which multiple virtual machines are executed locally on a single client PC
Virtual Desktop Infrastructure (VDI), in which, through whatever mechanism, the desktop software is managed and/or executed centrally via your server infrastructure"
Thursday, August 20, 2009
AMD IBS
Instruction-Based Sampling is a feature introduced in AMD Family 10h processors. Although IBS is a statistical method, the sampling technique delivers precise event information and eliminates inaccuracies due to skid.
The processor pipeline has two main phases: instruction fetch and instruction execution. The fetch phase supplies instruction bytes to the decoder. Decoded AMD64 instructions are executed during the execution phase as discrete operations called "ops." Since the two phases are decoupled, IBS provides two forms of sampling: fetch sampling and op sampling. IBS fetch sampling provides information about the fetch phase and IBS op sampling provides information about the execution phase.
IBS fetch sampling and IBS op sampling use a similar sampling technique. The IBS hardware selects an operation periodically based on a configurable sampling period. The selected operation is tagged and the operation is monitored as it proceeds through the pipeline. Events caused by the operation are recorded. When the operation completes, the event information and the fetch (or instruction) address associated with the operation are reported to the profiler. Thus, events are precisely attributed to the instruction that caused them. IBS does not impose any overhead on instruction fetch or execution -- everything runs at full speed.
Stress tests rain on Amazon's cloud - Storage - Technology - News - iTnews.com.au
Wednesday, August 19, 2009
IBM 'Smart Analytics System' Aimed at Reinventing Data Warehousing - Storage - Byte and Switch
Tuesday, August 18, 2009
Mitsubishi LT-46244 Vertical Line - AVS Forum
For those of you affected by the vertical green or red lines on last generation Mitsubishi LCDs, it appears that Mitsubishi has acknowledged this issue and is extending the warranty on LCD modules for one extra year. I think this is likely an issue covered by this warranty extension. Here's the warranty paragraph from mitsubishi-tv.com:
If you have one of the following models please read below for an important announcement - LT-40133, LT-40134, LT-46144, LT-46244, LT-52133, LT-52144, LT-52244. It has come to our attention that a limited number of these Premium Flat Panel Televisions may have performance issues related to the LCD Module used in these sets. As part of our commitment to quality and customer satisfaction, MDEA is announcing an extension of the warranty coverage applicable to the LCD Module for the models listed above. For a period of one additional year beyond the one year limited warranty, MDEA will cover the cost of repair or replacing the LCD Module (parts and labor) at no charge to you. All other terms and conditions of the MDEA limited warranty will continue to apply.
I just hope they've fixed the issue in the 148/246 Series panels."
Stephen Colebourne's Weblog
Sunday, August 16, 2009
My Way - Sports News
Friday, August 14, 2009
Like a complete unknown: Bob Dylan frogmarched to collect ID after rookie policewoman fails to recognise scruffy music legend | Mail Online
It was in 1965 that Dylan wrote Like A Rolling Stone, with its line: 'How does it feel to be on your own, a complete unknown?'
He found out while staying at the Ocean Place Resort in Long Branch. Before taking part in a concert with Willie Nelson and John Mellencamp, he decided to take a stroll through the town's Latin quarter.
'Residents called to complain there was an old scruffy man acting suspiciously,' said officer Spencer. 'It was an odd request because it was mid-afternoon. But it's an ethnic Latin area and the residents felt he didn't fit in.'
This is not the first time that Dylan has wandered off alone while on tour.
After a concert in Belfast in 1991, he shunned his chauffeur-driven limo and was captured by a TV crew waiting at a bus stop.
And in the middle of an American tour he popped unannounced into the childhood home of author Mark Twain.
Read more: http://www.dailymail.co.uk/tvshowbiz/bigbrother/article-1206617/Like-complete-unknown-Bob-Dylan-frogmarched-collect-ID-rookie-policewoman-fails-recognise-scruffy-music-legend.html#ixzz0OCmAFdHJ
GFS: Evolution on Fast-forward - ACM Queue
it's atypical of Google to put a lot of work into tuning any one particular binary. Generally, our approach is just to get things working reasonably well and then turn our focus to scalability—which usually works well in that you can generally get your performance back by scaling things.
Thursday, August 13, 2009
The powerful and mysterious brain circuitry that makes us love Google, Twitter, and texting. - By Emily Yoffe - Slate Magazine
"Seeking is the granddaddy of the systems." It is the mammalian motivational engine that each day gets us out of the bed, or den, or hole to venture forth into the world. It's why, as animal scientist Temple Grandin writes in Animals Make Us Human, experiments show that animals in captivity would prefer to have to search for their food than to have it delivered to them.
..
Wanting is Berridge's equivalent for Panksepp's seeking system. It is the liking system that Berridge believes is the brain's reward center. When we experience pleasure, it is our own opioid system, rather than our dopamine system, that is being stimulated
Official Google Blog: Introducing the Google Chrome OS
Google Chrome OS will run on both x86 as well as ARM chips and we are working with multiple OEMs to bring a number of netbooks to market next year. The software architecture is simple — Google Chrome running within a new windowing system on top of a Linux kernel. For application developers, the web is the platform. All web-based applications will automatically work and new applications can be written using your favorite web technologies.
GLADINET - About Gladinet Vision and Technology
Access Without Boundaries
Function
Web 3.0 Software, Web Service Platform
Gladinet as Personal Software
a: Integrates web storage/applications to your desktop. Web Applications Made Local.
b: Connects your computers together to share files and services.
c: Share your files with friends.
Gladinet as Service Platform
a: A platform for different cloud services to interact with each other.
b: A platform for end users like you to access online data and services directly from Windows® Operating System instead of from a Browser.
c: A platform for service providers to deliver and integrate services to your desktop"
reddit.com: what's new online!
fefoo search app
fallon_300x250_map_working_tex
Wednesday, August 12, 2009
My Way News - Review: Password management eases with Net storage
Tuesday, August 04, 2009
Understanding Linux CPU Load - when should you be worried?
Saturday, August 01, 2009
Feature Column from the AMS
In a similar way, singular value decompositions can be used to detect groupings in data, which explains why singular value decompositions are being used in attempts to improve Netflix's movie recommendation system. Ratings of movies you have watched allow a program to sort you into a group of others whose ratings are similar to yours. Recommendations may be made by choosing movies that others in your group have rated highly."
Friday, July 31, 2009
Q&A With Intel CEO Otellini: All About the Chip at SmartMoney.com
But at the end of the day, we want computing to be like Star Trek, right?
Wednesday, July 29, 2009
Greg Fish - World of Weird Things - How order comes from chaos - True/Slant
Technology@Intel · Why would a 32GB SSD cost more than an 80GB SSD?
Intel Contracts TSMC to Make Langwell Chipsets | CENS.com - The Taiwan Economic News
Partial Penetrance - How Evolutionary 'Leaps' Might Have Happened
Qualitative changes from one form to another can proceed through changes in the relative frequencies—or penetrance—of those forms
Tuesday, July 28, 2009
Monster Merger: IBM Buys SPSS For Approx. $1.2 Billion In Cash Deal
IBM says it will continue to support and enhance SPSS technologies while allowing customers to take advantage of its own product portfolio. SPSS will become part of the Information Management division within the Software Group business unit, led by Ambuj Goyal, General Manager, IBM Information Management.
Saturday, July 25, 2009
Why Do We Rape, Kill and Sleep Around? | Print Article | Newsweek.com
quote
-evangelist Tony Alamo found guilty of taking girls as young as 9 across state lines for sex
Wednesday, July 22, 2009
First Concert at Camelback Ranch – Glendale Features Bob Dylan, John Mellencamp & Willie Nelson | Camelback Ranch - Glendale: Spring Training Home of the Los Angeles Dodgers and Chic
Quote Details: M. Cartmill: As an adolescent I... - The Quotations Page
M. Cartmill"
Tuesday, July 21, 2009
Apple drops to 5th position in US computer sales
DBMS Musings: Announcing release of HadoopDB (longer version)
TechCrunch publishes 'hacked' Twitter secrets | News | News.com.au
It reported that a hacker had gained 'easy access' to hundreds of pieces of internal Twitter information - from pass codes to meeting minutes to job interviews - and then forwarded all of the data to the news website.
'We are going to release some of the documents showing financial projections, product plans and notes from executive strategy meetings,' TechCrunch founder and co-editor Michael Arrington said."
The Gap Widens in Online Population - Digits - WSJ
Monday, July 20, 2009
Metamagician and the Hellfire Club: More on H.E. Baber's piece in The Guardian
The Technium: Increasing Diversity
The Technium: Was Moore's Law Inevitable?
The picture of their exponential growth parallels the integrated circuit in every way except their slope — the rate at which they are speeding up. Why is the doubling period in one technology eight years versus two? Isn't the same finance system and expectations underpinning them?"
Tom Paine's Ghost
Sunday, July 19, 2009
Roger Ebert's Journal: Archives
Sunday, July 05, 2009
Paul Begala: Sarah Palin Turns Pro
Saturday, July 04, 2009
Summer reading: Killer thrillers | Salon Books
Carrie Fisher, "Wishful Drinking" | Salon Books
Friday, July 03, 2009
The Daily Dish | By Andrew Sullivan
Part of Sarah Palin's irresistible appeal to her fundamentalist base is her ability to look at the camera with utter conviction and declare black to be white.
The ability to lie well is a valuable part of the fundamentalist psychology. My son isn't gay, he just hasn't found the right woman! Those rocks aren't 50 million years old, they just look like it as a test of our faith! My sexless marriage isn't foundering, it is filled with God's spirit! The minister isn't molesting little Maria, they're just very close! It isn't torture, it is being tough on terrorists!
Fundamentalists can recognize a truly audacious and talented liar from miles away. Instead of running the other way, as you might expect, they gather around the powerful liar, for they know that their own lies will be respected and protected by a leader who understands the paramount importance of preserving their whole system of denial.
Science, religion and our shared future | Madeleine Bunting | Comment is free | guardian.co.uk
which is an unknowing,
it is the way of transparent knowing,
it is the way of unselfconsciousness.
When you learn this,
you can learn everything,
and return to everything,
and praise everything'
translation: if you forget the things you know based on evidence, you will be able to believe in anything, and it will give you the illusion of knowing everything."
Resp:
And if you don't understand the point Eckhart was making about 'transformed knowledge' being an 'unknowing', then it might be a good idea to actually study Eckhart seriously. And I would also point you to the sources of information that I suggested to Foolfodder. Once you've got a good grasp of the subject matter then you might actually be in a position to debate it seriously.
I wouldn't dare to rubbish the fundamental tenets of mathematics or physics because quite frankly my understanding of it is limited. But you feel that it is perfectly valid to throw around cynical, ignorant comments about things you clearly don't grasp.
Quotations
Martha Nussbaum
--Cultivating Humanity"
About Butterflies and Wheels
Tuesday, June 30, 2009
how accommodating can you get? « weird things
The conflict between the two spheres happens when scientists discover something that contradicts religious dogma and the people who rigidly follow their holy texts mount a campaign to defend their worldview from the new information. Do you honestly think that fundamentalists are interested in broadening their horizons when their primary concern is to make sure everyone around them does as they say? In the supposed war between science and religion, the actual facts take a back seat. Rather, the debate is about whether we could pick and choose our personal worldview regardless of the facts. Creationists aren’t mad because they did a study that found major contradictions in evolutionary biology. They’re mad because scientists dare to tell the world about evolution and use facts they passionately want to ignore to teach this knowledge in schools.
Monday, June 29, 2009
Stephen Jay Gould, "Nonoverlapping Magisteria," 1997
I believe, with all my heart, in a respectful, even loving concordat between our magisteria—the NOMA solution. NOMA represents a principled position on moral and intellectua] grounds, not a mere diplomatic stance. NOMA also cuts both ways. If religion can no longer dictate the nature of factual conclusions properly under the magisterium of science, then scientists cannot claim higher insight into moral truth ...
The Censorship Canard, Again | The Intersection | Discover Magazine
I’d be happy to defend the position that science has plenty to tell us about how our actual behavior actually affects other people and ourselves. And how science can help us peer into moral gray areas. And tell us about how we make moral judgments in reality, and how that might contrast with how we think we should be making moral judgments. And how are supposed values line up with how the world actually is. And how knowing how the world actually is can help us make better value judgments, and help set priorities among competing values, and how realistic or arbitrary our values are, and so on."
Metamagician and the Hellfire Club
Seeing and Believing
Scientists do indeed rely on materialistic explanations of nature, but it is important to understand that this is not an a priori philosophical commitment. It is, rather, the best research strategy that has evolved from our long-standing experience with nature. There was a time when God was a part of science. Newton thought that his research on physics helped clarify God's celestial plan. So did Linnaeus, the Swedish botanist who devised our current scheme for organizing species. But over centuries of research we have learned that the idea "God did it" has never advanced our understanding of nature an iota, and that is why we abandoned it. In the early 1800s, the French mathematician Laplace presented Napoleon with a copy of his great five-volume work on the solar system, the Mechanique Celeste. Aware that the books contained no mention of God, Napoleon taunted him, "Monsieur Laplace, they tell me you have written this large book on the system of the universe, and have never even mentioned its Creator." Laplace answered, famously and brusquely: "Je n'avais pas besoin de cette hypothese-la," "I have had no need of that hypothesis." And scientists have not needed it since.
...
Perhaps what we mean by "religious truths" are "moral truths," such as "Thou shalt not commit adultery." These rules are not subject to empirical testing, but they do comport with our reasoned sense of right and wrong. But for almost every "truth" such as this there is another one believed with equal sincerity, such as "Those who commit adultery should be stoned to death." This dictum appears not only in Islamic religious law, but in the Old Testament as well. (It seems wrong, by the way, to call these truths religious. Beginning with Plato, philosophers have argued convincingly that our ethics come not from religion, but from a secular morality that develops in intelligent, socially interacting creatures, and is simply inserted into religion for convenient citation.)
In the end, then, there is a fundamental distinction between scientific truths and religious truths, however you construe them. The difference rests on how you answer one question: how would I know if I were wrong? Darwin's colleague Thomas Huxley remarked that "science is organized common sense where many a beautiful theory was killed by an ugly fact." As with any scientific theory, there are potentially many ugly facts that could kill Darwinism. Two of these would be the presence of human fossils and dinosaur fossils side by side, and the existence of adaptations in one species that benefit only a different species.