Archive for the ‘Internet’ Category

Facebook’s vast Hadoop clusters

Facebook uses Hadoop to gain information about their members. It helded the second biggest Hadoop database behind Yahoo! [4] By May 2010 Facebook got a bigger Hadoop Cluster than Yahoo! [2] Google is not know to use Hadoop. Because it is an opponent product to GFS and Googles BigTable. Apache Hadoop has been voted being […]

Apache Hadoop is top innovator 2011

Congratulations to Apache Hadoop: they’re voted to be the innovator of 2011. The decision was justified Hadoop allows to discover and manipulate a huge amount of data. So Hadoop is the “Swiss Army knife for the 21st century.” [5] 

Think Quarterly

Google just launched a new magazine to reflect the passed three months. It is simple, easy-to-read, and beautiful. The mag follows a minimalistic presentation style. This is known from Japan and called Zen. The design is made by The Church Of London – a creative design team. Google does not made a big deal out of […]

App Store: Opera not until you’re 17

Opera is one of the top five used browsers in the world. Many people love it and use it. Now Opera is available in the Mac App Store – but only if you’re at least 17 years old. The editors from Apple rated the App to be not free to the youth. The reason is […]

What Careless Computing is

Careless Computing is a phenomena we see nowadays more and more often. The omnipresence of computers and the Internet provides the growing of Careless Computing because people are persuaded to save their data on foreign servers instead of local. [1]

Expatrias to be more creative

A new study processed by Harvard Business Manager (HBM) shows that people who studied or worked in a foreign country are in general more innovative. These people are better in Lateral Thinking and see things a more practical way. [1] Interesting about another study: what distinguishes us from the primates is that primates use utilities […]

Apple stops Jailbreak recognition

MacLife.de [1] reported that Apple deactivated the Jailbreak API on iPhones using iOS 4.2. This API (Application Programmer’s Interface – it’s the interface or “framework” deveopers use to access the underlaying software) is used by application developers and enterprises to check if the iPhone was “modded.” A modded iPhone can run custom firmware that allows […]

Lateral approach in web mining

These days the news is current: 46 of the 50.000 most popular websites are sniffing your browsers history [1]. The approach making this security vulnerability is simple and possible – a real lateral approach. The browser has a list of URL’s to check to be previously visited. The links are written on the website on the […]

Steve Jobs most popular CEO

On December 1, 2010, employees of Apple, Facebook, Google, Microsoft and Yahoo! were asked about their own CEOs and their opinion on them. The result is very clear: first place is Apple’s CEO. Then follows Facebook’s Mark Zuckerberg, followed by Google’s Eric Schmidt. The surprising thing about the survey: Yahoo!’s Carol Bartz is more popular […]

Slow computers to be more secure

A new approach in virus threads has been detected: viruses may not infect computers with lower clock rates than approximately 2 GHz. In a test a laptop having a 1.86 GHz processor from IBM the system has not been affected. [1, 2] As Heise.de [1] reported the virus code in assembler has been analyzed. The […]