Category: Technology
-
Open Source Facial Recognition
Following Facebook’s Shut Down Of Face.com’s Facial Recognition API, Lambda Labs Debuts An Open Source Alternative. Free to use, and Open Source? Very cool, but I doubt that’ll work out financially, unless the guys have very soon have very deep pockets, or a credible products that larger companies will want to pay money for. Good…
By
·
-
How Android has evolved while steering clear of Apple’s designs
How Android has evolved while steering clear of Apple’s designs. Nice history of Android design decisions and changes, both Android SW and Nexus HW.
By
·
-
VMware’s OpenStack Hook-up
Some good commentary about Vmware joining OpenStack: VMware’s OpenStack Hook-up.
By
·
-
The Bernie Madoffs of Bitcoin
There was a bit of background story on BitCoin last week that was probably more interesting than the BitCoin debit card rumours… The market for Bitcoin — the digital currency of choice for the tech-savvy libertarian set — is hot again. The price of the popular online currency has steadily risen over the last six…
By
·
-
For fast, interactive Hadoop queries, Drill may be the answer
Drill is Apache’s Dremel. In the era of big data, there is increasing demand for ever-faster ways to analyze — preferably in an interactive way — information sitting in Hadoop. Now the Apache Foundation is backing an open-source version of Dremel, the tool Google uses for these jobs, as a way to bring that speedy…
By
·
-
Twitter Has Been Shredded Into Slices
I was excited about Slices, a Twitter client which – I hoped – would allow me to read my feed by topic of interest. Unfortunately I found out, after trying its desktop client now, that it only knows how to put known accounts into categories. It doesn’t work with 98% of the accounts I follow,…
By
·
-
NoSQL Data Modeling Techniques
Data modeling reference for NoSQL, good stuff! In this article I provide a short comparison of NoSQL system families from the data modeling point of view and digest several common modeling techniques. via NoSQL Data Modeling Techniques « Highly Scalable Blog.
By
·
-
Two-Step Verification Dances Around the Issue
Given this problem… Even with two factor authentication, you need a mechanism to reset if you forget your password and/or lose your second factor (whatever that is). …the guys at CryptoPhoto came up with a neat idea: have another factor authenticate you in case you lose access to one of your first two. Kinda like…
By
·
-
Five different kinds of business intelligence
Monash’s five kinds of BI: Real-time BI (preferably with a modifier such as “quasi” or “human”) Tactical BI (or task-oriented/-centric) Investigative BI (or exploratory) Traditional BI (which is lame) Third-party BI via Five different kinds of business intelligence.
By
·