Saturday, August 29, 2015

Disk Space Analysers SpaceSniffer, WinDirStat #vmvwiki #vmvhw


Is a freeWare (donations are welcome) and portable tool application that lets you understand how folders and files are structured on your disks. By using a Treemap visualization layout, you have immediate perception of where big folders and files are placed on your devices.


WinDirStat is an open source disk usage statistics viewer and cleanup tool for various versions of Microsoft Windows

BTW JJ (Hardware/Software guru ) prefers SpaceSniffer

Thursday, August 27, 2015

Myo - Gesture control Armband #vmvwiki

Take control of video and music playback, fly drones, deliver presentations, play games, and much more. Myo is a gesture control armband that works out of the box with Mac, Windows PC, iOS, and Android devices.

Why I don't use the library? #vmvwiki #vmvresearch

A presentation summary (not an academic research article). Describes  a framework to be used by post-graduate students in their initial engagement with the literature, and speculates on the role of the librarian or information specialist in a technology-rich environment.


Tuesday, August 25, 2015

Saturday, August 22, 2015

Ashley Madison docs 33m cust accounts 36m emails #vmvwiki

More than 33 million accounts and 36 million email addresses were included in the cache, making it one of the largest leaks of customer data in history.

For a New Zealand perspective (and a map)

Wednesday, August 19, 2015

#Ionic: Advanced HTML5 Hybrid Mobile App Framework #vmvwiki

Create open source front-end Software Development Kit (SDK) for developing amazing mobile apps with web technologies.

Friday, August 7, 2015

Two Apple Mac viruses found #vmvwiki

Two Mac viruses strike at the heart of the platform's secure image. ‘Thunderstrike 2’, a worm which moves from Macbook to Macbook using hardware, joins privilege escalation bug seen in the wild for the first time

One exploit allows a malicious program that gains access to a Mac to run as though it is the administrator of the computer – a vulnerability known as “privilege escalation”.
The second about to be revealed to researchers at the Black Hat security conference in Las Vegas. It uses a bundle of weaknesses in the firmware of a computer, the embedded operating system which runs the lowest-level functions such as fans, power supply units, and USB ports, and lets the researchers overwrite that software with their own code, and five of these six weaknesses are present on Macs as well as PCs.

Saturday, August 1, 2015

Aquila Facebook's Internet Drone Set For Flight Testing #vmvwiki

Facebook looks to getting Internet to the 10% without internet infrastructure. Solar powered 42m wide unmanned plane (flying wing) and lighter than a Prius running Internet from Sky... Communicating over 10Gb and connecting an array of planes via lasers.