Silicon wafers used in computer chipsets (processors) have typically been two dimensional. On May 4, 2011, Intel announced a 3-D transistor technology, called Tri-Gate, that ensures Mooreâ€™s Law, which predicts that chipset transistor density doubles every two years, keeps pace. Dense chipsets allow Intel to pack more computer cycles (with less power usage) onto a single chip. By building above the chipâ€™s surface, Intel can build chipsets that are smaller, faster, and use less power. The Tri-Gate transistors will be used in a line of 22 nanometer processors (code named Ivy Bridge) and ready for production use by 2012.
The following are notes on SharePoint inter-process communications, network communication protocols, ports that SharePoint Server uses during its operation, etc.
The ASP.Net ListView control is a godsend for developers. Drop the control on the form, hook in a datasource, and you have complete, out-of-the-box view, edit, insert, and delete functionality. One thing missing though is a delete confirmation if the user clicks the delete button. The Delete button is right next to the Edit button so itâ€™s fairly easy to mistakenly click it and with an accidental click, the record is permanently deleted with no prompt or warning issued to the user.
One of the most interesting things we saw on our 2001 Southern California vacation was the backlot tour of Universal Studios. Below are pictures I took during the tour of the Universal Studios California Backlot Tour. Tours are given in trams with a guide narrating the scenes. Depending on when you go, areas of the backlot are sometimes closed while they are filming.
Back in the day, I build a level 19 Rogue twink that ruled in the World of Warcraft battlegrounds. Building the twink character was probably as hard or harder than leveling my Hunter to 80. Here are the notes that I gathered and used to level the twink to 19 (with the assistance of my Level 50 Druid and Level 80 Hunter).
My firewall caught some odd injection attempts which lead to research on the intent of the hackers. Turns out it was an attempt to gain Shell access via Local File Inclusion vulnerabilities and injection of malicious code in proc/self/environ. Research lead to the following step-by-step instructions on what was being attempted (listed below).
Using iTalc on your private home network, you can monitor your kidâ€™s activities and keep an eye on what websites they are browsing, what they are doing on social networking sites like Facebook, and even watch as they read their email. There are other tools that offer similar functions such as keylogging tools and web site blockers, but iTalc is a perfect addition to your arsenal of child protection tools.
.htaccess files (or “distributed configuration files”) provide a way to make configuration changes on your Wordpress site on a per-directory basis. A .htaccess file, containing one or more configuration directives, is placed in a particular document directory on your Wordpress site, and the directives apply to that directory, and all subdirectories thereof. Using directives in .htaccess, you can block spam, secure your website, and control other website actions.
Wordpress out of the box is fairly secure but there are still some pretty big holes. In addition, hosting environments and installation requirements often introduce gaping security holes in the Wordpress framework. Below are a few best practices to help secure your Wordpress framework.
I recently moved several WordPress blogs from DreamHost to a new 1and1 Virtual Private Server installation. Here are directions and screenshots of the move along with notes on problems that I ran across (and the resolution I found). I moved from a DreamHost shared host plan that killed scripts when memory consumption exceeded 100MB to a 1and1 VPS solution that provides 4,000MB of burst RAM.