| |
Current Topic: Technology |
|
Cisco 1800 Series Integrated Services Routers - Products & Services - Cisco Systems |
|
|
Topic: Technology |
3:25 am EDT, Oct 9, 2005 |
Cisco� 1800 Series integrated services routers intelligently embed data, security, and wireless technology into a single, resilient system for fast, secure, delivery of mission-critical business applications to small-to-medium sized businesses and small branch offices.
Cisco 1800 Series Integrated Services Routers - Products & Services - Cisco Systems |
|
Topic: Technology |
3:09 am EDT, Oct 9, 2005 |
FastAccess Business Speed 768 is engineered to maximize availability and preserve speeds of 768Kbps downstream x 512Kbps upstream to and from your router. This offering is well suited for server hosting, such as Web hosting or e-mail hosting. Additionally, this product can be used for applications requiring uploading of large files such as managing an e-commerce Web site.
This is apparently the best DSL offered to business, for streaming of the data. BellSouth 768/512 DSL |
|
Topic: Technology |
11:49 pm EDT, Oct 8, 2005 |
Gmail is the bomb. Sometimes I wonder what they are doing with all my email, though. Gmail - Inbox |
|
GnoTime - The Gnome Time Tracker |
|
|
Topic: Technology |
11:31 pm EDT, Oct 4, 2005 |
GnoTime - The Gnome Time Tracker The Gnome Time Tracker is a to-do list/diary/journal tool that can track the amount of time spent on projects, and, among other things, generate reports and invoices based on that time. It's being used it to keep shopping lists, organize ideas, track bug reports, keep a diary of activities, do some blogging, provide weekly status reports to management, and even as a consultant billing system. The reason it can be used for all of these things is that it supports five basic, simple features:
Remind me to gut this. GnoTime - The Gnome Time Tracker |
|
SourceForge.net: Project Info - synergy |
|
|
Topic: Technology |
2:02 pm EDT, Oct 2, 2005 |
Synergy lets you easily share a single mouse and keyboard between multiple computers with different operating systems without special hardware. It's intended for users with multiple computers on their desk since each system uses its own display. Development Status: 5 - Production/Stable Intended Audience: Developers, End Users/Desktop License: GNU General Public License (GPL) Operating System: All 32-bit MS Windows (95/98/NT/2000/XP), All POSIX (Linux/BSD/UNIX-like OSes), Linux, Solaris Programming Language: C Topic: Desktop Environment Translations: English User Interface: Win32 (MS Windows), X Window System (X11)
Looks pretty cool... SourceForge.net: Project Info - synergy |
|
JPOX Java Persistent Objects JDO |
|
|
Topic: Technology |
2:00 am EDT, Oct 1, 2005 |
JPOX is a free and fully compliant implementation of the JDO 1.0 and 2.0 specifications, providing transparent persistence of Java objects. It supports persistence to all of the major RDBMS on the market today, supporting all of the main Object-Relational Mapping (ORM) patterns demanded by today's applications, allows querying using either JDOQL or SQL, and comes with its own byte-code enhancer. JPOX is available under an Open Source Apache 2 license, allowing access to not just a top quality Java persistence implementation but also to the source code, allowing you to contribute to the success story of the principal Open Source JDO implementation in the world today. JPOX 1.0 implements the JDO 1 specification and passes the JDO 1 TCK. JPOX 1.1 (currently under development) extends the JPOX 1.0 capabilities to implement the JDO 2 specification. JPOX 1.1 will become the JDO 2 Reference Implementation with its 1.1-final release. JPOX will be updated in future to also implement any EJB3 specification of Java persistence.
JPOX Java Persistent Objects JDO |
|
Topic: Technology |
1:58 am EDT, Oct 1, 2005 |
Supported EMF Features The current version of the EMF - JPOX integration supports the following EMF Features: All relevant primitive types (including Date) Lists of primitive types (EDataTypeEList) Single Reference: contained, non-contained, one-way, two-way One-To-Many relations (EList): contained, non-contained, one-way, two-way Many-to-Many relations (EList): contained and non-contained, one-way, two-way Notifications and adapters (limited testing done) Enumerations Resource implementations Lazy loading (similar to EMF proxy feature) Dynamic api Inheritance between types No dependencies on EObjectImpl as root object or specific root object for persistency: EMF Objects are only required to implement org.eclipse.emf.ecore.InternalEObject Support for EMF Feature Map as described here
JPOX/EMF |
|
Topic: Technology |
9:06 pm EDT, Sep 30, 2005 |
What is EMF? EMF consists of three fundamental pieces: EMF - The core EMF framework includes a meta model (Ecore) for describing models and runtime support for the models including change notification, persistence support with default XMI serialization, and a very efficient reflective API for manipulating EMF objects generically. EMF.Edit - The EMF.Edit framework includes generic reusable classes for building editors for EMF models. It provides Content and label provider classes, property source support, and other convenience classes that allow EMF models to be displayed using standard desktop (JFace) viewers and property sheets. A command framework, including a set of generic command implementation classes for building editors that support fully automatic undo and redo. EMF.Codegen - The EMF code generation facility is capable of generating everything needed to build a complete editor for an EMF model. It includes a GUI from which generation options can be specified, and generators can be invoked. The generation facility leverages the JDT (Java Development Tooling) component of Eclipse.
I think EMF is pretty cool. I draw a simple class diagram in Omondo (www.omondo.org) and it generates code that handles get/set, change notification, object persistance in XML via SDOs (you can change this to an RDB without messing with your model), and an editing framework with undo/redo. Or generate your model from a set of get functions, and it will code gen from that too. Or import rational rose models. Or write the XML yourself if you're a masochist. As used in IBM's WebSphere. Goes great with GEF (graphical editing framework) as detailed for 2.1 Eclipse at http://publib-b.boulder.ibm.com/Redbooks.nsf/RedbookAbstracts/sg246302.html?Open Eclipse Tools - EMF Home |
|
Bill Cheswick - Tunnelling Windows services: a solution |
|
|
Topic: Technology |
10:30 pm EDT, Sep 29, 2005 |
Tunnelling Windows services I've had quite a bit of feedback concerning this problem and proposed solutions. In fact, some have declared it solved, though I have not been able to make the ssh solution work for me. stunnel William Mark Smith suggested a solution using stunnel. It does seem to work, though I would prefer a simpler putty-based one. putty Joe Conway suggested a putty-based solution with some of Smith's ideas.
Bill Cheswick - Tunnelling Windows services: a solution |
|
Bill Cheswick - Tunnelling Windows services |
|
|
Topic: Technology |
10:30 pm EDT, Sep 29, 2005 |
Tunnelling Windows services to remote secured hosts Here is an interesting security problem I have been fighting with. It involves Microsoft software and a firewall I don't control, and my efforts to fashion a secure solution with and in spite of these things. If anyone has suggested solutions, I would welcome them. If not, it would be nice to identify specific improvements that would solve the problems. The Problem: tunnelling Windows smb service. A remote computer, behind a fairly restrictive firewall, needs to access a local samba server. The samba server provides services on a local, unrouted network by a host that also has server routed network addresses. The file systems served have some sensitive files on them. The samba service is jailed such that a compromise should not threaten the server in a meaningful way. But if the samba server itself has a bug, or the Microsoft smb authentication is weak or sniffed, the files would be exposed, and I would like to avoid that. Therefore, the files are served only on an unrouted local network, to hosts with local addresses. An attacker would have to break into these hosts, and then gain access to the server. This is certainly not impossible, but it is quite a bit harder than a direct attack, and there are intrusion detection systems that are likely to detect the first break-in. Placing the samba server on the external network would be an unacceptible risk, opening it to a variety of attacks and probes. SMB over ssh?
Bill Cheswick - Tunnelling Windows services |
|