Dec 8, 2010

Street View in Romania

Street View in Romania: "
Bram Stoker’s world famous novel Dracula was believed to have been inspired by fifteenth century Wallachian Prince, Vlad Dracul from Romania (better known to many as Vlad the Impaler). The legend of the vampire is still deeply rooted in Transylvanian culture today, and tourists from across the world come to explore the history and mystery of the many beautiful castles that can be found here.

But of course those aren’t all the sights Romania has to offer, and now you can see for yourself, because today we’re making 360-degree Street View imagery available in Romania for several cities and roads.

From your virtual vantage point, you can now take a look over the bridge onto Lacul Vidraru (Vidraru Lake). This is the starting point of the most beautiful road in Romania, the Transfăgărășan mountain pass, which at its highest point reaches 2,034 meters above sea level:



Or check out the summer residence of Romanian Kings, Castelul Peleș (Peleș Castle):



It’s not just Paris that has an Arc de Triomphe. You can whizz round the Romanian
Arcul de Triumf in the capital Bucharest:



And here’s our parliamentary palace, Palatul Parlamentului (Parliament Palace):



There’s heaps to explore but I’ll leave you with one final tip, and that’s to visit
Vatra Ardealului, my favorite cofee shop in Brasov, which you can see below:



Welcome to Romania and enjoy your virtual exploration!

Posted by Octavian Iercan, Operations Lead, Street View Europe


"

Jul 6, 2010

World champ Semenya cleared to return

The Associated Press: World champ Semenya cleared to return

Caster Semenya was cleared to immediately return to track by the sport's governing body Tuesday, ending an 11-month layoff while she underwent gender tests after becoming the 800-meter world champion. The International Association of Athletics Federations said medical details of the 19-year-old South African's case would remain confidential and it will have no further comment on the matter.

Jun 5, 2010

A Closer Look at ZFS, Vdevs and Performance

A Closer Look at ZFS, Vdevs and Performance: "
vdevs.jpg

When looking at the mails and comments I get about my ZFS optimization

and my RAID-Greed posts, the same type of questions tend to pop up over and over again. Here's an example from a reader email:



'I was reading about ZFS on your blog and you mention that if I do a 6 drive array for example, and a single RAID-Z the speed of the slowest drive is the maximum I will be able to achieve, now I thought that ZFS would be better in terms of speed. Please let me know if there is a newer ZFS version that improved this or if it does not apply anymore.'



This is just an example, but the basic theme is the same for much for the reactions I see: Many people think that RAID-Z will give them always good performance and are surprised that it doesn't, thinking it's a software or a ZFS issue.

In reality, it's just pure logic and physics, and to understand that we should look a little closer at what vdevs are in ZFS and how they work.

What is a Vdev?


Another reader pointed out that I should define vdevs as short and simple as possible, so here we go:

A ZFS vdev (aka 'virtual device') is either:

  • a single disk, or
  • two or more disks that are mirrored, or
  • a group of disks that are organized using RAID-Z.

There are also special kinds of vdevs like hot-spares, ZIL or cache devices, etc. but we'll leave that to another post. Look up the full definition in the zpool (1M) man page.

So there you have it: A disk, a mirror or a RAID-Z group.

A ZFS pool is always a stripe of one or more vdevs that supplies blocks for your ZFS file systems to store data in.

Apr 19, 2010

Digi Net Mobil finally at home

As a follow-up from my previous post

finnally i got one now.. it's like this:

speed.. well it's not 7.2 .. but i't arount 2mB/s .. well not so good but im sure it'll improve.


here's the coverage map not that bad too..



PS: works ok on linux

UPDATE:

some pics:



Apr 15, 2010

A common conversation on Facebook (-like) site

I get a mail from Facebook:
"Boglarka Vasilovici added you as a friend on Facebook..."

I have no idea who she is.. i check her profile .. we have 1 friend in common.
just in case I sent her a message..

"- Do I know you?
 - It's unlikely...
 - .. And you know me? or why do you added me?
 - 'coz we have a friend in common
blablabla "

I dont get it .. I mean of course I have "friends" who I dont know personally or talked only a few times.. but this is far from everything

Mar 24, 2010

Dacia Duster vs. Dacia Duster

I hope that there will be a two-door "sport" version of Dacia Duster... because the "normal" one looks like ubuntu...


Mar 21, 2010

OpenSSO thoughts

I'm quite sad since Oracle bought Sun (who ain't?).. and many ppl pre-assumed that Oracle will shutdown some Sun stuff..

So... they removed OpenSSO from the download site, but being an opensource project it can't be killed.

The reason for the shutdown is that Oracle has its own Identity Managment software and probably it's better than OpenSSO.

Anyway ForgeRock "forked" OpenSSO under OpenAM name, so it doesn't get lost.

links:
Oracle Identity Manager
h-online article
OpenAM

PS: It seems that Oracle is not really community oriented.. I think that instead of killing OpenSSO it would have been better if they *give* OpenSSO to the community.

We'll see what will happen next..

Mar 6, 2010

SLS AMG will be the Safety Car in Formula One

SLS AMG is the awesome... don't know what to say else

some reading here

videos:

The Fast and The Famous, starring Jay Leno:



Michael Schumacher driving the SLS AMG:



SLS AMG Safety Car Presentation:

Feb 5, 2010

OpenSolaris Text installer screenshots part #2

Susan Sohn announced text-based installer media for b131.

what changed since the last release?
* supports SPARC/x86
* 512 MB minimum memory requirement
* cpio based install
* installs basic headless server environment (no Gnome Desktop)
* tip/serial line install recommended for SPARC
visual changes:
color :), they removed warnings (ex. when *destroying* the disk) probably they will add them back + here are the screenshots about the important steps:
001
002

Jan 13, 2010

A new approach to China

A new approach to China: "Like many other well-known organizations, we face cyber attacks of varying degrees on a regular basis. In mid-December, we detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google. However, it soon became clear that what at first appeared to be solely a security incident--albeit a significant one--was something quite different.

First, this attack was not just on Google. As part of our investigation we have discovered that at least twenty other large companies from a wide range of businesses--including the Internet, finance, technology, media and chemical sectors--have been similarly targeted. We are currently in the process of notifying those companies, and we are also working with the relevant U.S. authorities.

Second, we have evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists. Based on our investigation to date we believe their attack did not achieve that objective. Only two Gmail accounts appear to have been accessed, and that activity was limited to account information (such as the date the account was created) and subject line, rather than the content of emails themselves.

Third, as part of this investigation but independent of the attack on Google, we have discovered that the accounts of dozens of U.S.-, China- and Europe-based Gmail users who are advocates of human rights in China appear to have been routinely accessed by third parties. These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users' computers.

We have already used information gained from this attack to make infrastructure and architectural improvements that enhance security for Google and for our users. In terms of individual users, we would advise people to deploy reputable anti-virus and anti-spyware programs on their computers, to install patches for their operating systems and to update their web browsers. Always be cautious when clicking on links appearing in instant messages and emails, or when asked to share personal information like passwords online. You can read more here about our cyber-security recommendations. People wanting to learn more about these kinds of attacks can read this U.S. government report (PDF), Nart Villeneuve's blog and this presentation on the GhostNet spying incident.

We have taken the unusual step of sharing information about these attacks with a broad audience not just because of the security and human rights implications of what we have unearthed, but also because this information goes to the heart of a much bigger global debate about freedom of speech. In the last two decades, China's economic reform programs and its citizens' entrepreneurial flair have lifted hundreds of millions of Chinese people out of poverty. Indeed, this great nation is at the heart of much economic progress and development in the world today.

We launched Google.cn in January 2006 in the belief that the benefits of increased access to information for people in China and a more open Internet outweighed our discomfort in agreeing to censor some results. At the time we made clear that 'we will carefully monitor conditions in China, including new laws and other restrictions on our services. If we determine that we are unable to achieve the objectives outlined we will not hesitate to reconsider our approach to China.'

These attacks and the surveillance they have uncovered--combined with the attempts over the past year to further limit free speech on the web--have led us to conclude that we should review the feasibility of our business operations in China. We have decided we are no longer willing to continue censoring our results on Google.cn, and so over the next few weeks we will be discussing with the Chinese government the basis on which we could operate an unfiltered search engine within the law, if at all. We recognize that this may well mean having to shut down Google.cn, and potentially our offices in China.

The decision to review our business operations in China has been incredibly hard, and we know that it will have potentially far-reaching consequences. We want to make clear that this move was driven by our executives in the United States, without the knowledge or involvement of our employees in China who have worked incredibly hard to make Google.cn the success it is today. We are committed to working responsibly to resolve the very difficult issues raised.

Posted by David Drummond, SVP, Corporate Development and Chief Legal Officer


"

Mocăniţa CFF Vişeu de Sus