SpaceSniffer
Is a freeWare (donations are welcome) and portable tool application that lets you understand how folders and files are structured on your disks. By using a Treemap visualization layout, you have immediate perception of where big folders and files are placed on your devices.
http://www.uderzo.it/main_products/space_sniffer/
WinDirStat
WinDirStat is an open source disk usage statistics viewer and cleanup tool for various versions of Microsoft Windows
http://windirstat.info/
BTW JJ (Hardware/Software guru ) prefers SpaceSniffer
Michael's Blog for eLearning, gxLearning, Digital Learning Technology, Web Design, Teaching and Learning, and random stuff.
Saturday, August 29, 2015
Thursday, August 27, 2015
Myo - Gesture control Armband #vmvwiki
Take control of video and music playback, fly drones, deliver presentations, play games, and much more. Myo is a gesture control armband that works out of the box with Mac, Windows PC, iOS, and Android devices.
https://www.youtube.com/watch?v=te1RBQQlHz4
https://www.youtube.com/watch?v=te1RBQQlHz4
Why I don't use the library? #vmvwiki #vmvresearch
A presentation summary (not an academic research article). Describes a framework to be used by post-graduate students in their initial engagement with the literature, and speculates on the role of the librarian or information specialist in a technology-rich environment.
http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1983&context=iatul
http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1983&context=iatul
Tuesday, August 25, 2015
2015 Gartner Hype Cycle #vmvwiki
2015 Gartner IT Hype Cycle has been released last week. Internet of Things is the biggest hype, as well as other things:
http://www.gartner.com/newsroom/id/3114217
http://na2.www.gartner.com/imagesrv/newsroom/images/emerging-tech-hc.png;wa0131df2b233dcd17
EE
http://www.gartner.com/newsroom/id/3114217
http://na2.www.gartner.com/imagesrv/newsroom/images/emerging-tech-hc.png;wa0131df2b233dcd17
EE
Saturday, August 22, 2015
Ashley Madison docs 33m cust accounts 36m emails #vmvwiki
More than 33 million accounts and 36 million email addresses were included in the cache, making it one of the largest leaks of customer data in history.
http://www.dailydot.com/politics/ashley-madison-confidential-documents/
For a New Zealand perspective (and a map)
http://www.nzherald.co.nz/technology/news/article.cfm?c_id=5&objectid=11500605
Thursday, August 20, 2015
25 most popular mobile apps in America for 2015 #vmvwiki
Three of top 10 apps owned by Facebook, 5 by Google in 2015
http://qz.com/481245/these-are-the-25-most-popular-2015-mobile-apps-in-america/
http://qz.com/481245/these-are-the-25-most-popular-2015-mobile-apps-in-america/
Wednesday, August 19, 2015
#Ionic: Advanced HTML5 Hybrid Mobile App Framework #vmvwiki
Create open source front-end Software Development Kit (SDK) for developing amazing mobile apps with web technologies.
http://ionicframework.com/
http://ionicframework.com/
Friday, August 14, 2015
Spark and Putti help SMEs go mobile #vmvwiki
Kiwi company Putti allows you to “build your own” mobile-responsive website builder
http://www.sparknz.co.nz/news/putti-helps-smes/
http://www.sparknz.co.nz/news/putti-helps-smes/
- introduction: http://www.spark.co.nz/business/discover/putti-mobile-apps
- Sign up and intro tutorial: http://tutorials.puttiapps.com/putti-signup-and-overview-tutorial/
Friday, August 7, 2015
Two Apple Mac viruses found #vmvwiki
Two Mac viruses strike at the heart of the platform's secure image. ‘Thunderstrike 2’, a worm which moves from Macbook to Macbook using hardware, joins privilege escalation bug seen in the wild for the first time
One exploit allows a malicious program that gains access to a Mac to run as though it is the administrator of the computer – a vulnerability known as “privilege escalation”.
The second about to be revealed to researchers at the Black Hat security conference in Las Vegas. It uses a bundle of weaknesses in the firmware of a computer, the embedded operating system which runs the lowest-level functions such as fans, power supply units, and USB ports, and lets the researchers overwrite that software with their own code, and five of these six weaknesses are present on Macs as well as PCs.
http://www.theguardian.com/technology/2015/aug/04/mac-viruses-strike-secure-thunderstrike-2
One exploit allows a malicious program that gains access to a Mac to run as though it is the administrator of the computer – a vulnerability known as “privilege escalation”.
The second about to be revealed to researchers at the Black Hat security conference in Las Vegas. It uses a bundle of weaknesses in the firmware of a computer, the embedded operating system which runs the lowest-level functions such as fans, power supply units, and USB ports, and lets the researchers overwrite that software with their own code, and five of these six weaknesses are present on Macs as well as PCs.
http://www.theguardian.com/technology/2015/aug/04/mac-viruses-strike-secure-thunderstrike-2
Saturday, August 1, 2015
Aquila Facebook's Internet Drone Set For Flight Testing #vmvwiki
Facebook looks to getting Internet to the 10% without internet infrastructure. Solar powered 42m wide unmanned plane (flying wing) and lighter than a Prius running Internet from Sky... Communicating over 10Gb and connecting an array of planes via lasers.
Http://www.intrrnet.org
https://m.youtube.com/watch?v=NWeKoIL6r1M
Http://www.intrrnet.org
https://m.youtube.com/watch?v=NWeKoIL6r1M
Subscribe to:
Posts (Atom)