Skip to main content

Guy Kawasaki's AllTop selects Avastu Blog on Cloud Computing!

Avastu as in my blog ;-)

So here's returning the favor and letting ye all know that we're gonna kick ass together and ride together into the next decade, a new era , (much professed by me only as of yet, aren't investors listening???) the Ideation-Age.

Alltop, all the top stories

Guy's email:

We recently added your site to Alltop (http://cloudcomputing.alltop.com/). Alltop is an "online magazine rack" that aggregates RSS feeds about popular topics.

If Alltop is slow or down, please keep trying because we often get hammered by traffic. We'd appreciate your help in getting critical mass for Alltop.

1) Mention us on your site. I hope that you will share Alltop with your readers by writing about your site's inclusion—even the shortest blog post or news item will help.

2) Display our badge. Hundreds of our member sites display our badges, and we'd be honored if you did so too. In fact, we serve approximately 250,000 badges per day. They are available at http://badges.alltop.com/.

3) Add an Alltop widget to your site. Our widget displays the top five stories of the day for any chosen topic. This is a way to easily add comment to your sidebar. You can get the widget code here: http://alltop.com/widget/

3) Tweet our updates. if you're a Twitter user, retweeting our Alltop announcements is a tremendous help. Whenever we announce something, you can automatically tweet our posting by going here: https://twitterfeed.com/alltop

If your readers think there are too many feeds, they can click on the "x" to hide some. We're always open to adding more high-quality feeds too. Please let me know your thoughts.

Thanks,

Guy Kawasaki

Ps, if your feed ever disappears from Alltop, please validate that it's still working here: http://validator.w3.org/feed/. We seldom remove feeds.

Thanks,

Guy Kawasaki

Nononina, Inc.

360 Bryant Street, Suite 100

Palo Alto, CA 94301

http://alltop.com/

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op