article thumbnail

Social Networking (the Shorter Version) Past, Present, Future

Both Sides of the Table

asymmetry, real-time, curated RSS / link-sharing]. What I realized in working with so many startup technology firms is that even if you don’t give permission to third-party apps to access your information much of it is available anyways as long as somebody you’re connected to is more promiscuous with third-party apps.

article thumbnail

The bar is higher

This is going to be BIG.

From a technology perspective, so many parts of the stack have been made easier--from spinning up servers on EC2 and S3, to getting hosted Rails infrastructure on Heroku. My weekly newsletter on NYC events, with over 3300 subscribers, covers over a dozen events each week--and that's curated!

Indiana 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What the Past Can Tell Us About the Future of Social Networking

Both Sides of the Table

asymmetry, real-time, curated RSS / link-sharing]. This allowed followers to be able to “curate&# their newsfeed with people that they found interesting. No prizes for guessing … there’s ALWAYS a second act in technology. What I want to answer with this post (long though it may be) is: Why did Web 2.0

article thumbnail

Benchmarking Cassandra Scalability on AWS - Over a million writes per second

techblog.netflix.com

We picked a write oriented benchmark using the standard Cassandra "stress" tool that is part of the product, and Denis ran and analyzed the tests on Amazon EC2 instances. The time taken by EC2 to create 288 new instances was about 15 minutes out of our total of 66 minutes. All instances are created using the EC2 auto-scaler feature.

EC2 68
article thumbnail

What The Rails Security Issue Means For Your Startup

www.kalzumeus.com

They’re being found at breakneck pace right now precisely because they required substantial new security technology to actually exploit, and that new technology has unlocked an exciting new frontier in vulnerability research. Technology marches on. I keep a list of my best work curated. Want more great articles?

Security 101