.) Slides and Tutorials by TACC - http://www.tacc.utexas.edu/user-services/training/course-materials/
.) Workshops/Tutorials and Software by Intel - http://software.intel.com/en-us/mic-developer
.) Quickstart Guide: http://software.intel.com/sites/default/files/article/335818/intel-xeon-phi-coprocessor-quick-start-developers-guide.pdf
.) Xeon Phi scalability - http://www.drdobbs.com/parallel/exceeding-supercomputer-performance-with/240155836
.) Best Practices Guide by PRACE - http://www.prace-project.eu/Best-Practice-Guide-Intel-Xeon-Phi-HTML
well,.. i’ve changed to twitter for most of my link/info/whatever spam.
i’ll continue to use tumblr though, but rarely and for longer texts with original content.
for the time being visit my twitter profile, if you’re interested: https://twitter.com/a_z_e_t
for the moment i turned off my fail2ban script, since not even a single network operator responded to the automated e-mails. most DoS & brute force attempts are still coming out of asia. i’m quite lazy at the moment, but it might be a good idea in the future to automate the whole thing instead with public honeypot projects and/or APIs of content-delivery networks.
abuse mailboxes are obviously rarely read anymore.
i’m running the script (see: http://mulog.azet.org/post/24057415513) now for a few days and am noticing that almost all anti-spam or abuse adresses provided by chinese ISPs bounce or are inexistent. addresses like “email@example.com” (this is a real one!) seem to be fake. can someone confirm this?
@terrorobe suggested a centralized abuse reporting website, someone willing to write this stuff? i don’t have enough free time at the moment, but this sounds like a great idea.
my idea was to permanently block malicious IP-networks and give v4 space back to the appropriate appointed authorities (RIPE and so forth) after some time. in my experience with ESPs (E-Mail Service Providers), you can’t use blacklisted IPs for months or even years once they are on them. so why waste precious IPv4 space?
i wrote a short script intended to be used as a cronjob to warn network admins of attacks originating from their network, maybe you’ll find it useful: https://github.com/azet/fail2ban_serve_notice
a short summary of recent papers:
http://www.ncbi.nlm.nih.gov/pubmed/10857388 - Regulation of NMDA receptors by ethanol. Kumari M, Ticku MK. - Department of Pharmacology, University of Texas Health Science Center, San Antonio 78229, USA.
http://www.scienceblog.com/community/older/2001/A/200110251.html - Probing alcohol’s actions in the brain
http://www.ncbi.nlm.nih.gov/books/NBK5284/ - Biology of the NMDA Receptor. Van Dongen AM, editor. Boca Raton (FL): CRC Press; 2009. - Chapter 4The NMDA Receptor and Alcohol Addiction
http://www.pnas.org/content/108/16/6650 - Alcohol inhibition of the NMDA receptor function, long-term potentiation, and fear learning requires striatal-enriched protein tyrosine phosphatase
http://bit.ly/IZBKEs - Involvement of NMDA receptors in alcohol-mediated behavior: mice with reduced affinity of the NMDA R1 glycine binding site display an attenuated sensitivity to ethanol