Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
Miguel Caetano

Miguel Caetano

CIES researcher at ISCTE-IUL (Lisbon). Project: "Users and distributors. Networked Communication and European Cinema in P2P networks." Linux, Open Source, Music.
Tom Zé – Quando Eu Era Sem Ninguém - http://www.last.fm/music...
Juana Molina – Lamba corta - http://www.last.fm/music...
O Capital é de quem trabalha
Laurel Halo – Constant Index - http://www.last.fm/music...
Vetiver – Been So Long - http://www.last.fm/music...
Regulating Code: Good Governance and Better Regulation in the Information Age - http://www.goodreads.com/review...
networking - Thinkpad x220 wireless network slows down after some time - Ask Ubuntu - http://askubuntu.com/questio...
"2 down vote Try creating a file /etc/modprobe.d/iwlwifi-11n-disable with the following content and then rebooting. options iwlwifi 11n_disable=1 Also read the following bug reports to see if you have the same symptoms. https://bugs.launchpad.net/ubuntu... https://bugs.launchpad.net/ubuntu... https://bugs.launchpad.net/ubuntu..." - Miguel Caetano from Bookmarklet
[all variants] Intel Centrino Wireless-N1000 Slow on Public WiFi (ThinkPad X220) - http://ubuntuforums.org/showthr...
"If you got slow connexion, difficult connexion, slow speed etc. Here is the command to fix it. My card was : Intel Corporation Centrino Wireless-N 1030 My Distro : Ubuntu 11.04 Kernel : 2.6.38-13-generic x86_64 So how to fix ? first test if its work : sudo rmmod -f iwlagn sudo modprobe iwlagn 11n_disable=1 sudo iwconfig wlan0 power off It’s work? Then how to make it permanent? gksudo gedit /etc/modprobe.d/iwlagn.conf Add this to the file : Code: options iwlagn 11n_disable=1 Save & Close Gedit Then : gksudo gedit /etc/pm/power.d/wireless Add this to the file : Code: #!/bin/sh iwconfig wlan0 power off Save and quit gedit You need to make the script executable : sudo chmod +x /etc/pm/power.d/wireless Hope it’s help. It’s helped me a lot my Wifi working fine now." - Miguel Caetano from Bookmarklet
Broadcast – Chord Simple - http://www.last.fm/music...
MV & EE with The Golden Road – The Hungry Stones - http://www.last.fm/music...
Laurel Halo – Embassy - http://www.last.fm/music...
The NSA says it touches only 1.6% of daily internet traffic | Jeff Jarvis | Comment is free | theguardian.com - http://www.theguardian.com/comment...
The NSA says it touches only 1.6% of daily internet traffic | Jeff Jarvis | Comment is free | theguardian.com
"Fear not, says the NSA, we "touch" only 1.6% of daily internet traffic. If, as they say, the net carries 1,826 petabytes of information per day, then the NSA "touches" about 29 petabytes a day. They don't say what "touch" means. Ingest? Store? Analyze? For context, Google in 2010 said it had indexed only 0.004% of the data on the net. So, by inference from the percentages, does that mean that the NSA is equal to 400 Googles? Seven petabytes of photos are added to Facebook each month. That's .23 petabytes per day. So that means the NSA is 126 Facebooks." - Miguel Caetano from Bookmarklet
Are Hackers the Next Bogeyman Used to Scare Americans Into Giving Up More Rights? | Alternet - http://www.alternet.org/are-hac...
"That's just a tiny bit overwrought for an allegedly serious expert, don't you think? In fact, it sounds like the kind of thing we heard from various members of the Bush administration during the early days after 9/11. And it certainly indicates, as Wheeler has been speculating, that the government is stretching the terrorism laws to include hacking. They certainly are using the same histrionic language to describe it." - Miguel Caetano from Bookmarklet
Google confirms critical Android crypto flaw used in $5,700 Bitcoin heist - Dan Goodin (Ars Technica) - http://arstechnica.com/securit...
Google confirms critical Android crypto flaw used in $5,700 Bitcoin heist - Dan Goodin (Ars Technica)
"Google developers have confirmed a cryptographic vulnerability in the Android operating system that researchers say could generate serious security glitches on hundreds of thousands of end user apps, many of them used to make Bitcoin transactions. This weakness in Android's Java Cryptography Architecture is the root cause of a Bitcoin transaction that reportedly was exploited to pilfer about $5,720 worth of bitcoins out of a digital wallet last week. The disclosure, included in a blog post published Wednesday by Google security engineer Alex Klyubin, was the first official confirmation of the Android vulnerability since Ars and others reported the incident last weekend. Klyubin warned that other apps might also be compromised unless developers change the way they access so-called PRNGs, short for pseudo random number generators." - Miguel Caetano from Bookmarklet
Colin Blunstone – Smokey Day - http://www.last.fm/music...
Colin Blunstone – Caroline Goodbye - http://www.last.fm/music...
Red Hat(r) Certified System Administrator & Engineer (Rhcsa and Rhce): Training Guide and a Deskside Reference, Rhel 6 (Exams Ex200 & Ex300) [Paperbac - http://www.goodreads.com/review...
John Holloway: Ótima hora para Fissurar o capitalismo - Júlio Delmanto (Revista Fórum) - http://revistaforum.com.br/blog...
John Holloway: Ótima hora para Fissurar o capitalismo - Júlio Delmanto (Revista Fórum)
John Holloway: Ótima hora para Fissurar o capitalismo - Júlio Delmanto (Revista Fórum)
"Em seu novo livro, John Holloway ressalta que o que diferencia o homem do animal não é o trabalho, mas sim sua capacidade de concebê-lo e planejá-lo, e isso nos é permanentemente roubado pelo sistema dominante" - Miguel Caetano from Bookmarklet
The Open Internet Advisory Committee at one year - Shane Greenstein (Digitopoly) - http://www.digitopoly.org/2013...
"Let’s be clear about what we accomplished. We did not make policy for data caps. Rather, the report mapped the policy landscape. It identified and analyzed where the FCC or another consumer-protection policy-making body, such as FTC, might want to monitor events and where issues remained unsettled. It identified some choices too, and tried to identify bridges between general arguments and specific observable behavior and facts. Unless I am mistaken, we were the first organization to ever do something this comprehensive on this topic – namely, map the landscape by bringing all the arguments into one place. We did not settle anything, nor was it within our purview to settle anything. Rather, we attempted to move the conversation to a more productive place. Call me a naïve idealist, but that is what productive policy discussions are supposed to do." - Miguel Caetano from Bookmarklet
Red Hat Certified System Administrator (RHCSA) Course Online (VTC) #Linux #RHCSA #RHCE - http://www.vtc.com/product...
"This VTC course will provide students with the knowledge and skills to take and pass the Red Hat Certified System Administrator exam. This course focuses on deploying, administrating, and securing a Red Hat Enterprise Linux 6 system. RHCE author, Kenneth Armstrong, teaches the Red Hat exam objectives while providing examples and real ... more" - Miguel Caetano from Bookmarklet
LinuxCBT EL-6 Edition - Syllabus #Linux #RHCE #RHCSA - http://www.linuxcbt.com/product...
LinuxCBT EL-6 Edition - Syllabus #Linux #RHCE #RHCSA
"Focus: RedHat® Enterprise Linux Version 6x Subscription Terms: 1-Month | 3-Month | 6-Month | 12-Month System Requirements: Browser | [HTML5] | Flash | JavaScript User Agents: Chrome | Safari | Firefox | IE9+ | Opera Mobile Platforms: Droid | IOS | Mobiles | Tablets Certificate of Completion: Auto-Generated Payment Methods: Credit Card | PayPal | Purchase Order | Wire Duration: 40 Hours Demos: Launch" - Miguel Caetano from Bookmarklet
#Capitalism: Poder dos EUA foi construído com crises e Estado, dizem acadêmicos canadianos Leo Panitch e Sam Gindin - Eleanora de Lucena (Folha de S. Paulo) - http://www1.folha.uol.com.br/mercado...
"Os autores começam desconstruindo a "falsa dicotomia entre Estados e mercados". Narram como o Estado atuou para estabelecer regras para a propriedade e competição que facilitaram a expansão das empresas dos EUA e a acumulação de capital. Tarifas de proteção à produção nacional, programas de infraestrutura, financiamento à inovação: tudo foi usado para a montagem do poder americano no início do século 20. Na área externa, deu apoio a ditadores locais e a proprietários de terras, o que ajudou a bloquear desenvolvimento." - Miguel Caetano from Bookmarklet
Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators - http://www.goodreads.com/review...
80000 and counting...
Super Black Market - Brian Wilson photographed by Annie Leibovitz, 1976 - http://superblackmarket.tumblr.com/post...
Super Black Market - Brian Wilson photographed by Annie Leibovitz, 1976
▶ Peppermint Rainbow - Will You Be Staying After Sunday HQ Stereo Dub - YouTube - http://www.youtube.com/watch...
▶ Peppermint Rainbow - Will You Be Staying After Sunday HQ Stereo Dub - YouTube
Play
"where to start? please look at the vocal sequences from :29-43. the layers of complexity. also please note: in addition to the 3 main guitar players, there is a 10 piece or so orchestra backing with a conductor, no less. i just knew i LOVED this song-the 5 star melody and vocalistas. but now i appreciate what it took to make this unfortunatly only medium size hit. memo to beyonce & rihanna: please replace your flash with some of this substance. saul" - Miguel Caetano from Bookmarklet
Open Content, An Idea Whose Time Has Come - James Cuno (J. Paul Getty Trust/The Getty Iris) #OpenCulture #OpenContent - http://blogs.getty.edu/iris...
Open Content, An Idea Whose Time Has Come - James Cuno (J. Paul Getty Trust/The Getty Iris) #OpenCulture #OpenContent
"Today the Getty becomes an even more engaged digital citizen, one that shares its collections, research, and knowledge more openly than ever before. We’ve launched the Open Content Program to share, freely and without restriction, as many of the Getty’s digital resources as possible. The initial focus of the Open Content Program is to make available all images of public domain artworks in the Getty’s collections. Today we’ve taken a first step toward this goal by making roughly 4,600 high-resolution images of the Museum’s collection free to use, modify, and publish for any purpose." - Miguel Caetano from Bookmarklet
Other ways to read this feed:Feed readerFacebook