Election data models provide a lesson for cybersecurity

If you are like me, you were pretty convinced that Secretary Clinton was poised to be the President elect. Confidence in this opinion was based on reviewing numerous big data analytics models from the fivethirtyeight.com, The New York Times, Princeton, etc. The lowest percentage gave Mrs. Clinton roughly a 65 percent chance of winning on November 8. So, what happened? Every database jockey recognizes the old maxim of garbage in/garbage out. In other words, killer algorithms and all the processing power in the world are rather useless if your model is built on the back of crappy data. Obviously, all the brainiacs building these models made a critical mistake in not gathering data from disenfranchised white voters in rural areas. The result? A stunning election result and lots of eggs on Ivy League elitist faces.To read this article in full or to leave a comment, please click here

Election Data Models Lesson for Cybersecurity

If you are like me, you were pretty convinced that Secretary Clinton was poised to be the President elect.  Confidence in this opinion was based on reviewing numerous big data analytics models from the fivethirtyeight.com, the New York Times, Princeton, etc.  The lowest percentage gave Mrs. Clinton roughly a 65% chance of winning on November 8. So, what happened?  Every database jockey recognizes the old maxim of garbage in/garbage out.  In other words, killer algorithms and all the processing power in the world are rather useless if your model is built on the back of crappy data.  Obviously, all the brainiacs building these models made a critical mistake in not gathering data from disenfranchised white voters in rural areas.  The result?  A stunning election result and lots of eggs on ivy league elitist faces.To read this article in full or to leave a comment, please click here

Election Data Models Lesson for Cybersecurity

If you are like me, you were pretty convinced that Secretary Clinton was poised to be the President elect.  Confidence in this opinion was based on reviewing numerous big data analytics models from the fivethirtyeight.com, the New York Times, Princeton, etc.  The lowest percentage gave Mrs. Clinton roughly a 65% chance of winning on November 8. So, what happened?  Every database jockey recognizes the old maxim of garbage in/garbage out.  In other words, killer algorithms and all the processing power in the world are rather useless if your model is built on the back of crappy data.  Obviously, all the brainiacs building these models made a critical mistake in not gathering data from disenfranchised white voters in rural areas.  The result?  A stunning election result and lots of eggs on ivy league elitist faces.To read this article in full or to leave a comment, please click here

Docker at Tech Field Day 12

Docker will be presenting at Tech Field Day 12, and you can sit in on the sessions – at least virtually.

Tech Field Day is an opportunity for IT practitioners to hear from some of the leading technology companies, and Docker is excited to be participating again. Many thanks to Stephen Foskett and Tom Hollingsworth for cultivating a vibrant community of technical leaders and evangelists and inviting us to participate. Looking forward to meeting more of the delegates.

Our session will be Wednesday, November 16th, from 4:30 to 6:30pm Pacific. We have a full slate of topics including:

  • Docker Datacenter: What is Docker Datacenter and how can it help organizations implement their own Container as a Service platform.
  • Docker for Windows Server: An overview of the integration of Docker containers and Windows Server 2016.
  • Docker for AWS and Docker for Azure: Learn about the easiest way to deploy and manage clusters of Docker hosts on both Azure and AWS.
  • Docker Security: We’ll discuss how to implement a secure software supply chain with Docker.
  • Docker Networking: A conversation on how Docker allows developers to define container centric networks that run on top of your existing infrastructure.

Continue reading

75% off Phaiser BHS-730 Bluetooth Sweatproof Sport Earbuds, Magnetic – Deal Alert

Phaiser's BHS-730 Bluetooth Sport earbuds are both highly rated and dramatically discounted on Amazon. Averaging 4.5 out of 5 stars on Amazon from over 4,600 people (read reviews), the list price of $160 has been reduced a significant 75% to just $39.99.  The BHS-730 uses the highest quality hardware, as well as Bluetooth 4.1 and A2DP stereo transfer protocols to produce bigger bass, lighter-than-air treble, and perfect phone call clarity every time. Bullet-shaped Comply T-400 M memory foam tips provide total isolation from external noise. It's designed to withstand the toughest environments, and the earbuds are made from Aviation Grade Aluminum-Magnesium-Alloy which doesn't add weight. And a LiquipelTM Nano-Coating means it can be dropped into water and will live to see another day. The BHS-730's are magnetized, so they stick to each other and stay securely around your neck when you need to take them out of your ears. Along with the earbuds you get a generous 7 sets of ear tips, a 60-day "no questions asked" return policy, and a lifetime sweatproof warranty as well. See the discounted Phaiser BHS-730 now on Amazon. To read this article in full or to leave a comment, please click here

Surface Book i7 review: Still unique and still blazing fast

It’s always been difficult trying to find the right category for Microsoft’s hybrid tablet/laptop Surface Book. And now with the new Surface Book i7 in hand, it’s even harder to figure out just what square hole to put this round peg into.Before we get too far into the review, let me say that the Surface Book i7 is incredibly fast for a laptop in its class, offering no less than twice the performance of the original Surface Book, which itself outstripped all others in its day. Even better, it has stupidly long battery life that bests all the laptops we’ve tested.Done. Fini. Move along, right? Well, not quite. The world isn’t the same as it was a year ago and the Surface Book i7’s competitors have been hard at work too, and there are aspects of Microsoft’s hybrid device that aren’t perfect.To read this article in full or to leave a comment, please click here

Introduction to Quantum Cryptography

How Does Internet Work - We know what is networking

Quantum cryptography is a new technique of securing computer network communication channel. Existing standard crypto systems are using advanced algorithms to create key pairs which are extremely hard to inverse engineer. Quantum cryptography avoids any mathematical algorithm and uses principles of quantum physics. Quantum crypto implements a new technique of generating and exchanging crypto keys which makes it impossible for third party entities to get those keys by snooping or to create man in the middle by snooping and sending copies of original key. Keys generated in this way will automatically destroy themselves if read by third-party interferer. When generated between two sides, using quantum key distribution, secret keys will

Introduction to Quantum Cryptography

That private network on the Wi-Fi band? Won’t happen

Satellite service provider Globalstar has dropped its controversial plan to launch a wireless network in the U.S. in part of an unlicensed band that Wi-Fi and Bluetooth use.The plan had alarmed supporters of those technologies who feared the network would interfere with them and effectively privatize unlicensed spectrum. Globalstar’s TLPS (Terrestrial Low-Power Service) proposal was one of several ideas introduced in recent years to mix licensed and unlicensed uses of spectrum. While some have been ruled out, others, such as LTE-Unlicensed, are moving forward.To read this article in full or to leave a comment, please click here

35% off Oster Cordless Electric Wine Bottle Opener with Foil Cutter – Deal Alert

This cordless electric wine opener from Oster removes the cork in seconds with one-button operation, and opens up to 30 bottles before needing to be recharged. It features a foil cutter for easily removing seals and a comfortable soft-grip handle. Currently averages 4 out of 5 stars from over 4,000 people (read reviews). It's discounted 35% on Amazon, so you can get it right now for just $12.99. To read this article in full or to leave a comment, please click here

Ethernet consortia trio want to unlock a more time-sensitive network

The demand from Internet of Things, automotive networking and video applications are driving changes to Ethernet technology that will make it more time-sensitive.Key to those changes are a number of developing standards but also a push this week from the University of New Hampshire InterOperability Laboratory to set up three new industry specific Ethernet Time-Sensitive Networking (TSN) consortiums – Automotive Networking, Industrial Networking, and ProAV Networking aimed at developing deterministic performance within standard Ethernet for real-time, mission critical applications.+More on Network World: IEEE sets new Ethernet standard that brings 5X the speed without disruptive cable changes+To read this article in full or to leave a comment, please click here

Ethernet consortia trio want to unlock a more time-sensitive network

The demand from Internet of Things, automotive networking and video applications are driving changes to Ethernet technology that will make it more time-sensitive.Key to those changes are a number of developing standards but also a push this week from the University of New Hampshire InterOperability Laboratory to set up three new industry specific Ethernet Time-Sensitive Networking (TSN) consortiums – Automotive Networking, Industrial Networking, and ProAV Networking aimed at developing deterministic performance within standard Ethernet for real-time, mission critical applications.+More on Network World: IEEE sets new Ethernet standard that brings 5X the speed without disruptive cable changes+To read this article in full or to leave a comment, please click here

Ethernet consortia trio want to unlock a more time-sensitive network

The demand from Internet of Things, automotive networking and video applications are driving changes to Ethernet technology that will make it more time-sensitive.Key to those changes are a number of developing standards but also a push this week from the University of New Hampshire InterOperability Laboratory to set up three new industry specific Ethernet Time-Sensitive Networking (TSN) consortiums – Automotive Networking, Industrial Networking, and ProAV Networking aimed at developing deterministic performance within standard Ethernet for real-time, mission critical applications.+More on Network World: IEEE sets new Ethernet standard that brings 5X the speed without disruptive cable changes+To read this article in full or to leave a comment, please click here

Ethernet consortia trio want to unlock a more time-sensitive network

The demand from Internet of Things, automotive networking and video applications are driving changes to Ethernet technology that will make it more time-sensitive.Key to those changes are a number of developing standards but also a push this week from the University of New Hampshire InterOperability Laboratory to set up three new industry specific Ethernet Time-Sensitive Networking (TSN) consortiums – Automotive Networking, Industrial Networking, and ProAV Networking aimed at developing deterministic performance within standard Ethernet for real-time, mission critical applications.+More on Network World: IEEE sets new Ethernet standard that brings 5X the speed without disruptive cable changes+To read this article in full or to leave a comment, please click here