Archive

Category Archives for "Networking"

Twitter blocks access to analytics around its data for US intelligence agencies

Twitter has blocked Dataminr from offering analytics around real-time tweets from the social networking site to U.S. intelligence agencies, according to a newspaper report.The social networking company, which provides Dataminr with real-time access to public tweets, seems to be trying to distance itself from appearing to aid government surveillance, a controversial issue after former National Security Agency contractor Edward Snowden revealed that the government was collecting information on users through Internet and telecommunications companies.Executives of Dataminr told intelligence agencies recently that Twitter, which holds around 5 percent of the equity in the startup and provides the data feed, did not the want the company to continue providing the service to the agencies, reported The Wall Street Journal on Sunday, quoting a person familiar with the matter.To read this article in full or to leave a comment, please click here

Twitter blocks access to analytics around its data for US intelligence agencies

Twitter has blocked Dataminr from offering analytics around real-time tweets from the social networking site to U.S. intelligence agencies, according to a newspaper report. The social networking company, which provides Dataminr with real-time access to public tweets, seems to be trying to distance itself from appearing to aid government surveillance, a controversial issue after former National Security Agency contractor Edward Snowden revealed that the government was collecting information on users through Internet and telecommunications companies. Executives of Dataminr told intelligence agencies recently that Twitter, which holds around 5 percent of the equity in the startup and provides the data feed, did not want the company to continue providing the service to the agencies, reported The Wall Street Journal on Sunday, quoting a person familiar with the matter.To read this article in full or to leave a comment, please click here

Travel Badge of Shame

All frequent flyers strive to the top tier of their program. Qantas Platinum, BA Gold, KrisFlyer Elite Gold, United Premier 1K. They all want that extra level of benefits, those extra upgrades.

But a former manager said:

“You don’t really want to be on the top tier. You want to be on the tier just below, where you get most of the useful benefits like priority check-in, priority luggage, and lounge access. The top tier is actually a badge of shame, because it says you travel too much.”

Well…

IMG_0917.jpg

Yeah. After spending the last few years at AirNZ Gold, I’ve now moved up a level to Elite. Too much travel in the last year, almost all of it in Economy. Four trips to the US, 2 trips to Europe, 2 trips to Australia, plus a few domestic trips. Too damn much.

I don’t think I’ll be able retain it beyond this year. Will have to make the most of it for my upcoming Asia + US trips. Elite Airpoints Dollar Upgrades look like the most useful thing, since the couple of free upgrades get used up pretty quickly. If only I could also use those upgrades on trips to Europe via Asia…

iPhone Rumor Rollup: Things You Can’t Live Without; New life for headphone jack; battery booster

While iPhone users might want it all – thinner, faster, indestructible –iPhone 7 might not quite have all those things, with Apple making the usual trade-offs between power and elegance.BIGGER BATTERY The latest rumors, started via leaked photos on the Chinese Twitter (Weibo), suggest Apple has higher capacity batteries in the works for its next flagship smartphones: we’re talking 1735 mAH and 2810 mAH for the iPhone 7 and 7 Plus vs. 1715 mAH and 2750 mAH for the iPhone 6 and 6 Plus (the 6 and 6 Plus actually had smaller batteries than their predecessors).To read this article in full or to leave a comment, please click here

Are the Panama Papers a problem for you?

On May 9th, The International Consortium of Investigative Journalists will release a searchable database that will detail over 200,000 entities that are part of the Panama Papers investigation.  While this will be intriguing for most of us, if you’re in a financial organization of any kind and there’s the remotest chance that you might have dealings with any of these entities, or with parties who might be fronting for or involved with them, May 9th will be (or depending on when you read this, is or has been), shall we say, “a bad day” for you.To read this article in full or to leave a comment, please click here

Contiv Networking policy Hands-on

Contiv is an Open source project driven primarily by Cisco for policy based networking, storage and cluster management for containerized applications. In this blog, I will cover some of the hands-on stuff that I tried with Contiv Networking. I used the sample examples provided in Contiv documentation as starting point. For Contiv networking basics, you can refer … Continue reading Contiv Networking policy Hands-on

Contiv – Policy based networking for Containers

Contiv is an Open source project driven primarily by Cisco for policy based networking, storage and cluster management for containerized applications. In this blog, I will focus on how Contiv does policy based Container networking. In the next blog, I will cover some hands-on stuff that I tried with Contiv. Container Policy Policies have become critical … Continue reading Contiv – Policy based networking for Containers

Openstack Deployment using Containers

I recently saw the Openstack self-healing demo from CoreOS team using Tectonic(Stackanetes project) and I kind of felt that the boundary between Containers and VMs are blurring. In this blog, I discuss the usecase of deploying Openstack using Containers. We typically think of Openstack as a VM Orchestration tool. Openstack is composed of numerous services … Continue reading Openstack Deployment using Containers

29% off Seagate 4TB Portable External Hard Drive with 200GB of Cloud Storage – Deal Alert

The Seagate Backup Plus portable drive offers the mobility of a portable drive with the high capacity of a desktop drive. With this 29% off deal you get a staggering 4TB physical storage + 200GB cloud storage for just $127 (list price $179.99). The unit averages 4.5 out of 5 stars on Amazon from over 7,500 people (read reviews).  To read this article in full or to leave a comment, please click here

Take a look at Boston’s runaway train barreling through two stops without a driver

The Massachusetts Bay Transportation Authority (MBTA) has released surveillance camera video of an unintentionally driverless Red Line train zipping through two commuter stops in December, a potential catastrophe triggered by the operator’s decision to wrap a rubber cord around the vehicle’s accelerator before stepping out to address a signal problem. The train left without him and travelled through a total of four stations before stopping after power was cut to the third rail.While the episode itself was dramatic, to say to the least, the video – even this edited version from WCVB Channel 5 TV -- is underwhelming. Even the people on the platforms didn’t seem to realize anything was wrong.To read this article in full or to leave a comment, please click here

Take a look at Boston’s runaway train barreling through two stops without a driver

The Massachusetts Bay Transportation Authority (MBTA) has released surveillance camera video of an unintentionally driverless Red Line train zipping through two commuter stops in December, a potential catastrophe triggered by the operator’s decision to wrap a rubber cord around the vehicle’s accelerator before stepping out to address a signal problem. The train left without him and travelled through a total of four stations before stopping after power was cut to the third rail.While the episode itself was dramatic, to say to the least, the video – even this edited version from WCVB Channel 5 TV -- is underwhelming. Even the people on the platforms didn’t seem to realize anything was wrong.To read this article in full or to leave a comment, please click here

How Microsoft keeps the bad guys out of Azure

Microsoft has published its latest Security Intelligence Report (SIR), which it does twice a year, covering security issues for the prior six months. This latest edition covers the second half of 2015, analyzing the threat landscape of exploits, vulnerabilities and malware using data from Internet services and over 600 million computers worldwide.It is a massive effort, with dozens of Microsoft staff from different groups contributing. For the first time, they looked at not only PC malware but threats to its Azure cloud service as well, which the company says "reveals how we are leveraging an intelligent security graph to inform how we protect endpoints, better detect attacks and accelerate our response, to help protect our customers."To read this article in full or to leave a comment, please click here

How Microsoft keeps the bad guys out of Azure

Microsoft has published its latest Security Intelligence Report (SIR), which it does twice a year, covering security issues for the prior six months. This latest edition covers the second half of 2015, analyzing the threat landscape of exploits, vulnerabilities and malware using data from Internet services and over 600 million computers worldwide.It is a massive effort, with dozens of Microsoft staff from different groups contributing. For the first time, they looked at not only PC malware but threats to its Azure cloud service as well, which the company says "reveals how we are leveraging an intelligent security graph to inform how we protect endpoints, better detect attacks and accelerate our response, to help protect our customers."To read this article in full or to leave a comment, please click here

That massive reported ‘data breach’ was just hype, Mail.ru says

Hold Security made quite a splash in the security world on Wednesday when it claimed to have recovered 272 million stolen email credentials from a much larger trove, but on Friday the email provider most strongly affected called the report an effort to create media hype.Hold suggested that nearly 57 million of the stolen email accounts uncovered were from the popular Russian service Mail.ru. But more than 99.9 percent of the Mail.ru account credentials in a sample examined by the provider are invalid, the Russian company said.To read this article in full or to leave a comment, please click here

That massive reported ‘data breach’ was just hype, Mail.ru says

Hold Security made quite a splash in the security world on Wednesday when it claimed to have recovered 272 million stolen email credentials from a much larger trove, but on Friday the email provider most strongly affected called the report an effort to create media hype.Hold suggested that nearly 57 million of the stolen email accounts uncovered were from the popular Russian service Mail.ru. But more than 99.9 percent of the Mail.ru account credentials in a sample examined by the provider are invalid, the Russian company said.To read this article in full or to leave a comment, please click here