This is a test: Amazon has asked the U.S. Federal Communications Commission for permission to test a new wireless Internet service using the 3.5 MHz spectrum band, Cord Cutters News reports. The test, in Sunnyvale, California, would run from mid-August to mid-February. The test is in addition to Amazon’s plans to launch 3,236 satellites for a new home Internet service.
Billions for broadband: U.S. presidential candidate Elizabeth Warren, a Democratic senator from Massachusetts, wants to spend $85 billion to expand rural broadband in the country, CNet reports. She also wants to override states trying to prevent local municipalities from building their own broadband networks.
Russian hackers vs. the IoT: Microsoft has accused a Russian hacking group of targeting Internet of Things devices, including a voice over IP phone and office printer, Security Today reports. The Russian group known as Fancy Bear was allegedly involved in the hack of the Democratic National Committee before the 2016 U.S. elections.
Lawsuit recognition: Facebook users can sue the social networking site for its facial recognition photo tagging service, a U.S. court has ruled. Illinois users have claimed the tagging service violates a state privacy law, NPR reports. “Once a Continue reading
Stumbled upon an interesting article describing numerous examples of how it's impossible to fix a system from the inside because the good guys always lose to the more aggressive (and less scrupulous) individuals.
It's amazing how well the same ideas apply to TCP-versus-UDP, P2P traffic versus everything else (this one has been fixed after a lot of pressure from the outside), latency- versus drop-based TCP congestion management and $vendor marketing.
Here are some of the most prominent venture capital and merger and acquisition news items from...
“It will be interesting to see how the continuous integration players react. These vendors...
Check out our seventh edition of The Serverlist below. Get the latest scoop on the serverless space, get your hands dirty with new developer tutorials, engage in conversations with other serverless developers, and find upcoming meetups and conferences to attend.
Sign up below to have The Serverlist sent directly to your mailbox.
Today's Heavy Networking is a conversation with Tom Hollingsworth that ranges over a variety of provocative statements about the networking and technology industries, including "certifications are dead," "enterprise networking is dying," "BGP as a kitchen sink protocol is a bad idea," and more. Tom responds and discussions ensue.
The post Heavy Networking 464: Provocative Statements With Tom Hollingsworth appeared first on Packet Pushers.
I just got back from my first Black Hat and it was an interesting experience. It was crazy to see three completely different security-focused events going on in town all at once. There was Black Hat, B-Sides Las Vegas, and DEFCON all within the space of a day or so of each other. People were flowing back and forth between them all and it was quite amazing.
A wanted to share a few quick thoughts about the event from my perspective being a first timer.
In June of this year, I had the great privilege of traveling to Ulukhaktok, NWT, Canada to talk to community members about the possibility of building a new, local Internet service network. As a result of these meetings, and the incredibly driven individuals I met with in Ulu, this time next year, Ulukhaktok will be the proud owner of the far-most Northern community network in the world.
I left Washington, D.C. in the throes of summer – upper 80-degree weather and so humid you’d feel wet the second you stepped outside. Two days and five planes later I was in Ulukhaktok, a community of about 400 people on the 70th parallel. Summer there is a little different, and I explored the community amidst summer snow and 24-hour days.
I spent four days getting to know the community, and it wasn’t hard to understand the deep sense of community pride right away. Ulu is a beautiful, U-shaped town on the edge of the Arctic Ocean. It’s filled with people who will stop when they see a stranger, smile, and ask who you are and what you’re doing. And every time someone stopped, I told them about the Internet Society, Continue reading
First published in Packet Pushers Human Infrastructure Magazine 58 – you can subscribe here Another side of the debate around programming, automation and orchestration. Are you a user or a maker ? Platforms are 80/20 For the last 20 or 30 years, network management software has followed an 80/20 approach to customisation. On the first […]
The post Using Automation vs Making Automation appeared first on EtherealMind.
Cannabidiol (CBD) and hemp have been known to be used in health supplements for humans and animals, as well as in various beauty products. Since the legalization of marijuana in many U.S. states, innovations in CBD and hemp products have become an acceptable and highly effective alternative to synthetic drugs for the treatment of many conditions including:
While more studies need to be done, it is believed since CBD and hemp oil may help reduce inflammation in the body that it may help serve as treatment and preventions for such health issues as heart disease and diabetes.
Innovative in CBD and hemp products for the treatment of dogs, specifically, may help to:
When CBD and hemp products do not offer a miracle cure, they have shown great promise in helping people who do not respond well to traditional drugs or who may simply not like the negative side effects for prescription drugs in treating certain medical conditions.
Keep in mind that most of the innovations in CBD and hemp are not designed to make you high, Continue reading
Today we’re launching Certificate Transparency Monitoring (my summer project as an intern!) to help customers spot malicious certificates. If you opt into CT Monitoring, we’ll send you an email whenever a certificate is issued for one of your domains. We crawl all public logs to find these certificates quickly. CT Monitoring is available now in public beta and can be enabled in the Crypto Tab of the Cloudflare dashboard.
Most web browsers include a lock icon in the address bar. This icon is actually a button — if you’re a security advocate or a compulsive clicker (I’m both), you’ve probably clicked it before! Here’s what happens when you do just that in Google Chrome:
This seems like good news. The Cloudflare blog has presented a valid certificate, your data is private, and everything is secure. But what does this actually mean?
Your browser is performing some behind-the-scenes work to keep you safe. When you request a website (say, cloudflare.com), the website should present a certificate that proves its identity. This certificate is like a stamp of approval: it says that your connection is secure. In other words, the certificate proves that content was not intercepted or Continue reading