When Government Regulation of Mobile Telco’s Works

UK regulation produces excellent prices for mobile plans
The post When Government Regulation of Mobile Telco’s Works appeared first on EtherealMind.

UK regulation produces excellent prices for mobile plans
The post When Government Regulation of Mobile Telco’s Works appeared first on EtherealMind.


Please join us for an exclusive gathering to discover the latest in cloud solutions for Internet Security and Performance.
Thursday, 6 June, 2019: 15:30 - 20:00
Location: the Oberoi (37-39, MG Road, Yellappa Garden, Yellappa Chetty Layout, Sivanchetti Gardens, Bengalore)
We will discuss the newest security trends and introduce serverless solutions.
We have invited renowned leaders across industries, including big brands and some of the fastest-growing startups. You will learn the insider strategies and tactics that will help you to protect your business, to accelerate the performance and to identify the quick-wins in a complex internet environment.
Speakers:
Agenda:
15:30 - 16:00 - Registration and Refreshment
16:00 - 16:30 - DDoS Landscapes and Security Trends
16:30 - 17:15 - Workers Overview and Demo
17:15 - 18:00 - Panel Discussion - Best Practice on Successful Cyber Security and Performance Strategy
18:00 - 18:30 - Keynote #1 - Future edge computing
18:30 - 19:00 - Keynote # 2 - Cyber attacks are evolving, Continue reading
A case for lease-based, utilitarian resource management on mobile devices Hu et al., ASPLOS’19
I’ve chosen another energy-related paper to end the week, addressing a problem many people can relate to: apps that drain your battery. LeaseOS borrows the concept of a lease from distributed systems, but with a rather nice twist, and is able to reduce power wastage by 92% with no disruption to application experience and no changes required to the apps themselves.
So about that twist. LeaseOS injects a transparent proxy between an app and a power-hungry OS resource. The app thinks it has control of the resource until it releases it, but under the covers the proxy is given a lease. In a traditional leasing scheme, it’s up to the borrower to request a lease extension. But here half the problem is that apps are requesting expensive resources they don’t really need. So instead the OS monitors how wisely the leased resource is being used. If an app is making good, legitimate use of the resource then the lease will be transparently extended. If it isn’t, it loses the underlying resource. How you tell whether or not an app is being a wise steward of Continue reading
I’m always amazed at how fast the time flies. I have no idea where May disappeared to, it seems like it was only yesterday when I was writing about webinar plans in 2019… and yet it’s only a month till ipSpace.net Summer Break™.
During June 2019 I’ll continue updating Designing the Private Cloud Infrastructure webinar, and start a new pet project: How Networks Really Work – I’m literally minutes away from traveling to a quiet spot in the middle of nowhere where I’ll work on the materials. In between these webinars you’ll find me in Zurich where I’ll run Microsoft Azure Networking workshop on June 12th in parallel with SIGS Technology Conference.
As you might expect we have plenty of things already lined up for autumn 2019… more about that in a week or two.
The edge platform has more than 40 early-access customers including BMW, Foxconn, GE Healthcare,...
Sprint made good on its promise to deliver 5G services in Atlanta, Dallas, Houston, and Kansas City...
The company pushed back against published reports that it was shutting down and that the job cuts...
The operator’s top five priorities are the FirstNet buildout, LTE Advanced deployments, 5G,...

My newest course on Safari through Pearson is coming up in just a few weeks:
The following summarizes an HTTP persistence cookie vulnerability that I identified in A10’s ACOS ADC software. This issue was disclosed to A10 Networks in June 2016 and has since been resolved.

This vulnerability results in information disclosure about names of service-groups and IPs of real servers, as well as the ability to manipulate the content of the cookies.
SUMMARY OF VULNERABILITY
The ACOS documentation for HTTP persistence cookies notes that “For security, address information in the persistence cookies is encrypted.” However, the address information is not “encrypted”; rather, the real server IP and port information is weakly obfuscated and is easily decoded, exposing information about the internal network. The simplicity of the obfuscation also makes it trivial to manually create a cookie which ACOS would decode and honor.
Additionally, cookies configured using the service-group command option have the service-group’s full name included in the persistence cookie as plain text. This vulnerability applies to HTTP/HTTPS VIP types that have been configured to use a cookie-based persistence template.
SOFTWARE VERSIONS TESTED
This vulnerability was discovered and validated initially in ACOS 2.7.2-P4-SP2 and reconfirmed most recently in ACOS 4.1.1-P3.
VULNERABLE VERSIONS
This behavior has been core to Continue reading
The endpoint security unicorn plans to sell 18 million shares at between $19 and $23 each when it...
Delivered as part of Docker Enterprise 3.0, Docker Desktop Enterprise is a new developer tool that extends the Docker Enterprise Platform to developers’ desktops, improving developer productivity while accelerating time-to-market for new applications.
It is the only enterprise-ready Desktop platform that enables IT organizations to automate the delivery of legacy and modern applications using an agile operating model with integrated security. With work performed locally, developers can leverage a rapid feedback loop before pushing code or docker images to shared servers / continuous integration infrastructure.

\Imagine you are a developer & your organization has a production-ready environment running Docker Enterprise. To ensure that you don’t use any APIs or incompatible features that will break when you push an application to production, you would like to be certain your working environment exactly matches what’s running in Docker Enterprise production systems. This is where Docker Enterprise 3.0 and Docker Desktop Enterprise come in. It is basically a cohesive extension of the Docker Enterprise container platform that runs right on developers’ systems. Developers code and test locally using the same tools they use today and Docker Desktop Enterprise helps to quickly iterate and then produce a containerized service that is Continue reading