Interview with Kevin Olivieri, Digital Content and Social Media Manager at Juniper Networks

In this inverview, I sit down with Kevin Olivieri, Digital Content and Social Media Manager at Juniper Networks. We discuss social media trends, thoughts around building out a social media and branding strategy, analysis of different social media platforms and analytics tools, and the democratization of video content. To top it off, we even get …

CAA Records and Site Security

The little green lock—now being deprecated by some browsers—provides some level of comfort for many users when entering personal information on a web site. You probably know the little green lock means the traffic between the host and the site is encrypted, but you might not stop to ask the fundamental question of all cryptography: using what key? The quality of an encrypted connection is no better than the quality and source of the keys used to encrypt the data carried across the connection. If the key is compromised, then entire encrypted session is useless.

So where does the key pair come from to encrypt the session between a host and a server? The session key used for symmetric cryptography on each session is obtained using the public key of the server (thus through asymmetric cryptography). How is the public key of the server obtained by the host? Here is where things get interesting.

The older way of doing things was for a list of domains who were trusted to provide a public key for a particular server was carried in HTTP. The host would open a session with a server, which would then provide a list of domains where Continue reading

The Week in Internet News: The Bottom Line of IoT Security

The cost of IoT breaches: Companies struggling with Internet of things security are seeing a monetary impact, says WeLiveSecurity.com. About a quarter of companies struggling with IoT security have reported losses of at least US $34 million in the last two years, according to a recent survey.

International cyber deal: French President Emmanuel Macron called on other nations to join his country in an international pact against malicious activity online, reports ITworldCanada.com. Nations signing the Paris Call for Trust and Security in Cyberspace would agree to “condemn malicious cyber activities in peacetime, notably the ones threatening or resulting in significant, indiscriminate or systemic harm to individuals and critical infrastructure and welcome calls for their improved protection.” The pact, advanced at the Internet Governance Forum in Paris, was signed by 51 other countries, 224 companies, and 92 non-profits and advocacy groups. But the U.S., Russia, and China declined, ZDNet notes.

Booted from social media: In a three-week period, Chinese censors have deleted nearly 10,000 social media accounts operated by the country’s residents, reports the South China Morning Post via Yahoo News. Accounts shut down include those of a talk show celebrity and an entertainment blogger. The Continue reading

AMD’s road to the data center and HPC isn’t as long as you think

Last week, AMD announced it was ready to take on Nvidia in the GPU space for the data center, a market the company had basically ignored for the last several years in its struggle just to survive. But now, buoyed by its new CPU business, AMD is ready to take the fight to Nvidia.It would seem a herculean task. Or perhaps Quixotic. Nvidia has spent the past decade tilling the soil for artificial intelligence (AI) and high-performance computing (HPC), but it turns out AMD has a few things in its favor.[ Learn who's developing quantum computers. ] For starters, it has a CPU and GPU business, and it can tie them together in a way Nvidia and Intel cannot. Yes, Intel has a GPU product line, but they are integrated with their consumer CPUs and not on the Xeons. And Nvidia has no x86 line.To read this article in full, please click here

AMD’s road to the data center and HPC isn’t as long as you think

Last week, AMD announced it was ready to take on Nvidia in the GPU space for the data center, a market the company had basically ignored for the last several years in its struggle just to survive. But now, buoyed by its new CPU business, AMD is ready to take the fight to Nvidia.It would seem a herculean task. Or perhaps Quixotic. Nvidia has spent the past decade tilling the soil for artificial intelligence (AI) and high-performance computing (HPC0, but it turns out AMD has a few things in its favor.[ Learn who's developing quantum computers. ] For starters, it has a CPU and GPU business, and it can tie them together in a way Nvidia and Intel cannot. Yes, Intel has a GPU product line, but they are integrated with their consumer CPUs and not on the Xeons. And Nvidia has no x86 line.To read this article in full, please click here

Tools: MacOS Mojave Dark Mode with Safari in Reader mode is blissful

I don’t always work in Dark Mode on Mojave but I’m is liking a lot more than I expected. I guess I’m using it about 70% of the time. In particular, I use the Reader feature from Safari to block out the distractions and other bits of branding ‘chrome’ that make it difficult to read. […]

The post Tools: MacOS Mojave Dark Mode with Safari in Reader mode is blissful appeared first on EtherealMind.

Retail IoT is still coming into its own in 2019

Retailers see some tantalizing possibilities for using IoT technology in their businesses, but 2019 seems likely to feature more pilot programs and small-scale testing than widespread upheaval.Bridging the gap between online and in-person shopping, increased automation, and new ways to engage with customers (mostly by showing them ads) are all concepts with major upside for retailers, but the technology has only recently started to take hold.[ Related: What is the IoT? How the internet of things works. ] Some of IoT’s presence in the retail world isn’t retail-specific. Companies use asset-management systems, integrated HVAC and other smart-building tech just like many other industries, according to analysts, but physical retailers have been having a tough time across the board lately, and investments in new technology can quickly fall down priority lists.To read this article in full, please click here

ScootR: scaling R dataframes on dataflow systems

ScootR: scaling R dataframes on dataflow systems Kunft et al., SoCC’18

The language of big data is Java ( / Scala). The languages of data science are Python and R. So what do you do when you want to run your data science analysis over large amounts of data?

…programming languages with rich support for data manipulation and statistics, such as R and Python, have become increasingly popular… [but]… they are typically designed for single machine and in-memory usage…. In contrast, parallel dataflow systems, such as Apache Flink and Apache Spark, are able to handle large amounts of data. However, data scientists are often unfamiliar with the systems’ native language and programming abstraction, which is crucial to achieve good performance.

A tempting solution is to embed Python / R support within the dataflow engine. There are two basic approaches to this today:

  1. Keep the guest language components in a separate process and use IPC (inter-process communication) to exchange input and output data between the dataflow engine and the guest language process. This approach can support the full power of the guest language, but pays a heavy price in IPC and serialisation costs.
  2. Use source-to-source (STS) translation to translate guest Continue reading

Some notes about HTTP/3

HTTP/3 is going to be standardized. As an old protocol guy, I thought I'd write up some comments.

Google (pbuh) has both the most popular web browser (Chrome) and the two most popular websites (#1 Google.com #2 Youtube.com). Therefore, they are in control of future web protocol development. Their first upgrade they called SPDY (pronounced "speedy"), which was eventually standardized as the second version of HTTP, or HTTP/2. Their second upgrade they called QUIC (pronounced "quick"), which is being standardized as HTTP/3.


SPDY (HTTP/2) is already supported by the major web browser (Chrome, Firefox, Edge, Safari) and major web servers (Apache, Nginx, IIS, CloudFlare). Many of the most popular websites support it (even non-Google ones), though you are unlikely to ever see it on the wire (sniffing with Wireshark or tcpdump), because it's always encrypted with SSL. While the standard allows for HTTP/2 to run raw over TCP, all the implementations only use it over SSL.

There is a good lesson here about standards. Outside the Internet, standards are often de jure, run by government, driven by getting all major stakeholders in a room and hashing it out, then using rules to force people to adopt it. Continue reading

OpenMP Reaches Into The Parallel Universe Of GPUs

OpenMP is probably the most popular tool in the world to parallelize applications running on processors, but ironically it is not a product, but rather a specification that those who make compilers and middleware use to implement their own ways of parallelizing code to run on multicore processors and now, GPU accelerators.

OpenMP Reaches Into The Parallel Universe Of GPUs was written by Timothy Prickett Morgan at .

JT65 with SDR

JT65 is a slow protocol for propagation reports. In short it takes 60 seconds to send 13 characters. Then you wait 60 seconds for a reply, and repeat.

The 60 seconds are actually 1 second silence, 46.872 second of signal, then another 12.128 seconds of silence, allowing for clock drifts and for a human to choose the reply.

The mode is this slow in order to add a lot of redundancy and to make it easier for the receiver to dig out a signal way below the noise floor. It was originally meant for making contacts by bouncing signals off the moon, which has a path loss of ~250dB. Someone even managed a JT65 moonbounce on 10 Watts using JT65 with gear you and I could buy/build!. That’s the power of a low energy light bulb!

I wanted to do propagation experiments with SDR, with low power in various frequency bands, but couldn’t find a GNURadio module for JT65. So I made one.

The JT65 specification is very well written, except for the parts it says “the code is the specification”. Which would normally be fine, but the code is in Fortran and Fortran is terrible.

JT65A is Continue reading