Sift Science uses machine learning to help businesses reduce fraud while enhancing the user experience​

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Companies that provide online transactional services to consumers or other businesses have to be concerned about fraud. Whether it is renting hotel rooms to travelers, selling books to avid readers, arranging shipping services for hard goods, or any of the thousands of other types of sales and services transacted online, the entity behind the online business needs to know if the end user and transaction can be trusted.The credit reporting company Experian says that e-commerce fraud attack rates spiked 33% in 2016 compared to 2015. Experian attributes this increase to the recent switch to EMV (those chip-based credit cards), which drove fraudsters to online card-not-present fraud, and to the vast number of data breaches in which users’ online credentials were stolen. The Federal Trade Commission says the number of consumers who reported their stolen data was used for credit card fraud increased from 16% in 2015 to 32% in 2016.To read this article in full or to leave a comment, please click here

Microsoft SQL Server on Linux – YES, Linux!

A couple years ago Microsoft embarked on a “Microsoft Loves Linux” initiative to bring Linux into the fold of everything Microsoft.  For a company that has traditionally been known for Windows and Office that has not historically been seen as particularly too Linux friendly, there was a bit of a stretch of the imagination how Microsoft and Linux would end up playing well together.Roll forward a couple years, with the world very much a cloud-based environment, and 1 out of every 3 virtual machines running in Microsoft’s Azure Cloud being a Linux system (and growing), along with more and more Linux growth in the Microsoft ecosystem, the vision of a couple years ago is now very much a reality.To read this article in full or to leave a comment, please click here

Sift Science uses machine learning to help businesses reduce fraud without impacting the user experience  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Companies that provide online transactional services to consumers or other businesses have to be concerned about fraud. Whether it is renting hotel rooms to travelers, selling books to avid readers, arranging shipping services for hard goods, or any of the thousands of other types of sales and services transacted online, the entity behind the online business needs to know if the end user and transaction can be trusted.The credit reporting company Experian says that e-commerce fraud attack rates spiked 33% in 2016 compared to 2015. Experian attributes this increase to the recent switch to EMV (those chip-based credit cards), which drove fraudsters to online card-not-present fraud, and to the vast number of data breaches in which users’ online credentials were stolen. The Federal Trade Commission says the number of consumers who reported their stolen data was used for credit card fraud increased from 16% in 2015 to 32% in 2016.To read this article in full or to leave a comment, please click here

Raspberry Pi roundup: Conduct your own symphony, play some Atari, and Competitor Corner

Homemade musical instruments don’t usually work out very well. I remember the experiment we all had to do with the rubber bands and the empty tissue boxes and finding the resulting sound, well, pretty disappointing. How’s a fifth grader supposed to rock out and impress girls for reasons he only vaguely understands with this thing?!Perhaps unsurprisingly, the age of ubiquitous computers has made the possibilities of the homemade instrument a lot more exciting than the twanging rubber band or the musical comb. (Leaving aside professional stuff like That 1 Guy, who has been weird and excellent for a while.) What we have here is a wild digital “piano,” as inventor Andy Grove calls it, that combines a Raspberry Pi with motion sensors to create a unique musical toy:To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For April 28th, 2017

Hey, it's HighScalability time:

 

Do you understand the power symbol? I always think of O as a circuit being open, or off, and the | as the circuit being closed, or on. Wrong! Really the symbols are binary, 0 for false, or off, 1 for true, or on. Mind blown.

If you like this sort of Stuff then please support me on Patreon.
  • 220,000-Core: largest Google Compute Engine job; 100 million: Netflix subscribers; 1.3M: Sling TV subscribers; 200: Downloadable Modern Art Books; 25%: Americans Won't Subscribe To Traditional Cable; 84%: image payload savings using smart CDN; 10^5: number of world-wide cloud data centers needed; 63%: more Facebook clicks using personality targeting; 2.5 million: red blood cells created per second; 

  • Quotable Quotes:
    • Silicon Valley~ The only reason Gilfoyle and I stayed up 48 f*cking straight hours was to decrease server load, not keep it the same. 
    • Robert Graham: In other words, if the entire Mirai botnet of 2.5 million IoT devices was furiously mining bitcoin, it's total earnings would be $0.25 (25 cents) per day.
    • @BoingBoing: John Deere just told US Copyright office that only corporations can own Continue reading

Athena Lecturer Award for women researchers goes to Rice prof who really gets robots moving

Lydia Kavraki, a professor of computer science and bioengineering at Rice University, has been named as the 2017-2018 Athena Lecturer by the Association for Computing Machinery in recognition her work in robotics. Initiated in 2006 by the ACM Council on Women in Computing, the Athena Lecturer Award celebrates women researchers who have made fundamental contributions to computer science and comes with a cash prize of $25K via Google. And there is an actual lecture, to be presented at an ACM event. Association for Computing Machinery/Rice University Lydia Kavraki, Professor of Computer Science and Bioengineering at Rice UniversityTo read this article in full or to leave a comment, please click here

Network management vulnerability exposes cable modems to hacking

Hundreds of thousands of internet gateway devices around the world, primarily residential cable modems, are vulnerable to hacking because of a serious weakness in their Simple Network Management Protocol implementation.SNMP is used for automated network device identification, monitoring and remote configuration. It is supported and enabled by default in many devices, including servers, printers, networking hubs, switches and routers.Independent researchers Ezequiel Fernandez and Bertin Bervis recently found a way to bypass SNMP authentication on 78 models of cable modems that ISPs from around the world have provided to their customers.Their internet scans revealed hundreds of thousands of devices whose configurations could be changed remotely through the SNMP weakness that they found and dubbed StringBleed.To read this article in full or to leave a comment, please click here

Network management vulnerability exposes cable modems to hacking

Hundreds of thousands of internet gateway devices around the world, primarily residential cable modems, are vulnerable to hacking because of a serious weakness in their Simple Network Management Protocol implementation.SNMP is used for automated network device identification, monitoring and remote configuration. It is supported and enabled by default in many devices, including servers, printers, networking hubs, switches and routers.Independent researchers Ezequiel Fernandez and Bertin Bervis recently found a way to bypass SNMP authentication on 78 models of cable modems that ISPs from around the world have provided to their customers.Their internet scans revealed hundreds of thousands of devices whose configurations could be changed remotely through the SNMP weakness that they found and dubbed StringBleed.To read this article in full or to leave a comment, please click here

Network management vulnerability exposes cable modems to hacking

Hundreds of thousands of internet gateway devices around the world, primarily residential cable modems, are vulnerable to hacking because of a serious weakness in their Simple Network Management Protocol implementation.SNMP is used for automated network device identification, monitoring and remote configuration. It is supported and enabled by default in many devices, including servers, printers, networking hubs, switches and routers.Independent researchers Ezequiel Fernandez and Bertin Bervis recently found a way to bypass SNMP authentication on 78 models of cable modems that ISPs from around the world have provided to their customers.Their internet scans revealed hundreds of thousands of devices whose configurations could be changed remotely through the SNMP weakness that they found and dubbed StringBleed.To read this article in full or to leave a comment, please click here

IT leaders say current H-1B program works

The majority of IT leaders are happy with the H-1B visa program as is and say that proposed changes will make it harder to fill skilled IT roles, according to survey released by IT recruiting firm Harvey Nash this week.Following the Trump administration’s executive order earlier this month calling for restructuring the temporary skilled labor program relied on most heavily by IT service providers and technology giants, Harvey Nash polled 174 U.S. IT leaders across 20 industries. Nearly two-thirds (63 percent) of respondents in companies with fifty or more developers said that the current H-1B visa program has helped them meeting their needs for highly skilled IT talent. Six out of 10 IT leaders with large development teams said the proposed H-1B changes would make skilled IT talent less available, and 68 percent of them predicted that proposed reforms would increase the cost for certain IT roles.To read this article in full or to leave a comment, please click here

Cloud computing has another killer quarter

To most people, Jeff Bezos’ Amazon is known as the company reshaping the way people buy everything from books to shoes to groceries. But the part of Amazon that is driving Bezos within shouting distance of becoming the world’s richest person doesn’t really sell anything, it rents computing power in the cloud.The cloud is more profitable than e-tailing As the New York Times put it on Thursday, “The profit Amazon can make on cloud-computing services is significantly bigger than in its retail sales, and that has helped turn the Seattle company from a consistent money-loser to a respectable moneymaker.”To read this article in full or to leave a comment, please click here

The Next Battleground for Deep Learning Performance

The frameworks are in place, the hardware infrastructure is robust, but what has been keeping machine learning performance at bay has far less to do with the system-level capabilities and more to do with intense model optimization.

While it might not be the sexy story that generates the unending wave of headlines around deep learning, hyperparameter tuning is a big barrier when it comes to new leaps in deep learning performance. In more traditional machine learning, there are plenty of open sources tools for this, but where it is needed most is in deep learning—an area that does appear to

The Next Battleground for Deep Learning Performance was written by Nicole Hemsoth at The Next Platform.

57% off Brother P-Touch PTM95 Label Maker – Deal Alert

This handy P-touch labeler is lightweight, portable and easy to use. It features a Qwerty Keyboard and easy-view display. It comes with a variety of type styles, frames and symbols to easily personalize your labels. Great for home and home office use. Right now the PTM95 is significantly discounted 57%, for what will likely be a limited time. So instead of $23 you'll be paying just $10. See the deal now on Amazon.To read this article in full or to leave a comment, please click here

Q1 2017 smartphone shipments: Samsung rebounds, Apple goes sideways, Chinese makers roar

Following quarterly investor calls by phone makers, research firms released a storm of market reports. Most notable, IDC, a little surprised by stronger 4.3 percent market growth than forecasted, reported Samsung’s market leadership rebound.Richard Windsor of Radio Free Mobile summed up Samsung’s rebound saying: “Despite this [the Note 7 disaster], the initial signs are good, as the reviews of the device are overwhelmingly positive despite the software shortcomings and pre-orders are pointing to no lasting damage having been done.”To read this article in full or to leave a comment, please click here

Why 2×2 Wave 2 access points make no sense

Everyone loves the latest and greatest technology. A new iPhone comes out, and people camp out at the stores to buy one. Microsoft releases a new version of Xbox, and they’re sold out for months.Sometimes, though, the newest thing doesn’t make sense because the incremental value of the innovation is limited. In technology, this doesn’t happen very often, but I believe there’s a current “latest and greatest” that provides limited value—and that’s the 2x2 Wave 2 access points (AP) that are now available from many of the mainstream Wi-Fi providers.Before I explain my opinion on this, it’s worth doing a quick refresh of Wave 1 versus Wave 2 because it’s important to understand the principals of Wave 2. Below are the benefits of 802.11ac Wave 2 versus Wave 1: To read this article in full or to leave a comment, please click here

Why 2×2 Wave 2 access points make no sense

Everyone loves the latest and greatest technology. A new iPhone comes out, and people camp out at the stores to buy one. Microsoft releases a new version of Xbox, and they’re sold out for months.Sometimes, though, the newest thing doesn’t make sense because the incremental value of the innovation is limited. In technology, this doesn’t happen very often, but I believe there’s a current “latest and greatest” that provides limited value—and that’s the 2x2 Wave 2 access points (AP) that are now available from many of the mainstream Wi-Fi providers.Before I explain my opinion on this, it’s worth doing a quick refresh of Wave 1 versus Wave 2 because it’s important to understand the principals of Wave 2. Below are the benefits of 802.11ac Wave 2 versus Wave 1: To read this article in full or to leave a comment, please click here

If software eats everything, are network engineers on the menu?

If you're a network engineer, don't rush out and learn a programming language. To compete in the new world of software-defined networking, it might be more important to start thinking like a programmer.That was one of the ideas that emerged this week from an Open Networking User Group debate that generated healthy feedback from users in the audience.The days of managing individual switches and routers and configuring them with proprietary CLIs (command-line interfaces) are numbered, four panelists at the ONUG spring conference in San Francisco said on Tuesday. Though SDN hasn't worked its way into every enterprise, new approaches to enterprise IT and the availability of public clouds just a few clicks away are driving companies toward more agile and automated networks, they said.To read this article in full or to leave a comment, please click here