Trump’s executive order won’t destroy Privacy Shield, says EU

Fears that U.S. President Trump has destroyed the Privacy Shield Transatlantic data transfer agreement with one of the many executive orders he has signed this week are unfounded, the European Commission said Friday.On Wednesday, Trump signed an executive order entitled "Enhancing Public Safety in the Interior of the U.S.," one of several he has issued since taking office on Jan. 20. Such executive orders are used by U.S presidents to manage the operations of the federal government.To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For January 27th, 2017

Hey, it's HighScalability time:

 

Tired of noisy drones? Use the same dedrone tech used at Davos. It's the future.

If you like this sort of Stuff then please support me on Patreon.

  • 1+ trillion: messages Twitter handles per day; 695 million: Internet users in China; >350k: Twitter Star Wars bots; $90 million: value of LasVegas.com domain name; 45%: WiFi connection failure rate; 80: threads in Slack Mac OS app; 364: slides in Adrian Cockcroft's microservices deck; 5180%: increases at Etsy in daily visits to pages related to Donald Trump; 465,000: cars sold by Costco last year; 14 Million: one day of DuckDuckGo searches; 58 million: science papers online; ~3x: use of Kubernetes in production settings; 54: r3.2xlarge instances used for Reddit caching; $14 billion: Microsoft’s Azure's annual run rate; 

  • Quotable Quotes:
    • Carlo Rovelli: the basic ingredient is down there in the physical world: physical correlation between distinct variables. The physical world is not a set of self-absorbed entities that do their selfish things. It is a tightly knitted net of relative information, where everybody’s state reflects somebody else’s state. 
    • Charles Stross: Continue reading

Fiber & Wireless – Stronger Together for Community Broadband

Google in June stunned some in the broadband world by acquiring wireless provider Webpass and “momentarily” exiting the fiber stage. Hybrid wired/wireless networks became the Next Big Thing – for a month. But what if hybrid infrastructure is the key that unlocks the doors to the next level of community broadband success?

Craig Settles

Cisco starts patching critical flaw in WebEx browser extension

Cisco Systems has started to patch a critical vulnerability in its WebEx collaboration and conferencing browser extension that could allow attackers to remotely execute malicious code on computers.The company released a patched version of the extension -- 1.0.7 -- for Google Chrome on Thursday and is working on similar patches for the Internet Explorer and Mozilla Firefox versions.The vulnerability was found by Google security researcher Tavis Ormandy and stemmed from the fact that the WebEx extension exposed functionality to any website that had "cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html" in its URL or inside an iframe. Some of that WebEx functionality allowed for the execution of arbitrary code on computers.To read this article in full or to leave a comment, please click here

Cisco starts patching critical flaw in WebEx browser extension

Cisco Systems has started to patch a critical vulnerability in its WebEx collaboration and conferencing browser extension that could allow attackers to remotely execute malicious code on computers.The company released a patched version of the extension -- 1.0.7 -- for Google Chrome on Thursday and is working on similar patches for the Internet Explorer and Mozilla Firefox versions.The vulnerability was found by Google security researcher Tavis Ormandy and stemmed from the fact that the WebEx extension exposed functionality to any website that had "cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html" in its URL or inside an iframe. Some of that WebEx functionality allowed for the execution of arbitrary code on computers.To read this article in full or to leave a comment, please click here

Your Business Won’t Use a Server in 5 Years ? What Bull….

What a load of bull.

The journey to cloud is a matter of when, not if. The first step in that journey is well underway with organizations replacing on-premise servers with cloud-based systems that are better in every dimension — faster, cheaper, more secure. In 5 years, every modern business will have a substantial portion of their systems running the cloud. But that’s only the first step.

  1. There are people using laptops older than 5 years. Mass migration to public cloud, much less server less, is not practical within 5 years. Reaching 30% would highly optimistic. (also, 30% of what, exactly)
  2. Also, its arrogant to assume that serverless technology can only be provided in the public cloud. Expect to see private cloud serverless solutions arrive in a few years and undermine the assertion further.
  3. Serverless will enable quite a few new things but also requires companies to completely change the way they operate. The focus on Internet-first, and high investments in technology is not a trend.

Your Business Won’t Use a Server in 5 Years : https://serverless.zone/your-business-wont-use-a-server-in-5-years-79c8fd25b239

The post Your Business Won’t Use a Server in 5 Years ? What Bull…. appeared first on EtherealMind.

A Case for CPU-Only Approaches to HPC, Analytics, Machine Learning

With the current data science boom, many companies and organizations are stepping outside of their traditional business models to scope work that applies rigorous quantitative methodology and machine learning – areas of analysis previously in the realm of HPC organizations.

Dr. Franz Kiraly an inaugural Faculty Fellow at the Alan Turing Institute observed at the recent Intel HPC developer conference that companies are not necessarily struggling with “big” data, but rather with data management issues as they begin to systematically and electronically collect specific data in one place that makes analytics feasible. These companies, as newcomers to “machine learning” and

A Case for CPU-Only Approaches to HPC, Analytics, Machine Learning was written by Nicole Hemsoth at The Next Platform.

Review: Royole Moon 3D Virtual Mobile Theater

I’m generally an optimist when it comes to new technology (hence the ‘Cool Tools’ name of the column, not ‘Meh Tools’ or something like that), which means I go into most reviews ready to enjoy the products I’m testing.Such was the case with the Royole Moon 3D Virtual Mobile Theater ($799). I’ve seen products like this before – take a display and attach some headphones, and you can experience video and music as if you were sitting in a movie theater while you’re at home or on an airplane. Royole In the case of this headset, it includes the experience of an 800-inch movie screen – the front part has two AMOLED displays at 1080p resolution. Over the top of the unit are two noise-canceling headphones that create the audio experience. It looks a lot like the VR headsets in the market now – such as the PlayStation VR, Oculus Rift or HTC Vive – so much so that people might think you’re playing VR games while using this. But no, it’s more of an entertainment device for experiencing content in this “virtual environment”.To read this article in full or to leave a comment, please click here

AI-based typing biometrics might be authentication’s next big thing

Identifying or authenticating people based on how they type is not a new idea, but thanks to advances in artificial intelligence it can now be done with a very high level of accuracy, making it a viable replacement for other forms of biometrics.Research in the field of keystroke dynamics, also known as keyboard or typing biometrics, spans back over 20 years. The technique has already been used for various applications that need to differentiate among computer users, but its widespread adoption as a method of authentication has been held back by insufficient levels of accuracy.Keystroke dynamics relies on unique patterns derived from the timing between key presses and releases during a person's normal keyboard use. The accuracy for matching such typing-based "fingerprints" to individual persons by using traditional statistical analysis and mathematical equations varies around 60 percent to 70 percent, according to Raul Popa, CEO and data scientist at Romanian startup firm TypingDNA.To read this article in full or to leave a comment, please click here

AI-based typing biometrics might be authentication’s next big thing

Identifying or authenticating people based on how they type is not a new idea, but thanks to advances in artificial intelligence it can now be done with a very high level of accuracy, making it a viable replacement for other forms of biometrics.Research in the field of keystroke dynamics, also known as keyboard or typing biometrics, spans back over 20 years. The technique has already been used for various applications that need to differentiate among computer users, but its widespread adoption as a method of authentication has been held back by insufficient levels of accuracy.Keystroke dynamics relies on unique patterns derived from the timing between key presses and releases during a person's normal keyboard use. The accuracy for matching such typing-based "fingerprints" to individual persons by using traditional statistical analysis and mathematical equations varies around 60 percent to 70 percent, according to Raul Popa, CEO and data scientist at Romanian startup firm TypingDNA.To read this article in full or to leave a comment, please click here

Trump eyes an H-1B visa aimed at ‘best and brightest’

President Donald Trump is considering a new way of distributing the H-1B visa to ensure they go to the "best and brightest."The phrase "best and the brightest" has long been used by tech industry groups to champion the H-1B program. It's greeted with derision by critics, who say the program's mostly entry-level workers are used to displace U.S. workers.But some critics of the visa, a group that now includes top officials in the Trump administration, are adopting the phrase to advance the idea of a priority-based H-1B distribution system.This comes from a draft executive order by Andrew Bremberg, the director of Trump's Domestic Policy Council. The order -- if signed by the president -- opens the door to major reforms of the H-1B and the Optional Practical Training programs.To read this article in full or to leave a comment, please click here

Are you a Reckless Rebel or a Nervous Nellie when it comes to online privacy?

In an era of constant likes and shares, where is the privacy line drawn? Are you someone who worries about being watched as you purchase an item online? Or do you consider loss of privacy the price you pay for having the world at your fingertips.Forrester recently released a report that reveals the characteristics of users and the factors that go into how much – or how little – each category of user shares. “We frequently hear that Millennials don’t care about privacy — just look at everything they share on social media! But this ignores the fact that Millennials actually manage their online identities quite aggressively.""While it may appear that they overshare online, they use privacy settings, ephemeral messaging, and browser plug-ins to control who sees what about them. This is exactly how most of us behave in the physical world: Our willingness to share personal information with specific people changes depending on our relationship with them.”To read this article in full or to leave a comment, please click here

Are you a Reckless Rebel or a Nervous Nellie when it comes to online privacy?

In an era of constant likes and shares, where is the privacy line drawn? Are you someone who worries about being watched as you purchase an item online? Or do you consider loss of privacy the price you pay for having the world at your fingertips.Forrester recently released a report that reveals the characteristics of users and the factors that go into how much – or how little – each category of user shares. “We frequently hear that Millennials don’t care about privacy — just look at everything they share on social media! But this ignores the fact that Millennials actually manage their online identities quite aggressively.""While it may appear that they overshare online, they use privacy settings, ephemeral messaging, and browser plug-ins to control who sees what about them. This is exactly how most of us behave in the physical world: Our willingness to share personal information with specific people changes depending on our relationship with them.”To read this article in full or to leave a comment, please click here

How to protect your data, your vehicles, and your people against automotive cyber threats?

Modern vehicles increasingly connect to the rest of the world via short range wireless technologies such as Wi-Fi and Bluetooth, wired interfaces such as OBD-II and USB, long range wireless communications such as 4G and the coming 5G for internet, and services such as OnStar, LoJack, and Automatic, to name only some. That world includes your enterprise and the criminal hackers and cyber carjackers who want to undo your data, your corporate fleets, and your people.The costs of their attacks include exposure of personal identifiable information and private data, and exposure or destruction of valuable intellectual property, according to Eric Friedberg, co-president at Stroz Friedberg. Loss of life in the midst of vehicle destruction/collision weighs heavily as a potential personal, professional, and corporate cost, as well.To read this article in full or to leave a comment, please click here(Insider Story)