The 22 best changes in Windows 10 Insider Preview Build 15002

One build, almost a whole new OSMicrosoft releases new builds of Windows 10 for its Insider beta testers every so often—some minor, some really significant. You can call Windows 10 Insider Preview Build 15002, released this week, a really big deal.Microsoft’s notes on the new build ran to over a dozen pages, according to the company, and we found over 20 notable new features. (We left out some minor tweaks to keep this list manageable.) Some are cosmetic improvements that enhance the user experience, while others add powerful new features that Windows lacked before.To read this article in full or to leave a comment, please click here

NRAM set to spark a ‘holy war’ among memory technologies

A non-volatile memory technology based on carbon nanotubes that's poised for commercialization in 2018 is expected to be more disruptive to enterprise storage, servers and consumer electronics than flash memory, according to a new report from BCC Research."It is rare to see a technology catch fire after so long in development, but NRAM appears poised to do just that," said BCC research editorial director Kevin Fitzgerald. "In fact, your next smartphone could be a carbon-based lifeform."The BCC report predicts the overall Nano RAM (NRAM) market will see a compound annual growth rate of 62.5% between 2018 and 2023, with the embedded systems market in which it will be used expected to grow from $4.7 million in 2018 to $217.6 million in 2023. That would represent a combined annual growth rate over those five years of 115.3%.To read this article in full or to leave a comment, please click here

How much is a data breach going to cost you?

It is going to cost yaImage by ThinkstockA recent IBM study found that the average cost of a data breach has hit $4 million—up from $3.8 million in 2015. There are countless factors that could affect the cost of a data breach in your organization, and it’s virtually impossible to predict the exact cost. You might be able to estimate a range with the help of a data breach calculator, but no single tool is perfect.To read this article in full or to leave a comment, please click here

How much is a data breach going to cost you?

It is going to cost yaImage by ThinkstockA recent IBM study found that the average cost of a data breach has hit $4 million—up from $3.8 million in 2015. There are countless factors that could affect the cost of a data breach in your organization, and it’s virtually impossible to predict the exact cost. You might be able to estimate a range with the help of a data breach calculator, but no single tool is perfect.To read this article in full or to leave a comment, please click here

How to set up your Android phone for ultimate privacy

It’s not an exaggeration to say that your smartphone is the most personal device you have. The fact it’s always with you, however, sure does generate a lot of information about your habits.Your location history, Google searches, web browsing habits, app usage, and even recordings of your voice talking to the Google Assistant.Yes, your phone and the Google services powering it are incredibly useful in many tangible ways. And if you use a strong password and two-factor authentication, your information is likely safer on Google’s servers than just about anywhere else.But it’s not paranoia to take stock from time to time of just how much you’re handing over to Google or if you’d rather not place all your digital privacy eggs in the same basket. Here are some simple tips about how you can stay in control of all that critical information and ensure that privacy isn’t something you have to surrender.To read this article in full or to leave a comment, please click here

DARPA wants to create secure data-sharing tech

DARPA is kicking off a project to create a new way to enable U.S. troops working in remote areas around the world to securely send and receive sensitive information on their devices.The Defense Advanced Research Projects Agency, the research arm of the Department of Defense, said it's working on a project that would use software and networking technology to securely share information on unsecured commercial and military networks.NEWSLETTERS: Get the latest tech news sent directly to your in-box The agency scheduled a Proposer's Day for Jan. 31 to provide more information on the project.To read this article in full or to leave a comment, please click here

DARPA wants to create secure data-sharing tech

DARPA is kicking off a project to create a new way to enable U.S. troops working in remote areas around the world to securely send and receive sensitive information on their devices.The Defense Advanced Research Projects Agency, the research arm of the Department of Defense, said it's working on a project that would use software and networking technology to securely share information on unsecured commercial and military networks.NEWSLETTERS: Get the latest tech news sent directly to your in-box The agency scheduled a Proposer's Day for Jan. 31 to provide more information on the project.To read this article in full or to leave a comment, please click here

Response: Japan researchers warn of fingerprint theft from ‘peace’ sign

Another one from the Biometrics is not useful for authentication dumpster:

The NII researchers were able to copy fingerprints based on photos taken by a digital camera three metres (nine feet) away from the subject.

Japan researchers warn of fingerprint theft from ‘peace’ sign : http://phys.org/news/2017-01-japan-fingerprint-theft-peace.html

The post Response: Japan researchers warn of fingerprint theft from ‘peace’ sign appeared first on EtherealMind.

Introducing Accelerated Mobile Links: Making the Mobile Web App-Quick

Introducing Accelerated Mobile Links: Making the Mobile Web App-Quick

In 2017, we've predicted that more than half of the traffic to Cloudflare's network will come from mobile devices. Even if they are formatted to be displayed on a small screen, the mobile web is built on traditional web protocols and technologies that were designed for desktop CPUs, network connections, and displays. As a result, browsing the mobile web feels sluggish compared with using native mobile apps.

In October 2015, the team at Google announced Accelerated Mobile Pages (AMP), a new, open technology to make the mobile web as fast as native apps. Since then, a large number of publishers have adopted AMP. Today, 600 million pages across 700,000 different domains are available in the AMP format.

The majority of traffic to this AMP content comes from people running searches on Google.com. If a visitor finds content through some source other than a Google search, even if the content can be served from AMP, it typically won't be. As a result, the mobile web continues to be slower than it needs to be.

Making the Mobile Web App-Quick

Cloudflare's Accelerated Mobile Links helps solve this problem, making content, regardless of how it's discovered, app-quick. Once enabled, Accelerated Mobile Continue reading

Trump’s push for cyber defense is sorely needed, experts say

President-elect Donald Trump plans to consult "the greatest computer minds” for input on bolstering U.S. hacking defenses, as experts say an overhaul to the country's cybersecurity is badly needed.“We’re going to put those minds together, and we're going to form a defense,” Trump said in a Wednesday press conference.Trump made the statement as he said Russia, China and other parties continue to launch cyber attacks against the U.S. In recent weeks, he’s also been confronting claims that the Kremlin used hacks and online propaganda in a covert campaign to tilt the election in his favor.To read this article in full or to leave a comment, please click here

Trump’s push for cyber defense is sorely needed, experts say

President-elect Donald Trump plans to consult "the greatest computer minds” for input on bolstering U.S. hacking defenses, as experts say an overhaul to the country's cybersecurity is badly needed.“We’re going to put those minds together, and we're going to form a defense,” Trump said in a Wednesday press conference.Trump made the statement as he said Russia, China and other parties continue to launch cyber attacks against the U.S. In recent weeks, he’s also been confronting claims that the Kremlin used hacks and online propaganda in a covert campaign to tilt the election in his favor.To read this article in full or to leave a comment, please click here

Trump doc claims Russia has cracked Telegram messaging service

The raw intelligence document published this week that contains salacious stories about Donald Trump also offers up a glimpse into how Russia goes about its cyber spying – including the tidbit that it has cracked Telegram’s encrypted instant messaging service.While none of the 35-page document is substantiated, it is detailed, and at least some of it is considered credible enough by U.S. intelligence agencies for them to have briefed Trump and President Barack Obama on it.According to the documents prepared by a former British spy, a “cyber operative” for the Russian Federal Security Service (FSB) told him that Telegram no longer posed an issue for the government. “His/her understanding was that the FSB now successfully had cracked this communication software and therefore it was no longer secure to use,” the document says.To read this article in full or to leave a comment, please click here

Trump doc claims Russia has cracked Telegram messaging service

The raw intelligence document published this week that contains salacious stories about Donald Trump also offers up a glimpse into how Russia goes about its cyber spying – including the tidbit that it has cracked Telegram’s encrypted instant messaging service.While none of the 35-page document is substantiated, it is detailed, and at least some of it is considered credible enough by U.S. intelligence agencies for them to have briefed Trump and President Barack Obama on it.According to the documents prepared by a former British spy, a “cyber operative” for the Russian Federal Security Service (FSB) told him that Telegram no longer posed an issue for the government. “His/her understanding was that the FSB now successfully had cracked this communication software and therefore it was no longer secure to use,” the document says.To read this article in full or to leave a comment, please click here

National Instruments industrial IoT lab unites rivals

There are many companies vying to build the industrial internet of things, but the systems involved are so complex that those vendors also need to cooperate. A new lab at National Instruments, in Austin, Texas, is bringing some competitors together.The NI Industrial IoT Lab opened on Wednesday and will house testbeds for applications like predictive maintenance, time-synchronized industrial networking and “microgrids” for renewable energy. It will also be a place where companies can show off joint solutions to customers.One of the aims of the lab is to show enterprises that IoT works, said Jamie Smith, director of embedded systems at National Instruments.To read this article in full or to leave a comment, please click here

DockerCon 2017 first speakers announced

To the rest of the world, DockerCon 2017 may seem a ways away, but here at Docker we are heads down reading your Call for Papers submissions and curating content to make this the biggest and best DockerCon to date. With that, we are thrilled to share with you the DockerCon 2017 Website with helpful information including ten of the first confirmed speakers and sessions.

If you want to join this amazing lineup and haven’t submitted your cool hack, use case or deep dive session, don’t hesitate! The Call for Papers closes this Saturday, January 14th.

 

Submit a talk

 

First DockerCon speakers

 

Laura Frank

Sr. Software Engineer, Codeship

Everything You Thought You Already Knew About Orchestration

 

 

 



Julius Volz

Co-founder, Prometheus

Monitoring, the Prometheus Way

 

 


 

Liz Rice

Co-founder & CEO, Microscaling Systems

What have namespaces done for you lately?

 

 


 

Thomas Graf

Principal Engineer at Noiro, Cisco

Cilium – BPF & XDP for containers

 

 


 

Brendan Gregg 

Sr. Performance Architect, Netflix

Container Tracing Deep Dive

 

 


 

Thomas Shaw

Build Engineer, Activision

Activision’s Skypilot: Delivering amazing game experiences through containerized pipelines

 

 


 

Fabiane Nardon

Chief Scientist Continue reading