Open source algorithm helps spot social media shams

Researchers from Carnegie Mellon University say they have developed an open source algorithm that can help spot social media frauds trying to sway valuable community influence.+More on Network World: Star Trek turns 50!+“Given the rise in popularity of social networks and other web services in recent years, fraudsters have strong incentives to manipulate these services. On several shady websites, anyone can buy fake Facebook page-likes or Twitter followers by the thousands. Yelp, Amazon and TripAdvisor fake reviews are also available for sale, misleading consumers about restaurants, hotels, and other services and products. Detecting and neutralizing these actions is important for companies and consumers alike,” the researchers wrote in a paper outlining their algorithm known as FRAUDAR.To read this article in full or to leave a comment, please click here

Open source algorithm helps spot social media shams

Researchers from Carnegie Mellon University say they have developed an open source algorithm that can help spot social media frauds trying to sway valuable community influence.+More on Network World: Star Trek turns 50!+“Given the rise in popularity of social networks and other web services in recent years, fraudsters have strong incentives to manipulate these services. On several shady websites, anyone can buy fake Facebook page-likes or Twitter followers by the thousands. Yelp, Amazon and TripAdvisor fake reviews are also available for sale, misleading consumers about restaurants, hotels, and other services and products. Detecting and neutralizing these actions is important for companies and consumers alike,” the researchers wrote in a paper outlining their algorithm known as FRAUDAR.To read this article in full or to leave a comment, please click here

Cybersecurity Goes Private: McAfee and RSA

There are some interesting industry dynamics going on in the cybersecurity market.  Just a few months ago, Symantec bought Blue Coat taking a private company public and forming a cybersecurity industry colossus in the process. Now two other historical cybersecurity powerhouses are heading in the other direction and going private.  When the Dell/EMC deal was approved this week, industry veteran RSA became the security division of the world’s largest diversified private technology company.  Not to be outdone, Intel and partner TPG are spinning out McAfee as an independent private company.The good news for both companies is that the market for cybersecurity products and services is quite healthy, and large customers are looking for enterprise-class security vendors with integrated product suites, managed/professional services, and business process experience to partner with.  Cybersecurity vendors like Cisco and IBM that fit this description are doing quite well in the enterprise so McAfee and RSA (as well as Forcepoint, Palo Alto Networks, Symantec, Trend Micro, and a few others) could join this exclusive club. To read this article in full or to leave a comment, please click here

Cybersecurity Goes Private: McAfee and RSA

There are some interesting industry dynamics going on in the cybersecurity market.  Just a few months ago, Symantec bought Blue Coat taking a private company public and forming a cybersecurity industry colossus in the process. Now two other historical cybersecurity powerhouses are heading in the other direction and going private.  When the Dell/EMC deal was approved this week, industry veteran RSA became the security division of the world’s largest diversified private technology company.  Not to be outdone, Intel and partner TPG are spinning out McAfee as an independent private company.The good news for both companies is that the market for cybersecurity products and services is quite healthy, and large customers are looking for enterprise-class security vendors with integrated product suites, managed/professional services, and business process experience to partner with.  Cybersecurity vendors like Cisco and IBM that fit this description are doing quite well in the enterprise so McAfee and RSA (as well as Forcepoint, Palo Alto Networks, Symantec, Trend Micro, and a few others) could join this exclusive club. To read this article in full or to leave a comment, please click here

iPhone 7 announcement: Could Apple be the next Nokia?

If the next Apple announcement is like this, it should be broadcast on Cable TV so viewers can fast forward through the many boring parts. A GEICO insurance commercial would have been a relief from the tedium of watching Tim Cook, Jony Ive, and Phil Schiller shoveling superlative adjectives on features copied from Android phone makers and other product companies.Apple isn’t selling innovation. It’s selling its annual iPhone annual upgrade plan, which costs users twice as much over a three-year period, in order to turn around declining sales. Apple’s innovation engine has stalled at producing features that drive users to upgrade, so Apple is resorting to a financial gimmick.To read this article in full or to leave a comment, please click here

Google Chrome to start marking HTTP connections as insecure

To push more websites to implement encryption and to better protect users, Google will start flagging plain HTTP connections as insecure in its popular Chrome browser.The plan will go into effect in January with the release of Chrome 56 and will roll out in stages. Chrome 56 will display a "not secure" indicator before HTTP URLs in the browser's address bar, but only for those web pages that contain password or credit card form fields.Transmitting such sensitive information over HTTP is dangerous because the data can be intercepted by man-in-the-middle attackers on public wireless networks or via compromised routers, for example.In later Chrome releases, the HTTP warnings will be further expanded. First, HTTP pages will be labeled as "not secure" when accessed in the browser's privacy-oriented Incognito mode. Eventually, Chrome will show the warning for all HTTP pages and will switch the security indicator to the red triangle now used for broken HTTPS connections.To read this article in full or to leave a comment, please click here

Google Chrome to start marking HTTP connections as insecure

To push more websites to implement encryption and to better protect users, Google will start flagging plain HTTP connections as insecure in its popular Chrome browser.The plan will go into effect in January with the release of Chrome 56 and will roll out in stages. Chrome 56 will display a "not secure" indicator before HTTP URLs in the browser's address bar, but only for those web pages that contain password or credit card form fields.Transmitting such sensitive information over HTTP is dangerous because the data can be intercepted by man-in-the-middle attackers on public wireless networks or via compromised routers, for example.In later Chrome releases, the HTTP warnings will be further expanded. First, HTTP pages will be labeled as "not secure" when accessed in the browser's privacy-oriented Incognito mode. Eventually, Chrome will show the warning for all HTTP pages and will switch the security indicator to the red triangle now used for broken HTTPS connections.To read this article in full or to leave a comment, please click here

Intel may make chips specially for mixed reality headsets

Intel believes untethered headsets could be a new class of PCs in the future, and the company may develop chips dedicated to those devices.The chipmaker previewed its virtual and augmented reality plans last month with Project Alloy, a Microsoft HoloLens-type headset that can mix images from real and virtual worlds. Project Alloy will be available for PC makers to replicate, but Intel may also see a market for mixed reality headset chips.Project Alloy is a prototype headset running on Microsoft's Windows Holographic platform, and it could support other VR and AR platforms in the future.The Alloy design and specifications will be open-sourced early next year. PC makers have expressed interest in making headsets based on the design.To read this article in full or to leave a comment, please click here

The Art of Good Beer and Wi-Fi

Just like pouring beer correctly, deploying the right Wi-Fi also enhances the user experience. There is nothing more aggravating than not being able to connect to Wi-Fi, no matter where you are. Customers like to share their experience via social media and employees often times rely on the Internet to complete their job.

Security an afterthought in connected home, wearable devices

Based on an extensive review of publicly reported internet of things (IoT) device vulnerabilities, the Online Trust Alliance (OTA) today announced that all of the problems could have been easily avoided. "In this rush to bring connected devices to market, security and privacy is often being overlooked," Craig Spiezle, executive director and president of the OTA, said in a statement today. "If businesses do not make a systematic change, we risk seeing the weaponization of these devices and an erosion of consumer confidence impacting the IoT industry on a whole due to their security and privacy shortcomings."To read this article in full or to leave a comment, please click here

Security an afterthought in connected home, wearable devices

Based on an extensive review of publicly reported internet of things (IoT) device vulnerabilities, the Online Trust Alliance (OTA) today announced that all of the problems could have been easily avoided. "In this rush to bring connected devices to market, security and privacy is often being overlooked," Craig Spiezle, executive director and president of the OTA, said in a statement today. "If businesses do not make a systematic change, we risk seeing the weaponization of these devices and an erosion of consumer confidence impacting the IoT industry on a whole due to their security and privacy shortcomings."To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For September 9th, 2016

Hey, it's HighScalability time:

 

An alternate universe where Zeppelins rule the sky. 1929. (@AeroDork)

 

If you like this sort of Stuff then please support me on Patreon.
  • 15%: Facebook's reduction in latency using HTTP2's server push; 1.9x: nanotube transistors outperform silicon; 200: projectors used to film a "hologram"; 50%: of people fall for phishing attacks (it's OK to click); 5x: increased engagement using Google's Progressive Web Apps; 115,000+: Cassandra nodes at Apple; $500 million: Pokémon Go; $150M: Delta's cost for datacenter outage; 

  • Quotable Quotes: 
    • Dan Lyons: I wanted to write a book about what it’s like to be 50 and trying to reinvent yourself – that struggle. There are all these books and inspirational speakers talking about being a lifelong learner and it’s so great to reinvent yourself, the brand of you. And I wanted to say, you know, it’s not like that. It’s actually really painful.
    • Engineers & Coffee~ In modern application development everything is a stream now versus historically everything was a transaction. Make a request and the you're done. It's easier to write analytics on top of streams versus using Hive. It's cool Continue reading

Google gets API management tools in Apigee deal

Google plans to acquire API management vendor Apigee in a US$625 million deal that will give the search giant secure and multilanguage API tools used by companies bringing more and more of their services online.The deal, announced Thursday, gives Google access to tools that allow company back-end systems to communicate with mobile and web apps, Diane Greene, senior vice president of Google's cloud business, said in a blog post.APIs are "vital for how business gets done today in the fast-growing digital and mobile marketplace," she wrote. "They're the hubs through which companies, partners, and customers interact, whether it's a small business applying online for a loan or a point of sale system sending your warranty information to the manufacturer."To read this article in full or to leave a comment, please click here

These mundane jobs bots can take in the enterprise

An interventionBots are quickly infiltrating our personal lives and are now beginning to make their way into the enterprise. Inherently more complex than Siri reading you the weather or performing a Google search on IMDB, the enterprise can be a tough nut for bot tech to crack. It has taken some time for technologists to identify the best places to start looking to bot assistance or intervention within the enterprise. The good news is that there are several enterprise tasks that are ripe for bot intervention, and fortunately for end-users they are some of the most painful employee responsibilities within large organizations. Unit4 Chief Architect, Claus Jepsen, details where bots can be most handy.To read this article in full or to leave a comment, please click here