Why does Richard Stallman and the Free Software Foundation get so much hate?

Over on the Linux section of Reddit, someone asked the following question: “Within the community, there seems to be many people that dislike the Free Software Foundation, the GNU Project, and Richard Stallman, being the leader of them both. Why is this? I am unable to understand this; I value free software and the aforementioned people that have made it possible, and I do not understand why they get as much hate as they do.” It’s a good question.Within the open source and free software worlds, Stallman (and the Free Software Foundation—the FSF) hold an almost deity-like position in the hearts of many. For other people, well, they have the exact opposite feeling towards the man.To read this article in full or to leave a comment, please click here

Nutanix Pivots From Hyperconvergence To Platform

The chant for years and years from hyperconverged storage pioneer Nutanix has been “Ban the SAN.” But going forward, as the upstart is moving closer to its initial public offering, Nutanix wants to do much more. With two recent acquisitions, of PernixData and Calm.io, Nutanix is trying to transform itself into a proper, self-contained platform.

It will take either more acquisitions or lots more development to accomplish this goal. So Nutanix is by no means done. PernixData was equally ambitious in flash-accelerated and all-flash storage, and seems to have overextended itself as it invested in an effort to bring an

Nutanix Pivots From Hyperconvergence To Platform was written by Timothy Prickett Morgan at The Next Platform.

On the ‘net: BGP—the most successful virus

This Weekly Show episode was recorded live at IETF 96 in Berlin in July 2016. Greg Ferro and several guests discuss the state of routing protocols such as BGP, and explore different approaches to routing, like Facebook’s Open/R initiative. They also debate issues around telemetry, network disaggregation, and whether enterprises should participate in the IETF to influence vendor product development.

Listen to the podcast over at Packet Pushers

LinkedInTwitterGoogle+Facebook

The post On the ‘net: BGP—the most successful virus appeared first on 'net work.

29% off Huawei Stainless Steel Smartwatch with Black Suture Leather Strap – Deal Alert

Inspired by the classic designs of luxury watches, with cutting-edge technology, the Huawei Watch redefines what we’ve come to expect from a smartwatch. Developed as a statement piece rather than a smartphone for your wrist, it combines elegant craftsmanship with Android Wear, iOS and iPhone compatibility to deliver a new high-end standard for the category.  The 400x400 display delivers notifications, music from your phone, and more than 4,000 apps you can personalize and explore without being tethered to your phone – keeping you connected rather than distracted. With a variety of watch faces to choose from, it’s ready to pair with any ensemble or occasion. Whether you’re getting ready to walk down the aisle, hike up a mountain, or step into an important meeting, the Huawei Watch seamlessly fits any situation while tracking your movement with built-in heart rate monitoring and exercise pattern recognition.To read this article in full or to leave a comment, please click here

See you on Sept. 7th: Apple’s iPhone event is confirmed

Apple will take the wraps off the newest iPhone(s) and perhaps a second-gen Apple Watch at an event on Sept. 7 at 10 a.m. Pacific/1 p.m. Eastern. The venue is a standard Apple pick, San Francisco’s Bill Graham Civic Auditorium. The invitation, which Apple emailed to media outlets on Monday morning, gives away absolutely nothing. “See you on the 7th,” it says. That’s it. But if history tells us anything, it’s that new iPhones are on deck next week. The invite’s colorful lights could be hinting at that incredible dual lens camera we’ve been hearing so much about, though maybe we’re just grasping there. The next-gen iPhone is also expected to ditch the headphone jack, a controversial decision if ever there was one.To read this article in full or to leave a comment, please click here

The cat-and-mouse story of implementing anti-spam for Mail.Ru Group’s email service and what Tarantool has to do with this

Hey guys!

In this article, I’d like to tell you a story of implementing the anti-spam system for Mail.Ru Group’s email service and share our experience of using the Tarantool database within this project: what tasks Tarantool serves, what limitations and integration issues we faced, what pitfalls we fell into and how we finally arrived to a revelation.

Let me start with a short backtrace. We started introducing anti-spam for the email service roughly ten years ago. Our first filtering solution was Kaspersky Anti-Spam together with RBL (Real-time blackhole list — a realtime list of IP addresses that have something to do with spam mailouts). This allowed us to decrease the flow of spam messages, but due to the system’s inertia, we couldn’t suppress spam mailouts quickly enough (i.e. in the real time). The other requirement that wasn’t met was speed: users should have received verified email messages with a minimal delay, but the integrated solution was not fast enough to catch up with the spammers. Spam senders are very fast at changing their behavior model and the outlook of their spam content when they find out that spam messages are not delivered. So, we couldn’t put up Continue reading

Sponsored Post: Spotify, Aerospike, Exoscale, Host Color, Scalyr, Gusto, LaunchDarkly, VividCortex, MemSQL, InMemory.Net, Zohocorp

Who's Hiring?

  • Spotify is looking for individuals passionate in infrastructure to join our Site Reliability Engineering organization. Spotify SREs design, code, and operate tools and systems to reduce the amount of time and effort necessary for our engineers to scale the world’s best music streaming product to 40 million users. We are strong believers in engineering teams taking operational responsibility for their products and work hard to support them in this. We work closely with engineers to advocate sensible, scalable, systems design and share responsibility with them in diagnosing, resolving, and preventing production issues. We are looking for an SRE Engineering Manager in NYC and SREs in Boston and NYC.

  • IT Security Engineering. At Gusto we are on a mission to create a world where work empowers a better life. As Gusto's IT Security Engineer you'll shape the future of IT security and compliance. We're looking for a strong IT technical lead to manage security audits and write and implement controls. You'll also focus on our employee, network, and endpoint posture. As Gusto's first IT Security Engineer, you will be able to build the security organization with direct impact to protecting PII and ePHI. Read more and apply here.

Fun Continue reading

20%-31% off Select Sony Audio Products Through Sept 3 via Amazon – Deal Alert

Various Sony audio products are currently discounted at Amazon, and will remain discounted only through September 3rd. Some of the highlights are below: 31% off Sony SRSX11 Ultra-Portable Bluetooth Speaker 25% off Sony MDRXB650BT/R Extra Bass Bluetooth Headphones 21% off Sony STRDH130 2 Channel Stereo Receiver 26% off Sony NWE393/B 4GB Walkman MP3 Player 22% off Sony SSCS3 3-Way Floor-Standing Speaker 22% off Sony SACS9 10-Inch Active Subwoofer 24% off Sony SSCS5 3-Way 3-Driver Bookshelf Speaker System 20% off Sony HTCT790 Sound Bar with 4K and HDR Support See the table below for exact prices. Other models may be discounted as well, so be sure to look around once you visit and take advantage of the savings while they're here.To read this article in full or to leave a comment, please click here

Attackers deploy rogue proxies on computers to hijack HTTPS traffic

Security researchers have highlighted in recent months how the web proxy configuration in browsers and operating systems can be abused to steal sensitive user data. It seems that attackers are catching on.A new attack spotted and analyzed by malware researchers from Microsoft uses Word documents with malicious code that doesn't install traditional malware, but instead configures browsers to use a web proxy controlled by attackers.In addition to deploying rogue proxy settings, the attack also installs a self-signed root certificate on the system so that attackers can snoop on encrypted HTTPS traffic as it passes through their proxy servers.To read this article in full or to leave a comment, please click here

Attackers deploy rogue proxies on computers to hijack HTTPS traffic

Security researchers have highlighted in recent months how the web proxy configuration in browsers and operating systems can be abused to steal sensitive user data. It seems that attackers are catching on.A new attack spotted and analyzed by malware researchers from Microsoft uses Word documents with malicious code that doesn't install traditional malware, but instead configures browsers to use a web proxy controlled by attackers.In addition to deploying rogue proxy settings, the attack also installs a self-signed root certificate on the system so that attackers can snoop on encrypted HTTPS traffic as it passes through their proxy servers.To read this article in full or to leave a comment, please click here

Facebook axed human Trending News editors, algorithm immediately goes full-on FAIL

Hopefully you were not curious about why McChicken was trending on Twitter. If you checked it out and saw the graphic video of a man engaging in a sexual act with the McDonald’s sandwich, then you might have wished for a miracle cure to unsee it. @geraldtbh But Twitter was not the only place McChicken was trending; it was also trending on Facebook because it was going viral.To read this article in full or to leave a comment, please click here

Facebook axed human Trending News editors, algorithm immediately goes full-on FAIL

Hopefully you were not curious about why McChicken was trending on Twitter. If you checked it out and saw the graphic video of a man engaging in a sexual act with the McDonald’s sandwich, then you might have wished for a miracle cure to unsee it. @geraldtbh But Twitter was not the only place McChicken was trending; it was also trending on Facebook because it was going viral.To read this article in full or to leave a comment, please click here

We’re learning the wrong lessons from airline IT outages

This summer, multiple high-profile organizations have experienced embarrassing and financially costly business disruptions. The explanations and excuses for these service interruptions—delivered by company executives and Monday Morning Quarterbacks alike—fail to address the underlying cause of these issues: lack of rigorous senior management oversight. Southwest Airlines and Delta both experienced widespread consumer dissatisfaction and business outages over the last month due to what executives have blamed on equipment failures. Pundits blame the meltdowns on cobbled-together legacy infrastructure. Both miss the point. On July 20, 2016, Southwest Airlines IT systems went haywire due to a malfunctioning router, cancelling 700 flights and stranding thousands of passengers. Southwest Airlines CEO Gary Kelly characterized the outage as a “once-in-a-thousand-year flood.”To read this article in full or to leave a comment, please click here