Blogs

BROWSE: Most Recent | Popular Tags |

Tags > security

Four short links: 18 August 2014

By Nat Torkington
August 18, 2014

Oolite — open-source clone of Elite, the classic space trading game from the 80s. Who Owns the Robots Rules The World (PDF) — interesting finding: As companies substitute machines and computers for human activity, workers need to own part of …

Four short links: 18 August 2014

By Nat Torkington
August 18, 2014

Oolite — open-source clone of Elite, the classic space trading game from the 80s. Who Owns the Robots Rules The World (PDF) — interesting finding: As companies substitute machines and computers for human activity, workers need to own part of …

Four short links: 18 August 2014

By Nat Torkington
August 18, 2014

Oolite — open-source clone of Elite, the classic space trading game from the 80s. Who Owns the Robots Rules The World (PDF) — interesting finding: As companies substitute machines and computers for human activity, workers need to own part of …

Four short links: 8 August 2014

By Nat Torkington
August 8, 2014

Everything You Wanted to Know About Synchronization But Were Too Afraid to Ask (PDF) — This paper presents the most exhaustive study of synchronization to date. We span multiple layers, from hardware cache-coherence protocols up to high-level concurrent software. We …

Four short links: 8 August 2014

By Nat Torkington
August 8, 2014

Everything You Wanted to Know About Synchronization But Were Too Afraid to Ask (PDF) — This paper presents the most exhaustive study of synchronization to date. We span multiple layers, from hardware cache-coherence protocols up to high-level concurrent software. We …

Four short links: 8 August 2014

By Nat Torkington
August 8, 2014

Everything You Wanted to Know About Synchronization But Were Too Afraid to Ask (PDF) — This paper presents the most exhaustive study of synchronization to date. We span multiple layers, from hardware cache-coherence protocols up to high-level concurrent software. We …

Four short links: 31 July 2014

By Nat Torkington
July 31, 2014

Ocrad.js — open source OCR in Javascript, a port of GNU Ocrad software. HP’s IoT Security Research (PDF) — 70% of devices use unencrypted network services, 90% of devices collected at least one piece of personal information, 60% of those …

Four short links: 31 July 2014

By Nat Torkington
July 31, 2014

Ocrad.js — open source OCR in Javascript, a port of GNU Ocrad software. HP’s IoT Security Research (PDF) — 70% of devices use unencrypted network services, 90% of devices collected at least one piece of personal information, 60% of those …

Four short links: 31 July 2014

By Nat Torkington
July 31, 2014

Ocrad.js — open source OCR in Javascript, a port of GNU Ocrad software. HP’s IoT Security Research (PDF) — 70% of devices use unencrypted network services, 90% of devices collected at least one piece of personal information, 60% of those …

Four short links: 28 July 2014

By Nat Torkington
July 28, 2014

streisand — sets up a new server running L2TP/IPsec, OpenSSH, OpenVPN, Shadowsocks, Stunnel, and a Tor bridge. It also generates custom configuration instructions for all of these services. At the end of the run you are given an HTML file …

Four short links: 28 July 2014

By Nat Torkington
July 28, 2014

streisand — sets up a new server running L2TP/IPsec, OpenSSH, OpenVPN, Shadowsocks, Stunnel, and a Tor bridge. It also generates custom configuration instructions for all of these services. At the end of the run you are given an HTML file …

Four short links: 28 July 2014

By Nat Torkington
July 28, 2014

streisand — sets up a new server running L2TP/IPsec, OpenSSH, OpenVPN, Shadowsocks, Stunnel, and a Tor bridge. It also generates custom configuration instructions for all of these services. At the end of the run you are given an HTML file …

Four short links: 23 July 2014

By Nat Torkington
July 23, 2014

Talking to Big Machines (Jon Bruner) — “Selfless machines” coordinate across networks and modify their own operation to improve the output of the entire system. Docker Security — Containers do not contain and Stop assuming that Docker and the Linux …

Four short links: 23 July 2014

By Nat Torkington
July 23, 2014

Talking to Big Machines (Jon Bruner) — “Selfless machines” coordinate across networks and modify their own operation to improve the output of the entire system. Docker Security — Containers do not contain and Stop assuming that Docker and the Linux …

Four short links: 23 July 2014

By Nat Torkington
July 23, 2014

Talking to Big Machines (Jon Bruner) — “Selfless machines” coordinate across networks and modify their own operation to improve the output of the entire system. Docker Security — Containers do not contain and Stop assuming that Docker and the Linux …

Four short links: 21 July 2014

By Nat Torkington
July 21, 2014

nupic (github) -GPL v3-licensed ode from Numenta, at last. See their patent position. Robocup — soccer robotics contest, condition of entry is that all codes are open sourced after the contest. (via The Economist) Security Data Science Paper Collection — …

Four short links: 21 July 2014

By Nat Torkington
July 21, 2014

nupic (github) -GPL v3-licensed ode from Numenta, at last. See their patent position. Robocup — soccer robotics contest, condition of entry is that all codes are open sourced after the contest. (via The Economist) Security Data Science Paper Collection — …

Four short links: 21 July 2014

By Nat Torkington
July 21, 2014

nupic (github) -GPL v3-licensed ode from Numenta, at last. See their patent position. Robocup — soccer robotics contest, condition of entry is that all codes are open sourced after the contest. (via The Economist) Security Data Science Paper Collection — …

Four short links: 16 July 2014

By Nat Torkington
July 16, 2014

Inside bit.ly’s Distributed Systems — this is a 101 for modern web distributed systems design. Patent Trolls are Now 67% of New Patent Lawsuits in USA (WaPo) — data from PwC. Intel Made Half a Billion from Internet of Things …

Four short links: 16 July 2014

By Nat Torkington
July 16, 2014

Inside bit.ly’s Distributed Systems — this is a 101 for modern web distributed systems design. Patent Trolls are Now 67% of New Patent Lawsuits in USA (WaPo) — data from PwC. Intel Made Half a Billion from Internet of Things …

Four short links: 16 July 2014

By Nat Torkington
July 16, 2014

Inside bit.ly’s Distributed Systems — this is a 101 for modern web distributed systems design. Patent Trolls are Now 67% of New Patent Lawsuits in USA (WaPo) — data from PwC. Intel Made Half a Billion from Internet of Things …

Four short links: 14 July 2014

By Nat Torkington
July 14, 2014

Handheld Scanners Attack — shipping and logistics operations compromised by handheld scanners running malware-infested Windows XP. Adventures in Cognitive Biases (MIT) — web adventure to build your cognitive defences against biases. Quoc Le’s Lectures on Deep Learning — Machine Learning …

Four short links: 14 July 2014

By Nat Torkington
July 14, 2014

Handheld Scanners Attack — shipping and logistics operations compromised by handheld scanners running malware-infested Windows XP. Adventures in Cognitive Biases (MIT) — web adventure to build your cognitive defences against biases. Quoc Le’s Lectures on Deep Learning — Machine Learning …

Four short links: 14 July 2014

By Nat Torkington
July 14, 2014

Handheld Scanners Attack — shipping and logistics operations compromised by handheld scanners running malware-infested Windows XP. Adventures in Cognitive Biases (MIT) — web adventure to build your cognitive defences against biases. Quoc Le’s Lectures on Deep Learning — Machine Learning …

Four short links: 10 July 2014

By Nat Torkington
July 10, 2014

Ex-Google Hacker Taking On The World’s Spy Agencies (Wired) — profile of the security expert working on protecting reporters. Meet Google’s Security Princess (Elle) — would have preferred to see her story in Wired. Much is good here, but this …

Four short links: 10 July 2014

By Nat Torkington
July 10, 2014

Ex-Google Hacker Taking On The World’s Spy Agencies (Wired) — profile of the security expert working on protecting reporters. Meet Google’s Security Princess (Elle) — would have preferred to see her story in Wired. Much is good here, but this …

Four short links: 10 July 2014

By Nat Torkington
July 10, 2014

Ex-Google Hacker Taking On The World’s Spy Agencies (Wired) — profile of the security expert working on protecting reporters. Meet Google’s Security Princess (Elle) — would have preferred to see her story in Wired. Much is good here, but this …

Four short links: 1 July 2014

By Nat Torkington
July 1, 2014

word2vec — This tool provides an efficient implementation of the continuous bag-of-words and skip-gram architectures for computing vector representations of words. These representations can be subsequently used in many natural language processing applications and for further research. From Google Research …

Four short links: 1 July 2014

By Nat Torkington
July 1, 2014

word2vec — This tool provides an efficient implementation of the continuous bag-of-words and skip-gram architectures for computing vector representations of words. These representations can be subsequently used in many natural language processing applications and for further research. From Google Research …

Four short links: 1 July 2014

By Nat Torkington
July 1, 2014

word2vec — This tool provides an efficient implementation of the continuous bag-of-words and skip-gram architectures for computing vector representations of words. These representations can be subsequently used in many natural language processing applications and for further research. From Google Research …

Four short links: 30 June 2014

By Nat Torkington
June 30, 2014

Interacting with a World of Connected Objects (Tom Coates) — notes from one of my favourite Foo Camp sessions. Security Considerations with Continuous Deployment (IBM) — rundown of categories of security issues your org might face, and how to tackle …

Four short links: 30 June 2014

By Nat Torkington
June 30, 2014

Interacting with a World of Connected Objects (Tom Coates) — notes from one of my favourite Foo Camp sessions. Security Considerations with Continuous Deployment (IBM) — rundown of categories of security issues your org might face, and how to tackle …

Four short links: 30 June 2014

By Nat Torkington
June 30, 2014

Interacting with a World of Connected Objects (Tom Coates) — notes from one of my favourite Foo Camp sessions. Security Considerations with Continuous Deployment (IBM) — rundown of categories of security issues your org might face, and how to tackle …

Four short links: 27 June 2014

By Nat Torkington
June 27, 2014

MillWheel: Fault-Tolerant Stream Processing at Internet Scale — Google Research paper on the tech underlying the new cloud DataFlow tool. Watch the video. Yow. The Integer Overflow Bug That Went to Mars — long-standing (20 year old!) bug in a …

Four short links: 27 June 2014

By Nat Torkington
June 27, 2014

MillWheel: Fault-Tolerant Stream Processing at Internet Scale — Google Research paper on the tech underlying the new cloud DataFlow tool. Watch the video. Yow. The Integer Overflow Bug That Went to Mars — long-standing (20 year old!) bug in a …

Four short links: 27 June 2014

By Nat Torkington
June 27, 2014

MillWheel: Fault-Tolerant Stream Processing at Internet Scale — Google Research paper on the tech underlying the new cloud DataFlow tool. Watch the video. Yow. The Integer Overflow Bug That Went to Mars — long-standing (20 year old!) bug in a …

Four short links: 25 June 2014

By Nat Torkington
June 25, 2014

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones (Wired) — I’m fascinated to learn there’s an Italian company making (and selling) the mobile phone rootkits that governments use. On the Near Impossibility of Measuring the Returns …

Four short links: 25 June 2014

By Nat Torkington
June 25, 2014

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones (Wired) — I’m fascinated to learn there’s an Italian company making (and selling) the mobile phone rootkits that governments use. On the Near Impossibility of Measuring the Returns …

Four short links: 25 June 2014

By Nat Torkington
June 25, 2014

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones (Wired) — I’m fascinated to learn there’s an Italian company making (and selling) the mobile phone rootkits that governments use. On the Near Impossibility of Measuring the Returns …

Four short links: 23 June 2014

By Nat Torkington
June 23, 2014

Minimum Viable Block Chain — What follows is an attempt to explain, from the ground up, why the particular pieces (digital signatures, proof-of-work, transaction blocks) are needed, and how they all come together to form the “minimum viable block chain” …

Four short links: 23 June 2014

By Nat Torkington
June 23, 2014

Minimum Viable Block Chain — What follows is an attempt to explain, from the ground up, why the particular pieces (digital signatures, proof-of-work, transaction blocks) are needed, and how they all come together to form the “minimum viable block chain” …

Four short links: 23 June 2014

By Nat Torkington
June 23, 2014

Minimum Viable Block Chain — What follows is an attempt to explain, from the ground up, why the particular pieces (digital signatures, proof-of-work, transaction blocks) are needed, and how they all come together to form the “minimum viable block chain” …

Cloud security is not an oxymoron

By Mike Loukides
June 19, 2014

I just ran across Katie Fehrenbacher’s article in GigaOm that made a point I’ve been arguing (perhaps not strongly enough) for years. When you start talking to people about “the cloud,” you frequently run into a knee-jerk reaction: “Of course, …

Cloud security is not an oxymoron

By Mike Loukides
June 19, 2014

I just ran across Katie Fehrenbacher’s article in GigaOm that made a point I’ve been arguing (perhaps not strongly enough) for years. When you start talking to people about “the cloud,” you frequently run into a knee-jerk reaction: “Of course, …

Cloud security is not an oxymoron

By Mike Loukides
June 19, 2014

I just ran across Katie Fehrenbacher’s article in GigaOm that made a point I’ve been arguing (perhaps not strongly enough) for years. When you start talking to people about “the cloud,” you frequently run into a knee-jerk reaction: “Of course, …

Four short links: 12 June 2014

By Nat Torkington
June 12, 2014

Norbert Weiner (The Atlantic) — His fears for the future stemmed from two fundamental convictions: We humans can’t resist selfishly misusing the powers our machines give us, to the detriment of our fellow humans and the planet; and there’s a …

Four short links: 11 June 2014

By Nat Torkington
June 12, 2014

UK Copyright Law Permits Researchers to Data Mine — changes mean Copyright holders can require researchers to pay to access their content but cannot then restrict text or data mining for non-commercial purposes thereafter, under the new rules. However, researchers …

Four short links: 12 June 2014

By Nat Torkington
June 12, 2014

Norbert Weiner (The Atlantic) — His fears for the future stemmed from two fundamental convictions: We humans can’t resist selfishly misusing the powers our machines give us, to the detriment of our fellow humans and the planet; and there’s a …

Four short links: 11 June 2014

By Nat Torkington
June 11, 2014

UK Copyright Law Permits Researchers to Data Mine — changes mean Copyright holders can require researchers to pay to access their content but cannot then restrict text or data mining for non-commercial purposes thereafter, under the new rules. However, researchers …

Four short links: 10 June 2014

By Nat Torkington
June 10, 2014

Trusting Browser Code (Tim Bray) — on the fundamental weakness of the ‘net as manifest in the browser. Deep Learning in the Raspberry Pi (Pete Warden) — $30 now gets you a computer you can run deep learning algorithms on. …


1 to 50 of 529 Next
The Watering Hole