Blogs

BROWSE: Most Recent | Popular Tags |

Tags > security

Four short links: 23 July 2014

By Nat Torkington
July 23, 2014

Talking to Big Machines (Jon Bruner) — “Selfless machines” coordinate across networks and modify their own operation to improve the output of the entire system. Docker Security — Containers do not contain and Stop assuming that Docker and the Linux …

Four short links: 23 July 2014

By Nat Torkington
July 23, 2014

Talking to Big Machines (Jon Bruner) — “Selfless machines” coordinate across networks and modify their own operation to improve the output of the entire system. Docker Security — Containers do not contain and Stop assuming that Docker and the Linux …

Four short links: 23 July 2014

By Nat Torkington
July 23, 2014

Talking to Big Machines (Jon Bruner) — “Selfless machines” coordinate across networks and modify their own operation to improve the output of the entire system. Docker Security — Containers do not contain and Stop assuming that Docker and the Linux …

Four short links: 21 July 2014

By Nat Torkington
July 21, 2014

nupic (github) -GPL v3-licensed ode from Numenta, at last. See their patent position. Robocup — soccer robotics contest, condition of entry is that all codes are open sourced after the contest. (via The Economist) Security Data Science Paper Collection — …

Four short links: 21 July 2014

By Nat Torkington
July 21, 2014

nupic (github) -GPL v3-licensed ode from Numenta, at last. See their patent position. Robocup — soccer robotics contest, condition of entry is that all codes are open sourced after the contest. (via The Economist) Security Data Science Paper Collection — …

Four short links: 21 July 2014

By Nat Torkington
July 21, 2014

nupic (github) -GPL v3-licensed ode from Numenta, at last. See their patent position. Robocup — soccer robotics contest, condition of entry is that all codes are open sourced after the contest. (via The Economist) Security Data Science Paper Collection — …

Four short links: 16 July 2014

By Nat Torkington
July 16, 2014

Inside bit.ly’s Distributed Systems — this is a 101 for modern web distributed systems design. Patent Trolls are Now 67% of New Patent Lawsuits in USA (WaPo) — data from PwC. Intel Made Half a Billion from Internet of Things …

Four short links: 16 July 2014

By Nat Torkington
July 16, 2014

Inside bit.ly’s Distributed Systems — this is a 101 for modern web distributed systems design. Patent Trolls are Now 67% of New Patent Lawsuits in USA (WaPo) — data from PwC. Intel Made Half a Billion from Internet of Things …

Four short links: 16 July 2014

By Nat Torkington
July 16, 2014

Inside bit.ly’s Distributed Systems — this is a 101 for modern web distributed systems design. Patent Trolls are Now 67% of New Patent Lawsuits in USA (WaPo) — data from PwC. Intel Made Half a Billion from Internet of Things …

Four short links: 14 July 2014

By Nat Torkington
July 14, 2014

Handheld Scanners Attack — shipping and logistics operations compromised by handheld scanners running malware-infested Windows XP. Adventures in Cognitive Biases (MIT) — web adventure to build your cognitive defences against biases. Quoc Le’s Lectures on Deep Learning — Machine Learning …

Four short links: 14 July 2014

By Nat Torkington
July 14, 2014

Handheld Scanners Attack — shipping and logistics operations compromised by handheld scanners running malware-infested Windows XP. Adventures in Cognitive Biases (MIT) — web adventure to build your cognitive defences against biases. Quoc Le’s Lectures on Deep Learning — Machine Learning …

Four short links: 14 July 2014

By Nat Torkington
July 14, 2014

Handheld Scanners Attack — shipping and logistics operations compromised by handheld scanners running malware-infested Windows XP. Adventures in Cognitive Biases (MIT) — web adventure to build your cognitive defences against biases. Quoc Le’s Lectures on Deep Learning — Machine Learning …

Four short links: 10 July 2014

By Nat Torkington
July 10, 2014

Ex-Google Hacker Taking On The World’s Spy Agencies (Wired) — profile of the security expert working on protecting reporters. Meet Google’s Security Princess (Elle) — would have preferred to see her story in Wired. Much is good here, but this …

Four short links: 10 July 2014

By Nat Torkington
July 10, 2014

Ex-Google Hacker Taking On The World’s Spy Agencies (Wired) — profile of the security expert working on protecting reporters. Meet Google’s Security Princess (Elle) — would have preferred to see her story in Wired. Much is good here, but this …

Four short links: 10 July 2014

By Nat Torkington
July 10, 2014

Ex-Google Hacker Taking On The World’s Spy Agencies (Wired) — profile of the security expert working on protecting reporters. Meet Google’s Security Princess (Elle) — would have preferred to see her story in Wired. Much is good here, but this …

Four short links: 1 July 2014

By Nat Torkington
July 1, 2014

word2vec — This tool provides an efficient implementation of the continuous bag-of-words and skip-gram architectures for computing vector representations of words. These representations can be subsequently used in many natural language processing applications and for further research. From Google Research …

Four short links: 1 July 2014

By Nat Torkington
July 1, 2014

word2vec — This tool provides an efficient implementation of the continuous bag-of-words and skip-gram architectures for computing vector representations of words. These representations can be subsequently used in many natural language processing applications and for further research. From Google Research …

Four short links: 1 July 2014

By Nat Torkington
July 1, 2014

word2vec — This tool provides an efficient implementation of the continuous bag-of-words and skip-gram architectures for computing vector representations of words. These representations can be subsequently used in many natural language processing applications and for further research. From Google Research …

Four short links: 30 June 2014

By Nat Torkington
June 30, 2014

Interacting with a World of Connected Objects (Tom Coates) — notes from one of my favourite Foo Camp sessions. Security Considerations with Continuous Deployment (IBM) — rundown of categories of security issues your org might face, and how to tackle …

Four short links: 30 June 2014

By Nat Torkington
June 30, 2014

Interacting with a World of Connected Objects (Tom Coates) — notes from one of my favourite Foo Camp sessions. Security Considerations with Continuous Deployment (IBM) — rundown of categories of security issues your org might face, and how to tackle …

Four short links: 30 June 2014

By Nat Torkington
June 30, 2014

Interacting with a World of Connected Objects (Tom Coates) — notes from one of my favourite Foo Camp sessions. Security Considerations with Continuous Deployment (IBM) — rundown of categories of security issues your org might face, and how to tackle …

Four short links: 27 June 2014

By Nat Torkington
June 27, 2014

MillWheel: Fault-Tolerant Stream Processing at Internet Scale — Google Research paper on the tech underlying the new cloud DataFlow tool. Watch the video. Yow. The Integer Overflow Bug That Went to Mars — long-standing (20 year old!) bug in a …

Four short links: 27 June 2014

By Nat Torkington
June 27, 2014

MillWheel: Fault-Tolerant Stream Processing at Internet Scale — Google Research paper on the tech underlying the new cloud DataFlow tool. Watch the video. Yow. The Integer Overflow Bug That Went to Mars — long-standing (20 year old!) bug in a …

Four short links: 27 June 2014

By Nat Torkington
June 27, 2014

MillWheel: Fault-Tolerant Stream Processing at Internet Scale — Google Research paper on the tech underlying the new cloud DataFlow tool. Watch the video. Yow. The Integer Overflow Bug That Went to Mars — long-standing (20 year old!) bug in a …

Four short links: 25 June 2014

By Nat Torkington
June 25, 2014

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones (Wired) — I’m fascinated to learn there’s an Italian company making (and selling) the mobile phone rootkits that governments use. On the Near Impossibility of Measuring the Returns …

Four short links: 25 June 2014

By Nat Torkington
June 25, 2014

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones (Wired) — I’m fascinated to learn there’s an Italian company making (and selling) the mobile phone rootkits that governments use. On the Near Impossibility of Measuring the Returns …

Four short links: 25 June 2014

By Nat Torkington
June 25, 2014

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones (Wired) — I’m fascinated to learn there’s an Italian company making (and selling) the mobile phone rootkits that governments use. On the Near Impossibility of Measuring the Returns …

Four short links: 23 June 2014

By Nat Torkington
June 23, 2014

Minimum Viable Block Chain — What follows is an attempt to explain, from the ground up, why the particular pieces (digital signatures, proof-of-work, transaction blocks) are needed, and how they all come together to form the “minimum viable block chain” …

Four short links: 23 June 2014

By Nat Torkington
June 23, 2014

Minimum Viable Block Chain — What follows is an attempt to explain, from the ground up, why the particular pieces (digital signatures, proof-of-work, transaction blocks) are needed, and how they all come together to form the “minimum viable block chain” …

Four short links: 23 June 2014

By Nat Torkington
June 23, 2014

Minimum Viable Block Chain — What follows is an attempt to explain, from the ground up, why the particular pieces (digital signatures, proof-of-work, transaction blocks) are needed, and how they all come together to form the “minimum viable block chain” …

Cloud security is not an oxymoron

By Mike Loukides
June 19, 2014

I just ran across Katie Fehrenbacher’s article in GigaOm that made a point I’ve been arguing (perhaps not strongly enough) for years. When you start talking to people about “the cloud,” you frequently run into a knee-jerk reaction: “Of course, …

Cloud security is not an oxymoron

By Mike Loukides
June 19, 2014

I just ran across Katie Fehrenbacher’s article in GigaOm that made a point I’ve been arguing (perhaps not strongly enough) for years. When you start talking to people about “the cloud,” you frequently run into a knee-jerk reaction: “Of course, …

Cloud security is not an oxymoron

By Mike Loukides
June 19, 2014

I just ran across Katie Fehrenbacher’s article in GigaOm that made a point I’ve been arguing (perhaps not strongly enough) for years. When you start talking to people about “the cloud,” you frequently run into a knee-jerk reaction: “Of course, …

Four short links: 12 June 2014

By Nat Torkington
June 12, 2014

Norbert Weiner (The Atlantic) — His fears for the future stemmed from two fundamental convictions: We humans can’t resist selfishly misusing the powers our machines give us, to the detriment of our fellow humans and the planet; and there’s a …

Four short links: 11 June 2014

By Nat Torkington
June 12, 2014

UK Copyright Law Permits Researchers to Data Mine — changes mean Copyright holders can require researchers to pay to access their content but cannot then restrict text or data mining for non-commercial purposes thereafter, under the new rules. However, researchers …

Four short links: 12 June 2014

By Nat Torkington
June 12, 2014

Norbert Weiner (The Atlantic) — His fears for the future stemmed from two fundamental convictions: We humans can’t resist selfishly misusing the powers our machines give us, to the detriment of our fellow humans and the planet; and there’s a …

Four short links: 11 June 2014

By Nat Torkington
June 11, 2014

UK Copyright Law Permits Researchers to Data Mine — changes mean Copyright holders can require researchers to pay to access their content but cannot then restrict text or data mining for non-commercial purposes thereafter, under the new rules. However, researchers …

Four short links: 10 June 2014

By Nat Torkington
June 10, 2014

Trusting Browser Code (Tim Bray) — on the fundamental weakness of the ‘net as manifest in the browser. Deep Learning in the Raspberry Pi (Pete Warden) — $30 now gets you a computer you can run deep learning algorithms on. …

Four short links: 10 June 2014

By Nat Torkington
June 10, 2014

Trusting Browser Code (Tim Bray) — on the fundamental weakness of the ‘net as manifest in the browser. Deep Learning in the Raspberry Pi (Pete Warden) — $30 now gets you a computer you can run deep learning algorithms on. …

Four short links: 6 June 2014

By Nat Torkington
June 6, 2014

Ethics and UX Design (Slideshare) –We are the thieves of time. This excellent talk challenges you (via Aristotle) to understand what a good life is, and whether you’re designing to bring it about. (via Keith Bolland) Pepper Personal Robot — …

Four short links: 5 June 2014

By Nat Torkington
June 5, 2014

beaglepilot (Github) — open source open hardware autopilot for Beagleboard. (via DIY Drones) IFR Robot Sales Charts (PDF) — 2013: all-time high of 179,000 industrial robots sold and growth continues in 2014. (via Robohub) The Top 5 Claims That Defenders …

Four short links: 4 June 2014

By Nat Torkington
June 4, 2014

Swift on GitHub — watch a thousand projects launch. HTTP API Design Guide — extracted from work on the Heroku Platform API. End-to-End PGP in Gmail — Google releases an open source Chrome extension to enable end-to-end OpenPGP on top …

Four short links: 28 May 2014

By Nat Torkington
May 28, 2014

Maciej Ceglowski on Our Internet — If you haven’t already read this because someone pushed it into your hands, read it now. If these vast databases are valuable enough, it doesn’t matter who they belong to. The government will always …

Four short links: 21 May 2014

By Nat Torkington
May 21, 2014

EventHub — open source funnel/cohort/a-b analysis tool. Mantra — a collection of free/open source security tools, integrated into a browser (Firefox or Chromium). Reverse Engineering Mac Malware (PDF) — fascinating to see how it’s shipped, bundled, packaged, and distributed. Everything …

Four short links: 19 May 2014

By Nat Torkington
May 19, 2014

Your Coffee Machine is Watching You (Mary Beard) — the future of surveillance isn’t more CCTV cameras, it’s every device ratting you out, all the time. Economics of Apologies — apologies work to restore relationships but are costly for the …

Four short links: 16 May 2014

By Nat Torkington
May 16, 2014

Mozilla’s Winter of Security — Students who have to perform a semester project as part of their university curriculum can apply to one of the MWOS project. Projects are guided by a Mozilla Adviser, and a University Professor. Students are …

Four short links: 15 May 2014

By Nat Torkington
May 15, 2014

Pervasive Monitoring is an Attack (Tim Bray) — if your ap­pli­ca­tion doesn’t sup­port pri­va­cy, that’s prob­a­bly a bug in your ap­pli­ca­tion. Reconciling Mozilla’s Mission and the W3C EME — essentially, “we don’t want to put a closed source bolus of …

Four short links: 13 May 2014

By Nat Torkington
May 11, 2014

Reverse Engineering for Beginners (GitHub) — from assembly language through stack overflows, dongles, and more. Incident Response at Heroku — the difference between good and bad shops is that good shops have a routine for exceptions. 3D Petrie Museum — …

Four short links: 12 May 2014

By Nat Torkington
May 11, 2014

Questions I Ask When Reviewing a Design (Jason Fried) — a good list of questions to frown and stroke one’s chin while asking. Bro — open source network security monitor/IDS. Seven Deadly Myths of Autonomy (PDF) — it’s easy to …

Four short links: 9 May 2014

By Nat Torkington
May 8, 2014

Hardening Android for Security and Privacy — a brilliant project! prototype of a secure, full-featured, Android telecommunications device with full Tor support, individual application firewalling, true cell network baseband isolation, and optional ZRTP encrypted voice and video support. ZRTP does …


1 to 50 of 517 Next
The Watering Hole