Skip to main content

Home/ Open Web/ Group items tagged computer

Rss Feed Group items tagged

Paul Merrell

EU-US Personal Data Privacy Deal 'Cracked Beyond Repair' - 0 views

  • Privacy Shield is the proposed new deal between the EU and the US that is supposed to safeguard all personal data on EU citizens held on computer systems in the US from being subject to mass surveillance by the US National Security Agency. The data can refer to any transaction — web purchases, cars or clothing — involving an EU citizen whose data is held on US servers. Privacy groups say Privacy Shield — which replaces the Safe Harbor agreement ruled unlawful in October 2015 — does not meet strict EU standard on the use of personal data. Monique Goyens, Director General of the European Consumer Organization (BEUC) told Sputnik: “We consider that the shield is cracked beyond repair and is unlikely to stand scrutiny by the European Court of Justice. A fundamental problem remains that the US side of the shield is made of clay, not iron.”
  • The agreement has been under negotiation for months ever since the because the European Court of Justice ruled in October 2015 that the previous EU-US data agreement — Safe Harbor — was invalid. The issue arises from the strict EU laws — enshrined in the Charter of Fundamental Rights of the European Union — to the privacy of their personal data.
  • The Safe Harbor agreement was a quasi-judicial understanding that the US undertook to agree that it would ensure that EU citizens’ data on US servers would be held and protected under the same restrictions as it would be under EU law and directives. The data covers a huge array of information — from Internet and communications usage, to sales transactions, import and exports.
  • ...1 more annotation...
  • The case arose when Maximillian Schrems, a Facebook user, lodged a complaint with the Irish Data Protection Commissioner, arguing that — in the light of the revelations by ex-CIA contractor Edward Snowden of mass surveillance by the US National Security Agency (NSA) — the transfer of data from Facebook’s Irish subsidiary onto the company’s servers in the US does not provide sufficient protection of his personal data. The court ruled that: “the Safe Harbor Decision denies the national supervisory authorities their powers where a person calls into question whether the decision is compatible with the protection of the privacy and of the fundamental rights and freedoms of individuals.”
  •  
    Off we go for another trip to the European Court of Justice.
Paul Merrell

Symantec: CIA Linked To Cyberattacks In 16 Countries - 0 views

  • Internet and computer security company Symantec has issued a statement today related to the Vault 7 WikiLeaks documents leaked from the CIA, saying that the methods and protocols described in the documents are consistent with cyberattacks they’d been tracking for years. Symantec says they now believe that the CIA hacking tool Fluxwire is a malware that had been known as Corentry, which Symantec had previously attributed to an unknown cyberespionage group called Longhorn, which apparently was the CIA. They described Longhorn as having been active since at least 2011, and responsible for attacks in at least 16 countries across the world, targeting governments and NGOs, as well as financial, energy, and natural resource companies, things that would generally be of interest to a nation-state.
  • While the WikiLeaks themselves have been comparatively short on details, as WikiLeaks continues to share specific vulnerabilities with companies so they can fix them before the details are leaked to the general public, the ability of security companies like Symantec to link the CIA to known hacking operations could prove to be even more enlightening as to the scope of CIA cyber-espionage the world over.
Gary Edwards

Who will be the 'Dropbox of the enterprise?' The race is on - Cloud Computing News - 1 views

  •  
    Could have written this two years ago, but it is a sign of the times, and the advance towards a Cloud Productivity Platform that brings this issue front and center.  DropBox has many challengers (finally).  It's always seemed to me that sync-share-store is a foundation kind of service.  Another would be that of real time connectivity to data and transaction processing systems - Cloud ODBC.  The great transition is indeed underway.  And this is a good day for me.  I've got tow companies that made the 451 list!  Now, if only DropBox will listen.
Gary Edwards

Microsoft Reinvents its Cloud Strategy - 0 views

  •  
    Microsoft announces a new plan, "Microsoft Dynamics", to accelerate the transition to replace their traditional / conventional software systems with cloud-ready infrastructure. Dynamics also serves as a migration guide, providing "seamless integration" of services from old IT to new Cloud. Competitors mentioned include SalesForce.com, SAP and Oracle. Lots of focus on integrating CRM into the full line of business applications. This is somewhat similar to the Visual Productivity challenge of integrating gMail into a working productivity system based on the Google Apps platform. Embedding the full range of Visual Web Communications into productivity apps and services is the key at all levels. One thing to consider in this article is that the only Cloud - Productivity - Business systems contenders are SalesForce, Oracle, SAP and Microsoft. Google Apps isn't mentioned. Nor is Amazon, RackSpace or VMware. Apple, Cisco, HP and Facebook are also left out.
Paul Merrell

Spooked By Lax U.S. Data Privacy, European Firms Build Their Own Cloud Services - 0 views

  • A few recent legal developments affecting U.S. online privacy have rightfully troubled privacy advocates and civil libertarians on American soil. In addition to the Patriot Act's relaxed regulation of law enforcement's access to private data, recent court rulings have made it clear that U.S. authorities can secretly request data from tech companies without the user ever knowing. If this seems objectionable from the standpoint of U.S. citizens, imagine how it looks to outsiders who are storing their data there. Some European companies who do business with U.S. technology companies are concerned enough to start looking elsewhere for infrastructure
  •  
    Draconian post-9/11 U.S. government surveillance statutes will cost U.S. economy as customers shop for cloud services elsewhere.  
Paul Merrell

BT sues over hyperlink claim | Networking | ZDNet UK - 0 views

  • The lawsuit, filed against Prodigy Communications Wednesday in a New York federal court, follows BT's claim in June that it owns the intellectual property rights to hyperlinks. BT says the patent, discovered in a routine trawl through its own patents three years ago, also covers a basic technology necessary for connecting computer users to the Internet. The telco aims to require all ISPs who use hyperlinks -- a fundamental Web technology -- to pay BT a licence fee.
Gary Edwards

IBM, Cisco, Red Hat, SAP Join Forces at OASIS To Combat Amazon's Cloud Success - 1 views

  •  
    Good article but leaves out any mention of WebKit and incredible impact that open source project has had on HTML5 and the future of the Web.  I left a lengthy comment explaining this.  Also referenced ODF, OASIS and Corporate support of standards and OSS projects.
Gary Edwards

Canonical's new partnerships for Ubuntu: A challenge in the enterprise space? | TechRep... - 1 views

  •  
    Good article that tries to explain how Canonical is changing direction, and what that will mean for Linux.  The explanation looks at a brief list of Canonical partnerships that the author believes are key to the new direction.  Interesting stuff, but you have to follow the partnership links to grasp the impact :(
  • ...1 more comment...
  •  
    What has happened to Diigo? Where are the lists and groups in the Chrome extension dialog? One thing i would note is that i have been using the Sharaholic Chrome extension for Diigo. Much more stable than the Diigo Chrome ext. And yes, i do get flame throwing furious when the Diigo ext dialog cuts off my comments or locks up and i lose everything. Sharaholic opens up a new page, which i can unclip from Chrome, move to the half of my dual screen system, and use to comment on an article line by line. Yes, i do miss the Diigo highlighting and in-line comments at times. But stability and consistent behavior matters. If i need to highlight, i'll pull the Diigo ext.
  •  
    I tracked the WaveMaker link and foud that they have been acquired by VMware, and will join the SpringSource - Spring Framework for Java division. Interesting stuff. Rod Johnson has a new toy! (http://bit.ly/t9bX2m) Also, i noticed that VMware has decided to open source WaveMaker entirely - available for free. This is interesting in the context of changes at Ubuntu. Perhaps WaveMaker is a Java IDE challenge to QT's dominance on Linux? QT is owned by Nokia. And Nokia has slid under the boot heel of Microsoft and the Windows 8 platform of cloud-desktop-mobile. WaveMaker Springs To VMware http://bit.ly/s80t8n Perhaps more interesting is that Canonical Ubuntu would be supporting the VMware Cloud Application Platform. http://bit.ly/suN5ic Looks like VMware is very serious about a sweeping and comprehensive Cloud Productivity Platform. Neither Amazon or RackSpace have developer tools wired in like VMWare. Google Cloud has core Apps that can't be beat. FaceBook just purchased Strobe, but that focus is on mobility app developers - not business systems developers.
  •  
    Note to Jason Harrop: VMware needs your docx desktop-cloud conversion.
Paul Merrell

Deployment of IPv6 Begins : Comcast Voices | The Official Comcast Blog - 0 views

  • Comcast has been conducting IPv6 technical trials in our production network for more than a year, and we've been working diligently on IPv6 deployment for over 6 years. After so many years of challenging preparatory work, significant technology investment, internal skills development, and close collaboration with our technology partners, I am incredibly pleased to announce that we've achieved another critical milestone in our transition to IPv6 — we have started the pilot market deployment of IPv6 to customers in selected markets! We're now the first large ISP in North America to start deploying IPv6. This is a significant milestone not just inside our own company but also in the industry, particularly given the chicken and egg relationship between the availability of content and software that supports IPv6 and the deployment of IPv6 to end users.
  • This first phase will support certain types of directly connected CPE, where a single computer is connected directly to a cable modem. Subsequent phases in 2011 and 2012 will support home gateway devices and variable length prefixes. Critically, our approach is "native dual stack" which means customers will get both IPv4 and IPv6 addresses. Some other ISPs that are less prepared may be using tunneling or large scale NAT in the network. Those approaches are likely to result in some applications (such as some real-time applications) breaking or seeming slow. Native dual stack, the approach we are using, avoids breaking or slowing applications and maintains a better and faster broadband Internet experience. Our customers buy Xfinity Internet service in large part for our great speeds, and they can rest assured that they won't have to slow down as the world transitions to IPv6, as we've "just said no to NAT" in this phase of our IPv6 transition.
  • For all the key technical details, check out this complementary blog post from John Brzozowski.
shalani mujer

They Effectively Fixed My laptop - 2 views

I love to surf the internet using my laptop, then one day it just stopped running. I did not know what to do since the blue screen error did not disappear though I have tried rebooting my laptop. ...

PC technical support

started by shalani mujer on 10 Nov 11 no follow-up yet
Gary Edwards

Opportunities for ISVs Moving to the Cloud - 0 views

  •  
    Nice article by Sanjeev Kumar of iBE.net explaining how ISV's can move their customer business systems and processes to the Cloud, and why. Sanjeev is Product Manager for Business Analytics at iBE.net, which builds mobile and cloud-based business management software for small and midsized organizations. For more information visit www.ibe.net.
Gary Edwards

Open Source, Android Push Evolution of Mobile Cloud Apps | Linux.com - 0 views

  •  
    Nice OpenMobster graphic!  Good explanation of the Android notification advantage over iOS and Windows 7 too.  Note the exception that iOS-5 finally introduces support for JSON. excerpt: Why Android Rocks the Cloud Most open source mobile-cloud projects are still in the early stages. These include the fledgling cloud-to-mobile push notifications app, SimplePush , and the pre-alpha Mirage  "cloud operating system" which enables the creation of secure network applications across any Xen-ready cloud platform. The 2cloud Project , meanwhile, has the more ambitious goal of enabling complete mobile cloud platforms. All of the above apps support Android, and many support iOS. Among mobile OSes, Android is best equipped to support cloud applications, said Shah. Android supports sockets to help connect to remote services, and supplies a capable SQlite-based local database. It also offers a JSON (JavaScript Object Notation) interchange stack to help parse incoming cloud data -- something missing in iOS. Unlike iOS and Windows Phone 7, Android provides background processing, which is useful for building a robust push infrastructure, said Shah. Without it, he added, users need to configure the app to work with a third-party push service. Most importantly, Android is the only major mobile OS to support inter-application communications. "Mobile apps are focused, and tend to do one thing only," said Shah. "When they cannot communicate with each other, you lose innovation." Comment from Sohil Shah, CEO OpenMobster: "I spoke too soon. iOS 5 now supports JSON out of the box. I am still working with a third party library which was needed in iOS 4 and earlier, and to stay backward compatible with those versions.  Anyways, it should have been supported a lot earlier considering the fact that AFAIK, Android has had it since the very beginning. "
Paul Merrell

In Cryptography, Advances in Program Obfuscation | Simons Foundation - 0 views

  • “A program obfuscator would be a powerful tool for finding plausible constructions for just about any cryptographic task you could conceive of,” said Yuval Ishai, of the Technion in Haifa, Israel. Precisely because of obfuscation’s power, many computer scientists, including Sahai and his colleagues, thought it was impossible. “We were convinced it was too powerful to exist,” he said. Their earliest research findings seemed to confirm this, showing that the most natural form of obfuscation is indeed impossible to achieve for all programs. Then, on July 20, 2013, Sahai and five co-authors posted a paper on the Cryptology ePrint Archive demonstrating a candidate protocol for a kind of obfuscation known as “indistinguishability obfuscation.” Two days later, Sahai and one of his co-authors, Brent Waters, of the University of Texas, Austin, posted a second paper that suggested, together with the first paper, that this somewhat arcane form of obfuscation may possess much of the power cryptographers have dreamed of. “This is the first serious positive result” when it comes to trying to find a universal obfuscator, said Boaz Barak, of Microsoft Research in Cambridge, Mass. “The cryptography community is very excited.” In the six months since the original paper was posted, more papers have appeared on the ePrint archive with “obfuscation” in the title than in the previous 17 years.
Gary Edwards

Everything You Need to Know About the Bitcoin Protocol - 0 views

  • . In this research paper we hope to explain that the bitcoin currency itself is ‘just’ the next phase in the evolution of money – from dumb to smart money. It’s the underlying platform, the Bitcoin protocol aka Bitcoin 2.0, that holds the real transformative power. That is where the revolution starts. According to our research there are several reasons why this new technology is going to disrupt our economy and society as we have never experienced before:
  • From dumb to smart money
  • The Bitcoin protocol is the underlying platform that holds the real transformative power and is where the revolution starts. According to our research there are several reasons why this new technology is going to disrupt our economy and society as we have never experienced before:
  • ...2 more annotations...
  • Similar to when the TCP/IP, HTTP and SMTP protocols were still in their infancy; the Bitcoin protocol is currently in a similar evolutionary stage. Contrary to the early days of the Internet, when only a few people had a computer, nowadays everybody has a supercomputer in its pocket. It’s Moore’s Law all over again. Bitcoin is going to disrupt the economy and society with breathtaking speed. For the first time in history technology makes it possible to transfer property rights (such as shares, certificates, digital money, etc.) fast, transparent and very secure. Moreover, these transactions can take place without the involvement of a trusted intermediary such as a government, notary, or bank. Companies and governments are no longer needed as the “middle man” in all kinds of financial agreements. Not only does The Internet of Things give machines a digital identity, the bitcoin API’s (machine-machine interfaces) gives them an economic identity as well. Next to people and corporations, machines will become a new type of agent in the economy.
  • The Bitcoin protocol flips automation upside down. From now on automation within companies can start top down, making the white-collar employees obsolete. Corporate missions can be encoded on top of the protocol. Machines can manage a corporation all by themselves. Bitcoin introduces the world to the new nature of the firm: the Distributed Autonomous Corporation (DAC). This new type of corporation also adds a new perspective to the discussion on technological unemployment. The DAC might even turn technological unemplyment into structural unemployment. Bitcoin is key to the success of the Collaborative Economy. Bitcoin enables a frictionless and transparent way of sharing ideas, media, products, services and technology between people without the interference of corporations and governments.
  •  
    A series of eleven pages discussing Bitcoin and the extraordinary impact it will have on the world economy. Excellent article and a worthy follow up to the previous Marc Andressen discussion of Bitcoin.
Paul Merrell

30c3 keynote with Glenn Greenwald [30c3] - YouTube - 0 views

  • via videolink.Speaker: Glenn Greenwald frankEventID: 5622Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC]Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; GermanyLanguage: englishBegin: Fri, 12/27/2013 19:30:00 +01:00Lizenz: CC-by
  •  
    Glenn Greenwald delivers a powerful argument for the hackers of the world to rescue the Internet from NSA and like-minded spy agencies. Plus, "A lot more stories, a lot more documents to come."
Paul Merrell

Surveillance scandal rips through hacker community | Security & Privacy - CNET News - 0 views

  • One security start-up that had an encounter with the FBI was Wickr, a privacy-forward text messaging app for the iPhone with an Android version in private beta. Wickr's co-founder Nico Sell told CNET at Defcon, "Wickr has been approached by the FBI and asked for a backdoor. We said, 'No.'" The mistrust runs deep. "Even if [the NSA] stood up tomorrow and said that [they] have eliminated these programs," said Marlinspike, "How could we believe them? How can we believe that anything they say is true?" Where does security innovation go next? The immediate future of information security innovation most likely lies in software that provides an existing service but with heightened privacy protections, such as webmail that doesn't mine you for personal data.
  • Wickr's Sell thinks that her company has hit upon a privacy innovation that a few others are also doing, but many will soon follow: the company itself doesn't store user data. "[The FBI] would have to force us to build a new app. With the current app there's no way," she said, that they could incorporate backdoor access to Wickr users' texts or metadata. "Even if you trust the NSA 100 percent that they're going to use [your data] correctly," Sell said, "Do you trust that they're going to be able to keep it safe from hackers? What if somebody gets that database and posts it online?" To that end, she said, people will start seeing privacy innovation for services that don't currently provide it. Calling it "social networks 2.0," she said that social network competitors will arise that do a better job of protecting their customer's privacy and predicted that some that succeed will do so because of their emphasis on privacy. Abine's recent MaskMe browser add-on and mobile app for creating disposable e-mail addresses, phone numbers, and credit cards is another example of a service that doesn't have access to its own users' data.
  • Stamos predicted changes in services that companies with cloud storage offer, including offering customers the ability to store their data outside of the U.S. "If they want to stay competitive, they're going to have to," he said. But, he cautioned, "It's impossible to do a cloud-based ad supported service." Soghoian added, "The only way to keep a service running is to pay them money." This, he said, is going to give rise to a new wave of ad-free, privacy protective subscription services.
  • ...2 more annotations...
  • The issue with balancing privacy and surveillance is that the wireless carriers are not interested in privacy, he said. "They've been providing wiretapping for 100 years. Apple may in the next year protect voice calls," he said, and said that the best hope for ending widespread government surveillance will be the makers of mobile operating systems like Apple and Google. Not all upcoming security innovation will be focused on that kind of privacy protection. Security researcher Brandon Wiley showed off at Defcon a protocol he calls Dust that can obfuscate different kinds of network traffic, with the end goal of preventing censorship. "I only make products about letting you say what you want to say anywhere in the world," such as content critical of governments, he said. Encryption can hide the specifics of the traffic, but some governments have figured out that they can simply block all encrypted traffic, he said. The Dust protocol would change that, he said, making it hard to tell the difference between encrypted and unencrypted traffic. It's hard to build encryption into pre-existing products, Wiley said. "I think people are going to make easy-to-use, encrypted apps, and that's going to be the future."
  • Companies could face severe consequences from their security experts, said Stamos, if the in-house experts find out that they've been lied to about providing government access to customer data. You could see "lots of resignations and maybe publicly," he said. "It wouldn't hurt their reputations to go out in a blaze of glory." Perhaps not surprisingly, Marlinspike sounded a hopeful call for non-destructive activism on Defcon's 21st anniversary. "As hackers, we don't have a lot of influence on policy. I hope that's something that we can focus our energy on," he said.
  •  
    NSA as the cause of the next major disruption in the social networking service industry?  Grief ahead for Google? Note the point made that: "It's impossible to do a cloud-based ad supported service" where the encryption/decryption takes place on the client side. 
Gary Edwards

How to Run Your Small Business With Free Open Source Software - CIO.com - 0 views

  •  
    "How to Run Your Small Business With Free Open Source Software From simple bookkeeping packages to full-blown ERP systems, open source software can provide free options for small businesses that don't have the budget for big-ticket enterprise applications."
Paul Merrell

On the NSA, PRISM, and what it means for your 1Password data | Agile Blog - 0 views

  • In judging NSA capabilities, we need to keep in mind that they have a history of discouraging the US government from using systems that the NSA could break. If the NSA could break AES-CBC-128, then they would not be advising US government agencies to use it. Interestingly there is a history of the US and UK governments advising foreign governments to use cryptographic systems derived from Enigma, which the US and UK could break at the time.  But the NSA has (correctly) operated under the assumption that if they have found a way to break something, others will too.
  • It’s also reasonable to assume that the gap between the kinds of cryptanalytic techniques that the NSA has, and what the academic community has, is not as large as it was in the past. We did see evidence of the NSA (presumably) using a novel technique in Flame. We know that they are ahead, but as the number of people who publicly study cryptanalysis increases, the gap should narrow significantly. It certainly appears that their skills in designing presentation slides are more than a decade behind readily available and documented public techniques. From these I comfortably operate on the assumption that the actual building blocks (AES, etc) and the constructions (CBC) we use are not broken. Of course, one area where the NSA has clear, unmatched power is with computing resources. Our estimations of how long it would take a password cracker to guess a Master Password have been based on the kinds of tools that the public password cracking community has available.
  • There may be non-cryptographic flaws in cryptographic software, including 1Password, that the NSA is able to exploit, and that nobody else knows of. That is, they may know a way to break 1Password’s security without having to break the crypto. Naturally, we work  hard to keep 1Password free of such vulnerabilities, but that is no guarantee that there aren’t some which the NSA is aware of and that we are not.
  •  
    Might be right. Might be wrong. Oh, the joy of having people around who feel entitled to read other people's data, whether it's shared or not. 
Gary Edwards

iPhone 5 Review - CNET Reviews - 0 views

  •  
    "The good: ......... The iPhone 5 adds everything we wanted in the iPhone 4S: 4G LTE, a longer, larger screen, free turn-by-turn navigation, and a faster A6 processor. Plus, its top-to-bottom redesign is sharp, slim, and feather-light. The bad: ............ Apple Maps feels unfinished and buggy; Sprint and Verizon models can't use voice and data simultaneously. The smaller connector renders current accessories unusable without an adapter. There's no NFC, and the screen size pales in comparison to jumbo Android models. The bottom line: .............. The iPhone 5 completely rebuilds the iPhone on a framework of new features and design, addressing its major previous shortcomings. It's absolutely the best iPhone to date, and it easily secures its place in the top tier of the smartphone universe."
Gary Edwards

Google News - 0 views

  •  
    "The new iPhone is here - but is Apple in danger of delivering too little with its latest upgrade? This is an excellent in depth review of the iPhone 5, By Gareth Beavis  September 27th 2012 ..... 8 COMMENTS Moatly the iPhone 5 is compared to the Smasung Galaxy 3, and the HTC One X. HTC wins the form factor and feel award. Samsung beats the iPhone in near everything else. Both the HTC and Samasung use Quad Core Processors. The iPhone 5, although greatly improved over the i4, uses a dual core processor. Some highlightes for the iPhone 5: ...... Photo stitching ....... Siri In most things the iPhone is "average". Where it really shines is an improvement to the iPhone 4 !!!!! Some serious drawbacks: ......... No Google Maps !!!! AAnd the new Apple Maps are a JOKE ......... The core Contact-Calling-Email system is native and quite outside of the Google Apps. No sync PAGE 1 OF 14 : Introduction and design The excitement of the rumor mill, the titillation of every leaked photo led to higher than ever levels of expectation for the iPhone 5, and while the announcement was greeted with some derision at the lack of perceived headline improvements, the record sales tell an entirely different story. Given the underwhelming changes to the iPhone 4S, the iPhone 5 really needs to re-energize customers to prove Apple can repeat the game-changing trick it managed with the iPhone 4. So is the Apple iPhone 5 the greatest smartphone ever, one that will finally see Apple ascend to the top spot in our 20 best mobile phones chart? Or is it a case of too little, too late?"
« First ‹ Previous 261 - 280 of 413 Next › Last »
Showing 20 items per page