Japan plans supercomputer to leap into technology future

In the area of supercomputing, Japan’s aim is to use ultra-fast calculations to accelerate advances in artificial intelligence (AI), such as “deep learning” technology that works off algorithms which mimic the human brain’s neural pathways, to help computers perform new tasks and analyze scores of data.

Source: Japan plans supercomputer to leap into technology future

Wedge-tailed eagles winning war of the skies against drones

Unmanned aerial vehciles become unlikely prey for wedge-tailed eagles in Western Australia’s Goldfields.

Source: Wedge-tailed eagles winning war of the skies against drones

“People couldn’t believe I was able to get such a good photo of an eagle airborne, but I didn’t … another eagle took that photo,” he said.

“I was flying the tailings dam out at St Ives and I was getting attacked by two eagles simultaneously.

Me Too! – You Had Me At EHLO…

First off, the original mail went to 13,000 users.  Assuming that 1,000 of those 13,000 users replied, that means that there are 1,000 replies being sent to those 13,000 users.  And it turns out that a number of these people had their email client set to request read receipts and delivery receipts.  Each read and delivery receipt causes ANOTHER email to be sent from the recipient back to the sender (all 13,000 recipients).  Assuming that 20% of the 1,000 users replying had read receipts or delivery receipts set, that meant that every one of the message that they sent caused another message to be sent for every one of the 13,000 recipients. So how many messages were sent?

Source: Me Too! – You Had Me At EHLO…

Is Logical Data Modeling Dead?

The key to getting people to at least appreciate logical data models is to just do them as part of whatever modeling effort you are working on. Don’t say “stop”. Just model on. Demonstrate, don’t tell your teams where the business requirements are written down, where they live. Then demonstrate how that leads to beautiful physical models as well.

Source: Is Logical Data Modeling Dead? | InfoAdvisors Blog

Yes, we can validate the Wikileaks emails

DKIM is a system designed to stop spam. It works by verifying the sender of the email. Moreover, as a side effect, it verifies that the email has not been altered.

Hillary’s team uses “hillaryclinton.com”, which as DKIM enabled. Thus, we can verify whether some of these emails are true.

Source: Errata Security: Yes, we can validate the Wikileaks emails

I was just listening to ABC News about this story. It repeated Democrat talking points that the WikiLeaks emails weren’t validated. That’s a lie. This email in particular has been validated. I just did it, and shown you how you can validate it, too.

“Most serious” Linux privilege-escalation bug ever is under active exploit

The vulnerability, a variety known as a race condition, was found in the way Linux memory handles a duplication technique called copy on write. Untrusted users can exploit it to gain highly privileged write-access rights to memory mappings that would normally be read-only. More technical details about the vulnerability and exploit are available here, here, and here. Using the acronym derived from copy on write, some researchers have dubbed the vulnerability Dirty COW.

Source: “Most serious” Linux privilege-escalation bug ever is under active exploit (updated)

Schiaparelli Mars probe’s parachute ‘jettisoned too early’

For the moment, all Esa has to work with is the relatively large volume of engineering data Schiaparelli managed to transmit back to the “mothership” that dropped it off at Mars – the Trace Gas Orbiter.

Source: Schiaparelli Mars probe’s parachute ‘jettisoned too early’ – BBC News

But officials here have tried to emphasise Schiaparelli’s role as a technology demonstrator – a project to give Europe the learning experience and the confidence to go ahead with the landing on Mars in 2021 of an ambitious six-wheeled rover.

Say hello to .google and other branded internet addresses

Google’s website is at the fore of an expected boom in websites taking advantage of a 2-year-old change in internet rules that lifted the limits for these suffixes, called top-level domains. That’s brought .paris, .movie and .xyz to websites and email addresses.

Source: Say hello to .google and other branded internet addresses – CNET

Stop Trying to Fix the User

We must stop trying to fix the user to achieve security. We’ll never get there, and research toward those goals just obscures the real problems. Usable security does not mean “getting people to do what we want.” It means creating security that works, given (or despite) what people do. It means security solutions that deliver on users’ security goals without­ — as the 19th-century Dutch cryptographer Auguste Kerckhoffs aptly put it­ — “stress of mind, or knowledge of a long series of rules.”

Source: Security Design: Stop Trying to Fix the User – Schneier on Security