Subscribe: Open Stack
http://openstack.blogspot.com/feeds/posts/default
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
diigo rest  favorite links  group favorite  kaspersky  links openstack  open web  open  posted diigo  rest open  web group  web 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Open Stack

Open Stack



The battle for the future of the Open Web is taking place as a new document model merges into a platform for highly graphical, interactive and information rich applications. Open source communities vie with dominant vendors Adobe, Microsoft, Apple, Cisco



Updated: 2018-01-21T04:32:39.200-08:00

 



OpenStack 01/21/2018 (p.m.)

2018-01-21T04:32:39.613-08:00

  • Tags: surveillance state, NSA, voice-surveillance

    • These and other classified documents provided by former NSA contractor Edward Snowden reveal that the NSA has developed technology not just to record and transcribe private conversations but to automatically identify the speakers.

      Americans most regularly encounter this technology, known as speaker recognition, or speaker identification, when they wake up Amazon’s Alexa or call their bank. But a decade before voice commands like “Hello Siri” and “OK Google” became common household phrases, the NSA was using speaker recognition to monitor terrorists, politicians, drug lords, spies, and even agency employees.

      The technology works by analyzing the physical and behavioral features that make each person’s voice distinctive, such as the pitch, shape of the mouth, and length of the larynx. An algorithm then creates a dynamic computer model of the individual’s vocal characteristics. This is what’s popularly referred to as a “voiceprint.” The entire process — capturing a few spoken words, turning those words into a voiceprint, and comparing that representation to other “voiceprints” already stored in the database — can happen almost instantaneously. Although the NSA is known to rely on finger and face prints to identify targets, voiceprints, according to a 2008 agency document, are “where NSA reigns supreme.”

      It’s not difficult to see why. By intercepting and recording millions of overseas telephone conversations, video teleconferences, and internet calls — in addition to capturing, with or without warrants, the domestic conversations of Americans — the NSA has built an unrivaled collection of distinct voices. Documents from the Snowden archive reveal that analysts fed some of these recordings to speaker recognition algorithms that could connect individuals to their past utterances, even when they had used unk

    • The classified documents, dating from 2004 to 2012, show the NSA refining increasingly sophisticated iterations of its speaker recognition technology. They confirm the uses of speaker recognition in counterterrorism operations and overseas drug busts. And they suggest that the agency planned to deploy the technology not just to retroactively identify spies like Pelton but to prevent whistleblowers like Snowden.

Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 01/19/2018 (p.m.)

2018-01-19T04:32:43.051-08:00

Facebook is done with quality journalism. Deal with it.Tags: AI, Internet-censorship, Facebook, journalismFor Facebook, journalism has been a pain in the neck from day one. Now, bogged down with the insoluble problems of fake news and bad PR, it’s clear that Facebook will gradually pull the plug on news. Publishers should stop whining and move on.Let’s admit that publishers have been screwed by Facebook. Not because Mark Zuckerberg is evil, but because he’s a pragmatist. His latest move should not come as a surprise. On Thursday, for the second time in six months, Facebook stated publicly that news (i.e., journalism) will appear further down in everyone’s newsfeed, in order to favor posts from friends, family and “groups.” Here is how Zuck defended the move:“The research shows that when we use social media to connect with people we care about, it can be good for our well-being. We can feel more connected and less lonely, and that correlates with long term measures of happiness and health. On the other hand, passively reading articles or watching videos — even if they’re entertaining or informative — may not be as good. Based on this, we’re making a major change to how we build Facebook. I’m changing the goal I give our product teams from focusing on helping you find relevant content to helping you have more meaningful social interactions”.Consider us notified. Facebook is done with journalism. It will happen, slowly, gradually, but the trend is here. In this context, the emaiAssange Keeps Warning Of AI Censorship, And It’s Time We Started ListeningTags: AI, Internet-censorship, Google, Twitter, Facebook Where power is not overtly totalitarian, wealthy elites have bought up all media, first in print, then radio, then television, and used it to advance narratives that are favorable to their interests. Not until humanity gained widespread access to the internet has our species had the ability to freely and easily share ideas and information on a large scale without regulation by the iron-fisted grip of power. This newfound ability arguably had a direct impact on the election for the most powerful elected office in the most powerful government in the world in 2016, as a leak publishing outlet combined with alternative and social media enabled ordinary Americans to tell one another their own stories about what they thought was going on in their country.This newly democratized narrative-generating power of the masses gave those in power an immense fright, and they’ve been working to restore the old order of power controlling information ever since. And the editor-in-chief of the aforementioned leak publishing outlet, WikiLeaks, has been repeatedly trying to warn us about this coming development.In a statement that was recently read during the “Organising Resistance to Internet Censorship” webinar, sponsored by the World Socialist Web Site, Assange warned of how “digital super states” like Facebook and Google have been working to “re-establish discourse control”, giving authority over how ideas and information are shared back to those in power.Assange went on to say that the manipulative attempts of world power structures to regain control of discourse in the information age has been “operating at a scale, speed, and increasingly at a subtlety, that appears likely to eclipse human counter-measures.”What this means is that using increasingly more advanced forms of artificial intelligence, power structures are becoming more and more capable of controlling the ideas and information that people are able to access and share with one another, hide information which goes against the interests of those power structures and elevate narratives which support those interests, all of course while maintaining the illusion of freedom and lively debate.To be clear, this is already happening. Due to a recent shift in Google’s “evaluation methods”, traffic to left-leaning and anti-establishment websites has plummeted, with sites like WikiLeaks, Alternet, Coun[...]



OpenStack 01/18/2018 (p.m.)

2018-01-18T04:33:12.784-08:00

  • Tags: computer-security, vulneratiblities, Spectre, Meltdown, investigations

    • The request is one of the first responses from the U.S. Congress to the disclosure earlier this month by security researchers of the two major flaws, which may allow hackers to steal passwords or encryption keys on most types of computers, phones and cloud-based servers.

      McNerney, a member of the House Energy and Commerce Committee, asked the companies to explain the scope of Spectre and Meltdown, their timeframe for understanding the vulnerabilities, how consumers are affected and whether the flaws have been exploited, among other questions.

  • (video)

    Tags: Facebook

    • With over 1.5 billion people using Facebook has become the superpower of the social media landscape. With with power comes responsibility and Facebook has unfortunately been responsibly for some pretty shady revelations!

Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 01/13/2018 (p.m.)

2018-01-13T04:32:36.897-08:00

  • Tags: wireless, broadband, 5G, rollout

    • It's an uncertain waiting game as to when the next-generation high-speed wireless service known as 5G will reach mass market, but the business implications are already a major talking point at CES 2018.
    • The term "5G" refers to the fifth-generation wireless broadband technology based on the 802.11ac standard. The packet of technology will bring speed and coverage improvements from 4G, with low-latency wireless up to 1GB/s, and it'll spur a host of new opportunities for enterprises and workplace productivity.

      In a panel discussion at CES, a trio of executives from Qualcomm, Ericsson, and Nokia discussed how 5G could transform industries ranging from transportation to manufacturing.

    • Some 5G rollouts are already planned for 2018. Samsung announced last Wednesday that it will provide Verizon with routers and radio frequency planning services for the carrier's initial 5G commercial rollout that will begin in Sacramento, Calif., in the second half of 2018.

      Meanwhile, AT&T announced that it will provide 5G services in roughly 12 markets by late 2018, with plans to offer the service to consumers while it trials 5G technology with businesses across all industries.

      Still, the panel of executives at CES remain skeptical that 5G would roll out for most Americans before late 2019 or 2020.


Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 01/10/2018 (a.m.)

2018-01-09T16:41:14.702-08:00

  • Tags: net-neutrality, internet, broadband-availability, ISPs, stats

    • Such profiteering tactics have disproportionately affected low-income and rural communities. ISPs have long redlined these demographic groups, creating what’s commonly known as the “digital divide.” Thirty-nine percent of Americans lack access to service fast enough to meet the federal definition of broadband. More than 50 percent of adults with household incomes below $30,000 have home broadband—a problem plaguing users of color most acutely. In contrast, internet access is near-universal for households with an annual income of $100,000 or more.

      The reason for such chasms is simple: Private network providers prioritize only those they expect to provide a return on investment, thus excluding poor and sparsely populated areas.

    • Chattanooga, Tennessee, has seen more success in addressing redlining. Since 2010, the city has offered public broadband via its municipal power organization, Electric Power Board (EPB). The project has become a rousing success: At half the price, its service is approximately 85 percent faster than that of Comcast, the region’s primary ISP prior to EPB’s inception. Coupled with a discounted program for low-income residents, Chattanooga’s publicly run broadband reaches about 82,000 residents—more than half of the area’s Internet users—and is only expected to grow.

      Chattanooga’s achievements have radiated to other locales. More than 450 communities have introduced publicly-owned broadband. And more than 110 communities in 24 states have access to publicly owned networks with one gigabit-per-second (Gbps) service. (AT&T, for example, has yet to introduce speeds this high.) Seattle City Councilmember Kshama Sawant proposed a pilot project in 2015 and has recently urged her city to invest in municipal broadband. Hawaii congressperson Kaniela Ing is drafting a bill for publicly-owned Internet for the state legislature to consider next year. In November, residents of Fort Collins, Colo. voted to authorize the city to build municipal broadband infrastructure.


Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 01/05/2018 (p.m.)

2018-01-05T04:33:27.378-08:00


Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 12/30/2017 (p.m.)

2017-12-30T04:32:51.090-08:00


Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 12/26/2017 (p.m.)

2017-12-26T04:32:44.799-08:00


Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 12/22/2017 (p.m.)

2017-12-22T04:32:38.738-08:00

Looking for Kaspersky support +1-855-676-24448 for titchy and voluminous solutionThe Kaspersky Technical Support desk was formed with the aim of extending help to all Kaspersky antivirus users with titchy or voluminous issues such as setting up a Kaspersky account, configuring the device as per the software, antivirus or malware concern along with the unwanted pop-up advertisement. No need worry if you facing such issues with your device simply capitalize our toll-free number +1-855-676-2448 for instant or immediate solution without investing auxiliary capital. Tags: Kaspersky, Contact, number, Technical, Customer, Support - By emileybrown89Employ ethical Kaspersky Customer Service via +1-855-676-2448 for unabridged protectionComplete support for home individuals or ethical Kaspersky Customer Service for businesses, the process is completely limpid and the substantiate professional proffer full support while providing cost effective and highly methodical services via +1-855-676-2448. They are trained and industry experienced and therefore, all queries are resolved in the most professional and specified manner. Tags: Kaspersky, online, Tech, Support, number, Technical, Internet, protection - By emileybrown89Watch Kaspersky Support Clip | How to resolve antivirus issues without hiring any engineerIf your device like laptop, desktop or even tablet conquer any sort of concern with unwanted pop-up advertisement, malware, virus or any kind of software related issues including product activation or software up gradation then watch Kaspersky Support video and resolve your concern without hiring any engineer and if you still unable to fix then get simply get connect to Kaspersky customer service number via toll-free +1-855-676-2448Tags: Kasperksy, Antivirus, support, Kaspersky, Phone, number, Technical - By emileybrown89Posted from Diigo. The rest of Open Web group favorite links are here.[...]



OpenStack 12/20/2017 (p.m.)

2017-12-20T04:32:47.822-08:00


Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 12/19/2017 (p.m.)

2017-12-19T04:32:42.794-08:00


Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 12/18/2017 (p.m.)

2017-12-18T04:32:46.558-08:00


Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 12/13/2017 (p.m.)

2017-12-13T04:32:36.395-08:00


Posted from Diigo. The rest of Open Web group favorite links are here.












OpenStack 12/04/2017 (p.m.)

2017-12-04T04:32:38.824-08:00


Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 12/03/2017 (p.m.)

2017-12-03T04:32:31.578-08:00

  • Tags: internet, Russia, BRICs, DNS

    • The Russian government is reportedly considering building an “independent internet infrastructure” that it can use as an alternative to the global Domain Name System, or DNS system.

      Last month, Russia’s Security Council asked the government to start building a backup DNS system citing “the increased capabilities of Western nations to conduct offensive operations.”

    • However, some defense experts say the move could “have more to do with Moscow’s own plans for offensive cyber operations,” according to the Defense One website.

      The alternative DNS would also serve the so-called BRIC nations — Brazil, Russia, India, China, and South Africa — and would operate independently of international organizations.

    • Russian president Vladimir Putin set a deadline of August 2018 to complete the infrastructure.

Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 11/29/2017 (p.m.)

2017-11-29T04:32:46.215-08:00

  • Tags: net-neutrality, FCC, Comcast

    • For years, Comcast has been promising that it won't violate the principles of net neutrality, regardless of whether the government imposes any net neutrality rules. That meant that Comcast wouldn't block or throttle lawful Internet traffic and that it wouldn't create fast lanes in order to collect tolls from Web companies that want priority access over the Comcast network.

      This was one of the ways in which Comcast argued that the Federal Communications Commission should not reclassify broadband providers as common carriers, a designation that forces ISPs to treat customers fairly in other ways. The Title II common carrier classification that makes net neutrality rules enforceable isn't necessary because ISPs won't violate net neutrality principles anyway, Comcast and other ISPs have claimed.

      But with Republican Ajit Pai now in charge at the Federal Communications Commission, Comcast's stance has changed. While the company still says it won't block or throttle Internet content, it has dropped its promise about not instituting paid prioritization.

    • Instead, Comcast now vaguely says that it won't "discriminate against lawful content" or impose "anti-competitive paid prioritization." The change in wording suggests that Comcast may offer paid fast lanes to websites or other online services, such as video streaming providers, after Pai's FCC eliminates the net neutrality rules next month.

Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 11/29/2017 (a.m.)

2017-11-28T16:41:45.562-08:00


Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 11/25/2017 (p.m.)

2017-11-25T04:32:55.574-08:00


Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 11/25/2017 (a.m.)

2017-11-24T16:41:13.562-08:00

  • Tags: surveillance state, trackers, Android, apps

    • Researchers at Yale Privacy Lab and French nonprofit Exodus Privacy have documented the proliferation of tracking software on smartphones, finding that weather, flashlight, rideshare, and dating apps, among others, are infested with dozens of different types of trackers collecting vast amounts of information to better target advertising.

      Exodus security researchers identified 44 trackers in more than 300 apps for Google’s Android smartphone operating system. The apps, collectively, have been downloaded billions of times. Yale Privacy Lab, within the university’s law school, is working to replicate the Exodus findings and has already released reports on 25 of the trackers.

      Yale Privacy Lab researchers have only been able to analyze Android apps, but believe many of the trackers also exist on iOS, since companies often distribute for both platforms. To find trackers, the Exodus researchers built a custom auditing platform for Android apps, which searched through the apps for digital “signatures” distilled from known trackers. A signature might be a tell-tale set of keywords or string of bytes found in an app file, or a mathematically-derived “hash” summary of the file itself.

      The findings underscore the pervasiveness of tracking despite a permissions system on Android that supposedly puts users in control of their own data. They also highlight how a large and varied set of firms are working to enable tracking.


Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 11/21/2017 (p.m.)

2017-11-21T04:33:45.350-08:00

Google will ‘de-rank’ RT articles to make them harder to find – Eric Schmidt — RT World NewsTags: Russia-Gate, censorship, Google, RT, Sputnik, litigationEric Schmidt, the Executive Chairman of Google’s parent company Alphabet, says the company will “engineer” specific algorithms for RT and Sputnik to make their articles less prominent on the search engine’s news delivery services. “We are working on detecting and de-ranking those kinds of sites – it’s basically RT and Sputnik,” Schmidt said during a Q & A session at the Halifax International Security Forum in Canada on Saturday, when asked about whether Google facilitates “Russian propaganda.”“We are well of aware of it, and we are trying to engineer the systems to prevent that [the content being delivered to wide audiences]. But we don’t want to ban the sites – that’s not how we operate.”The discussion focused on the company’s popular Google News service, which clusters the news by stories, then ranks the various media outlets depending on their reach, article length and veracity, and Google Alerts, which proactively informs subscribers of new publications.The Alphabet chief, who has been referred to by Hillary Clinton as a “longtime friend,” added that the experience of “the last year” showed that audiences could not be trusted to distinguish fake and real news for themselves.“We started with the default American view that ‘bad’ speech would be replaced with ‘good’ speech, but the problem found in the last year is that this may not be true in certain situations, especially when you have a well-funded opponent who is trying to actively spread this information,” he told the audience.RT America registered under FARA earlier this month, after being threatened by the US Department of Justice with arrests and confiscations of property if it failed to comply. The broadcaster is fighting the order in court.Posted from Diigo. The rest of Open Web group favorite links are here.[...]



OpenStack 11/18/2017 (a.m.)

2017-11-17T16:41:08.223-08:00

  • To secure your computer from infection with Trojan-Ransom, use the Application Control component of Kaspersky Total Security. Application Control logs the actions performed by applications in the system and manages the applications' activity based on the rules because Trojan-Ransom is a class of ransomware which blocks or limits user's access to the computer and demands a ransom to restore the system to its normal state. Do not fall in the trap Bog of viruses capitalize use our Kaspersky Toll-free number +1-855-676-2448.

    Tags: Kaspersky, Service, toll, free, number, tech, support


Posted from Diigo. The rest of Open Web group favorite links are here.



OpenStack 11/17/2017 (a.m.)

2017-11-16T16:41:12.989-08:00

Trump administration pulls back curtain on secretive cybersecurity process - The Washington PostTags: surveillance state, cybersecurity, software-vulnerabilities, U.S., transparencyThe White House on Wednesday made public for the first time the rules by which the government decides to disclose or keep secret software flaws that can be turned into cyberweapons — whether by U.S. agencies hacking for foreign intelligence, money-hungry criminals or foreign spies seeking to penetrate American computers. The move to publish an un­classified charter responds to years of criticism that the process was unnecessarily opaque, fueling suspicion that it cloaked a stockpile of software flaws that the National Security Agency was hoarding to go after foreign targets but that put Americans’ cyber­security at risk.The rules are part of the “Vulnerabilities Equities Process,” which the Obama administration revamped in 2014 as a multi­agency forum to debate whether and when to inform companies such as Microsoft and Juniper that the government has discovered or bought a software flaw that, if weaponized, could affect the security of their product. The Trump administration has mostly not altered the rules under which the government reaches a decision but is disclosing its process. Under the VEP, an “equities review board” of at least a dozen national security and civilian agencies will meet monthly — or more often, if a need arises — to discuss newly discovered vulnerabilities. Besides the NSA, the CIA and the FBI, the list includes the Treasury, Commerce and State departments, and the Office of Management and Budget. The priority is on disclosure, the policy states, to protect core Internet systems, the U.S. economy and critical infrastructure, unless there is “a demonstrable, overriding interest” in using the flaw for intelligence or law enforcement purposes. The government has long said that it discloses the vast majority — more than 90 percent — of the vulnerabilities it discovers or buys in products from defense contractors or other sellers. In recent years, that has amounted to more than 100 a year, according to people familiar with the process. But because the process was classified, the National Security Council, which runs the discussion, was never able to reveal any numbers. Now, Joyce said, the number of flaws disclosed and thePosted from Diigo. The rest of Open Web group favorite links are here.[...]