• “Stop the Nonsensus! (Nonsense Consensus): Systems will never scale if you require global consensus for local actions by independent agents. For example, I should not have to know where every dollar in the economy is when I want to buy something from you. That adds an overhead of ridiculous complexity for something which needs to follow the principle of pushing intelligence and agency to the edges rather than center

  • Tags: Optane

    When something is hyped as “1,000X” of anything, people have expectations. The speed booster announced today falls short of the full-on SSD-killer performance enthusiasts were hoping for. All Intel says, though, is wait and see: Storage VP Rob Cooke described this first rollout of Optane as an “exciting moment in time” that would become the new normal.

    Cooke actually compared Optane’s launch to the big changes brought about by the steam engine, electricity, space travel, the PC, and the interne. “I believe you will look back in time 10 years from now and say ‘I was there.’”

    We’ll see.

  • So there’s lots of Z-Wave devices out there…

  • Raspberry Pi Pin (and board?) compatible, but more of a real computer. $150 - $300.

  • Notes: 1

    Tags: AWSLambdanode.js

    I’m very happy about this.

  • I wonder how many other countries have infected the chips in my computers?

    The C.I.A. developed tools to spy on Mac computers by injecting software into the chips that control the computers’ fundamental operations, according to the latest cache of classified government documents published on Thursday by WikiLeaks.

    Apple said in a statement Thursday evening that its preliminary assessment of the leaked information indicated that the Mac vulnerabilities described in the disclosure were previously fixed in all Macs launched after 2013.

  • Bruce Schneier on IoT threats, and how to deal with them. This is a rather lengthy article and probably worth the read.

    Our computers and smartphones are as secure as they are because companies like Microsoft, Apple, and Google spend a lot of time testing their code before it’s released, and quickly patch vulnerabilities when they’re discovered. Those companies can support large, dedicated teams because those companies make a huge amount of money, either directly or indirectly, from their software — and, in part, compete on its security. Unfortunately, this isn’t true of embedded systems like digital video recorders or home routers. Those systems are sold at a much lower margin, and are often built by offshore third parties. The companies involved simply don’t have the expertise to make them secure.

  • 1 JavaScript
    2 Java
    3 Python
    4 PHP
    5 C#
    5 C++
    7 CSS
    7 Ruby
    9 C
    10 Objective-C
    11 Scala
    11 Shell
    11 Swift
    14 R
    15 Go
    15 Perl
    17 TypeScript
    18 PowerShell
    19 Haskell
    20 Clojure
    20 CoffeeScript
    20 Lua
    20 Matlab

  • Notes: 1

    Tags: SBCSlant

    Raspberry Pi 3, Udoo x86 Ultra, CHIP

  • You are the product.

    When contacted by The Verge for more information, Google denied that the audio snippet was actually an ad, initially providing this rather strange statement: “This isn’t an ad; the beauty in the Assistant is that it invites our partners to be our guest and share their tales.” That appeared to describe… an advertisement. 

  • TL;DR don’t roll your own security.

  • Excuse the language, but what kinda bullsh*t BJ article is this?

  • Scan your droids!

    The infected devices included:Galaxy Note 2LG G4Galaxy S7Galaxy S4Galaxy Note 4Galaxy Note 5Galaxy Note 8Xiaomi Mi 4iGalaxy A5ZTE x500Galaxy Note 3Galaxy Note EdgeGalaxy Tab S2Galaxy Tab 2Oppo N3vivo X6 plusNexus 5Nexus 5XAsus Zenfone 2LenovoS90OppoR7 plusXiaomi RedmiLenovo A850

  • Likely true. Hey, maybe they’re using my code to control your TV: https://github.com/dpjanes/homestar-samsung-smart-tv