When I saw this blog post, it immediately said it is a must have security device. Nowadays, home network is a given, router is in every metropolitan home. Protecting home network is not a easy task. With so many home devices that are connected 24×7 to the Internet, patching them and also doing security configuration is professional work. This device from McAfee protects home network by “filtering all DNS and web requests”.
I think the most important part is filtering DNS requests as this shall stop many malware activties.
Going to Vegas for the Amazon Re:Invent event is one of the best ways to learn about Cloud Computing and Cloud security. And the second best of course is to just browsing the slide decks or videos of the event, from your office or home. So here you go, fresh from the Internet, the course 206 of the security track – “Security of the AWS Cloud”.
And don’t forget to follow up with the slide decks of “AWS Cloud Security” and “Security and Compliance”
3 factors affecting group intelligence
The first was the average social perceptiveness of the group members; The second factor we found was the evenness of conversational turn taking;
You will very surprised to find out the third.
As CSA chapter chair, I has been asked many times about what is cloud computing?
3M AVS is one excellent example of cloud, with the following characteristics
- usage-based, the user only pay on each image analysed
- deliver via Internet (remotely), the image is processed remotely
- access to expertise, ordinary users and SME could access to 3M research results
Take a look at 3M Visual Attention Service and this application runs on cloud infrastructure !
The data security and data privacy concerns on using cloud services or hosted application (like web email) is holding people. The incident in Paula Broadwell showed law enforcement agents had far move power and means to access individual data than we think of. If you like to understand the legal framework on this, there is a very good paper wrote by three Netherlands legal researcher.
W3C has a working group on Web Cryptography and they is developing a library standard for JS cryptography. Below are some user cases, for how the new Web Cryptography API is designed for