QoS considerations for Carrier Grade Clouds: location, location, location.
A Carrier-Grade Cloud (CGC) is a cloud platform suitable for deployment, with stringent Availability, Reliability, QoS and Security requirements which are fundamental for Real-Time applications in many...
View ArticleService Level Agreements for Carrier-Grade Clouds: beyond best-effort
Service Level Agreements (SLAs) are a the nuts and bolts of a business agreement and next to QoS and Security the final pillar of a Carrier-Grade Cloud offering. SLAs define functional and...
View ArticleTony Hoare: Invention of the null-reference a billion dollar mistake
Computing Pioneer Sir Charles Antony Richard Hoare (aka C.A.R. Hoare) was mostly known for his Quicksort algorithm, but less remembered for the idea of the “null-reference”. He noted in 2009 that it...
View ArticleRe: Seasons greetings
Hello <name omitted>, thanks also a happy peaceful Christmas and year of positive change in 2015 to you. The Telco market is tough. I know this is hardly news right? It has been like this since …...
View ArticleTinker Tailor Soldier Spy: US industrial espionage in Germany
a quick reminder that NSA surveillance is not just a post 9/11 phenomenon. “Echelon” was a US industrial espionage program in Germany. See this post from 2000 calling for the shutdown of the program....
View ArticleIs DevOps Bullshit?
In a recently trending rant on hackernews Josh Johnson pointed to his negative experience with the DevOps process after taking on a new job in a firm that had a “dedicated devops team”. The post is...
View ArticleAs a goat I’m skeptical of Docker’s hype …
… containers can’t isolate me Never run containers as root (use unprivileged accounts such as nobody:nogroup) Don’t setuid Use SELinux Limit capabilities (e.g. if you need to bind to a port <1024...
View ArticleThe Software Engineers Guide to Mercury Retrograde
According to Western astrology, there’s this thing called “Mercury Retrograde”. Before you dismiss it as mumbo-jumbo remember that this “science” is several thousand years old. And probably too complex...
View ArticleLXD crushes KVM, Canonical says
Today Canonical released a benchmark pitting LXD against KVM promising vast improvements in performance. On average, LXD guests started in 1.5 seconds, while KVM guests took 25 seconds to start. I...
View ArticleMisconfigured US DoS website leaked classified files into archive.org
thiébaud.fr has recently pointed out that the robots.txt file from the US Department of State website contains a grave misconfiguration. A robots.txt is part of a webservers configuration and supposed...
View ArticleJohn Nash letter to the NSA
John Nash died tragically yesterday, 23rd May in a taxi crash in New Jersey. Nash struggled with schizophrenia that he also passed on to his son. His recovery became the basis for Sylvia Nasar’s...
View ArticleThe Web of Things needs your support
Are you working on backend web technologies or in the embedded sector? I’d like to get in touch with a request for your expertise around some upcoming future-technologies and projects in the Web of...
View ArticleHunter S. Thompson on Finding Your Purpose
22 year old Hunter S. Thompson wrote in 1958, this amazing and inspiring response to his friend Hume Logan who asked him for life advice. April 22, 1958 57 Perry Street New York City Dear Hume, You ask...
View ArticleUsing Big Data to Analyse your Personality and Character
The age of Big Data, Machine Learning and Predictive Analytics promises some truly revolutionary changes in the way we select and filter in a modern HR process and narrow down the candidate pool. We...
View ArticleShould Open Standards be Open Source?
Frank Yue (F5) just said Open Standards do not have to be Open Source. Why is this a bad idea? Open Standards that are not Open Source remove the voting power from individuals and smaller players....
View ArticleEditor Wars: Why emacs and vi present a steep learning curve
Ever wonder if there was a historic reason why emacs and vi cause the brains of most beginners to melt? emacs and vi were used on machines that had different keyboard layouts than the modern IBM design...
View ArticleHacking Team has been hacked. Good, let’s take action!
Are you a specialist in Human Rights law? We need your help as an activist! The Milan, Italy based “Hacking Team Srl” a company notorious for selling surveillance technologies to dictators with a fat...
View ArticleThe Mozilla Foundation unveiled a plan to revamp Firefox
Earlier this month the Mozilla Foundation unveiled a plan to revamp its browser Firefox. It’s no secret that Google Chrome has been taking a bigger and bigger share of users and there has been...
View ArticleCybersecurity as Realpolitik – Dan Greer
Abstract: Power exists to be used. Some wish for cyber safety, which they will not get. Others wish for cyber order, which they will not get. Some have the eye to discern cyber policies that are “the...
View ArticleDonald Trump as seen by Google deepdream
It’s too hot today to do some serious work, so instead I’ve been playing with google deepdream using vagrant. Here is a nightmare of Donald Trump as seen by google’s deepdream engine. Apologies if...
View Article
More Pages to Explore .....