Blog

  • Business jargon we got used to

    Everybody hates management-speak and corporate jargon, but here are some terms that people used to think of as horrible jargon that we all got used to. Maybe one day we’ll all be leveraging deliverables without a secon

    via: Business jargon we got used to

  • Zigbee for #IoT

    IMG_4114.JPG
    Dresden Electronic Raspbee

    Zigbee is a wireless protocol for applications not requiring lots of bandwidth, e.g. home automation, lighting or sensor networks. The idea is to create so called Personal Area Networks. The specification is standardized as IEEE 802.15.4.

    Dresden Electronic offers the Rasbee (Picture to the left) to get started with low budget Raspberry Pi Hardware.

  • John Oliver talks about Encryption

    John Olivers ‘Last Week Tonight’ on encryption in general and the the case Apple vs. FBI in particular.

  • Blah Blah blah … I don't care!

    Nice rant every technical person in the industry can relate to.

    Blah Blah blah … I don’t care! To hell with your tech marketing bull.

    Also:

    In tech, filtering signal from noise is a full-time job

    True.

    via: The Register

  • Is cloud computing truly, truly disruptive?

    “Disruption” is one of those words that has been overused, being applied to every little product or service that comes to market, or every new company that emerges. Cloud computing and digital technologies, for example, are branded by many as “disruptive.” New services and business models sweeping through markets, such as Uber and Airbnb, are […]

    Turns out, no, the cloud itself ain’t disruptive. But the availability of on-demand computing resources enables businesses to come up with ideas more easily and the service based approach disrupts businesses.
    via: Is cloud computing truly, truly disruptive?

  • The Internet rules the Mobile World Congress.

    The Internet rules the Mobile World Congress. Writes Wired. Which is consequent, looking at the development of mobile technology and sales of devices.

    Slowing smartphone sales and metro strikes aren’t enough to get anyone down at the 16th annual Mobile World Congress.

    via: WIRED

  • #AWS #IoT Contest winners announced.

    AWS announced the winners of their IoT contest.

  • Fake Bomb Threat for Bitcoin

    Old and busted: DDoS 4 Bitcoin

    New hotness: Fake Bomb Threat 4 Bitcoin

  • Smart TV Security

    So, this is the future of security with smart devices.

    Samsung has confirmed that its “smart TV” sets are listening to customers’ every word, and the company is warning customers not to speak about personal information while near the TV sets. The company revealed that the voice activation feature on its smart TVs will capture all nearby conversations. The TV sets can share the information, including sensitive data, with Samsung as well as third-party services. The news comes after Shane Harris at The Daily Beast pointed out a troubling line in Samsung’s privacy policy: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party.” Samsung has now issued a new statement clarifying how the voice activation feature works. “If a consumer consents and uses the voice recognition feature, voice data is provided to a third party during a requested voice command search,” Samsung said in a statement. “At that time, the voice data is sent to a server, which searches for the requested content then returns the desired content to the TV.” The company added that it does not retain or sell the voice data, but it didn’t name the third party that translates users’ speech. Update, Feb. 10: Samsung has updated its policy and named the third party in question, Nuance Communications, Inc. Meghan DeMaria

    via: Samsung warns customers not to discuss personal information in front of smart TVs

  • Internet Archive: The Malware Museum

     The Internet Archive now has a collection of malware that was distributed in the 1980s and 1990s on home computers and early PCs.

    Through the javascript post of DosBox (EM-DosBox) you can even execute the viruses and watch their message in your browser.

    via: The Malware Museum : Internet Archive