Asides

  • Die Sache mit den Daten in der Cloud

  • Internettelefonieproblem.

    Telefon kaputt: Mindestens 100.000 IP-Telefone von Telekomkunden bleiben diesen Sonntag stundenlang stumm.

    via heise Netze.

  • Happy Birthday, Fefes Blog

    Das Blog, das, neben Don Alphonso, radikaler als ein Salafisten Forum ist, und allen Internet-Nerds Medienkompetenz vermittelt, wird heute 10 Jahre alt.

    Fefes Blog.

  • Deutsche Telekom und das Internet

    Die Telekom hat offenbar ein anderes Internet, das kein IP verwendet. Oder das ist Satire.

    Im sogenannten Voice-over-IP-Verfahren (VoIP) wird bereits mittels Datenverbindung über das Internet telefoniert, etwa über die Computersoftware Skype. Ein Ersatz für den herkömmlichen Telefonanschluss ist VoIP per PC allerdings nicht, denn sie bietet vergleichsweise geringen Komfort und Verbindungsabbrüche sind an der Tagesordnung.

    Aber:

    Das ist beim Telefonieren über das Internet Protokoll ganz anders: Die Gesprächsverbindungen über IP erfolgen in hervorragender Sprachqualität und dem Kunden stehen alle Bequemlichkeiten moderner Telefon-Features zur Verfügung.

    Deutsche Telekom: Wenn die Stimme übers Internet kommt.

  • Women Techmakers Munich

    Google and Google Developer Groups arrange the Women Techmakers Munich Conference. The event takes place 28th of March 2015 in the HVB Forum in Munich. Details and background on Women Techmakers.

    Registration via Eventbrite.

  • IEEE WIE International Leadership Conference

    Register now for the IEEE Women in Engineering International Leadership conference (IEEE WIE-ILC).

    The conference is to be held 23-25 April 2015 in San Jose, California, USA. With a theme of Lead Beyond: Accelerating Innovative Women Who Change the World, the conference focuses on leadership, innovation and entrepreneurship.

     

    via IEEE WIE International Leadership Conference.

  • When a Project dies

    When is a project dead?

    One question that somebody asked me a few days back keeps me thinking for a while now. Mostly, because it should not have a clear answer. Have you ever had to ask yourself, what to do when your heart-project is at risk to coHantelnme to an end? A project that just dies, has had some serious problems.  A dead-end, that leaves no next steps, along a final decision. In a way that no project goal materialized and no other milestone is reachable? If that is looming to happen, one should consider to check the project plan and answer a couple of questions about the failure. How did all the tasks and work packages depend on each other, that they made an entire project fail? Were some assumptions to optimistic? Was budget too tight? Was the project to ambitious?

    The show must go on

    KabelDepending on size, no project is barely ever dead. Typically, a project consists of multiple components. Milestones, Tasks, Work-Packages, are just common terms for break downs structures of a project. Such fragments, re-used or re-arranged, can help achieving a modified goal. There are reasons, one or another milestone had difficulties. There are hard facts, like budgets, technical dependencies or necessities, required skills, availability of material or combinations of anything. And there are soft facts, like project team engagement, stakeholder opinion, even hubris may result in milestones not being reached.

    Failure

    A roadblock, identified early enough, allows to realign a project plan, to cope with any trouble, endangering tasks and milestones. In an iterative project approach, the project lead can change a goal, aligning with changing requirements. This way, the project may not reach it’s initially intended goal, but it will not fail in its totality. When a project dies, it will leave bad feelings with the budget owner, with stakeholder and the team. A goal that the team reached, maybe through a more creative approach, will still be a goal reached.

  • Lenovo compromises SSL.

    As if governance surveillance wasn’t in the news enough these days, hardware vendors are more or less trusted. Hardware with Windows OEM versions are long known for coming with adware pre-installed. Lenovo comes into the limelight for having installed Adware, that comes with a certificate to allow “Man in the middle” attacks, intercept secure connections and insert adware into trusted brand sites. Having software from a company named Superfish installed is a nightmare for any consumer. That adware removes any trust in online content and Lenovo as a vendor.

    via Marc’s Security Ramblings.

    Update:

    Erratasec.

  • OWASP Internet of Things Top Ten Project

    Ich bin das Polizeiauto.The OWASP Project is looking at the Internet of Things, too, and published a top 10 of security concerns for that matter. While all of this is reasonable for the Internet of Things, it can be applied very generally for the Internet of anything. Good security pays in every environment, it’s just the Internet of Things has potentially more attack surface.

    (more…)

  • Disk Forensic Evidence after Equation Group

    After Kaspersky found hard drive firmware malware, @dragosr makes a valid point about disk forensic evidence. In particular, since the published timeline of the Equation Group reaches back as far as 2001.