7.4 C
Friday, November 24, 2017
Home Tags One Direction

Tag: One Direction

Seven years of data later: Sources of cosmic rays still clouded by lack of data.
European Parliamentreader comments 27 Share this story Fake news hawkers have copped a sizeable telling off from Pope Francis, who has compared the phenomenon of spreading scandalous and false stories online to coprophilia—an abnormal fascination with poop. The Pope's pop at phony folk who run fake news stories on the Web—published mostly to stir up bizarre and frenzied smears against politicians and other public figures—sits at the extreme end of clickbait and, for many commentators, it left a skid-mark over the recent US election. "I believe that the media should be very clear, very transparent, and not fall prey—without offence, please—to the sickness of coprophilia, which is always wanting to communicate scandal, to communicate ugly things, even though they may be true," he told Belgian Catholic weekly newspaper Tertio. "And since people have a tendency towards the sickness of coprophagia, it can do great harm." The Oxford English Dictionary describes coprophilia as an "Abnormal interest and pleasure in faeces and defecation," while the word coprophagia refers to people who eat faecal matter. He said that it was sinful to circulate fake news, adding it was "probably the greatest damage that the media can do." And described the spread of misinformation as deeply harmful because "opinion is guided in one direction, neglecting the other part of the truth." He also warned—in a nod to the so-called "right to be forgotten" debate—against the use of slander to smear politicians that "can be used as a means of defamation," adding: "in defamation, we leak a document, as we say in Argentina, 'Se hace un carpetazo'—and we uncover something that is true, but already in the past, and which has already been paid for with a jail sentence, with a fine, or whatever.

There is no right to this.

This is a sin and it is harmful." The Pope's pungent words on fake news and coprophilia can be read in full on the Vatican's website, which has published a transcript of his interview with Tertio. This post originated on Ars Technica UK
Servizi Multimedialireader comments 27 Share this story On Monday, the top trending story if you searched Google for "final election vote count 2016" was a fake story on a site called 70News claiming that Donald Trump had won the popular vote, even though he had not. And in the week before the election, Facebook and Google were being criticized about fake news on their sites, which critics believe could have swayed the presidential race's outcome. Google responded Monday with a pledge to restrict fake news sites from using its AdSense advertising network. Facebook, for its part, updated its policy to clearly state that its advertising ban on deceptive or misleading content applied to fake news. "We do not integrate or display ads in apps or sites containing content that is illegal, misleading or deceptive, which includes fake news," Facebook said in a statement. And Facebook chief Mark Zuckerberg on Saturday tried to put the kibosh on the idea that Facebook's platform influenced the election. "Of all the content on Facebook, more than 99 percent of what people see is authentic. Only a very small amount is fake news and hoaxes," Zuckerberg said. "The hoaxes that do exist are not limited to one partisan view, or even to politics. Overall, this makes it extremely unlikely hoaxes changed the outcome of this election in one direction or the other." Still, Google and Facebook are not preventing fake news or hoaxes from appearing on the social networking site or in Google search. Instead, the companies' policies are geared toward trying to reduce the financial incentive for producing fake news. And for Google, it's not just about seeking the truth. Advertisers don't want their wares displayed next to bogus content. "Moving forward, we will restrict ad serving on pages that misrepresent, misstate, or conceal information about the publisher, the publisher's content, or the primary purpose of the web property," Google said in a statement. Google also has the same policy for pornography or violent content. AdSense vets content with artificial intelligence and humans to ensure compliance. For its part, Facebook has been hit hard by some who accused the social-media platform of tilting voters in favor of Trump by allowing completely fabricated stories, including one that Trump won the endorsement of Pope Francis, to circulate on the site. The Pew Research Center, meanwhile, in May said that 62 percent of Americans obtain some, or all, of their news on social media—the bulk of it from Facebook.
The latest release of the open-source container orchestration technology adds new security features, including TLS bootstrap. The open-source Kubernetes 1.4 release, which debuted Sept. 26, provides users with a host of enhanced security capabilities for container deployment and orchestration.Kubernetes originated at Google and is now part of the Cloud Native Computing Foundation, benefiting from the contributions of multiple vendors.Among the new features in Kubernetes 1.4 is TLS bootstrap, which is designed to improve the use of encryption for data in motion across a cluster.

TLS (Transport Layer Security) is widely used on the internet today for encryption."The TLS bootstrapping work done in Kubernetes 1.4 is a step toward automating the addition of new hosts to the Kubernetes cluster," Clayton Coleman, Red Hat's lead architect for OpenShift, explained to eWEEK. OpenShift is Red Hat's platform as a service (PaaS) and is based on Docker containers and Kubernetes.

Coleman noted that Kubernetes 1.4 is already available in the OpenShift Origin upstream project. Later this fall, Red Hat's commercially supported OpenShift Container Platform 3.4 will be updated with Kubernetes 1.4. OpenShift Container Platform 3.3, based on Kubernetes 1.3, was released on Sept. 22. CoreOS is also a leading contributor to Kubernetes and builds a commercially supported distribution of Kubernetes called Tectonic.

Brandon Philips, CTO of CoreOS, explained that prior to Kubernetes 1.4, the communication channel between the kubelet (a core building block of Kubernetes and the primary node agent that runs on each node) and the API server was only secured in one direction without manual configuration. "This change [TLS bootstrap] allows kubelets to request cryptographic assets [certificates] that identify them as approved members of the cluster when talking to the API server," Philips told eWEEK. "This sets the stage for a variety of security features based on strong kubelet identity."Going forward, CoreOS hopes to expand the TLS bootstrap feature to allow other components of Kubernetes to request certificates, Philips said.Another new capability in Kubernetes 1.4 is the image policy webhook that can help make sure malicious container images don't run on a cluster."An Admission Controller is configured with an Image Policy webhook that will contact a back-end service for verifying images," Philips said. "The back-end service needs to only understand how to respond to a request from an admission controller, which allows for a variety of possible back-end services."hilips noted that one example could be a service collocated with CoreOS' Quay container image repository, which approves or rejects scheduling requests for containers based on the results of a Quay Security Scanner analysis. He added that today that system can notify users of potential issues via email, Slack or webhook but with this addition to Kubernetes a user will, in the future, be able to block known vulnerable images from ever running.Work is also ongoing in Kubernetes with a Pod Security Policy, which Coleman said is the upstream Kubernetes equivalent of the Security Context Constraints that originally shipped with OpenShift v3.0 in June 2015."Pod Security Policy (and Security Context Constraints) provides a set of rules that match a user or group to allow security options on the pods they create—to limit users from running pods/containers that may not be secure," Coleman said.Pod Security Policy is currently off by default in Kubernetes, he said.

The current plan from Red Hat is to move the security policies that OpenShift provides out of the box, which range from restrictive to fully permissive, into Kubernetes in either the 1.5 or 1.6 releases.Looking forward for Philips, one of the major efforts for CoreOS is helping to make rkt a first-class container runtime for Kubernetes. Rkt is a container runtime effort led by CoreOS that got started in December 2014."Our goal as community stewards for Kubernetes is to allow broad participation in the project while ensuring a healthy technical foundation for innovation," Philips said.The top areas of improvement for the Kubernetes 1.5 release, according to Coleman, will include maturing the storage capabilities in Kubernetes with dynamic volume provisioning across a wide range of cloud providers and storage systems.
In addition, there is a focus on continuing tomake performance and scale improvements to enable larger clusters.Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com.

Follow him on Twitter @TechJournalist.
The only surprise in this week's announcement that BlackBerry is getting out of the hardware business is that it took this long.

CEO John Chen has been hinting broadly for two years that this would happen, and the parade of unsuccessful Android smartphones that followed the parade of unsuccessful BlackBerry 10 OS smartphones pointed in only one direction: the death of hardware. But BlackBerry was and is not simply a hardware company.

Chen has spent considerable effort to transform it into a software company focused mainly on mobile security tools, but also a little on communications tools.

Today, BlackBerry has a grab bag of technologies it's acquired to stake out that software claim. Here's which ones should matter to you and which ones shouldn't. Good Secure EMM suites IT has long known and used BlackBerry Enterprise Server (BES), which was renamed BlackBerry Enterprise Service when it was expanded to support iOS and Android in 2012 through the 2011 acquisition of Ubitexx.

BES is now a component in the Good Secure EMM Suites, for which most of its components were obtained through another acquisition: Good Technology, in 2015. Good is the sole significant survivor of the original, pre-iPhone enterprise mobility management (EMM) providers.

Today, newcomers like MobileIron and AirWatch (bought by VMware a few years back) dominate the market, and Microsoft is trying to muscle in with its Enterprise Management Service product suite. Like MobileIron and AirWatch, Good's suites support iOS, Android, Windows 10, and MacOS for what's called omnidevice management.

Good also provides the option of wrapping custom applications with its proprietary APIs via the Good Dynamics tools to add security features not natively supported by the iOS and Android APIs; MobileIron and AirWatch offer similar mobile management extensions.

And like MobileIron and AirWatch, the Good suites tie into identity management systems -- an essential connection for users entrusted with sensitive corporate data and workflows on both mobile and desktop devices. Good has a long history in IT, and it remains a real contender for your EMM platform, especially if you've already invested in its tools. WatchDox There's a lot of noise lately around document management on mobile devices. Microsoft has one approach for Office 365, Apple has one for e-books in iOS, and every cloud storage vendor has tools to manage document access across devices. WatchDox, purchased by BlackBerry in 2015, takes a heavy-handed approach, adding digital rights management to files to ensure they can be read and edited only by authorized users.

That makes sense for truly critical documents, but it means your people are restricted to using only WatchDox apps for that content -- which may or may not make sense for specific documents and workflows. WorkLife Part of the Good product set BlackBerry acquired, this split-billing component tracks cellular data usage by Good Dynamics apps. Ostensibly, it helps IT manage cellular data costs in BYOD scenarios, but in practice, it does not. That's because users work with many other off-the-shelf apps that don't call the proprietary Dynamics APIs, so their data usage isn't tracked.

Besides, if you provide a fixed reimbursement for work use of BYOD items, there's no need to track cellular data for each person to figure out the relative billing balance. AtHoc Based on a 2015 acquisition, the AtHoc platform lets you manage crisis communications, such as sending automated messages to staff and others in case of a natural disaster, an unexpected building closure, a mass shooting, or even a meeting delay.

AtHoc has no strong relationship to other BlackBerry services, so any decision around its use need not factor other BlackBerry relationships. Secure messaging: SecuSmart and BBM Secure BlackBerry bought SecuSmart in 2014 to offer encryption-secured calls and text messaging for Android and iOS smartphones.

This was back when former NSA contractor Edward Snowden revealed the U.S. government was snooping on foreign leaders' calls, and governments started seeking a way to block the NSA. SecuSmart works only on smartphones.
Its text-messaging encryption is tied to a mobile phone number, so tablet-based messaging is protected only if it goes through a protected smartphone, such as if an iPad user is using Handoff to text via his or her iPhone. BlackBerry also offers BBM Secure, which protects text messages on Android and iOS smartphones via the BlackBerry Messenger app.
Its capabilities are similar to those of SecuSmart, and it's unclear why BlackBerry offers both options. Again, note the limitation to smartphones.
If you want to secure text messaging across all user devices, look elsewhere. BlackBerry Messenger Available for Android and iOS devices for several years now, BBM sought to take advantage of the popularity of the BlackBerry phone's beloved messaging service.
It works OK, but if you have multiple devices, it's a pain to use because only one device can be active at a time -- not a restriction on the many other messaging apps available today. Plus, there's no desktop client. If your concern is privacy, I'd go with Snowden's recommended Signal app instead, from Open Whisper Systems.
If you want a great messaging app across all popular devices with good support for voice, text, and video, Signal fits the bill nicely, too. Dtek for Android Available for a small number of Android devices, Dtek lets users see what data various apps are monitoring and manage the permissions for each app.

That sounds great, until you realize Android Marshmallow (and Nougat) does that natively, with no app needed.
In iOS, of course, Apple has long provided this visibility and the controls over apps' use of your data. BlackBerry Hub for Android One of the few features in the BlackBerry 10 OS that users liked, the Hub is a central communications zone so that you don't have to switch among apps to handle your various communications channels.
I found it overwhelming, but many others really like the Hub. It's available for Android Marshmallow and later devices; an iOS version is supposedly in the works.

BlackBerry Hub is certainly worth a try if you like the idea of a communications hub on your mobile device. Miscellaneous Android apps BlackBerry has made some features from its Priv and Dtek Android phones available to other Android devices (not to iOS).
If you're the kind of person who likes to use a third-party app rather than the native clients, check them out at the Google Play Store (search for "BlackBerry"). In addition to the Dtek, BBM, and Hub apps already mentioned, the apps compatible with many Android devices include BlackBerry Contacts, BlackBerry Calendar, Tasks by BlackBerry, Notes by BlackBerry, BlackBerry Password Keeper, and BlackBerry Device Search. Your guess is good as mine as to how long BlackBerry will continue to develop and support these apps.
Here we go again.CSPAN reader comments 21 Share this story Yesterday, Ars reported on the Reddit thread purported to have been started by Paul Combetta, a systems administrator at Platte River Networks involved in the operation of Hillary Clinton's private mail server. In the thread, a user named "stonetear" asked others on the /r/Exchangeserver subreddit how to strip a "very VIP" person's e-mail address from messages in an existing Exchange .PST e-mail archive. Now, the House Oversight and Government Reform Committee, which has been at the center of much of the ongoing congressional probe into Clinton's e-mails, has subpoenaed those posts. The feds are asking Reddit to preserve them for further investigation. The Hill reports that the committee's Republican majority has issued an order to Reddit to provide the posts and metadata related to them to committee investigators, and Reddit is reportedly cooperating with the order. The Justice Department previously granted Combetta immunity from prosecution for cooperating with the FBI's investigation of the Clinton e-mails. Combetta admitted to accidentally deleting Clinton's e-mail archives in an "oh shit moment" when he realized he had not put new retention policies in place for her mail. That took place in March of 2015. The Reddit thread in question corresponds with the period when Combetta and others at Platte River Networks would have been assisting in the collection of Clinton's e-mails to be turned over to the House Select Committee on Benghazi in July of 2014. Combetta has not confirmed that he made the post, though it is tied closely to his other social media and e-mail accounts. "I’m very confident that the amount of circumstantial evidence certainly points in one direction,"  Rep. Mark Meadows (R-N.C.), chair of Oversight's Government Operations subcommittee, told The Hill. "We’re just trying to make doubly sure that we can authenticate that in a real way, because if not it will be challenged on a number of fronts." Even if the post is legitimately from Combetta, its content doesn't indicate he was trying to destroy evidence—it only shows he attempted to conceal e-mail account addresses in the headers of the messages in the archive (as we explained yesterday). The posts (again, if they were Combetta's) were unrelated to his later deletion of Clinton's e-mail archives following their delivery to her lawyers and the State Department.