Lise Meitner erkannte die Kernspaltung: ein Meilenstein, der die schlimmste aller Waffen ermöglichte. Doch davon ahnte die vor 50 Jahren verstorbene Physikerin nichts.
“In an unexpected report, Bloomberg stated IBM is close to announcing that it will be acquiring Red Hat. The news has been confirmed. IBM is acquiring Red Hat for $190.00 per share in cash. This a total enterprise value of approximately $34 billion.”
“Rometty continued,”Most companies today are only 20 percent along their cloud journey, renting compute power to cut costs. The next 80 percent is about unlocking real business value and driving growth. This is the next chapter of the cloud. It requires shifting business applications to hybrid cloud, extracting more data and optimizing every part of the business, from supply chains to sales.”
“We have barely scratched the surface of the opportunity that is ahead of us. Open source is the future of enterprise IT. We believe our total addressable market to be $73 billion by 2021. If software is eating the world – and with digital transformation occurring across industries, it truly is – open source is the key ingredient.
Powered by IBM, we can dramatically scale and accelerate what we are doing today. Imagine Red Hat with greater resources to grow into the opportunity ahead of us. Imagine Red Hat with the ability to invest even more and faster to accelerate open source innovation in emerging areas. Imagine Red Hat reaching all corners of the world, with even deeper customer and partner relationships than we have today. Imagine us helping even more customers benefit from the choice and flexibility afforded by hybrid and multi-cloud. Joining forces with IBM offers all of that, years ahead of when we could have achieved it alone. Together we can become the leading hybrid cloud solutions provider.”
Developing a successful open-source project is not easy As we can see from its history, there has always been a tension in open source: e.g., philosophical licenses focused on preserving “freedom” vs. permissive licenses taking a pragmatic approach. But there are two larger tensions today: (1) how to balance openness with sustainability and (2) how to manage the transition to the cloud.“
“An example of DCShadow confirms that new enterprise attack vectors appear. It is essential to stay on the crest of the wave in this ocean of information security, look ahead, and act quickly.“
“Die Sensationsmeldung des Wirtschaftsportals Bloomberg über manipulierte Hardware für Cloud Computing stellt sich im FM4-Faktencheck als fast völlig faktenfrei heraus. Am Freitag kam ein langerwarteter Bericht des Pentagon heraus, der vor der Elektronikfertigung in China warnt. (…) Der Börsenkurs des Motherboard-Herstellers Supermicro wurde fast halbiert, etwa 500 Millionen Dollar an Börsenwert gingen verloren. (…) In Folge gingen auch völlig unbeteiligte Hardwarefertiger aus China in den Börsenkeller, Lenovo etwa notierte am Freitag bei minus 15 Prozent. Insgesamt gingen damit mehrere Milliarden Dollar an Börsenwert den großen Datenstrom hinunter, obwohl erst Supermicro, dann Amazon und Apple in scharfen Worten dementiert hatten. Diesen Dementis folgte noch ein weiteres und zwar von Bloomberg selbst, direkt am Ende des Artikels: „Auch Bloomberg LLP ist Kunde von Supermicro. Laut einem Sprecher des Unternehmens sind keine Indizien gefunden, dass die von Bloomberg benutzte Hardware solche Probleme aufweist, wie sie im Artikel beschrieben sind.” ”
Software’s Tay Bridge The Therac-25 X-ray machine killed several people around the world. All of them died a prolonged and horrible death by massive radiation overdose.
Update 2019: After many years of wonderful trainings, I won’t be available at Linux Hotel anymore. Sad, but understandable. My new employer, Heise, is offering trainings and conferences, too, and thus we may see each other there one day… Here’s the old text. Thank you Ingo, Martin, and all the others at this great Essen venue!
Since 2010 Markus Feilner has been sharing his Open VPN know-how in the wonderful location of the Linuxhotel in Villa Vogelsang in Essen, Germany. The wonderful hotel and training center are situated in a green and fresh park on a cliff above the Ruhr river. Its exclusive amenities range from sauna and spa to excellent food and extraordinary ideas for the evenings. (Watch the video beneath this post!)
Usually, Markus’ Open VPN training lasts for three days and covers basics, administration and advanced features of Open VPN in hands-on sessions. Whereas the first day is full of basic concepts and theory, day 2 and 3 will give participants hours of guided work with setup and exploring the abundance of Open VPN servers and clients, including deep dives into individually agreed on features.
Contact us or the Linux Hotel directly for requests about the class specified here: https://www.linuxhotel.de/kurs/openvpn/. Giving trainings at Linxhotel has always been a great pleasure, also because there are a lot of interesting and highly skilled parallel classes going on at the venue, the participants and trainers of which you will meet at lunch, breakfast, dinner, in the park or at the evening events. Linuxhotel is my favorite venue for any kind of training.
In a few minutes I will give this presentation here at KDE Akademy in Vienna. It’s more technical than others by yours truly, but simply a report of how I am using Mail and Groupware on Linux. Here’s the description, here’s the slide deck.
Using the Office 365 Activities API to Investigate Business Email Compromises…. MSO 365 has an undocumented API for forensics, where you can curl a user’s activity report.
Very important and insightful help for all of you that might travel to the USA or similar surveillance states. “Reduce data, encrypt, switch off and dont use biometrics“
“Threat hunting requires a shift to a post-infection mentality and sets of tools such as SIEM (security incident and event management), EDR (endpoint detection and response) and NDR (network detection and response). Even with these tools, threat hunting is a challenge for a variety of reasons. For one thing, these solutions are “heavy.” They require some kind of data collection that involves installing agents on endpoints and/or hardware placed on networks. This can get quite expensive for a large enterprise.“
I do not think the whole story is clear yet, but my intuition tells me to doubt the US version of this story – and I know many people are thankful to Mr. Hutchins for stopping Wannacry, however accidentally that may have been. But what is going on in the court room here? I can’t tell. But the sad part is – as long as it remains unclear, this guy is another Snowden, locked away from home:
“Hutchins, who is living in Los Angeles on bail, is unable to leave the United States since last year due to his pending criminal charges. Hutchins stormed to fame and hailed as a hero earlier last year when he accidentally stopped a global epidemic of the WannaCry ransomware attack that crippled computers all across the world.“
“According to the bill, individuals who break the law will face fine of 3,000 to 5,000 rubles (approx. $48 to $80), officials will face fines up to 50,000 rubles (approx. $800), and legal entities could be fined 500,000 to 700,000 (nearly $8,019 to $11,227), reports Russian State Duma Government site.“
“Congrats to excellent work by Jochen Hoenicke on using an inexpensive oscilloscope to monitor the power drawn by a TREZOR bitcoin wallet to determine what data it was processing.“