Skip to content

Weekend Reads 081619

If you are using any supported version of the Windows operating system, stop everything and install the latest security updates from Microsoft immediately. —Swati Khandelwal

Is poor documentation always evil? Absolutely not. I’m often amazed at just how much some open source projects manage to accomplish considering the limited resources they’re usually working with. And, in any case, as long as people (like me) aren’t volunteering to help out, we have no right to grumble. —David Clinton

In any chip design, the devil – and the angel – is always in the details. AMD has been burned by some architectural choices it has made with Opteron processors in the past, where assumptions about how code might exploit the hardware did not pan out as planned. — Timothy Prickett Morgan

The unknown knowns quadrant is often overlooked or just misinterpreted. I can easily understand why people don’t see the importance of it and just refer to it as a nonsense contradiction — how can someone not know something they already know? —Alon Kiriati

With a focus on continuous improvements, agile project management upends the traditional linear way of developing products and services. Increasingly, organizations are adopting agile project management because it utilizes a series of shorter development cycles to deliver features and improve continually. —Matt Shealy

Seldom has a new IETF protocol sparked so much controversy and discussion than the DNS privacy protocol DNS-over-HTTPS (DoH). —Carsten Strotmann

The security expert contacted dozens of UK and US-based firms to test how they would handle a “right of access” request made in someone else’s name. —Leo Kelion

How safe are your secrets? If you used Amazon’s Elastic Block Storage snapshots, you might want to check your settings. —Zack Whittaker

It looks like an Apple lightning cable. It works like an Apple lightning cable. But it will give an attacker a way to remotely tap into your computer. —Joseph Cox

How do you solve a problem like deepfake? It’s a question that everyone from tech companies to politicians are having to ask with the advent of new, increasingly accessible tools that allow for the creation of A.I. manipulated videos in which people’s likenesses are reappropriated in once unimaginable ways —Luke Dormehl Luke Dormehl

With so much dissatisfaction over how companies like Facebook and YouTube moderate user speech, you might think that the groups that run the Internet’s infrastructure would want to stay far away from the speech-policing business. Sadly, two groups that control an important piece of the Internet’s infrastructure have decided to jump right in. —Mitch Stoltz

Scroll To Top