When the Internet outgrew its academic and research roots and gained some prominence and momentum in the broader telecommunications environment it found itself to be in opposition to many of the established practices of the international telecommunications arrangements and even in opposition to the principles that lie behind these arrangements. For many years, governments were being lectured that the Internet was “special”, and to apply the same mechanisms of national telecommunications and trade regulations to the Internet may not wreck the entire Internet, but they would surely isolate the nation that was attempting to apply these unnatural acts. —Geoff Huston @potaroo
Systemd has a remotely exploitable bug in its DHCPv6 client. That means anybody on the local network can send you a packet and take control of your computer. The flaw is a typical buffer-overflow. Several news stories have pointed out that this client was rewritten from scratch, as if that were the moral failing, instead of reusing existing code. That’s not the problem. @Errata Security
The Myers-Briggs test and others like it were huge in the corporate world in the 1980s and ’90s. Individuals took them to see what kind of careers they should pursue; H.R. offices used them to decide who to hire or promote. In The Personality Brokers, Merve Emre explores how, precisely, this variety of psychobullshit rune-gazing was born. —Katrina Gulliver @reason
Targeting developers, ioFog makes it simple to deploy and manage any application or containerized microservices at the edge. Edgeworx has design security for both hardware and software at the edge rather than repurposing security models originally designed for the cloud, which resolves customer’s security concern.
Hardware hacks are particularly scary because they trump any software security safeguards—for example, they can render all accounts on a server password-less. Fortunately, we can benefit from what the software industry has learned from decades of fighting prolific software hackers: Using open source techniques can, perhaps counterintuitively, make a system more secure. Open source hardware and distributed manufacturing can provide protection from future attacks. —Joshua Pearce @opensource.com
Silicon Valley families and technology are breaking up. This past weekend, Nellie Bowles penned a trio of articles for The New York Times titled, “The Digital Gap Between Rich and Poor Kids is Not What We Expected,” “A Dark Consensus About Screens and Kids Begins to Emerge in Silicon Valley,” and “Silicon Valley Nannies Are Phone Police for Kids.” They highlight Silicon Valley’s ironic internal war on technology. Although they were the ones to give us the technology, they’ve realized it wasn’t such a good idea after all, at least not for their kids. —Jessica Burke @The Federalist