However hard you work on documentation, it won’t work for your software – unless you do it the right way. There is a secret that needs to be understood in order to write good software documentation: there isn’t one thing called documentation, there are four. —Daniele Procida
Like most new technologies, 5G has brought with it a great deal of media hype. Some of this hype is accompanied by a significant distortion of facts and amplification of the actual capabilities of 5G technology. However, one claim that has universal agreement is that 5G will achieve ‘blistering speeds’, or in other words, much higher bandwidth compared to previous generations. —Paresh Khatri
Fraud and abuse in the form of robocalling, and more specifically illegally spoofed calling, is the No. 1 consumer complaint to the Federal Communications Commission (FCC). Robocalls make up nearly half of all phone calls, so frustrated consumers simply don’t answer incoming calls and businesses can’t get through to customers when they need to reach them. —Mark B. Cooper
Welcome to the next phase of the streaming wars, where some of the biggest companies in tech and media are fighting for your attention and your subscription dollars. With the launch earlier this month of Apple’s AAPL, +0.35% streaming service and then, this week, Disney’s DIS, -0.24% Disney+, never before have there been so many services, offering a deluge of content, various bundles and countless add-ons. But there’s only so much money in peoples’ budgets.
A cyberattack limited to one organization can be enough to cause significant financial loss, data compromise, and long-term damage. When an attack extends to several victims, as is increasingly the case with enterprise incidents, the effects quickly multiply. —Kelly Sheridan
Today, we are told that the bigness of Big Tech giants was inevitable: the result of “network effects.” For example, once everyone you want to talk to is on Facebook, you can’t be convinced to use another, superior service, because all the people you’d use that service to talk to are still on Facebook. And of course, those people also can’t leave Facebook, because you’re still there. —Cory Doctorow
Intel CPUs that received hardware, software, and microcode fixes for various Spectre-related bugs are still vulnerable to a new speculative execution attack called ZombieLoad v2. This latest flaw in Intel’s chip design doesn’t make every single Core processor vulnerable, but it affects the latest few generations, from 2013’s Haswell architecture through to the latest Cascade Lake designs. —Jon Martindale
Relying on more than one network to manage your Kubernetes pods is usually no big deal. For webscale applications, the process usually involves sending traffic to multiple networks and that is the end of the story. But for network-intensive workloads, you might need more than one road to get to where you’re going. —Doug Smith
Technology giants are showing a heightened interest in the financial-services industry as they see Chinese tech companies succeeding in payments, an area that could be lucrative for data collection. —Emily Bary
In this post, I will explain how to hide your Amazon Web Services Elastic Compute Cloud (AWS EC2) server from those scanners using IPv6. The address range for Internet Protocol version 6 is ~7.9×1028 times larger than IPv4, so, in practice, it’s currently not targeted by bots. —Paweł Urbanek
Related