Stephen E. Arnold: Search Bottlenecks — Still There, Getting Worse

Speeding Up Search: The Challenge of Multiple Bottlenecks I read “Search at Scale Shows ~30,000X Speed Up.” I have been down this asphalt road before, many times in fact. The problem with search and retrieval is that numerous bottlenecks exist; for example, dealing with exceptions (content which the content processing system cannot manipulate). I wish …

Berto Jongman: Allies Don’t Trust NSA, Force Backdown on Encryption Standards

Distrustful U.S. allies force spy agency to back down in encryption fight In interviews and emails seen by Reuters, academic and industry experts from countries including Germany, Japan and Israel worried that the U.S. electronic spy agency was pushing the new techniques not because they were good encryption tools, but because it knew how to …

Stephen E. Arnold: UK Cybersecurity Director Outlines Agency’s Failures in Ongoing Cyberwar

UK Cybersecurity Director Outlines Agencys Failures in Ongoing Cyberwar The article titled GCHQ: Spy Chief Admits UK Agency Losing Cyberwar Despite £860M Funding Boost on International Business Times examines the surprisingly frank confession made by Alex Dewdney, a director at the Government Communications Headquarters (GCHQ). He stated that in spite of the £860M funneled into …

Sepp Hasslberger: The InterPlanetary File System (IPFS) with Comments from Phi Beta Iota Editors

This is about de-centralising the net, distributing the data to the periphery where it’s needed, rather than running everything through big data pipes and central servers… HTTP is obsolete. It’s time for the distributed, permanent web HTTP is broken. It’s time for the distributed, permanent web. The InterPlanetary File System (IPFS) is a new hypermedia …

Berto Jongman: Pentagon Weapons Vulnerable to Open Internet Connections for Performance Monitoring

Pentagon’s Online Habits Render US Weapons Info Highly Vulnerable The Pentagon’s longstanding practice of connecting networks, equipment, and weapons to the open Internet has unintentionally created major vulnerabilities throughout the Defense Department. The strategy was supposed to facilitate the collection of performance data to help design new weapons and monitor equipment remotely, among other benefits. Instead, it has jeopardized …

Berto Jongman: End-to-End Encryption and the Internet of Things

End-to-end encryption is key for securing the Internet of Things Securing the IoT begins with understanding why it requires a fundamentally different set of strategies and tools than those currently used in IT, telecom and other domains   . . .   SSL/TLS is not sufficient for small devices with the need to protect the data in …