PLA tries to buy AV products. Chinese surveillance of Uyghurs. Panda Stealer vs. cryptowallets. Peleton’s API. VDP expanded.

Attacks, Threats, and Vulnerabilities How China turned a prize-winning iPhone hack against the Uyghurs (MIT Technology Review) In March 2017, a group of hackers from China arrived in Vancouver with one goal: Find hidden weak spots inside the world’s most popular technologies.  Google’s Chrome browser, Microsoft’s Windows operating system, and Apple’s iPhones were all in

PLA tries to buy AV products. Chinese surveillance of Uyghurs. Panda Stealer vs. cryptowallets. Peleton’s API. VDP expanded. Read More »

“Flying Data Centers”: America’s Next Stealth Fighter Will Be a High-Tech War Machine

While almost nothing is known publicly about the now airborne air force sixth generation aircraft, in no case would it be considered a stretch to expect it to be built faster and far more maneuverable than any stealth fighter in existence. Is there superb speed similar to Super Cruise propulsion technology and dog fighting skills

“Flying Data Centers”: America’s Next Stealth Fighter Will Be a High-Tech War Machine Read More »

Rolling the dice on network slicing: Kubernetes sparks a rethink of 5G edge

Multi-access Edge Computing (MEC) was pitched like this: Virtualization can make a selected part of a very broad and distributed data center cloud look like the entirety of an enterprise data center network. Already, this seems like a trick that Amazon AWS, Microsoft Azure, Google Cloud, and the others pull off with ease. “The key

Rolling the dice on network slicing: Kubernetes sparks a rethink of 5G edge Read More »