Category Archives: Linux

Link

Google, Facebook dominate online advertising – 85% of global online ad dollars, per Morgan Stanley

“The Dream We haven’t Dared to Dream” by Dan Pallotta via TED.com

What are your dreams? Better yet, what are your broken dreams? Dan Pallotta dreams of a time when we are as excited, curious and scientific about the development of our humanity as we are about the development of our technology. “What we fear most is that we will be denied the opportunity to fulfill our true potential,” Pallotta says. “Imagine living in a world where we simply recognize that deep, existential fear in one another — and love one another boldly because we know that to be human is to live with that fear.”

  https://embed-ssl.ted.com/talks/dan_pallotta_the_dream_we_haven_t_dared_to_dream.html

Author, speaker, reformer
We dream boldly in the dimension of our doing, but set the bar no higher than stability in our emotional lives. It’s time to dream in multiple dimensions at the same time, says AIDSRide Founder Dan Pallotta. He aims to transform the way society thinks about giving, and being. Full bio

Benefits vs. Risks Of Cloud Computing (… and some tips from my experience…)

Previously posted on Medium

Today utilizing an external drive is the most often used strategy for having an efficient backup storage. On the other hand, the people who contemplate utilizing cloud computing for this purpose often wonder if the technology is worth the attempt.

Users of the system ensure that there’s no reasons why anyone should keep from utilizing this system as it guarantees numerous additional benefits as when compared to the traditional methods. The truth that you’ve to fork out a “minuscule” amount of cash on a -monthly- basis for the use of cloud data storage is one motive behind prospective users to be careful.

 

The following benefits of the technology are cause enough to make sure that this expense property is truly worth it.

Extensive storage space: The most elementary advantage of utilizing the cloud is that you can store any quantity of information, which is difficult when using drives. The system is very simple to utilize as the account is created within a few minutes, as opposed to the effort and time spent on going searching for an additional drive.

No Physical existence: Once you have saved your data on the cloud, it becomes the obligation of the supplier to worry about its preservation. Rather than purchasing and saving these numerous added drives, one only has to stay attached to the web in order to access the stored information.

Convenience of automatic back-up: The consumers of cloud computing do not have to trouble making sure that they have related the external drive to their computers and that they take back-ups occasionally. The options on the cloud system may be altered as per the user’s setting as to whether the back-up must be taken several times in one day or once each day. The only obvious prerequisite for the system to be copied is the internet must be related and anything else is looked after.

Easy restoration: In usual conditions, locating and repairing a hard disk drive from backed up information is a long and troublesome process which calls for the providers of the pc technician. The cloud consumers are spared from such an annoyance as this restoration procedure is made quick and simple. If at all the users however have questions about managing this on their very own, they could always seek help from the companies plus they’ll be more than happy to oblige.

It is important to understand the dangers involved when transferring your business into the cloud before contemplating cloud computing technology. You should perform a risk assessment procedure before any control is handed over to a service provider.

First of all you should deeply understand what is the real privacy protection offered by the Cloud Provider. Nowadays the best (more secure and/or more respectful of your privacy) Hosting – Cloud Providers are redeploying their storage servers from USA to Switzerland. This happens because in general Swiss has a better privacy protection and it is outside the European Union and United States Laws. This means that in Swiss, disclosure order/warrant have less possibilities to have effects than in US or EU if they have not a very good legal motivation.

More in general, it is possible to affirm that any location of the Cloud Provider could be good if you understand the local privacy legislation before you use its services. Moreover the Cloud Providers have to guarantee an encrypted storage without detaining any key that can, directly or indirectly, decrypt the information you save or use through its servers. Consequently all the data transmission have to use https protocols with a recommended minimum of 1024 bits encryption. On my side I privilege nothing that offers less than a 2048 bits https protection.

Usually you can have a good representation about the security of the services offered and the legal legislation that will affect your Cloud Service contract if you read carefully the EULA.

For this reason, before committing, you should inquire which privacy and security laws will apply to the information and where your information will be saved. In case the information will be saved outside of your Country, you will also need to be informed as to the laws and regulation demands in that specific geographic place.

Moreover you have to understand if the Cloud Provider that you are choosing to support your business, is really able to guarantee an adequate service level. Don’t be worried to send inquires if the information provided in their Service Level Agreement don’t solve tour doubts or you think that the provided services could not match with your needs in future because they seems not enough flexible.

Anyway, try to prefer a Cloud Service Provider that has an effective Customer Support Service that can promptly (24/7/365) solve your problems. Cloud Service reseller are (sometimes) cheaper but they could not be the best choice for your business technical needs.

cloud-computing-defined

Courtesy of webopedia.com

Last but not least, don’t underestimate the security holes represented by the human factor. You have to offer the right level of training to your employees and colleagues because just a single mistake by them, can be transformed, by an hacker or a competitor, in a potential debacle for all your Cloud System. Invest in learning courses about Cloud risks for all your employees and colleagues, let them understand what are the potential risks of using Cloud Services. Don’t be afraid to introduce “difficult” technical concept (as e.g. man-in-the-middle attacks, different encryption systems, social engineering tactics, the importance of digital signs, etc..) to them.

For this reason, in order to reach a better security level, configure all the electronic devices (common: tablets, smartphones, laptops & uncommon and often more dangerous: all the hardware with an embedded OS especially if they are able to communicate data through Internet or your phone provider) in order that they use your VPN by default. If you will be able to secure all the transmission through your reliable VPN you could have solved at least the 40-50% of the potential mistakes that are normally made by your employees or colleagues.

Google AI Strategy

Google is betting on its formidable lead in AI to catch up in areas where it is behind its big tech rivals like Facebook, Apple, and Amazon (Charlie Warzel/BuzzFeed)
http://www.techmeme.com/160521/p1#a160521p1

Link

How Monocle found money in radio

monocle-announces-a-24-hour-radio-program

Courtesy of psfk.com

While many print publications are ramping up their podcast output, Monocle magazine went beyond and launched its own 24-hour digital radio station in 2011. It now has 1 million monthly listeners, double what it had last year, according to internal figures…

…Monocle 24 is ad-funded and is financially viable, but Bloomfield wouldn’t go into specifics. Brands, such as UBS, Turkish Airlines, Air Canada and Allianz pay to sponsor the shows, but have no editorial control. “Being more integrated is definitely to a brand’s benefit,” said Emma Moorhead, head of AV planning at media agency MEC. “Most podcasts have small audiences, but then, of course, they can be really targeted, although you can’t get that kind of scale…

How Monocle found money in radio

 

Facebook’s paid Live deal terms restrict publishers from selling sponsored streams — Online Digital Marketing Strategies

If you’re a media company getting money from Facebook to use Facebook Live, that’s the only money you can get for your livestreams right now. As part of its pay-to-stream deals with media companies, Facebook is contractually prohibiting participating publishers from selling sponsorships against the Live streams that the social network is paying them to produce, […]

via Facebook’s paid Live deal terms restrict publishers from selling sponsored streams — Online Digital Marketing Strategies

” Device not managed ” problem on Ubuntu while configuring Netgear EX2700

Previously posted on Medium

I was setting my new Netgear EX2700 WiFi Range Extender through Ubuntu when my wired connection disappeared.

The first thing to notice is that this kind of problem seems to be rare and it happened while I was trying to disable the WPS option on that particular model of Netgears’ WiFi Extender.

Secondly, the ethernet connection option into the menu upper bar menu indicated “Device not Managed”.

Last but not least, I’ld like to underline is that I was not able to reconnect to the ethernet also after I decided to restart it through the Terminal typing the command:

service network-manager restart

I found different solutions on Internet but all the explenation were really verbose and I needed to find a quick solution that I could manage just in few minutes…

At the end I found and adapted a solution previously created for Debian 6.0. The problem seems to be connected with the fact that Network Manager does not accept interfaces defined in /etc/network/interfaces.

For this reason it is necessary to manually change (through the text editor Gedit) the NetworkManager.conf file I found into /etc/NetworkManager/ :

sudo gedit /etc/NetworkManager/NetworkManager.conf

I had to change the managed= option from false to true.

NM1

NM2

After this quick change the Network Manager is now able to managed the interfaces contained into /etc/network/interfaces.

Now I restarted the network manager through:

sudo service network-manager restart

and the ethernet restarted working in the right way.

Fast and simple…

—-

References:

http://www.blackmoreops.com/2013/11/25/how-to-fix-wired-network-interface-device-not-managed-error/

The Feed Is Dying by Casey Johnston via nymag.com/selectall

The feed is dying. The reverse-chronological social media feed — the way you’ve read Instagram, Twitter, Facebook, and blogs (which is to say, the internet) at various points over the last decade, updates organized according to the time they were posted, refreshed at the top of the screen — no longer really makes sense. The unfiltered informational cascade that defined the internet of the 2010s is going the way of the front-page-style web portal: It’s an outdated way of processing online information. The way we consume social media is being transformed and tinkered with as Silicon Valley tries to wring as much engagement, attention, and money out of it as possible. The feed is dying, and we feel shocked by its death — but we shouldn’t.”….

The Feed Is Dying by Casey Johnston via nymag.com/selectall

FDA Issues Menu Labeling Final Guidance — The National Law Forum

The enforcement date will likely begin in May 2017. The US Food and Drug Administration (FDA) issued its final guidance on April 29 on Menu Labeling (Final Guidance).[1],[2] Importantly, the FDA intends to begin enforcing the Nutrition Labeling of Standard Menu Items in Restaurants and Similar Retail Food Establishments Final Rule (Menu Labeling Final Rule)[3] one year from the […]

via FDA Issues Menu Labeling Final Guidance — The National Law Forum