Don't Panic Labs Reading List

DPL Reading List – August 31, 2018


| August 31, 2018 | in

Here are some of the articles we found this week.

Corporate Cybersecurity Is Becoming Geopolitical. Are U.S. Tech Companies Ready? – “Businesses are interconnected, and therefore threats are, too. Firms should take care to understand how their systems depend on the products and services of other firms; often a close examination will find many more critical dependencies than expected.”

How Logitech designed an ergonomic mouse that’s not weird – “Ergonomic designs are often bulbous and blobby because they’re designed to complement our bodies like negative space, which are anything but flat aluminum and glass. For a user in pain, that’s okay. But for a user considering making the leap to an ergonomic design, it’s a major hurdle.”

The adventures of lab ED011—“Nobody would be able to duplicate what happened there” – “Within this seemingly nondescript university room, Romania’s first truly digital generation was born. And some of today’s best technical minds anywhere developed the necessary skills to become industry leaders in everything from app development to security research.”

Why the Future of Data Storage is (Still) Magnetic Tape – “the main reason why companies use tape is usually simple economics. Tape storage costs one-sixth the amount you’d have to pay to keep the same amount of data on disks, which is why you find tape systems almost anyplace where massive amounts of data are being stored. But because tape has now disappeared completely from consumer-level products, most people are unaware of its existence, let alone of the tremendous advances that tape recording technology has made in recent years and will continue to make for the foreseeable future.”

The Difference Between Sandboxing, Honeypots & Security Deception – “The term “security deception” only came into wide usage in the last year, so it can be difficult to tell how exactly these solutions are different from other tools that try to trick attackers, such as sandboxing and honeypots. Like these other tactics, security deception fools attackers and malicious applications into revealing themselves so that researchers can devise effective defenses against them, but it relies more on automation and scale, and requires less expertise to set up and manage.”

Google image search is now a design tool – “Picular is a new color search tool that lets you enter any search term and presents you with a slew of options, basing all of its color choices on what pops up first in Google image search. It’s a color-picker, courtesy of internet hive mind.”

Blockchain is everywhere – “While research and advisory firm Gartner forecasts that blockchain will generate an annual business value of more than $3 trillion by 2030, PwC explains that “it’s possible to imagine that 10% to 20% of global economic infrastructure will be running on blockchain-based systems by that same year.””

Related posts