Sketching With Confidence, Clarity And Imagination

Sketching With Confidence, Clarity And Imagination

Full-day workshop • June 28th Being able to sketch is like speaking an additional language that enables you to structure and express your thoughts and ideas more clearly, quickly and in a engaging way. For anyone working in UX, design, marketing and product development in general, sketching is a valuable technique to feel comfortable with…. Read more »

Learn more
Creative Data Visualization Techniques

Creative Data Visualization Techniques

Full-day workshop • June 28th With so many tools available to visualize your data, it’s easy to get stuck in thinking about chart types, always just going for that bar or line chart, without truly thinking about effectiveness. In this workshop, Nadieh will teach you how you can take a more creative and practical approach… Read more »

Learn more
Amazon Aurora Publishes General, Slow Query and Error Logs to Amazon CloudWatch

Amazon Aurora Publishes General, Slow Query and Error Logs to Amazon CloudWatch

You can now configure the MySQL-compatible edition of Amazon Aurora to publish general logs, slow query logs, and error logs to Amazon CloudWatch Logs. Previously, you could only publish audit logs. … Source: Amazon Relational Database Service Amazon Aurora Publishes General, Slow Query and Error Logs to Amazon CloudWatch

Learn more
‘Significant’ FBI Error Reignites Data Encryption Debate

‘Significant’ FBI Error Reignites Data Encryption Debate

FBI stats about inaccessible cellphones were inflated, undermining already controversial bureau claims about the threat of encryption. Source: Wired Security ‘Significant’ FBI Error Reignites Data Encryption Debate

Learn more
Stealthy, Destructive Malware Infects Half a Million Routers

Stealthy, Destructive Malware Infects Half a Million Routers

Cisco researchers discover a new router malware outbreak that might also be the next cyberwar attack in Ukraine. Source: Wired Security Stealthy, Destructive Malware Infects Half a Million Routers

Learn more
Amazon RDS Database Preview Environment is now available

Amazon RDS Database Preview Environment is now available

The Amazon RDS Database Preview Environment is now available, offering an environment for customers to easily test beta, release candidate, and early production versions of PostgreSQL database engine software with… Source: Amazon Relational Database Service Amazon RDS Database Preview Environment is now available

Learn more
How the LAPD Uses Data to Predict Crime

How the LAPD Uses Data to Predict Crime

The Los Angeles Police Department is using “predictive policing” to prevent crime, but this innovative approach has its problems. Source: Wired Security How the LAPD Uses Data to Predict Crime

Learn more
After Meltdown and Spectre, Another Scary Chip Flaw Emerges

After Meltdown and Spectre, Another Scary Chip Flaw Emerges

A new processor vulnerability known as Speculative Store Bypass could expose user data on a huge swath of devices. Source: Wired Security After Meltdown and Spectre, Another Scary Chip Flaw Emerges

Learn more
After Meltdown and Spectre, Another Scary Chip Flaw Emerges

After Meltdown and Spectre, Another Scary Chip Flaw Emerges

A new processor vulnerability known as Speculative Store Bypass could expose user data on a huge swath of devices. Source: Wired Security After Meltdown and Spectre, Another Scary Chip Flaw Emerges

Learn more
You Can Send Invisible Messages With Subtle Font Tweaks

You Can Send Invisible Messages With Subtle Font Tweaks

Researchers have developed a new technique called FontCode that hides secrets in plain sight. Source: Wired Security You Can Send Invisible Messages With Subtle Font Tweaks

Learn more
A Mugshots.com Indictment, Lost Grenades, and More Security News This Week

A Mugshots.com Indictment, Lost Grenades, and More Security News This Week

Critical Cisco bugs, lost grenades, and more of the week’s top security news. Source: Wired Security A Mugshots.com Indictment, Lost Grenades, and More Security News This Week

Learn more
A Location-Sharing Disaster Shows How Exposed You Really Are

A Location-Sharing Disaster Shows How Exposed You Really Are

The failures of Securus and LocationSmart to secure location data are the failures of an entire industry. Source: Wired Security A Location-Sharing Disaster Shows How Exposed You Really Are

Learn more
EC2 Instance Update – C5 Instances with Local NVMe Storage (C5d)

EC2 Instance Update – C5 Instances with Local NVMe Storage (C5d)

As you can see from my EC2 Instance History post, we add new instance types on a regular and frequent basis. Driven by increasingly powerful processors and designed to address an ever-widening set of use cases, the size and diversity of this list reflects the equally diverse group of EC2 customers! Near the bottom of… Read more »

Learn more
Amazon RDS Supports Outbound Network Access from PostgreSQL Read Replicas for Commercial Regions

Amazon RDS Supports Outbound Network Access from PostgreSQL Read Replicas for Commercial Regions

PostgreSQL read replicas on Amazon RDS now support Outbound Network Access and can execute queries using the postgres_fdw extension to access remote servers. The postgres_fdw extension lets you access and modify data stored in other PostgreSQL… Source: Amazon Relational Database Service Amazon RDS Supports Outbound Network Access from PostgreSQL Read Replicas for Commercial Regions

Learn more
Gruesome Jihadi Content Still Flourishes on Facebook and Google+

Gruesome Jihadi Content Still Flourishes on Facebook and Google+

Despite improvements to algorithmic filtering, Facebook and Google+ still host scores of ISIS and related content and accounts that sometimes stay up for months. Source: Wired Security Gruesome Jihadi Content Still Flourishes on Facebook and Google+

Learn more
4 Key Takeaways From Mueller’s First Year—and What’s Next

4 Key Takeaways From Mueller’s First Year—and What’s Next

One year in, Robert Mueller’s investigation into Trump and Russia appears poised to connect all the pieces of the puzzle. Source: Wired Security 4 Key Takeaways From Mueller’s First Year—and What’s Next

Learn more
Inside the Takedown of Scan4You, a Notorious Malware Clearinghouse

Inside the Takedown of Scan4You, a Notorious Malware Clearinghouse

How security researchers caught the creators of counter antivirus services Scan4You. Source: Wired Security Inside the Takedown of Scan4You, a Notorious Malware Clearinghouse

Learn more