tim.rohrer

37 Added | 2 Magazines | 62 Likes | 1 Following | @tim_rohrer | Keep up with tim.rohrer on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “tim.rohrer”

Realizing The Potential Of Big Data And Analytics

It’s not what you know. It’s what you <i>do</i> with what you know. That’s something companies worldwide will be learning—for better or worse—in the coming year when it comes to big data.<p>Gurus among us have proclaimed 2017 will be the year big data goes mainstream. If you’re anything like me, you may be …

Big Data

44 of the best long hiking trails in the continental US all on one map

So many trails, so little time. That’s sure how it feels sometimes when you’re trying to pick a new adventure to go on. It can be difficult deciding …

Hiking

The best privacy and security iPhone apps

In an age when millions of dollars are spent to hack smartphones, the idea of defending yourself is more important than ever.<p>There are simple steps …

Information Systems
Internet of Things

Big Security Bug Affects Hundreds Of Thousands Of Cisco Devices

Hackers using NSA-related hacking tools could exploit a major cyber security vulnerability impacting hundreds of thousands of Cisco switches, …

A Twist On The Cyber Kill Chain: Defending Against A JavaScript Malware Attack

This slightly modified model is a practical way to keep attackers out of your systems.

Cybersecurity

SanDisk's 1TB SD card has more storage than your laptop

SanDisk has unveiled the biggest SD card in the world — a prototype card with an outrageous 1 terabyte of memory. The SDXC card is only a prototype at this point, with no details available on price or release date, but it's still an impressive milestone. As SanDisk owners Western Digital points …

How to protect your Apple ID with Two-Factor Authentication

Two-Factor Authentication strengthens the security of your Apple ID by preventing anyone from accessing or using it, even if they know your password. …

Identity Theft

21 Open Source Projects for IoT

The Internet of Things market is fragmented, amorphous, and continually changing, and its very nature requires more than the usual attention to …

Internet of Things

Introducing 411: A new open source framework for handling alerting

Back in 2014, Etsy started using the ELK (<b>E</b>lasticsearch, <b>L</b>ogstash & <b>K</b>ibana) stack. We’ve previously written about how we use saved searches as a …

Software Development

macOS Sierra Includes a New Apple File System, APFS

Although not discussed in today’s keynote, Apple is adding a new “universal” filesystem to iOS and macOS. Apple File System (APFS) will likely …

Linux

Interesting Python modules

In light of the large response to our pervious article, 10 interesting Python modules to learn in 2016, we've decided to continue with even more …

Python Programming

Makefiles in python projects | Krzysztof Żuraw Blog

<b>When I join my current company I saw in their git repos strange file. It wasn’t used by any python code. It just sits in the main directory of the</b> …

Python Programming

A bite of Python

Being easy to pick up and progress quickly towards developing larger and more complicated applications, Python is becoming increasingly ubiquitous in …

Python Programming

Cerber Ransomware JavaScript Loader Goes Undetected

We have been closely monitoring Cerber ransomware since it first emerged on a Russian password-protected forum, offered as-a-service for members only.<p>…

Cybersecurity

Introduction

Despite being over 1 year old, one of the most popular articles I have written is Overview of Python Visualization Tools. After these many months, it …

Data Visualization

New programming language delivers fourfold speedups on problems common in the age of big data

In today's computer chips, memory management is based on what computer scientists call the principle of locality: If a program needs a chunk of data …

Programming Languages

12 versions of the same algorithm in JavaScript, Python, and Go

The algorithm<p>I recently had to write nearly the same code in Go and Python on the same day, and I realized I had written it many times before in …

Python Programming

What’s next for visual story telling?

<b>Meet Storyo, the Portuguese company that is committed to revolutionize the way visual content is created and shared</b><p>The future of visual story telling …

Storytelling

Marketing

Once Upon a Brand: 6 Brand Storytelling Must Have Content Elements<p>Do you have a brand story that you share with people who come in contact with your …

Marketing

Encrypting the Internet of Things

NIST: Specially Designed Cryptography Needed for Small Computing Devices Eric Chabrow (GovInfoSecurity) • September 6, 2016<p>The National Institute of …

Point-and-Shoot Plus

That Rumored iPhone 7 Plus Camera…<p>One year in high school, I took a photography class. As ridiculous as it seems to write — I don’t feel <i>that</i> …

Mobile Photography

Several Linux Distros Cater To Deep Web Users

<b>For those people who have ever considered exploring the deep web, there are specific Linux distributions at your disposal. Using Tor itself is far</b> …

Linux

Debian plugs Linux 'TCP snoop' bug

Happy Labor Day, US sysadmins. Everyone else, you know what to doDebian's maintainers have moved to plug the TCP snooping flaw that emerged in August …

Information Security

LuaBot Is the First Botnet Malware Coded in Lua Targeting Linux …

September 6, 2016 Uncategorized<p><b>A trojan coded in Lua is targeting Linux platforms with the goal of adding them to a global botnet, security</b> …

Mirai Linux Trojan corrals IoT devices into DDoS botnets

Mirai, a newly discovered and still poorly detected piece of Linux malware, is being used to rope IoT devices into DDoS botnets.<p>Researchers from …

Swiss Army Knives

Adobe resurrects Flash for Linux from the dead – Ghacks Technology News

Adobe just announced that it made the decision to bring Flash for Linux up to sync with Flash for other operating systems.<p>This means that Linux users …

Stealthy, tricky to remove rootkit targets Linux systems on ARM and x86

Security researchers have identified a new family of Linux rootkits that, despite running from user mode, can be hard to detect and remove.<p>Called Umbreon, after a Pokémon character that hides in the darkness, the rootkit has been in development since early 2015 and is now being sold on the …

Information Security

Intel Graphics Update Tool Adds Support for Ubuntu 16.04

Intel's graphic update tool has been updated to support Ubuntu 16.04 LTS and Fedora 24. It offers users the Intel 2016Q2 graphics stack.This post, …

Linux

Embedding Interactive Maps into an IPython Notebook

By Agustin Barto, Senior Python developer at Machinalis and By Luis Sanchez, Quantitative Analyst, Data Scientist and CEO of …