Martin Grossner

Martin Grossner

Cloud data center traffic will exceed 14 zettabytes in 2020, an increase of 262 percent from 2015, according to the Cisco Global Cloud Index (PDF). Released Thursday, the report projects total global data center traffic to reach 15.3 ZB annually by 2020, with 92 percent of all workloads being processed in the cloud by 2020.

It also forecasts the number of hyperscale data centers to rise by 226 percent from 259 at the end of 2015 to 485 by 2020.

The majority of workloads will tip over from private to public cloud this year, Cisco says, and public cloud will continue to grow by 35 percent CAGR throughout the forecast period (compared to 15 percent for private), boosted by demand for cost efficiency and agility, along with strengthening public cloud security.

SaaS workloads will grow from 65 percent of total cloud workloads in 2015 to 74 percent by 2020, while the share taken by IaaS will drop from 26 to 17 percent, and PaaS will drop from 9 to 8.  Cisco also forecasts enterprises’ share of workloads to decrease, while consumers’ share will rise, though the enterprise share will be buoyed by big data and IoT workloads. In its report last year, Cisco noted that personal cloud storage would be used by 55 percent (2 billion) of the consumer internet population by 2019.

While data center traffic is growing, architectural innovations like software-defined networking and network function virtualization are streamlining it, the index says, and the density of workloads per server is forecast to grow from 7.3 in 2015 to 11.9 by 2020.

“The IT industry has taken cloud computing from an emerging technology to an essential scalable and flexible networking solution. With large global cloud deployments, operators are optimizing their data center strategies to meet the growing needs of businesses and consumers,” said Doug Webster, Cisco’s vice president of service provider marketing. “We anticipate all types of data center operators continuing to invest in cloud-based innovations that streamline infrastructures and help them more profitably deliver web-based services to a wide range of end users.”

Regionally, the Middle East and Africa will lead in data center traffic growth, with a 34 percent CAGR, but will still be “only” 451 exabytes in 2020. North Amercian cloud data center traffic is expected to grow by 27 percent, from 2.2 ZB in 2015 to 7.1 ZB in 2020.

The Internet of Everything (IoE) will generate 600 ZB of data by 2020, the report says, but hardly more than 6 ZB of that will be stored.

Data center space is being snapped up worldwide, with large chunks of data center space in particularly high demand. In October AWS announced the launch of three new cloud data centers in Ohio, leaving only a couple hundred to go by 2020.


Source:  http://www.datacenterknowledge.com/

The rumor mill surrounding the Galaxy S8 is in full production mode at the moment, with anonymous sources from all corners of the web revealing potential features and design elements long before Samsung is ready to reveal the phone in earnest. The latest comes from Fone Arena, which reports that the S8 will follow the iPhone 7’s lead in the speaker department.

The iPhone 7 was the first iPhone to feature stereo speakers, and it’s an addition that has been roundly praised by reviewers and users alike. Now, Samsung will reportedly follow suit, adding stereo speakers to the S8, along with special branding to draw more attention to the feature.

One of the HTC One’s marquee features was its stereo speaker setup that the company branded BoomSound. The report suggests that Samsung has something similar in mind for the speakers on the new S8.

Curiously, the report also suggests that the S8 could draw upon Samsung’s recent $8 billion purchase of Harman to give its new stereo smartphone some added flair. However, this is something that was already shot down by Harman’s own CEO, Dinesh Paliwal, just a couple of weeks ago. At the time, Paliwal suggests that the timeline to integrate any Harman technology into the S8 was simply too short, and that Samsung’s smartphones would have to wait until 2018 before they could benefit from the acquisition.

“Since we are globally number one in audio technology, we plan to create new opportunities by applying the audio technologies into Samsung’s smartphones and home appliances. We may adopt Harman’s luxury audio technology into Galaxy S series possibly in 2018,” Paliwal said.

Source : http://bgr.com

Auhtor : 

November was all about testing for our article page group. We’ve been running A/B tests on a small percentage of the mobile audience; testing new commenting and site socialization features, variations on UX treatments and relevancy matching on ad units, as well as some improvements aimed at streamlining page flow and better surfacing of related content. We’ve also begun discovery on an overhaul of our registration and user account management experience, with an eye towards enhanced consumer identity management and a tighter platform alignment strategy.

As we move towards the end of the year we’ll be continuing and expanding our testing of new commenting and social engagement features, and planning a new and more scalable approach to prototyping and testing in 2017.

Mobile Web App (beta)

This month was an exciting one for our new mobile products team. We surveyed a portion of our users to see how they were liking the experience, and over 80% of users surveyed offered positive feedback.

We also been refining the ad experience, and we continued to tweak our user experience by adding navigation prompts and nudges to help users to navigate and explore the experience. As of November 29, we are also live with production traffic. Our social team is sharing two new mobile links every day, and our site has proven robust enough to handle more than 17,000 users in one day.

We are also hard at work preparing new mobile list experiences for the upcoming World’s Most Powerful People and 30 Under 30 lists. Simultaneously, we continue work to streamline the app framework, thus allowing us to launch apps around new list events more expeditiously.


November was a busy month for lists. It featured the launch of Best States for BusinessFinTech50NHL valuations and the Just 100 Companies, a new list ranking America’s best corporate citizens within their industries. The product team is now in full swing working on our 2016 ranking of the World’s Most Powerful People, and our signature 30 Under 30 list launching in the first week of 2017.

CMS & Data Science

During November we released several improvements to the CMS focused around tagging content and automated channel/section categorization. In the coming weeks, we'll be introducing improvements to how the CMS handles media, providing a simple, cohesive experience when adding media, andoffering more granular search options. We'll also be debuting a new Help Center, a centralized knowledge base, FAQs and community for our contributor network.

The data science and CMS teams have been collaborating to bring on a suit of features to the CMS that help authors optimize and tag their stories for improved shareability and search engine performance. This week, we released a hashtag suggestion tracker in the CMS to monitor usage and increase accuracy. Next week we’ll be debuting new headline optimization and SEO suggestions features.

Lastly, the data science team is nearing completion on a real-time data pipeline that streams live article data into structured tables where it can be analyzed in real-time, allowing us to pinpoint and react to traffic spikes on viral content as they happen.


In November,ForbesConnectpublished the Forbes Healthcare app, a designated conference app for the Forbes Healthcare Summit in New York City. In December, we will continue our efforts to expand our business development plan in order to provide a light-weight networking platform for business schools.

Level Up by Forbes

The Level Up team is now publishing its own videos on Facebook. Check out our page to watch a few and don’t forget to like the page while you are there! Additionally, Level Up’s content on Amazon Alexa is now recorded and published in audio form (previously it was only text-to-speech), and we will be live on Google Assistant on Dec 15th.

Page Performance

In recent weeks, we have been exploring new ways to maximizing the performance of our core site pages. By ruthlessly shaving off every unnecessary byte and millisecond, we can deliver the core experience as quickly as possible. When a web page loads, you often see many intermediate steps. In those first moments, the page is not an image; it is an animation. By default, the frames of this animation arise in an unintended way from technical factors. We are taking control of these early moments, designing, choreographing and engineering them. We are also working toward comprehensive page performance monitoring of every production page view, as well as automated performance analysis as part of the development process.

Author:  Nina Gould

Source:  http://www.forbes.com/

We’re all trying to achieve great things. With a troubled mind, this can be significantly more difficult. Imagine if you could ‒ at will ‒ calm your mind. You’ll be able to think clearly, not let your emotions get involved, and finally get ahead in life by doing things that are more rewarding. Here are the top 5 ways neuroscientists say you can clear a troubled mind.

1. Mindfulnes

Mindfulness is basically thinking about thinking. This is done by getting your thoughts and feelings out in the open, rather than letting them stew inside your mind. This is something I like to do personally as well. When my first girlfriend broke up with me, I practiced mindfulness and found myself being at peace. I imagined myself standing in the corner of the room looking at the “real me” standing in the middle of the room feeling sorry for myself.

What happened next was amazing: I could gently feel the negative feelings of losing the love of my life (at the time) ebbing away. I could climb out of the hole I had dug for myself and move on. Psychology Today has a great article about this for you to read into more detail.

2. Meditation

Meditation is another approach you can use to calm a troubled mind. While there are several approaches to meditation, it’s all about consciously observing your thoughts and letting them drift by. Meditation isn’t so much about clearing your mind, more so standing by the side of the river of your thoughts and watching them make them way downstream.

You don’t have to cross your legs and hum, all you need to do is being comfortable, sit still, and focus on your breathing.

3. Suppression

This is what a lot of people do naturally. When your mind is full of thoughts, bad ones start bubbling their way up. It’s not a pleasant feeling. Through sheer willpower, you cram them back into a box where they can’t annoy you. In line with Substitution, which I’ll talk about in a moment, suppression is a way of consciously ignoring something so that the thought doesn’t cause you any more problems.

Note that this doesn’t always work. Just like a glass, it can overfill and cause more harm than good. Each person is different and this strategy may work better for you if you have greater control of your emotions.

4. Substitution

Daydreamers, this technique is for you. Substitution is about replacing unwanted thoughts with nicer ones. Substitution allows you to replace bad feelings with good by creating a brand new memory. This memory may exist for a short time, or it could be an elaborate fabrication that you choose to believe. Whatever the case, the idea behind substitution is that it will make you happier.

This can be taken to the extreme. Some people construct entire lives in their minds and get so detached with reality that they forget what’s real and what’s not. This technique is only good if you have a strong imagination.

5. Distraction

This is the last technique. Like substitution, distraction is a way that people can forget about the thoughts that are causing them grief. Distraction relies on outside stimuli to draw their attention away from what’s happening inside their mind. The great thing about this is that you can outsource this to something or someone you trust.

You might have a friend who you can talk to, who reminds you that the world is still OK. You might play in a sports club that draws your attention away from yourself and instead forces you to put selfish thoughts aside so you can contribute to a greater cause. Whatever the case, distractions are another great way to clear a troubled mind.

So, what method do you prefer the most?

Author:  Johnson Kee

Source:  http://www.lifehack.org/

Apple has admitted that a manufacturing fault has been causing some iPhone 6s devices to switch off at random even when they have a significant amount of battery. 

Apple said it would fix the iPhone 6s handsets that shutdown unexpectedly for free. It added that the problem affects some devices manufactured between September and October 2015.

The fault, which affects the batteries on a small number of iPhone 6s devices, can be resolved by replacing the battery.

"Apple has determined that a very small number of iPhone 6s devices may unexpectedly shut down," the company said. "This is not a safety issue and only affects devices with a limited serial number range that were manufactured between September and October 2015." 

Apple has added a tool to its website where customers can check if their phone is affected. It will change the battery on all affected models for free. 

Those who have replaced their batteries at their own expense can also contact Apple about getting a refund. 

Check if your phone is eligible for a fix

To check if your iPhone 6s is one of the affected models go to the Unexpected Shutdown Issues page on Apple's website.

Find your device's serial number by going to General -> Settings -> About. Then enter the country where you bought the device and the serial number on Apple's site and hit Submit. Apple will tell you if it is an affected model. 

If it is, the company will replace your battery for free so long as your phone is in working order. Apple advises customers to take their faulty iPhone 6s to an Apple Store, Apple Authorised Service Provider or to contact its Technical Support team. It also said customers should call their service provider in advance to check availability for replacements, and to book ahead of time on its website for appointments at the Apple Store. 

Before taking your phone for battery replacement, Apple advises that customers back up their data to iTunes or iCloud, turn off Find my iPhone, and erase data and settings. You can do this last step by going to Settings -> General -> Reset -> Erase all Content and Settings.

Phone that are damaged in anyway, such as having a cracked screen, will need to be fixed beforehand or at an additional cost during the replacement process, Apple said.

Source : http://www.telegraph.co.uk/

Author :  

Thursday, 24 November 2016 13:40

5 Hacker-Friendly Search Engines You Must Use

CNN called Shodan the “scariest search engine on the Internet” in its April 8, 2013 story. Even its name sounds a little intimidating.

While that was three years ago, Shodan has expanded quite a bit since then. For those of you who are still unfamiliar with it, Shodan searches for internet-connected devices across the world. As I’m sure you can guess, that doesn’t only include computers and smartphones. It can find such things as wind turbines, traffic lights, license plate readers, refrigerators, and practically anything else with an internet connection.

If that doesn’t seem like a big deal, here’s the caveat. Many of these devices that we rely on every day have little to no security protecting them. For a hacker, that’s a dream come true (is it not?).

Now, I don’t simply want to repeat old news, but Shodan isn’t the only search engine of its type; there are quite a few others. So I’m going to discuss four other web vulnerability search engines that you may (or may not) be familiar with.

First off, let’s learn a little more about Shodan.

“Sho” Me, Shodan

To reiterate, Shodan isn’t exactly new, but it is constantly being updated. Its name is a reference to SHODAN, a character from the System Shockgame series. One of its top saved search terms is “Server: SQ-WEBCAM,” which reveals a number of IP cams that are currently connected. If you’re trying it out for the first time, use that as your first search and see what comes up.

The main reason that Shodan is considered hacker-friendly is because of the amount and type of information it reveals (like banner information, connection types, etc.). While it is possible to find similar information on a search engine like Google, you would have to know the right search terms to use, and they aren’t all laid out for you.

If you aren’t frightened yet, take a look at this. Another one of the most popular searches is “default password.” This search term finds results with “default password” in the banner information. You would be surprised how many devices are listed. (Hopefully yours isn’t on there. If it is, I’d recommend changing your password.)

Where Shodan becomes really useful is when you look for more specific information. Here’s a good example: do a search for “SSH port:’22’”. You’ll see a multitude of devices that are running on SSH using port 22.

In the results, you can also see the IP address, location, hosting service, ISP, and ports that the device is using.

Usually, Shodan will also reveal a device’s fingerprint, key exchange (kex) algorithms, server host key algorithms, encryption algorithms, MAC algorithms, and compression algorithms (if they exist, that is).

If, by chance, one of your personal devices shows up in a Shodan search, and reveals information you’d rather not have made public, then that’s your opportunity to patch up the holes! For pen testers, this sort of data is just as valuable.

Of course, even for non-hackers, it can just be fun to explore Shodan and see what kind of information turns up.

One of the scarier searches that someone recently shared was “port: ‘6666’’ kiler,” which finds devices infected with the KilerRat trojan.

Credit: 2015 AlienVault 1

KilerRat is a remote access trojan that can do such things as steal login credentials, manipulate the registry, and open a reverse shell, giving the attacker the capability to input commands directly into the system. It also can allow access to the victim’s webcam.

I think I’m going to put electrical tape over mine…now.


At first glance, PunkSPIDER may not look like much (especially compared to a behemoth search engine like Shodan). On the other hand, it has somewhat of a similar purpose.

PunkSPIDER is a global web application vulnerability search engine. The driving force behind it is PunkSCAN, a security scanner that can execute a massive number of security scans all at once. Among the types of attacks that PunkSPIDER can search for include Cross-Site Scripting (XSS)Blind SQL Injection (BSQLI)Operating System Command Injection (OSCI), and Path Traversal (TRAV).

Even if you’re completely unfamiliar with the definitions of these common attacks, you can still use PunkSPIDER, whether for fun or to see if your site is vulnerable. In my experimentation with it, I came up with far fewer results when I scanned specific URLs, as opposed to using generic search terms. (Though it may be that the URLs I selected didn’t happen to be vulnerable at the moment.)

Here’s an example: do a search for “Deepdotweb.com.” The results are as follows:

Bsqli:0 | sqli:0 | xss:0 | trav:0 | mxi:0 | osci:0 | xpathi:0 | Overall risk:0

The first line shows the domain of the result. The timestamp on the second line shows the date and time that the domain was added to PunkSPIDER’s system. On the third line, you’ll see a list of the various types of attacks that it searches for, and whether or not any were found.

In the case of Deepdotweb, all the scan results returned “0.” Well, that’sreassuring, isn’t it, DDW?

On the contrary, if you do a more generalized search using terms like “blog,” “social media,” “forum,” or “porn,” you’re likely to come up with hundreds of results – especially if you type in “porn.”

Simply because a URL shows up in the results doesn’t necessarily mean that the site is infected, however. For a more detailed explanation of how you can use PunkSPIDER to your advantage, see PunkSPIDER Search Help.

By the way, out of curiosity, I wanted to see if this worked with sites on the Tor network as well. Although it doesn’t scan all of Tor’s hidden services, if you do a search for “.onion,” at present, you’ll get 588 results. I didn’t take the time to see whether or not they were all infected, but if one of those sites is yours, you may want to check that out.


Here’s a little analogy for you: Shodan is to Tor as I2P is to IVRE. In other words, though Shodan is a powerful search engine, and has advanced capabilities, it’s friendlier to a newcomer as well. The same goes for Tor: you could, for the most part, run it and use it without being an IT expert; at the same time, it has options for advanced users.

I2P, as darknets go, is geared more toward experts; even its main console requires basic knowledge of networking. Likewise, IVRE seems as though it’s designed more for hackers, coders, and/or pen testers than Shodan or PunkSPIDER, though hackers could make use of all three.

So what is it? IVRE (Instrument de veille sur les réseaux extérieurs) is a network recon framework. It’s open source, and is written in Python with a MongoDB backend. It uses tools such as BroArgusNFDUMP, and ZMap to return data about internet-connected devices. It can also import XML output from Nmap and Masscan. Though I could go into detail about how each of these tools works, that would encompass a separate article!

The main IVRE site presents results of Nmap active scans that can be filtered with keywords (which is somewhat similar to Shodan.) A few keywords you can try are “phpmyadmin,” “anonftp,” or “x11open.” Searching for “phpmyadmin” returns results for phpMyAdmin servers; “anonftp” looks for FTP servers allowing anonymous access; “x11open” looks for open X11 servers. This may not sound all that revolutionary, but if you take the time to play around with IVRE a bit, you may discover some buried treasures, so to speak.

The search below, for example, shows results for the keywords “phpmyadmin” and “sortby:endtime.”

Obviously, this is just one of many things you can do with IVRE, but I’m trying to keep it simple. If you haven’t already, I suggest you hackers go there and start digging. It may not take long to find some of the “scary” data.

Speaking of which, for those who are interested in finding out more about the technical end of IVRE, they maintain a doc/ folder in their GitHub repository, so you can go into detail about its inner workings. Fork them, I say!

For further reading, you can also check out their blog, but it hasn’t been updated in a while.


ZoomEye, like its counterparts, finds internet-connected devices and vulnerabilities. You might say, “Yawn…I’ve seen this before,” but before you nod off, let’s investigate.

The mad geniuses behind ZoomEye are some developers from Knownsec Inc, a Chinese security firm based in Beijing. Though its original version (like Shodan’s) was released in 2013, its newest version goes by the name of ZoomEye 3.0. Think of it as the final version of the Omindroid in The Incredibles…but a little less deadly.

Once again, this search engine is much more helpful if you know of specific search strings that can help you find what you’re looking for, but here are a few suggestions:

Apache httpd – finds results for Apache http servers.

device:”webcam” – finds a list of webcams with an internet connection.

app:”TED 5000 power use monitor” – finds a list of The Energy Detective (TED) monitors.

Obviously, there are thousands of other searches you can try, but that’s a good start. ZoomEye, like Shodan, also makes it easy to filter searches by country, public devices, web services, etc. If you have no idea what to search for, the search engine flashes some popular searches on the screen as well.

On occasion, even just searching for a random word that you may not think will turn up anything might have fantastic results. Try typing in “zombie,” for instance. You just may find out how soon the apocalypse will start.


Last but not least, let’s take a look at Censys. Like its search engine brethren, it’s designed to search for internet-connected devices.

It collects data using both ZMap and ZGrab (an application layer scanner that operates via ZMap), which in this case scan the IPV4 address space.

You can experiment with Censys too and see what data you uncover. Testing it just may make you feel like Darth Vader blowing up Alderaan…well, maybe not that powerful. Here are a few sample searches:

https://www.censys.io/ipv4?q=80.http.get.status_code%3A%20200 – this allows you to search for all hosts with a specific HTTP status code.

You can also just type in an IP address, such as: “” or “” (those are fake; I assure you.) To find hosts in and, type in “ or”

In addition, Censys can perform full-text searches. If you do a search for “Intel,” it will find any hosts with the word “Intel” in the record; you’ll come up with more than just Intel devices. Like most standard search engines, you can also use Boolean operators like “and,” “or,” and “not.”

Again, this may not be the fun stuff, but that’s just to get you started. By playing around somewhat, you could certainly uncover a plethora of valuable data.

Wait…I Need an Instruction Manual

Most of these search engines will require a little practice before they become efficient tools, but even then, they can just be fun to play around with, and see what results they produce.

However, for those of you who are far beyond the beginner phase, any one of these by themselves, or in combination, could prove to be powerful. In particular, I’d recommend these to developers, because they open all sorts of possibilities.

So, if searches like “SMTP server” and “APC AOS cryptlib sshd” make you laugh like a mad scientist, I’d recommend any and all of these search engines to you.

Source : https://www.deepdotweb.com

Author : CIPHAS

Last week, Google pledged to fight “fake news” in its search results yet offered up no solutions to the problem. That’s likely because Google has no easy fix.

Google especially came under fire after it listed a site with incorrect “final” US presidential election counts as the top listing for searches such as “final votes” or “final election count.” Here’s an example of that, spotted by Kara Eccelston, on November 13:

final election count

Media outlets soon picked up on this. In response, Google said that it would block advertising to sites that mispresent themselves and that it would work to fix the problem with its actual search results. Google CEO Sundar Pichai told the BBC this:

This is very important to us. At Google, we’ve always cared about bringing the most relevant and accurate results to users. And that’s where almost all of our work goes, at the end of the day. When I look at, it’s important to remember we get billions of queries every day. There have been a couple of instances where it’s been pointed out, and we clearly did not get it right. And so it’s a learning moment for us, and we will definitely work to fix it. Just in the last two days we announced that we will remove advertising from anything we identify as fake news.

And yet, that site remains in the first page of results today for a search on “final election results,” as you can see below:

final election

True, it’s not the first thing on the page, as was the case last week. It’s also moved to the second page of results for searches on “final vote” or “final election count.” But there’s little to prevent it or similar mistaken stories from repeating what caused all the criticism in the first place.

How the ‘In the news’ section changed to include fake news

The first problem is that just over two years ago — back in October 2014 — Google greatly expanded what it allowed to appear within its “In the news” section of its search results, which often appears at the top of the page for news-related searches. Here’s an example:

in the news

Before the change, only content from news sites that had been vetted by human beings and admitted into Google News would appear. After the change, Google said it was pretty much anything goes for that box. It would put what it thought was “the best possible answer,” whatever the source, it said.

As a result, last week, “the best possible answer” that appeared in that box was a little-known blog post with made-up election figures. And that’s something that could easily happen again, as Google has announced no change to what’s admitted into the “In the news” section.

Search Engine Land has specifically asked Google twice if it plans changes here — on November 15 and again on November 17. It’s not responded either time. My guess is that it’s considering some changes but hasn’t implemented them. Until it does, the situation of fake news there could easily repeat.

By the way, as I was writing this, Alexei Oreskovic from from Business Insider pinged me about a story I hadn’t seen yet, that Google, according to an unnamed source, might remove the “In the news” section and replace it with a “Top Stories” section. That won’t solve anything, however, unless it also involves only using vetted sources. It’s not clear that change will happen.

The difficulty in censoring web search

My guess is that Google will return to having only vetted sites appear in the “In the news” box. If so, that will not solve the problem of fake news still appearing in its regular search results, which are drawn from across the web.

The difficulty here is that Google has a real challenge in automatically assessing whether something is actually true or not. As smart as Google is, it can still be very dumb on complex and nuanced topics. It can also be misled by those who accidentally or deliberately post material that seems to be factual in nature but is not.

I mean, even US President-Elect Donald Trump has admitted that US President Barack Obama was born in the United States, yet the first listing in Google for a search on “obama born in kenya” is a YouTube-hosted video saying Obama “admits” he was born in Kenya:

obama born in kenya

Ask Google who the “King of the United States” is, and it answers Barack Obama:

king of the united states

Ironically, that “answer” comes from our Search Engine Land site, because we wrote back in 2014 how absurd it was that Google was reporting this fact based on a Breitbart article. Our debunking got turned into being the source of this “fact.”

Search for “barack obama pledge of allegiance,” and the first article tells you — incorrectly — that Obama signed an executive order banning the pledge in schools:

barack obama

That’s actually a satirical piece, from a site profiled last week by The Washington Post. However, unlike The Onion — a popular satire site — this one presents itself as “ABC News,” which could easily be confused with the well-known and real ABC News service. It also begins some stories as if they are from the AP — the well-known Associated Press.

The listing in the second box in the screen shot above shows a site that took this fake news at face value, further polluting Google’s search results.

The listing in the third box above may be playing a bait-and-switch game. It gives Google a title and description supporting the fake news:

title description fake news

However, when someone visits the page itself — which carries ads from Google — it then debunks the claim:

Obama Signs Executive Order Banning Pledge of Allegiance in US Schools

As for dedicated debunking sites like FactCheck.org or Snopes, they do appear in the results, but only after the false claim, and they are somewhat overwhelmed by the other pages supporting the fake news.

No quick solution; maybe no solution at all

In short, web search results are hard to police for fact checking. Google could perhaps try to classify searches that suddenly rise in popularity and which seem related to fake news, then give a boost to fact-checking sites in response.

Google could also try to penalize sites that it determines are purposely trying to mislead people, but that can get tricky fast. Do you penalize a site like InfoWars from Alex Jones, who peddles a conspiracy theory about the Sandy Hook shootings? If you do, if he interviews US President-Elect Donald Trump, as may well happen, do you lift the penalty or ban just for that?

There’s no easy answer for Google here. Cutting off ad revenues won’t have an impact on some sites that don’t carry ads or carry those from others.

Surely there are some things the company can and should try, which might have an impact with search results. Cleaning up news results, which often get prominence, is the fastest solution. But cleaning up the web search results will remain messy.

Author:  Danny Sullivan

Source:  http://marketingland.com/

Cybercriminals are now targeting entire banking networks instead of individual accounts. Hackers have successfully tricked several ATMs into emptying their stash of currency notes without using any credit or debit card. The FBI has confirmed it is monitoring reports about such synchronized cyber-attacks that might intend to target the U.S. financial sector.

After recent cyber-attacks targeting Automated Teller Machines (ATMs) in Taiwan and Thailand, the Federal Bureau of Investigation (FBI) has cautioned American banks and financial institutions that similar attacks might soon happen on their systems and machines. According to international reports, cybercriminals have so far managed to withdraw millions in foreign currency by tricking the ATMs.

Reports indicate organized gang members merely surround ATMs at a predetermined hour, collect the cash that the machines spew out in one go, and make away with millions of dollars’ worth of currency without even touching the machine or inserting any debit or credit card. It is apparent the criminals are no longer attempting to con unsuspecting citizens and stealing their hard earned cash by making copies of their credit cards.

Instead of attempting to dupe several small accounts, the hackers are now going straight to the source. Reports suggest criminals with knowledge of banking systems, and more specifically, how the ATMs operate, are inserting malicious code within the Operating System (OS) that triggers multiple ATMs to spit out cash at a preset time. Gang members merely stand by in anticipation to collect the bills, reported The Next Web.

How do the cybercriminals operate? The FBI has learned that it was a Russian gang, known as Buhtrap, that developed the software. Cyber security agencies believe these gangs perfected their software by targeting small Russian banks. Once the software was able to compromise the security of the ATMs, the gangs gradually expanded their operations to other countries.

The cybercriminals look for virtual weaknesses in digital systems that process transactions on banking payment networks. However, banks routinely outsource the job of ATM maintenance, including cash handling, to a third party. The hackers have been known to have hit such ATM networks that are managed by third-party agencies.

Banks became aware of the crime after reports started pouring in about loose currency lying unclaimed on the floor. The currency notes lying scattered in cabins that house ATMs raised suspicion, and forced the banks to launch an internal investigation. When the banks complained to the police, the sheer enormity of the crime began to surface. Initially, the police were baffled because “ATMs were abnormally spitting out bills.”

The epicenter of the crimes might have been Russia, but cybercriminals were found to be active in Taiwan and Thailand. Experts believe the cities were primarily targeted because they are always teeming with foreigners on vacation. The bustling cities offer several ways to grab the cash and escape through the many lanes and crowded intersections. According to Taipei’s police, cyber thieves have managed to steal more than $300 million.

So far, the criminals have managed to compromise PC1500 ATMs, built by Wincor Nixdorf AG of Germany, reported The Wall Street Journal. Surprisingly, law enforcement officials believe the cybercriminals managed to compromise the ATMs by sending fraudulent “phishing” emails disguised to look like messages from ATM vendors or other banks, reported Security Newspaper.

While banks and financial institutions in the United States are believed to be better protected, as well as more regularly updated, the ATMs are often run on antiquated software. Since updating the OS and other security measures on the ATMs is a very time consuming and expensive affair, they are usually one of the last devices to undergo a digital overhaul. However, given the rising number of cyber attacks that are targeting the banks directly, the financial institutions could soon expedite the process to better protect their ATMs and backend banking process.

Source : http://www.inquisitr.com

Author : Patrick

After humanity establishes a new economy in orbit above Earth, builds a self sustaining moon base and off world Martian colony it will need to reach out even further into deep space.

Where will we go?

There’s now a national ambition to put boots on Martian soil and begin colonization of the red planet as soon as possible, but humanity’s expansion into space doesn’t have to stop there.

To get to Mars, NASA plans on testing important technology on the surface of the moon including mining robots capable of extracting natural resources and robots assigned to build habitats from 3D printed material.

[Image by gremlin/iStock]

It’s called in-situ resource utilization and it will allow astronauts to live off the land on Mars, according to NASA administrator William Gerstenmaier.

“Robotic missions to the moon could inform our Journey to Mars and how we might use available materials to generate water, oxygen and fuel in space.”

NASA’s international partner, the European Space Agency, is already planning to build a moon base in the coming decades and advances in modern technology could help them make that a reality, NASA astrobiologist Chris McKay told Popular Science.

“New technologies, some of which have nothing to do with space, like self-driving cars and waste-recycling toilets, are going to be incredibly useful in space, and are driving down the cost of a moon base to the point where it might be easy to do.”

The next few decades will see SpaceX, the United Launch Alliance, and their competitors create a new economy in orbit above Earth employing hundreds or thousands of people in space. After those first tentative steps into space, humanity will need to look further afield to establish ourselves as a multi-planet species.

[Image by Vadim Sadovski/Shutterstock]

Venus offers one option for human explorers and NASA has already designed habitats capable of floating in the planet’s acidic clouds. The world is closer than Mars meaning it’s easier to get to, has Earthlike gravity, and a heavier atmosphere that could offer better protection to interplanetary setters than the red planet.

There’s also the massive asteroid belt that sits between Mars and Jupiter. The dwarf planet Ceres is the largest object in the asteroid belt and could serve as a base of operations for miners looking to extract valuable resources from nearby space rocks.

Scientists think Ceres has more water, in the form of ice, below the surface than all the fresh water on Earth combined and its relatively higher gravity, compared with other asteroids, make it a good location for a mining base. Ceres doesn’t have an atmosphere and no one could live unprotected on its surface, but water found underneath its surface could be sold as rocket fuel to passing spaceships.

Then of course there is space itself. Using metals, water, and carbon mined from asteroids it would be possible to build habitats situated nowhere, but in space itself.

[Image by Igor Zhuravlov/Shutterstock]

By attaching engines to the newly built habitats you would have humanity’s first space cargo haulers capable of shipping goods between planets, as Mathematician Robert Walker writes in Science 2.0.

“We tend to think that the place to look for resources for colonization must be the surfaces of planets. But there are abundant resources in space too.”

Once one of these space habitats was constructed it could act as a base of operations to make it easier to build others and soon there could be a fleet of space trains shuttling cargo around the solar system.

Far out in space past the asteroid belt there lie the giant planets of Saturn and Jupiter, both of which have moons that might just be suitable for human colonization given the proper tools.

Saturn’s moon Titan might be the least hostile place for human life in the outer solar system. Brave explorers living on Titan wouldn’t even need a spacesuit, just a breathing mask and protection from the cold; the heavy atmosphere, 1.5 that of Earth, would make visitors feel like they were standing on the bottom of a swimming pool.

[Image by Catmando/Shutterstock]

Titan is also home to methane lakes, which could contain alien life and water trapped in ice rocks that could be mined for trade, as NASA astrobiologist Chris McKay told Space.com.

“If you were in the outer solar system and you had to make an emergency landing, go to Titan.”

The other Saturn moon of interest is Enceladus, which scientists discovered has a warm salty underground ocean and could therefore harbor life, thanks to NASA’s Cassini mission.

The best place to establish a human outpost would be close to the tiger stripes, cracks in the moon’s surface near the south pole, where giant fissures spew frozen particles. Strangely, the area emits more heat than Yellowstone National Park on Earth, an energy level recorded at 15.8 gigawatts of power, Cassini project scientist Linda Spilker told Space.com.

“If you build your base fairly close to the tiger stripes, you might have a source of heat you could tap into.”

[Image by muratart/Shutterstock]

No discussion about colonizing the solar system would be complete without talking about Europa, famously referred to in the movie 2001: A Space Odyssey.

Long considered the best place to look for alien life, any human outpost on Europa would need to be specially located on the side of the moon that leads its orbit around the planet to avoid being showered with deadly radiation from Jupiter.

Europa residents would also need to worry about icequakes and giant plumes of water that violently shoot out from the icy surface.

It would probably be impossible to live on Neptune, because it’s a gas giant, but human explorers could possibly establish an outpost of the surface of its moon, Triton, if they managed to avoid the geysers of nitrogen gas that occasionally erupt.

With Elon Musk busy at work on his Interplanetary Transport System it’s only a matter of time before humans push out into deep space and colonize the solar system. Who knows what we’ll find when we get there.

Author:  Coburn Palmer

Source:  http://www.inquisitr.com

It's locally sourced, abundantly available, and carbon-neutral.

And it's a rat


Moscow's newest food craze is nutria, a giant orange-toothed rodent better known as a river rat. The Southern Russia rat is now on the menu of several Moscow restaurants. While eating rat is the ultimate image of poverty and desperation, 35-year-old  chefand restaurateur Takhir  Kholikberdiev serves up 550 roubles (Rs 600) burgers, hot dogs, dumplings and other dishes at his Krasnodar Bistro.

"It's a really clean animal; not only is it a herbivore but it washes all its food before it eats. And it's very high in omega-3 acids. A lot of doctors and dietitians recommend it,"Kholikberdiev told the Guardian.

nutria burger

And the trend seems to have caught on. "Other chefs have started to use it here. And now, if you go to the market in Moscow, they might not have nutria available every day, but they'll get it in for you within a week if you ask," he said.

Author:  Kunal Anand

Source:  http://www.indiatimes.com/

airs logo

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.

Follow Us on Social Media