今号では、Mirai Botnetの検知と対策について取り上げるほか、1年に1回のコンテンツ配信の動向解説、技術トレンドでは言語リソースとしてのWikipediaについて紹介します。
![Internet Infrastructure Review (IIR) Vol.33 2016年12月15日発行](https://cdn-ak-scissors.b.st-hatena.com/image/square/471ee4d0ea1a43fc4ccf1ec9e34b1cd65b581419/height=288;version=1;width=512/https%3A%2F%2Fwww.iij.ad.jp%2Fcommon%2Fimages%2Fogp_image.png)
“Through our e-mails and our social media accounts we get death threats all the time,” said Janisha Gabriel. “For anyone who’s involved in this type of work, you know that you take certain risks.” These aren’t the words of a politician or a prison guard but of a Web designer. Gabriel owns Haki Creatives, a design firm that specializes in building websites for social activist groups like Black Live
Evernote is testing out machine learning algorithms on all the reams of content it has accumulated over the past eight years. But when it announced this move with a new privacy policy that goes into effect January 24, 2017, the company also pointed out something that many users hadn't realized: Evernote staffers will sometimes look at the content of your notes. There are actually a number of perfe
Following a recent investigation, we’ve identified data security issues concerning certain Yahoo user accounts. We’ve taken steps to secure those user accounts and we’re working closely with law enforcement. As we previously disclosed in November, law enforcement provided us with data files that a third party claimed was Yahoo user data. We analyzed this data with the assistance of outside forensi
Targeted attacks are typically carried out against individuals to obtain intellectual property and other valuable data from target organizations. These individuals are either directly in possession of the targeted information or are able to connect to networks where the information resides. Microsoft researchers have encountered twin threat activity groups that appear to target individuals for rea
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く