SXSW Part 1 Activatons

I am trying to catch up on all of the video I have from SXSW. Here is part 1 which focuses on the SXSW scene and “Activations.” For those unfamiliar with the term, “Activation” this is what they call branded experiences that companies put together. They take over businesses, empty buildings, parking lots, and parks. They transform these spaces into all manner of intriguing experiences.

The Right To Repair and Repairable Devices

Last night, as I was adjusting my new Uplift standing desk (which is awesome BTW), a speaker on the desk collided with the shelf above which was just enough to cause a candle to wobble and fall directly onto my trackpad. As you can see it completely shattered. Although it is still functional, it is just a matter of time before this gets worse.

SXSW 2019: A Talk With Access Partnership

Every time I go to a website these days, I always have to click on that, "I agree to using cookies",” button. It is fairly silly as pretty much every site I have gone to for the last ten years has used cookies. I would be shocked if I got a pop up that said, “this site doesn’t use any cookies at all,” because then I would be wondering, how do they pull that off? This behavior is being driven by attempts to conform to GDPR requirements.

SXSW Wrap Up

SXSW is the most important technology conference of the year. There, I’ve said it. The problem is, very few people in IT are aware of it, and that is a shame. This is the one show of the year that not only highlights emerging technology but wraps it in context. This conference is also very international with different countries showcasing their unique companies, technologies and talents. We can get so lost in our own small world that we miss new market opportunities and technologies from around the globe.

Update Your Chrome Stat

There is a new zero day Chrome vulnerability that has been reported to have been exploited in the wild. This one seems to be pretty severe and speculation is that it can lead to remote code execution.

The CVE, CVE-2019-5786, hasn’t hit the NIST vulnerability database yet, so there isn’t a ton of information on it other than, “Use-after-free in FileReader. Reported by Clement Lecigne of Google's Threat Analysis Group on 2019-02-27.”

Bunnie Huang talks Hardware Hacks

Several month ago, I had an opportunity to spend some time with Mike Rogers who was the commander of the U.S. Cyber Command and the Director of the NSA. He stressed how important it is to know the supply chain of your equipment in order to maintain a secure environment. He stressed that not only do you need to know your suppliers, but you need to know the entire supply chain of all the components.

Windstream Files For Bankruptcy

Windstream has filed for Chapter 11 bankruptcy following a $310 million dollar judgement against Windstream brought by the hedge fund Aurelius Capital Management.

The Wall Street Journal reports, "The rural broadband provider’s chapter 11 filing Monday is the culmination of a bruising 18 month legal fight between the telecom company and Aurelius, which had argued a two-year-old spinoff of the company's fiber-optic cable network violated the covenants on one of its bonds," regarding sale-leaseback restrictions.