asteroza + policy   116

Zero-hour auto purge - protection against spam and malware | Microsoft Docs
ZAP is a nice feature, dealing with malware that's discovered a little bit after it's already in an inbox.
Azure  office365  ZAP  malware  delete  removal  policy  sysadmin  tips  tricks  email 
yesterday by asteroza
Dynamically banned passwords in Azure AD | Microsoft Docs
Piss off red teams that password spray by setting up some tripwires. such as <season>2019
azure  AD  password  security  custom  complexity  ban  list  group  policy 
march 2019 by asteroza
Controlling Google Chrome Web Extensions for the Enterprise
People need to start whitelisting chrome extensions, because things are getting out of hand...
google  chrome  ADMX  GPO  AD  active  directory  group  policy  template  enterprise  security  management  sysadmin  tips  tricks 
december 2018 by asteroza
Public-Interest Technology Resources
This feels like a greater manifestation of a concept where all law making/drafting must go through a version control system, so it is clear what the origins of a law's language permeate from.
public  interest  technology  reference  information  politics  policy 
november 2018 by asteroza
BitLocker Group Policy settings (Windows 10) | Microsoft Docs
Controlling whether Bitlocker offloads encryption to an SSD with SED flags. Which is kinda important after several SSD models were found to be doing YOLO encryption...
windows  BitLocker  encryption  offload  SSD  SED  GPO  AD  group  policy  software  hardware  acceleration 
november 2018 by asteroza
IEEE SA - 7012 - Standard for Machine Readable Personal Privacy Terms
Machine readable privacy policy spec, which in some ways would be a precursor to machine readable contracts (lawyers optional?)
IEEE  machine  readable  privacy  policy  standard  specification 
may 2018 by asteroza
Firefox Quantum for Enterprise Web Browser | Firefox
Locked down firefox with hooks for windows group policy management. Wonder if this also is some sort of LTS release as well?
firefox  browser  enterprise  security  control  AD  group  policy  management 
march 2018 by asteroza
Special Publication 800-63 | NIST
64 character passwords without required specials, no forced rotation without evidence of compromise, no SMS 2FA, password paste OK
NIST  800-63  digital  identity  service  requirements  password  policy  guidance  information  reference  security 
june 2017 by asteroza
windows-itpro-docs/deploy-code-integrity-policies-steps.md at master · Microsoft/windows-itpro-docs
Protection script/guidelines for windows 10 device guard to try to hold off/block bypass methods
windows  10  device  guard  bypass  block  script  code  integrity  policy  security  pentesting  hacking 
june 2017 by asteroza
Istio
Linkerd does traffic management, this does that plus more policy control (layer 7 proxy and management)
Istio  alternative  linkerd  devops  container  VM  management  software  control  plane  traffic  policy  circuit  breaker  coordination  kubernetes  orchestration  cloud  service  mesh  routing  network  networking  proxy  load  balancer  analytics  metrics  monitoring  platform  microservice  security  Delicious 
may 2017 by asteroza
VMware KB: Data drive is inaccessible after Windows GPO update
AD GPO for removable device management may hide VMware disks since when applied, windows thinks hotplug=removable
VMware  ESXi  hotplug  windows  remvable  device  group  policy  bug  sysadmin  tips  tricks  missing  disk  Delicious 
march 2016 by asteroza
Celebration of the Establishment of the Robot Revolution Initiative Council (The Prime Minister in Action) | Prime Minister of Japan and His Cabinet
Bruce Schneier calls IoT the World-sized Web, a global robot fitted with brains/sensors/actuators that has emergent behavior properties, and considers the need of a government agency with the smarts and the teeth to deal with applicable technology policy. This being japan, I doubt it has the teeth, but it may have the tech policy smarts and the advisement capacity to affect change.
IoT  japan  government  agency  technology  policy  robotics  Delicious 
february 2016 by asteroza
Orbital Space Settlement
Al GLobus' various papers on space infrastructure
space  settlement  city  colony  design  research  information  reference  policy  station  SPS  Delicious 
may 2015 by asteroza
Microsoft Security Advisory 2880823
So by 2016, if SSL certs aren't using SHA-256 Microsoft will hate you. It also means XPSP2 users are boned (though with the POODLE attack forcing migrations above SSLv3 to TLS1+ they are already screwed).
SHA1  SHA-1  SHA2  SHA-2  SHA-256  SHA256  microsoft  windows  certificate  policy  PKI  security  encryption  cryptography  Delicious 
october 2014 by asteroza
Software suite
This package has detection methods for detecting the production of gun parts apparently, blocking the printing process. It will stop printing Defense Distributed's Liberator gun and their AR-15 lower receiver design, but it looks like the detection algorithm isn't that fancy, and relies more on known object matching from a database (could it be as weak as a hash of the object file?). It could be the weak but sufficient method to reduce 3D printer manufacturer liability, in that the maker could claim they are doing reasonable gun control.
control  defense  fabber  proliferation  liability  printing  printer  gun  military  risk  software  weapon  policy  3D  arms  fabbing  management  Delicious 
june 2013 by asteroza
12.09.FA.pdf
Interesting paper of digital fabrication, which encompasses 3D printers as well as assorted CNC tools.
manufacturing  information  paper  whitepaper  fabrication  policy  printing  3D  fabbing  MIT  digital  reference  Delicious 
march 2013 by asteroza
Stop Stealing Dreams
Interesting, but education is a stiff industry/market, not very flexible at all and very hesitant on experimentation (we have a severe aversion to live human testing of anything, particularly regarding things that take decades to determine the effectiveness of). Even in environments where it may be possible to make unilateral pushes from the top down, if everyone isn't on board and potentially sabotaging efforts (unconsciously even), you will have at best mixed outcomes. Japan may be an example of the mixed outcome, having gone through a decade of "relaxed schooling" doctrine that had some success, but was being undermined by knock-on social effects and society at large not making the appropriate adjustments to support and reap the benefits of the change. Thus, it was ultimately declared a "failure" and there is a push back to older teaching methodologies. Particularly egregious is the "kid's/young workers are no good" golden age nostalgia currently running through the country.
rant  manifesto  policy  education  Delicious 
february 2012 by asteroza
Japan plans to merge major science bodies : Nature News & Comment
Seems like an attempt to bleed RIKEN and wean it from the government big grant money nipple at the same time. There will be fighting because the admin styles of the different agencies is so different. Integration of support/admin services and IT might be sane though.
japan  science  group  integration  government  agency  policy  RIKEN  NIMS  JAMSTEC  NIED  JST  Delicious 
february 2012 by asteroza
Public entity eyed for power supply : Business : DAILY YOMIURI ONLINE (The Daily Yomiuri)
So the government is using the opportunity to pimp slap TEPCO into allowing a power grid ISO. Still kinda daft to have two ISO's for the 50/60Hz split, but understandable since the transfer limit across the divide is so low. Which might change if Son gets his way with his offshore HVDC grid intertie, which having an ISO exist would facilitate.
japan  power  industry  long  distance  transmission  line  grid  intertie  ISO  management  government  policy  energy  Delicious 
january 2012 by asteroza
not Haruki - Personal Network Maintenance
Somehow I think this would work well for people who have low BS tolerance to begin with. For people who have to regularly go through the motions, the pomp and circumstance of it all, or are in cultures with a lot of ritualized personal interaction activities, this may not fly. The japanese have a particularly egregious example, the New Years card. A lot of people whine over doing them, but they do them anyways as it became a part of what is considered minimum appropriate activity for a socially respectable citizen.
social  personal  network  maintenance  stance  policy  communication  interval  interaction  interpersonal  Delicious 
november 2011 by asteroza
Why Energy Poverty Is the Worst Kind of Poverty - TIME
Sure, it's nice to talk about raising up the poor/third world, but there are undertones to this. There is already a subtle movement towards energy reduction under the guise of austerity in first world lifestyles, and not by choice (actually attacking affluence). Which boils down to "make your life suck to bring parity with those below you". Which is a zero-sum game ideology, and ignores that fact that humans are greedy and want to protect what they already have. It's still possible to do things that will raise everyone up creating rising tides that will lift all boats (though not necessarily equally, and not necessarily being unequal in the ways you would assume).
energy  poverty  politics  policy  green  austerity  Delicious 
october 2011 by asteroza
Tea Party in Space
I'm not sure whether to laugh or cry about this. I really want to support politicians who are pro commercial space development but...
tea  party  politics  space  policy  Delicious 
october 2011 by asteroza
CSP Japan, Inc.
These guys were proposing a Lunar equatorial ring belt lined with surface mounted solar panels, sharing power through superconductors to fixed power beaming sites to fire on the earth towards receiver stations. Have something to do with Shimizu Corp, a big construction company.
japan  space  transportation  infrastructure  policy  consulting  business  support  moon  solar  ring  power  generator  belt  Shimizu  Delicious 
october 2011 by asteroza
Japan plans floating wind farm near nuclear plant
METI is talking about offshore wind near the fukushima plant, since hardly anyone would be sane to fish near there anyways, removing the fisherman segment of the usual complainers. Using the nuclear plant as the landing station of the wind turbine array would make sense since a lot of power infrastructure is available and unused. This article seems to mention offshore floating turbines, but most other articles seems to specifically mention non-floating pile types.
japan  METI  offshore  wind  turbine  power  generator  green  energy  government  policy  fukushima  Delicious 
september 2011 by asteroza
20110912_presentation_e.pdf (application/pdf Object)
So Son's saying what a lot of people have been talking about for a long time now, but he makes for a good spokesman. 4GW offshore HVDC supergrid intertie in the sea of japan, pan-asia links similar to DESERTEC, independent ISO/TSO to break the stranghold of regional oligopolies in japan and have fair feed-in tariff structures without wasted energy. No calls for grid energy storage though, though if a true supergrid is operating, it can be reduced or eliminated if the timezone spread is far enough. Also trotting out the national energy security horse too.
JREF  japan  energy  policy  pan-asia  asia  supergrid  grid  offshore  power  transmission  network  green  peak  shift  load  balance  independent  system  operator  ISO  TSO  cable  HVDC  marine  ocean  subsea  submarine  intertie  interconnector  national  infrastructure  security  independence  resource  Delicious 
september 2011 by asteroza
National Strategy on Trusted Identities in Cyberspace
Your internet drivers license, courtesy of the Federal government and assorted big private players with lobbyists.
NSTIC  national  online  identity  credential  system  ID  internet  drivers  license  false  security  privacy  government  NIST  standard  policy  Delicious 
april 2011 by asteroza
GSTF_WP_E.pdf (application/pdf Object)
American chamber of commerce in japan releases a position paper recommending structural changes to japanese government economic policy, particularly to support small business, reduce market entry barriers, deregulate telecoms and IT, and generally reduce the suck of operating a business in japan.
ACCJ  japan  government  economic  policy  position  paper  business  boost  filetype:pdf  media:document  Delicious 
november 2010 by asteroza
Culture
The infamous Netflix corporate culture stance. Hire the best, pay them top rate all the time, clearly show what the goals are and the reasons behind them, then let them do their work without interference. Mostly succeeds in retaining the performance of startup culture in a larger business context. Also avoids B rank managers employing C rank workers. Tough to do well though.
Netflix  corporate  culture  policy  high  performance  talent  employee  environment  design  business  management  entrepreneur  entrepreneurship  leadership  productivity  Delicious 
august 2009 by asteroza
« earlier      
per page:    204080120160

related tags

3D  800-63  2008R2  academic  acceleration  acceptable  access  ACCJ  account  accreditation  active  ad  addon  ADFS  administrator  ADMX  advanced  advice  advocacy  Afaria  agency  agent  aggregator  AI  alternative  ammonia  analytics  analyzer  android  anthology  antivirus  app  AppGuard  appliance  application  archival  archive  armchair  arms  articles  asia  asset  asteroid  astronomy  attack  audit  auditing  AUP  austerity  authorization  AWS  azure  b2b  bad  balance  balancer  ban  basalt  based  behavior  belt  big  bigbrother  BitLocker  blackberry  block  blocker  blocking  blog  book  boost  boss  bounty  breaker  browser  BSGD  bug  business  bypass  cable  case  cement  certificate  certification  change  check  checker  chemical  china  chrome  CI-1500  CIPA  circuit  circumvention  Citrix  city  clean  cloud  cloudtrail  CO2  code  collaboration  colony  communication  community  complexity  compliance  concept  concrete  conference  configuration  connection  consulting  container  content  continuous  control  controller  coordination  corporate  CPS  credential  crowdsourcing  cryptography  CSP  CSRF  culture  custom  cybersecurity  dashboard  data  defender  defense  delete  Delicious  delivery  deny  desalination  design  desktop  development  device  devices  devops  DFIR  digital  directory  disable  discussion  disk  distance  diversity  DLP  domain  domestic  done  download  drive  drivers  earthquake  economic  Edge  education  EIM  electricity  electronics  email  emergent  employee  encrypted  encryption  endpoint  energy  enforcement  enterprise  entrepreneur  entrepreneurship  environment  environmental  ESA  escalation  ESXi  ethics  event  events  Excalibur  exception  executable  exploit  extension  extensions  fabber  fabbing  fabrication  Facetime  false  fiber  file  filetype:pdf  filter  filtering  firefox  firewall  flash  folder  folksonomy  forum  FR  framework  freeware  fuel  fukushima  FullArmor  function  future  galapagos  GEM  generator  gets  global  google  goverment  government  GP  Gpdisable  GPO  gree  green  greynet  grid  group  guard  Guardian  GuardianEdge  guidance  guide  gun  hacking  hardware  heat  hieroglyph  high  HIPAA  holos  honest  horizonplanning  hosted  hotplug  howto  HPKP  HR  HTST  HTTPS  humor  HVDC  IAM  ICA  ID  identity  IEEE  ILP  IM  independence  independent  industry  information  infosec  infrastructure  innovation  inovation  insight  inspection  inspiration  instant  integration  integrity  intelligence  interaction  interconnector  interest  internation  international  internet  interpersonal  intertie  interval  intrusion  iOS  IoT  iPhone  IPSEC  IRENA  ISEP  ISO  isolation  ISSP  issue  Istio  IT  ITAR  JAMSTEC  japan  JREF  JST  killer  Kiln  kubernetes  laptop  large  lateral  leadership  least  liability  license  limited  line  linkerd  linux  list  load  local  location  lock  lockout  log  logging  login  logon  long  loss  low  mac  machine  maintenance  malware  managed  management  manager  managment  manifesto  manual  manufacturing  marine  market  markets  masking  media  media:document  megaengineering  megaproject  megastructure  memory  mesh  messaging  methodology  METI  metrics  microservice  microsoft  military  minimal  missing  MIT  mobile  model  monitoring  moon  movement  NASA  national  Netflix  network  networking  networks  NetWrix  news  NFR  NIED  NIMS  NIST  NSTIC  nuclear  Oakley  ocean  ocntrol  office  office365  offload  offshore  online  opensource  operations  operator  orchestration  Orchestria  organism  organization  OS  OSSTMM  OSX  p2p  pan-asia  paper  party  password  PC  PDA  peak  pentest  pentesting  performance  perimeter  personal  phone  pinning  PKI  plan  plane  planetary  platform  plugin  pointsec  policy  PolicyPortal  politics  port  position  poverty  power  pragmatic  prediction  predictive  prevention  printer  printing  privacy  private  privilege  privledge  process  processing  production  productivity  professionals  profile  program  project  proliferation  proofpoint  proposal  propulsion  protection  proxy  public  quarterbacking  R2  rant  Raytheon  readable  rebar  redirection  refence  reference  registry  removable  removal  remvable  renewable  request  requirements  research  reset  resource  restriction  RIKEN  ring  risk  roaming  robotics  rocket  role  routing  RS5  RSA  rule  rules  safety  SANS  satire  savings  SBSP  science  scifi  scoial  script  search  secure  SecurID  security  SED  server  service  services  setting  settlement  setup  SHA-1  SHA-2  SHA-256  SHA1  SHA2  SHA256  sharing  shift  Shimizu  short  silo  silobreaker  simulation  SIP  sky  Skype  SLA  SMART  SMB  social  society  sociology  software  solar  SOX  space  spacecraft  spaceguard  specification  SPS  SRP  SSD  SSL  SSP  stagnation  stance  standard  startup  starvation  station  storage  study  stuff  style  submarine  subsea  supergrid  superorganism  support  survey  sustainability  Sybase  Symantec  synfuel  synthetic  sysadmin  sysinternals  system  tab  tagging  talent  tea  team  techniques  technium  technology  teeam  template  term  test  tester  testing  theory  thermal  thinktank  threat  tips  TLS  tools  tracking  traffic  transmission  transportation  trick  tricks  trust  TSO  turbine  tutorial  U3  UI  US  USA  USB  user  utilities  value  VC  vendor  Verdasys  Vericept  view  viewer  vista  visualization  VM  VMware  VoIP  Vontu  VPEC-T  VPN  watch  WDAG  weapon  web  webdev  websense  whitepaper  wind  windows  workflow  XP  yahoo  ZAP 

Copy this bookmark:



description:


tags: