Wednesday, October 22, 2014

New York To DC In An Hour



Makes total sense. Boston to NYC to Philly to Baltimore to DC totally deserves this. So it would not matter where you worked and where you live. It would take the Northeast economy to a whole new level. The whole of Northeast would become one mega city.

Maglev Train Seen Making Washington-to-Baltimore Trip at 311 MPH
a $10 billion Japanese magnetic-levitation train line to the 40-mile (64 kilometer) Washington-Baltimore corridor for 15-minute trips ..... Japan is looking for an overseas customer for maglev technology as the country works toward opening its first line in 2027. ...... Maglev trains rely on magnetic power to float the cars above the ground, eliminating the friction of steel tracks. The trains start off running on wheels, the same as used on F-15 fighter jets, until they’re going fast enough for the magnets to kick in and create lift. ..... A Washington-Baltimore starter line eventually may be extended to New York, putting the biggest U.S. city within reach of the capital in 60 minutes by train ..... proposed line could carry about 9.2 million passengers a year

Data Security


Edward Snowden showed the government is dipping into data centers at will. That set off alarm bells. It's not just the government. There are many prying eyes.

The “Soft and Chewy Centers” That Put Your Data at Risk
More and more sensitive data is being entrusted to data centers connected to the Internet. ...... The interior of those complex networks is mostly unobserved or protected, meaning that attackers who manage to remotely access the computers can explore mostly as they please .... Servers inside modern data centers usually run multiple copies of Windows, or Linux-based operating systems at the same time. Illumio’s product works by attaching software “agents” to each of the operating systems inside every server. The data those agents send back to Illumio’s central control panel provide a global view of the data moving around inside a data center. Responses to suspicious activity can then be sent back to the software agents for enforcement—potentially shutting down hacking attacks as they happen. ..... “Overall, network security solutions haven’t evolved for the past 20-plus years”