Contact Us

Technology Short Take 128


Welcome to Technology Short Take #128! It looks like I’m settling into a roughly monthly cadence with the Technology Short Takes. This time around, I’ve got a (hopefully) interesting collection of links. The collection seems a tad heavier than normal in the hardware and security sections, probably due to new exploits discovered in Intel’s speculative execution functionality. In any case, here’s what I’ve gathered for you. Enjoy!



  • This article from Carlos Fenollosa talks about his experience with a new 2020 MacBook Pro compared to his 2013-era MacBook Air. While there is some discussion of software in here (given Apple’s tight coupling it can’t be avoided), the article mostly focuses on hardware aspects of Apple’s latest lineup of laptops. Personally, I appreciated Carlos’ balanced review.
  • This is one of those times when an article belongs in multiple categories—in this case, hardware and security. This article describes a new attack that “breaches the security guarantees” of Intel SGX.
  • Oh, and while we’re talking about Intel CPU exploits, here’s another one.


  • This article explains how to use a “stacked filesystem” encryption solution named eCryptfs to encrypt directories on Linux. If you’re interested in doing something like this for cloud storage, this other article shows how to use encryption with rclone.
  • ZDNet covered the news of Check Point fixing a well-known memory corruption security hole in the GNU C Library.
  • If you say that Linux malware doesn’t exist…read this article.
  • The Citizen Lab uncovers Dark Basin, described in their words as a “massive hack-for-hire operation.”

Cloud Computing/Cloud Management

Operating Systems/Applications



Career/Soft Skills

OK, that’s all for now. As always, I’d love to hear from you, so feel free to find me on Twitter and let me know what you think of these posts. If you have suggestions for improvement, I’d love to hear those, too!

Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
Consent to display content from Youtube
Consent to display content from Vimeo
Google Maps
Consent to display content from Google
Consent to display content from Spotify
Sound Cloud
Consent to display content from Sound