Trump's Potential FDA Pick Attended McAfee For President Fundraiser

Judd Weiss / Via facebook.com

Before he became one of President-elect Donald Trump’s potential picks for Food and Drug Administration commissioner, Jim O&;Neill, an associate of Silicon Valley venture capitalist Peter Thiel, showed up one night last year to support another presidential hopeful. It was John McAfee, aspiring Libertarian candidate, cybersecurity tycoon, and person of interest in a murder case.

On May 17, 2016, the day after a Libertarian presidential debate in Las Vegas, McAfee and his running mate, photographer and entrepreneur Judd Weiss, were in San Francisco for a fundraising party. The bash was at the home of two founders of Velorum Capital, a venture capital firm, one of them a former SpaceX engineer. Tickets were going for $40 to $90 a head; San Francisco magazine reported that dozens were in attendance.

Among them was O&039;Neill, who posed with McAfee in a picture snapped by Weiss and posted on Facebook.

O&039;Neill is managing director at Mithril Capital Management, a growth-stage fund launched by Thiel in 2012. He is one of a few names being floated for FDA commissioner in the Trump administration; on Thursday, he met Trump in Trump Tower.

O&039;Neill&039;s libertarian leanings aren&039;t secret: he&039;s publicly argued for free markets in health care services and goods.

McAfee, however, is not a run-of-the-mill politician, even by libertarian standards. He was the founder of McAfee Associates, which sold the antivirus software of the same name. (He left the company in 1994 prior to its sale to Intel.) McAfee then spent years in Belize, where he was funding a lab to turn plants into an unproven form of antibiotics. There, he came under investigation when a neighbor of his was murdered (McAfee has repeatedly said he was not responsible), and fled to Guatemala, where he was later arrested and deported to the United States.

“You&039;ll want to make sure you&039;re here for this. This will be more of a high level tech/futurist crowd,” Weiss wrote on the Eventbrite page for the May 2016 gathering. “Perfect company for a legendary high level Tech CEO like John McAfee. Especially since these are the people who consciously regularly think about how to re-imagine a better way to move the world forward, and they actually do it&;”

BuzzFeed News has reached out to McAfee and O&039;Neill for comment.

Quelle: <a href="Trump&039;s Potential FDA Pick Attended McAfee For President Fundraiser“>BuzzFeed

Apple Might Soon Start Producing Original TV Shows Like Netflix

Apple may soon start releasing original TV shows and movies to subscribers of its Apple Music streaming service, the Wall Street Journal reports.

Apple has been in talks with producers, directors, and film and TV marketers in recent months about buying the rights to various shows and promoting them, according to the Journal, and the company is aiming to release the original programming by the end of 2017.

Apple has had a few other small forays into TV. It produced a few short documentaries about musical artists and recently bought the rights to James Corden&;s “Carpool Karaoke,” a segment on his late night show. The company is also producing a semi-autobiographical scripted show, “Vital Signs,” about Dr. Dre, an executive at the company and the creator of the Apple-owned Beats headphones. Apple has yet to buy scripted programming from outside producers, though, and the content it&039;s currently considering will not be directly tied to music, the Journal reports.

Apple Music won&039;t become the next Netflix or Amazon Video any time soon, however. Without a plan for an entire slate of programming costing hundreds of millions of dollars, it is unlikely that Apple will be a direct competitor to either. Still, the move signals that Apple is heading towards being a media company as well as a technology company. Whether the company will distribute the original programming via Apple TV remains unclear. Beats Radio creates original content in addition to working as a distribution and discovery engine for Apple Music: It employs DJs who host talk shows as well as curate playlists.

The pivot to original programming comes as sales of Apple&039;s flagship products are slowing. The iPhone 6S, launched in September 2015, met with lower demand than expected. And competition in the smartphone market is rising after Google debuted the Pixel, its first designed-from-scratch phone, and as Chinese smartphone companies like Huawei and Xiaomi race catch up to their American rivals. Apple reported a 33% decline in Chinese sales in July 2016.

Apple Music, too, has some catching up to do. Its biggest rival, Spotify, holds a huge lead in paid subscribers. The Swedish company boasted 40 million paid subscribers in September 2016. Apple Music&039;s paid subscribers doubled in 2016, but that still only put the service at 20 million subscribers.

An Apple spokesperson declined to comment.

Quelle: <a href="Apple Might Soon Start Producing Original TV Shows Like Netflix“>BuzzFeed

How Encrypted Chat Apps Like Signal Risk Ratting Out Whistleblowers

Following the election of Donald Trump, many concerned about the future of surveillance have signed up for secure messaging systems, like Signal, which saw a 400% increase in daily downloads in the weeks following election day. Yet that app can also provide a false sense of security by revealing who uses it, based on their phone numbers. And as President-elect Donald Trump’s own pick for CIA Director, Rep. Mike Pompeo, told Congress, the use of encryption in personal communications can be a factor used against American suspects.

When you sign up for Signal, it plugs into your address book. That lets you see who else in your contacts list uses Signal, and lets others see that you have joined Signal as well (even firing a notification to others about new users). In recent weeks, Signal users have seen their contact lists swell. But as some have pointed out, these user lists, which cannot be opted out of, undermine attempts to communicate securely. Simply put: if you know someone’s number, you can tell whether or not that person is on Signal.

For example, employers, law enforcement, and other government agencies could create and upload address books of suspected leakers to check for matches. This means if a whistleblower signs up for Signal to communicate with a reporter, that whistleblower becomes much easier to identify. The app even calls out new users; when someone in your address book signs up, the app sends a notification encouraging you to greet them. And while you can opt out of receiving these notifications, you can’t opt out of having them sent about you. Worse; nor can users opt out of letting others see whether any given phone number is associated with a Signal account.

“There is definitely some form of privacy leak here.”

“There is definitely some form of privacy leak here,” Matthew Green, a professor at Johns Hopkins University who focuses on applied cryptography, told BuzzFeed News. “If I join Signal with my real number, anyone else who knows my number can see if I&;m on Signal. It is definitely something to be cognizant of if you are concerned about people knowing you use the software.”

Moxie Marlinspike, the founder of Open Whisper Systems, the nonprofit behind Signal, told BuzzFeed News, “Using Signal is not supposed to be a secret. We’re trying to develop a messenger that’s for everybody. That is something that people can use for all their messaging, everyday, and in every context. It’s not designed just for super-secret spycraft.” For people with concerns about being tied to their phone number, Marlinspike suggested using a throwaway Google Voice or VoIP number to sign up for Signal.

While the app is marketed as a tool secure enough even for secretive figures like Edward Snowden, users may not realize they need to take that extra, cumbersome step of setting up a secondary phone number to enhance their privacy. This could leave them vulnerable to detection.

To its credit, Signal only stores contact lists locally. Signal doesn’t save users’ contact lists on its servers. And when the government subpoenaed Open Whisper for information associated with two phone numbers last year, it turned over just the date a user signed up, and the last time their account connected to the service. That’s the only data Open Whisper had kept. However, even that would still be enough to verify that someone signed up before a leak took place.

“Privacy concerns include what information other people keep about us, just as much as what information vendors and providers keep about us.”

“Privacy is not about austerity,” Marlinspike said, making the case that an app that connects people to their existing contacts is part of what makes Signal a robust and dependable tool. “We’re not trying to build something where you live in a vault.”

“Privacy concerns include what information other people keep about us, just as much as what information vendors and providers keep about us,” Wendy Nather, the principal security strategist for Duo Security, told BuzzFeed News.

While Marlinspike did acknowledge that there are “legitimate use cases where people don’t want to publicize their phone number,” he believes that Signal’s encrypted messaging system, based around a user’s phone book, is both “privacy-preserving” and places people in control of their own social network. Marlinspike told BuzzFeed News that allowing people to opt out of showing up in others’ contact lists would create an “unworkable” product that requires users to rebuild their network from scratch anytime they get new phones.

Yet Wickr, another secure messaging app, which claims to have 5 million users, does not require people to enter their phone numbers when they sign up. Chris Howell, Wickr’s cofounder and CTO, told BuzzFeed News that about half its customers join using only a unique handle, while the other half sign up using their phone numbers and email address. A user’s contacts are stored on Wickr’s servers, but the company encodes the information in such a way that the service doesn’t know who a person’s contacts are, even when people choose to sync their phonebook. Like Signal, Wickr also has an in-app notification for customers who turn on phone book matching when people in their contacts join the service.

Contact list matching does come with a positive tradeoff, Howell explained. It’s easy and quick to connect. And a messaging app that doesn’t sync with phone books could limit its ability to attract and keep users, he said.

One way around the “red flag” of encryption use is for encrypted messaging apps to eventually become so mainstream that most people rely on them.

“Hopefully we get to a day where it’s as ubiquitous as SSL, [like] having a lock on your website when you hit a browser,” Howell said. “That’s not a cause for alarm.”

Quelle: <a href="How Encrypted Chat Apps Like Signal Risk Ratting Out Whistleblowers“>BuzzFeed

Azure Networking Fridays with the Azure Black Belt Team – Winter 2017!

Happy 2017 everyone! After wrapping up the Fall 2016 season of Azure Networking Fridays, we&;re kicking off the 2017 Winter edition!

With that said, join us for our season&039;s premiere on January 20th!

This hour long session will occur every other Friday this winter and spring. It is open to all customers and partners to learn more about Azure Networking, including ExpressRoute and Virtual Networking, and how to plan and design their connectivity to the Microsoft Cloud.

There will be an open Q&A session at the end where customers can ask the experts. Content and partner speakers will vary for each session, but the general agenda is as follows:

Azure Networking fundamentals (10 minutes)
Deep dive topic of the week (15-20 minutes)
Partner spotlight of the week (15-20 minutes)
Q&A

We’re kicking off the winter edition series on Friday, January 20th, 2017.

Join the Skype Meeting and make sure you don’t miss out on future sessions by adding this the series to your Outlook calendar. You can also download ICS.

Here are a few links that we’re posting for convenience:

Future session recordings will be posted on Channel 9. Previous sessions are already posted on Channel 9.
https://aka.ms/ERCheckList for the check list presented in our sessions.

January 20th’s call agenda:

Deep dive topic with a Microsoft Guest!
Partner Spotlight with Cisco

Quelle: Azure

This Is What Trump's CIA Pick Thinks About Encrypted Messaging Apps

Joe Raedle / Getty Images

The use of encrypted messaging apps like WhatsApp and Signal should not serve as a basis for surveillance of Americans, according to Rep. Mike Pompeo, President elect Donald Trump&;s nominee to lead the CIA.

In a questionnaire submitted by Sens. Ron Wyden and Martin Heinrich, lawmakers asked Rep. Pompeo to clarify his stance on the personal use of encrypted communication, and whether that use might trigger government suspicion.

“In my view, a US person&039;s use of strong encryption would not be sufficient by itself to establish probable that the person is an agent of a foreign power,” Pompeo said, in the questionnaire released Thursday.

Pompeo added, however, that if the CIA has reason to believe that an American has been in contact with suspected terrorists, has “viewed or posted violent extremist propaganda online, expressed a desire to conduct a Homeland attack, and recently started using encrypted communications, his or her use of those communications should be considered in the course of the FBI investigation into the person.”

Pompeo&039;s remarks appear to soften his prior stance on encryption, and how the government perceives the use of encrypted messaging by individuals. Last year, Pompeo wrote in the Wall Street Journal that “the use of strong encryption in personal communications may itself be a red flag.”

Quelle: <a href="This Is What Trump&039;s CIA Pick Thinks About Encrypted Messaging Apps“>BuzzFeed

Azure Virtual Machine Internals – Part 2

Continuation from Part 1

In Azure Virtual Machine Internals Part 1 we created a vanilla Windows VM and spent some time poking under the covers and following the leads. In this part we will modify the VM that was created earlier.

Add Disk

C:Program Files (x86)Microsoft SDKsAzureCLIbin>node azure vm disk attach-new -g BlogRG -n BlogWindowsVM -z 60 -d newdatadisk -c ReadWrite -o blogrgdisks562 -r newdatadiskc

info: Executing command vm disk attach-new

+ Looking up the VM "BlogWindowsVM"

+ Looking up the storage account blogrgdisks562

info: New data disk location: https://blogrgdisks562.blob.core.windows.net/newdatadiskc/newdatadisk.vhd

+ Updating VM "BlogWindowsVM"

info: vm disk attach-new command OK

C:Program Files (x86)Microsoft SDKsAzureCLIbin>node azure vm show -g BlogRG -n BlogWindowsVM -d full –json

Snippet below:

{

"lun": 1,

"name": "newdatadisk",

"vhd": {

"uri": "https://blogrgdisks562.blob.core.windows.net/newdatadiskc/newdatadisk.vhd"

},

"caching": "ReadWrite",

"createOption": "Empty",

"diskSizeGB": 60

}

Note that the caching is by default set to readwrite – this means that in addition to read transactions, write transactions are cached and lazily flushed to durable storage. So if the VM fails for whatever reason before the data is flushed, data will be lost. The topic of data disks including caching is discussed. Set this option to a value that is appropriate for your application.

At this stage you would have to RDP into the VM and initialize, partition and format the disk. This can be tedious for large number of VMs or disks. There is an example where you can use automation.

Capture

RDP to the VM and sysprep, generalize, shutdown.

The VM shows as stopped in the Portal, as expected.

The warning about continuing to incur the compute charges is important. Azure charges customers for the usages VM incurs. Sticking to the core resources, VMs can independently incur Compute, Storage and Networking charges.

Compute charge is incurred if a VM is provisioned. The charge is incurred even if VM is in ‘stopped’ state (as shown by the warning above) because Azure has still provisioned that VM slot for the customer. The only way to avoid incurring the compute charge is to stop-dellocate or to deprovision the VM.

Stop-deallocating a VM deallocates the VM slot so it could be allocated to another customer. However, the definition of the VM along with its state in disks is maintained so that the VM can be re-provisioned at customer’s choice. While a Stop-deallocated VM will not accrue Compute charges, it will continue to accrue the Storage charges as the disks are not deleted.

At this stage we have a generalized VM which means that the OS disk does not have the OS customizations were made when the VM was initially created including settings like locale, timezone, admin credentials, etc. Let’s see what happens if we try to ‘start’ the stopped VM from portal. The ‘start’ operation does a simple power-start and does not take the VM thru its specialize sequence as part of provisioning.

Clicking ‘Start’ in Portal and after a few seconds the VM shows a ‘Running’. Try to RDP into it – RDP times out. Boot Diagnostics to rescue.

As expected, this VM has detected that its disk is generalized and is in the ‘specialization’ sequence waiting for customer input. This VM cannot be started successfully.

When we sysprep a VM and have generalized its disk, we have to follow thru with following management operations to realize a generalized image that can be used to create one or more new VMs.

Stop VM – powers down the VM

C:Program Files (x86)Microsoft SDKsAzureCLIbin>node azure vm stop -g BlogRG -n BlogWindowsVM

info: Executing command vm stop

+ Looking up the VM "BlogWindowsVM"

warn: VM shutdown will not release the compute resources so you will be billed for the compute resources that this Virtual Machine uses.

info: To release the compute resources use "azure vm deallocate".

+ Stopping the virtual machine "BlogWindowsVM"

info: vm stop command OK

Generalize – meta data change on the VM to mark it generalized

C:Program Files (x86)Microsoft SDKsAzureCLIbin>node azure vm generalize -g BlogRG -n BlogWindowsVM

info: Executing command vm generalize

+ Looking up the VM "BlogWindowsVM"

+ Generalizing the virtual machine "BlogWindowsVM"

info: vm generalize command OK

Capture –

C:Program Files (x86)Microsoft SDKsAzureCLIbin>node azure vm capture -g BlogRG -n BlogWindowsVM -p CaptureBlogWVM -R capturecontainer -t C:tempCaptureVMTemplate.json

info: Executing command vm capture

+ Looking up the VM "BlogWindowsVM"

+ Capturing the virtual machine "BlogWindowsVM"

info: Saved template to file "C:tempCaptureVMTemplate.json"

info: vm capture command OK

The template generated can be used to create new VMs based on the generalized image.

Looking at the storage profile of CaptureVMTemplate.json

"storageProfile": {

"osDisk": {

"osType": "Windows",

"name": "CaptureBlogWVM-osDisk.694733ec-46a0-4e0b-a73b-ee0863a0f12c.vhd",

"createOption": "FromImage",

"image": {

"uri": https://blogrgdisks562.blob.core.windows.net/system/Microsoft.Compute/Images/capturecontainer/CaptureBlogWVM-osDisk.694733ec-46a0-4e0b-a73b-ee0863a0f12c.vhd

Above is the URL of the generalized image that the capture operation has generated. You will notice that the image is a page blob VHD just like any other disk VHD. From the Visual Studio Cloud Explorer we can see the three captured VHDs for the OS data and two data disks. In storage terms they are blob snapshots of the disk page blobs. You will notice that the blob snapshots are in the same storage account as the original disks – blogrgdisks562

Looking at the detail of the generalized OS disk blob (using the command, node azure storage blob list -vv ) we will notice a few things:

{

"name": "Microsoft.Compute/Images/capturecontainer/CaptureBlogWVM-osDisk.694733ec-46a0-4e0b-a73b-ee0863a0f12c.vhd",

"lastModified": "Sun, 21 Aug 2016 19:14:25 GMT",

"etag": "0x8D3C9F75DB60C73",

"contentLength": "136367309312",

"contentSettings": {

"contentType": "application/octet-stream",

"contentEncoding": "",

"contentLanguage": "",

"contentMD5": "en7n+5uiKTbMlrhW59lEGg==",

"cacheControl": "",

"contentDisposition": ""

},

"sequenceNumber": "8",

"blobType": "PageBlob",

"lease": {

"status": "unlocked",

This is a generalized image and as such unlocked with no outstanding lease

"state": "available"

},

"copy": {

"id": "b069a713-599d-44ad-85d0-e7e255f9a92c",

"progress": "136367309312/136367309312",

"bytesCopied": 136367309312,

"totalBytes": 136367309312,

"source": https://blogrgdisks562.blob.core.windows.net/vhds/BlogWindowsVM2016713231120.vhd?sv=2014-02-14&sr=b&sk=system-1&sig=HTMp66d7wK37Cc12cb2LzDsS6w1YjGyHsIHxPjR2%2F%2F8%3D&st=2016-08-21T18%3A59%3A23Z&se=2016-08-21T20%3A14%3A23Z&sp=rw,

This is the source blob which is still the OS disk on the stopped VM, BlogWindowsVM. By following the copy trail, you can trace how the blobs are getting copied. BTW, the source blob still has an infinite lease (not shown here) against it since it is attached as a disk to a VM.

"status": "success",

"completionTime": "Sun, 21 Aug 2016 19:14:25 GMT"

},

"metadata": {

"microsoftazurecompute_capturedvmkey": "/Subscriptions/f028f547-f912-42b0-8892-89ea6eda4c5e/ResourceGroups/BLOGRG/VMs/BLOGWINDOWSVM",

"microsoftazurecompute_imagetype": "OSDisk",

"microsoftazurecompute_osstate": "Generalized",

"microsoftazurecompute_ostype": "Windows"

}

}

Continuation of the capture template json-

},

"vhd": {

"uri": https://blogrgdisks562.blob.core.windows.net/vmcontainerb05604df-5f0f-4ef2-ab18-76ab7b644cfd/osDisk.b05604df-5f0f-4ef2-ab18-76ab7b644cfd.vhd

The Vhd URI as mentioned above does not exist yet. It will be created when this template is deployed.

If you intend to create multiple VMs using this template then the VHD uri will have to be changed to be unique from the second VM onwards.

},

"caching": "ReadWrite"

},

"dataDisks": [

{

"lun": 0,

"name": "CaptureBlogWVM-dataDisk-0.694733ec-46a0-4e0b-a73b-ee0863a0f12c.vhd",

"createOption": "FromImage",

"image": {

"uri": "https://blogrgdisks562.blob.core.windows.net/system/Microsoft.Compute/Images/capturecontainer/CaptureBlogWVM-dataDisk-0.694733ec-46a0-4e0b-a73b-ee0863a0f12c.vhd"

},

"vhd": {

"uri": "https://blogrgdisks562.blob.core.windows.net/vmcontainerb05604df-5f0f-4ef2-ab18-76ab7b644cfd/dataDisk-0.b05604df-5f0f-4ef2-ab18-76ab7b644cfd.vhd"

},

"caching": "ReadWrite"

},

{

"lun": 1,

"name": "CaptureBlogWVM-dataDisk-1.694733ec-46a0-4e0b-a73b-ee0863a0f12c.vhd",

"createOption": "FromImage",

"image": {

"uri": "https://blogrgdisks562.blob.core.windows.net/system/Microsoft.Compute/Images/capturecontainer/CaptureBlogWVM-dataDisk-1.694733ec-46a0-4e0b-a73b-ee0863a0f12c.vhd"

},

"vhd": {

"uri": "https://blogrgdisks562.blob.core.windows.net/vmcontainerb05604df-5f0f-4ef2-ab18-76ab7b644cfd/dataDisk-1.b05604df-5f0f-4ef2-ab18-76ab7b644cfd.vhd"

},

"caching": "ReadWrite"

}

]

},

At this point of time, the original VM is stopped but still accumulating usage charges for Compute and Storage. If we intend to leave the VM stopped for a length of time, we can save on the Compute charges by stop deallocating the VM – it will deallocate the VM on the Hyper-V host but retains the VM meta-data and the disk blobs in Storage.

C:Program Files (x86)Microsoft SDKsAzureCLIbin>node azure vm deallocate -g BlogRG -n BlogWindowsVM

info: Executing command vm deallocate

+ Looking up the VM "BlogWindowsVM"

+ Deallocating the virtual machine "BlogWindowsVM"

info: vm deallocate command OK

get-instance-view command will show the VM status as deallocated (snippets of result below)

C:Program Files (x86)Microsoft SDKsAzureCLIbin>node azure vm get-instance-view -g blogrg -n blogwindowsvm –json

"osDisk": {

"osType": "Windows",

"name": "BlogWindowsVM",

"vhd": {

"uri": https://blogrgdisks562.blob.core.windows.net/vhds/BlogWindowsVM2016713231120.vhd

Even when the VM is stop-deallocated, the OS and data disks are retained

},

"caching": "ReadWrite",

"createOption": "FromImage"

},

"dataDisks": [

{

"lun": 0,

"name": "BlogWindowsVM-20160814-191501427",

"vhd": {

"uri": "https://blogrgdisks562.blob.core.windows.net/vhds/BlogWindowsVM-20160814-191501427.vhd"

},

"caching": "ReadWrite",

"createOption": "Empty",

"diskSizeGB": 50

},

{

"lun": 1,

"name": "newdatadisk",

"vhd": {

"uri": "https://blogrgdisks562.blob.core.windows.net/newdatadiskc/newdatadisk.vhd"

},

"caching": "ReadWrite",

"createOption": "Empty",

"diskSizeGB": 60

}

]

"statuses": [

{

"code": "ProvisioningState/succeeded",

"level": "Info",

"displayStatus": "Provisioning succeeded",

"time": "2016-08-22T02:58:42.797Z"

},

{

"code": "OSState/generalized",

"level": "Info",

"displayStatus": "VM generalized"

OS is generalized, so this VM can be recreated by specializing it

},

{

"code": "PowerState/deallocated",

"level": "Info",

"displayStatus": "VM deallocated"

Compute VM resources are deallocated

Even when a VM is deallocated, its disk storage blobs are still locked like when the VM was running. This is to prevent them from being accidentally deleted.

Looking at the blob properties of the disk blob you will notice that Azure continues to maintain an infinite lease on the blob.

C:Program Files (x86)Microsoft SDKsAzureCLIbin>node azure storage blob list -vv

name: &;BlogWindowsVM-20160814-191501427.vhd&039;,

lastModified: &039;Sun, 21 Aug 2016 19:10:50 GMT&039;,

etag: &039;0x8D3C9F6DD886DB5&039;,

contentLength: &039;53687091712&039;,

contentSettings: {

contentType: &039;application/octet-stream&039;,

contentEncoding: &039;&039;,

contentLanguage: &039;&039;,

contentMD5: &039;&039;,

cacheControl: &039;&039;,

contentDisposition: &039;&039;

},

sequenceNumber: &039;1&039;,

blobType: &039;PageBlob&039;,

lease: {

status: &039;locked&039;,

state: &039;leased&039;,

duration: &039;infinite&039;

}

Cloning VMs

At this point of time we can clone VMs from the generalized image that we captured. We can either use the capture template json or create a new image using the FromImage option with the generalized image as the parameter value.

I grabbed a template from Azure Quickstart templates and modified it just enough and deployed it to create a new VM of name CopyBlogVM.

C:Program Files (x86)Microsoft SDKsAzureCLIbin>node azure group deployment create -g BlogRG -n CopyVMDeployment -f "C:tempcopyvmtemplatetemplate.json" -e "C:tempcopyvmtemplateparameters.json"

info: Executing command group deployment create

+ Initializing template configurations and parameters

+ Creating a deployment

info: Created template deployment "CopyVMDeployment"

+ Waiting for deployment to complete

+

The relevant snippet from the VM template is the storage profile:

"storageProfile": {

"osDisk": {

"name": "[concat(parameters(&039;virtualMachineName&039;),&039;-osDisk&039;)]",

"osType": "[parameters(&039;osType&039;)]",

"caching": "ReadWrite",

"createOption": "fromImage",

image": {

"uri": "[parameters(&039;osDiskVhdUri&039;)]"

},

"vhd": {

"uri": "[concat(concat(reference(resourceId(&039;blogrg&039;, &039;Microsoft.Storage/storageAccounts&039;, parameters(&039;storageAccountName&039;)), &039;2015-06-15&039;).primaryEndpoints[&039;blob&039;], &039;vhds/&039;), parameters(&039;virtualMachineName&039;), &039;20161228010921.vhd&039;)]"

}

},

"dataDisks": []

},

The OsDiskvhdUri is set in the parameters file to the generalized image file

"osDiskVhdUri": {

"value": https://blogrgdisks562.blob.core.windows.net/system/Microsoft.Compute/Images/capturecontainer/CaptureBlogWVM-osDisk.694733ec-46a0-4e0b-a73b-ee0863a0f12c.vhd

},

The CopyBlogVM creates successfully with an OS disk that starts out as a copy of the generalized OS disk referred to by OsDiskvhdUri. Using the generalized OD disk as a template, any number of new VMs can be stamped out. A common scenario would be to capture a generalized VM with new updates/patches and then create new VMs based on the updated image.

In Conclusion

In the two posts we have covered some of the details on how an Azure VM works under the covers. There are other capabilities that we have not covered including backup, encryption, licensing, planned maintenance and networking details. Time permitting, we will visit these topics in future posts.
Quelle: Azure

Here’s What The First iPhone Almost Looked Like

Here’s What The First iPhone Almost Looked Like

A YouTube video of two original iPhone prototypes shows that the past 10 years might have been very different: the first iPhone almost had a scroll wheel.

The video, posted by YouTube user Sonny Dickson, shows prototype iPhones known as versions P1 and P2 running two versions of Acorn OS, Apple&;s testing operating system. P2, with its direct touch interface, was the one that went to market 10 years ago, though in a more developed form than shown in the video. P1 more closely resembles the hallmark scroll wheel of the original iPod.

P2 is on the right.

youtube.com

Tony Fadell, who worked as senior vice president of the iPod division at Apple from 2006 to 2008 and was part of the team that created the original iPod, tweeted about the video, saying that P2 was always the right choice.

According to Dickson, Fadell and his team created P1, and Scott Forstall created P2, which eventually won out, though Fadell&039;s tweet implies that Steve Jobs was pushing for the scroll wheel.

Even as late as December 2006, right before Steve Jobs would reveal the first iPhone on January 9, 2007, rumors were swirling that the iPhone would sport a virtual version of the iPod&039;s design. These prototype interfaces indicate that Apple considered the option but ultimately chose to develop the modular interface we recognize today.

Apple did not immediately respond to request for comment.

Quelle: <a href="Here’s What The First iPhone Almost Looked Like“>BuzzFeed

Inside The Alt-Right’s Campaign To Smear Trump Protesters As Anarchists

Less than a week after last year&;s presidential election, a Trump supporter named Alan Beck tweeted two photographs of an anti-Trump protest in Washington, DC, in which a hooded figure held aloft a sign reading “Rape Melania.” The images went viral, and the sign — as well as Twitter — drew swift condemnation from news outlets both right and left.

Some Trump supporters took the sign as confirmation that the passionate national opposition to the president-elect was ultimately anarchic and violent. (Many of these supporters had drawn a similar conclusion about the movement.) “The current surge in the left&039;s propensity toward violence and mayhem should surprise no one,” wrote one InfoWars commenter. And to some Clinton supporters, the sign was a gutting refutation of Michelle Obama&039;s “when they go low, we go high” speech and a reminder that Trump rallies didn&039;t hold a monopoly on menace.

But, BuzzFeed News has learned, the “Rape Melania” sign was not the work of an anti-Trump protestor at all. Instead, according to sources, it was the brainchild of a group of Trump supporters led by Jack Posobiec, one of the organizers of the controversial Deploraball inauguration party and a prominent figure in the pro-Trump internet.

Furthermore, as shown by a series of Posobiec&039;s text messages obtained by BuzzFeed News and confirmed by a source who collaborated with Posobiec, the sign was the culmination of a disinformation campaign by Posobiec and others intended to paint the anti-Trump rallies as violent and out of control.

In a phone call with BuzzFeed News, Posobiec denied that the texts were sent by him and said that it was likely they had been Photoshopped. He also denied having any involvement in the campaign.

BuzzFeed News reviewed the texts on a source&039;s iPhone in Signal, the secure texting app, and the Signal messages allegedly from Posobiec came from the same phone number on which BuzzFeed News talked to Posobiec.

At 9:59 p.m. on November 10, Posobiec posted a video to Twitter of an anti-Trump protestor yelling “Assassinate that nigga.” In a 10:30 p.m. text message that same night, Posobiec claimed that he&039;d started an “assassinate Trump” chant to goad protestors into copying him, with the intention of filming them:

Though the video didn&039;t go viral, it was picked up by Russia Today and some conservative blogs. In the same text message conversation, Posobiec and his collaborator brainstormed other incendiary things to chant, including “Rape Melania.”

Two days later, in another text obtained by BuzzFeed News, Posobiec discussed with another collaborator his plan to “discredit” an anti-Trump protest by infiltrating it “with the bad signs.”

According to a source, it is Posobiec himself holding the “Rape Melania” sign in the photographs published by Beck — a charge Posobiec also denies.

After posting the photographs, Beck uploaded a 22-minute YouTube video of he and Posobiec sitting in a car near the protest, entitled “Anti-Trump Protester Created&039;R4PE MELANIA&;&039; Sign and The Rest of the Protesters Do Nothing.”

The following day, a collaborator texted Posobiec a screenshot of Twitter&039;s trending topics, of which “Rape Melania” was number 3. Posobiec responded, “Woah&033;”

Today, the former Deploraball organizer Anthime Gionet — who goes by Baked Alaska on Twitter – accused Posobiec of making the sign.

Posobiec, who is the special projects director of a grassroots organization called CitizensForTrump, has been at the center of several flareups of the new right media in recent weeks. In November, Posobiec was thrown out of Comet Ping Pong, the Washington DC pizza parlor made infamous by , for filming a children&039;s birthday party. And in December, Posobiec started the viral hashtag after claiming that last month&039;s film Rogue One contained anti-Trump scenes.

Quelle: <a href="Inside The Alt-Right’s Campaign To Smear Trump Protesters As Anarchists“>BuzzFeed