A Man Found An iPhone 4 At The Bottom Of A Lake — And It Still Works

Michael Guntrum, a resident of Knox, Pennsylvania, lost his iPhone 4 in March 2015 while he was ice fishing.

“We were having negative 25-degree weather, so me and two buddies went ice fishing,” Guntrum told BuzzFeed News. “We were sitting in our portable shanty, and I got a bite on my rod. I laid the phone on my lap, and it slipped off. Instead of landing flat in the snow, it hit its edge and rolled into the hole. I caught the fish — it was a blue gill — but it wasn&;t worth it.”

Normally, losing your iPhone at the bottom of an icy lake would be the end of this story.

But there&039;s more.

Kyle Lake, where Guntrum was fishing, ended up being drained in September 2015 because of structural deficiencies in its dam.

And…someone found his phone&;

Daniel Kalgren, a mechanical engineer who lives in western Pennsylvania, told BuzzFeed News he was treasure hunting with his metal detector in the empty lake basin this October when he found Guntrum&039;s iPhone under six inches of mud and clay. He was there “to find what people dropped off of boats,” he said.

Daniel Kalgren

“I took the phone home, cleaned it, and put it in rice — just out of curiosity to see if it would still work,” Kalgren told BuzzFeed News.

After two days, it turned on.

“It was the only thing I found that day. I was able to turn it on and use it to look up his number. He knows I have it now, and I&039;m going to mail it to him,” Kalgren told BuzzFeed News.

When Kalgren found Guntrum&039;s phone number on the recovered iPhone and contacted him, Guntrum said he didn&039;t believe it at first.

“I had just been talking about that lake early that day. It was eerie,” Guntrum said. “He sent me a picture and asked, &039;Does this look familiar?&039; and I recognized the screensaver.”

What kind of case is that?

The phone&039;s survival may have as much to do with its housing as it does with the phone&039;s hardiness. Kalgren&039;s said that Guntrum&039;s phone was in an Otterbox iPhone 4 case. Kalgren himself owns an iPhone 6S and keeps it in a Lifeproof case.

“I don&039;t know if my current phone would survive at the bottom of a 30-degree lake through a full winter. I&039;d like to think it would,” Kalgren said.

“I&039;m an Apple person, and this adds to the reasons why I only buy Apple devices,” Kalgren told BuzzFeed News.

“It&039;s pretty impressive it still works,” Kalgren said.

An Apple spokesperson said this isn&039;t the first time the company&039;s gotten this kind of report. “It never ceases to amaze us, all the incredible iPhone survival stories our customers have shared with us.”

So what&039;s Guntrum going to do with his long-lost phone when it arrives in the mail? He said he plans to have it repaired.

“My mom needs smartphone, so I&039;ll give it to her.”

Quelle: <a href="A Man Found An iPhone 4 At The Bottom Of A Lake — And It Still Works“>BuzzFeed

Labour Is Promising A Long Campaign Against Fake News

Christopher Furlong / Getty Images

Labour&;s Tom Watson has drafted in fellow MP Michael Dugher to work on an inquiry into fake news on social media – partly prompted by concerns about what the spread of inaccurate information could do to the left-wing party&039;s own support base.

BuzzFeed News understands that Dugher, who previously served as shadow culture secretary until he was sacked by Jeremy Corbyn in January, will now help run the project, which hopes to tackle fake news stories created for profit and purposefully fake stories published in order to discredit political opponents.

Watson, the party&039;s deputy leader and shadow culture secretary, announced the inquiry on Monday and although its final form has yet to be decided, it could involve public evidence sessions with interested individuals called to testify.

In article for The Independent, which cited BuzzFeed News&039; research on fake news during the 2016 US presidential election, Labour&039;s deputy leader said fake news “cannot be healthy for democracies, which operate on the assumption that voters make choices based on facts and information that are for the most part accurate and truthful”.

Watson, who spent years campaigning against Sun owner Rupert Murdoch and attacking newspapers involved in the phone hacking scandal, is also understood to be keen to avoid the inquiry being dragged into a dispute between old and new formats of media.

The inquiry will also enable Labour to publicly back responsible journalism, positioning the party away from the sources of unverified information such as the array of Facebook groups and new websites that have built up since Corbyn became Labour leader. Many have influential readerships among the Labour support base thanks to their going viral despite sometimes having loose editorial standards.

“It&039;s not about online and offline news, it&039;s about people who are actual journalists and people who are just making shit up,” said one source working on the project, who insisted it was not an opportunistic intervention but would instead be a long-running campaign run by the Labour deputy leader.

They highlighted how The Canary, one fast-growing pro-Corbyn site, recently ran a story on Watson appearing at an event held by the centrist Labour First group under the headline “A launch date for the Corbyn coup 2.0 has just been fixed, and guess who’s leading the charge?”

Watson will seek to challenge the government in parliament on the issue, while also trying to work with the likes of Facebook and Twitter to find a solution rather than attacking them directly for the problem of fake news going viral.

“It can be tempting to share a meme showing &039;what the mainstream media won’t tell you&039;, but sometimes the much-derided &039;MSM&039; won’t tell you something because it checked it out and it wasn’t true. That&039;s why we need good journalists and good journalism,” Watson said.

“I&039;ve never been afraid to take on the mainstream media when it abuses its power or acts illegally or unethically – by hacking phones, bribing public officials, or going through people&039;s bins. And complaints about the &039;biased MSM&039; are sometimes justified. But the solution does not lie in the creation of a form of pseudo-journalism that is even more biased, less rigorous, and often based on downright lies.”

Quelle: <a href="Labour Is Promising A Long Campaign Against Fake News“>BuzzFeed

Announcing token authentication with Azure CDN

We are pleased to announce the general availability of token authentication with Azure CDN. This feature is available in the Azure CDN from Verizon Premium offering. We have enabled the feature for all new and existing Verizon Premium customers.

Token-based authentication is a great tool to handle authentication for multiple users. It scales easily and provides security. Main benefits of token authentication include:

Easily scalable, no need to store user login information on the server.
Mobile application ready solution.
Provides security, each request must contain the token and after the token expires user needs to login again.
Prevents attacks such as cross-site request forgery (CSRF, also known as session riding).

By enabling this feature on CDN, each requests will be authenticated by CDN edge POPs before delivering the content which prevents Azure CDN from serving assets to unauthorized users. This is typically done to prevent hotlinking of content, where a different website, often a message board, uses your assets without permission. This can have an impact on your content delivery costs.

Please read the full feature documentation to learn how to set up token authentication today!

More Information

CDN overview
Rules engine

Is there a feature you&;d like to see in Azure CDN? Give us feedback!
Quelle: Azure

In-Memory OLTP in Azure SQL Database

We recently announced general availability for In-Memory OLTP in Azure SQL Database, for all Premium databases. In-Memory OLTP is not available in databases in the Standard or Basic pricing tiers today.

In-Memory OLTP can provide great performance benefits for transaction processing, data ingestion, and transient data scenarios. It can also help to save cost: you can improve the number of transactions per second, while increasing headroom for future growth, without increasing the pricing tier of the database.

For a sample order processing workload Azure SQL Database is able to achieve 75,000 transactions per second (TPS) in a single database, which is an 11X performance improvement from using In-Memory OLTP, compared with traditional tables and stored procedures. Mileage may vary for different workloads. The following table shows the results for running this workload on the highest available pricing tier, and also shows similar benefits from In-Memory OLTP even in lower pricing tiers.*

 

Pricing tier
TPS for In-Memory OLTP
TPS for traditional tables
Performance gain

P15
75,000
6,800
11X

P2
8,900
1,000
9X

Table 1: Performance comparison for a sample order processing workload

* For the run on P15 we used a scale factor of 100, with 400 clients; for the P2 run we used scale factor 5, with 200 clients. Scale factor is a measure of database size, where 100 translates to a 15GB database size, when using memory-optimized tables. For details about the workload visit the SQL Server samples GitHub repository.

In this blog post, we are taking a closer look at how the technology works, where the performance benefits come from, and how to best leverage the technology to realize performance improvements in your applications.

Keep in mind that In-Memory OLTP is for transaction processing, data ingestion, data load and transformation, and transient data scenarios. To improve performance of analytics queries, use Columnstore indexes instead. You will find more details about those in the documentation as well as on this blog, in the coming weeks.

How does In-Memory OLTP work?

In-Memory OLTP can provide great performance gains, for the right workloads. One of our customers, Quorum Business Solutions, managed to double a database’s workload while lowering DTU by 70%. In Azure SQL Database, DTU is a measure of the amount of resources that can be utilized by a given database. By reducing resource utilization, Quorum Business Solutions was able to support a larger workload while also increasing the headroom available for future growth, all without increasing the pricing tier of the database.

Now, where does this performance gain and resource efficiency come from? In essence, In-Memory OLTP improves performance of transaction processing by making data access and transaction execution more efficient, and by removing lock and latch contention between concurrently executing transactions: it is not fast because it is in-memory; it is fast because it is optimized around the data being in-memory. Data storage, access, and processing algorithms were redesigned from the ground up to take advantage of the latest enhancements in in-memory and high concurrency computing.

Now, just because data lives in-memory does not mean you lose it when there is a failure. By default, all transactions are fully durable, meaning that you have the same durability guarantees you get for any other table in Azure SQL Database: as part of transaction commit, all changes are written to the transaction log on disk. If there is a failure at any time after the transaction commits, your data is there when the database comes back online. In Azure SQL Database, we manage high availability for you, so you don’t need to worry about it: if an internal failure occurs in our data centers, and the database fails over to a different internal node, the data of every transaction you committed is there. In addition, In-Memory OLTP works with all high availability and disaster recovery capabilities of Azure SQL Database, like point-in-time restore, geo-restore, active geo-replication, etc.

To leverage In-Memory OLTP in your database, you use one or more of the following types of objects:

Memory-optimized tables are used for storing user data. You declare a table to be memory-optimized at create time.
Non-durable tables are used for transient data, either for caching or for intermediate result set (replacing traditional tables). A non-durable table is a memory-optimized table that is declared with DURABILITY=SCHEMA_ONLY, meaning that changes to these tables do not incur any IO. This avoids consuming log IO resources for cases where durability is not a concern.
Memory-optimized table types are used for table-valued parameters (TVPs), as well as intermediate result sets in stored procedures. These can be used instead of traditional table types. Table variables and TVPs that are declared using a memory-optimized table type inherit the benefits of non-durable memory-optimized tables: efficient data access, and no IO.
Natively compiled T-SQL modules are used to further reduce the time taken for an individual transaction by reducing CPU cycles required to process the operations. You declare a Transact-SQL module to be natively compiled at create time. At this time, the following T-SQL modules can be natively compiled: stored procedures, triggers and scalar user-defined functions.

In-Memory OLTP is built into Azure SQL Database, and you can use all these objects in any Premium database. And because these objects behave very similar to their traditional counterparts, you can often gain performance benefits while making only minimal changes to the database and the application. You will find a Transact-SQL script showing an example for each of these types of objects towards the end of this post.

Each database has a cap on the size of memory-optimized tables, which is associated with the number of DTUs of the database or elastic pool. At the time of writing you get one gigabyte of storage for every 125 DTUs or eDTUs. For details about monitoring In-Memory OLTP storage utilization and altering see: Monitor In-Memory Storage.

When and where do you use In-Memory OLTP?

In-Memory OLTP may be new to Azure SQL Database, but it has been in SQL Server since 2014. Since Azure SQL Database and SQL Server share the same code base, the In-Memory OLTP in Azure SQL DB is the same as the In-Memory OLTP in SQL Server. Because the technology has been out for a while, we have learned a lot about usage scenarios and application patterns that really see the benefits of In-Memory OLTP.

Resource utilization in the database

If your goal is to achieve improved performance for the users of you application, whether it is in terms of number of requests you can support every second (i.e., workload throughput) or the time it takes to handle a single request (i.e., transaction latency), you need to understand where is the performance bottleneck. In-Memory OLTP is in the database, and thus it improves the performance of operations that happen in the database. If most of the time is spent in your application code or in network communication between your application and the database, any optimization in the database will have a limited impact on the overall performance.

Azure SQL Database provides resource monitoring capabilities, exposed both through the Azure portal and system views such as sys.dm_db_resource_stats. If any of the resources is getting close to the cap for the pricing tier your database is in, this is an indication of the database being a bottleneck. The main types of resources In-Memory OLTP really helps optimize are CPU and Log IO utilization.

Let’s look at a sample IoT workload* that includes a total of 1 million sensors, where every sensor emits a new reading every 100 seconds. This translates to 10,000 sensor readings needing to be ingested into the database every second. In the tests executed below we are using a database with the P2 pricing tier. The first test uses traditional tables and stored procedures. The following graph, which is a screenshot from the Azure portal, shows resource utilization for these two key metrics.

Figure 1: 10K sensor readings per second in a P2 database without In-Memory OLTP

We see very high CPU and fairly high log IO utilization. Note that the percentages here are relative to the resource caps associated with the DTU count for the pricing tier of the database.

These numbers suggest there is a performance bottleneck in the database. You could allocate more resources to the database by increasing the pricing tier, but you could also leverage In-Memory OLTP. You can reduce resource utilization as follows:

CPU:

Replace tables and table variables with memory-optimized tables and table variables, to benefit from the more efficient data access.
Replace key performance-sensitive stored procedures used for transaction processing with natively compiled stored procedures, to benefit from the more efficient transaction execution.

Log IO:

Memory-optimized tables typically incur less log IO than traditional tables, because index operations are not logged.
Non-durable tables and memory-optimized table variables and TVPs completely remove log IO for transient data scenarios. Note that traditional temp table and table variables have some associated log IO.

Resource utilization with In-Memory OLTP

Let’s look at the same workload as above, 10,000 sensor readings ingested per second in a P2 database, but using In-Memory OLTP.

After implementing a memory-optimized table, memory-optimized table type, and a natively compiled stored procedure we see the following resource utilization profile.

Figure 2: 10K sensor readings per second in P2 database with In-Memory OLTP

As you can see, these optimizations resulted in a more than 2X reduction in log IO and 8X reduction in CPU utilization, for this workload. Implementing In-Memory OLTP in this workload has provided a number of benefits, including:

Increased headroom for future growth. In this example workload, the P2 database could accommodate 1 million sensors with each sensor emitting a new reading every 100 seconds. With In-Memory OLTP the same P2 database can now accommodate more than double the number of sensors, or increase the frequency with which sensor readings are emitted.
A lot of resources are freed up for running queries to analyze the sensor readings, or do other work in the database. And because memory-optimized tables are lock- and latch-free, there is no contention between the write operations and the queries.
In this example you could even downgrade the database to a P1 and sustain the same workload, with some additional headroom as well. This would mean cutting the cost for operating the database in half.

Do keep in mind that the data in memory-optimized tables does need to fit in the In-Memory OLTP storage cap associated with the pricing tier of your database. Let’s see what the In-Memory OLTP storage utilization looks like for this workload:

Figure 3: In-Memory OLTP storage utilization

We see that In-Memory OLTP storage utilization (the green line) is around 7% on average. Since this is a pure data ingestion workload, continuously adding sensor readings to the database, you may wonder, “how come the In-Memory OLTP storage utilization is not increasing over time?”

Well, we are using a memory-optimized temporal table. This means the table maintaining it’s own history, and the history lives on-disk. Azure SQL Database takes care of the movement between memory and disk under the hood. For data ingestion workloads that are temporal in nature, this is a great solution to manage the in-memory storage footprint.

* to replicate this experiment, change the app.config in the sample app as follows: commandDelay=1 and enableShock=0; in addition, to recreate the “before” picture, change table and table type to disk-based (i.e., MEMORY_OPTIMIZED=OFF) and remove NATIVE_COMPILATION and ATOMIC from the stored procedure

Usage scenarios for In-Memory OLTP

As noted at the top of this post, In-Memory OLTP is not a magic go-fast button, and is not suitable for all workloads. For example, memory-optimized tables will not really bring down your CPU utilization if most of the queries are performing aggregation over large ranges of data – Columnstore helps for that scenario.

Here is a list of scenarios and application patterns where we have seen customers be successful with In-Memory OLTP. Note that these apply equally to SQL Server and Azure SQL Database, since the underlying technology is the same.

High-throughput and low-latency transaction processing

This is really the core scenario for which we built In-Memory OLTP: support large volumes of transactions, with consistent low latency for individual transactions.

Common workload scenarios are: trading of financial instruments, sports betting, mobile gaming, and ad delivery. Another common pattern we’ve seen is a “catalog” that is frequently read and/or updated. One example is where you have large files, each distributed over a number of nodes in a cluster, and you catalog the location of each shard of each file in a memory-optimized table.

Implementation considerations

Use memory-optimized tables for your core transaction tables, i.e., the tables with the most performance-critical transactions. Use natively compiled stored procedures to optimize execution of the logic associated with the business transaction. The more of the logic you can push down into stored procedures in the database, the more benefit you will see from In-Memory OLTP.

To get started in an existing application, use the transaction performance analysis report to identify the objects you want to migrate, and use the memory-optimization and native compilation advisors to help with migration.

Data ingestion, including IoT (Internet-of-Things)

In-Memory OLTP is really good at ingesting large volumes of data from many different sources at the same time. And it is often beneficial to ingest data into a SQL database compared with other destinations, because SQL makes running queries against the data really fast, and allows you to get real-time insights.

Common application patterns are: Ingesting sensor readings and events, to allow notification, as well as historical analysis. Managing batch updates, even from multiple sources, while minimizing the impact on the concurrent read workload.

Implementation considerations

Use a memory-optimized table for the data ingestion. If the ingestion consists mostly of inserts (rather than updates) and In-Memory OLTP storage footprint of the data is a concern, either

Use a job to regularly batch-offload data to a disk-based table with a Clustered Columnstore index; or
Use a temporal memory-optimized table to manage historical data – in this mode, historical data lives on disk, and data movement is managed by the system.

The following sample is a smart grid application that uses a temporal memory-optimized table, a memory-optimized table type, and a natively compiled stored procedure, to speed up data ingestion, while managing the In-Memory OLTP storage footprint of the sensor data: release and source code.

Caching and session state

The In-Memory OLTP technology makes SQL really attractive for maintaining session state (e.g., for an ASP.NET application) and for caching.

ASP.NET session state is a very successful use case for In-Memory OLTP. With SQL Server, one customer was about to achieve 1.2 Million requests per second. In the meantime they have started using In-Memory OLTP for the caching needs of all mid-tier applications in the enterprise. Details: https://blogs.msdn.microsoft.com/sqlcat/2016/10/26/how-bwin-is-using-sql-server-2016-in-memory-oltp-to-achieve-unprecedented-performance-and-scale/

Implementation considerations

You can use non-durable memory-optimized tables as a simple key-value store by storing a BLOB in a varbinary(max) columns. Alternatively, you can implement a semi-structured cache with JSON support in Azure SQL Database. Finally, you can create a full relational cache through non-durable tables with a full relational schema, including various data types and constraints.

Get started with memory-optimizing ASP.NET session state by leveraging the scripts published on GitHub to replace the objects created by the built-in session state provider.

Tempdb object replacement

Leverage non-durable tables and memory-optimized table types to replace your traditional tempdb-based temp tables, table variables, and table-valued parameters.

Memory-optimized table variables and non-durable tables typically reduce CPU and completely remove log IO, when compared with traditional table variables and temp table.

Case study illustrating benefits of memory-optimized table-valued parameters in Azure SQL Database: https://blogs.msdn.microsoft.com/sqlserverstorageengine/2016/04/07/a-technical-case-study-high-speed-iot-data-ingestion-using-in-memory-oltp-in-azure/

Implementation considerations

To get started see: Improving temp table and table variable performance using memory optimization.

ETL (Extract Transform Load)

ETL workflows often include load of data into a staging table, transformations of the data, and load into the final tables.

Implementation considerations

Use non-durable memory-optimized tables for the data staging. They completely remove all IO, and make data access more efficient.

If you perform transformations on the staging table as part of the workflow, you can use natively compiled stored procedures to speed up these transformations. If you can do these transformations in parallel you get additional scaling benefits from the memory-optimization.

Getting started

The following script illustrates how you create In-Memory OLTP objects in your database.

— memory-optimized table
CREATE TABLE dbo.table1
( c1 INT IDENTITY PRIMARY KEY NONCLUSTERED,
  c2 NVARCHAR(MAX))
WITH (MEMORY_OPTIMIZED=ON)
GO
— non-durable table
CREATE TABLE dbo.temp_table1
( c1 INT IDENTITY PRIMARY KEY NONCLUSTERED,
  c2 NVARCHAR(MAX))
WITH (MEMORY_OPTIMIZED=ON,
      DURABILITY=SCHEMA_ONLY)
GO
— memory-optimized table type
CREATE TYPE dbo.tt_table1 AS TABLE
( c1 INT IDENTITY,
  c2 NVARCHAR(MAX),
  is_transient BIT NOT NULL DEFAULT (0),
  INDEX ix_c1 HASH (c1) WITH (BUCKET_COUNT=1024))
WITH (MEMORY_OPTIMIZED=ON)
GO
— natively compiled stored procedure
CREATE PROCEDURE dbo.usp_ingest_table1
  @table1 dbo.tt_table1 READONLY
WITH NATIVE_COMPILATION, SCHEMABINDING
AS
BEGIN ATOMIC
    WITH (TRANSACTION ISOLATION LEVEL=SNAPSHOT,
          LANGUAGE=N&;us_english&039;)

  DECLARE @i INT = 1

  WHILE @i > 0
  BEGIN
    INSERT dbo.table1
    SELECT c2
    FROM @table1
    WHERE c1 = @i AND is_transient=0

    IF @@ROWCOUNT > 0
      SET @i += 1
    ELSE
    BEGIN
      INSERT dbo.temp_table1
      SELECT c2
      FROM @table1
      WHERE c1 = @i AND is_transient=1

      IF @@ROWCOUNT > 0
        SET @i += 1
      ELSE
        SET @i = 0
    END
  END

END
GO
— sample execution of the proc
DECLARE @table1 dbo.tt_table1
INSERT @table1 (c2, is_transient) VALUES (N&039;sample durable&039;, 0)
INSERT @table1 (c2, is_transient) VALUES (N&039;sample non-durable&039;, 1)
EXECUTE dbo.usp_ingest_table1 @table1=@table1
SELECT c1, c2 from dbo.table1
SELECT c1, c2 from dbo.temp_table1
GO

A more comprehensive sample leveraging In-Memory OLTP and demonstrating performance benefits can be found at: Install the In-Memory OLTP sample.

The smart grid sample database and workload used for the above illustration of the resource utilization benefits of In-Memory OLTP can be found here: release and source code.

 

Try In-Memory OLTP in your Azure SQL Database today!

Resources to get started:

SQL In-Memory technologies in SQL Database

Quick Start 1: In-Memory OLTP Technologies for Faster T-SQL Performance

Use In-Memory OLTP in an existing Azure SQL Application.

Improving temp table and table variable performance using memory optimization

System-Versioned Temporal Tables with Memory-Optimized Tables

Quelle: Azure

This Is What Happens When Millions Of People Suddenly Get The Internet

YANGON, Myanmar — The internet brought Donald Trump to Myanmar. Or, at least that’s how Shar Ya Wai first remembers hearing about the Republican president-elect.

“One day, nobody knew him. Then, everyone did. That’s what the internet is. It takes people who say crazy things and makes them famous,” the 19-year-old student said.

Like most people in this country of 50 million, which only recently opened up to the outside world, Shar Ya Wai is new to the internet. And on this day, she had walked purposefully into a phone shop in central Yangon to buy her first smartphone, a simple model by China’s Huawei that is popular among her friends. “Today I’ll buy this phone,” she said. “I guess I’ll find out how crazy [the internet] really is.”

It’s not that she’d never seen the internet before. She’d tried to stalk ex-boyfriends through a friend’s Facebook page and caught glimpses of the latest Thai pop bands on her uncle’s old tablet, which he bought secondhand a year ago. But her forays into the internet have been brief and largely left her perplexed. Here was a public space where everyone seemed to have so much to say, but it was disorganized, bombastic, overwhelming. It felt like the polar opposite of the quiet, sheltered life she’d lived until recently.

“My father is a measured person. He speaks carefully and always wanted us to speak carefully too,” she said, smoothing down her waist-length black hair, betraying her nerves. “I’m more energetic, like my mom. We speak a lot more, but it is nothing like what I see on the internet.”

It was her father who wanted her to put off buying a phone until she was old enough to “use it safely,” though she wasn’t really sure what that meant. She thought he might be referring to the men who post crass and vulgar photos online. Or he might be worried about the various scammers who are increasingly targeting the nascent internet in Myanmar. She wasn&;t sure because no one had ever told her how to stay safe online — what to do, or say, or write.

Still, on this day in mid-July, Shar Ya Wai pushed herself out of a crowded store in central Yangon, holding the cellophane-wrapped cell phone as though it were an injured bird. Her fingers cradled the top and felt for the button that would turn it on, but then hesitated.

“Maybe I should wait until later. I should wait until I’m with my family,” she said, and then admitted, “I’m scared.”

She has reason to be afraid. For nearly five decades, Myanmar lived under military dictatorships that suppressed all forms of dissent and limited free speech, leading to US and European sanctions that largely cut off the country from the rest of the world. That changed in 2011, when the military junta was officially dissolved and a nominally civilian government was established. In 2015, in the first national election since the military eased its hold, Aung San Suu Kyi’s National League for Democracy Party was voted into power. Of the changes to hit the largely Buddhist country since then, few have been as drastic — and as rapid — as the sudden arrival of the internet to the general public. It revolutionized everything, from how people interact with one another to how they get their news, once the exclusive purview of hyper-regulated state-sanctioned media.

“People don’t talk about the normal news they see on Facebook. They talk about the crazy stuff. I never knew about Trump and then everyone was talking about him.”

Today, news sites have become so popular that print magazines called Facebook and The Internet regurgitate stories spotted online for stragglers who have not yet joined the internet revolution. Many of them feature sensational and salacious tales, cribbed from Facebook pages with a very loose definition of facts. Drinking ice-cold water while eating hot food will give you a stomach ache&; Angelina Jolie has secretly adopted a Burmese baby but is keeping it locked away due to a deformity&033; A Thai cabinet minister is secretly dating an Olympic gymnast&033;

These stories, at least, do little harm. But there has also been an increase in articles that demonize the country’s minority Muslim community, with fake news claiming that vast hordes of Muslim worshippers are attacking Buddhist sites. These articles, quickly shared and amplified on social media, have correlated with a surge in anti-Muslim protests and attacks on local Muslim groups.

Violence against Myanmar’s minority Muslim community has plagued the country for decades; in the last month, 70 Rohingya Muslims were killed in a wave of violence so intense that Human Rights Watch says the burned-down villages can be viewed from satellites in space. Mobilized by the sudden freedom of online platforms like Facebook, groups that once lived on the fringes of the political landscape, such as radical Buddhist anti-Muslim groups, have suddenly found supporters across the country. And, what’s more, those supporters have found solidarity in extreme movements around the world, including the more radical, nationalist American groups, like the Ku Klux Klan, that have supported Trump.

If fake news had the power to influence people’s minds during the US elections, in a country with a well-established mainstream media landscape, what could it do in Myanmar, with a nascent news media, only recently freed from the military’s stranglehold?

“People don’t talk about the normal news they see on Facebook. They talk about the crazy stuff. I never knew about Trump and then everyone was talking about him,” Shar Ya Wai said. She remembered getting into a fight with one friend who suggested that a Muslim family living in his middle-class suburb should be evicted, because Trump was going to ban Muslims and that it seemed like a good idea. “My friend was saying, ‘That is a good idea. We should do like America and do it here too. No more Muslims&033;’”

Her friend, like many in Myanmar, had gone online, discovered an extreme point of view, and then used it to reaffirm his own ideology within his country’s political ecosystem. Today’s internet was built for that sort of sharing. It is often the voices that shout the loudest, and tell the most outlandish stories, that are most likely to make it to the top of the News Feed — whether the news itself is real or fake. Despite debate in the US over the role that fake news played in the recent presidential elections, Facebook has maintained that it did not play a large role. Mark Zuckerberg initially argued that it was “extremely unlikely” that fake news affected the vote, although he later said he did take the issue seriously. Facebook employees who spoke to BuzzFeed News have suggested that content should be marked as verified, if it comes from trusted news sources.

Facebook’s influence in Myanmar is hard to quantify, but its domination is so complete that people in Myanmar use “internet” and “Facebook” interchangeably. According to Amara Digital, a Yangon-based marketing agency, Facebook has doubled its local base in the last year to 9.7 million monthly users. That number is likely to spike again, after Facebook launched its Free Basics program, a free, streamlined version of Facebook and a handful of other sites.

There was this idea, Shar Ya Wai said, that Facebook was for saying anything you wanted.

And that’s what’s been happening — from extremist monks to political cartoonists. Dozens of people have been jailed for what they’ve written on Facebook, though human rights groups say the exact number is unknown as many arrests go unreported, especially outside the city centers, where the legal system is not as closely monitored.

For many in Myanmar, the internet and Facebook brought with it the banner of free speech and American values — but no one had told them what would happen if they tested the values of free speech under a government still feeling its way out of military control. Was it the responsibility of Facebook, or their own government, to teach them how to safely use the internet? Would Facebook protect them for what they wrote online? How do you give people the internet they crave while keeping them safe? And given how many Americans, including Trump, fell for fake news during the elections, how were people in Myanmar expected to judge what was real and what was fake?

Shar Ya Wai did, eventually, turn the phone on, after a stall next to the mobile store told her they couldn’t activate the SIM card and data plan without activating the phone and dialing in to one of Myanmar’s local carriers, MTN. As she left the store, her phone was on, though Facebook and other apps remained closed. “I will use Facebook. I have to … that is the world.”

She agreed to keep in touch over the next few weeks as she got used to life with the internet in her pocket.

Customers inside a mobile phone shop in Yangon.

Minzayar Oo / BuzzFeed News

Back in 2011, a SIM card for a mobile phone could cost upwards of $3,000, and was available only to those with high-level government connections. A handful of internet cafés existed, most of them in the capital, but were far too expensive for the average person. Less than 0.2% of the country was online, according to the International Monetary Fund.

In the years immediately following the easing of military&039;s rule, internet use climbed slowly. Laptops were rare and desktops rarer still. It wasn’t until 2014, when the country opened its doors to international telecom companies, that the floodgates really opened. Suddenly, mobile towers were everywhere.

“In 2011, our subscribers were in the thousands. Now, we are at 35 million in a country of 50 million,” said Elaine Weidman-Grunewald, vice president of sustainability and corporate responsibility at telecoms giant Ericsson. She visited the country earlier this year to check in with a program Ericsson is running to provide internet access and tablets to 31 schools in rural Myanmar, reaching roughly 22,000 students. In many cases, the tablets were the student’s first, and only, access to the internet. “The rate of mobile use in Myanmar is unbelievable. The first six months of this year, Myanmar was in the top three countries globally with new mobile subscriptions.”

The World Bank estimates that roughly 20% of Myanmar is now online, most of that in just the last two years. In comparison, internet use in the United States, where commercial providers began to offer the internet access in late 1989, took seven years to reach a point where 20% of the US was online. In India, which is one of the fastest growing internet markets in the world, internet use took off in 2000, but didn’t reach 20% of the population until mid-2015.

Myanmar, said Weidman-Grunewald, was unique in that its isolation from the internet was so complete for so long, and then, just as quickly, it opened up its whole country to the whole, unfiltered internet.

Nowhere is the sudden growth as evident as in the shops underneath the golden peaks of the Sule Pagoda in downtown Yangon. Sheltered beneath the awning of the pagoda, shops that once sold stamps and watches have disappeared, replaced by storefronts crammed with mobile phones and accessories.

“This is all anybody buys,” said Mai Thu Sien, a 19-year-old salesman. He didn’t seem bothered to be squeezed onto a street bustling with other shops selling exactly the same thing. “There are many customers for phones. People buy and buy.”

For the equivalent of $3, Mai Thu Sien sets up an email address, opens up a Facebook account in any name the customer wants, and sends them on their way. When asked whether customers choose their own email address, Mai Thu Sien looked confused. “Nobody asks, they don’t care about the email,” he said, explaining that most don’t know that creating an email address is free, and easy. “No one is using that. They have Facebook.”

If they forget their login information, or get signed out, they simply come in for a new Facebook account. Of the dozens of people interviewed by BuzzFeed News in Myanmar, all said they had more than one Facebook account. None knew about Facebook’s policy that users must use their real names.

Two days after she bought her phone, Shar Ya Wai sent a text message saying that she’d opened up an account and was adding friends.

“I only have 12 right now,” she said, adding that a friend of her brother’s had set up the account and that she too had no idea it was linked to email address. “Everyone is really nice. My friend put up photos of a trip together to Mandalay.”

“It’s not as bad as I thought,” she said.

A street vendor selling mobile phone accessories in Yangon on July 17.

Minzayar Oo / BuzzFeed News

The taxi raced down a slip road to the airport and then juddered to a halt in front of a small shack with chickens pecking outside. Ashin Wirathu, a monk whose hardline anti-Muslim positions have earned him the nickname “the Burmese Bin Laden,” smiled as he rolled down his window to chat with a journalist he recognized. Wirathu — who has been imprisoned for sermons calling for the persecution of the Muslim Rohingya minority — was heading off to the airport for a vacation, but couldn’t resist one more chance to get his name in the news.

Wirathu rose to prominence as part of a group of extremist monks once known as the Association for the Protection of Race and Religion, and then the “969” movement. Today, they are called Ma Ba Tha, after their Burmese acronym. Since the end of military rule, monks have assumed an increasingly public role in the largely Buddhist country. Wirathu, and the Ma Ba Tha movement, have denied any role in the Buddhist lynch mobs, which, in recent years, have killed more than 200, and displaced more than 150,000 of the country’s Muslims, who make up roughly 4% of the total population. Civil society groups allege that the state&039;s security forces have fomented recent outbreaks of violence against the Rohingya. But there is no denying that Ma Ba Tha&039;s bashing of Muslims as “cruel and savage” is often repeated by those who want to see all Muslims expelled from Myanmar — and they admit that their anti-Muslim stance has gained its largest following through Facebook.

The controversial Buddhist monk Wirathu.

Thierry Falise / Getty Images

This week, following news that Trump’s administration was being staffed with hardliners, Wirathu released a statement hailing Trump’s White House as a victory in the fight against “Islamic terrorism.”

“May US citizens be free from jihad. May the world be free of bloodshed,” Wirathu wrote in a public statement. It was one of many Trump received from figures across the world who appeared to feel emboldened by his win.

It was not the first time Wirathu had taken to Facebook to bolster his position globally. Following his release from jail in January 2012, where he had served a seven-year prison sentence for inciting anti-Muslim pogroms in 2003, Wirathu immediately took to the platform.

“If the internet had not come to [Myanmar], not many people would know my opinion and messages like now,” Wirathu told BuzzFeed News, adding that he had always written books and delivered sermons but that the “internet is a faster way to spread the messages.”

His first account was small, he said, and almost immediately deleted by Facebook moderators who wrote that it violated their community standards. The second had 5,000 friends and grew so quickly he could no longer accept new requests. So he started a new page and hired two full-time employees who now update the site hourly.

“I have a Facebook account with 190,000 followers and a news Facebook page. The internet and Facebook are very useful and important to spread my messages,” he said.

On the dozens of Facebook pages he runs out of a dedicated office, Wirathu has called for the boycott of Muslim businesses, and for Muslims to be expelled from Myanmar. He said he has a hard time keeping the pages open, since Facebook keeps shutting them down. He manages, nonetheless, to maintain an ever-growing online following.

“I’m glad blocking exists.”

Quelle: <a href="This Is What Happens When Millions Of People Suddenly Get The Internet“>BuzzFeed

Here's How Much Uber Drivers Make, According To A New Uber Report

Aaron Fernandez / BuzzFeed News

On Monday, Uber released a report on driver earnings, conducted by the company&;s head of economic research Jonathan Hall and Princeton economist Alan Krueger. Hall and Kreuger used data from a diverse group of drivers in 20 markets. They found that the majority of Uber drivers drive 15 hours or fewer per week, and that the average Uber driver, earns an average wage of $18.75 an hour, before expenses.

(Krueger was previously a paid consultant for Uber, but the company says he was not paid for his work on this study.)

Jonathan V. Hall and Alan B. Krueger / National Bureau of Economic Research

Uber released a survey of driver earnings in 2015; this new report is an update of that survey, revised to include estimations of driver expenses — how much drivers spend on gas, car maintenance, insurance, and taxes. It also looks at whether the amount of time drivers spend working per week influences their hourly earnings, and how driver earnings change over time, especially following price cuts.

According to the report, which used data from AAA, a full-time Uber driver driving a small sedan would have about $3.76 in expenses per hour, while the same person driving an SUV with four-wheel drive would have expenses of around $5.94 per hour. These conclusions about driver expenses are similar to those made in a June BuzzFeed News investigation, which found that in late 2015 in three cities, working for Uber cost drivers $3.50 to $5 an hour, and which didn&039;t take car size or full versus part-time into account. However, this report doesn&039;t take geographical location into account, which is important because the amount of rain or snow a vehicle experiences can impact the cost of maintaining it.

Jonathan V. Hall and Alan B. Krueger / National Bureau of Economic Research

Despite the fact that Uber was able to estimate driver expenses for the first time in this report, its authors chose not to publish estimates of driver net earnings, instead publishing estimates of drivers&039; earnings before expenses.

However, it&039;s possible to draw an illustrative hypothetical using Uber&039;s estimations. For example, a part-time driver of a minivan in Chicago earning an average $15.48 an hour would, based on Uber&039;s model, incur $4.02 an hour in expenses, for a net hourly earning of roughly $11.46 an hour. A full-time driver in Washington DC earning an average $18.21 an hour driving a four-wheel drive SUV would have expenses of around $5.94 per hour, for net hourly earnings of $12.27.

In June, BuzzFeed News found that Uber drivers in late 2015 earned approximately $13.17 per hour after expenses in Denver, $10.75 per hour after expenses in Houston, and $8.77 in Detroit.

It&039;s interesting to note that while the report does look at how driver earnings change over time, it doesn&039;t look at how driver expenses change over time. Specifically, the report addresses the issue of fare cuts and driver utilization, and ultimately supports Uber&039;s argument that even when customers are paying more, lower prices increase demand meaning drivers earnings remain stable.

While that may be true — and Uber&039;s data suggests it is — it doesn&039;t take into account the fact that a driver&039;s expenses will increase as he or she is driving more. So, although the report does measure the rise and fall of driver earnings as prices fall and demand increases, it doesn&039;t measure the impacts of that increase in demand on how much a driver is spending.

Quelle: <a href="Here&039;s How Much Uber Drivers Make, According To A New Uber Report“>BuzzFeed

Introducing the Azure IoT Hub IP Filter

As more businesses turn to the Internet of Things (IoT), security and privacy are often top of mind. Our goal at Microsoft is to keep our customers&; IoT solutions secure. As part of our ongoing security efforts, we recently launched the Security Program for Azure IoT, which provides customers with a choice of security auditors who can assess their IoT solutions from device to cloud. Microsoft also offers comprehensive guidance on IoT security and state of the art security built into Azure IoT Suite and Azure IoT Hub. Today, we’re excited to announce another important security feature: IP filtering.

IP filtering enables customers to instruct IoT Hub to only accept connections from certain IP addresses, to reject certain IP addresses or a combination of both. We’ve made it easy for administrators to configure these IP filtering rules for their IoT Hub. These rules apply any time a device or a back-end application is connecting on any supported protocols (currently AMQP, MQTT, AMQP/WS, MQTT/WS, HTTP/1). Any application from an IPv4 address that matches a rejecting IP rule receives an unauthorized 401 status code without specific mention of the IP rule in the message.

The IP filter allows maximum 10 rules each rejecting or accepting an individual IPv4 address or a subnet using the CIDR-notation format. The following two examples demonstrate how to blacklist an IP address and whitelist a certain subnet.

Tutorial: How to Blacklist an IP address

By default, Azure IoT Hub is configured to accept all IP addresses to be compatible with the existing customer configurations prior to providing this feature.
 
For the purposes of this tutorial, let’s assume the IoT Hub administrator notices suspicious activity from address 184.13.152.8 and wants to reject traffic from that IP address. To block the address 184.13.152.8, the IoT Hub administrator simply needs to add a rule that rejects this IP (as illustrated below):

In this example, any time a device or a back-end application with the rejected IP address connects to this IoT Hub, it will receive 401 Unauthorized error. The IoT Hub administrator will see this being logged, but the malicious attacker will not receive any further error messages.

Tutorial: How to Whitelist a Subnet

For our next tutorial, let’s assume that the administrator wants to configure the Azure IoT Hub to accept only the IPv4 range from 192.168.100.0 to 192.168.103.255 and reject everything else. This can be simply achieved by adding only two rules using the CIDR notation:

Accept the CIDR notation mask 192.168.100.0/22
Reject all IP addresses

The CIDR (Classless Inter Domain Routing) format makes it easy for the IoT Hub network administrator to accept or reject a range of addresses in one rule, so 192.168.100.0/22 will translate into a range from 192.168.100.0 to 192.168.103.255.  For those who are not network administrators, there is plenty of documentation online that explains the complexity of the CIDR format or provide calculators. By adding a last rule that rejects 0.0.0.0/0, the administrator changes the default to be blacklist.

The illustration below shows an IoT Hub that whitelists only the 192.168.100.0 to 192.168.103.255 range. Note that the order is important and the first rule that matches the IP decides the action.

 

Finally, while IoT Hub already supports private connections using Azure Express Route, IP filtering enables an additional level of security by enabling administrators to only accept private Express Route connections.  To enable this, you would use IP filtering to accept connections from Express Route and then reject all others.
Quelle: Azure

Now You Can Post Live Video On Instagram

Once you stop recording, the live video is gone for good. *Poof*

Instagram is the latest social platform to embrace live video, following Twitter, YouTube, and its parent company, Facebook. It&;s an attempt to make Instagram a place for both permanent and ephemeral sharing.

This is Instagram&039;s latest attempt to drive more kinds of usage — beyond just posting highly-curated photos — by introducing features that focus on what’s happening in the moment. Live video is the second video product Instagram has launched this year. Stories, a string of Snapchat-style photos and videos that disappear after 24 hours, was announced in August.

It&039;s also something Instagram CEO Kevin Systrom has previously hinted at. Earlier this month, Systrom told the Financial Times, “If I’m trying to strengthen relationships with someone I love, them streaming video to me live would be an amazing way to be closer to them.”

Last month, in an interview with BuzzFeed News, Systrom said, “I agree, the video format in our viewer does feel similar to what a lot of other people are doing. I think that’s fine for now, but it’s not where we want to end up. We want to innovate and improve the experience.”


View Entire List ›

Quelle: <a href="Now You Can Post Live Video On Instagram“>BuzzFeed

These Are The Most Retweeted Tweets Of The Election

Donald Trump may be a prolific Twitter user, and the president-elect. But Hillary Clinton beat him out for the most retweeted election-related tweet, according to Twitter.

Clinton&;s tweet, coming the day of her concession speech, urged girls disheartened by the election outcome to not get discouraged. The tweet has received over 600,000 retweets so far.

Trump&039;s most retweeted tweet, an Election Day play on his “Make America Great Again,” slogan, registered over 350,000 retweets.

Interestingly, both of these tweets were text-only updates at a time when seemingly every social platform is moving toward a future dominated by video and photos.

The most retweeted tweet of the 2012 election did contain a photo, one of President Barack Obama embracing the first lady. That tweet was retweeted more than 500,000 times in the day following the election. It&039;s added hundreds of thousands more retweets since.

Quelle: <a href="These Are The Most Retweeted Tweets Of The Election“>BuzzFeed