Abe Singer on Business Ethics as a Practical and Political Endeavor
Q Talks: Podcast
What is commerce and why do we have it? What is business and why does it exist? What power dynamics do we find in business? In today's episode Professor of Ethics, Abraham Singer explores his perspective on ethical behaviors of business with Professor Al Gini. Want to learn more? Singer's latest book is The Form of the Firm expounds on these ideas.
Multi-Factor Authentication at NERSC, Abe Singer Interview
NERSC User News
In this interview with NERSC security specialist Abe Singer, learn about NERSC's plans for Multi-Factor Authentication (MFA), discover what will happen when MFA becomes mandatory in the new allocation year, and hear answers to some frequently asked user questions about MFA.
Latest MFA Developments at NERSC, Abe Singer Interview
NERSC User News
This week NERSC Security Analyst Abe Singer returns to the show to discuss the latest developments with Multi-Factor Authentication (MFA) at NERSC. Tune in to hear about sshproxy (a NERSC-developed utility for generating ssh keys with MFA that can be used all day) and hear Abe's answers to common user questions. Be sure to listen until the end for a question even Abe can't answer!
Syslog is the primary source of information about intrusion-relatedactivity on a Unix system. Searching for known messages andpatterns in syslog data is easy to do, and many tools are availablefor doing so. However, information and patterns that are notalready "known" -- those that have not been seen or derivedalready, may provide even more information about attacks andintrusions. Data mining techniques can help us discover and analyzethat information, but, the general lack of structure in syslog datamakes it impossible to apply these techniques directly to the data.To address the problem, we are researching methods of generatingpatterns from an archive of system logs which can uniquely identifysyslog messages by the variant and invariant elements of themessages. Once syslog messages can be uniquely identified, datamining techniques for use in intrusion detection or forensicanalysis will be far more useful.