Xi’an, pt. 3: imperial hot springs and a giant wild goose pagoda.

There are many reasons to visit the city of Xi’an and environs. But if those given, and exhibited by way of photos in my previous two posts (Terracotta Army and the old city walls) haven’t convinced you yet, just keep reading…

Between 10 and 15 kilometers from the city there’s a totally ace place called 华清池, aka Huaqing Pool, aka Huaqing Hot Springs. This is a real pretty spot, but at night… more about that in a bit…

Straight away at the entrance you’re knocked off your feet by the sight of some Victoria amazonica – a native plant from, as the name suggests, the Amazon River basin; yep – that Amazon: the one that runs through South America. So what they doing here? I never did get to find out, but it doesn’t really matter… in fact it adds to the mysteriously pioneering spirit of this perfectly peerless plant!

Read on…

Wall riding in Xi’an.

Nihao folks!

The Chinese city of Xi’an is 100%, mandatorily, necessarily, must-visit. Why am I being so emphatic? Because of just one of its tourist attractions…

The most awesome tourist attraction of the city, to me, has to be the city’s fortifications, which are kind of like Xi’an’s Kremlin. The bonus for us was that we got to ride some cool bikes there. These were just perfect for tourists already pretty tired of all the walking before we even got there. Before the bikes appeared though, we got in some of the regular ‘walk and snapping’ first. Just as well – snapping ain’t easy on a bicycle; and there was plenty to snap:

Read on: Ancient walls, funky bikes, and remarkable contrasts…

Flickr photostream

  • Tianjing
  • Tianjing
  • Tianjing
  • Tianjing

Instagram photostream

Old Model Army.

Nihao folks!

Onwards we fly on our China-2017 tour… Next stop: the city of Xi’an – pronounced Si-an – meaning ‘western peace’.

It was a nice day, which is just as well, as there’s plenty to do and see in and near the city. Our itinerary went so: city walls and the old town; ancient pagodas; and (not far from the city) Mount Hua – one of the Sacred Mountains of China. Anyway, more on those later. For now, the Terracotta Army, no less!

You may have heard of this UNESCO World Heritage Site of funerary art; yes, it is quite famous. But the unexpectedly fine detail and massive scale of the mausoleum are only really grasped when you see it in the flesh. A truly grandiose historical site.

Read on…

Enter your email address to subscribe to this blog
(Required)

The mysterious grottos of Huashan.

Onwards we travel around China. Next up: grottos…

Specifically, the Huashan Mysterious Grottos, officially called ‘Flower Mountain’ (花山), here.

Nothing grotty about these underground wonders:

There’s practically zero info about these here caverns. They were discovered accidentally only in the year 2000 by a farmer who for some reason was digging there with a shovel. (He was lucky – what if he’d have fallen in?) Anyway, a while later the authorities cleaned them all up, signposted them up, and added multicolored lights to make them nice and touristy.

Read on…

Lijiang: few words, many photos – pt. 2.

The Li River basin provides that much extraordinarily exquisite scenery to behold that just one ‘few words, many photos’ post is far from sufficient. Therefore, logically, herewith – Lijiang, part 2…

For example, check out this natural AAAArch (an AAAA rating is a particularly high one in the Chinese national rankings of places of interest for tourists). I mean, it looks AAAAmazing from down here; but the views from atop it are arguably even more AAAAwesome, so we were told. So that was that: we had to get up it. And it’s not so daunting a climb as it seems at first: a mere 15 to 30 minutes depending on how sporty or lazy you are.

Read on…

Elephant Trunk Hill – it fits the bill.

Elephant Trunk Hill – it fits the bill.

It’s been nearly two years since I’ve written about elephants. No, not those red, white and blue ones with the three stars. And this time – not real ones either. This time – a stone one!

Elephant? What elephant, where? – I thought at first; then I saw the resemblance: the trunk to the left, body to the right, face, I guess, hidden behind those trees up top :).

More stone elephants than you can shake a bamboo stick at…

KL wins Gartner Platinum Award!

Hi folks!

As you’ll probably have noticed, the news stream around our small (but very technologically progressive) IT company has of late turned into a veritable Iguazu Falls. But that doesn’t prevent good news coming down that stream too – apolitical, technological, and based on named sources ). So here’s some of just that: the latest bit of good news…

There are several large and respected research agencies in the world, and Gartner is one of them. It’s known most of all for its expert assessments of how well vendors manufacture IT equipment and software: how well their products meet the needs of their customers and help them deal with problems.

Some time ago Gartner decided to add to its already multi-faceted evaluations another important dimension: the opinion of customers themselves. This was to make the overall ratings yet more accurate and objective and thus more practically useful. Thus, a little over a year ago Gartner announced its new peer review program – Gartner Peer Insights – in which business customers could voluntarily and anonymously (that is, being able to say absolutely anything they might not be happy about without the risk of any negativity boomeranging back at them) rate the products of different developers. And that includes ‘Endpoint Protection Platforms’.

Gartner approached adding this new facet to its analysis very seriously. Gartner Peer Insights hopes to “transform the way enterprise software is bought and sold by creating another source of trusted information in the software buying process. Gartner’s review platform is a place for all IT buyers to find advice they can trust from fellow IT professionals. Gartner Peer Insights includes more than 40,000 verified reviews in more than 190 markets. For more information, please visit www.gartner.com/reviews/home.”

Collecting and collating all the feedback took a year, while our industry – of course including us – eagerly awaited the results. In order to win, the vendor must have at least one product designated by research analysts as relevant to the market, and the vendor must have 50 or more reviews published during the submission period (12 months). To ensure that the awards are given to vendors who represent the Peer Insights’ end user base, vendors are eligible for Gold, Silver or Bronze awards subject to three criteria: 1) Maximum 75% of the deployments reported by the reviewers from non-North America regions; 2) Maximum 75% of reviews from one industry; and 3) Maximum 50% of reviews from non-enterprise end users. ‘Enterprise end user’ is defined as the reviewer’s company size being >$50M USD. If vendors qualify for the award but don’t meet the three criteria above, they may still be eligible for an honorable mention for their focus.

Read on: The real litmus test…

More transparent than the air you breathe.

Hi folks!

I think it’s always possible – if you try hard enough – to be able to find something good in a bad situation.

The recent negative campaign against KL in the U.S. press hasn’t been pleasant for us, but we have tried hard – and found – some good things: it allowed us to make certain curious observations and deductions, and also gave a magic kick up the proverbial on planned KL business initiatives that never really came to anything long ago – one of which initiatives I’ll be telling you about in this post.

The cybersecurity business is based on trust: trust between users and the developer. For example, any antivirus, in order to do its job – uncover and protect against malware – uses a number of technologies that require broad access rights to users’ computers. If they didn’t have them, they’d be defunct. But it can’t be any other way: the cyber-bandits use all available methods to be able to penetrate computers to then lodge their malware in those computers’ operating systems. And the only way to be able to detect and smoke that malware out is to have the same deep system access privileges. Problem is, such a truism also acts as fertile ground for all sorts of conspiracy theories in the same vein as the old classic: ‘antivirus companies write the viruses themselves’ (with that kind of reasoning I dread to think what, say, the fire service or the medical profession get up to themselves when not putting out fires and treating the sick). And the latest theory growing out of that fertile ground is the one where a cyber-military has hacked our products and is spying on another cyber-military via those same products.

There are three things that all the separate U.S. media attacks on KL have in common: (i) a complete lack of evidence provided as a basis for their reports; (ii) use of only anonymous sources; and (iii) the most unpleasant – abuse of the trust relationship that necessarily exists between users and us. Indeed, it has to be admitted that that trusting relationship – built up over decades – has alas been impaired. And not just for KL, but the whole cybersecurity industry – since all vendors use similar technologies for providing quality protection.

Can this crisis of trust be overcome? And if so – how?

It can. And it must. But it needs to be done only by taking specific, reasoned steps that technically prove how trust is, in fact, being threatened by nothing and no one. Users, just as before, can trust developers – who always have, currently have, and will always have, one single mission: protecting against cyberthreats.

We’ve always been as open as possible with all our plans and undertakings, especially technological ones. All our key tech is documented to the fullest (falling short of revealing trade secrets) and publicly cataloged. Well a few days ago we went one step a huge leap even further: we announced our Global Transparency Initiative. We did so to dispel any remaining doubts as to the purity of our products, and also to emphasize the transparency of our internal business processes and their conformity to the highest standards in the industry.

So what are we actually going to do?

First, we’ll be inviting independent organizations to analyze the source code of our products and updates. And they can analyze literally everything – right down to the last byte of the very oldest of our backups. The key word here is independent. Closely behind it is another key word: updates; the analysis and audit won’t be just of the products but the equally important updates as well.

Second, we’ll have a similarly independent appraisal of (i) our secure-development-lifecycle processes and software, and (ii) our supply-chain risk-mitigation strategies that we apply in delivering our products to the end user.

Third, we’ll be opening three Transparency Centers – in the U.S., Europe and Asia – where customers, partners and government representatives can get exhaustive information about our products and technologies and conduct their own analyses and evaluations.

And that’s only the start of it. We’ve plenty more plans to become even more transparent – as transparent as air (and no jokes please about pollution or smog in large cities:). We’re only just kicking off this project, but we’ll be regularly sharing with you more as we go along. Stay tuned…

PS: If you have any ideas, suggestions or other comments – do let us know, here.