In 2004, Hewlett-Packard Enterprise's Kirk Bresniker set out to make radical changes to computer architecture with The Machine and drew out the first concept design on a whiteboard.At the time Bresniker, now chief architect at HP Labs, wanted to build a system that could drive computing into the future. The goal was to build a computer that used cutting-edge technologies like memristors and photonics.It's been an arduous journey, but HPE on Tuesday finally showed a prototype of The Machine at a lab in Fort Collins, Colorado.It's not close to what the company envisioned with The Machine when it was first announced in 2014 but follows the same principle of pushing computing into memory subsystems. The system breaks the limitations tied to conventional PC and server architecture in which memory is a bottleneck.To read this article in full or to leave a comment, please click here
In 2004, Hewlett-Packard Enterprise's Kirk Bresniker set out to make radical changes to computer architecture with The Machine and drew out the first concept design on a whiteboard.At the time Bresniker, now chief architect at HP Labs, wanted to build a system that could drive computing into the future. The goal was to build a computer that used cutting-edge technologies like memristors and photonics.It's been an arduous journey, but HPE on Tuesday finally showed a prototype of The Machine at a lab in Fort Collins, Colorado.It's not close to what the company envisioned with The Machine when it was first announced in 2014 but follows the same principle of pushing computing into memory subsystems. The system breaks the limitations tied to conventional PC and server architecture in which memory is a bottleneck.To read this article in full or to leave a comment, please click here
Even though larger cloud providers offer security and implementation guidelines, companies still face significant risks and challenges when deploying secure applications to the cloud. A new class of security-focused cloud platforms promises to bridge this gap, bringing best-practices and regulatory compliance with the convenience of platform as a service (PaaS).Notable examples of this type of company include Datica, Healthcare Blocks and Aptible, all founded in 2013 and all container-based. These companies boast elite security and DevOps teams that work to secure their products and write new features.Their services are available at low price points and provide a convenient security framework that allows their customers to focus their development efforts on function rather than security.To read this article in full or to leave a comment, please click here
The WannaCry ransomware has wormed its way into tens of thousands of Windows PCs in China, where Windows XP runs one in five systems, local reports said Monday.More than 23,000 IP addresses in the People's Republic of China (PRC) show signs of infection, the country's National Computer Network Emergency Response Technical Team/Coordination Center (CNCERT) told Xinhua, the state-run news agency, on Monday.[ Further reading: Fighting ransomware: A fresh look at Windows Server approaches ]
"Intranets in many industries and enterprises involving banking, education, electricity, energy, healthcare and transportation have been affected in different extents," CNCERT said.To read this article in full or to leave a comment, please click here
Your voice is yours alone – as unique to you as your fingerprints, eyeballs and DNA.Unfortunately, that doesn’t mean it can’t be spoofed. And that reality could undermine one of the promised security benefits of multi-factor authentication, which requires “something you are,“ along with something you have or you know. In theory, even if attackers can steal passwords, they can’t turn into you.But given the march of technology, that is no longer a sure thing. Fingerprints are no longer an entirely hack-proof method of authentication – they can be spoofed.To read this article in full or to leave a comment, please click here
As more groups get into the denial-of-service attack business they're starting to get in each other's way, according to a report released this morning.That translates into a smaller average attack size, said Martin McKeay, senior security advocate at Cambridge, Mass.-based Akamai Technologies Inc.There are only so many devices around that have the kind of vulnerabilities that make them potential targets for a botnet."And other people can come in and take over the device, and take those resources to feed their own botnet," he said. "I'm seeing that over and over."To read this article in full or to leave a comment, please click here
Trying to land a new job or angling for a promotion? Recruiters and hiring managers are always on the hunt for ideal candidates with just the right mix of tech savvy, experience and soft skills to give their organizations a competitive advantage. But all technology skills are not created equal.To read this article in full or to leave a comment, please click here(Insider Story)
"If businesses fail to unify the company with a common goal, they risk a mis-allocation of resources, internal competition that halts project completion, and they'll miss out on a wealth of creative ideas," says Pellas.Shifting corporate culture takes effort, but the payoff is worth the push. Pellas offers three reasons why your corporate culture is leaving innovation stagnant, and how you can work to shift workers' attitudes.[ Related story: Want to foster innovation? Get out of your comfort zone ] To read this article in full or to leave a comment, please click here
Digital signature service DocuSign said Monday that an unnamed third-party had got access to email addresses of its users after hacking into its systems.The hackers gained temporary access to a peripheral sub-system for communicating service-related announcements to users through email, the company said. It confirmed after what it described as a complete forensic analysis that only email addresses were accessed, and not other details such as names, physical addresses, passwords, social security numbers, credit card data or other information.“No content or any customer documents sent through DocuSign’s eSignature system was accessed; and DocuSign’s core eSignature service, envelopes and customer documents and data remain secure,” DocuSign said in a post. To read this article in full or to leave a comment, please click here
The carrier-led Small Cell Forum has revealed the names of the founding members of an Enterprise Advisory Council designed to help address the need for more wireless coverage to meet rising demand.The Forum — whose members include the likes of AT&T, Cisco and Huawei —had previously said it was forming such a council, but had not disclosed any member organization names. It also had said it was working with hotels and others in the hospitality industry to plot strategies for boosting cellular coverage to meet the needs of their customers (an industry, by the way, that hasn't always been very hospitable when it comes to wireless service, as seen in the Wi-Fi blocking schemes of some).To read this article in full or to leave a comment, please click here
As security researchers investigate last Friday’s massive attack from the WannaCry ransomware, they’ve noticed clues that may link it with a North Korean hacking group that has been blamed for attacking banks across the world.The evidence is far from a smoking gun, and may prove inconclusive. But security researchers have noticed a similarity between an earlier version of WannaCry and a hacking tool used by the Lazarus Group.To read this article in full or to leave a comment, please click here
Intel has released the final versions of its Itanium RISC processor, the Itanium 9700 series, which are virtually unchanged from the last generation and uses a 5-year-old architecture. There are no new features or capabilities, just the most minor of clock speed bumps. In a reflection of how old the designs are, they come in four- and eight-core design with hyperthreading for twice the number of threads. Xeons are now coming with up to 22 cores. Clock speeds are 1.7Ghz to 2.66Ghz and the thermal package is 170 watts. A 3.4Ghz Xeon E7 with 22 cores runs at 165 watts. These things aren’t even remotely competitive, and Intel didn’t really try to address it. The quad core Itanium CPUs get a 133MHz speed bump, while the dual cores get no speed changes. To read this article in full or to leave a comment, please click here
If you work at Apple's One Infinite Loop headquarters in Cupertino as a computer programmer on an H-1B visa, you can can be paid as little as $52,229. That's peanuts in Silicon Valley. Average wages for a programmer in Santa Clara County are more than $93,000 a year, according to the U.S. Bureau of Labor Statistics.However, the U.S. government will approve visa applications for Silicon Valley programmers at $52,229 -- and, in fact, did so for hundreds of potential visa holders at Apple alone.To be clear, this doesn't mean there are hundreds of programmers at Apple working for that paltry sum. Apple submitted a form to the U.S. saying it was planning on hiring 150 computer programmers beginning June 14 at this wage. But it's not doing that.To read this article in full or to leave a comment, please click here
What is incident response?Image by ThinkstockIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any holes. Discover any cuts in your chain link fence. Take a few steps back for more perspective. Find the intruder’s targets. What assets are near the compromised fence? Investigate in both directions to find the intruder's target and getaway car. Fix the fence. Resolve any issues and patch vulnerabilities.To read this article in full or to leave a comment, please click here
The CEO puts all the trust in the chief security officer to keep the company off the front page and out of danger. But as the number of attacks across the internet skyrockets, that trust has slowly eroded or at the very least is increasingly questioned.CEOs don’t want to be caught off-guard, so they are asking pointed questions to ensure they know what security precautions are being taken. Here is a hypothetical Q&A between a CEO or board member and the CISO. Lucas Moody, vice president and CISO at Palo Alto Networks, and Dottie Schindlinger, Governance Technology Evangelist at Diligent, provided insight with these interactions.CEO: Why are we getting more phishing attacks? And what are we doing about all these phishing attacks?To read this article in full or to leave a comment, please click here
In just a few days, Google will kick off its annual I/O conference and the year of Android will finally begin in earnest. The company has been busy, but until Sundar Pichai takes the stage at the Shoreline Amphitheater, we won’t know for sure what Google has in store for the rest of 2017.Last year we met a new Google Assistant, Daydream, Home, Allo, Duo, and, of course, Android N, and we can’t wait to see what Google rolls out this year. Google usually keeps a pretty tight lid on its biggest announcements, but it seems like it’s doubled-down on security leaks this year. The rumor mill has been oddly quiet with the show mere days away from starting, and we’re on pins and needles waiting to see what Google has to show us. So here’s what we think and hope we’re going to see:To read this article in full or to leave a comment, please click here
When it comes to rock-solid proof of responsibility or fault, few pieces of evidence are as useful—or indisputable—as a photograph. That’s why restaurants, auto insurers, apartment management companies and health inspectors take millions of photographs every year. In case of a dispute or lawsuit they want to mitigate their risk by being able to prove they were in compliance with all relevant laws and codes.Despite the value of photographs, however, most companies haven’t integrated image management into their IT systems. This not only makes it difficult, if not impossible, to provide potentially exculpatory evidence, but it is also a significant barrier to establishing formal protocols for using photographs in existing inspection workflows.To read this article in full or to leave a comment, please click here
EDITOR’S NOTE: This is the third in a series on smart home networking: Our introductory article set the decor for this series, and the second one focuses on home hubs.To read this article in full or to leave a comment, please click here(Insider Story)
As enterprises start to think about building Internet of Things (IoT) networks, the key question becomes: What’s happening on the standards front?To read this article in full or to leave a comment, please click here(Insider Story)