Archive

Category Archives for "Network World SDN"

U.S. convicts Russian hacker in credit card theft scheme

Jurors in a U.S. federal court have convicted a Russian hacker of stealing and selling more than 2 million credit card numbers.On Thursday, the jury in Seattle found Roman Valerevich Seleznev guilty of charges related to his hacking of point-of-sale systems.Seleznev was arrested in 2014 after U.S. authorities accused him of installing malicious software on point-of-sale systems in U.S. restaurants .From 2009 to 2013, Seleznev used this scheme to steal credit card data from businesses and send it back to his servers in Ukraine and McLean, Virginia. The stolen data was then sold on the black market, with Seleznev promising that buyers could make fraudulent purchases with them.To read this article in full or to leave a comment, please click here

12 tips to help SMBs select and manage vendors

Picking good suppliers and partners is critical to your company’s success, especially a smaller, growing business. Pick a vendor that is difficult to work with, doesn’t provide a service as promised, isn’t there when you need help and/or hits you with hidden fees, and your company could be in serious trouble. So what steps can you take to help ensure you don’t wind up in a bad business relationship? Here are 12 strategies for selecting the right business partners and suppliers. 1. Make a list of your requirements and expectations. “One of the most important parts of creating and maintaining vendor/partner relationships is to have very clearly spelled out expectations at the onset,” says Diane Helbig of Seize This Day. “Establish an understanding of what each party will bring to the relationship, when and how. That gives you something to measure the relationship against and let’s your partner/vendor know not only what you want from them, but what you will be bringing to the relationship.”To read this article in full or to leave a comment, please click here

Windows 10 troubleshooting and fixes revisited

Long before the Windows 10 Anniversary Update appeared, it was obvious that Microsoft was putting more energy and effort into its troubleshooting tools. These are readily available by typing "trouble" into Cortana (or the search box, if you prefer) and then selecting the Troubleshooting (Control panel) result. What I didn't know at the time was that the future of Windows 10 didn't include fix-its.To read this article in full or to leave a comment, please click here(Insider Story)

Apple patches iOS security flaws found in spyware targeting activist

To spy on a human rights activist, hackers allegedly connected to a Middle Eastern government used three previously unknown vulnerabilities in Apple’s iOS.The claims -- from research at Toronto-based Citizen Lab and mobile security firm Lookout -- focus on spyware that targeted Ahmed Mansoor, an activist in the United Arab Emirates.Earlier this month, Mansoor received an SMS text message on his iPhone claiming to offer “new secrets” about tortured detainees in his country. However, inside the message was a link that, once clicked, can infect an iPhone with spyware, using three zero-day exploits of iOS, the research found.To read this article in full or to leave a comment, please click here

Apple patches iOS against potent zero-day spyware attack

Apple is issuing patches for three iOS zero-day vulnerabilities known as Trident that have been exploited for years by an Israel-based spyware vendor against a human rights activist, an investigative journalist and others.The attack, called Pegasus, is flexible, letting attackers steal a broad range of data from iPhones and iPads, according to the firms that discovered it.“In this case, the software is highly configurable: depending on the country of use and feature sets purchased by the user, the spyware capabilities include accessing messages, calls, emails, logs, and more from apps including Gmail, Facebook, Skype, WhatsApp, Viber, FaceTime, Calendar, Line, Mail.Ru, WeChat, SS, Tango, and others,” according to a blog post by Lookout Security, which, along with Citizen Lab, unearthed the vulnerabilities and Pegasus.To read this article in full or to leave a comment, please click here

Informatica CEO: ‘Data security is an unsolved problem’

Companies today are awash in data, but current tools and processes are not enabling them to keep it secure.That's according to Informatica CEO Anil Chakravarthy, whose says his company -- which has traditionally focused on data management and integration -- is embarking on a major push to go further into data security."You hear about breaches all the time -- just imagine all the ones you're not hearing about," Chakravarthy said in a recent interview. "Data security today is an unsolved problem for customers."Last year, Informatica launched a product called Secure@Source that promises a data-centric approach to information security by helping organizations identify and visualize sensitive data wherever it resides.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Survey: Kids now online at age 3

The Internet has changed young children’s lives and they now are as comfortable picking up an iPad as they are a coloring book.Kids now spend twice as much time on the Internet as they did 10 years ago, and it’s escalating, research from an age-verification software developer has discovered.UK-based Agechecked says that over a quarter of kids there (28 percent) are using the Internet before they attend their first school. The statutory school age there is from five years old.And “one in six children, or 16 percent, begin their online experience at age three or under” the report (PDF) claims. Parents need to get aware, the company believes, and they should be acquainting themselves with their kids’ habits.To read this article in full or to leave a comment, please click here

12 most powerful hyperconverged infrastructure vendors

For organizations that want the agility of public cloud infrastructure but want the security and peace of mind of hosting the hardware on their own premises, hyperconverged infrastructure has emerged as a dominant hardware platform for hosting private clouds, virtual desktops and new application development environments. Over the past five years the hyperconverged infrastructure (HCI) market has evolved out of its preceding converged infrastructure (CI). Like CI, HCI’s foundational elements include an integrated compute, network and storage infrastructure offering. Unlike CI, HCI goes a step further with a software that sits atop the virtualized components that control the entire system. This creates software-defined storage, networking and compute, allowing resources to be spun up and down rapidly and through API calls. Research firm Forrester predicts that HCI systems will “become ubiquitous” as a common platform for deploying on-premises infrastructure.To read this article in full or to leave a comment, please click here

Why cloud architecture matters: The advantages of multi-instance vs. multi-tenant

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.The first public cloud services went live in the late 1990s using a legacy construct called a multi-tenant architecture, and while features and capabilities have evolved, many cloud services are still based on this 20th century architecture. That raises serious questions about how legacy clouds prepare for calamity. While all architectures are susceptible to hardware failures and other issues that cause outages, the clouds that use a  multi-instance architecture can better minimize the impact of an outage. To read this article in full or to leave a comment, please click here

How CloudHealth Technologies keeps your clouds healthy

The world of cloud management is a fractured and busy one. There are cloud managers that help you control costs, ones that help you track usage, ones that monitor performance and others that provide infrastructure provisioning.Cloud Health Technologies Founder and CTO Joe Kinsella saw an opportunity in the market four years ago for another type of cloud management product: One that integrates all of those disparate cloud management tools together and provides centralized visibility into them. CloudHealth Technologies was born.+MORE AT NETWORK WORLD: 4 Tips for buying cloud management software +To read this article in full or to leave a comment, please click here

50% off Sennheiser PC 363D High Performance Surround Sound Gaming Headset – Deal Alert

Combining Sennheiser headphone and microphone engineering with Dolby Laboratory 7.1 surround sound techhologies takes gaming to another dimension. Sennheiser's technology angles the drivers in the ear cups channeling the sound directly into your ears. This improves sonic detail, definition and dynamics. Dolby's 7.1 technology comes via a USB sound card providing headphone control and remarkable spacial effects letting you accurately pin point sounds with 3D like dimensionality. Averaging 4.5 out of 5 stars on Amazon (read reviews), the list price of $299.95 has been reduced a significant 50% to just $149.95.  See the discounted Sennheiser PC 363D surround sound gaming headset now on Amazon.To read this article in full or to leave a comment, please click here

Intel spreads 3D NAND to inexpensive consumer and enterprise SSDs

Intel is expanding its lineup of SSDs with its 3D NAND chips with more affordable consumer and enterprise drives.The 3D NAND chips have a structure that makes SSDs durable and fast but was only available in a handful of drives. The new SSDs support the NVMe protocol, which offers faster throughput than the SATA controller originally designed for hard drives.The new SSDs include entry-level consumer drives starting under US$100. Gamers may want to wait, however, until Intel releases its crazy-fast Optane SSDs, which the chip maker claims will be up to 10 times faster than regular SSDs.The consumer SSD 600p series for PCs starts at $69 for a 128GB drive and ranges to $359 for a 1TB drive.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Fraud follows mobile banking adoption

Since 2011, the Federal Reserve Board has conducted an annual survey that asks consumers how they use their mobile phones to interact with financial institutions, make payments, and manage their personal finances.Here are some of the key takeaways from the 2016 survey: In 2015, 67% of Millennials used mobile banking. This compares to 18% for those consumers aged 60 or over. And the usage gap is widening. 40% of the unbanked had access to a smartphone. 70% of the underbanked were smartphone owners. Driven by lower requirements for account creation, lower cost of banking, and ease of use of mobile banking solutions, consumers who have traditionally been excluded from the banking system and consumers who are coming of age for banking solutions are adopting mobile banking rather than opting for traditional banking solutions like ATMs or branch tellers. The accelerated adoption of mobile banking by Millennials, the underbanked and the unbanked is even more obvious in developing markets which (a) have a lot more underbanked and unbanked consumers and which (b) are leapfrogging desktop Internet to move directly to mobile Internet.To read this article in full or to leave a comment, please click here

Key Success factors for adopting Node.js

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Node.js is an open source, cross-platform runtime environment for server-side and network applications. Since its inception, it’s also become widely used for front-end tooling, APIs, desktop applications, and even controlling IoT hardware like drones. Node.js applications are written in JavaScript. The growing popularity and adoption of Node.js is the result of a confluence of several factors.First, there is an increasing need by companies of all sizes to quickly build scalable, fast, distributed web applications. Second, large enterprises are finding there is inherent risk associated with running large, complex monolithic applications due to the difficulty and cost of tuning, maintaining, patching, and debugging them — and the challenges this poses to business responsiveness. Third, software developers are looking to develop a skillset that prepares them for the new market reality of agile practices, continuous integration and delivery, cloud-scale application design and a highly mobile and demanding user base.To read this article in full or to leave a comment, please click here

Cisco: US Trade Rep. backing Arista product import ban

The knives are out again between Cisco and Arista over their patent clash. Cisco this week said the US Trade Representative has begun the import ban as well as the cease and desist order covering Arista products imposed by the International Trade Commission in June.+More on Network World: Arista infringes on Cisco networking patents, trade agency says+According to a blog post from Mark Chandler, Senior Vice President, General Counsel and Secretary of Cisco, the current action which took effect Aug. 23 has serious consequences for its rival. He wrote:To read this article in full or to leave a comment, please click here

31% off Logitech Harmony Smart Control with Smartphone App and Simple All In One Remote – Deal Alert

The Logitech Harmony Smart Control systems turns you smartphone or tablet into a one-touch universal remote. Now you can control your entire entertainment system with the smartphone or tablet you already own. The Harmony Hub combined with a powerful app give you personalized control of up to 8 devices and works with over 270,000 devices including cable TV boxes, Apple TV, Roku, Sonos, Amazon Fire TV, Phillips Hue, Xbox One, PS3, and TV-connected PC or Mac—even through closed cabinets and walls. Plus, you get a simple Harmony remote for everyone in the house to use when your smartphone isn’t handy.  This system currently averages 4 out of 5 stars on Amazon from 1,900+ people (read reviews) and its list price of $129.99 has been reduced to $89.99.To read this article in full or to leave a comment, please click here

So your company’s been hacked: How to handle the aftermath

After a company has been hacked and the hack has been discovered to be a harmful one, top executives and IT leaders normally huddle in a room to assess the loss.It's usually not a pretty scene.It's not as if heads are exploding. It is more like what some might call a tense "come to Jesus" moment."It's not good," said cyber security expert Tyler Cohen Wood. She's participated in post-hack forensics sessions at companies and has witnessed the faces of panicked executives firsthand. Inspired eLearning Tyler Cohen Wood is cyber security advisor to elearning company Inspired eLearning, and was previously a Defense Intelligence Agency cyber deputy division chief.To read this article in full or to leave a comment, please click here

VR, machine learning drive tech job market

Free catered lunch and a dog-friendly office are two of the perks offered by an educational technology company in Palo Alto, Calif., that’s looking to hire a machine learning engineer. The position, posted on Dice, will pay between $140,000 and $160,000 to the right candidate who’s skilled in machine learning platforms as well as data mining, statistical modeling, and natural language processing.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cisco boots Nutanix from partner program

Cisco Cuts Nutanix from the Partner Portal Less than a week after Nutanix issued a press release announcing their independently validated ability to run on Cisco UCS, Nutanix has been booted from the Cisco Solution Partner Program. Cisco has its own hyperconverged solution utilizing UCS hardware, bundled together through an agreement with software company Springpath, which they call Hyperflex.To read this article in full or to leave a comment, please click here

Cisco starts patching firewall devices against NSA-linked exploit

Cisco Systems has started releasing security patches for a critical flaw in Adaptive Security Appliance (ASA) firewalls targeted by an exploit linked to the U.S. National Security Agency.The exploit, dubbed ExtraBacon, is one of the tools used by a group that the security industry calls the Equation, believed to be a cyberespionage team tied to the NSA.ExtraBacon was released earlier this month together with other exploits by one or more individuals who use the name Shadow Brokers. The files were provided as a sample of a larger Equation group toolset the Shadow Brokers outfit has put up for auction.To read this article in full or to leave a comment, please click here