There are now 200 companies standing behind Privacy Shield, the framework agreement allowing businesses to process the personal information of European Union citizens on servers in the U.S.Companies must register with the International Trade Administration of the U.S. Department of Commerce to be covered. It's a self-certification process, so the ITA is only checking that the forms are filled in correctly, not that companies are necessarily complying with all 13,894 words of the rules. The Privacy Shield rules are needed to ensure that EU citizens' personal information is afforded the same legal protection in the U.S. as required under EU law.To read this article in full or to leave a comment, please click here
Mobile commerce shows no signs of slowing its furious pace of growth, as consumers get comfortable using their smartphones and tablets to shop anytime and anywhere they want: In a report titled “U.S. Mobile Phone and Tablet Commerce Forecast, 2015 to 2020,” Forrester Research estimates that mobile commerce sales will reach $142 billion this year, up from $115 billion last year.To read this article in full or to leave a comment, please click here(Insider Story)
According to Red Hat CEO Jim Whitehurst, the prevailing narrative about the growth and spread of Linux is only half-true.The idea that a doughty community of coding geniuses, led by an irascible commissar in Linus Torvalds, quietly created a technological asset that eventually spread to the biggest users in the land is actually a little misleading, he told Network World at LinuxCon North America 2016 in Toronto.+ALSO ON NETWORK WORLD: Linux at 25: A retrospective + Linux at 25: Linus Torvalds on the evolution and future of LinuxTo read this article in full or to leave a comment, please click here
The 25 million account passwords stolen from Mail.Ru in a recently discovered hack were old and invalid, the Russian internet company said Wednesday.“The security of our users wasn’t compromised in any way,” a Mail.Ru spokeswoman said in an interview.The hack targeted forums for game projects that the company has acquired over the years. These include subdomains at cfire.mail.ru, parapa.mail.ru and tanks.mail.ru. Hackers stole passwords of users who participated in the forums.However, the company said the stolen passwords were legacy data. None of them were related to current email accounts or other Mail.Ru services.To read this article in full or to leave a comment, please click here
Twitter users aren’t the only ones checking the microblogging service for important updates. Android malware is starting to do so, too.One maker of Android malware is using Twitter to communicate with infected smartphones, according to security firm ESET.The company discovered the feature in a malicious app called Android/Twitoor. It runs as a backdoor virus that can secretly install other malware on a phone.Typically, the makers of Android malware control their infected smartphones from servers. Commands sent from those servers can create a botnet of compromised phones and tell the malware on all the phones what to do.The makers of Android/Twitoor decided to use Twitter instead of servers to communicate with the infected phones. The malware routinely checks certain Twitter accounts and reads the encrypted posts to get its operating commands.To read this article in full or to leave a comment, please click here
What a long, strange 25 years it’s beenImage by Reuters: USA Today Sports/Baz Ratner, WikimediaFrom its obscure origins to its present primacy, Linux is now old enough to rent a car without having to pay extra for insurance. It has also been described as the “the greatest shared technology asset in history,” and it’s the chassis upon which a sizeable proportion of all the software on the planet is built. Here’s a quick look back at Linux’s history.To read this article in full or to leave a comment, please click here
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Software-defined Wide Area Networking is red hot. It is safe to assume that, going forward, every multi-location business will rely on SD-WAN for a cost-effective, high-quality, unified network solution.In fact, IDC recently released a report predicting SD-WAN revenue will reach $6 billion in 2020. Why? Because SD-WANs are secure, affordable and easy-to-use. Those three magic words are enough to turn any CEO’s head, and the benefits go well beyond that. SD-WANs address a confluence of issues that multi-location businesses are facing right now.To read this article in full or to leave a comment, please click here
This smart plug from Akface allows you to remotely turn appliances and electronics on or off from anywhere in the world. Perfect for household appliances, lamps, window a/c units, and more. After connecting this plug to your house's wifi, you can easily control on/off, program the plug to follow an on/off schedule, and more. Currently averaging 4 out of 5 stars on Amazon (read reviews), the typical list price of $50.99 has been reduced 55% to $22.89. To read this article in full or to leave a comment, please click here
There was a time when Cisco routers were unstoppable, and their deviations into proprietary protocols and constructions were accepted because Cisco could do no wrong. They were the smartest kids in networking protocols.But there is a crack in their armor, a glitch in the Teflon. Cisco may not be the only networking infrastructure vendor to now face an attack ostensibly from their own government, just the largest.Just as the U.S. government has taken Huwaei to task for an accusation of hidden code benefiting the Chinese government, other governments across the planet now know that their Cisco infrastructure can be cracked open—and no, it’s not easy, and requires an additional step of having hacked in from some place else.To read this article in full or to leave a comment, please click here
Small is beautiful, as the old saying goes, and nowhere is that more true than in media files. Compressed images are considerably easier to transmit and store than uncompressed ones are, and now Google is using neural networks to beat JPEG at the compression game.Google began by taking a random sample of 6 million 1280×720 images on the web. It then broke those down into nonoverlapping 32×32 tiles and zeroed in on 100 of those with the worst compression ratios. The goal there, essentially, was to focus on improving performance on the "hardest-to-compress" data, because it's bound to be easier to succeed on the rest.The researchers then used the TensorFlow machine-learning system Google open-sourced last year to train a set of experimental neural network architectures. They used one million steps to train them and then collected a series of technical metrics to find which training models produced the best-compressed results.To read this article in full or to leave a comment, please click here
A vulnerability in a widely-used internet forum software is becoming a go-to method for hackers to steal data.Hackers recently targeted 11 different sites, many of them from Russia, and stole information from more 27 million Internet accounts, according to LeakedSource, a repository for data breaches. About 25 million accounts of those accounts were from cfire.mail.ru, parapa.mail.ru, and tanks.mail.ru, all of them Russian language games. Another 1 million were tied to gaming titles from Funcom, including The Secret World and Age of Conan. The stolen data includes email addresses and hashed passwords that can be easily cracked.To read this article in full or to leave a comment, please click here
The Venstar Waterproof Sport Bluetooth Speaker has been designed for bicycling and outdoor sports. Enjoy music when you are riding on road or climbing a mountain. Excellent TPU material provides shockproof capability. The companion remote conrtol allows you to control the volume, skip to the next track or answer a call at the press of a button. This bicycle speaker currently receives 4.5 out of 5 stars on Amazon (read reviews). Amazon indicates that it's typical list price of $159.99 has been reduced 71% to $45.99.To read this article in full or to leave a comment, please click here
Microsoft has talked up its well-regarded virtual reality headset called HoloLens, but has been a little stingy on some technical details, such as what's powering the device.However, it finally took the wraps off that mystery at an appropriate show. Microsoft detailed for the first time its custom CPU for HoloLens at Hot Chips, an annual semiconductor conference held at Stanford University every August.Hot Chips is a great show, and I miss attending it even more than IDF, since a variety of chip vendors show up to talk. Between the extreme technical detail from Ph.D. engineers and some brutal accents, it requires your full attention, but that's not a hard thing to do because the insights are often fascinating.To read this article in full or to leave a comment, please click here
The Moscow bureau of The New York Times was the target of a cyberattack, though there are no indications yet that the hackers were successful, according to the newspaper.The hackers are believed to be Russian, the newspaper said Tuesday evening. It quoted a spokeswoman for the newspaper as saying that it had not hired outside firms to investigate the attempted breach.Earlier in the day, CNN reported that the FBI and other U.S. security agencies were investigating attacks by hackers, thought to be working for Russian intelligence, that targeted reporters at the New York Times and other U.S. news organizations. CNN quoted unnamed U.S. officials briefed on the matter.To read this article in full or to leave a comment, please click here
Researchers want to give a 25-core open-source processor called Piton some serious bite.
The developers of the chip at Princeton University have in mind a 200,000-core computer crammed with 8,000 64-bit Piton chips.
It won't happen anytime soon, but that's one possible usage scenario for Piton. The chip is designed to be flexible and quickly scalable, and will have to ensure the giant collection of cores are in sync when processing applications in parallel.
Details about Piton were provided at the Hot Chips conference this week. The goal was to design a chip that could be used in large data centers that handle social networking requests, search and cloud services. The response time in social networking and search is tied to the horsepower of servers in data centers.To read this article in full or to leave a comment, please click here
Cloud computing is changing the demands on networks more quickly than ever. Now researchers say it’s possible to program routers all the way down to their packet-forwarding chips in the quest to keep up.Researchers from the Massachusetts Institute of Technology and five other organizations have found a way to make data-center routers more programmable without making them slower. This could allow enterprises to take advantage of new traffic and congestion management algorithms without replacing their routers.The project takes SDN (software-defined networking) beyond the control plane, where things like configuration are handled, and into the data plane that actually forwards packets. Now programmers can change how the network decides which packets to send and which to keep in a buffer, for example. Eventually, that might mean deploying networks with fewer routers.To read this article in full or to leave a comment, please click here
MovieSherlock converts the videos you download to MP4 and MP3 formats, all saved in high-definition native video format at 1080P/780P quality. So you can download your video 15 times faster than real time, perfect for stockpiling hours of HD video for later viewing.This MovieSherlock Pro Video Downloader program is currently 62% off, and iIf you’re a movie buff, MovieSherlock Pro Video Downloader for Mac is about to be your new best friend. The software lets you download videos from nearly any website, including both YouTube and Hulu. See it now for $15 for a limited time only.To read this article in full or to leave a comment, please click here
It’s never a good sign when a website markets itself with a phony security award. But that’s what Ashley Madison did prior to last year’s massive data breach.On Monday, privacy officials in Canada and Australia found that the Canadian adultery website used deceptive and confusing practices to make customers think the service was secure.Privacy authorities from both countries have been investigating Ashley Madison following last year’s hack, which exposed personal data on 36 million users, including names, credit card numbers, and in some cases, their sexual fantasies. To read this article in full or to leave a comment, please click here
The wireless mesh wave is in high gear now. Just a day after Netgear announced its new wireless mesh-based home Wi-Fi system (Orbi), Amped Wireless today announced that pre-orders were now open for its system, the ALLY Wi-Fi System.The system is a wireless mesh system (Amped Wireless calls it a “seamless roaming solution”) that includes MU-MIMO technology, AC1900 Wi-Fi (802.11ac) and a mobile app for setup and network monitoring purposes. Customers can buy one unit (aka the ‘router’) for $199.99, or buy a two-unit system (with a ‘router’ and ‘extender’, branded ALLY Plus) for $379.99. Amped Wireless says the units will ship in early October. The two units are pre-paired and labeled as a router and extender, similar to the Netgear Orbi system. This is different from systems by eero and Luma, which are identical units that then become routers or extenders based on placement during the setup process.To read this article in full or to leave a comment, please click here