Archive

Category Archives for "Networking"

Facebook appeal over New York search warrants fails

Facebook’s appeal against 381 warrants for information from the accounts of its users was rejected by a New York court on the ground that earlier orders refusing to quash the warrants issued in a criminal proceeding could not be appealed.The decision by the New York State Court of Appeals did not address key issues of whether the broad searches were unconstitutional, and whether internet service providers like Facebook have standing to challenge such warrants on behalf of their users, particularly when they are served with ‘gag orders’ that prevent providers from informing subscribers about the warrants.“This case undoubtedly implicates novel and important substantive issues regarding the constitutional rights of privacy and freedom from unreasonable search and seizure, and the parameters of a federal statute establishing methods by which the government may obtain certain types of information,” wrote Judge Leslie E. Stein, writing for the majority.To read this article in full or to leave a comment, please click here

Facebook appeal over New York search warrants fails

Facebook’s appeal against 381 warrants for information from the accounts of its users was rejected by a New York court on the ground that earlier orders refusing to quash the warrants issued in a criminal proceeding could not be appealed.The decision by the New York State Court of Appeals did not address key issues of whether the broad searches were unconstitutional, and whether internet service providers like Facebook have standing to challenge such warrants on behalf of their users, particularly when they are served with ‘gag orders’ that prevent providers from informing subscribers about the warrants.“This case undoubtedly implicates novel and important substantive issues regarding the constitutional rights of privacy and freedom from unreasonable search and seizure, and the parameters of a federal statute establishing methods by which the government may obtain certain types of information,” wrote Judge Leslie E. Stein, writing for the majority.To read this article in full or to leave a comment, please click here

Kansas City: Cloudflare’s 106th Data Center Now Live

CC-BY 2.0 image by Vincent Parsons

Kansas City, Missouri. Home to the Kansas City Royals, Swope Park, over 100 barbeque restaurants, and now, Cloudflare's 106th data center. We are excited to help make 6 million websites even faster in the Midwest, as our newest deployment joins existing United States facilities in Ashburn, Atlanta, Boston, Chicago, Dallas, Denver, Las Vegas, Los Angeles, Miami,
Minneapolis, Nashville, Newark, Omaha, Philadelphia, Phoenix, San Jose, Seattle, St. Louis, and Tampa.

BBQ!

CC-BY 2.0 image by Shelby Bell

Anthony Bourdain said it best with regards to Joe's KC BBQ in his "13 Places to Eat Before You Die" (alongside Michelin 3-star restaurants like French Laundry and Le Bernardin):

"People may disagree on who has the best BBQ. Here, the brisket (particularly the burnt ends), pulled pork, and ribs are all of a quality that meet the high standards even of Kansas City natives. It's the best BBQ in Kansas City, which makes it the best BBQ in the world."

Visit Kansas City to find the world’s largest shuttlecocks outside the Nelson Atkins Art Museum, as Continue reading

Cisco says Arista’s redesign moves not good enough

The legal battle between Cisco and Arista is heating up as the two sides square off again in court this week in a hearing about their technology patent infringement and enforcement case.This hearing is the latest round in an ongoing battle that began in 2014. Most recently,   in January the U.S. Customs and Border Protection (CBP) agency revoked its November 2016 finding that Arista’s redesigned products don’t infringe a key Cisco patent -- as a result Cisco called on Arista to stop importing those products and recall others sold with redesigned software.To read this article in full or to leave a comment, please click here

Cisco says Arista’s redesign moves not good enough

The legal battle between Cisco and Arista is heating up as the two sides square off again in court this week in a hearing about their technology patent infringement and enforcement case.This hearing is the latest round in an ongoing battle that began in 2014. Most recently,   in January the U.S. Customs and Border Protection (CBP) agency revoked its November 2016 finding that Arista’s redesigned products don’t infringe a key Cisco patent -- as a result Cisco called on Arista to stop importing those products and recall others sold with redesigned software.To read this article in full or to leave a comment, please click here

58% off LOOP Worldwide Travel Adapter with Dual USB Charging Ports – Deal Alert

Power and charge in over 150 Countries with US UK EU & AUS/CHINA Plugs. This adapter works in Canada, Russia, Asia, Central America, South America and the Middle East to name a few. Dual USB charging ports for simultaneously charging your USB devices as well. A 6-amp fuse (and built-in spare fuse) is included, as well as an 18-month warranty. LOOP's travel adapter averages 4 out of 5 stars on Amazon from over 580 people (read reviews). It's $39.95 list price has been reduced a generous 58% to just $16.75. To learn more, or to take advantage of this discount, hop over to Amazon. To read this article in full or to leave a comment, please click here

Chinese hackers go after third-party IT suppliers to steal data

Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers. Major IT suppliers that specialize in cloud storage, help desk, and application management have become a top target for the hacking group known as APT10, security providers BAE Systems and PwC said in a joint report.That's because these suppliers often have direct access to their client's networks. APT10 has been found stealing intellectual property as part of a global cyberespionage campaign that ramped up last year, PwC said on Monday.To read this article in full or to leave a comment, please click here

Chinese hackers go after third-party IT suppliers to steal data

Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers. Major IT suppliers that specialize in cloud storage, help desk, and application management have become a top target for the hacking group known as APT10, security providers BAE Systems and PwC said in a joint report.That's because these suppliers often have direct access to their client's networks. APT10 has been found stealing intellectual property as part of a global cyberespionage campaign that ramped up last year, PwC said on Monday.To read this article in full or to leave a comment, please click here

How HPE plans to spin out its software assets

After playing a key role in the 2015 bifurcation of Hewlett Packard into the consumer-focused HP Inc. and the enterprise-centric Hewlett Packard Enterprise (HPE), Chris Hsu is busy working on another big split. Hsu, currently HPE’s COO and GM of HPE Software, is preparing to spin out much of HPE’s software portfolio to Micro Focus in a deal announced last September. When the spin is completed, Hsu will also take over as CEO of Micro Focus, which will be a nearly $5 billion software company with a wide portfolio of assets in big data, security, IT operations and more.To read this article in full or to leave a comment, please click here(Insider Story)

What users could expect from Apple’s homegrown GPUs for iPhones, iPads

Apple has one big reason to move to a homegrown GPU: It wants full control over the hardware and software in its devices.The device maker is apparently developing its own GPU from scratch after dumping Imagination Technologies' PowerVR architecture, which is being used in the iPhone 7. The smartphone runs on the PowerVR A10 Fusion chip.It's not certain when Apple's homegrown GPU will appear in devices, and the company didn't respond to request for comment.Apple has made graphics improvement a priority in its iPhone and iPad models, so users should get better gaming experiences.To read this article in full or to leave a comment, please click here

Delphix CEO: We’re having a ‘massive impact’ on the world’s best brands

When Chris Cook was considering taking the job of Delphix CEO, the company was described to him as 'the best kept secret' in the tech industry. Cook, who's been CEO for a year now, will tell you that's not a good thing and he's working hard to change it. Is one of the things that holds Delphix back is that the market for your product is not easily defined? Is there an easy two- or three- or four-word phrase for what you do? To read this article in full or to leave a comment, please click here(Insider Story)

IT leaders share how they quell cybersecurity attacks

Ask CIOs and CISOs what cybersecurity fears keep them up at night and you’ll hear a range of responses -- from social engineering hacks such as phishing, as well as malware that enables perpetrators to hijack users' websites -- the dreaded ransomware -- and denial-of-service attacks. Depending on their business you might hear them say "all of the above."These threats are driving increased spending on cybersecurity tools intended to protect corporate data from nation-state actors, lone wolf attackers and other malcontents who are seeking access to corporate data. IT leaders know that it takes only one well-placed exploit to infiltrate a corporate network, but they also acknowledge that the best approach is to shrink their attack surface and be ready to respond to an incident in the event of an attack.To read this article in full or to leave a comment, please click here

IT leaders share how they quell cybersecurity attacks

Ask CIOs and CISOs what cybersecurity fears keep them up at night and you’ll hear a range of responses -- from social engineering hacks such as phishing, as well as malware that enables perpetrators to hijack users' websites -- the dreaded ransomware -- and denial-of-service attacks. Depending on their business you might hear them say "all of the above."These threats are driving increased spending on cybersecurity tools intended to protect corporate data from nation-state actors, lone wolf attackers and other malcontents who are seeking access to corporate data. IT leaders know that it takes only one well-placed exploit to infiltrate a corporate network, but they also acknowledge that the best approach is to shrink their attack surface and be ready to respond to an incident in the event of an attack.To read this article in full or to leave a comment, please click here

Windows 10 powers 9% of business PCs

Microsoft Windows 10 powered about 9% of all business personal computers a year and a half after its launch, a just-released study of corporate deployments said.According to Austin, Texas-based Spiceworks, an online community and resource for IT professionals and the vendors trying to reach them, the proportion of company-deployed PCs running Windows 10 was almost double that of its predecessor, Windows 8, which powered 5% of all enterprise desktop and laptop systems.[ Related: Fix Windows 10 problems with these free Microsoft tools ] That Spiceworks' number was just a fraction of the global user share of Windows 10 -- on Saturday, analytics vendor Net Applications pegged 10's share as 25% of the world's PCs -- was no surprise. Most of the users who have adopted Windows 10 were consumers, not commercial customers: The latter are traditionally much slower to migrate machines to a new OS.To read this article in full or to leave a comment, please click here

Formatting Matters

Using proper formatting can make it much easier to read code and log samples. Yet so many people don’t bother putting proper formatting around blocks of text. Take some time to learn how to format text in common applications and forums, and make things easier for those trying to help you.

What’s easier to read?

This?

version: ‘2.0’

examples.mistral-yaql-st2kv-user-scope:
vars:
polo: unspecified
tasks:
task1:
action: std.noop
publish:
polo: <% st2kv('marco') %>
on-complete:
– fail: <% $.polo != polo %>

Or this?

Which one is easier to read? Which one lets you parse key information faster? Which one clearly shows file formatting and indentation? Obvious, right?

Yet far too often, I see people paste unformatted text into Slack, GitHub comments, and web forums. They dump huge blocks of unformatted, difficult to read code and logs. Even after repeated prompts to use proper formatting, they just dump big blocks of text.

The good thing is that it’s not that hard to change the display formatting. Many applications contain shortcuts to make this easy. It’s worth your time learning a few of the tips and tricks.

Slack & GitHub

Both Slack and GitHub use a form of Markdown to make it easy Continue reading

Formatting Matters

Using proper formatting can make it much easier to read code and log samples. Yet so many people don’t bother putting proper formatting around blocks of text. Take some time to learn how to format text in common applications and forums, and make things easier for those trying to help you.

What’s easier to read?

This?

version: ‘2.0’

examples.mistral-yaql-st2kv-user-scope:
vars:
polo: unspecified
tasks:
task1:
action: std.noop
publish:
polo: < st2kv(‘marco’) %>
on-complete:
- fail: < $.polo != polo %>

Or this?

version: '2.0'

examples.mistral-yaql-st2kv-user-scope:
    vars:
        polo: unspecified
    tasks:
        task1:
            action: std.noop
            publish:
                polo: <% st2kv('marco') %>
            on-complete:
                - fail: <% $.polo != polo %>

Which one is easier to read? Which one lets you parse key information faster? Which one clearly shows file formatting and indentation? Obvious, right?

Yet far too often, I see people paste unformatted text into Slack, GitHub comments, and web forums. They dump huge blocks of unformatted, difficult to read code and logs. Even after repeated prompts to use proper formatting, they just dump big blocks of text.

The good thing is that it’s not that Continue reading

It’s not the end of SPARC chips yet

Fujitsu is helping to keep SPARC from extinction as it continues to design and develop the architecture. The company has introduced two Unix servers -- the M12-2S and the M12-2 -- using SPARC chips based on a new CPU architecture.The M12 servers are about 2.5 times faster than their predecessor, the M10, which used the older SPARC X chips.Oracle and partner Fujitsu are the only companies using the SPARC architecture, and share a healthy partnership. Devotees of SPARC feared the architecture was on its way out after Oracle restructured its Solaris OS and chip roadmap and Fujitsu adopted ARM architecture to build Japan's flagship supercomputer, Post-K, which is due for release by 2020.To read this article in full or to leave a comment, please click here