Archive

Category Archives for "Networking"

It’s not the end of SPARC chips yet

Fujitsu is helping to keep SPARC from extinction as it continues to design and develop the architecture. The company has introduced two Unix servers -- the M12-2S and the M12-2 -- using SPARC chips based on a new CPU architecture.The M12 servers are about 2.5 times faster than their predecessor, the M10, which used the older SPARC X chips.Oracle and partner Fujitsu are the only companies using the SPARC architecture, and share a healthy partnership. Devotees of SPARC feared the architecture was on its way out after Oracle restructured its Solaris OS and chip roadmap and Fujitsu adopted ARM architecture to build Japan's flagship supercomputer, Post-K, which is due for release by 2020.To read this article in full or to leave a comment, please click here

Apple says new Mac Pros and iMacs are coming

Apple this week disclosed to a number of outlets, including John Gruber of Daring Fireball, that the company has not forgotten about its demographic of small but influential pro users. Quite the opposite, Apple says that's already working on a brand new Mac Pro that will feature a modular design, thereby addressing one of the longstanding complaints surrounding the company's current Mac Pro.In the interim, Apple also revealed -- at long last -- that it will be upgrading the current Mac Pro's internals, thereby giving users a little bit more bang for the buck. Specifically, the entry level Mac Pro will now feature 6 Xeon CPU cores and dual G500 GPUs while the pricier $3999 model will feature 8 CPU cores and dual D700 GPUs. While these spec upgrades aren't groundbreaking, it's a nice gesture from Apple given that the Mac Pro hasn't changed one iota since Apple originally introduced the machine back in June of 2013.To read this article in full or to leave a comment, please click here

Reaching the next level for Online Trust

Online trust and the fundamental need to collaborate to address its challenges is an issue I care about deeply. Today I’m excited to share some important news about a new Initiative at the Internet Society that we believe will help us get to the next level in addressing online trust.

The Online Trust Alliance (OTA) is an organisation with objectives very dear to ISOC’s heart. OTA’s mission is to enhance online trust, and its goal is to help educate businesses, policy makers and stakeholders while developing and advancing best practices and tools to enhance the protection of users' security, privacy and identity. OTA has a history of being principled, pragmatic and actionable.

Mr. Olaf Kolkman

Up!

Far from being a vibrant environment with an array of competitive offerings, the activity of providing so-called "last mile" Internet access appears to have been reduced to an environment where, in many markets, a small number of access providers appear to operate in a manner that resembles a cosy cartel, strenuously resisting the imposition of harsher strictures of true competition. Mobile access continues to operate at a distinct price premium and the choices for broadband wireline access are all too often limited to just one or two providers. Is there another option? If we looked up into the sky are there potential services that could alter this situation?

Apple fixes wireless-based remote code execution flaw in iOS

Apple released an iOS update Monday to fix a serious vulnerability that could allow attackers to remotely execute malicious code on the Broadcom Wi-Fi chips used in iPhones, iPads, and iPods.The vulnerability is a stack buffer overflow in the feature that handles authentication responses for the fast BSS transition feature of the 802.11r protocol, also known as fast roaming. This feature allows devices to move easily and securely between different wireless base stations in the same domain.Hackers can exploit the flaw to execute code in the context of the Wi-Fi chip's firmware if they're within the wireless range of the targeted devices.The issue is one of several flaws found by Google Project Zero researcher Gal Beniamini in the firmware of Broadcom Wi-Fi chips. Some of these vulnerabilities also affect Android devices and have been patched as part of Android's April security bulletin.To read this article in full or to leave a comment, please click here

Apple fixes wireless-based remote code execution flaw in iOS

Apple released an iOS update Monday to fix a serious vulnerability that could allow attackers to remotely execute malicious code on the Broadcom Wi-Fi chips used in iPhones, iPads, and iPods.The vulnerability is a stack buffer overflow in the feature that handles authentication responses for the fast BSS transition feature of the 802.11r protocol, also known as fast roaming. This feature allows devices to move easily and securely between different wireless base stations in the same domain.Hackers can exploit the flaw to execute code in the context of the Wi-Fi chip's firmware if they're within the wireless range of the targeted devices.The issue is one of several flaws found by Google Project Zero researcher Gal Beniamini in the firmware of Broadcom Wi-Fi chips. Some of these vulnerabilities also affect Android devices and have been patched as part of Android's April security bulletin.To read this article in full or to leave a comment, please click here

Open source routing project gets a vital technology infusion

Open source networking proponents have uncorked an updated routing protocol project designed to give white box, virtualized environments of all sizes fast and reliable communications.The project, now called the Free Range Routing (FRR) offers a full-on IP routing protocol suite for Linux/Unix platforms and includes protocol daemons for BGP, IS-IS, LDP, OSPF, PIM, and RIP. The FRR groupsays that the technology’s integration with the native Linux/Unix IP networking stacksmakes it applicable to a wide variety of applications from connectinghosts/virtual machines/containers to the network, advertising network services, LAN switching and routing, Internet access routers, and Internet peering.To read this article in full or to leave a comment, please click here

Clean up your desk space with cool MacBook Pro docking station

I use a MacBook Pro as my main notebook for work, and when I’m in my cubicle I like to connect things like an additional monitor, storage drives and peripherals like a larger keyboard and wireless mouse. The best way to do this is with a docking station, but the last one I used required that I also prop up some books to rest the notebook on to create the dual-display effect I was looking for.A much sleeker system comes from Henge Docks, which sent me its new automated docking station. The company makes two horizontal docks for MacBook Pro owners – one for MacBooks that have the Retina display ($399 introductory price, available for 13-inch and 15-inch models), and one for the new MacBook Pro (pre-order, coming soon). The dock features a metal chassis and 13 expansion ports (two audio ports, SD Card Reader, HDMI, six USB 3.0, power port, Ethernet, Thunderbolt 2 and mini display port). The slim profile of the dock makes for a much cleaner desktop look and feel.To read this article in full or to leave a comment, please click here

37% off LifeStraw Personal Water Filter – Deal Alert

Having a LifeStraw Personal Water Filter at hand provides access to clean, safe drinking water whenever needed.  Weighing only 2 oz. (54g), LifeStraw is the perfect water filter for hiking and camping. LifeStraw uses advanced 0.2 micron hollow fiber membrane technology.  This highly efficient method of filtration requires no chemicals, batteries, or moving parts and can be easily backflushed to clean the filter. Perfect for a vehicle or home emergency kit.  The LifeStraw averages 4.7 out of 5 stars from over 5,200 people (read reviews). Its typical list price of $20 has been reduced 37% to $12.50.To read this article in full or to leave a comment, please click here

Politicians’ web browsing history targeted after privacy vote

Two GoFundMe campaigns have raised more than US$290,000 in an effort to buy the web browsing histories of U.S. politicians after Congress voted to allow broadband providers to sell customers' personal information without their permission.It's unclear if those efforts will succeed, however. Even though Congress scrapped the FCC's ISP privacy rules last week, the Telecommunications Act still prohibits telecom providers from selling personally identifiable information in many cases. To read this article in full or to leave a comment, please click here

Politicians’ web browsing history targeted after privacy vote

Two GoFundMe campaigns have raised more than US$290,000 in an effort to buy the web browsing histories of U.S. politicians after Congress voted to allow broadband providers to sell customers' personal information without their permission.It's unclear if those efforts will succeed, however. Even though Congress scrapped the FCC's ISP privacy rules last week, the Telecommunications Act still prohibits telecom providers from selling personally identifiable information in many cases. To read this article in full or to leave a comment, please click here

Google’s Espresso networking tech takes SD-WAN to internet scale

Google is working to accelerate the performance of its applications over the internet by building out a software-defined network at broad scale. On Tuesday, the company announced Espresso, a system that provides increased network performance to users of the company’s applications.It works by applying software-defined networking to the edge of the tech titan’s network, where Google connects to the peer networks of other internet service providers. Rather than rely on individual routers to figure out the best way to direct internet traffic, Espresso hands that responsibility off to servers running in the data centers Google operates at the edge of its network.To read this article in full or to leave a comment, please click here

Google’s Espresso networking tech takes SD-WAN to internet scale

Google is working to accelerate the performance of its applications over the internet by building out a software-defined network at broad scale. On Tuesday, the company announced Espresso, a system that provides increased network performance to users of the company’s applications.It works by applying software-defined networking to the edge of the tech titan’s network, where Google connects to the peer networks of other internet service providers. Rather than rely on individual routers to figure out the best way to direct internet traffic, Espresso hands that responsibility off to servers running in the data centers Google operates at the edge of its network.To read this article in full or to leave a comment, please click here

A free decryption tool is now available for all Bart ransomware versions

Users who have had their files encrypted by any version of the Bart ransomware program are in luck: Antivirus vendor Bitdefender has just released a free decryption tool.The Bart ransomware appeared back in June and stood out because it locked victims' files inside ZIP archives encrypted with AES (Advanced Encryption Standard). Unlike other ransomware programs that used RSA public-key cryptography and relied on a command-and-control server to generate key pairs, Bart was able to encrypt files even in the absence of an internet connection.To read this article in full or to leave a comment, please click here