Archive

Category Archives for "Networking"

Legal war with Apple hits Qualcomm’s revenue projections

The legal fight between Apple and Qualcomm on licensing modem technology is turning uglier every day.Apple has filed lawsuits against Qualcomm in countries like the U.S., U.K., China and Japan, accusing the chipmaker of using its dominant market position to overcharge licensing fees.The iPhone maker itself doesn't pay licensing fees directly to Qualcomm. The fees are paid by partners like Foxconn, which makes the iPhone and iPad for Apple.Qualcomm is now accusing Apple of interfering with the licensing payments owed by those partners. Its revenue forecasts for the third quarter are affected, Qualcomm said.The chipmaker on Friday revised its revenue projections for the third fiscal quarter. It is projecting revenue to be between US$5.3 billion and $6.1 billion. That range runs between a decrease of 12 percent and an increase of 1 percent, compared to the same quarter last year. The forecast removes royalty revenues from Apple's contract manufacturers.To read this article in full or to leave a comment, please click here

54% off Logitech Bluetooth Multi-Device Keyboard – Deal Alert

Here's a Bluetooth keyboard for your computer that you can also use with your tablet and smartphone -- switch between all three effortlessly by just turning the dial. And unlike other Bluetooth keyboards, Logitech has integrated a cradle so your device stays propped up at just the right angle as you type. Works with Windows or Mac, Android or iOS, and features a key layout you'll be familiar with on any of those platforms. Logitech's multi-device keyboard currently averages 4 out of 5 stars from over 1,450 people (read reviews) on Amazon, where its typical list price of $49.99 has been recently dropped 54% to just $22.99.  See this deal now on Amazon.To read this article in full or to leave a comment, please click here

44% off Logitech Bluetooth Multi-Device Keyboard – Deal Alert

Here's a Bluetooth keyboard for your computer that you can also use with your tablet and smartphone -- switch between all three effortlessly by just turning the dial. And unlike other Bluetooth keyboards, Logitech has integrated a cradle so your device stays propped up at just the right angle as you type. Works with Windows or Mac, Android or iOS, and features a key layout you'll be familiar with on any of those platforms. Logitech's multi-device keyboard currently averages 4 out of 5 stars from over 1,450 people (read reviews) on Amazon, where its typical list price of $49.99 has been recently dropped 44% to just $27.99.  See this deal now on Amazon.To read this article in full or to leave a comment, please click here

vRealize Network Insight, NSX and Palo Alto Networks for micro-segmentation

 

Data Center cyber security is a fast-moving target where the IT teams need to constantly stay ahead of those that wish to do evil things. As security attacks can come from all directions, externally, and internally as well, the IT teams must fortify all the data, with a zero-trust security approach.  Perimeter security augmented with intrusion detection and protection at the application level are the tools of choice for most data centers. This protects outsiders from getting in, as well as ensuring that the applications do not get impacted by a virus or other forms of malicious activities.

What has not been addressed is the intercommunications of applications amongst themselves, especially within the hypervisor layer, where virtual machines are communicating in an East-West traffic pattern. Traffic never hits the perimeter, and the conversations are happening several layers below the application layers where IDS sits.  East-west traffic, from within the data center, has been an area overlooked as there is a gap organizationally. Simply put no one is paying attention to this area of vulnerability. The network infrastructure security teams are fortifying the perimeter, while the server teams are deploying IDS/IPS solutions. What has gone unnoticed is the East-West Continue reading

Show 337: Ethan & Greg Ask Me Anything Part 2

Todays Weekly Show episode is part 2 of the Packet Pushers Ask Me Anything series. We answer listener questions on certifications, skills development, imposter syndrome, and preferences for fighting giant ducks or small horses (we did say you could ask anything). The post Show 337: Ethan & Greg Ask Me Anything Part 2 appeared first on Packet Pushers.

Sift Science uses machine learning to help businesses reduce fraud while enhancing the user experience​

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Companies that provide online transactional services to consumers or other businesses have to be concerned about fraud. Whether it is renting hotel rooms to travelers, selling books to avid readers, arranging shipping services for hard goods, or any of the thousands of other types of sales and services transacted online, the entity behind the online business needs to know if the end user and transaction can be trusted.The credit reporting company Experian says that e-commerce fraud attack rates spiked 33% in 2016 compared to 2015. Experian attributes this increase to the recent switch to EMV (those chip-based credit cards), which drove fraudsters to online card-not-present fraud, and to the vast number of data breaches in which users’ online credentials were stolen. The Federal Trade Commission says the number of consumers who reported their stolen data was used for credit card fraud increased from 16% in 2015 to 32% in 2016.To read this article in full or to leave a comment, please click here

Sift Science uses machine learning to help businesses reduce fraud without impacting the user experience  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Companies that provide online transactional services to consumers or other businesses have to be concerned about fraud. Whether it is renting hotel rooms to travelers, selling books to avid readers, arranging shipping services for hard goods, or any of the thousands of other types of sales and services transacted online, the entity behind the online business needs to know if the end user and transaction can be trusted.The credit reporting company Experian says that e-commerce fraud attack rates spiked 33% in 2016 compared to 2015. Experian attributes this increase to the recent switch to EMV (those chip-based credit cards), which drove fraudsters to online card-not-present fraud, and to the vast number of data breaches in which users’ online credentials were stolen. The Federal Trade Commission says the number of consumers who reported their stolen data was used for credit card fraud increased from 16% in 2015 to 32% in 2016.To read this article in full or to leave a comment, please click here

Microsoft SQL Server on Linux – YES, Linux!

A couple years ago Microsoft embarked on a “Microsoft Loves Linux” initiative to bring Linux into the fold of everything Microsoft.  For a company that has traditionally been known for Windows and Office that has not historically been seen as particularly too Linux friendly, there was a bit of a stretch of the imagination how Microsoft and Linux would end up playing well together.Roll forward a couple years, with the world very much a cloud-based environment, and 1 out of every 3 virtual machines running in Microsoft’s Azure Cloud being a Linux system (and growing), along with more and more Linux growth in the Microsoft ecosystem, the vision of a couple years ago is now very much a reality.To read this article in full or to leave a comment, please click here

Sift Science uses machine learning to help businesses reduce fraud while enhancing the user experience​

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Companies that provide online transactional services to consumers or other businesses have to be concerned about fraud. Whether it is renting hotel rooms to travelers, selling books to avid readers, arranging shipping services for hard goods, or any of the thousands of other types of sales and services transacted online, the entity behind the online business needs to know if the end user and transaction can be trusted.The credit reporting company Experian says that e-commerce fraud attack rates spiked 33% in 2016 compared to 2015. Experian attributes this increase to the recent switch to EMV (those chip-based credit cards), which drove fraudsters to online card-not-present fraud, and to the vast number of data breaches in which users’ online credentials were stolen. The Federal Trade Commission says the number of consumers who reported their stolen data was used for credit card fraud increased from 16% in 2015 to 32% in 2016.To read this article in full or to leave a comment, please click here

Raspberry Pi roundup: Conduct your own symphony, play some Atari, and Competitor Corner

Homemade musical instruments don’t usually work out very well. I remember the experiment we all had to do with the rubber bands and the empty tissue boxes and finding the resulting sound, well, pretty disappointing. How’s a fifth grader supposed to rock out and impress girls for reasons he only vaguely understands with this thing?!Perhaps unsurprisingly, the age of ubiquitous computers has made the possibilities of the homemade instrument a lot more exciting than the twanging rubber band or the musical comb. (Leaving aside professional stuff like That 1 Guy, who has been weird and excellent for a while.) What we have here is a wild digital “piano,” as inventor Andy Grove calls it, that combines a Raspberry Pi with motion sensors to create a unique musical toy:To read this article in full or to leave a comment, please click here

Athena Lecturer Award for women researchers goes to Rice prof who really gets robots moving

Lydia Kavraki, a professor of computer science and bioengineering at Rice University, has been named as the 2017-2018 Athena Lecturer by the Association for Computing Machinery in recognition her work in robotics. Initiated in 2006 by the ACM Council on Women in Computing, the Athena Lecturer Award celebrates women researchers who have made fundamental contributions to computer science and comes with a cash prize of $25K via Google. And there is an actual lecture, to be presented at an ACM event. Association for Computing Machinery/Rice University Lydia Kavraki, Professor of Computer Science and Bioengineering at Rice UniversityTo read this article in full or to leave a comment, please click here

Network management vulnerability exposes cable modems to hacking

Hundreds of thousands of internet gateway devices around the world, primarily residential cable modems, are vulnerable to hacking because of a serious weakness in their Simple Network Management Protocol implementation.SNMP is used for automated network device identification, monitoring and remote configuration. It is supported and enabled by default in many devices, including servers, printers, networking hubs, switches and routers.Independent researchers Ezequiel Fernandez and Bertin Bervis recently found a way to bypass SNMP authentication on 78 models of cable modems that ISPs from around the world have provided to their customers.Their internet scans revealed hundreds of thousands of devices whose configurations could be changed remotely through the SNMP weakness that they found and dubbed StringBleed.To read this article in full or to leave a comment, please click here