Archive

Category Archives for "Networking"

58% off LOOP Worldwide Travel Adapter with Dual USB Charging Ports – Deal Alert

Power and charge in over 150 Countries with US UK EU & AUS/CHINA Plugs. This adapter works in Canada, Russia, Asia, Central America, South America and the Middle East to name a few. Dual USB charging ports for simultaneously charging your USB devices as well. A 6-amp fuse (and built-in spare fuse) is included, as well as an 18-month warranty. LOOP's travel adapter averages 4 out of 5 stars on Amazon from over 580 people (read reviews). It's $39.95 list price has been reduced a generous 58% to just $16.75. To learn more, or to take advantage of this discount, hop over to Amazon. To read this article in full or to leave a comment, please click here

Chinese hackers go after third-party IT suppliers to steal data

Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers. Major IT suppliers that specialize in cloud storage, help desk, and application management have become a top target for the hacking group known as APT10, security providers BAE Systems and PwC said in a joint report.That's because these suppliers often have direct access to their client's networks. APT10 has been found stealing intellectual property as part of a global cyberespionage campaign that ramped up last year, PwC said on Monday.To read this article in full or to leave a comment, please click here

Chinese hackers go after third-party IT suppliers to steal data

Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers. Major IT suppliers that specialize in cloud storage, help desk, and application management have become a top target for the hacking group known as APT10, security providers BAE Systems and PwC said in a joint report.That's because these suppliers often have direct access to their client's networks. APT10 has been found stealing intellectual property as part of a global cyberespionage campaign that ramped up last year, PwC said on Monday.To read this article in full or to leave a comment, please click here

How HPE plans to spin out its software assets

After playing a key role in the 2015 bifurcation of Hewlett Packard into the consumer-focused HP Inc. and the enterprise-centric Hewlett Packard Enterprise (HPE), Chris Hsu is busy working on another big split. Hsu, currently HPE’s COO and GM of HPE Software, is preparing to spin out much of HPE’s software portfolio to Micro Focus in a deal announced last September. When the spin is completed, Hsu will also take over as CEO of Micro Focus, which will be a nearly $5 billion software company with a wide portfolio of assets in big data, security, IT operations and more.To read this article in full or to leave a comment, please click here(Insider Story)

What users could expect from Apple’s homegrown GPUs for iPhones, iPads

Apple has one big reason to move to a homegrown GPU: It wants full control over the hardware and software in its devices.The device maker is apparently developing its own GPU from scratch after dumping Imagination Technologies' PowerVR architecture, which is being used in the iPhone 7. The smartphone runs on the PowerVR A10 Fusion chip.It's not certain when Apple's homegrown GPU will appear in devices, and the company didn't respond to request for comment.Apple has made graphics improvement a priority in its iPhone and iPad models, so users should get better gaming experiences.To read this article in full or to leave a comment, please click here

Delphix CEO: We’re having a ‘massive impact’ on the world’s best brands

When Chris Cook was considering taking the job of Delphix CEO, the company was described to him as 'the best kept secret' in the tech industry. Cook, who's been CEO for a year now, will tell you that's not a good thing and he's working hard to change it. Is one of the things that holds Delphix back is that the market for your product is not easily defined? Is there an easy two- or three- or four-word phrase for what you do? To read this article in full or to leave a comment, please click here(Insider Story)

IT leaders share how they quell cybersecurity attacks

Ask CIOs and CISOs what cybersecurity fears keep them up at night and you’ll hear a range of responses -- from social engineering hacks such as phishing, as well as malware that enables perpetrators to hijack users' websites -- the dreaded ransomware -- and denial-of-service attacks. Depending on their business you might hear them say "all of the above."These threats are driving increased spending on cybersecurity tools intended to protect corporate data from nation-state actors, lone wolf attackers and other malcontents who are seeking access to corporate data. IT leaders know that it takes only one well-placed exploit to infiltrate a corporate network, but they also acknowledge that the best approach is to shrink their attack surface and be ready to respond to an incident in the event of an attack.To read this article in full or to leave a comment, please click here

IT leaders share how they quell cybersecurity attacks

Ask CIOs and CISOs what cybersecurity fears keep them up at night and you’ll hear a range of responses -- from social engineering hacks such as phishing, as well as malware that enables perpetrators to hijack users' websites -- the dreaded ransomware -- and denial-of-service attacks. Depending on their business you might hear them say "all of the above."These threats are driving increased spending on cybersecurity tools intended to protect corporate data from nation-state actors, lone wolf attackers and other malcontents who are seeking access to corporate data. IT leaders know that it takes only one well-placed exploit to infiltrate a corporate network, but they also acknowledge that the best approach is to shrink their attack surface and be ready to respond to an incident in the event of an attack.To read this article in full or to leave a comment, please click here

Windows 10 powers 9% of business PCs

Microsoft Windows 10 powered about 9% of all business personal computers a year and a half after its launch, a just-released study of corporate deployments said.According to Austin, Texas-based Spiceworks, an online community and resource for IT professionals and the vendors trying to reach them, the proportion of company-deployed PCs running Windows 10 was almost double that of its predecessor, Windows 8, which powered 5% of all enterprise desktop and laptop systems.[ Related: Fix Windows 10 problems with these free Microsoft tools ] That Spiceworks' number was just a fraction of the global user share of Windows 10 -- on Saturday, analytics vendor Net Applications pegged 10's share as 25% of the world's PCs -- was no surprise. Most of the users who have adopted Windows 10 were consumers, not commercial customers: The latter are traditionally much slower to migrate machines to a new OS.To read this article in full or to leave a comment, please click here

Formatting Matters

Using proper formatting can make it much easier to read code and log samples. Yet so many people don’t bother putting proper formatting around blocks of text. Take some time to learn how to format text in common applications and forums, and make things easier for those trying to help you.

What’s easier to read?

This?

version: ‘2.0’

examples.mistral-yaql-st2kv-user-scope:
vars:
polo: unspecified
tasks:
task1:
action: std.noop
publish:
polo: <% st2kv('marco') %>
on-complete:
– fail: <% $.polo != polo %>

Or this?

Which one is easier to read? Which one lets you parse key information faster? Which one clearly shows file formatting and indentation? Obvious, right?

Yet far too often, I see people paste unformatted text into Slack, GitHub comments, and web forums. They dump huge blocks of unformatted, difficult to read code and logs. Even after repeated prompts to use proper formatting, they just dump big blocks of text.

The good thing is that it’s not that hard to change the display formatting. Many applications contain shortcuts to make this easy. It’s worth your time learning a few of the tips and tricks.

Slack & GitHub

Both Slack and GitHub use a form of Markdown to make it easy Continue reading

Formatting Matters

Using proper formatting can make it much easier to read code and log samples. Yet so many people don’t bother putting proper formatting around blocks of text. Take some time to learn how to format text in common applications and forums, and make things easier for those trying to help you.

What’s easier to read?

This?

version: ‘2.0’

examples.mistral-yaql-st2kv-user-scope:
vars:
polo: unspecified
tasks:
task1:
action: std.noop
publish:
polo: < st2kv(‘marco’) %>
on-complete:
- fail: < $.polo != polo %>

Or this?

version: '2.0'

examples.mistral-yaql-st2kv-user-scope:
    vars:
        polo: unspecified
    tasks:
        task1:
            action: std.noop
            publish:
                polo: <% st2kv('marco') %>
            on-complete:
                - fail: <% $.polo != polo %>

Which one is easier to read? Which one lets you parse key information faster? Which one clearly shows file formatting and indentation? Obvious, right?

Yet far too often, I see people paste unformatted text into Slack, GitHub comments, and web forums. They dump huge blocks of unformatted, difficult to read code and logs. Even after repeated prompts to use proper formatting, they just dump big blocks of text.

The good thing is that it’s not that Continue reading

It’s not the end of SPARC chips yet

Fujitsu is helping to keep SPARC from extinction as it continues to design and develop the architecture. The company has introduced two Unix servers -- the M12-2S and the M12-2 -- using SPARC chips based on a new CPU architecture.The M12 servers are about 2.5 times faster than their predecessor, the M10, which used the older SPARC X chips.Oracle and partner Fujitsu are the only companies using the SPARC architecture, and share a healthy partnership. Devotees of SPARC feared the architecture was on its way out after Oracle restructured its Solaris OS and chip roadmap and Fujitsu adopted ARM architecture to build Japan's flagship supercomputer, Post-K, which is due for release by 2020.To read this article in full or to leave a comment, please click here

It’s not the end of SPARC chips yet

Fujitsu is helping to keep SPARC from extinction as it continues to design and develop the architecture. The company has introduced two Unix servers -- the M12-2S and the M12-2 -- using SPARC chips based on a new CPU architecture.The M12 servers are about 2.5 times faster than their predecessor, the M10, which used the older SPARC X chips.Oracle and partner Fujitsu are the only companies using the SPARC architecture, and share a healthy partnership. Devotees of SPARC feared the architecture was on its way out after Oracle restructured its Solaris OS and chip roadmap and Fujitsu adopted ARM architecture to build Japan's flagship supercomputer, Post-K, which is due for release by 2020.To read this article in full or to leave a comment, please click here

Apple says new Mac Pros and iMacs are coming

Apple this week disclosed to a number of outlets, including John Gruber of Daring Fireball, that the company has not forgotten about its demographic of small but influential pro users. Quite the opposite, Apple says that's already working on a brand new Mac Pro that will feature a modular design, thereby addressing one of the longstanding complaints surrounding the company's current Mac Pro.In the interim, Apple also revealed -- at long last -- that it will be upgrading the current Mac Pro's internals, thereby giving users a little bit more bang for the buck. Specifically, the entry level Mac Pro will now feature 6 Xeon CPU cores and dual G500 GPUs while the pricier $3999 model will feature 8 CPU cores and dual D700 GPUs. While these spec upgrades aren't groundbreaking, it's a nice gesture from Apple given that the Mac Pro hasn't changed one iota since Apple originally introduced the machine back in June of 2013.To read this article in full or to leave a comment, please click here

Reaching the next level for Online Trust

Online trust and the fundamental need to collaborate to address its challenges is an issue I care about deeply. Today I’m excited to share some important news about a new Initiative at the Internet Society that we believe will help us get to the next level in addressing online trust.

The Online Trust Alliance (OTA) is an organisation with objectives very dear to ISOC’s heart. OTA’s mission is to enhance online trust, and its goal is to help educate businesses, policy makers and stakeholders while developing and advancing best practices and tools to enhance the protection of users' security, privacy and identity. OTA has a history of being principled, pragmatic and actionable.

Mr. Olaf Kolkman

Up!

Far from being a vibrant environment with an array of competitive offerings, the activity of providing so-called "last mile" Internet access appears to have been reduced to an environment where, in many markets, a small number of access providers appear to operate in a manner that resembles a cosy cartel, strenuously resisting the imposition of harsher strictures of true competition. Mobile access continues to operate at a distinct price premium and the choices for broadband wireline access are all too often limited to just one or two providers. Is there another option? If we looked up into the sky are there potential services that could alter this situation?