Archive

Category Archives for "Networking"

ZTE pays $892M settlement to US over illegal sales to Iran

Chinese smartphone maker ZTE has agreed to pay US$892 million to the U.S. government for illegally selling networking technology to Iran.   ZTE entered a guilty plea over the charges, which include violating export controls meant to keep sensitive U.S. technology away from the Iranian government, the U.S Department of Justice said on Tuesday. "They (ZTE) lied to federal investigators and even deceived their own counsel and internal investigators about their illegal acts," Attorney General Jeff Sessions said in a statement.To read this article in full or to leave a comment, please click here

ZTE pays $892M settlement to US over illegal sales to Iran

Chinese smartphone maker ZTE has agreed to pay US$892 million to the U.S. government for illegally selling networking technology to Iran.   ZTE entered a guilty plea over the charges, which include violating export controls meant to keep sensitive U.S. technology away from the Iranian government, the U.S Department of Justice said on Tuesday. "They (ZTE) lied to federal investigators and even deceived their own counsel and internal investigators about their illegal acts," Attorney General Jeff Sessions said in a statement.To read this article in full or to leave a comment, please click here

Digital Transformation Impact on Enterprise Architecture

Digital transformation is a top business initiative for CIO’s. What does it really mean for IT and how does it impact the business itself?  In this post, we will try to cover some of the basics.

Digital transformation is a fundamental change to an organization’s product development and product delivery process to deliver a highly personalized product or service. This often involves using technology such as big data analytics, social, mobile and cloud as a means to deliver these services to the consumer. Digital transformation also implies the ability to create sustainable business differentiation with software and the ability to rapidly introduce new products and services to meet new customer needs.

Industry veterans and incumbent giants are facing significant competitive pressure and potential disruption from new market players. Startups (such as Uber, Tesla, and many others) have moved quickly from being niche players to be a dominant force in many verticals such as auto, banking, manufacturing, healthcare. Industry leaders from large enterprises acknowledge this trend and are now looking to transform their product development process and customer engagement to compete with new players –

  • Jamie Dimon, CEO of JPMC – 2015 Annual Report to shareholders

Is Google pushing Apple out of U.S. classrooms?

Google continues to gain share in the education market at Apple’s expense. Chrome OS powers almost six out of 10 computing devices shipped to K-12 schools in the United States last year, according to a new report from research firm Futuresource Consulting.[ Related: How Google overtook Apple in education ]A growing number of inexpensive Chromebooks are making their way into U.S. classrooms while iOS -- and to a lesser extent MacOS -- devices are losing considerable share. Google’s Chrome OS comprised 58 percent of the 12.6 million units shipped to primary and secondary schools in the United States last year, up from 50 percent in 2015 and 38 percent in 2014, according to the report.To read this article in full or to leave a comment, please click here

Why email is safer in Office 365 than on your Exchange server

Running your own email servers doesn’t do anything to differentiate your business from the competition (except in a bad way, if you get hacked). But avoiding the effort of managing and monitoring your own mail server isn’t the only advantage of a cloud service. The scale of a cloud mail provider like Office 365 means that malware and phishing attacks are easier to spot — and the protections extend beyond your inbox.To read this article in full or to leave a comment, please click here(Insider Story)

Why email is safer in Office 365 than on your Exchange server

Running your own email servers doesn’t do anything to differentiate your business from the competition (except in a bad way, if you get hacked). But avoiding the effort of managing and monitoring your own mail server isn’t the only advantage of a cloud service. The scale of a cloud mail provider like Office 365 means that malware and phishing attacks are easier to spot — and the protections extend beyond your inbox.Email protection isn’t just about blocking spam anymore. It’s about blocking malicious messages aimed at infecting computers and stealing credentials. Traditional antivirus scanning isn’t the solution either, because attachments aren’t just executable files you can recognize with a signature. Often, scammers use JavaScript and macros (including PowerShell) to trigger a secondary download with the malicious payload. And embedded links often go to legitimate but compromised sites, so you also can’t rely on site reputation.To read this article in full or to leave a comment, please click here(Insider Story)

Honeypot catches social engineering scams on social media

Say you just got laid off from your job. Bills are piling up and the pressure to get a new job quickly is building. Your desperation has you taking chances you wouldn’t normally take, such as clicking on a link to a job offer — even if something about it doesn't quite look right.Research firm ZeroFOX has found that unless a company has a verified recruiting account, it can be difficult for an applicant to decipher a legitimate account from an impersonator. One way to spot an impersonator is that they commonly provide Gmail, Yahoo, and other free email provider addresses through which applicants can inquire about a job and send their resumes (more advanced scammers can spoof company email domains). Some also include links to official job sites and LinkedIn for follow-up. In most cases, the impersonator uses the company logo to portray themselves as an official recruiter for the company. To read this article in full or to leave a comment, please click here

Honeypot catches social engineering scams on social media

Say you just got laid off from your job. Bills are piling up and the pressure to get a new job quickly is building. Your desperation has you taking chances you wouldn’t normally take, such as clicking on a link to a job offer — even if something about it doesn't quite look right.Research firm ZeroFOX has found that unless a company has a verified recruiting account, it can be difficult for an applicant to decipher a legitimate account from an impersonator. One way to spot an impersonator is that they commonly provide Gmail, Yahoo, and other free email provider addresses through which applicants can inquire about a job and send their resumes (more advanced scammers can spoof company email domains). Some also include links to official job sites and LinkedIn for follow-up. In most cases, the impersonator uses the company logo to portray themselves as an official recruiter for the company. To read this article in full or to leave a comment, please click here

A Million Steps With The Garmin Fenix 3

The Garmin Fenix 3 is a GPS fitness tracker with limited smartwatch functionality. I bought it in May 2016 to be my constant companion when I hike, trail run, Crossfit, and sleep. Here’s my review after tracking over a million steps with the device.

TL;DR.

I adore the Fenix 3. The watch was an expensive technology purchase, but I feel the money was well-spent. The Fenix 3 has met or exceeded my expectations in every area. Despite my ardent adoration, the F3 is not perfect.

Folks shopping the Garmin product line should know that there is now a Fenix 5 line out. There was never a Fenix 4. However, I’ve not seen anything in the F5 line that makes me want to upgrade from my F3.

How is the Fenix 3 form factor to live with?

The Fenix 3 is big and bulky. I knew this going in, and so I don’t mind. I especially don’t mind because part of that bulk is due to the battery. However, the bulk does make it difficult to wear under cuffed shirts. The watch stands tall, so if you try buttoning a shirt cuff around the Fenix 3, you’re in for a tight Continue reading

Cisco HyperFlex’s some data center muscle, fuels HCI war

It’s safe to say that the hyperconverged infrastructure (HCI) market has heated up in a big way. In September 2016, Nutanix went public and had a fantastic IPO. Since then, the company’s stock has slid due in part to increased competition from the likes of Dell-EMC, which recently extended its HCI products to private clouds, and HP Enterprise, which acquired SimpliVity earlier this year.To read this article in full or to leave a comment, please click here

Cisco HyperFlex’s some data center muscle, fuels HCI war

It’s safe to say that the hyperconverged infrastructure (HCI) market has heated up in a big way. In September 2016, Nutanix went public and had a fantastic IPO. Since then, the company’s stock has slid due in part to increased competition from the likes of Dell-EMC, which recently extended its HCI products to private clouds, and HP Enterprise, which acquired SimpliVity earlier this year.To read this article in full or to leave a comment, please click here

Time for facility inspections to become digital

Whether your company owns or manages property, inspections are an absolute must to keep everything running smoothly. Inspections keep residents happy and can play a critical role in avoiding unfortunate mishaps.Unfortunately, facility inspections are often held back by outdated, inefficient paper-based forms, or maybe an Excel spreadsheet on a laptop. These slow and plodding processes are not only inefficient, but they fail to leverage the business benefits a robust mobile platform provides.+ Also on Network World: Your digitization success depends on co-creating value with customers + Facility inspections aren’t about slogging through a list of issues and hoping you don’t notice anything amiss. They’re about creating and maintaining best practices to keep facilities in such excellent repair as to minimize labor and maximize output. Instead of putting off inspections to avoid facing the music, the way someone running low on cash puts off checking their bank balance until they’re overdrawn, facility owners and managers should perform regular, diligent, thorough inspections to maximize the value of the inspection practice and maintain quality standards that prevent serious issues.To read this article in full or to leave a comment, please click here

Salesforce launches custom image recognition as Einstein goes GA

Salesforce is getting into the computer vision business with a new tool designed to let users easily train a custom image recognition system.Einstein Vision, as it’s known, allows users to upload sets of images and classify them in a series of categories. After that, the system will create a recognizer based on machine learning technology that will identify future images fed into it.While Salesforce customers will have to wait a couple weeks before Vision is generally available, the company announced Tuesday that other Einstein features based on machine learning techniques are live.To read this article in full or to leave a comment, please click here

23% off iHome Bluetooth Color Changing Alarm Clock with USB Charging – Deal Alert

Perfect for parties or setting the mood while listening at home, the iBT28 from iHome is a Bluetooth-enabled alarm clock with an adjustable LED cabinet.  Send digital audio wirelessly to iBT28 from your iPad, iPhone, and iPod touch, Android, Blackberry or other Bluetooth-enabled audio device, or play directly via its audio input port. The alarm clock includes two independent alarms allowing you wake to Bluetooth audio, FM radio or buzzer at separate times. The multiple color modes include a glowing sequence, a fast change sequence, a selectable color of your choice, or choose no color at all. Its specially designed Reson8 speaker chamber provides richer, more powerful sound and enhanced bass response. The iBT28 averages 4 out of 5 stars from over 145 people on Amazon, where its typical list price of $45.94 has been reduced 23% to $35.56. See the discounted iBT28 color changing Bluetooth alarm clock from iHome now on Amazon.To read this article in full or to leave a comment, please click here

WikiLeaks’ CIA document dump shows agency can compromise Android, TVs

WikiLeaks has released more than 8,700 documents it says come from the CIA's Center for Cyber Intelligence, with some of the leaks saying the agency had 24 "weaponized" and previously undisclosed exploits for the Android operating system as of 2016.Some of the Android exploits were developed by the CIA, while others came from the U.S. National Security Agency, U.K. intelligence agency GCHQ, and cyber arms dealers, according to the trove of documents released Tuesday. Some smartphone attacks developed by the CIA allow the agency to bypass the encryption in WhatsApp, Confide, and other apps by collecting audio and message traffic before encryption is applied, according to the WikiLeaks analysis.To read this article in full or to leave a comment, please click here

WikiLeaks’ CIA document dump shows agency can compromise Android, TVs

WikiLeaks has released more than 8,700 documents it says come from the CIA's Center for Cyber Intelligence, with some of the leaks saying the agency had 24 "weaponized" and previously undisclosed exploits for the Android operating system as of 2016.Some of the Android exploits were developed by the CIA, while others came from the U.S. National Security Agency, U.K. intelligence agency GCHQ, and cyber arms dealers, according to the trove of documents released Tuesday. Some smartphone attacks developed by the CIA allow the agency to bypass the encryption in WhatsApp, Confide, and other apps by collecting audio and message traffic before encryption is applied, according to the WikiLeaks analysis.To read this article in full or to leave a comment, please click here