Archive

Category Archives for "Networking"

MWC 17: What’s coming, what’s not, and what we really want to see

After reading leaks, rumors, and tea leaves for months, Mobile World Congress is finally almost here. In just about a week, we’ll get a look at some of the most anticipated phones of the year; all of them vying for our attention with their dual cameras, skinny bezels, and big, beautiful screens.And even with Samsung making us wait a little longer for the Galaxy S8, there will still be loads of phones, tablets, watches, and gadgets on display in Barcelona. But if you can’t wait until the big event, we’ve got everything you need to know right here.What’s we know is coming LG G6 LG swung and missed with its modular-minded G5, so it’s no surprise that it’s gone back to the drawing board with the G6. And from the looks of it, they got it right this time. While we’ll be losing one of the last phone lines that still had a removable battery, LG has opted to put a premium on design, with a glass-and-metal frame, tiny bezels, and a 5.7-inch Full Vision” Quad HD LCD screen. It’ll also be waterproof, come with a dual camera system, and feature a Quad digital-to-analog converter like Continue reading

Police arrest man suspected of building million-router German botnet

Last year, someone turned a German internet service provider into a million-router botnet. German police think they will soon have the culprit.The U.K.'s National Crime Agency (NCA) made an arrest on Wednesday in connection with the November 2016 hack on Deutsche Telekom. The agency said it arrested a 29-year-old man at Luton airport, acting on a European Arrest Warrant issued by the public prosecutor's office in Cologne, Germany.The German Federal Criminal Police Office (Bundeskriminalamt, or BKA), which led the investigation, said it had worked with British law enforcement officials to arrest the man, a Briton.To read this article in full or to leave a comment, please click here

Police arrest man suspected of building million-router German botnet

Last year, someone turned a German internet service provider into a million-router botnet. German police think they will soon have the culprit.The U.K.'s National Crime Agency (NCA) made an arrest on Wednesday in connection with the November 2016 hack on Deutsche Telekom. The agency said it arrested a 29-year-old man at Luton airport, acting on a European Arrest Warrant issued by the public prosecutor's office in Cologne, Germany.The German Federal Criminal Police Office (Bundeskriminalamt, or BKA), which led the investigation, said it had worked with British law enforcement officials to arrest the man, a Briton.To read this article in full or to leave a comment, please click here

Amid cyberattacks, ISPs try to clean up the internet

If your computer’s been hacked, Dale Drew might actually know something about that.He's CSO (chief security officer) at Level 3 Communications, a major internet backbone provider that's routinely on the lookout for cyberattacks on the network level. The company has linked more than 150 million IP addresses to malicious activity worldwide.That means all of those IP addresses have computers behind them that are probably involved in distributed denial-of-service attacks, email spam, or breaches of company servers, Drew said.Hackers have managed to hijack those computers to "cause harm to the internet," but the owners don't always know that, Drew said. To read this article in full or to leave a comment, please click here

Amid cyberattacks, ISPs try to clean up the internet

If your computer’s been hacked, Dale Drew might actually know something about that.He's CSO (chief security officer) at Level 3 Communications, a major internet backbone provider that's routinely on the lookout for cyberattacks on the network level. The company has linked more than 150 million IP addresses to malicious activity worldwide.That means all of those IP addresses have computers behind them that are probably involved in distributed denial-of-service attacks, email spam, or breaches of company servers, Drew said.Hackers have managed to hijack those computers to "cause harm to the internet," but the owners don't always know that, Drew said. To read this article in full or to leave a comment, please click here

Amid cyberattacks, ISPs try to clean up the internet

If your computer’s been hacked, Dale Drew might actually know something about that.He's CSO (chief security officer) at Level 3 Communications, a major internet backbone provider that's routinely on the lookout for cyberattacks on the network level. The company has linked more than 150 million IP addresses to malicious activity worldwide.That means all of those IP addresses have computers behind them that are probably involved in distributed denial-of-service attacks, email spam, or breaches of company servers, Drew said.Hackers have managed to hijack those computers to "cause harm to the internet," but the owners don't always know that, Drew said. To read this article in full or to leave a comment, please click here

Frequently Asked Questions: Submarine Cables 101

Useful background information on oceanic cabling from Telegeogrphy.

I’ve been involved with TeleGeography’s research on submarine cables since 2000. Over the years I’ve fielded numermous questions about the submarine cable industry from journalists, investors, family, and friends.

It seems as good a time as any to provide a compilation of answers to some of the most commonly asked questions.

Worth a read.

Frequently Asked Questions: Submarine Cables 101

The post Frequently Asked Questions: Submarine Cables 101 appeared first on EtherealMind.

IDG Contributor Network: Software development genetics, part 2: Microservices, containers and the DevOps connection

In part one of this two-part post, I walked through how DevOps and the development philosophies of lean and agile are related. In part two, I make the case that similar to the dynamics I described in Recombinant Communications, where the application programming interface (API) economy and as-a-service industries are making possible revolutionary innovations in the enterprise communications market, these "genetics" concepts also apply elsewhere.To read this article in full or to leave a comment, please click here

How would you handle these tough job interview questions from tech companies?

Sure, you might be a bit unsatisfied with your current job as a technology professional, but consider that if you head out into the wild you could get nailed with interview questions such as:*How do you explain a vending machine to someone who hasn’t seen or used one before? (Bloomberg L.P. for global data analyst job)*How many fire hydrants are there in Los Angeles County? (Disney Interactive Studios, for software engineer)*Prove that hoop stress is twice the longitudinal stress in a cylindrical pressure vessel?OK, that last one comes from Elon Musk’s rocket-building SpaceX, and the average person isn’t going to be qualified to work there as a test operations engineer, but plenty of other tough interview questions for more mainstream tech jobs can be found among the list put forth this week by online jobs marketplace Glassdoor.To read this article in full or to leave a comment, please click here

Support For Ops Speeds DevOps Progress

In the pursuit of DevOps, organizations often experience temporary growing pains, resulting in increased deployment problems and outages, according to Puppet's State of DevOps report. But as operations teams become more familiar with the tools used and identify issues, they can support more rapid deployment schedules with better quality and fewer outages. In this episode of Talking DevOps, Josh Atwell, Developer Advocate for NetApp SolidFire, explains why.

Facebook Backpack Behind the Scenes

When Facebook announced 6-pack (their first chassis switch) my reaction was “meh” (as well as “I would love to hear what Brad Hedlund has to say about it”). When Facebook announced Backpack I mostly ignored the announcement. After all, when one of the cloud-scale unicorns starts talking about their infrastructure, what they tell you is usually low on detail and used primarily as talent attracting tool.

Read more ...

Brocade’s Ruckus Wi-Fi business finds a buyer

Broadcom will unload the Ruckus Wireless Wi-Fi business for US$800 million when it takes over Brocade Communications Systems later this year. The buyer, Arris International, is a maker of video and broadband equipment, including cable modems and set-top boxes with Wi-Fi inside. As part of the deal, it will also acquire Brocade’s ICX business, which makes data center, campus and carrier Ethernet switches. Ruckus makes Wi-Fi gear primarily for enterprises and service providers. Brocade acquired Ruckus last April for $1.2 billion in a bid to expand its enterprise networking business.To read this article in full or to leave a comment, please click here

Brocade’s Ruckus Wi-Fi business finds a buyer

Broadcom will unload the Ruckus Wireless Wi-Fi business for US$800 million when it takes over Brocade Communications Systems later this year. The buyer, Arris International, is a maker of video and broadband equipment, including cable modems and set-top boxes with Wi-Fi inside. As part of the deal, it will also acquire Brocade’s ICX business, which makes data center, campus and carrier Ethernet switches. Ruckus makes Wi-Fi gear primarily for enterprises and service providers. Brocade acquired Ruckus last April for $1.2 billion in a bid to expand its enterprise networking business.To read this article in full or to leave a comment, please click here

A hard drive’s LED light can be used to covertly leak data

The seemingly harmless blinking lights on servers and desktop PCs may give away secrets if a hacker can hijack them with malware. Researchers in Israel have come up with an innovative hack that turns a computer's LED light into a signaling system that shows passwords and other sensitive data. The researchers at Ben-Gurion University of the Negev demonstrated the hack in a YouTube video posted Wednesday. It shows a hacked computer broadcasting the data through a computer’s LED light, with a drone flying nearby reading the pattern. The researchers designed the scheme to underscore vulnerabilities of air-gapped systems, or computers that have been intentionally disconnected from the internet.To read this article in full or to leave a comment, please click here

A hard drive’s LED light can be used to covertly leak data

The seemingly harmless blinking lights on servers and desktop PCs may give away secrets if a hacker can hijack them with malware. Researchers in Israel have come up with an innovative hack that turns a computer's LED light into a signaling system that shows passwords and other sensitive data. The researchers at Ben-Gurion University of the Negev demonstrated the hack in a YouTube video posted Wednesday. It shows a hacked computer broadcasting the data through a computer’s LED light, with a drone flying nearby reading the pattern. The researchers designed the scheme to underscore vulnerabilities of air-gapped systems, or computers that have been intentionally disconnected from the internet.To read this article in full or to leave a comment, please click here

Amazon Kindle Paperwhite Is Just $79.99 For a Limited Time If You Buy Refurbished – Deal Alert

Amazon has discounted its refurbished Paperwhite models for a limited time, so with the current deal you can get one for just $79.99. That saves you $30 on the typical price of a refurbished model, and saves even more over buying it brand new ($119.99 new). A Refurbished Paperwhite E-reader is refurbished, tested, and certified by Amazon to look and work like new. The popular Kindle Paperwhite has a higher res 300ppi screen, WiFi, a built-in adjustable light, a long lasting battery, and best of all it's glare-free even in bright sunlight so you can use it literally anywhere, night or day. See the discounted refurbished Paperwhite model on Amazon to learn more and explore buying options.To read this article in full or to leave a comment, please click here

Kite-surfing could put rural Brits online

U.K. network operator EE plans to deliver 4G internet access from a kite-like balloon first developed as an observation and communications platform for the military.The Helikite was invented in the 1990s and has also found favor with Antarctic explorers, disaster relief workers and emergency services. EE revealed its plans to deliver wide-area network coverage from the helium-filled balloons on Tuesday, although it won't have the first one in service until later in the year.According to Allsopp Helikites, the maker of the kite-balloons, hoisting a 4G base station aloft can increase its range from 3 kilometers to between 30 km and 80 km.To read this article in full or to leave a comment, please click here