Archive

Category Archives for "Networking"

IDG Contributor Network: 4 ways to contain IT storage creep

In most businesses, data grows rapidly, voraciously consuming storage as it does so and ratcheting up expenses. Sometimes it seems impossible to keep it under control.However, there is a difference between the Blob and storage that puts you in the driver’s seat. Data didn’t arrive on earth courtesy of a meteorite. We create it by ourselves every day. If we produced the problem, we should be able to defend against it and its associated costs. Here are some ways you can improve storage efficiency.1.  Tier your data Wouldn’t it be nice if business unit leaders would come to you and say, “I need a sub-millisecond response time on my reads and writes for this application,” plus inform you of all their other requirements? That would make it easy to determine the IT resources you should assign to an application. The truth, however, is that in many cases, business leaders don’t know what they need. They just want to make sure that the application does not slow down operations in their department.To read this article in full or to leave a comment, please click here

Desktop Linux the best it’s ever been—and keeps getting better

I can be a pretty pessimistic guy. I’m fairly convinced that the Internet of Things spells certain doom for mankind, and I’ve made a habit of standing in front of large rooms full of people simply to tell them how much I think “Linux sucks.” If you were to call me a Negative Nancy, you wouldn’t be far off.To make matters worse, I’m about to publish three new articles—each of them extremely pessimistic and gloomy—over the next week.  otal “sky is falling, we’re all gonna die” sort of stuff.To read this article in full or to leave a comment, please click here

Introducing Zero Round Trip Time Resumption (0-RTT)

Introducing Zero Round Trip Time Resumption (0-RTT)

Cloudflare’s mission is to help build a faster and more secure Internet. Over the last several years, the Internet Engineering Task Force (IETF) has been working on a new version of TLS, the protocol that powers the secure web. Last September, Cloudflare was the first service provider to enable people to use this new version of the protocol, TLS 1.3, improving security and performance for millions of customers.

Today we are introducing another performance-enhancing feature: zero round trip time resumption, abbreviated as 0-RTT. About 60% of the connections we see are from people who are visiting a site for the first time or revisiting after an extended period of time. TLS 1.3 speeds up these connections significantly. The remaining 40% of connections are from visitors who have recently visited a site and are resuming a previous connection. For these resumed connections, standard TLS 1.3 is safer but no faster than any previous version of TLS. 0-RTT changes this. It dramatically speeds up resumed connections, leading to a faster and smoother web experience for web sites that you visit regularly. This speed boost is especially noticeable on mobile networks.

We’re happy to announce that 0-RTT is Continue reading

Malicious uploads allowed hijacking of WhatsApp and Telegram accounts

A vulnerability patched in the web-based versions of encrypted communications services WhatsApp and Telegram would have allowed attackers to take over accounts by sending users malicious files masquerading as images or videos.The vulnerability was discovered last week by researchers from Check Point Software Technologies and was patched by the WhatsApp and Telegram developers after the company privately shared the flaw's details with them.The web-based versions of WhatsApp and Telegram synchronize automatically with the apps installed on users' phones. At least in the case of WhatsApp, once paired using a QR code, the phone needs to have an active internet connection for WhatsApp messages to be relayed to the browser on the computer.To read this article in full or to leave a comment, please click here

Malicious uploads allowed hijacking of WhatsApp and Telegram accounts

A vulnerability patched in the web-based versions of encrypted communications services WhatsApp and Telegram would have allowed attackers to take over accounts by sending users malicious files masquerading as images or videos.The vulnerability was discovered last week by researchers from Check Point Software Technologies and was patched by the WhatsApp and Telegram developers after the company privately shared the flaw's details with them.The web-based versions of WhatsApp and Telegram synchronize automatically with the apps installed on users' phones. At least in the case of WhatsApp, once paired using a QR code, the phone needs to have an active internet connection for WhatsApp messages to be relayed to the browser on the computer.To read this article in full or to leave a comment, please click here

Understanding the Federal Government’s Rapid Adoption of Cloud

One of the biggest trends in the IT industry at the moment is enterprise adoption of the public cloud. It’s obvious that it’s been accelerating over the recent years, but perhaps more importantly, Federal agencies are beginning to take a serious look at the cloud in an effort to reform IT and to achieve greater agility …

Microsoft Teams takes on Slack with enterprise bots, Office 365 tie-ins

Microsoft Teams is now live – and on by default – for Office 365 subscribers with Business Essentials, Business Premium and Enterprise plans.Teams is Microsoft’s answer to Slack, with an emphasis on Office 365 integration. Teams is automatically tied to tools such as Outlook, SharePoint, OneNote and Skype for Business. With Skype tie-ins, for example, Teams users can move from text-based chatting to a voice or video call, directly within the Teams app. RELATED: 4 reasons Microsoft Teams will kill Slack… and 4 reasons it won’tTo read this article in full or to leave a comment, please click here

Acronym: M is for Malware

A malware researcher known as Antelox recently tweeted about an unknown malware sample that caught our eye. Upon further investigation, it is a modular malware known as Acronym and could possibly be associated with the Win32/Potao malware family and the Operation Potao Express campaign. This […]

Twitter accounts hacked, Twitter Counter steps forward as culprit

Twitter Counter, a third-party analytics service, appears once again to have provided a gateway for hackers to post messages to high-profile Twitter accounts.An unlikely number of Twitter users suddenly learned to speak Turkish on Wednesday, posting an inflammatory message in the language replete with Nazi swastikas.Among those posting the message were the Twitter accounts of Forbes magazine, the Atlanta Police Department, and Amnesty International, one of the few hacked accounts one might expect to speak Turkish.Fears that these accounts had all been hacked were quickly allayed, when Twitter identified a third-party app as being to blame.To read this article in full or to leave a comment, please click here

Twitter accounts hacked, Twitter Counter steps forward as culprit

Twitter Counter, a third-party analytics service, appears once again to have provided a gateway for hackers to post messages to high-profile Twitter accounts.An unlikely number of Twitter users suddenly learned to speak Turkish on Wednesday, posting an inflammatory message in the language replete with Nazi swastikas.Among those posting the message were the Twitter accounts of Forbes magazine, the Atlanta Police Department, and Amnesty International, one of the few hacked accounts one might expect to speak Turkish.Fears that these accounts had all been hacked were quickly allayed, when Twitter identified a third-party app as being to blame.To read this article in full or to leave a comment, please click here

Review: MongoDB learns cool new tricks

MongoDB 3.4 continues the trend of databases building out support for a range of conceptual data models over the same underlying data store. This multimodel approach aims to deliver a single database that can be used to store data as documents, tables, and graphs simultaneously. The benefit to the user is a dramatically simplified infrastructure when compared to a polyglot persistence model, which might entail managing three or four separate data stores to satisfy those different use cases.To read this article in full or to leave a comment, please click here(Insider Story)

Spy agency, DOE, see China nearing supercomputing leadership

Advanced computing experts at the National Security Agency and the Department of Energy are warning that China is "extremely likely" to take leadership in supercomputing as early as 2020, unless the U.S. acts quickly to increase spending.China's supercomputing advances are not only putting national security at risk, but also U.S. leadership in high-tech manufacturing. If China succeeds, it may "undermine profitable parts of the U.S. economy," according to a report titled U.S. Leadership in High Performance Computing by HPC technical experts at the NSA, the DOE, the National Science Foundation and other agencies.To read this article in full or to leave a comment, please click here

Spy agency, DOE, see China nearing supercomputing leadership

Advanced computing experts at the National Security Agency and the Department of Energy are warning that China is "extremely likely" to take leadership in supercomputing as early as 2020, unless the U.S. acts quickly to increase spending.China's supercomputing advances are not only putting national security at risk, but also U.S. leadership in high-tech manufacturing. If China succeeds, it may "undermine profitable parts of the U.S. economy," according to a report titled U.S. Leadership in High Performance Computing by HPC technical experts at the NSA, the DOE, the National Science Foundation and other agencies.To read this article in full or to leave a comment, please click here

Hire a DDoS service to take down your enemies

With the onrush of connected internet of things (IoT) devices, distributed denial-of-service attacks are becoming a dangerous trend. Similar to what happened to DNS service provider Dyn last fall, anyone and everyone is in the crosshairs. The idea of using unprotected IoT devices as a way to bombard networks is gaining momentum.The advent of DDoS-for-hire services means that even the least tech-savvy individual can exact  revenge on some website. Step on up to the counter and purchase a stresser that can systemically take down a company.To read this article in full or to leave a comment, please click here

Hire a DDoS service to take down your enemies

With the onrush of connected internet of things (IoT) devices, distributed denial-of-service attacks are becoming a dangerous trend. Similar to what happened to DNS service provider Dyn last fall, anyone and everyone is in the crosshairs. The idea of using unprotected IoT devices as a way to bombard networks is gaining momentum.The advent of DDoS-for-hire services means that even the least tech-savvy individual can exact  revenge on some website. Step on up to the counter and purchase a stresser that can systemically take down a company.To read this article in full or to leave a comment, please click here

More than a third of tech workers are underpaid

IT salaries continue to rise, but many tech workers are still well above the national median income, new research from compensation and salary data solutions company Paysa shows that many tech workers are still underpaid.Paysa used machine learning and AI to examine more than five million resumes of tech and engineering professionals from their salary database and compared their education, experience, skills, work history and current salary to their market value for identical available roles, says Chris Bolte, CEO of Paysa.To read this article in full or to leave a comment, please click here

8 of the weirdest, wildest, most WTF scenes from SXSW

Keep SXSW weirdImage by Caitlin McGarryAustin is already a weird place, but during South by Southwest, the weirdness grows exponentially. Big brands thirsty for attention and tiny startups looking to pitch the hot new app compete to see who can capture the SXSW audience of techies and creatives. The brand presence was more subdued this year than in the past, but that didn’t make the stunts any less bananas. Here are the 8 that made me stop in my tracks.To read this article in full or to leave a comment, please click here

6 apps Apple really needs to make for Android

Android and iOS may be destined to do battle forever, but when it comes to apps, the relationship is a little friendlier. Countless iOS users enjoy Google’s services on their iPhones, and in fact, the acclaimed Gboard keyboard actually began its life as an iOS exclusive before making its way to the Play Store several months later.But while Apple hasn’t been nearly as generous with its offerings, it does offer Apple Music and Beats Pill as a concession to former Beats Music subscribers. However, there’s a load of untapped potential in the Play Store. After all, Apple doesn’t just sell iPhones, and many Android users have other Cupertino-made products that they use on a regular basis. So here are some Apple apps I’d love to see show up in the Play Store:To read this article in full or to leave a comment, please click here

4 ways technology has changed recruitment — for better (and worse)

From professional networking sites and job boards to online applicant systems, technology has revolutionized recruitment, profoundly changing how employers and recruiters find potential candidates. For example, applicant tracking systems and new AI software can help HR departments manage the massive influx of resumes they receive daily, says Michael Fauscette, chief research officer at G2 Crowd, a business software review platform. But, while technology can offer easy solutions, it often has a way of creating new problems in the process."The new AI-powered systems can do a great job sorting through candidates, but the risk is that non-traditional candidates or candidates with unusual experience that might be a very good fit could fall through the rules-based system, even one that learns and improves with 'experience'," he says.To read this article in full or to leave a comment, please click here