Archive

Category Archives for "Networking"

Sniff out and kick out Windows malware for free

No single antimalware engine can keep up with all the malware out there. But how about 57 of 'em?[ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ] In this video, you'll learn how to download and run Windows Sysinternals Process Explorer to test all currently running executables on your Windows system against VirusTotal's 57 antivirus engines, which together offer the best accuracy you can ever get (with a small percentage of false positives that are pretty easy to spot).To read this article in full or to leave a comment, please click here

Sniff out and kick out Windows malware for free

No single antimalware engine can keep up with all the malware out there. But how about 57 of 'em?[ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ] In this video, you'll learn how to download and run Windows Sysinternals Process Explorer to test all currently running executables on your Windows system against VirusTotal's 57 antivirus engines, which together offer the best accuracy you can ever get (with a small percentage of false positives that are pretty easy to spot).To read this article in full or to leave a comment, please click here

5 tech battles facing Trump

President Donald Trump may face protests from scientists and technologists like no other president before him.It's not just the tech industry that may battle Trump. New forces are arising, some grassroots, such as Neveragain.tech and a planned massive "March for Science," in Washington and elsewhere. The tech industry protest over the seven-country immigration ban is just a preview.To read this article in full or to leave a comment, please click here

Google open-sources Chrome browser for iOS

Google is open-sourcing its Chrome browser on the Apple iOS platform, after making changes enabling the code to be part of Google’s Chromium browser project.The code will be moved to the open source Chromium repository, which lets developers build their own Chrome-like browsers. It had been kept separate from Chromium because of Apple's requirement that all iOS browsers be built on the Apple-controlled WebKit rendering engine.[ Safeguard your browsers; InfoWorld's experts tell you how in the "Web Browser Security Deep Dive" PDF guide. | Cut to the key news in technology trends and IT breakthroughs with the InfoWorld Daily newsletter, our summary of the top tech happenings. ] But after years of refactoring to cleanly separate WebKit from the Chrome for iOS code, the Chrome for iOS code is rejoining Chromium, Google said in a bulletin. (Chrome on other operating systems uses Google's own Blink browser engine.) Developers can compile the iOS version of Chromium like they can for other Chromium versions. Google said it had spent a lot of time during the past several years making changes required to move the code for Chrome for iOS into Chromium.To read this article Continue reading

Review: The best frameworks for machine learning and deep learning

Over the past year I've reviewed half a dozen open source machine learning and/or deep learning frameworks: Caffe, Microsoft Cognitive Toolkit (aka CNTK 2), MXNet, Scikit-learn, Spark MLlib, and TensorFlow. If I had cast my net even wider, I might well have covered a few other popular frameworks, including Theano (a 10-year-old Python deep learning and machine learning framework), Keras (a deep learning front end for Theano and TensorFlow), and DeepLearning4j (deep learning software for Java and Scala on Hadoop and Spark). If you’re interested in working with machine learning and neural networks, you’ve never had a richer array of options.  To read this article in full or to leave a comment, please click here(Insider Story)

5 things DevOps needs to do to secure containers

Can’t we all get alongImage by PixabayDo deepening adoption and broader deployment of container technologies (from the likes of Docker, CoreOS and others) threaten to escalate into the latest skirmish between operations, developers and information security? Certainly, the potential exists to widen the rift, but in fact there is far more common ground than would initially suggest. Containerization introduces new infrastructure that operates dynamically and is open in nature, with more potential for cross-container activity. Containerization presents an almost unprecedented opportunity to embed security into the software delivery pipeline – rather than graft on security checks, container monitoring and policy for access controls as an afterthought.To read this article in full or to leave a comment, please click here

5 things DevOps needs to do to secure containers

Can’t we all get alongImage by PixabayDo deepening adoption and broader deployment of container technologies (from the likes of Docker, CoreOS and others) threaten to escalate into the latest skirmish between operations, developers and information security? Certainly, the potential exists to widen the rift, but in fact there is far more common ground than would initially suggest. Containerization introduces new infrastructure that operates dynamically and is open in nature, with more potential for cross-container activity. Containerization presents an almost unprecedented opportunity to embed security into the software delivery pipeline – rather than graft on security checks, container monitoring and policy for access controls as an afterthought.To read this article in full or to leave a comment, please click here

What enterprise software developers can learn from consumer apps

Companies are asking why the enterprise applications that their employees, customers and partners use every day can't be as simple and intuitive to use as the apps on their smartphones.They can be.In fact, corporate IT is already taking many cues from mobile consumer apps for improving user experience and speeding development of business applications.It's working. By focusing development on specific tasks, enterprise developers are producing apps faster while using fewer IT resources and less code. Even better, the simplicity and ease-of-use of the apps -- little or no training required -- can make them less intimidating for users.To read this article in full or to leave a comment, please click here

AI isn’t just for the good guys anymore

Last summer at the Black Hat cybersecurity conference, the DARPA Cyber Grand Challenge pitted automated systems against one another, trying to find weaknesses in the others' code and exploit them."This is a great example of how easily machines can find and exploit new vulnerabilities, something we'll likely see increase and become more sophisticated over time," said David Gibson, vice president of strategy and market development at Varonis Systems.His company hasn't seen any examples of hackers leveraging artificial intelligence technology or machine learning, but nobody adopts new technologies faster than the sin and hacking industries, he said.To read this article in full or to leave a comment, please click here

AI isn’t just for the good guys anymore

Last summer at the Black Hat cybersecurity conference, the DARPA Cyber Grand Challenge pitted automated systems against one another, trying to find weaknesses in the others' code and exploit them."This is a great example of how easily machines can find and exploit new vulnerabilities, something we'll likely see increase and become more sophisticated over time," said David Gibson, vice president of strategy and market development at Varonis Systems.His company hasn't seen any examples of hackers leveraging artificial intelligence technology or machine learning, but nobody adopts new technologies faster than the sin and hacking industries, he said.To read this article in full or to leave a comment, please click here

How to succeed in an as-a-service world

The cloud conversation is not new. We know by now that the cloud is a prerequisite to shaping scalable and resource-elastic, variable cost-based businesses. However, companies and their CIOs continue to struggle with how to work effectively in this new model, perhaps because they have underestimated the required changes.Successful migration to the cloud is not a trivial milestone. In fact, it may be one of the most significant journeys the IT organization embarks upon. It requires changes to the way the organization functions and delivers – and the speed at which it does so. It calls for a full-scale mindset shift as well as new ways of working - no small feat for most companies.To read this article in full or to leave a comment, please click here

Response: Oracle effectively doubles licence fees to run its stuff in AWS • The Register

Oracle doubles pricing on cloud use in AWS which will ‘coincidentally’ make the high pricing of its own cloud look relatively cheap. Will customers lie down and take this ? Almost certainly, its hard to imagine a bigger commercial sucker than an Oracle customer – its hard to get rid of it once you have it and they love price increases (probably thinking it validates why they bought the product in the first place).

Oracle has changed the way it charges users to run its software in Amazon Web Services, effectively doubling the cost along the way.

Oracle effectively doubles licence fees to run its stuff in AWS • The Register : https://www.theregister.co.uk/2017/01/30/oracle_effectively_doubles_licence_fees_to_run_in_aws/

The post Response: Oracle effectively doubles licence fees to run its stuff in AWS • The Register appeared first on EtherealMind.

Now Cisco can even network your building systems

The latest network hardware from Cisco Systems gives new meaning to the words “light switch.”The Catalyst Digital Building Series Switch is an Ethernet switch designed to link different kinds of building infrastructure over a network. It will be available worldwide in the second quarter. It uses Cisco’s enhanced version of PoE (Power over Ethernet) to run things like lights and cameras while collecting data about those devices over the same standard cable.The switch embodies the merger of IT and OT (operational technology), one of the big enterprise trends that the internet of things is driving. The line is blurring between information systems like servers and building systems like lighting, heating, and physical security. The new technology could make buildings run better. It might also help to turn IT folks and facilities experts into a bit of both.To read this article in full or to leave a comment, please click here

Now Cisco can even network your building systems

The latest network hardware from Cisco Systems gives new meaning to the words “light switch.”The Catalyst Digital Building Series Switch is an Ethernet switch designed to link different kinds of building infrastructure over a network. It will be available worldwide in the second quarter. It uses Cisco’s enhanced version of PoE (Power over Ethernet) to run things like lights and cameras while collecting data about those devices over the same standard cable.The switch embodies the merger of IT and OT (operational technology), one of the big enterprise trends that the internet of things is driving. The line is blurring between information systems like servers and building systems like lighting, heating, and physical security. The new technology could make buildings run better. It might also help to turn IT folks and facilities experts into a bit of both.To read this article in full or to leave a comment, please click here

Apple’s Mobility Partner Program comes out of hiding

You won’t find many public references by Apple to its Mobility Partner Program, an expanding effort by the company to unite with software developers/integrators to boost sales of iPhones and iPads to businesses. In fact, Apple reportedly has discouraged partners in years past from discussing MPP out in the open.But the veil of secrecy surrounding the program is thinning. Apple’s public relations department didn't acknowledge my queries about MPP, such as how long the program has actually been around. But CEO Tim Cook has begun citing the program during Apple (AAPL - NASDAQ) earnings calls over the past year: He specified in October that more than 120 partners have signed on worldwide, and that’s up from about 90 at the start of the year. To read this article in full or to leave a comment, please click here

Response: BGP in 2016 – Geoff Huston

Geoff Huston taking a withering look at the crapness of BGP in the Internet. As always, its quite crap excluding the fact that it actually works (more or less).

It has become either a tradition, or a habit, each January for me to report on the experience with the inter-domain routing system over the past year, looking in some detail at some metrics from the routing system that can show the essential shape and behaviour of the underlying interconnection fabric of the Internet.

The long predicted apocalypse in the Internet routing table hasn’t come to pass so the those 15-year old Catayst 6500 switches will still be used in the Internet backbone for many years to come. Oh, yay.

None of the metrics indicate that we are seeing such an explosive level of growth in the routing system that it will fundamentally alter the viability of carrying a full BGP routing table anytime soon. In terms of the projections of table size in the IPv4 and IPv6 networks, the BGP sky is firmly well above us, and it’s not about to fall on our heads just yet!

ISP Column – January 2017

The post Response: BGP in 2016 – Geoff Continue reading