Archive

Category Archives for "Networking"

Google Spaces headed to the graveyard

Google has begun populating its 2017 graveyard, with its Spaces app for group discussion and messaging grabbing an early plot. Google Space won't even last one year: It was introduced in May of 2016 and will be shut down on April 17, 2017, according to a Google support page. Google Google MORE: What Google killed in 2016To read this article in full or to leave a comment, please click here

Nostalgia rules as classic phone brands come alive at MWC

Classic phone brands from yesteryear are coming alive in Barcelona.Nokia, Blackberry and Moto were among the unlikely headline makers ahead of the Mobile World Congress trade show, which starts on Monday. Moto is owned by Lenovo, and the unit is still called Motorola Mobility.The new smartphones mixed up retro ideas with new features. A new Nokia 3310 candy-bar phone is the modern version of its classic namesake, while the new Blackberry KEYOne handset has a hard keyboard, which made previous smartphones under the brand popular.The Blackberry and Nokia brands have tremendous cachet, and fans will root for these brands to win again, said Roger Kay, principal analyst at Endpoint Technologies Associates.To read this article in full or to leave a comment, please click here

Akyumen’s Hawk smartphone packs a projector

Over the past decade there have been several attempts to cram video projectors into smartphones. All ultimately failed, but a Silicon Valley startup reckons it has the recipe right and is hoping for a warm response from consumers when its phone debuts later this year. The Akyumen Hawk is a 5.5-inch Android handset that packs a low-profile projector into the upper half of the phone. The 35-lumen projector has enough power to display an image over a distance of about a meter in a normally lit room and at up to 100 inches in a more dimly lit room. Akyumen says the secret to its phone is a proprietary projector that stays cool even after hours of use. And indeed, during a demonstration in Barcelona on Sunday, the phone was only slightly warm despite the projector being used for at least 20 minutes.To read this article in full or to leave a comment, please click here

Samsung mulls iris scanners on smartphones to log into Windows PCs

Soon, your Samsung phone may be able to recognize your iris and log you into your Windows PC. Iris-scanning via phone is not yet a feature available for Samsung's latest Galaxy Book 2-in-1s, which were announced at Mobile World Congress. But the company wants to quickly bridge the gap between its Galaxy smartphones, which run on Android, and its Windows PCs and 2-in-1s. Software called Samsung Flow links the company's Android smartphones to Windows PCs. Samsung and Microsoft are looking to collaborate on logins via Windows Hello -- designed to use biometric authentication to log into PCs -- and one big Flow feature is the ability to use Galaxy smartphones to wirelessly log into the new Galaxy Book.To read this article in full or to leave a comment, please click here

Huawei’s P10 camera-phone comes in more colors than the rainbow

Huawei Technologies calls the P10 a smartphone, but its CEO doesn't have much to say about its communication capabilities.Richard Yu, CEO of the company's consumer business group, might instead have been talking about a new camera when he boasted of the device's Leica-style portraiture and, in fact, like its predecessor it was "co-engineered" with camera-maker Leica.The device runs Android 7.0 on a Huawei Kirin 960 processor with four 2.4GHz ARM Cortex A73 cores and four 1.8GHz ARM Cortex A53 cores and has 4GB of RAM and 32, 64 or 128GB of flash depending on the model.It has a 5.1-inch Full-HD screen and a 3,200 mAh battery with USB-C charging. It measures 145.3 millimeters by 69.3 mm by 6.98 mm, and weighs about 145 grams.To read this article in full or to leave a comment, please click here

Ransomware attacks targeted hundreds of MySQL databases

Hundreds of MySQL databases were hit in ransomware attacks, which were described as “an evolution of the MongoDB ransomware attacks;” in January, there were tens of thousands of MongoDB installs erased and replaced with ransom demands. In the new attacks, targeted MySQL databases are erased and replaced with a ransom demand for 0.2 bitcoin, which is currently equal to about $234.To read this article in full or to leave a comment, please click here

Ransomware attacks targeted hundreds of MySQL databases

Hundreds of MySQL databases were hit in ransomware attacks, which were described as “an evolution of the MongoDB ransomware attacks;” in January, there were tens of thousands of MongoDB installs erased and replaced with ransom demands. In the new attacks, targeted MySQL databases are erased and replaced with a ransom demand for 0.2 bitcoin, which is currently equal to about $234.To read this article in full or to leave a comment, please click here

CCDE – A different Journey

Wednesday the 22nd of February, in a testing center in the middle of London, my journey towards achieving the CCDE certification, finally ended in me passing this beast of an exam.

This learning journey was a very different one than either of my CCIE’s. Whereas going for the CCIE meant spending countless hours at the command-line, the CCDE meant spending all of those hours reading and discussing use cases for technologies. It also meant stepping my toes into the business side, picking up the “Why?” behind selecting a specific technology.

It all started a few years ago when my friend Daniel (lostintransit.se) and I started going back and forth on how to approach this thing. We decided we should team up and share notes, discuss technologies and generally use each other as a sparring partner.

At that point I had already decided, that this was going to be a marathon for me, because I could at the time, not allocate as much time each day for study, as I had been for the CCIE’s. Fast forward a good amount of time and I had finally passed the written part of the exam and was ready to Continue reading

Pre-crime, algorithms, artificial intelligence, and ethics

I just binge-listened to an outstanding podcast, LifeAfter, which, without giving too much away, is about artificial intelligence and its impact on people. Here's the show's synopsis: When you die in the digital age, pieces of you live on forever. In your emails, your social media posts and uploads, in the texts and videos you’ve messaged, and for some – even in their secret online lives few even know about. But what if that digital existence took on a life of its own? Ross, a low level FBI employee, faces that very question as he starts spending his days online talking to his wife Charlie, who died 8 months ago…To read this article in full or to leave a comment, please click here

The Gearhead Raspberry Pindex

I've been writing about the Raspberry Pi, the Internet of Things, and supporting technologies for some time and here, for all of you RPi aficionados, is my list of related Gearhead posts in reverse order. Enjoy ... and to get early warning of a new Gearhead post, sign up for my newsletter. Internet of Things Messaging, Part 3: Testing Mosquitto Internet of Things Messaging, Part 2: The Mosquitto MQTT broker Cluster HAT, the easiest way to build a Raspberry Pi Zero cluster 10 amazing Raspberry Pi clusters PIXEL, the latest Raspberry Pi OS ... for x86! Internet of Things Messaging, Part 1: Introducing MQTT Putting Alexa on a Raspberry Pi What's in a Raspberry Pi name? How to rename your RPi under Raspbian Using the Raspberry Pi to thwart the creepy clown menace Building a Raspberry Pi-powered Barkometer, Part 4 Building a Raspberry Pi-powered Barkometer, Part 3 Building a Raspberry Pi-powered Barkometer, Part 2 Building a Raspberry Pi-powered Barkometer, Part 1 The discerning nerd's guide to Raspberry Pi hardware (2016 mid-year edition)  9 Raspberry Pi programming tools bundled with Raspbian 7 ways to make your IoT-connected Raspberry Pi smarter Ultimate Guide to Raspberry Pi Operating Systems Part 1 Ultimate Guide to Raspberry Continue reading

The new BlackBerry has a physical keyboard and will arrive in April

The new BlackBerry KEYone smartphone, unveiled Saturday, is the first smartphone to carry the brand that doesn't come from BlackBerry.It will go on sale globally in April, said Nicolas Zibell, CEO of TCL Communication, the phone's manufacturer and licensee of the brand, at a launch event in Barcelona on the eve of Mobile World Congress.Like the BlackBerries of old, the KEYone has a physical keyboard with raised keys. A neat twist is that it also acts as a touchpad of sorts, and each letter can be used as a shortcut, with or without a modifier key, for 52 shortcuts in all.To read this article in full or to leave a comment, please click here

The new BlackBerry has a physical keyboard and will arrive in April

The new BlackBerry KEYone smartphone, unveiled Saturday, is the first smartphone to carry the brand that doesn't come from BlackBerry.It will go on sale globally in April, said Nicolas Zibell, CEO of TCL Communication, the phone's manufacturer and licensee of the brand, at a launch event in Barcelona on the eve of Mobile World Congress.Like the BlackBerries of old, the KEYone has a physical keyboard with raised keys. A neat twist is that it also acts as a touchpad of sorts, and each letter can be used as a shortcut, with a short or long keypress, for 52 shortcuts in all.To read this article in full or to leave a comment, please click here

Learning Python -Kirk Byers Python Course

Learning is process and there is no end to it. I came across Kirk Byers free python series and subscribed to the same . The next Learning Python course starts on April 13th. I should receive the first class on that day. Reviews for this course is positive .Hopefully i will be able to follow the course as schedule and would share my […]

IBM, Vermont Electric spawn intelligent energy software company

IBM today said it would partner with Vermont Electric Power to create Utopus Insights to research develop and product intelligent analytic software for the energy industry.IBM said Utopus will bring to market a full-featured energy analytics platform, built for cloud (SaaS), on-premises and distributed Internet of Things (IoT) operation.+More on Network World: NASA embraces IBM’s Watson for future space, aerospace technology development+The platform will be built with open APIs that allow integration of third party tools and will include applications that enable best-in-class renewable forecasting, grid asset health and network risk analysis, and Distributed Energy Resource management, according to IBM Fellow, Dr. Chandu Visweswariah, who will be President and CEO of Utopus.To read this article in full or to leave a comment, please click here

Join us this year at OCP Summit

It’s that time of the year again! And no, we’re not talking about the arrival of the Spring Equinox (although we’re pretty excited about that too). It’s time for OCP Summit — one of our favorite events of the year. Why you ask? We are committed to the open compute project and we love sharing that passion with others in the industry. This year our summit schedule is chock-full of presentations, booth demos, networking and a multitude of discussions covering how organizations can go web-scale with Cumulus Networks.

What we’re doing at OCP Summit

First off, if you are attending Open Compute Project Summit this year, please stop by our booth for an up close and personal look at Backpack running Cumulus Linux. If you stop by, you’ll also be lucky enough to watch our cofounder and CTO, JR Rivers, demo the product and answer all of your burning questions.

This year we decided to treat attendees to everyone’s favorite fluffy snack — yup, we’ll have our very own cotton candy machine, so stop by during that post-lunch slump for a quick sugar hit. When you come by the booth, you’ll have a chance to enter our giveaway for a Continue reading

71% off Cambridge SoundWorks OontZ Angle 3 PLUS Wireless Bluetooth Speaker – Deal Alert

Designed and Engineered by Cambridge SoundWorks to deliver richer fuller bass; the PLUS delivers surprising bass from such a small speaker, excellent bass performance across each type of music genre.  The PLUS battery technology and power saving design allows this speaker to play up to 30 hours from a full charge with volume set up to 2/3 of maximum playing volume.  IPX5 water resistance makes the unit splashproof, rainproof, dustproof, and sandproof.  Check out the dramatically discounted OontZ Angle 3 PLUS from Cambridge Soundworks now on Amazon.To read this article in full or to leave a comment, please click here

Apple is investigating an iPhone 7 Plus that ‘blew up’

A Twitter video of a smoking iPhone 7 Plus has gone viral, prompting Apple to investigate.On Friday, Apple said that it was working with Brianna Olivas, who shared the video of her iPhone 7 Plus after it “blew up,” to try to find out the cause of the explosion. Olivas wrote that her rose gold iPhone 7 Plus, which she purchased from Sprint in January, “caught fire” while she was sleeping on Wednesday morning.Her boyfriend moved the iPhone from the bed to the dresser before going to the bathroom. When he came back, the iPhone was “steaming” and making a “squealing noise” so he tossed it in the bathroom. That’s when the iPhone 7 Plus “blew up and more smoke started coming out.”To read this article in full or to leave a comment, please click here

I come to bury SHA1, not to praise it

Most cryptography is theoretical research. When it is no longer theoretical, in practice it can become a harmful exploit.Google and Dutch research institute CWI proved that the SHA1 hash method, first introduced 20 years ago, could produce a duplicate hash from different documents using a technique that consumed significant computational resources: 6,500 years of CPU computation to complete the attack first phase and 110 years of GPU computation to complete the second phase. The exercise was computationally intensive but proved it is within the realm of possibility, especially compared to a brute force attack that would require 12 million GPU compute years.To read this article in full or to leave a comment, please click here

I come to bury SHA1, not to praise it

Most cryptography is theoretical research. When it is no longer theoretical, in practice it can become a harmful exploit.Google and Dutch research institute CWI proved that the SHA1 hash method, first introduced 20 years ago, could produce a duplicate hash from different documents using a technique that consumed significant computational resources: 6,500 years of CPU computation to complete the attack first phase and 110 years of GPU computation to complete the second phase. The exercise was computationally intensive but proved it is within the realm of possibility, especially compared to a brute force attack that would require 12 million GPU compute years.To read this article in full or to leave a comment, please click here