Archive

Category Archives for "Networking"

Qualcomm CEO slams Apple for ‘without merit’ lawsuits

Senior executives at Qualcomm slammed Apple on Wednesday for lawsuits filed in the last week alleging the smartphone chip-maker significantly overcharged it for licensing fees.The spat saw cases filed last Friday in California and this week in Beijing and were top of mind when Qualcomm conducted an earnings call with analysts on Wednesday.For 15 minutes, Qualcomm executives criticized Apple's moves, calling the two lawsuits "without merit" and accused the iPhone-maker of trying to use them as a way to reduce the royalties the iPhone maker pays to Qualcomm. To read this article in full or to leave a comment, please click here

Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground

When news broke in December of a massive data breach at Yahoo, it was met with a collective “This, again? Didn’t they just report a breach?” The company had, in fact, reported a record-breaking breach of 500 million user accounts three months earlier, but it was dwarfed by the December breach, which impacted over 1 billion records.To read this article in full or to leave a comment, please click here(Insider Story)

Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground

When news broke in December of a massive data breach at Yahoo, it was met with a collective “This, again? Didn’t they just report a breach?” The company had, in fact, reported a record-breaking breach of 500 million user accounts three months earlier, but it was dwarfed by the December breach, which impacted over 1 billion records.That pair of record breaking breaches was a fitting way to cap off a year marked by massive data breaches. As security intelligence provider Risk Based Security (RBS) points out in its newly-released 2016 Data Breach Trends report, “six 2016 breaches have taken their place on the Top 10 List of All Time Largest Breaches.”To read this article in full or to leave a comment, please click here(Insider Story)

IBM brings Google’s AI tools to its powerful computers

Google has cool technology to recognize images and speech, and IBM's hardware can diagnose diseases and beat humans in Jeopardy.Combine the two, and you get a powerful computer with serious brains.IBM is merging Google's artificial intelligence tools with its own cognitive computing technologies, allowing deep-learning systems to more accurately find answers to complex questions or recognize images or voices.+ ALSO ON NETWORK WORLD Artificial intelligence will revolutionize Wi-Fi +Google's open-source TensorFlow machine-learning tools are being packed into IBM's PowerAI, which is a toolkit for computer learning. The two can be combined to improve machine learning on IBM's Power servers.To read this article in full or to leave a comment, please click here

11 ways company politics can thwart your projects

Workplace politics are ultimately types of behaviors or actions injected into business situations that can complicate, impede, or derail progress altogether. Politics and its impact are often underestimated until it's too late. However you can mitigate the risk and the first step is to identify the type and level of political behaviors that might curtail the efforts of a project, program, portfolio, or even an entire organization.Political games can stem from one individual to multiple areas within an organization, and can have a devastating impact. Some forms of politics are blatant and obvious, while others can be more passive and even go completely undetected. The nature and severity of politics can range depending on the level within the organization and motivations, but make no mistake even the most seemingly minor politics can have a far-reaching effect on morale, trust, and the project outcome. Further, the outcome rarely plays out only at the project level, it more often than not has a negative consequence to a business as a whole. Sometimes the effects of political behaviors may not be felt until they snowball and become a larger problem that can jeopardize long-term strategic goals.To read this article in full Continue reading

Self-protection is key to Linux kernel security

Linux has quietly taken over the world. The operating system now powers the large datacenters that make all our cloud applications and services possible, along with billions of Android devices and internet-connected gadgets that comprise the internet of things (IoT). Even the systems that handle the day-to-day operations on the International Space Station run Linux.To read this article in full or to leave a comment, please click here(Insider Story)

Self-protection is key to Linux kernel security

Linux has quietly taken over the world. The operating system now powers the large datacenters that make all our cloud applications and services possible, along with billions of Android devices and internet-connected gadgets that comprise the internet of things (IoT). Even the systems that handle the day-to-day operations on the International Space Station run Linux.The fact that Linux is everywhere makes kernel security the highest priority. An issue in the kernel can easily create ripples that are felt by practically everyone. Finding and fixing vulnerabilities in the kernel is only one aspect of Linux security; enabling the kernel to withstand attacks is even more vital.To read this article in full or to leave a comment, please click here(Insider Story)

10 frustrating Google Chrome irritations and how to fix them

Chrome may be the most-used browser in the world, but that doesn’t mean it’s perfect. Far from it. Despite receiving over 50 updates over the years, Google’s browser still harbors several rough edges and idiosyncrasies that can make for a less than optimal online experience.A lot of articles show you how to fiddle with the browser in exotic ways. Not this one. Here, we’ll show you how to make Chrome less annoying—and that sweet, serene sanity is worth more than a thousand experimental features.Stop accidental closures Let’s start with something easy. It’s 2017 and Chrome still has no baked-in protection against closing all of your tabs without warning if you accidentally exit the browser.To read this article in full or to leave a comment, please click here

13 top Chromebook tools for business

Get your Chromebook ready for workChromebooks aren’t the anomaly in the workplace they used to be. Their easy administration, quick setup, and low learning curve have made them a successful and viable alternative to computers based on Windows or MacOS.For many, the major knock remains that Chromebooks can’t handle more sophisticated tasks given their reliance on web apps. One of Google’s solutions to this is bringing the Play Store to Chromebooks, empowering developers to package their Android apps for Chrome OS. The selection right now is pretty small, but the new Android-on-Chrome capabilities can be effective in the right spots.To read this article in full or to leave a comment, please click here

Review: Huawei plays “The Price Is Right” with Mate 9, Honor 6X (with video)

In some ways, the smartphone business resembles the movie business. The general public knows more about the major releases from big companies because that's what the companies push and the media writes about. But in both the phone and movie industries, there are hundreds of smaller releases targeted at very specific markets -- and if you're not in those markets, you may never hear about them.As a result, the majority of smartphone reviews you'll read about are for top-of-the-line flagship phones selling for roughly $800. It's a little unusual for a manufacturer to make a big deal about phones in the second or third tier of the market. Yet that's just what Huawei is doing with the Mate 9 and Honor 6X, two phones that represent good-to-excellent value but would otherwise not set the world on fire.To read this article in full or to leave a comment, please click here

Microsoft: Upgrade .Net for better garbage collection

Microsoft is encouraging developers to move to the 4.6.2 version of the .Net Framework, so they can benefit from significant changes to the garbage collector, which provides automatic memory management..Net Framework 4.6.2 was released late last summer, but Microsoft is now advising upgrades to take advantage of benefits in object handling. These changes were made in order to improve the framework's performance and to allow the garbage collector to operate more efficiently, Microsoft said. Garbage collection enables developers to build applications without needing to free memory; it also allocates objects on the managed heap and reclaims objects no longer in use.To read this article in full or to leave a comment, please click here

A new service for the less techie criminals

Sketchy charactersImage by ThinkstockYou’ve heard of big business owners like Jeff Bezos, Larry Page and Warren Buffet. However, did you know there’s a long list of business owners, all of who have access to millions of dollars at their fingertips, that you’ll never hear about. These people are the owners of crimeware-as-a-service (CaaS) businesses. For underground cybercriminals, CaaS provides a new dimension to cybercrime by making it more organized, automated and accessible to criminals with limited technical skills. Today, cybercriminals can develop, advertise and sell anything from a botnet to a browser exploit pack or DDoS attack toolkits. Aditya K Sood, director of security and cloud threat labs at Blue Coat Systems, a part of Symantec, details how cybercriminals can obtain sensitive data, like credit card numbers, names and addresses, with just a couple of clicks and a payment.To read this article in full or to leave a comment, please click here

A new service for the less techie criminals

Sketchy charactersImage by ThinkstockYou’ve heard of big business owners like Jeff Bezos, Larry Page and Warren Buffet. However, did you know there’s a long list of business owners, all of who have access to millions of dollars at their fingertips, that you’ll never hear about. These people are the owners of crimeware-as-a-service (CaaS) businesses. For underground cybercriminals, CaaS provides a new dimension to cybercrime by making it more organized, automated and accessible to criminals with limited technical skills. Today, cybercriminals can develop, advertise and sell anything from a botnet to a browser exploit pack or DDoS attack toolkits. Aditya K Sood, director of security and cloud threat labs at Blue Coat Systems, a part of Symantec, details how cybercriminals can obtain sensitive data, like credit card numbers, names and addresses, with just a couple of clicks and a payment.To read this article in full or to leave a comment, please click here

Why Containers Are Crap

I appreciated this rant by @alicegoldfuss on a impractical parts of running containers. Not many people talk about the downsides.

(shame its not on a blog somewhere where it would be readable)

Facebook appoints former Xiaomi exec Hugo Barra to head VR business

Facebook has appointed former Xiaomi executive Hugo Barra to lead its virtual reality initiatives, including the Oculus VR business that was acquired in 2014.The appointment was announced by the company's founder and CEO Mark Zuckerberg, who said that Barra will lead all of Facebook's virtual reality efforts including the Oculus team.Facebook's decision to hire Barra as vice president of virtual reality may have been influenced in part by his exposure to the Chinese market, which is forecast by IDC to account for 20 percent of worldwide virtual reality head-mounted displays next year.To read this article in full or to leave a comment, please click here

Facebook appoints Xiaomi exec Hugo Barra to head VR business

Facebook has appointed Xiaomi executive Hugo Barra to lead its virtual reality initiatives, including the Oculus VR business that was acquired in 2014.The appointment was announced by the company's founder and CEO Mark Zuckerberg, who said that Barra will lead all of Facebook's virtual reality efforts including the Oculus team.Facebook's decision to hire Barra as vice president of virtual reality may have been influenced in part by his exposure to the Chinese market, which is forecast by IDC to account for 20 percent of worldwide virtual reality head-mounted displays next year.To read this article in full or to leave a comment, please click here

Password-free security uses voice, user behavior to verify identity

Tired of conventional passwords? So is Nuance Communications, a tech firm that is promoting the human voice as a way to secure user accounts.The company’s voice biometric product is among the technologies that promise to replace traditional -- and often vulnerable -- password authentication systems, which can be easy to hack. That isn’t the case with Nuance’s solution, the company claims.   “To determine if it’s you or not, we are looking at over 100 different characteristics of your voice,” said Brett Beranek, Nuance’s director of product strategy.The problem with passwords The need to move beyond passwords hasn’t been more urgent, given that hackers are routinely finding ways to steal them. Last year, Yahoo, LinkedIn and Dropbox all reported major data breaches involving account details such as email addresses and hashed passwords.  To read this article in full or to leave a comment, please click here

Password-free security uses voice, user behavior to verify identity

Tired of conventional passwords? So is Nuance Communications, a tech firm that is promoting the human voice as a way to secure user accounts.The company’s voice biometric product is among the technologies that promise to replace traditional -- and often vulnerable -- password authentication systems, which can be easy to hack. That isn’t the case with Nuance’s solution, the company claims.   “To determine if it’s you or not, we are looking at over 100 different characteristics of your voice,” said Brett Beranek, Nuance’s director of product strategy.The problem with passwords The need to move beyond passwords hasn’t been more urgent, given that hackers are routinely finding ways to steal them. Last year, Yahoo, LinkedIn and Dropbox all reported major data breaches involving account details such as email addresses and hashed passwords.  To read this article in full or to leave a comment, please click here