Archive

Category Archives for "Networking"

Microsoft expands FastTrack migration service

Microsoft is expanding the free services it offers to help enterprise customers adopt its products.The company announced Monday that its FastTrack services now encompass Dynamics 365, Windows 10 and Microsoft Teams. Those come in addition to Office 365 and the Enterprise Mobility Suite, which were already covered under FastTrack.Each service is designed to help companies get the most out of products they've already subscribed to and adopt products that the company has recently released. FastTrack includes adoption guides, tools to find a Microsoft partner company to help with migration, and consulting help from Microsoft employees on particular issues.To read this article in full or to leave a comment, please click here

Yahoo pushes back timing of Verizon deal after breaches

Verizon’s planned acquisition of Yahoo will take longer than expected and won’t close until this year’s second quarter, the internet company said on Monday.The $4.8 billion deal was originally slated to close in the first quarter, but that was before Yahoo reported two massive data breaches that analysts say may scrap the entire deal.Although Yahoo continues to work to close the acquisition, there’s still work required to meet closing the deal's closing conditions, the company said in an earnings statement, without elaborating.Verizon has suggested that the data breaches, and the resulting blow to Yahoo’s reputation, might cause it to halt or renegotiate the deal.To read this article in full or to leave a comment, please click here

Yahoo pushes back timing of Verizon deal after breaches

Verizon’s planned acquisition of Yahoo will take longer than expected and won’t close until this year’s second quarter, the internet company said on Monday.The $4.8 billion deal was originally slated to close in the first quarter, but that was before Yahoo reported two massive data breaches that analysts say may scrap the entire deal.Although Yahoo continues to work to close the acquisition, there’s still work required to meet closing the deal's closing conditions, the company said in an earnings statement, without elaborating.Verizon has suggested that the data breaches, and the resulting blow to Yahoo’s reputation, might cause it to halt or renegotiate the deal.To read this article in full or to leave a comment, please click here

Open-source oriented RISELab emerges at UC Berkeley to make apps smarter & more secure

UC Berkeley on Monday launched a five-year research collaborative dubbed RISELab that will focus on enabling apps and machines that can interact with the environment around them securely and in real-time.The RISELab (Real-time Intelligence with Secure Execution) is backed by a slew of big name tech and financial firms: Amazon Web Services, Ant Financial, Capital One, Ericsson, GE Digital, Google, Huawei, Intel, IBM, Microsoft and VMWare. MORE: 7 really cool networking & IT research projectsTo read this article in full or to leave a comment, please click here

Open-source oriented RISELab emerges at UC Berkeley to make apps smarter & more secure

UC Berkeley on Monday launched a five-year research collaborative dubbed RISELab that will focus on enabling apps and machines that can interact with the environment around them securely and in real-time.The RISELab (Real-time Intelligence with Secure Execution) is backed by a slew of big name tech and financial firms: Amazon Web Services, Ant Financial, Capital One, Ericsson, GE Digital, Google, Huawei, Intel, IBM, Microsoft and VMWare. MORE: 7 really cool networking & IT research projectsTo read this article in full or to leave a comment, please click here

10 of the latest craziest and scariest things the TSA found on your fellow travelers

When it comes to our annual look at what wacky things the TSA pulls out of travelers’ carryon luggage, every year the crazy seems to get a little crazier and the scary, well you know where we are going with this.Interestingly the TSA finds some amusement or amazement in these finding as it now posts its own Top 10 Most Unusual Finds which outlines the most “dangerous and often times wacky items” it has kept off commercial airliners.To start, we need to look at guns. The number of guns that traverse or try to traverse the skies in the United States continues to grow at an astounding rate. There was a 28% increase in firearm discoveries from 2015’s total of 2,653. The TSA says that in 2016, 3,391 firearms were discovered in carry-ons --averaging more than nine firearms per day.To read this article in full or to leave a comment, please click here

10 of the latest craziest and scariest things the TSA found on your fellow travelers

When it comes to our annual look at what wacky things the TSA pulls out of travelers’ carryon luggage, every year the crazy seems to get a little crazier and the scary, well you know where we are going with this. Interestingly the TSA finds some amusement or amazement in these finding as it now posts its own Top 10 Most Unusual Finds which outlines the most “dangerous and often times wacky items” it has kept off commercial airliners. To start, we need to look at guns. The number of guns that traverse or try to traverse the skies in the United States continues to grow at an astounding rate. There was a 28% increase in firearm discoveries from 2015’s total of 2,653. The TSA says that in 2016, 3,391 firearms were discovered in carry-ons --averaging more than nine firearms per day.To read this article in full or to leave a comment, please click here

59% off RAVPower 14000mAh Portable Car Jump Starter – Deal Alert

A compact power bank, a car jump starter, and a LED flashlight, all fit into a minimal and portable design. Whether it is your car or your USB devices, never run out of power again. Store it in the glovebox or simply drop it in your bag. Have a concentrated 14000mAh source of power always with you -- enough for up to 20 vehicle jumpstarts or many device recharges before the unit itself needs to be recharged. RAVPower's jump starter typically lists for $160 but is currently discounted 59% on Amazon to just $66. See the discounted car jumper now on Amazon. To read this article in full or to leave a comment, please click here

Google wants to bring smart tools to Raspberry Pi-like boards

Google has hinted that it is interested in bringing "smart tools" to users of board computers like Raspberry Pi 3 and Intel's Edison.The company has launched a market research survey of the maker community, and the front page of the site states: "We at Google are interested in creating smart tools for makers, and want to hear from you about what would be most helpful."The survey includes queries on preferred maker boards, proficiency in hardware and software, and projects users may want to pursue.Google did not respond to request for comment.But in a blog entry, Raspberry Pi noted that the smart tools will be available sometime this year.To read this article in full or to leave a comment, please click here

Are tech companies responsible for negative outcomes?

America’s largest tech companies face a growing backlash over the potentially negative impacts of their strategic decisions and innovations. For example, companies like Apple, Facebook, Google and Microsoft are investing in artificial intelligence (AI) technologies and product roadmaps that will replace millions of jobs during the coming years. Experts in marketing, technology and social awareness say it’s time for technology providers to assume greater responsibility for the personal pain that comes along with the collective gain.Emerging technology is at almost perpetual odds with the status quo, but U.S. society is coming to realize that dynamic can lead to job losses, unfair treatment of social services and a stain on civic engagement. The power and influence that some tech companies command is being reevaluated in light of the myriad ways people are being disenfranchised in some way by their actions.To read this article in full or to leave a comment, please click here

China goes after unauthorized VPN access from local ISPs

China is going after unauthorized internet connections, including tools known as VPNs (virtual private networks) that can bypass China’s efforts to control the web.The crackdown is part of 14-month campaign from China’s Ministry of Industry and Information Technology that's meant to clean up the country’s internet service provider marketUnless authorized, internet service providers are forbidden from operating any “cross-border” channel business, including VPNs, the ministry said in a Sunday notice.  The announcement is a bit of rarity. The country has usually withheld from openly campaigning against VPN use, even as government censors have intermittently tried to squelch access to them in the past.  To read this article in full or to leave a comment, please click here

China goes after unauthorized VPN access from local ISPs

China is going after unauthorized internet connections, including tools known as VPNs (virtual private networks) that can bypass China’s efforts to control the web.The crackdown is part of 14-month campaign from China’s Ministry of Industry and Information Technology that's meant to clean up the country’s internet service provider marketUnless authorized, internet service providers are forbidden from operating any “cross-border” channel business, including VPNs, the ministry said in a Sunday notice.  The announcement is a bit of rarity. The country has usually withheld from openly campaigning against VPN use, even as government censors have intermittently tried to squelch access to them in the past.  To read this article in full or to leave a comment, please click here

Microsoft revives free Windows 10 upgrade for SMBs

Microsoft last week resurrected its free Windows 10 upgrade, but aimed the deal at small- and mid-sized businesses that had passed on the earlier offer."They're extending the free upgrade to this segment of customers to help them get to Windows 10," said Wes Miller, an analyst at Directions on Microsoft who specializes in the technology company's complex licensing rules and practices.Like the 12-month upgrade deal that ended last August, the new offer applies to personal computers running Windows 7 or Windows 8.1. But the new program is limited to a select group of customers. Only businesses that have signed up for one of the Windows Enterprise subscription plans can take advantage of the free upgrade.To read this article in full or to leave a comment, please click here

Cloud monitoring: Users review 5 top tools

Cloud technology is becoming a “staple” in the enterprise -- 70% have at least one application in the cloud – and may become the “default option” for software deployment by 2020. That makes it even more important that systems administrators can monitor, manage and optimize data-processing workloads in the cloud.To read this article in full or to leave a comment, please click here(Insider Story)

The latest database attacks: Tips of the icebergs

MongoDB wasn’t the first database hit by ransomware, just a rich target for attacks. Now, ElasticSearch and Hadoop have become ransomware targets. They won’t be the last. Were these three database products insanely simple to secure? Yes. Were they secured by their installers? Statistics and BitCoin sales would indicate otherwise. And no, they won’t be the last. Every hour of every day, websites get pounded with probes. A few are for actual research. When the probe is a fake logon, like the dozens of hourly WordPress admin fails I get on my various websites, you have some idea that the sender isn’t friendly.To read this article in full or to leave a comment, please click here

The latest database attacks: Tips of the icebergs

MongoDB wasn’t the first database hit by ransomware, just a rich target for attacks. Now, ElasticSearch and Hadoop have become ransomware targets. They won’t be the last. Were these three database products insanely simple to secure? Yes. Were they secured by their installers? Statistics and BitCoin sales would indicate otherwise. And no, they won’t be the last. Every hour of every day, websites get pounded with probes. A few are for actual research. When the probe is a fake logon, like the dozens of hourly WordPress admin fails I get on my various websites, you have some idea that the sender isn’t friendly.To read this article in full or to leave a comment, please click here