Archive

Category Archives for "Networking"

AMD talks tough as it drums up support for 32-core Zen server chip

At CES, AMD launched its first Zen chips for PCs, called Ryzen. Next on deck is the 32-core server chip code-named Naples, which will ship in the coming months.Naples doesn't have an official name yet, but the expectations are high. While Ryzen is set up for success in PCs, it's a different story for Naples, which has to take on Intel's juiced-up Xeon chips, which are used in most servers today.AMD is trying to drum up excitement for Naples, which will be released in the first half of this year. It's promoting Naples using the same tactic as it did for Ryzen -- by talking about the performance benefits of the Zen CPU.The Zen CPU core in Naples will provide the same performance benefits as in the Ryzen chips. AMD claims a 40 percent improvement in instructions per cycle, an important metric to measure CPU performance, compared to the company's previous Excavator architecture.To read this article in full or to leave a comment, please click here

Failure to patch known ImageMagick flaw for months costs Facebook $40k

It's not common for a security-conscious internet company to leave a well-known vulnerability unpatched for months, but it happens. Facebook paid a US$40,000 reward to a researcher after he warned the company that its servers were vulnerable to an exploit called ImageTragick.ImageTragick is the name given by the security community to a critical vulnerability that was found in the ImageMagick image processing tool back in May.ImageMagick is a command-line tool that can resize, convert and optimize images in many formats. Web server libraries like PHP’s imagick, Ruby’s rmagick and paperclip, and Node.js’s imagemagick, used by millions of websites, are based on it.To read this article in full or to leave a comment, please click here

Failure to patch known ImageMagick flaw for months costs Facebook $40k

It's not common for a security-conscious internet company to leave a well-known vulnerability unpatched for months, but it happens. Facebook paid a US$40,000 reward to a researcher after he warned the company that its servers were vulnerable to an exploit called ImageTragick.ImageTragick is the name given by the security community to a critical vulnerability that was found in the ImageMagick image processing tool back in May.ImageMagick is a command-line tool that can resize, convert and optimize images in many formats. Web server libraries like PHP’s imagick, Ruby’s rmagick and paperclip, and Node.js’s imagemagick, used by millions of websites, are based on it.To read this article in full or to leave a comment, please click here

Tier 1, Tier 2 and Tier 3 Service Providers

Tier 1,Tier 2 and Tier 3 Service Providers What is tier in the first place ? If you are dealing with Service Provider networks, you hear this term a lot. But how we define Tier 1,Tier 2 and Tier 3 Service Providers ? What should be their infrastructure to be seen as Tier 1 for example […]

The post Tier 1, Tier 2 and Tier 3 Service Providers appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

US alleges systemic employment discrimination at Oracle

The U.S. government says Oracle routinely and systemically pays white men more than women and minorities and that it favors Asian candidates over others in product development and technical roles.The allegations are contained in a lawsuit filed by the Department of Labor that represents the results of a two-year investigation into hiring practices at the Silicon Valley company.The investigation was triggered by a regular compliance review by the government. As a federal contractor, Oracle is prohibited from engaging in discrimination based on race, sex, sexual orientation, gender identity, or national origin.As a result, Oracle stands to lose millions of dollars in federal contracts if the Labor Department can prove its case and the company doesn't change its ways.To read this article in full or to leave a comment, please click here

Modern warfare: Death-dealing drones and … illegal parking?

A cloud of 3D-printed drones big enough to bring down the latest U.S. stealth fighter, the F35, was just one of the combat scenarios evoked in a discussion of the future of warfare at the World Economic Forum in Davos on Wednesday.Much of the discussion focused on the changes computers are bringing to the battlefield, including artificial intelligence and autonomous systems -- but also the way the battlefield is coming to computing, with cyberwar, and social media psyops an ever more real prospect.Former U.S. Navy fighter pilot Mary Cummings, now director of the Humans and Autonomy Lab at Duke University, delivered the first strike."The barrier to entry to drone technology is so low that everyone can have one, and if the Chinese go out and print a million copies of a drone, a very small drone, and put those up against an F35 and they go into the engine, you basically obviate what is a very expensive platform," she said.To read this article in full or to leave a comment, please click here

Modern warfare: Death-dealing drones and … illegal parking?

A cloud of 3D-printed drones big enough to bring down the latest U.S. stealth fighter, the F35, was just one of the combat scenarios evoked in a discussion of the future of warfare at the World Economic Forum in Davos on Wednesday.Much of the discussion focused on the changes computers are bringing to the battlefield, including artificial intelligence and autonomous systems -- but also the way the battlefield is coming to computing, with cyberwar, and social media psyops an ever more real prospect.Former U.S. Navy fighter pilot Mary Cummings, now director of the Humans and Autonomy Lab at Duke University, delivered the first strike."The barrier to entry to drone technology is so low that everyone can have one, and if the Chinese go out and print a million copies of a drone, a very small drone, and put those up against an F35 and they go into the engine, you basically obviate what is a very expensive platform," she said.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 3 tips to improve threat detection and incident response

No matter the height or thickness of any wall you might try to build, the unfortunate reality is someone will most likely be able to breach it. It’s really just a matter of when and how.Just as you close your doors and windows when you leave the house, you need  preventative security measures in place to protect your systems. However, these measures themselves are not enough. If you assume the bad guys will find a way to breach your protective walls, it makes more sense to focus on threat detection and incident response as ways to mitigate damage when the inevitable breach occurs.3 security controls to improve threat detection The following three security controls are surefire ways to strengthen the detective capabilities of your system.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 3 tips to improve threat detection and incident response

No matter the height or thickness of any wall you might try to build, the unfortunate reality is someone will most likely be able to breach it. It’s really just a matter of when and how.Just as you close your doors and windows when you leave the house, you need  preventative security measures in place to protect your systems. However, these measures themselves are not enough. If you assume the bad guys will find a way to breach your protective walls, it makes more sense to focus on threat detection and incident response as ways to mitigate damage when the inevitable breach occurs.3 security controls to improve threat detection The following three security controls are surefire ways to strengthen the detective capabilities of your system.To read this article in full or to leave a comment, please click here

The state of the IT contractor job market in 2017

In 2017, strong demand for IT talent will continue in several roles and industries. Understanding how to wring business value from vast stores of data, knowing how to protect that data from increasingly sophisticated threats and navigating the murky waters of freelancing will characterize the tech job market.To read this article in full or to leave a comment, please click here(Insider Story)

Microsoft buys Simplygon to simplify rendering VR and AR models

Microsoft is betting that less is more in 3D design, with the acquisition of the Swedish developer of a 3D data optimization system, Simplygon.Simplygon takes 3D models in a number of formats, and reduces the volume of data used to describe them by taking out some of the detail -- somewhat like reducing the size of a JPEG image file by increasing the level of compression while leaving the resolution unchanged.That means the models can be rendered more rapidly or using less powerful hardware, something that will help Microsoft with the "3D for everyone" vision it outlined last October at the launch of Windows 10 Creators Update.To read this article in full or to leave a comment, please click here

How to get fired in 2017: Have a security breach

There are many reasons why IT professionals can be fired, but six out of the top nine are related to security, said a survey released this morning.For example, having a tech investment that leads to a security breach was considered a fireable offense by 39 percent of organizations, according to Osterman Research, which conducted the survey.A data breach that becomes public was a fireable offense for 38 percent of companies.Other fireable offenses included failing to modernize a security program, data breaches with unknown causes, data breaches that do not become public, and the failure of a security product or program investment.To read this article in full or to leave a comment, please click here

How to get fired in 2017: Have a security breach

There are many reasons why IT professionals can be fired, but six out of the top nine are related to security, said a survey released this morning.For example, having a tech investment that leads to a security breach was considered a fireable offense by 39 percent of organizations, according to Osterman Research, which conducted the survey.A data breach that becomes public was a fireable offense for 38 percent of companies.Other fireable offenses included failing to modernize a security program, data breaches with unknown causes, data breaches that do not become public, and the failure of a security product or program investment.To read this article in full or to leave a comment, please click here

23% off TaoTronics LED Desk Lamp, (Dimmable, Touch Control, 5 Color Modes, USB Charging Port) – Deal Alert

The TaoTronics LED Desk Lamp is adjustable and dimmable for multiple brightness settings, making them ideal for home and office use. Say goodbye to old incandescent light and faintly illuminated working space, and say hello to this elegantly designed, modern looking and energy-efficient source. Designed to blend naturally into any scene and provide flicker-free and ghost-free lighting that is pleasant and comfortable to your eyes. Even after long hours of use, your eyes will feel less fatigue than with traditional types of lighting. With a slight touch from your finger tips, you can switch through 7 brightness level to fine tune your illumination.  This light also allows you to plug in your eReader, tablet, or smartphone into the built-in USB port.  With nearly 3,000 reviews on Amazon, it averages 4.8 out of 5 stars (read reviews). Its typical list price of $29.95 has been reduced by 23% to $22.99. See the discounted TaoTronics LED Desk Lamp now on Amazon.To read this article in full or to leave a comment, please click here

Snowden allowed to stay in Russia longer

U.S. National Security Agency leaker Edward Snowden will be allowed to stay in Russia for "another couple of years," according to a spokeswoman for the government there. The Russian government has extended the residence permit for Snowden, the former NSA contractor charged with espionage for leaking details of U.S. surveillance operations, said Maria Zakharova, a spokeswoman for Russia's Foreign Ministry. Zakharova announced the extension on her Facebook page late Tuesday. Zakharova's post came in response to a column by Michael Morell, the former deputy director of the U.S. CIA, who said Russia can return Snowden to the U.S. as a "perfect inauguration gift" to President-elect Donald Trump.To read this article in full or to leave a comment, please click here

Snowden allowed to stay in Russia longer

U.S. National Security Agency leaker Edward Snowden will be allowed to stay in Russia for "another couple of years," according to a spokeswoman for the government there. The Russian government has extended the residence permit for Snowden, the former NSA contractor charged with espionage for leaking details of U.S. surveillance operations, said Maria Zakharova, a spokeswoman for Russia's Foreign Ministry. Zakharova announced the extension on her Facebook page late Tuesday. Zakharova's post came in response to a column by Michael Morell, the former deputy director of the U.S. CIA, who said Russia can return Snowden to the U.S. as a "perfect inauguration gift" to President-elect Donald Trump.To read this article in full or to leave a comment, please click here

Here come the Super Bowl 2017 techie ads

As one of those Super Bowl watchers who prefers the football over the commercials, I try my best to get the ads out of the way before the big game, which this year will be played in Houston on Sunday, Feb. 6.Here's a running list of Super Bowl 51 commercials from technology companies -- I'll leave it up to you to decide whether brands are getting their $5 million worth. So far, it looks like tech companies will take a back seat to beer, candy and other brands, in terms of the number of advertisers, on Super Bowl Sunday.MORE: Techiest commercials from Super Bowl 50, in 2016To read this article in full or to leave a comment, please click here