Archive

Category Archives for "Networking"

10 of the latest craziest and scariest things the TSA found on your fellow travelers

When it comes to our annual look at what wacky things the TSA pulls out of travelers’ carryon luggage, every year the crazy seems to get a little crazier and the scary, well you know where we are going with this.Interestingly the TSA finds some amusement or amazement in these finding as it now posts its own Top 10 Most Unusual Finds which outlines the most “dangerous and often times wacky items” it has kept off commercial airliners.To start, we need to look at guns. The number of guns that traverse or try to traverse the skies in the United States continues to grow at an astounding rate. There was a 28% increase in firearm discoveries from 2015’s total of 2,653. The TSA says that in 2016, 3,391 firearms were discovered in carry-ons --averaging more than nine firearms per day.To read this article in full or to leave a comment, please click here

10 of the latest craziest and scariest things the TSA found on your fellow travelers

When it comes to our annual look at what wacky things the TSA pulls out of travelers’ carryon luggage, every year the crazy seems to get a little crazier and the scary, well you know where we are going with this. Interestingly the TSA finds some amusement or amazement in these finding as it now posts its own Top 10 Most Unusual Finds which outlines the most “dangerous and often times wacky items” it has kept off commercial airliners. To start, we need to look at guns. The number of guns that traverse or try to traverse the skies in the United States continues to grow at an astounding rate. There was a 28% increase in firearm discoveries from 2015’s total of 2,653. The TSA says that in 2016, 3,391 firearms were discovered in carry-ons --averaging more than nine firearms per day.To read this article in full or to leave a comment, please click here

59% off RAVPower 14000mAh Portable Car Jump Starter – Deal Alert

A compact power bank, a car jump starter, and a LED flashlight, all fit into a minimal and portable design. Whether it is your car or your USB devices, never run out of power again. Store it in the glovebox or simply drop it in your bag. Have a concentrated 14000mAh source of power always with you -- enough for up to 20 vehicle jumpstarts or many device recharges before the unit itself needs to be recharged. RAVPower's jump starter typically lists for $160 but is currently discounted 59% on Amazon to just $66. See the discounted car jumper now on Amazon. To read this article in full or to leave a comment, please click here

Google wants to bring smart tools to Raspberry Pi-like boards

Google has hinted that it is interested in bringing "smart tools" to users of board computers like Raspberry Pi 3 and Intel's Edison.The company has launched a market research survey of the maker community, and the front page of the site states: "We at Google are interested in creating smart tools for makers, and want to hear from you about what would be most helpful."The survey includes queries on preferred maker boards, proficiency in hardware and software, and projects users may want to pursue.Google did not respond to request for comment.But in a blog entry, Raspberry Pi noted that the smart tools will be available sometime this year.To read this article in full or to leave a comment, please click here

Are tech companies responsible for negative outcomes?

America’s largest tech companies face a growing backlash over the potentially negative impacts of their strategic decisions and innovations. For example, companies like Apple, Facebook, Google and Microsoft are investing in artificial intelligence (AI) technologies and product roadmaps that will replace millions of jobs during the coming years. Experts in marketing, technology and social awareness say it’s time for technology providers to assume greater responsibility for the personal pain that comes along with the collective gain.Emerging technology is at almost perpetual odds with the status quo, but U.S. society is coming to realize that dynamic can lead to job losses, unfair treatment of social services and a stain on civic engagement. The power and influence that some tech companies command is being reevaluated in light of the myriad ways people are being disenfranchised in some way by their actions.To read this article in full or to leave a comment, please click here

China goes after unauthorized VPN access from local ISPs

China is going after unauthorized internet connections, including tools known as VPNs (virtual private networks) that can bypass China’s efforts to control the web.The crackdown is part of 14-month campaign from China’s Ministry of Industry and Information Technology that's meant to clean up the country’s internet service provider marketUnless authorized, internet service providers are forbidden from operating any “cross-border” channel business, including VPNs, the ministry said in a Sunday notice.  The announcement is a bit of rarity. The country has usually withheld from openly campaigning against VPN use, even as government censors have intermittently tried to squelch access to them in the past.  To read this article in full or to leave a comment, please click here

China goes after unauthorized VPN access from local ISPs

China is going after unauthorized internet connections, including tools known as VPNs (virtual private networks) that can bypass China’s efforts to control the web.The crackdown is part of 14-month campaign from China’s Ministry of Industry and Information Technology that's meant to clean up the country’s internet service provider marketUnless authorized, internet service providers are forbidden from operating any “cross-border” channel business, including VPNs, the ministry said in a Sunday notice.  The announcement is a bit of rarity. The country has usually withheld from openly campaigning against VPN use, even as government censors have intermittently tried to squelch access to them in the past.  To read this article in full or to leave a comment, please click here

Microsoft revives free Windows 10 upgrade for SMBs

Microsoft last week resurrected its free Windows 10 upgrade, but aimed the deal at small- and mid-sized businesses that had passed on the earlier offer."They're extending the free upgrade to this segment of customers to help them get to Windows 10," said Wes Miller, an analyst at Directions on Microsoft who specializes in the technology company's complex licensing rules and practices.Like the 12-month upgrade deal that ended last August, the new offer applies to personal computers running Windows 7 or Windows 8.1. But the new program is limited to a select group of customers. Only businesses that have signed up for one of the Windows Enterprise subscription plans can take advantage of the free upgrade.To read this article in full or to leave a comment, please click here

Cloud monitoring: Users review 5 top tools

Cloud technology is becoming a “staple” in the enterprise -- 70% have at least one application in the cloud – and may become the “default option” for software deployment by 2020. That makes it even more important that systems administrators can monitor, manage and optimize data-processing workloads in the cloud.To read this article in full or to leave a comment, please click here(Insider Story)

The latest database attacks: Tips of the icebergs

MongoDB wasn’t the first database hit by ransomware, just a rich target for attacks. Now, ElasticSearch and Hadoop have become ransomware targets. They won’t be the last. Were these three database products insanely simple to secure? Yes. Were they secured by their installers? Statistics and BitCoin sales would indicate otherwise. And no, they won’t be the last. Every hour of every day, websites get pounded with probes. A few are for actual research. When the probe is a fake logon, like the dozens of hourly WordPress admin fails I get on my various websites, you have some idea that the sender isn’t friendly.To read this article in full or to leave a comment, please click here

The latest database attacks: Tips of the icebergs

MongoDB wasn’t the first database hit by ransomware, just a rich target for attacks. Now, ElasticSearch and Hadoop have become ransomware targets. They won’t be the last. Were these three database products insanely simple to secure? Yes. Were they secured by their installers? Statistics and BitCoin sales would indicate otherwise. And no, they won’t be the last. Every hour of every day, websites get pounded with probes. A few are for actual research. When the probe is a fake logon, like the dozens of hourly WordPress admin fails I get on my various websites, you have some idea that the sender isn’t friendly.To read this article in full or to leave a comment, please click here

The essential guide to anti-malware tools

It's a sad fact of life in IT nowadays that some form of preparation for dealing with malware is part and parcel of what systems and network administrators must do. This goes above and beyond normal due diligence in warding off malware. It includes a proper appreciation of the work and risks involved in handling malware infections, and acquiring a toolkit of repair and cleanup tools to complement protective measures involved in exercising due diligence. It should also include at least two forms of insurance – one literal, the other metaphorical – that can help avert or cover an organization against costs and liabilities that malware could otherwise force the organization to incur.To read this article in full or to leave a comment, please click here(Insider Story)

The essential guide to anti-malware tools

It's a sad fact of life in IT nowadays that some form of preparation for dealing with malware is part and parcel of what systems and network administrators must do. This goes above and beyond normal due diligence in warding off malware. It includes a proper appreciation of the work and risks involved in handling malware infections, and acquiring a toolkit of repair and cleanup tools to complement protective measures involved in exercising due diligence. It should also include at least two forms of insurance – one literal, the other metaphorical – that can help avert or cover an organization against costs and liabilities that malware could otherwise force the organization to incur.To read this article in full or to leave a comment, please click here(Insider Story)

Sprint takes a 33 percent stake in Tidal

Mobile phone service provider Sprint announced this morning that it has taken a 33 percent stake in Tidal, one of the few music-streaming services to offer high-resolution audio streams. As part of the deal, Sprint says its customers will get exclusive access to certain content. Sprint CEO Marcelo Claure will also join Tidal’s board of directors.“Sprint shares our view of revolutionizing the creative industry to allow artists to connect directly with their fans and reach their fullest, shared potential,” Tidal owner Jay Z (née Shawn Carter) said in a press release. “Marcelo understood our goal right away and together we are excited to bring Sprint’s 45 million customers an unmatched entertainment experience.”To read this article in full or to leave a comment, please click here

Reports: Apple, Foxconn considering a $7 billion manufacturing plant in the U.S.

Apple is reportedly considering moving some of its iPhone production to the United States. Taiwanese iPhone producer Foxconn is considering a $7 billion joint investment in a display production facility, the company’s chairman told reporters.According to the Nikkei Asian Review, Foxconn Chairman Terry Gou said “Apple is willing to invest in the facility together” because it needs display panels for its products. The plant could create 30,000 to 50,000 jobs.But Gou said U.S.-made iPhones would likely cost more than those produced at Foxconn’s Zhengzhou, China facility, which churns out more than 100 million iPhones per year.To read this article in full or to leave a comment, please click here