Archive

Category Archives for "Networking"

Microsoft buys Simplygon to simplify rendering VR and AR models

Microsoft is betting that less is more in 3D design, with the acquisition of the Swedish developer of a 3D data optimization system, Simplygon.Simplygon takes 3D models in a number of formats, and reduces the volume of data used to describe them by taking out some of the detail -- somewhat like reducing the size of a JPEG image file by increasing the level of compression while leaving the resolution unchanged.That means the models can be rendered more rapidly or using less powerful hardware, something that will help Microsoft with the "3D for everyone" vision it outlined last October at the launch of Windows 10 Creators Update.To read this article in full or to leave a comment, please click here

How to get fired in 2017: Have a security breach

There are many reasons why IT professionals can be fired, but six out of the top nine are related to security, said a survey released this morning.For example, having a tech investment that leads to a security breach was considered a fireable offense by 39 percent of organizations, according to Osterman Research, which conducted the survey.A data breach that becomes public was a fireable offense for 38 percent of companies.Other fireable offenses included failing to modernize a security program, data breaches with unknown causes, data breaches that do not become public, and the failure of a security product or program investment.To read this article in full or to leave a comment, please click here

How to get fired in 2017: Have a security breach

There are many reasons why IT professionals can be fired, but six out of the top nine are related to security, said a survey released this morning.For example, having a tech investment that leads to a security breach was considered a fireable offense by 39 percent of organizations, according to Osterman Research, which conducted the survey.A data breach that becomes public was a fireable offense for 38 percent of companies.Other fireable offenses included failing to modernize a security program, data breaches with unknown causes, data breaches that do not become public, and the failure of a security product or program investment.To read this article in full or to leave a comment, please click here

23% off TaoTronics LED Desk Lamp, (Dimmable, Touch Control, 5 Color Modes, USB Charging Port) – Deal Alert

The TaoTronics LED Desk Lamp is adjustable and dimmable for multiple brightness settings, making them ideal for home and office use. Say goodbye to old incandescent light and faintly illuminated working space, and say hello to this elegantly designed, modern looking and energy-efficient source. Designed to blend naturally into any scene and provide flicker-free and ghost-free lighting that is pleasant and comfortable to your eyes. Even after long hours of use, your eyes will feel less fatigue than with traditional types of lighting. With a slight touch from your finger tips, you can switch through 7 brightness level to fine tune your illumination.  This light also allows you to plug in your eReader, tablet, or smartphone into the built-in USB port.  With nearly 3,000 reviews on Amazon, it averages 4.8 out of 5 stars (read reviews). Its typical list price of $29.95 has been reduced by 23% to $22.99. See the discounted TaoTronics LED Desk Lamp now on Amazon.To read this article in full or to leave a comment, please click here

Snowden allowed to stay in Russia longer

U.S. National Security Agency leaker Edward Snowden will be allowed to stay in Russia for "another couple of years," according to a spokeswoman for the government there. The Russian government has extended the residence permit for Snowden, the former NSA contractor charged with espionage for leaking details of U.S. surveillance operations, said Maria Zakharova, a spokeswoman for Russia's Foreign Ministry. Zakharova announced the extension on her Facebook page late Tuesday. Zakharova's post came in response to a column by Michael Morell, the former deputy director of the U.S. CIA, who said Russia can return Snowden to the U.S. as a "perfect inauguration gift" to President-elect Donald Trump.To read this article in full or to leave a comment, please click here

Snowden allowed to stay in Russia longer

U.S. National Security Agency leaker Edward Snowden will be allowed to stay in Russia for "another couple of years," according to a spokeswoman for the government there. The Russian government has extended the residence permit for Snowden, the former NSA contractor charged with espionage for leaking details of U.S. surveillance operations, said Maria Zakharova, a spokeswoman for Russia's Foreign Ministry. Zakharova announced the extension on her Facebook page late Tuesday. Zakharova's post came in response to a column by Michael Morell, the former deputy director of the U.S. CIA, who said Russia can return Snowden to the U.S. as a "perfect inauguration gift" to President-elect Donald Trump.To read this article in full or to leave a comment, please click here

Here come the Super Bowl 2017 techie ads

As one of those Super Bowl watchers who prefers the football over the commercials, I try my best to get the ads out of the way before the big game, which this year will be played in Houston on Sunday, Feb. 6.Here's a running list of Super Bowl 51 commercials from technology companies -- I'll leave it up to you to decide whether brands are getting their $5 million worth. So far, it looks like tech companies will take a back seat to beer, candy and other brands, in terms of the number of advertisers, on Super Bowl Sunday.MORE: Techiest commercials from Super Bowl 50, in 2016To read this article in full or to leave a comment, please click here

Musing: ITC rejects de facto standard defense (337-TA-944, Cisco v. Arista) | Essential Patent Blog

Detailed but accessible legal review of Cisco vs Arista case. Dated July 2016 so it doesn’t cover the latest developments but provides a lot of insight into the legal.

My current view on this issue:

  1. Cisco is validating Arista as a serious, viable competitor. On balance, Arista gets more out of this than Cisco does and doing a nice job of being the under dog.
  2. Rumours suggest that its personal matter to attack Arsita for some executives and not a business matter.
  3. Customers perceive Cisco as wasting time and energy on legal matters instead of innovating new products or improving product quality.
  4. Customers money is being wasted on lawyers instead of solutions.

In December 2015, Cisco Systems, Inc. (Cisco) filed a complaint alleging that certain network devices (switches) imported by Arista Networks, Inc. (Arista) infringed several Cisco patents directed to computer networks.  Arista raised several equitable defenses based, in part, on allegations that Cisco submitted a request for comments document RFC 5517 to IETF and promoted RFC 5517 to the public generally as an “informal standard” for private virtual local area networks (PVLANs) for which Cisco would not assert its patents or would license on fair, reasonable and non-discriminatory (FRAND) Continue reading

Windows 10 peeping: Microsoft fails to understand the uproar

I’ve been covering Microsoft Windows since the 1980s. There have been several regime changes, each with its own distinct ego. Some regimes listened eagerly, some didn’t. This one is failing, but I believe the current fingers-in-the-ears stance are related more to revenue than to ideology. Microsoft wants data about you. To do so, Windows 10 is riddled with phone-home messaging. Some sites document dozens of IP addresses and add even more DNS calls for your machine’s data. We’re told that the data isn’t personally identifiable and that it’s used to improve QA. No one said Microsoft didn’t need QA. New versions of Windows have always had holes big enough to fly airliners through, but Microsoft finally got some sense when in Windows XP SP2 and Vista, they demoted user space. Finally. To read this article in full or to leave a comment, please click here

Cyber scum suckers hit cancer agency with ransomware, threaten to contact families

Some cyber scum suckers sunk to an all-time low, hitting an Indiana Cancer Services agency with ransomware before threatening “to contact family members of living and deceased cancer clients, donors and community partners” if the $43,000 ransom was not paid.Cancer Services of East Central Indiana-Little Red Door, an independent, non-profit agency based in Muncie, Indiana, became a victim of a ransomware attack a week ago. This is an organization whose goals include helping to “reduce the financial and emotional burdens of those dealing with a cancer diagnosis.”The attackers did not leave the traditional ransom demand note, oh no, but chose to personally reach out to the agency’s executive director, president and vice president to make the extortion demands clear. This makes it seem more like a targeted attack and less of one that was a result of opportunity. It was also at least the second time that week that attackers attempted to ransom sensitive patient information.To read this article in full or to leave a comment, please click here

Cyber scum suckers hit cancer agency with ransomware, threaten to contact families

Some cyber scum suckers sunk to an all-time low, hitting an Indiana Cancer Services agency with ransomware before threatening “to contact family members of living and deceased cancer clients, donors and community partners” if the $43,000 ransom was not paid.Cancer Services of East Central Indiana-Little Red Door, an independent, non-profit agency based in Muncie, Indiana, became a victim of a ransomware attack a week ago. This is an organization whose goals include helping to “reduce the financial and emotional burdens of those dealing with a cancer diagnosis.”The attackers did not leave the traditional ransom demand note, oh no, but chose to personally reach out to the agency’s executive director, president and vice president to make the extortion demands clear. This makes it seem more like a targeted attack and less of one that was a result of opportunity. It is also at least the second time that week that attackers attempted to ransom sensitive patient information.To read this article in full or to leave a comment, please click here

DARPA wants to simulate how social media spreads info like wildfire

When it comes to understanding which, what and how popular information travels the Internet, we have a lot to learn.That seems to be the idea behind a new program that the researchers at The Defense Advanced Research Projects Agency will unravel next month that aims to simulate the spread and evolution of online information.+More on Network World: DARPA: Show us how to weaponize benign technologies+To read this article in full or to leave a comment, please click here

DARPA wants to simulate how social media spreads info like wildfire

When it comes to understanding which, what and how popular information travels the Internet, we have a lot to learn.That seems to be the idea behind a new program that the researchers at The Defense Advanced Research Projects Agency will unravel next month that aims to simulate the spread and evolution of online information.+More on Network World: DARPA: Show us how to weaponize benign technologies+To read this article in full or to leave a comment, please click here

Review: Linksys Velop a solid choice in wireless mesh space

It’s been interesting to see how longtime home wireless vendors have been approaching the new wireless mesh market, in which startup products like Eero, Luma, AmpliFi and Almond have hit the scene – in addition to Google, which doesn’t qualify as a startup, but is new to the Wi-Fi market.To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT security principles from Homeland Security

Power grids were bombed in World War II to cripple industrial output. Today, attacks against Internet of Things (IoT) infrastructure causes even broader disruptions—without bombs.The danger is real. The U.S. Department of Homeland Security (DHS) recently published guidelines to “provide a strategic focus on security and enhance the trust framework that underpins the IoT ecosystem.” The report explains why security has to be a combined effort.To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT security principles from Homeland Security

Power grids were bombed in World War II to cripple industrial output. Today, attacks against Internet of Things (IoT) infrastructure causes even broader disruptions—without bombs.The danger is real. The U.S. Department of Homeland Security (DHS) recently published guidelines to “provide a strategic focus on security and enhance the trust framework that underpins the IoT ecosystem.” The report explains why security has to be a combined effort.To read this article in full or to leave a comment, please click here

Oracle patches raft of vulnerabilities in business applications

Oracle released its first batch of security patches this year, fixing 270 vulnerabilities, mostly in business-critical applications. Many of the flaws can be exploited remotely without authentication.The majority of the fixes are for flaws in business products such as Oracle E-Business Suite, Oracle Fusion Middleware, Oracle PeopleSoft, Oracle Retail Applications, Oracle JD Edwards, Oracle Supply Chain Products and Oracle Database Server.E-Business Suite, which is used by companies to store key data and manage a wide range of business processes, accounts for more than 40 percent of the patched vulnerabilities -- 121. Out of these, 118 are remotely exploitable and the highest rated one has a score of 9.2 (critical) in the Common Vulnerability Scoring System.To read this article in full or to leave a comment, please click here

Oracle patches raft of vulnerabilities in business applications

Oracle released its first batch of security patches this year, fixing 270 vulnerabilities, mostly in business-critical applications. Many of the flaws can be exploited remotely without authentication.The majority of the fixes are for flaws in business products such as Oracle E-Business Suite, Oracle Fusion Middleware, Oracle PeopleSoft, Oracle Retail Applications, Oracle JD Edwards, Oracle Supply Chain Products and Oracle Database Server.E-Business Suite, which is used by companies to store key data and manage a wide range of business processes, accounts for more than 40 percent of the patched vulnerabilities -- 121. Out of these, 118 are remotely exploitable and the highest rated one has a score of 9.2 (critical) in the Common Vulnerability Scoring System.To read this article in full or to leave a comment, please click here