Archive

Category Archives for "Networking"

IBM Watson, FDA to explore blockchain for secure patient data exchange

IBM's Watson Health artificial intelligence unit has signed a two-year joint-development agreement with the U.S. Food and Drug Administration (FDA) to explore using blockchain technology to securely share patient data for medical research and other purposes.IBM Watson Health and the FDA will explore the exchange of patient-level data from several sources, including electronic medical records (EMRs), clinical trials, genomic data, and health data from mobile devices, wearables and the "Internet of Things." The initial focus will be on oncology-related information."The healthcare industry is undergoing significant changes due to the vast amounts of disparate data being generated. Blockchain technology provides a highly secure, decentralized framework for data sharing that will accelerate innovation throughout the industry," IBM Watson Health Chief Science Officer Shahram Ebadollahi said in a statement.To read this article in full or to leave a comment, please click here

The best (and worst) features of 5 leading ALM suites

Application lifecycle management (ALM) suites allow corporate IT managers to supervise in-house software projects from cradle to grave — closely tracking every development in between. Five of the top ALM suites are CA Agile Central (formerly Rally ALM), JIRA, HP Enterprise ALM, HPE Agile Manager and Team Foundation Server (TFS), according to online reviews by enterprise users in the IT Central Station community.To read this article in full or to leave a comment, please click here(Insider Story)

As authentication options blossom, startup tries to simplify deployment, maintain flexibility

A startup with a strong pedigree is trying to address the problem that businesses have keeping up with the ever-increasing options for authentication.Transmit Security is shipping a server platform that off-loads the authentication chores that would otherwise reside within applications, making it simpler to roll out authentication in the first place and to upgrade it later without ever touching the applications themselves. Rakesh Loonkar Rakesh LoonkarTo read this article in full or to leave a comment, please click here

As authentication options blossom, startup tries to simplify deployment, maintain flexibility

A startup with a strong pedigree is trying to address the problem that businesses have keeping up with the ever-increasing options for authentication.Transmit Security is shipping a server platform that off-loads the authentication chores that would otherwise reside within applications, making it simpler to roll out authentication in the first place and to upgrade it later without ever touching the applications themselves. Rakesh Loonkar Rakesh LoonkarTo read this article in full or to leave a comment, please click here

Raspberry Pi roundup: Read all about it, in today’s Daily Prophet online

The Raspberry Pi roundup is back from its winter holidays, and boy, has it ever been nerding out. There’s nothing like being back at the old homestead to make you read well-loved old classics like the Harry Potter books.Appropriately, then, for the first Raspberry Pi roundup after the festive season, we’ve got a copy of the Daily Prophet that does what a wizarding newspaper is supposed to do, thanks to the technical wizardry of Piet Rullens. (And the always excellent Raspberry Pi Foundation blog for bringing it to our attention.) Rullens turned a trip to the Harry Potter theme park in Orlando into an attractively designed and authentic-looking Daily Prophet poster, thanks to a cunningly placed Raspberry Pi 3 and some skillful cutting. An IR distance sensor, when tripped, fires up the screen, which plays a clip of Rullens at the amusement park.To read this article in full or to leave a comment, please click here

No honor among thieves: Crooks seeking ransom for MongoDB data someone else stole

It took less than a week for criminals to drain virtually all publicly exposed MongoDB servers of their data, and now a second tier of opportunistic thieves is trying to walk off with the ransom.When attackers initially deleted the data, sometimes terabytes at a time, they left ransom notes demanding payments in bitcoin.+ ALSO ON NETWORK WORLD Be careful not to fall for these ransomware situations +To read this article in full or to leave a comment, please click here

No honor among thieves: Crooks seeking ransom for MongoDB data someone else stole

It took less than a week for criminals to drain virtually all publicly exposed MongoDB servers of their data, and now a second tier of opportunistic thieves is trying to walk off with the ransom.When attackers initially deleted the data, sometimes terabytes at a time, they left ransom notes demanding payments in bitcoin.+ ALSO ON NETWORK WORLD Be careful not to fall for these ransomware situations +To read this article in full or to leave a comment, please click here

9 painful ways people hurt themselves with computers/video games

Computers and videogames are a painImage by Networkworld/Stephen Sauer.More than 600 computer- and video game-related injuries suffered in 2015 were reported to the U.S. Consumer Product Safety Commission by about 100 hospital emergency rooms through the National Electronic Injury Surveillance System. NEISS is used to help spot possible issues with categories of products that are causing harm, though as you’ll see here, computer and video game users aren’t blameless. (With apologies to those who truly were injured…)To read this article in full or to leave a comment, please click here

The clumsy & shocking truth about computer-related injuries!

Some of the biggest names in tech have issued warnings over the past year about how their devices can overheat and catch on fire, but an analysis of emergency room data shows that most computer-related injuries stem from far less dramatic circumstances. We’re talking about computers falling on people’s heads or being dropped on their toes. More than two dozen injuries resulted from tripping, such as down the stairs while carrying a computer or by getting tangled on a laptop cord. Not so shocking: A handful of injuries related to pulling out plugs too hastily.To read this article in full or to leave a comment, please click here

Trump allegedly backed compromise of DNC emails, say leaked docs

U.S. President-elect Donald Trump and senior members of his campaign team allegedly knew and supported the leak of emails of the Democratic National Committee, according to unsubstantiated documents leaked by a news outlet on Tuesday.The dossier of memos, published by BuzzFeed, quotes an unnamed "Source E," described as an ethnic Russian and close associate of Trump, as acknowledging that the Russian regime had been behind the leak of e-mail messages originating from the Democratic National Committee (DNC) to the WikiLeaks whistleblowing site. The Trump team in return agreed to "sideline Russian intervention in Ukraine as a campaign issue,” and raise certain issues that would deflect attention from Ukraine.To read this article in full or to leave a comment, please click here

Trump allegedly backed compromise of DNC emails, say leaked docs

U.S. President-elect Donald Trump and senior members of his campaign team allegedly knew and supported the leak of emails of the Democratic National Committee, according to unsubstantiated documents leaked by a news outlet on Tuesday.The dossier of memos, published by BuzzFeed, quotes an unnamed "Source E," described as an ethnic Russian and close associate of Trump, as acknowledging that the Russian regime had been behind the leak of e-mail messages originating from the Democratic National Committee (DNC) to the WikiLeaks whistleblowing site. The Trump team in return agreed to "sideline Russian intervention in Ukraine as a campaign issue,” and raise certain issues that would deflect attention from Ukraine.To read this article in full or to leave a comment, please click here

Introduction to Docker: Featured Video of January 2017

The featured webinar in January 2017 is the Introduction to Docker webinar, and in the featured video Matt Oswalt explains the basic Docker tasks. Other videos in this webinar cover Docker images, volumes, networking, and Docker Compose and Swarm.

To view the featured video, log into my.ipspace.net, select the webinar from the first page, and watch the video marked with star.

Read more ...

EP11: Legendary Network Architect Russ White (CCDE#1 and CCAr) shares his habits for success.

Russ White has over 30 years of experience in network engineering; A Distinguished Architect during his time at Cisco, holds the highest certification Cisco has to offer as a CCAr and holds CCDE #1. He’s also a Published author, worldwide speaker at many tech conferences, and has over 40+ patents. This guy is a legend in the field of networking folks.

In this episode we discuss SDN, Fog Computing, Disaggregation, and what network engineers should focus on for the future and more! You don’t want to miss this one!

Quote: “Each day we are becoming a creature of splendid glory or one of unthinkable horror.” C.S. Lewis

Resources or Topics Mentioned:

Book Recommendation: The Art of Network Architecture

Tech Lesson of the Day: Disaggregation and the Future for Network Engineers

Russ White’s List of Recommended Sites for Reading!

Technology (First)

Technology (Second)

Technology (Other)

Continue reading

US Intel report: Russia allegedly obtained ‘compromising’ info on Trump

A classified intelligence report on the Kremlin’s suspected efforts to meddle with the U.S. election reportedly includes a bombshell allegation: that Russian operatives have compromising personal and financial information about President-elect Donald Trump.According to CNN, the allegation was presented to Trump last week in a meeting with U.S. intelligence chiefs to discuss claims of Russia’s role in sponsoring hacks that influenced last year’s election.Trump had questioned Russia's role in the hacking of the Democratic National Committee before the meeting, but afterwards changed his tune and conceded Russia could have played a role.To read this article in full or to leave a comment, please click here

US Intel report: Russia allegedly obtained ‘compromising’ info on Trump

A classified intelligence report on the Kremlin’s suspected efforts to meddle with the U.S. election reportedly includes a bombshell allegation: that Russian operatives have compromising personal and financial information about President-elect Donald Trump.According to CNN, the allegation was presented to Trump last week in a meeting with U.S. intelligence chiefs to discuss claims of Russia’s role in sponsoring hacks that influenced last year’s election.Trump had questioned Russia's role in the hacking of the Democratic National Committee before the meeting, but afterwards changed his tune and conceded Russia could have played a role.To read this article in full or to leave a comment, please click here

Cloudflare’s Transparency Report for Second Half 2016 and an Additional Disclosure for 2013

Cloudflare is publishing today its seventh transparency report, covering the second half of 2016. For the first time, we are able to present information on a previously undisclosed National Security Letter (NSL) Cloudflare received in the 2013 reporting period.

Wikipedia provides the most succinct description of an NSL:

An NSL is an administrative subpoena issued by the United States federal government to gather information for national security purposes. NSLs do not require prior approval from a judge.… NSLs typically contain a nondisclosure requirement, frequently called a "gag order", preventing the recipient of an NSL from disclosing that the FBI had requested the information. https://en.wikipedia.org/wiki/National_security_letter


Shortly before the New Year, the FBI sent us the following letter about that NSL.

The letter withdrew the nondisclosure provisions (the “gag order”) contained in NSL-12-358696, which had constrained Cloudflare since the NSL was served in February 2013. At that time, Cloudflare objected to the NSL. The Electronic Frontier Foundation agreed to take our case, and with their assistance, we brought a lawsuit under seal to protect its customers' rights.

Early in the litigation, the FBI rescinded the NSL in July 2013 and withdrew the request for information. So no customer Continue reading