Archive

Category Archives for "Networking"

Corero says its always-on DDoS defense system automatically safeguards service providers  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   The massive DDoS attack that was aimed in stages at DNS provider Dyn in October 2016 did more than grab headlines. It also served as a wake-up call to companies that provide the global Internet infrastructure, as well as downstream operators and service providers. Many experts fear this attack could prove to be a tipping point in the battle to maintain stability and availability across the Internet. Research shows the attack originated from an Internet of Things (IoT) botnet that involved an estimated 100,000 devices. Dyn experienced packet flow bursts 40 to 50 times higher than normal, and unverified reports put the magnitude of the attack in the 1.2Tbps range. The attack used multiple vectors and required a variety of techniques to fight off.To read this article in full or to leave a comment, please click here

Worm on the sensor: What happens when IoT data is bad?

Enterprises trying to use the internet of things already face a deluge of data and a dizzying array of ways to analyze it. But what happens if the information is wrong?Bad data is common in IoT, and though it’s hard to get an estimate of how much information streaming in from connected devices can’t be used, a lot of people are thinking about the problem.About 40 percent of all data from the edges of IoT networks is “spurious,” says Harel Kodesh, vice president of GE’s Predix software business and CTO of GE Digital. Much of that data isn’t wrong, just useless: duplicate information that employees accidently uploaded twice, or repetitive messages that idle machines send automatically. To read this article in full or to leave a comment, please click here

Worm on the sensor: What happens when IoT data is bad?

Enterprises trying to use the internet of things already face a deluge of data and a dizzying array of ways to analyze it. But what happens if the information is wrong?Bad data is common in IoT, and though it’s hard to get an estimate of how much information streaming in from connected devices can’t be used, a lot of people are thinking about the problem.About 40 percent of all data from the edges of IoT networks is “spurious,” says Harel Kodesh, vice president of GE’s Predix software business and CTO of GE Digital. Much of that data isn’t wrong, just useless: duplicate information that employees accidently uploaded twice, or repetitive messages that idle machines send automatically. To read this article in full or to leave a comment, please click here

Using Ganglia to monitor Linux services

The screen capture from the Ganglia monitoring tool shows metrics for services running on a Linux host. Monitoring Linux services describes how the open source Host sFlow agent has been extended to export standard Virtual Node metrics from services running under systemd. Ganglia already supports these standard metrics and the article Using Ganglia to monitor virtual machine pools describes the configuration steps needed to enable this feature.

ARM tackles server compatibility issues with Allinea acquisition

ARM has a big problem -- it rules in smartphones and tablets but hasn't broken into servers and supercomputers. ARM servers are devalued partly because many applications don't work with the chips.But ARM has acquired Allinea Software with the hope of partially resolving the compatibility issue. Allinea provides software development, debugging, and porting tools, which should make it easier for people to write applications for ARM-based servers and supercomputers.The acquisition will "provide a channel to thousands of developers using supercomputers and give us better first-hand knowledge of the issues being addressed as software is ported to new ARM-based systems," Javier Orensanz, general manager of the development solutions group at ARM, said in a blog entry.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Red Hat OpenStack Platform 10 targets private cloud

Red Hat just announced that it is making Red Hat OpenStack Platform 10 available. This release is based upon the OpenStack ‘Newton’ release and is designed to increase system-wide scalability, simplify management and improve workload orchestration. It will also enhance both network performance and security. Additionally, Red Hat OpenStack Platform 10 introduces a new software life cycle, with optional support up to 5 years.New features New enhancements and updates to Red Hat OpenStack Platform 10 include: A more streamlined user experience driven by an easier-to-use graphical user interface (GUI) that reduces the complexities of installation and management. Designed for production use, the Red Hat OpenStack Platform director GUI provides several newly integrated functions, such as automatic upgrades and updates (including Ceph), advanced networking configuration, high availability, and the option to deploy file sharing via the Manila service, using the integrated drivers available from NetApp and Red Hat Ceph Storage. Improved flexibility for greater scalability through the introduction of customizable services and administration roles using Red Hat OpenStack Platform director. Cloud operators are now able to control their OpenStack environment at a more granular level by customizing OpenStack services to run and scale independently of each other. This offers greater Continue reading

Apple’s macOS file encryption easily bypassed without the latest fixes

Without the macOS update released this week, Apple's disk encryption can be easily defeated by connecting a specially crafted device to a locked Macbook.The attack is possible because devices connected over Thunderbolt can access the computer's RAM directly before the OS is started through the direct memory access (DMA) feature. The DMA mechanism is typically used by disk drive controllers, graphics cards, network cards, and sound cards because accessing the memory through the CPU would otherwise keep the processor busy and unavailable for other tasks.Apple's macOS has DMA protections, but they only kick in when the OS is running. However, the EFI (Extensible Firmware Interface) -- the modern BIOS -- initializes Thunderbolt devices at an early stage in the boot process and this enables them to use DMA before the OS is started, security researcher Ulf Frisk said in a blog post.To read this article in full or to leave a comment, please click here

Apple’s macOS file encryption easily bypassed without the latest fixes

Without the macOS update released this week, Apple's disk encryption can be easily defeated by connecting a specially crafted device to a locked Macbook.The attack is possible because devices connected over Thunderbolt can access the computer's RAM directly before the OS is started through the direct memory access (DMA) feature. The DMA mechanism is typically used by disk drive controllers, graphics cards, network cards, and sound cards because accessing the memory through the CPU would otherwise keep the processor busy and unavailable for other tasks.Apple's macOS has DMA protections, but they only kick in when the OS is running. However, the EFI (Extensible Firmware Interface) -- the modern BIOS -- initializes Thunderbolt devices at an early stage in the boot process and this enables them to use DMA before the OS is started, security researcher Ulf Frisk said in a blog post.To read this article in full or to leave a comment, please click here

Evernote CEO: ‘We let our users down’ with privacy policy change

Evernote CEO Chris O'Neill has had a long couple of days. The company he runs recently ignited a firestorm among its users when it announced a privacy policy change that would have required users to open up all their notes for analysis in order to take advantage of forthcoming machine learning features. "We let our users down," he said in an interview. "We really tactically communicated in about as poor a way as we could."Evernote is going back to the drawing board and reversing course on the proposed policy. Users won't have their data shared with employees to help with machine learning unless they explicitly opt in. To read this article in full or to leave a comment, please click here

Limited Time $40 Discount On Kindle Paperwhite Bundle – Deal Alert

Amazon has activated a limited time discount on its popular Kindle Paperwhite e-reader, when you buy it bundled with a few essential accessories. The bundle includes the latest Kindle Paperwhite 6" E-Reader in black with Special Offers ($119.99), an Amazon Leather Cover ($39.99), and Amazon 5W Power Adapter ($19.99), all for $139.97, for a limited time, saving you $40. See the bundle on Amazon.To read this article in full or to leave a comment, please click here

Oracle CEO Safra Catz joins Trump’s transition team

Oracle co-CEO Safra Catz is joining President-elect Donald Trump's transition team, the team said Thursday. She will sit on its executive committee and remain in her position at Oracle.The appointment comes a day after Catz and other tech leaders met Trump in a high-profile meeting at his New York offices."I'm actually privileged and honored to even be here, and we are looking forward to helping you, and your administration,"  Catz said at the beginning of the meeting.+ ALSO: Trump to tech CEOs: We're there for you +To read this article in full or to leave a comment, please click here

4 historic security events of 2016 and what they teach us [Infographic]

What is it they say about failing to learn the lessons of history and being doomed to repeat it? However the famous saying goes, I think we can agree that the events of 2016 can be very instructive if we choose to pay attention.Just yesterday, for example, Yahoo disclosed a breach from 2013 involving more than 1 billion user accounts — and those are unrelated to the 2014 breach disclosed in September involving over 500 million user accounts.Among the lessons from the Yahoo breaches is that hackers are very good at what they do and are getting increasingly sophisticated. What can you do to prevent an email-based attack from happening in your organization? Above all, pay attention to the human element.To read this article in full or to leave a comment, please click here(Insider Story)

Top 10 business collaboration stories of 2016

In 2016, a battle started to heat up in the enterprise collaboration market. The stalwarts of business, as well as consumer tech giants and a set of new entrants, were all in the mix. In this increasingly crowded market, the varying apps and other services targeted businesses from many different angles.Here are our picks for the most significant collaboration developments of the past year.1) Facebook at Work (finally) launches as 'Workplace' Facebook already owns consumer social networking, and with its new Workplace service, it set sights on the enterprise. The offering is designed to feel familiar to Facebook users but also remain separate from the company's consumer platform. (For more details, read our prelaunch history of Workplace.)To read this article in full or to leave a comment, please click here

Facts and figures for the year ahead in IT

IT sharpens its focusImage by ComputerworldWhat's the outlook for the tech year ahead? In general, IT executives are feeling optimistic as they head into 2017. According to the results of Computerworld's Tech Forecast 2017 survey, enterprises plan to continue on the path to digital transformation, deepening their commitment to big data and analytics, as well as cloud computing and software as a service (SaaS).To read this article in full or to leave a comment, please click here