Archive

Category Archives for "Networking"

Trump allegedly backed compromise of DNC emails, say leaked docs

U.S. President-elect Donald Trump and senior members of his campaign team allegedly knew and supported the leak of emails of the Democratic National Committee, according to unsubstantiated documents leaked by a news outlet on Tuesday.The dossier of memos, published by BuzzFeed, quotes an unnamed "Source E," described as an ethnic Russian and close associate of Trump, as acknowledging that the Russian regime had been behind the leak of e-mail messages originating from the Democratic National Committee (DNC) to the WikiLeaks whistleblowing site. The Trump team in return agreed to "sideline Russian intervention in Ukraine as a campaign issue,” and raise certain issues that would deflect attention from Ukraine.To read this article in full or to leave a comment, please click here

Trump allegedly backed compromise of DNC emails, say leaked docs

U.S. President-elect Donald Trump and senior members of his campaign team allegedly knew and supported the leak of emails of the Democratic National Committee, according to unsubstantiated documents leaked by a news outlet on Tuesday.The dossier of memos, published by BuzzFeed, quotes an unnamed "Source E," described as an ethnic Russian and close associate of Trump, as acknowledging that the Russian regime had been behind the leak of e-mail messages originating from the Democratic National Committee (DNC) to the WikiLeaks whistleblowing site. The Trump team in return agreed to "sideline Russian intervention in Ukraine as a campaign issue,” and raise certain issues that would deflect attention from Ukraine.To read this article in full or to leave a comment, please click here

Introduction to Docker: Featured Video of January 2017

The featured webinar in January 2017 is the Introduction to Docker webinar, and in the featured video Matt Oswalt explains the basic Docker tasks. Other videos in this webinar cover Docker images, volumes, networking, and Docker Compose and Swarm.

To view the featured video, log into my.ipspace.net, select the webinar from the first page, and watch the video marked with star.

Read more ...

EP11: Legendary Network Architect Russ White (CCDE#1 and CCAr) shares his habits for success.

Russ White has over 30 years of experience in network engineering; A Distinguished Architect during his time at Cisco, holds the highest certification Cisco has to offer as a CCAr and holds CCDE #1. He’s also a Published author, worldwide speaker at many tech conferences, and has over 40+ patents. This guy is a legend in the field of networking folks.

In this episode we discuss SDN, Fog Computing, Disaggregation, and what network engineers should focus on for the future and more! You don’t want to miss this one!

Quote: “Each day we are becoming a creature of splendid glory or one of unthinkable horror.” C.S. Lewis

Resources or Topics Mentioned:

Book Recommendation: The Art of Network Architecture

Tech Lesson of the Day: Disaggregation and the Future for Network Engineers

Russ White’s List of Recommended Sites for Reading!

Technology (First)

Technology (Second)

Technology (Other)

Continue reading

US Intel report: Russia allegedly obtained ‘compromising’ info on Trump

A classified intelligence report on the Kremlin’s suspected efforts to meddle with the U.S. election reportedly includes a bombshell allegation: that Russian operatives have compromising personal and financial information about President-elect Donald Trump.According to CNN, the allegation was presented to Trump last week in a meeting with U.S. intelligence chiefs to discuss claims of Russia’s role in sponsoring hacks that influenced last year’s election.Trump had questioned Russia's role in the hacking of the Democratic National Committee before the meeting, but afterwards changed his tune and conceded Russia could have played a role.To read this article in full or to leave a comment, please click here

US Intel report: Russia allegedly obtained ‘compromising’ info on Trump

A classified intelligence report on the Kremlin’s suspected efforts to meddle with the U.S. election reportedly includes a bombshell allegation: that Russian operatives have compromising personal and financial information about President-elect Donald Trump.According to CNN, the allegation was presented to Trump last week in a meeting with U.S. intelligence chiefs to discuss claims of Russia’s role in sponsoring hacks that influenced last year’s election.Trump had questioned Russia's role in the hacking of the Democratic National Committee before the meeting, but afterwards changed his tune and conceded Russia could have played a role.To read this article in full or to leave a comment, please click here

Cloudflare’s Transparency Report for Second Half 2016 and an Additional Disclosure for 2013

Cloudflare is publishing today its seventh transparency report, covering the second half of 2016. For the first time, we are able to present information on a previously undisclosed National Security Letter (NSL) Cloudflare received in the 2013 reporting period.

Wikipedia provides the most succinct description of an NSL:

An NSL is an administrative subpoena issued by the United States federal government to gather information for national security purposes. NSLs do not require prior approval from a judge.… NSLs typically contain a nondisclosure requirement, frequently called a "gag order", preventing the recipient of an NSL from disclosing that the FBI had requested the information. https://en.wikipedia.org/wiki/National_security_letter


Shortly before the New Year, the FBI sent us the following letter about that NSL.

The letter withdrew the nondisclosure provisions (the “gag order”) contained in NSL-12-358696, which had constrained Cloudflare since the NSL was served in February 2013. At that time, Cloudflare objected to the NSL. The Electronic Frontier Foundation agreed to take our case, and with their assistance, we brought a lawsuit under seal to protect its customers' rights.

Early in the litigation, the FBI rescinded the NSL in July 2013 and withdrew the request for information. So no customer Continue reading

Tesla just poached one of Apple’s top engineers

Earlier today, Chris Lattner revealed that he was leaving Apple in pursuit of a new opportunity. While not a household name, Lattner is a highly regarded engineer who not only spearheaded the development of Swift, but also oversaw Apple's Xcode team."This decision wasn't made lightly," Lattner said earlier today, "and I want you all to know that I’m still completely committed to Swift. I plan to remain an active member of the Swift Core Team, as well as a contributor to the swift-evolution mailing list."A short while ago, we've finally ascertained where Lattner is going to end up. Interestingly enough, he'll be taking his talents to Tesla.To read this article in full or to leave a comment, please click here

Adobe patches critical flaws in Flash Player, Reader and Acrobat

Adobe Systems released security updates for its Flash Player, Adobe Reader and Acrobat products fixing critical vulnerabilities that could allow attackers to install malware on computers.The Flash Player update fixes 13 vulnerabilities, 12 that can lead to remote code execution and one that allows attackers to bypass a security restriction and disclose information. Adobe is not aware of any exploit for these flaws existing in the wild.Users are advised to upgrade to Flash Player version 24.0.0.194 on Windows, Mac and Linux. The Flash Player plug-in bundled with Google Chrome, Microsoft Edge and Internet Explorer will be automatically upgraded through those browsers' respective update mechanisms.To read this article in full or to leave a comment, please click here

Adobe patches critical flaws in Flash Player, Reader and Acrobat

Adobe Systems released security updates for its Flash Player, Adobe Reader and Acrobat products fixing critical vulnerabilities that could allow attackers to install malware on computers.The Flash Player update fixes 13 vulnerabilities, 12 that can lead to remote code execution and one that allows attackers to bypass a security restriction and disclose information. Adobe is not aware of any exploit for these flaws existing in the wild.Users are advised to upgrade to Flash Player version 24.0.0.194 on Windows, Mac and Linux. The Flash Player plug-in bundled with Google Chrome, Microsoft Edge and Internet Explorer will be automatically upgraded through those browsers' respective update mechanisms.To read this article in full or to leave a comment, please click here

US Intel: Russia hacked Republican groups during election

Democratic groups and figures weren't the only ones targeted in Russia’s suspected campaign to influence last year's U.S. election. Russian cyberspies also targeted computers from state-level Republican groups and stole information from local voter registration records, FBI director James Comey said."There were successful penetrations of some groups and campaigns, particularly at the state-level on the Republican side," Comey said during a senate committee hearing on Tuesday.He and three U.S. intelligence chiefs spoke at the hearing, following their Friday report accused the Kremlin of ordering a covert campaign that helped boost incoming President Donald Trump's election chances.To read this article in full or to leave a comment, please click here

US Intel: Russia hacked Republican groups during election

Democratic groups and figures weren't the only ones targeted in Russia’s suspected campaign to influence last year's U.S. election. Russian cyberspies also targeted computers from state-level Republican groups and stole information from local voter registration records, FBI director James Comey said. "There were successful penetrations of some groups and campaigns, particularly at the state-level on the Republican side," Comey said during a senate committee hearing on Tuesday. He and three U.S. intelligence chiefs spoke at the hearing, following their Friday report accused the Kremlin of ordering a covert campaign that helped boost incoming President Donald Trump's election chances.To read this article in full or to leave a comment, please click here

Intel Joule shipments blocked in key countries, pending certification

If you can't find Intel's Joule developer boards in your country, it's because shipments have been held up.Intel's Joule 570x and 550x are powerful computer boards that can be built as a PC, or be used to build robots, drones, or smart devices. But Intel is now seeking government certification so the boards can be cleared for shipment in those countries.Joule shipments have currently been blocked in a number of countries, including Taiwan, Japan, and Israel, all of which have active technology markets where hobbyists design hardware.Users that have ordered Joule boards from retailers abroad can't receive shipments in the blocked countries.To read this article in full or to leave a comment, please click here

Microsoft releases one of its smallest monthly security patch bundles

Microsoft has released its first batch of patches for this year, and it's one of the smallest ever for the company, with only three vulnerabilities fixed across its entire product portfolio.The patches are covered in four security bulletins, but one is dedicated to Flash Player, for which Microsoft distributed patches through Windows update.The only security bulletin rated as critical is the one for Microsoft Office and Office Services and Web Apps. It covers a memory corruption vulnerability that can be exploited by tricking users to open specially crafted files and can lead to remote code execution.To read this article in full or to leave a comment, please click here

Microsoft releases one of its smallest monthly security patch bundles

Microsoft has released its first batch of patches for this year, and it's one of the smallest ever for the company, with only three vulnerabilities fixed across its entire product portfolio.The patches are covered in four security bulletins, but one is dedicated to Flash Player, for which Microsoft distributed patches through Windows update.The only security bulletin rated as critical is the one for Microsoft Office and Office Services and Web Apps. It covers a memory corruption vulnerability that can be exploited by tricking users to open specially crafted files and can lead to remote code execution.To read this article in full or to leave a comment, please click here

Vintage data-transfer tech gets upgrade after 35 years

Tech artifacts like old Mac computers are finding their way to museums, but some never-say-die technologies continue to serve requirements important to computing. Inside wearables, smart devices, robots, and computers like Raspberry Pi are communications buses called I2C (Inter Integrated Circuits), which date back to 1982, and SPI (Serial Peripheral Interface), which was born in 1979. Those buses have driven short-range communication between circuits and microcontrollers for decades. They now serve as key interfaces for sensor-related communication on smart devices, wearables, and computers. But as devices get equipped with more powerful, bandwidth-hungry sensors like 360-degree cameras, these out-of-date buses won't be able to keep up in the long run. So standards-setting organization MIPI Alliance wants to bury I2C and replace it with the faster and modern I3C bus and also merge SPI into the new interface.To read this article in full or to leave a comment, please click here

Amazon Alexa ‘wins’ CES, but how well does the virtual assistant really perform?

According to multiple reports, Amazon’s Alexa voice assistant dominated last week’s Consumer Electronics Show (CES) in Las Vegas, despite the fact the company had little official presence. Spreading its wings far beyond Amazon’s own Echo, Dot and Tap devices, Alexa popped up on wide variety of new devices demo’d at the show—from refrigerators to air purifiers, baby monitors, headphones and even cars. But Alexa’s rapid spread begs the question: What is using the voice-controlled system really like? What can it actually do, and how well does it do it in real-world kitchens and bedrooms—not to mention cars? Alexa moves in!  Like a lot of other people, I acquired an Alexa-powered device from Amazon—the Amazon Echo Dot—over the holiday season. I know, I’m a bit late to the party, but frankly, I was not convinced any existing voice assistant system was really ready for prime time. To read this article in full or to leave a comment, please click here