Archive

Category Archives for "Networking"

SNL for some reason spoofs 1984 Apple Macintosh ad in 2016

SNL over the weekend took advantage of super cool guest host Benedict Cumberbatch to star in a spoof ad about the next great toilet that's based on Apple's famous 1984 Macintosh computer commercial.Why exactly SNL decided to reach back for this classic commercial as inspiration for fresh fun poking at Apple isn't clear, but maybe Apple's latest drawn-out product introduction (MacBook Pros) put someone there over the edge. See the original ad and the SNL spoof below.MORE: Most memorable SNL tech skits and bitsTo read this article in full or to leave a comment, please click here

Microsoft adds Kubernetes support to Azure Container Service

Containers have become a major fixture of modern application development. Companies are turning to the technology because it helps them more easily create portable, scalable applications that can work in a wide variety of environments, including the public cloud.Microsoft is aiming to further capitalize on that trend with a set of updates announced Monday for its public cloud platform.Azure Container Service, Microsoft’s cloud-optimized container-hosting offering, now supports orchestration using the Kubernetes open-source platform. On top of that, Microsoft has upgraded the service to use DC/OS 1.8.4, which brings improvements like built-in job scheduling.To read this article in full or to leave a comment, please click here

Nyansa brings a new approach to end-user management

Legacy network and application management tools are significantly underpowered for today’s digital organizations. These old-school tools operate with a “bottoms-up” view of the IT environment, with each element having its own management tool.Gathering insights from these discrete platforms is very difficult, as it requires a tremendous amount of manual data collection, aggregation and analytics. If Spock happened to be the lead engineer, this might be fine, but assuming no one in the IT department went to the Vulcan Science Academy, it’s likely that most organizations struggle with this model.The big weakness of bottoms-up management is that it gives no real view of the end-user experience. It might be helpful in understanding if a certain element is down, but there’s no way to correlate that to the actual performance of an application, which is what the user is seeing.To read this article in full or to leave a comment, please click here

Security vendor demonstrates hack of US e-voting machine

A hacker armed with a US$25 PCMCIA card can, within a few minutes, change the vote totals on an aging electronic voting machine that is now in limited use in 13 U.S. states, a cybersecurity vendor has demonstrated.The hack by security vendor Cylance, which released a video of it Friday, caught the attention of noted National Security Agency leaker Edward Snowden, but other critics of e-voting security dismissed the vulnerability as nothing new.The Cylance hack demonstrated a theoretical vulnerability described in research going back a decade, the company noted.To read this article in full or to leave a comment, please click here

Security vendor demonstrates hack of US e-voting machine

A hacker armed with a US$25 PCMCIA card can, within a few minutes, change the vote totals on an aging electronic voting machine that is now in limited use in 13 U.S. states, a cybersecurity vendor has demonstrated.The hack by security vendor Cylance, which released a video of it Friday, caught the attention of noted National Security Agency leaker Edward Snowden, but other critics of e-voting security dismissed the vulnerability as nothing new.The Cylance hack demonstrated a theoretical vulnerability described in research going back a decade, the company noted.To read this article in full or to leave a comment, please click here

5 things you need to know about virtual private networks

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks. Given their importance, here's what you need to know about VPNs:VPNs are good for your privacy and securityOpen wireless networks pose a serious risk to users, because attackers sitting on the same networks can use various techniques to sniff web traffic and even hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.To read this article in full or to leave a comment, please click here

5 things you need to know about virtual private networks

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks. Given their importance, here's what you need to know about VPNs:VPNs are good for your privacy and securityOpen wireless networks pose a serious risk to users, because attackers sitting on the same networks can use various techniques to sniff web traffic and even hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.To read this article in full or to leave a comment, please click here

5 things you need to know about virtual private networks

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks. Given their importance, here's what you need to know about VPNs:VPNs are good for your privacy and securityOpen wireless networks pose a serious risk to users, because attackers sitting on the same networks can use various techniques to sniff web traffic and even hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.To read this article in full or to leave a comment, please click here

Steve Ballmer explains why he and Bill Gates drifted apart

One of the reason's behind Microsoft's recent resurgence has been the company's somewhat surprising and ongoing commitment towards making their own hardware. This new strategy was on full display two weeks ago when the company introduced the Surface Studio, a 28-in. desktop/tablet hybrid that left many tech observers beyond impressed.While Microsoft's foray into the world of hardware began with Steve Ballmer at the helm, the company's hardware strategy was kicked up a notch once Satya Nadella assumed CEO duties in February of 2014.To read this article in full or to leave a comment, please click here

Android Auto 2.0 for phones—No more excuses for distracted driving

Google just released a new self-contained version of Android Auto that runs on an Android smartphone without a specially equipped head unit. The term “head unit” is auto industry jargon for car stereo or infotainment system. Android Auto 2.0 locks the smartphone and changes the user interface (UI) controls to voice and large icons that the driver can interact within about the time that it takes to change a radio station. It is the safest way to drive and use a smartphone to because it reduces driver distraction. In 2015, 2,357 more people died in traffic accidents due to distracted driving after a five-decade trend of declining fatalities, according to the Department of Transportation. Though everyone condemns texting, selecting playlists and checking Facebook Messenger while driving, most succumb to the temptation of smartphone notifications while driving and cannot resist looking at their smartphone screens—which for some, are fatally long looks.To read this article in full or to leave a comment, please click here

HP, Staples & Costco Black Friday 2016 tech deals revealed

With report after report about tablet sales falling, it might not come as a surprise that retailers such as HP, Staples and Costco are slashing prices on these slimmed down computers for Black Friday 2016, along with plenty of other tech products. Black Friday watchers such as BFads and Best Black Friday have been tracking new ads closely.HP's Black Friday deals HP's Black Friday deals, which kick in online on Thanksgiving Day, also focus on laptops, desktops (for work and gaming) and monitors, with a few speakers and other accessories thrown in.To read this article in full or to leave a comment, please click here

Adobe’s ‘Photoshop for audio’ tweaks voice recordings to say words speaker didn’t say

Photoshop trolls can manipulate photos, but in the future we may have a new type of troll … trolls which can easily manipulate spoken words just by typing text into an audio editing program.Last week at the Adobe Max Creativity Conference, Adobe developer Zeyu Jin mentioned that people “having been making weird stuff online” with photo editing software, before adding, now “let’s do something to human speech.”Jin gave a sneak peek of software which is like Photoshop for audio, demonstrating Project VoCo, for voice conversion, by altering a voice clip of comedian Keegan-Michael Key. The voice clip was something Key said after being nominated for an award.To read this article in full or to leave a comment, please click here

Adobe’s ‘Photoshop for audio’ tweaks voice recordings to say words speaker didn’t say

Photoshop trolls can manipulate photos, but in the future we may have a new type of troll … trolls which can easily manipulate spoken words just by typing text into an audio editing program.Last week at the Adobe Max Creativity Conference, Adobe developer Zeyu Jin mentioned that people “having been making weird stuff online” with photo editing software, before adding, now “let’s do something to human speech.”Jin gave a sneak peek of software which is like Photoshop for audio, demonstrating Project VoCo, for voice conversion, by altering a voice clip of comedian Keegan-Michael Key. The voice clip was something Key said after being nominated for an award.To read this article in full or to leave a comment, please click here

UK bank suspends online payments after fraud hits 20,000 accounts

The banking arm of U.K. supermarket chain Tesco has suspended online payments for its 136,000 checking account customers following a spate of fraudulent transactions.The bank suspended its payment service for all checking account customers after 40,000 experienced suspicious transactions, bank CEO Benny Higgins told BBC Radio 4 on Monday."Around half of them had money taken from the account," he said.The bank will bear any losses as a result of the fraudulent activity and customers are not at financial risk, he said.But they might be inconvenienced until the bank has secured its systems.To read this article in full or to leave a comment, please click here

UK bank suspends online payments after fraud hits 20,000 accounts

The banking arm of U.K. supermarket chain Tesco has suspended online payments for its 136,000 checking account customers following a spate of fraudulent transactions.The bank suspended its payment service for all checking account customers after 40,000 experienced suspicious transactions, bank CEO Benny Higgins told BBC Radio 4 on Monday."Around half of them had money taken from the account," he said.The bank will bear any losses as a result of the fraudulent activity and customers are not at financial risk, he said.But they might be inconvenienced until the bank has secured its systems.To read this article in full or to leave a comment, please click here

How to protect your ecommerce site from fraud, hacking and copycats

Setting up an ecommerce site is easy these days. Keeping your site safe from hacking, fraud and copycats, not so much. And as small business owners know all too well, one major breach – or too many charge backs or someone stealing your business name or copying your products – could mean the end of your business.[ Related: 8 keys to ecommerce success ]Here are seven ways small ecommerce business owners can protect their online stores from hacking, fraud and/or copycats.1. Trademark your company name and logo “The most important tip for business owners to protect their site and brand is to ensure [their] name is clear for use as a trademark,” says Sonia Lakhany, trademark attorney, Lakhany Law. “Too many entrepreneurs mistakenly think that because a domain name is available or that they were able to form an LLC or corporation with their local Secretary of State that their business name or brand is available as a trademark.”To read this article in full or to leave a comment, please click here

Cloud-based network analysis drills down to users and apps

Cloud computing is throwing more variables into network performance, but it’s also helping to make network management smarter. Nyansa, a startup that launched earlier this year with a cloud-based service to pinpoint the sources of enterprise network problems, is now adding the ability to analyze how individual applications are performing. The company's original Voyance service uses a software crawler to capture data about how traffic is flowing over the network and how each piece of infrastructure – such as a router or a Wi-Fi access point -- affects that performance.To read this article in full or to leave a comment, please click here