Archive

Category Archives for "Networking"

T-Mobile offers users a free iPhone 7 with qualifying trade-in

T-Mobile CEO John Legere has a penchant for making a big splash, and with Black Friday just a few days away, Legere on Tuesday announced an intriguing new promotion that prospective iPhone 7 buyers might want to keep on their radar.As part of the company's Black Friday push, T-Mobile is offering users either a free iPhone 7 or iPhone 7 Plus with a qualifying trade-in. In order to get a free 32GB iPhone 7, users can trade in the following devices: an iPhone 6s, an iPhone 6s Plus, Samsung's Galaxy S6, the S6 Edge, the S7, the S7 Edge and the Note 5. Other qualifying devices include the LG V20 and the LG G5.If you have an older device, there are still good deals to be had. Case in point: users can get $100 off a 32GB iPhone 7 if they trade-in any of the following devices: iPhone 6, iPhone 6 Plus, iPhone SE, Samsung Note 4, Samsung Galaxy S5, the LG G4 and the LG V10.To read this article in full or to leave a comment, please click here

How to make home IoT more secure: Assume the worst

Sometimes the truth hurts but you just have to face it. The internet advisory group BITAG lays it on the line for the IoT industry in a new report: No, consumers aren’t going to update the software on their devices.“It is safe to assume that most end users will never take action on their own to update software,” the Broadband Internet Technology Advisory Group said. Its recommendation: Build in mechanisms for automatic, secure updates.That bit of human nature is just one of the harsh realities BITAG acknowledges in the report, which came out on Tuesday. It also points out that some consumer IoT devices ship with weak built-in usernames and passwords like “admin” and “password,” can’t do authentication or encryption, or can easily be taken over by malware that turns them into bots.To read this article in full or to leave a comment, please click here

How to make home IoT more secure: Assume the worst

Sometimes the truth hurts but you just have to face it. The internet advisory group BITAG lays it on the line for the IoT industry in a new report: No, consumers aren’t going to update the software on their devices.“It is safe to assume that most end users will never take action on their own to update software,” the Broadband Internet Technology Advisory Group said. Its recommendation: Build in mechanisms for automatic, secure updates.That bit of human nature is just one of the harsh realities BITAG acknowledges in the report, which came out on Tuesday. It also points out that some consumer IoT devices ship with weak built-in usernames and passwords like “admin” and “password,” can’t do authentication or encryption, or can easily be taken over by malware that turns them into bots.To read this article in full or to leave a comment, please click here

AWS is cutting and simplifying its storage prices

Amazon Web Services made a series of price cuts on Tuesday and simplified what customers pay for its storage products. The company's popular Simple Storage Service (S3) has had its six pricing tiers cut down to three, along with a corresponding price cut of roughly 16 percent to 25 percent.Glacier, AWS's storage service for data that doesn't need to be accessed frequently, now has a trio of retrieval options. Companies can have quicker access to their data if they pay more or get cheaper access if they're willing to wait. Glacier users also get a 43 percent price cut.To read this article in full or to leave a comment, please click here

12 tips for safer Black Friday and Cyber Monday shopping

During Black Friday and Cyber Monday 2016, consumers should watch out for scams that come through spam, insecure public networks and apps that might seem legitimate but could be taking over your phones and computers, experts say.+ RELATED: How to dodge Black Friday schemes +Here are a dozen steps you can take to avoid becoming a victim. Only download or buy apps from legitimate app stores. Suspect apps that ask for too many permissions. Check out the reputation of apps and particularly the app publisher. Only enter credit card info on secure shopping portals. Avoid using simple passwords, and use two-factor authentication if you can. Be alert for poisoned search results when using search engines to find products. Don’t install software that sites require before you can shop. Don’t use free pubic Wi-Fi to make purchases. Be suspicious of great deals you learn about via social media or emails and don’t click the links. Turn off location services while shopping to minimize the potential personal data that could be compromised. Make sure the connection to e-commerce sites is secured (HTTPS). Double check the validity of the SSL certificate for the site. To read this article in full or Continue reading

12 tips for safer Black Friday and Cyber Monday shopping

During Black Friday and Cyber Monday 2016, consumers should watch out for scams that come through spam, insecure public networks and apps that might seem legitimate but could be taking over your phones and computers, experts say.+ RELATED: How to dodge Black Friday schemes +Here are a dozen steps you can take to avoid becoming a victim. Only download or buy apps from legitimate app stores. Suspect apps that ask for too many permissions. Check out the reputation of apps and particularly the app publisher. Only enter credit card info on secure shopping portals. Avoid using simple passwords, and use two-factor authentication if you can. Be alert for poisoned search results when using search engines to find products. Don’t install software that sites require before you can shop. Don’t use free pubic Wi-Fi to make purchases. Be suspicious of great deals you learn about via social media or emails and don’t click the links. Turn off location services while shopping to minimize the potential personal data that could be compromised. Make sure the connection to e-commerce sites is secured (HTTPS). Double check the validity of the SSL certificate for the site. To read this article in full or Continue reading

How to dodge Black Friday and Cyber Monday shopping hackers

Hackers are writing apps, setting up phony Wi-Fi networks and unleashing malware in attempts to turn legitimate Black Friday 2016 and Cyber Monday retailing into profits for themselves, according to security experts.Bad actors are stealing personal information like passwords and credit card numbers, compromising computers and phones, and blackmailing retailers with hopes of lining their pockets, researchers say.For example, researchers at RiskIQ found frequent cases of criminals linking the names of legitimate brands to sketchy applications and Web sites in order to lure unsuspecting shoppers.They looked at five popular e-commerce brands to see how often their names appeared along with the term Black Friday in the titles or descriptions of black-listed applications. The research didn’t reveal the names of the retailers, but found that they lined up with bogus apps from 8.4% to 16% of the time.To read this article in full or to leave a comment, please click here

How to dodge Black Friday and Cyber Monday shopping hackers

Hackers are writing apps, setting up phony Wi-Fi networks and unleashing malware in attempts to turn legitimate Black Friday 2016 and Cyber Monday retailing into profits for themselves, according to security experts.Bad actors are stealing personal information like passwords and credit card numbers, compromising computers and phones, and blackmailing retailers with hopes of lining their pockets, researchers say.For example, researchers at RiskIQ found frequent cases of criminals linking the names of legitimate brands to sketchy applications and Web sites in order to lure unsuspecting shoppers.They looked at five popular e-commerce brands to see how often their names appeared along with the term Black Friday in the titles or descriptions of black-listed applications. The research didn’t reveal the names of the retailers, but found that they lined up with bogus apps from 8.4% to 16% of the time.To read this article in full or to leave a comment, please click here

Micro services: Breaking down software monoliths

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Amazon was the first company to take a large monolithic system and deconstruct it into micro services. Netflix was next, deconstructing its behemoth software stack, seeking a more agile model that could keep up with 2 million daily API requests from more than 800 different device types. Forward-thinking companies like Google, eBay, Uber and Groupon soon followed. Today, enterprises are abandoning monolithic software architectures to usher in the latest era in systems architecture: micro services.To read this article in full or to leave a comment, please click here

Micro services: Breaking down software monoliths

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Amazon was the first company to take a large monolithic system and deconstruct it into micro services. Netflix was next, deconstructing its behemoth software stack, seeking a more agile model that could keep up with 2 million daily API requests from more than 800 different device types. Forward-thinking companies like Google, eBay, Uber and Groupon soon followed. Today, enterprises are abandoning monolithic software architectures to usher in the latest era in systems architecture: micro services.

To read this article in full or to leave a comment, please click here

Virtually trampling over Black Friday 2016

We've done more than our fair share of Black Friday, Black November, pre-Black Friday, Cyber Monday and other tech bargain roundups, including looks at virtual reality systems such as HTC Vive and Samsung Gear VR that can be had for less this holiday shopping season.MORE: 50+ Black Friday 2016 tech dealsNow a comedy website dubbed Above Average, which has SNL and 30 Rock blood in its veins, brings us a beautiful (and only slightly NSFW) mashup of Black Friday deals and virtual reality systems that's just a little too real.To read this article in full or to leave a comment, please click here

Open-source hardware makers unite to start certifying products

Four years ago, Alicia Gibb was trying to unite a fragmented open-source hardware community to join together to create innovative products.So was born the Open Source Hardware Association, which Gibb hoped would foster a community of hardware "hackers" sharing, tweaking, and updating hardware designs. It shared the ethics and ethos of open-source software and encouraged the release of hardware designs -- be it for it processors, machines, or devices -- for public reuse.Since then, OSHWA has gained strength, with Intel, Raspberry Pi, and Sparkfun endorsing the organization. Its growth has coincided with the skyrocketing popularity of Arduino and Raspberry Pi-like developer boards -- many of them open source -- to create gadgets and IoT devices.To read this article in full or to leave a comment, please click here

10 considerations for running WebRTC services on AWS

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.You want to embed real-time communications features into your website or mobile application for direct peer-to-peer communication and you’ve landed on WebRTC. That’s a great start.Now you realize that backend services are critical for building a robust solution. You are thinking about hosting your solution in the cloud, using an Infrastructure-as-a-Service (IaaS) environment built on top of Amazon Web Services (AWS). Again, good choice. AWS is an obvious first place to look as they’re a leader in the cloud services space.To read this article in full or to leave a comment, please click here

10 considerations for running WebRTC services on AWS

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

You want to embed real-time communications features into your website or mobile application for direct peer-to-peer communication and you’ve landed on WebRTC. That’s a great start.

Now you realize that backend services are critical for building a robust solution. You are thinking about hosting your solution in the cloud, using an Infrastructure-as-a-Service (IaaS) environment built on top of Amazon Web Services (AWS). Again, good choice. AWS is an obvious first place to look as they’re a leader in the cloud services space.

To read this article in full or to leave a comment, please click here

The end of net neutrality may begin in June of 2017

Yesterday, President-elect Donald Trump announced the appointment of Jeff Eisenach and Mark Jamison to the agency landing team responsible for the Federal Communication Commission (FCC). Fortune called Eisenbach and Jamison staunch opponents of net neutrality, and Re/Code said these appointments may end net neutrality. In addition, Jamison asked, “Do we need the FCC?” in an October 2016 blog post.To read this article in full or to leave a comment, please click here

Google acquires AWS training vendor Qwiklabs

Google is acquiring Qwiklabs, a company that helps people learn how to use public cloud services to run applications without operating a data center.It's a helpful move for Google, which is trying to expand the use of its cloud platform and stands to gain when developers and IT professionals get a handle on making applications run in the cloud. The company will create tools to help get people up to speed on the Google Cloud Platform and G Suite productivity service, Jason Martin, the director of professional services for Google Cloud, said in a blog post.But there's a wrinkle to the acquisition, announced Monday: Qwiklabs's existing portfolio is entirely focused on educating people about offerings from Amazon Web Services, including Alexa skills. For the time being, those offerings will still be available.To read this article in full or to leave a comment, please click here