Archive

Category Archives for "Networking"

73% off amFilm Tempered Glass Screen Protector for iPhone 7/6/6s (2-Pack) – Deal Alert

These Amazon best-selling screen protectors from amFilm are specifically designed for iPhone 7, 6S, and 6. Ultra thin-0.3mm thickness is reliable and resiliant, and promises full compatibility with touchscreen sensitivity. Also ultra-clear with 99.9% transparency to allow an optimal, natural viewing experience. Highly durable and scratch resistant/chip resistant, this strong protector will guarantee your cell phone the best protection against drops, bumps, scratches and normal wear and tear. Over 8,200 reviewers on Amazon give this item an average of 4.5 out of 5 stars (read reviews). Amazon indicates that its list price has been dramatically reduced to just $8, and for that price you will receive 2 glass Screen Protector, wet/dry wipes, squeeze card, installation guide and dust removal stickers. See the discounted screen protectors on Amazon.To read this article in full or to leave a comment, please click here

IoT: We’re serfs and pawns

There is a huge problem with the ugly Internet of Things (IoT). Many IoT thingies have the security of wet tissue paper, and they’re being used in large swarms and masses to wreak havoc. A colleague of mine, Stephen Satchell, says misbehaving IoT devices should bear the full front of the Consumer Product Safety Commission and be recalled, every last one of them.  Recalled. Why won’t this happen? Let me speculate. It’s because our own government, that is to say the more covert parts of the U.S. government, has its own cadre of botnets and control vectors that allows them interesting windows into foreign lands. To read this article in full or to leave a comment, please click here

IoT: We’re serfs and pawns

There is a huge problem with the ugly Internet of Things (IoT). Many IoT thingies have the security of wet tissue paper, and they’re being used in large swarms and masses to wreak havoc. A colleague of mine, Stephen Satchell, says misbehaving IoT devices should bear the full front of the Consumer Product Safety Commission and be recalled, every last one of them.  Recalled. Why won’t this happen? Let me speculate. It’s because our own government, that is to say the more covert parts of the U.S. government, has its own cadre of botnets and control vectors that allows them interesting windows into foreign lands. To read this article in full or to leave a comment, please click here

Dell EMC patches critical flaws in VMAX enterprise storage systems

Dell EMC has fixed six flaws in its management interfaces for VMAX enterprise storage systems, including three vulnerabilities that are rated critical and could lead to the exposure of sensitive files or a complete system compromise.One of the critical flaws is located in the Unisphere for VMAX enterprise storage arrays, an appliance that provides a web-based management interface to provision, manage, and monitor such systems.More specifically, the flaw is in the GraniteDS library that provides server-side support for the Flash-based portion of the Unisphere web application. According to researchers from vulnerability management firm Digital Defense, the issue allows unauthenticated attackers to retrieve arbitrary text files from the virtual appliance with root privileges.To read this article in full or to leave a comment, please click here

Dell EMC patches critical flaws in VMAX enterprise storage systems

Dell EMC has fixed six flaws in its management interfaces for VMAX enterprise storage systems, including three vulnerabilities that are rated critical and could lead to the exposure of sensitive files or a complete system compromise.One of the critical flaws is located in the Unisphere for VMAX enterprise storage arrays, an appliance that provides a web-based management interface to provision, manage, and monitor such systems.More specifically, the flaw is in the GraniteDS library that provides server-side support for the Flash-based portion of the Unisphere web application. According to researchers from vulnerability management firm Digital Defense, the issue allows unauthenticated attackers to retrieve arbitrary text files from the virtual appliance with root privileges.To read this article in full or to leave a comment, please click here

Hackers find little demand for their stolen NSA hacking tools

The hackers who are auctioning off cyberweapons allegedly stolen from the National Security Agency are growing annoyed and want cash.The ShadowBrokers' sale of the stolen tools has so far generated little interest, and over the weekend, the hackers complained in a message posted online, using broken English."TheShadowBrokers is not being interested in fame. TheShadowBrokers is selling to be making money," the hackers said.As of Monday, their auction only had one substantial bid at 1.5 bitcoins, or US $918. Many of the other bids were valued at less than $1. To read this article in full or to leave a comment, please click here

Hackers find little demand for their stolen NSA hacking tools

The hackers who are auctioning off cyberweapons allegedly stolen from the National Security Agency are growing annoyed and want cash.The ShadowBrokers' sale of the stolen tools has so far generated little interest, and over the weekend, the hackers complained in a message posted online, using broken English."TheShadowBrokers is not being interested in fame. TheShadowBrokers is selling to be making money," the hackers said.As of Monday, their auction only had one substantial bid at 1.5 bitcoins, or US $918. Many of the other bids were valued at less than $1. To read this article in full or to leave a comment, please click here

Where’s the bottom for Microsoft’s Internet Explorer?

Millions more deserted Microsoft's browsers last month, adding to what can only be described as a collapse of the company's place in the browser world.According to analytics vendor Net Applications, the combined user share of Internet Explorer and Edge fell 1.9 percentage points in September, ending the month at 30.6%.The string of losses showed no sign of letting up: September's decline was the sixth in a row of 1.9 percentage points or more. IE and Edge have shed 18 percentage points so far this year, a 39% decline in just eight months. Simply put, no other browser has bled user share this quickly, with the possible exception of Netscape Navigator in the 1990s.To read this article in full or to leave a comment, please click here

Tim Cook: Augmented reality will be an essential part of your daily life, like the iPhone

Apple CEO Tim Cook has a hunch about the future of augmented reality, and whether it will ever become mainstream.This weekend, Cook said that it will take some time for AR to become “acceptable.” But once that happens, AR experiences will be an integral part of our daily lives, comparing the emerging technology to the iPhone and eating three meals a day.“I do think that a significant portion of the population of developed countries, and eventually all countries, will have AR experiences every day, almost like eating three meals a day. It will become that much a part of you,” Cook said during his panel at a tech conference in Utah. Cook then admitted that there are technical challenges preventing AR from becoming a reality.To read this article in full or to leave a comment, please click here

Microsoft points to a transition of Windows 10 Mobile to 64-bit

There's a lot to like in Microsoft's Windows 10 Mobile for smartphones, but it has one glaring weakness: It still is a 32-bit OS.But a transition to 64-bit for the OS was inevitable as memory capacity in smartphones goes up, Microsoft said during a presentation at the Ignite conference last week. Windows 10 Mobile lags behind Apple's iOS and Google's Android, which transitioned to 64 bits a few years ago. Many new Windows phones already have 64-bit ARM-based Qualcomm processors, but the OS still runs as 32 bit.Thirty-two bits is "not really a limitation for us since the devices are all 4GB [of RAM] or less. But that will change over the next couple of years," said Jason Whitehorn, partner software engineer manager of the Windows and Devices Group at Microsoft.To read this article in full or to leave a comment, please click here

Elephant Flows, Fabrics, and I2RS

The last post in this series on I2RS argues that this interface is designed to augment, rather than replace, the normal, distributed routing protocol. What sort of use case could we construct that would use I2RS in this way? What about elephant flows in data center fabrics? An earlier post considers how to solve the elephant flow using segment routing (SR); can elephant flows also be guided using I2RS? The network below will be used to consider this question.

benes-segment

Assume that A hashes a long lived elephant flow representing some 50% of the total bandwidth available on any single link in the fabric towards F. At the same time, A will hash other flows, represented by the red flow lines, onto each of the three links towards the core of the fabric in pretty much equal proportion. Smaller flows that are hashed onto the A->F link will likely suffer, while flows hashed onto the other two links will not.

This is a particularly bad problem in applications that have been decomposed into microservices, as the various components of the application tend to rely on fairly fixed delay and jitter budgets over the network to keep everything synchronized and running quickly. Continue reading

The craziest stories of the tech sector

Network World started its Wider Net stories in 2003 in an effort to lighten up our news pages, acknowledging that there is a lot more to the world of enterprise networking and IT other than speeds and feeds of switches and routers and WAN links. The story approach was modeled somewhat after the Wall Street Journal's famed and quirky front page A-Hed articles (i.e., the middle column), but tended more to networking topics, from "When animals attack…networks" to the story of networking's most famous couple, Alice and Bob of security lesson fame. While Network World did away with its formal weekly Wider Net articles when the publication switched over to publishing twice a month, we've tried to continue mixing in lighthearted pieces through our blogs and in other places on our website and print magazine. Here are some of our favorites:To read this article in full or to leave a comment, please click here

The craziest stories of the tech sector

Network World started its Wider Net stories in 2003 in an effort to lighten up our news pages, acknowledging that there is a lot more to the world of enterprise networking and IT other than speeds and feeds of switches and routers and WAN links. The story approach was modeled somewhat after the Wall Street Journal's famed and quirky front page A-Hed articles (i.e., the middle column), but tended more to networking topics, from "When animals attack…networks" to the story of networking's most famous couple, Alice and Bob of security lesson fame. While Network World did away with its formal weekly Wider Net articles when the publication switched over to publishing twice a month, we've tried to continue mixing in lighthearted pieces through our blogs and in other places on our website and print magazine. Here are some of our favorites:To read this article in full or to leave a comment, please click here

The craziest stories of the tech sector

Network World started its Wider Net stories in 2003 in an effort to lighten up our news pages, acknowledging that there is a lot more to the world of enterprise networking and IT other than speeds and feeds of switches and routers and WAN links. The story approach was modeled somewhat after the Wall Street Journal's famed and quirky front page A-Hed articles (i.e., the middle column), but tended more to networking topics, from "When animals attack…networks" to the story of networking's most famous couple, Alice and Bob of security lesson fame. While Network World did away with its formal weekly Wider Net articles when the publication switched over to publishing twice a month, we've tried to continue mixing in lighthearted pieces through our blogs and in other places on our website and print magazine. Here are some of our favorites:To read this article in full or to leave a comment, please click here

Microsoft follows AWS into France with plan for new Azure data center

Microsoft is adding to its European cloud infrastructure, with plans to open new data centers in France next year, CEO Satya Nadella said Monday.The company has already spent US$3 billion growing its European cloud capabilities. These include data centers in the U.K. hosting Azure and Office 365 services, and in Germany hosting Azure.The French data centers will host Dynamics 365, Microsoft's new ERP and CRM offering, in addition to Azure and Office 365.The company has already won over the the U.K.'s Ministry of Defence and German auto parts manufacturer ZF to its cloud services. Ireland's Health Service Executive and the Franco-Japanese car-making partnership Renault-Nissan Alliance are also customers, it said.To read this article in full or to leave a comment, please click here

37% off Elite Tactical Waterproof Flashlight 1200 Lumen Cree LED with Zoom For Self Defense – Deal Alert

The Elite Tactical Pro 300 Series Tactical Flashlight is constructed from heavy-duty, military grade material, and claims to be the best and brightest flashlight on the market with a powerful 1200 lumen intensity. It's built with Cree LED technology and is complete with a zoomable feature that allows you to concentrate light into specific areas, something they've indicated could be useful in situations requiring self-defense. The design is waterproof and shockproof making it ideal for rainy nights, emergency use during a flood or storm, or while camping, hunting, or hiking. Keep it in your kitchen cupboard, your car or an emergency kit. The Pro 300 comes with rechargeable batteries for extra convenience. The Elite Pro 300 averages 5 out of 5 stars on Amazon and its typical list price of $30 has been discounted 37% to $19. Tired of your flashlight breaking whenever it's run over by an airplane? Check out the discounted Elite Pro 300 on Amazon.To read this article in full or to leave a comment, please click here