Archive

Category Archives for "Networking"

Microsoft releases one of its biggest security updates this year

Microsoft released one of its biggest security updates this year, fixing 50 vulnerabilities in its products and 26 more in Flash Player, which is bundled with its Edge browser.The patches are split into 14 security bulletins, including the one dedicated to Flash Player, seven of which are rated critical. They address vulnerabilities in Windows, Internet Explorer, Microsoft Edge, Microsoft Exchange, Microsoft Office and Microsoft Office web services and apps.For desktop deployments, administrators should prioritize the fixes for Internet Explorer, which are covered in the MS16-104 bulletin, Microsoft Edge (MS16-105), Microsoft Office (MS16-107), Microsoft Graphics Component (MS16-106), OLE Automation for VBScript Scripting Engine (MS16-116) and Adobe Flash Player (MS16-117).To read this article in full or to leave a comment, please click here

Riding the new Wi-Fi wave, part 3: AmpliFi

New home Wi-Fi systems based on wireless mesh technologies keep coming out of the woodwork. That’s a good thing, because being able to compare different systems, seeing what works and what doesn’t, should spur innovation. While most people want a system that you just set up and forget (until the kids complain), I like having a system that you can tweak or obtain data from. But yeah, easy setup also makes it worthwhile.Enter the AmpliFi wireless mesh system, courtesy of Ubiquiti Labs (the new consumer arm of Ubiquiti Networks). This system includes a cube-shaped router with two satellite units - vertical rectangles attached to a magnetic sphere with a power outlet (more on that later). The router includes an LED screen that displays data about your Wi-Fi network, as well as four Ethernet LAN ports and a USB port (reserved for later use). The company offers three models - the basic system ($199) includes a router and two satellites; the LR system ($299) stands for Super Long Range, and the HD system ($349) supports high-density environments. For this review, I tested the HD system.To read this article in full or to leave a comment, please click here

The scourge of LEDs everywhere: Readers speak out

We didn't claim that our recent story titled "Lights out! Why IT shops are disabling wireless AP LEDs" was tackling one of the world's major problems, but it clearly addressed one of the tech world's ongoing annoyances.Roughly 300 comments have been made about the story by those who found it on the Slashdot website, others chimed in on Reddit, and more contacted me directly. (The original story was prompted by discussion among IT professionals at universities, seeking ways to reduce light pollution in dorm and hospital rooms.)To read this article in full or to leave a comment, please click here

Russian hackers accused of leaking US Olympic athletes’ medical files

The World Anti-Doping Agency (WADA) was hacked and confidential medical files of US Olympic athletes Simone Biles, Serena and Venus Williams and Elena Delle Donne were leaked online. The hackers dubbed the dump as “just the tip of the iceberg.”A group claiming to be the Fancy Bears' Hack Team took credit for the attack and accused American Olympic athletes of doping, of using “dirty methods to win.” Furthermore, the hackers claimed that although the US Olympic team had "played well but not fair,” it had “disgraced its name by tainted victories.”To read this article in full or to leave a comment, please click here

Russian hackers accused of leaking U.S. Olympic athletes’ medical files

The World Anti-Doping Agency (WADA) was hacked and confidential medical files of U.S. Olympic athletes Simone Biles, Serena and Venus Williams, and Elena Delle Donne were leaked online. The hackers said the dump is “just the tip of the iceberg.”A group claiming to be the Fancy Bears' Hack Team took credit for the attack and accused American Olympic athletes of doping, of using “dirty methods to win.” Furthermore, the hackers claimed that although the U.S. Olympic team "played well but not fair,” it had “disgraced its name by tainted victories.”To read this article in full or to leave a comment, please click here

Russian hackers accused of leaking US Olympic athletes’ medical files

The World Anti-Doping Agency (WADA) was hacked and confidential medical files of US Olympic athletes Simone Biles, Serena and Venus Williams and Elena Delle Donne were leaked online. The hackers dubbed the dump as “just the tip of the iceberg.”A group claiming to be the Fancy Bears' Hack Team took credit for the attack and accused American Olympic athletes of doping, of using “dirty methods to win.” Furthermore, the hackers claimed that although the US Olympic team had "played well but not fair,” it had “disgraced its name by tainted victories.”To read this article in full or to leave a comment, please click here

Russian hackers accused of leaking U.S. Olympic athletes’ medical files

The World Anti-Doping Agency (WADA) was hacked and confidential medical files of U.S. Olympic athletes Simone Biles, Serena and Venus Williams, and Elena Delle Donne were leaked online. The hackers said the dump is “just the tip of the iceberg.”A group claiming to be the Fancy Bears' Hack Team took credit for the attack and accused American Olympic athletes of doping, of using “dirty methods to win.” Furthermore, the hackers claimed that although the U.S. Olympic team "played well but not fair,” it had “disgraced its name by tainted victories.”To read this article in full or to leave a comment, please click here

When a project fails, don’t blame your end users

It’s an all-too-familiar tale: A CIO pushes a new process, platform or digital transformation effort across the company and when it fails (as 70 percent of all change programs do, according to the famous statistic reported by Harvard Business Review), the CIO pins the blame on uncooperative end users.To read this article in full or to leave a comment, please click here(Insider Story)

DataRobot aims to help create data science executives

Data scientists are in short supply. But so too are managers that understand data science and machine learning enough to spot the opportunities for using these disciplines to optimize their businesses.McKinsey Global Institute has projected that by 2018, the U.S. alone will face a shortage of 1.5 million managers and analysts with the necessary analytics and data science expertise to fill demand.The business side of machine learning To combat this problem, Data science automation specialist DataRobot announced today that it has updated its DataRobot University curriculum with Data Science for Executives, a half-day offering that teaches executives interested in the benefits of advanced data science how to identify opportunities to optimize their business using machine learning.To read this article in full or to leave a comment, please click here

56% off Poweradd Pilot X7 20,000mAh Power Bank for Smartphones and Tablets – Deal Alert

This power bank from Poweradd delivers huge power. Its 20000mAh capacity means you can charge an iPhone 6 eight times, Samsung S6 over five times, or a a large capacity iPad Air 2 almost twice.  It will auto-detect the status of your device, to intelligently deliver power at the fastest possible speed with 2.1A max output. 900+ people rate this item 4.5 out of 5 stars on Amazon (read reviews), and its typical list price of $49.99 has been reduced a generous 56% to just $21.88.To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT is not about radios; it’s all about data

The initial challenge for the Internet of Things (IoT) was how to provide physical connectivity of small and often remote devices to the Internet. This issue has basically been solved with the plethora of wireless connectivity solutions. The real challenge for IoT is data organization, sharing and search on an unprecedented scale.Most discussions about IoT usually point out in passing that today’s machine data is concentrated in vertical, or isolated, data silos. However, they rarely explain why this is a problem. More important, they do not give a roadmap of how to solve this problem going forward. I will try to provide some insight on both points.To read this article in full or to leave a comment, please click here

Early iPhone 7 reviews: You’ll miss the headphone jack, but the camera and battery life are tops

The first batch of iPhone 7 and 7 Plus reviews are out after five days of hands-on time, and the early word is mostly positive. The camera in particular is a stand-out, and the two lenses on the 7 Plus produce results that easily stand up to the competition, the Samsung Galaxy S7.As expected, dealing with the lack of a headphone jack was perplexing to some and outright irritating for others. But the impressive cameras on both iPhones, plus the improved battery life and water resistance, make them easier to use on the go.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Smartphone tracking not completely evil, academics say

Surreptitious smartphone services quietly tracking us as we move around have gotten privacy fiends up in arms. However, academics reveal that location tracking is not all about finding ways to sell us stuff. Researchers and scientists are altruistically using the data, too.In one case, they're using mobile device-based mobility patterns to track exposure to pollution with more accuracy, another in metropolitan planning.+ Also on Network World: Wi-Fi-tracing delivers vast insights into behavioral patterns +To read this article in full or to leave a comment, please click here

Internet naming system not US property, says congressional watchdog

The U.S. Government Accountability Office has said that the internet domain name system is unlikely to be government property, ahead of the planned transfer by month end of the oversight of key technical functions supporting the internet, including the domain name system, to an independent multistakeholder body."It is unlikely that either the authoritative root zone file—the public 'address book' for the top level of the Internet domain name system—or the Internet domain name system as a whole" is U.S. government property, the GAO said in a legal opinion provided to legislators.The report by the Congressional watchdog comes ahead of a hearing on the issue Wednesday chaired by Republican Senator Ted Cruz from Texas. The Republicans are intent on blocking the transfer of the Internet Assigned Numbers Authority (IANA) functions, currently being operated by the Internet Corporation for Assigned Names and Numbers (ICANN) under a contract with the Department of Commerce, which expires on Sept. 30.To read this article in full or to leave a comment, please click here

Internet naming system not US property, says congressional watchdog

The U.S. Government Accountability Office has said that the internet domain name system is unlikely to be government property, ahead of the planned transfer by month end of the oversight of key technical functions supporting the internet, including the domain name system, to an independent multistakeholder body."It is unlikely that either the authoritative root zone file—the public 'address book' for the top level of the Internet domain name system—or the Internet domain name system as a whole" is U.S. government property, the GAO said in a legal opinion provided to legislators.The report by the Congressional watchdog comes ahead of a hearing on the issue Wednesday chaired by Republican Senator Ted Cruz from Texas. The Republicans are intent on blocking the transfer of the Internet Assigned Numbers Authority (IANA) functions, currently being operated by the Internet Corporation for Assigned Names and Numbers (ICANN) under a contract with the Department of Commerce, which expires on Sept. 30.To read this article in full or to leave a comment, please click here

The most secure home computer ever

We’ve all heard tales of foreign intelligence entities breaking into hotel rooms and cloning a person’s hard drive while he or she is in the bar downstairs.You might dismiss it as the stuff of urban legend or Jason Bourne movies, but this style of attack does highlight one of the most basic weaknesses of today’s PCs: Their data is extremely vulnerable once an attacker has physical access to a machine. Cold boot attacks, USB exploits,or DMA attacks over FireWire, among other breaches, are all possible if a bad actor can get his or her hands on the hardware.To read this article in full or to leave a comment, please click here

The most secure home computer ever

We’ve all heard tales of foreign intelligence entities breaking into hotel rooms and cloning a person’s hard drive while he or she is in the bar downstairs.You might dismiss it as the stuff of urban legend or Jason Bourne movies, but this style of attack does highlight one of the most basic weaknesses of today’s PCs: Their data is extremely vulnerable once an attacker has physical access to a machine. Cold boot attacks, USB exploits,or DMA attacks over FireWire, among other breaches, are all possible if a bad actor can get his or her hands on the hardware.To read this article in full or to leave a comment, please click here

Review: Ansible shows the beef

At a time when the configuration management market was dominated by Puppet and Chef, an open source project called Ansible emerged with a simpler approach to automating IT environments. An agentless system that was easy to learn, Ansible quickly earned a name for itself. Before long, the developers behind the project formed a company to offer commercial support. That company -- first known as AnsibleWorks, then Ansible -- was acquired by open source leader Red Hat in October 2015.Docker. Ansible offers modules for building and running Docker containers, orchestrating containers across a Swarm cluster, and managing Docker images. There are advantages to building Docker images from Ansible playbooks instead of Dockerfiles. When you build an image from a Dockerfile, the application or environment can only be deployed in a  Docker container. But when you build an image using Ansible playbooks, the environments can easily be replicated on any infrastructure -- bare metal, cloud instance, virtual machine, or Vagrant.To read this article in full or to leave a comment, please click here(Insider Story)

Review: Ansible shows the beef

At a time when the configuration management market was dominated by Puppet and Chef, an open source project called Ansible emerged with a simpler approach to automating IT environments. An agentless system that was easy to learn, Ansible quickly earned a name for itself. Before long, the developers behind the project formed a company to offer commercial support. That company -- first known as AnsibleWorks, then Ansible -- was acquired by open source leader Red Hat in October 2015.Docker. Ansible offers modules for building and running Docker containers, orchestrating containers across a Swarm cluster, and managing Docker images. There are advantages to building Docker images from Ansible playbooks instead of Dockerfiles. When you build an image from a Dockerfile, the application or environment can only be deployed in a  Docker container. But when you build an image using Ansible playbooks, the environments can easily be replicated on any infrastructure -- bare metal, cloud instance, virtual machine, or Vagrant.To read this article in full or to leave a comment, please click here(Insider Story)