Archive

Category Archives for "Networking"

Putin denies any Russian interest in alleged US election hacking

Russian President Vladimir Putin is rejecting claims that his country is behind any U.S. election-related hacking, saying "hysteria" is fueling the allegations."This has nothing to do with Russia's interests," he said on Wednesday at an investors conference in Moscow.Putin made the comments after the U.S. publicly blamed the Russian government last Friday for hacking U.S. officials and political groups in an effort to influence the upcoming presidential election.Stolen documents from those hacks, including sensitive emails, have been leaking online over the past months, potentially hurting the election chances of Democratic presidential candidate Hillary Clinton.To read this article in full or to leave a comment, please click here

Putin denies any Russian interest in alleged US election hacking

Russian President Vladimir Putin is rejecting claims that his country is behind any U.S. election-related hacking, saying "hysteria" is fueling the allegations."This has nothing to do with Russia's interests," he said on Wednesday at an investors conference in Moscow.Putin made the comments after the U.S. publicly blamed the Russian government last Friday for hacking U.S. officials and political groups in an effort to influence the upcoming presidential election.Stolen documents from those hacks, including sensitive emails, have been leaking online over the past months, potentially hurting the election chances of Democratic presidential candidate Hillary Clinton.To read this article in full or to leave a comment, please click here

Microsoft expands HoloLens in six new global markets

Microsoft announced plans to offer its well-hyped HoloLens virtual reality headset in six new markets outside North America after what Microsoft calls "tremendous excitement and interest from developers and commercial customers and partners around the globe."Alex Kipman, technical fellow in the Windows and Devices group, made the announcement in a blog post that the company has opened pre-orders today in the United Kingdom, Ireland, France and Germany, as well as in Australia and New Zealand. The headset will begin shipping in those markets in late November. Interest in augmented reality (AR) and VR products has exploded this year thanks to the shipments of the Oculus Rift and HTC Vive headsets, among many others. Microsoft is late to the market, but the buzz on HoloLens has been enormous. IDC predicts global revenues for the mixed reality (MR) market will grow from $5.2 billion this year to $162 billion in 2020.To read this article in full or to leave a comment, please click here

Reality, Virtually sets record for largest AR/VR hackathon

More than 400 participants, mentors, workshop speakers, judges and sponsors convened at the Reality, Virtually AR/VR hackathon sponsored by the MIT Media Lab last weekend, setting a hackathon record with 75 open-source project submissions.The winners were KidCity VR and Waypoint Rx.KidCity VR, built by Anish Dhesikan, Jacqueline Assar, Theji Jayaratne, Emily Pascual and Kachina Stude, is an HTC Vive educational application for children and parents to play together in virtual reality (VR). The team won $5,000 from Samsung’s Global Innovation Center for the best VR applicationTo read this article in full or to leave a comment, please click here

The Truth About Cybersecurity Certifications

It’s a common trait amongst cybersecurity professionals.  When they meet each other, discuss their qualifications with prospective employers, or print their business cards, there is often an alphabet soup of initials by their names, specifying the many certifications they’ve achieved.Now some of these certifications are certainly worthwhile but over the last few years, the entire industry has gone gaga with dozens of new cybersecurity certifications offered by for-profit organizations.  This has led to a marketing push with a consistent message that more certifications equate to more money, knowledge, and opportunities for cybersecurity professionals.To read this article in full or to leave a comment, please click here

The truth about cybersecurity certifications

It’s a common trait amongst cybersecurity professionals. When they meet each other, discuss their qualifications with prospective employers, or print their business cards, there is often an alphabet soup of initials by their names, specifying the many certifications they’ve achieved.Now, some of these certifications are certainly worthwhile, but over the last few years, the entire industry has gone gaga with dozens of new cybersecurity certifications offered by for-profit organizations. This has led to a marketing push with a consistent message that more certifications equate to more money, knowledge and opportunities for cybersecurity professionals.To read this article in full or to leave a comment, please click here

The Truth About Cybersecurity Certifications

It’s a common trait amongst cybersecurity professionals.  When they meet each other, discuss their qualifications with prospective employers, or print their business cards, there is often an alphabet soup of initials by their names, specifying the many certifications they’ve achieved.Now some of these certifications are certainly worthwhile but over the last few years, the entire industry has gone gaga with dozens of new cybersecurity certifications offered by for-profit organizations.  This has led to a marketing push with a consistent message that more certifications equate to more money, knowledge, and opportunities for cybersecurity professionals.To read this article in full or to leave a comment, please click here

The ultimate data center throne

What happens when fans of the Game of Thrones TV series work at a company that makes power equipment?This: Eaton The Eaton ePDU G3 Throne Behold the Eaton ePDU G3 Throne. Compare it to the original Iron throne, pictured here. Eaton commissioned a North Carolina artists to design the chair and then workers constructed it out of 35 rack power distribution unit. It has a total of 821 outlet receptacles. Now that’s a throne with some power capacity. Check out a slideshow of how the Throne was built here. To read this article in full or to leave a comment, please click here

The ultimate data center throne

What happens when fans of the Game of Thrones TV series work at a company that makes power equipment?This: Eaton The Eaton ePDU G3 Throne Behold the Eaton ePDU G3 Throne. Compare it to the original Iron throne, pictured here. Eaton commissioned a North Carolina artists to design the chair and then workers constructed it out of 35 rack power distribution unit. It has a total of 821 outlet receptacles. Now that’s a throne with some power capacity. Check out a slideshow of how the Throne was built here. To read this article in full or to leave a comment, please click here

Datanauts 055: All About Scaling Out

The Datanauts delve into the nitty-gritty of how scale-out works for servers, networking, and storage; what it means for application design and operations; and how vendors, open source projects, and cloud services are positioning themselves in a scale-out world. The post Datanauts 055: All About Scaling Out appeared first on Packet Pushers.

Legacy TLS cipher support in Firefox

After upgrading Firefox recently, I noticed that I could no longer access certain embedded devices via HTTPS. It seems that recent versions of Firefox and Chrome no longer support certain TLS ciphers due to recently discovered vulnerabilities. That's all well and good, except the error returned offers no recourse if you need to connect anyway.

firefox_error.png

Firefox returns the error SSL_ERROR_NO_CYPHER_OVERLAP with no option to temporarily allow connectivity. (Chrome reports a similar error named ERR_SSL_VERSION_OR_CIPHER_MISMATCH.) Presumably, this choice was made by the developers with the intention of forcing people to upgrade outdated devices. Unfortunately, in order to upgrade an out-of-date device, we typically must first be able to connect to it. I wasted a fair bit of time digging up a solution, so I figured I'd document the workaround here for when I inevitably run into this problem again a year from now and have forgotten what I did.

Continue reading · 2 comments

Legacy TLS cipher support in Firefox

After upgrading Firefox recently, I noticed that I could no longer access certain embedded devices via HTTPS. It seems that recent versions of Firefox and Chrome no longer support certain TLS ciphers due to recently discovered vulnerabilities. That's all well and good, except the error returned offers no recourse if you need to connect anyway.

firefox_error.png

Firefox returns the error SSL_ERROR_NO_CYPHER_OVERLAP with no option to temporarily allow connectivity. (Chrome reports a similar error named ERR_SSL_VERSION_OR_CIPHER_MISMATCH.) Presumably, this choice was made by the developers with the intention of forcing people to upgrade outdated devices. Unfortunately, in order to upgrade an out-of-date device, we typically must first be able to connect to it. I wasted a fair bit of time digging up a solution, so I figured I'd document the workaround here for when I inevitably run into this problem again a year from now and have forgotten what I did.

Continue reading · 16 comments

Legacy TLS cipher support in Firefox

After upgrading Firefox recently, I noticed that I could no longer access certain embedded devices via HTTPS. It seems that recent versions of Firefox and Chrome no longer support certain TLS ciphers due to recently discovered vulnerabilities. That's all well and good, except the error returned offers no recourse if you need to connect anyway.

firefox_error.png

Firefox returns the error SSL_ERROR_NO_CYPHER_OVERLAP with no option to temporarily allow connectivity. (Chrome reports a similar error named ERR_SSL_VERSION_OR_CIPHER_MISMATCH.) Presumably, this choice was made by the developers with the intention of forcing people to upgrade outdated devices. Unfortunately, in order to upgrade an out-of-date device, we typically must first be able to connect to it. I wasted a fair bit of time digging up a solution, so I figured I'd document the workaround here for when I inevitably run into this problem again a year from now and have forgotten what I did.

Continue reading · 12 comments

5 affordable MDM options for small businesses

Affordable MDM options for small businessesImage by ThinkstockSmall and medium sized businesses (SMBs) have embraced BYOD. In a study of SMBs from the IT community, Spiceworks, 61 percent of respondents said they have a BYOD policy in place. However, the same study found that 56 percent of that group also said they had not implemented any mobile device management (MDM) strategies and didn't have plans to do so within the next six months. While BYOD might allow these smaller businesses to save on hardware costs, it does open up unique risks for IT. With employees running on varying operating systems and hardware, it becomes difficult to implement secure solutions across the board, leaving sensitive data at risk. If just one employee's tablet falls into the wrong hands, you're going to wish you had some way to remotely wipe data on that device. But small businesses also have small IT departments -- sometimes consisting of only one person -- so a BYOD management strategy needs be straightforward, affordable and low-maintenance. Just because your business doesn't have a big budget or a large staff doesn't mean you can't ensure that all your corporate data remains secure, no matter where Continue reading

How Anaplan makes dynamic strategic planning a reality

Anaplan doesn’t come up in many conversations about unicorns – you know, the Ubers, Airbnbs and SnapChats of the world. But if your company is struggling with strategic planning, Anaplan is one unicorn you’ll want to learn more about. San Francisco-headquartered Anaplan’s cloud-based platform replaces spreadsheet mania as a way to handle large-scale strategic planning in real time. Companies such as HP, Intel and Morgan Stanley are streamlining sales management, forecasting and a variety of other applications using Anaplan, which simplifies life for everyone from senior managers to model builders and end users.To read this article in full or to leave a comment, please click here(Insider Story)

IDG Contributor Network: 8 tech ‘megatrends’ that are about to change business

An assemblage of technological breakthroughs are rapidly morphing to create massive changes in how businesses operate.Artificial intelligence (AI), blockchain and Internet of Things (IoT) are just three of eight crucial “megatrends” that strategy consulting firm PricewaterhouseCoopers (PwC) says is going to significantly distort business.Those new forces should clearly be planned for. And although the consulting firm's advice is aimed at generalized CEOs, it's IT and technical teams that will have to lay the groundwork.Robots, augmented reality (AR), 3D printing, drones and virtual reality (VR) are also among PwC’s pick of “essential eight technologies” that the firm says in its report (PDF) (released during the summer) need to be considered by company chiefs to move their operations forward.To read this article in full or to leave a comment, please click here