Archive

Category Archives for "Networking"

Google’s DeepMind A.I. can slash data center power use 40%

Google tapped into the superior intelligence of its DeepMind neural network to find ways to vastly reduce the energy it uses in its data centers, which make up 40% of the worldwide Internet."This will also help other companies who run on Google's cloud to improve their own energy efficiency," Google said in a blog about the achievement. "While Google is only one of many data center operators in the world, many are not powered by renewable energy as we are."To read this article in full or to leave a comment, please click here

Enterprise encryption adoption up, but the devil’s in the details

I was talking about security with a good friend of mine who runs a software development company. He’s a really smart, technology-savvy guy but his take on encryption wasn’t positive. While he completely understands the need, he hates encryption (and security in general) because he says it always gets in the way when he’s trying to get work done. In this respect, I don’t think he’s that different from most people in the high tech world or, indeed, in the business world in general. This general dislike of encryption is because encryption doesn’t seem valuable when it’s a virtual speed bump in the road to getting stuff done and its benefits, despite the huge increase in breaches and hacking, are hard to quantify. So, with the exception of the paranoid and security geeks, encryption has traditionally been seen as a belt added to the braces of other simpler and therefore more tolerable security measures.To read this article in full or to leave a comment, please click here

Enterprise encryption adoption up, but the devil’s in the details

I was talking about security with a good friend of mine who runs a software development company. He’s a really smart, technology-savvy guy but his take on encryption wasn’t positive. While he completely understands the need, he hates encryption (and security in general) because he says it always gets in the way when he’s trying to get work done. In this respect, I don’t think he’s that different from most people in the high tech world or, indeed, in the business world in general. This general dislike of encryption is because encryption doesn’t seem valuable when it’s a virtual speed bump in the road to getting stuff done and its benefits, despite the huge increase in breaches and hacking, are hard to quantify. So, with the exception of the paranoid and security geeks, encryption has traditionally been seen as a belt added to the braces of other simpler and therefore more tolerable security measures.To read this article in full or to leave a comment, please click here

Intel ships Kaby Lake chips, pointing to PC availability in a few months

Tablets and laptops with Intel's 7th Generation Core chips code-named Kaby Lake should become available in the coming months.Intel is shipping Kaby Lake chips to PC makers now, CEO Brian Krzanich during Intel's earnings call Wednesday. Systems with new processors usually become available a few months after Intel delivers the chips.Kaby Lake will succeed current Core processors named Skylake. The new chip has the underpinnings of Skylake and won't necessarily be smaller in size, but it'll provide speed improvements over its predecessor, Krzanich said.That raises a question: should you wait a few months for Kaby Lake instead of upgrading to a Skylake PC now? Experts generally say you should buy a PC as and when you need it rather than wait for the next improvement to come along.To read this article in full or to leave a comment, please click here

2016 Cisco Live, US – Geeks for life. — Just another day at the office…

CiscoLive 2016 LasVegas was my absolute favorite CiscoLive EVER!  They just keep getting better and better and better every year!  I so adore my “Nerd Herd” friends.

I was going to write a blog.. but I just couldn’t find the words……

So please enjoy my friend’s blog (@amyengineer) reblogged here. ?

Fish  ?


Putting together a wrap up post on Cisco Live US always makes me smile, and 2016 is no exception. As many of you know, this CLUS marked 5 years since Tom and a small group of engineers first bonded over networking nerdiness and an addiction to 140 characters. We’ve followed and helped each other through […]

via 2016 Cisco Live, US – Geeks for life. — Just another day at the office…

Intel profit slides on costs related to layoffs

Intel's profit dropped sharply last quarter due to heavy costs from a restructuring announced in April, though sales were up thanks to the company's powerful data center group.Intel's profit for the quarter, ended July 2, was $1.3 billion, down from $2.7 billion a year earlier, the company announced Wednesday. Revenue climbed 3 percent to $13.5 billion.Intel said in April that it would axe 12,000 jobs worldwide, or 11 percent of its staff, in a plan to cut costs and focus on growing businesses like server processors and chips for the internet of things.In the process, it canceled the development of low-power Atom processors and more or less gave up on the smartphone and tablet markets -- areas where it's never done well.To read this article in full or to leave a comment, please click here

Wireless on wheels? Cable can play at that game, too

When lots of people gather for concerts or sports events, cellular carriers often bring their networks to the scene with cell towers mounted on trucks, or COWs (cells on wheels). Not to be outdone, Comcast is joining the fray using Wi-Fi.The U.S. cable giant will bring WoW (Wi-Fi on Wheels) to the Democratic National Convention in Philadelphia next week. WoW is what it sounds like: a van with six access points (APs) mounted on a 40-foot mast.Each AP points in a different direction so the truck can deliver strong signals over a wide area. It can serve as many as 3,000 people within a range of 500 feet, according to Comcast. Those users can get speeds as much as five times as fast as cellular, the company says.To read this article in full or to leave a comment, please click here

Wireless on wheels? Cable can play at that game, too

When lots of people gather for concerts or sports events, cellular carriers often bring their networks to the scene with cell towers mounted on trucks, or COWs (cells on wheels). Not to be outdone, Comcast is joining the fray using Wi-Fi.The U.S. cable giant will bring WoW (Wi-Fi on Wheels) to the Democratic National Convention in Philadelphia next week. WoW is what it sounds like: a van with six access points (APs) mounted on a 40-foot mast.Each AP points in a different direction so the truck can deliver strong signals over a wide area. It can serve as many as 3,000 people within a range of 500 feet, according to Comcast. Those users can get speeds as much as five times as fast as cellular, the company says.To read this article in full or to leave a comment, please click here

Hackers are targeting the Rio Olympics, so watch out for these cyberthreats

The Olympic Games in Rio de Janeiro will attract more than just athletes and tourists this year. Hackers from across the world will also be on the prowl, trying to exploit the international event.  That means visitors to the Olympics and even people watching from home should be careful. Cyberthreats related to the games will probably escalate over the coming weeks and could creep into your inbox or the websites you visit.Don't click if it's too good to be true The Olympics have become a beacon for cyber criminals, said Samir Kapuria, senior vice president with security firm Symantec. A great deal of money is spent on the international event, so hackers naturally want a slice of the pie, he added.To read this article in full or to leave a comment, please click here

Hackers are targeting the Rio Olympics, so watch out for these cyberthreats

The Olympic Games in Rio de Janeiro will attract more than just athletes and tourists this year. Hackers from across the world will also be on the prowl, trying to exploit the international event.  That means visitors to the Olympics and even people watching from home should be careful. Cyberthreats related to the games will probably escalate over the coming weeks and could creep into your inbox or the websites you visit.Don't click if it's too good to be true The Olympics have become a beacon for cyber criminals, said Samir Kapuria, senior vice president with security firm Symantec. A great deal of money is spent on the international event, so hackers naturally want a slice of the pie, he added.To read this article in full or to leave a comment, please click here

39% off Pebble Time Smartwatch – Deal Alert

With this deal, the Pebble Time smartwatch is currently sub-$100, which for some may make this a worthwhile purchase considering everything it can do. First off, the Pebble Time gives you all of your notifications in a glance, from calendar items to texts, emails and incoming call data. Pebble Health comes built-in, and tracks your activity and sleep with daily and weekly reporting. A built-in mic lets you take voice notes or give quick responses. Choose from thousands of watch faces and apps. The Pebble Time is water resistant up to 30 meters, and its e-paper screen reads clearly in bright sun and is scratch resistant. Its battery lasts up to 7 days on a single charge. There is a lot packed into this highly rated wearable, which averages 4 out of 5 stars on Amazon from over 630 customers (read reviews). With the current 29% off deal you can pick it up for just $91.90, a significant discount from its typical $149.99 list price. See the Pebble Time Smartwatch now on Amazon.To read this article in full or to leave a comment, please click here

Cisco patches critical exposure in management software

Cisco has patched what it called a critical vulnerability in its Unified Computing System (UCS) Performance Manager software that could let an authenticated, remote attacker execute commands.+More on Network World: Quick look: Cisco Tetration Analytics+Cisco UCS Performance Manager versions 2.0.0 and prior are affected and the problem is resolved in Cisco UCS Performance Manager versions 2.0.1 and later. UCS Performance Manager collects information about UCS servers, network, storage, and virtual machines.According to Cisco the vulnerability is due to insufficient input validation performed on parameters that are passed via an HTTP GET request. An attacker could exploit this vulnerability by sending crafted HTTP GET requests to an affected system. An exploit could allow the attacker to execute arbitrary commands with the privileges of the root user.To read this article in full or to leave a comment, please click here

Cisco patches critical exposure in management software

Cisco has patched what it called a critical vulnerability in its Unified Computing System (UCS) Performance Manager software that could let an authenticated, remote attacker execute commands.+More on Network World: Quick look: Cisco Tetration Analytics+Cisco UCS Performance Manager versions 2.0.0 and prior are affected and the problem is resolved in Cisco UCS Performance Manager versions 2.0.1 and later. UCS Performance Manager collects information about UCS servers, network, storage, and virtual machines.According to Cisco the vulnerability is due to insufficient input validation performed on parameters that are passed via an HTTP GET request. An attacker could exploit this vulnerability by sending crafted HTTP GET requests to an affected system. An exploit could allow the attacker to execute arbitrary commands with the privileges of the root user.To read this article in full or to leave a comment, please click here

Cisco patches critical exposure in management software

Cisco has patched what it called a critical vulnerability in its Unified Computing System (UCS) Performance Manager software that could let an authenticated, remote attacker execute commands.+More on Network World: Quick look: Cisco Tetration Analytics+Cisco UCS Performance Manager versions 2.0.0 and prior are affected and the problem is resolved in Cisco UCS Performance Manager versions 2.0.1 and later. UCS Performance Manager collects information about UCS servers, network, storage, and virtual machines.According to Cisco the vulnerability is due to insufficient input validation performed on parameters that are passed via an HTTP GET request. An attacker could exploit this vulnerability by sending crafted HTTP GET requests to an affected system. An exploit could allow the attacker to execute arbitrary commands with the privileges of the root user.To read this article in full or to leave a comment, please click here

Microsoft wants to help small businesses book appointments online

Small business owners are getting a new feature tailored just for them in Microsoft Office 365 -- a full-service system for scheduling appointments for their services over the internet.Microsoft Bookings is a new service that makes it possible for business owners to create their own scheduling page, and then let potential customers make an appointment online. It's supposed to be a boon for businesses used to running that process through a series of emails, phone calls, or text messages.Customers will be able to look at a list of prices, and then schedule time for an appointment with a list of employees. Bookings will then email the customers a confirmation including an invitation they can put on their calendars.To read this article in full or to leave a comment, please click here

Hackers have targeted 130 restaurants at Cicis pizza chain

More than 130 restaurants at the Cicis pizza chain were the recent target of hackers, and customers' credit card data may have been stolen.The company reported the data breach on Tuesday and posted a list of the restaurants affected, most of which are located in Texas.The hackers struck by secretly installing malware into the restaurant’s point-of-sale systems. Other companies, including fast-food chain Wendy’s and retailer Target, have been attacked in the same way in order to steal payment card data.To read this article in full or to leave a comment, please click here