Archive

Category Archives for "Networking"

New iPhone 7 leak provides our best look at Apple’s next-gen smartphone

With just about two months to go before Apple introduces the iPhone 7 to the world, recent product leaks have given us a pretty good idea of what to expect from Apple's next-gen smartphone—at least from a design point of view.Over the past few weeks, we've certainly seen no shortage of spy shots and blurry shots of iPhone casings. But a recent leak courtesy of Nowhereelse.fr has given us our clearest look yet at we can expect from the iPhone 7's design.As evidenced via the photo below, the antenna lines that we had to withstand on the iPhone 6 and 6s have thankfully been relegated to the sides of the device. In other words, the back of the iPhone 7 is incredibly smooth and sleek.To read this article in full or to leave a comment, please click here

Pluribus enriches virtual management system with central console, apps

Pluribus this week added a key piece to its virtual network management portfolio – a central management console and framework for helping customers better see and control their virtual network environment.The company announced VCFcenter, which it describes as a single pane of glass that will let customers comprehend business service flows and packets across their networks. VCFcenter is key because the company’s primary analytics application -- VCF-IA – will plug into the system as well as new reporting and deep packet analysis applications that combined offer a powerful management system for virtual environments the company says.+More on Network World: Cisco platform lets IT rein-in disruptive data center operations, security, applications+To read this article in full or to leave a comment, please click here

IDG Contributor Network: Auto thieves adopting cybercrime-like tactics

In addition to recently publicized hacks of electronic auto ignitions with laptops, car thieves have several other high-tech techniques they’ve put to use—or will soon unleash upon their victims, according to stolen vehicle recovery firm CalAmp LoJack Corp.The lawlessness includes portable scanner boxes that exploit electronic key fobs; identity theft, where the Personally Identifiable Information data stored within the vehicle and in the vehicle computer is stolen; and car cloning, which is when a Vehicle Identification Number (VIN) is faked, allowing new documents to be produced.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Auto thieves adopting cybercrime-like tactics

In addition to recently publicized hacks of electronic auto ignitions with laptops, car thieves have several other high-tech techniques they’ve put to use—or will soon unleash upon their victims, according to stolen vehicle recovery firm CalAmp LoJack Corp.The lawlessness includes portable scanner boxes that exploit electronic key fobs; identity theft, where the Personally Identifiable Information data stored within the vehicle and in the vehicle computer is stolen; and car cloning, which is when a Vehicle Identification Number (VIN) is faked, allowing new documents to be produced.To read this article in full or to leave a comment, please click here

File sharing site Megaupload will return in January, claims Kim Dotcom

The creator of Megaupload plans on reviving the infamous file sharing site on Jan. 20, five years after the U.S. government shut it down.“It will be better than the original and it will feel like home,” tweeted Megaupload’s creator Kim Dotcom on Sunday.He made the announcement as U.S. authorities are trying to extradite him to face copyright infringement charges. In 2012, the U.S. government pulled the plug on his file-sharing site, which was accused of helping to distribute pirated music and video.Dotcom, who is based in New Zealand, has appealed his extradition to the U.S., and a court hearing is set for August.To read this article in full or to leave a comment, please click here

Microsoft to partners: Make more money

While Microsoft CEO Satya Nadella today touted "digital transformation" during a 30,000-foot-view speech before thousands of resellers, the executive in charge of the firm's global partner group got down to dollars and cents."It starts for us with our mission. Everything we do, every product we build, every decision we make, in even our partner programs, is grounded in our mission, to empower every person and every organization on the planet to achieve more," Nadella said shortly after he stepped onto the stage at Microsoft's Worldwide Partner Conference (WWPC) in Toronto Monday.Nadella's "empower every person..." phrase has been his go-to description of Microsoft's strategy since June 2015, when the CEO unveiled the mission statement in an all-hands email.To read this article in full or to leave a comment, please click here

OS X code names for US election candidates

Code names for operating systems have become “de rigeur” in the industry but, as far as I can figure out, it wasn’t until 2001 after Apple’s marketing people started using code names as part of their branding (OS X "Cheetah”) that other OS vendors adopted the practice. Note that it wasn’t that other companies didn’t have code names for their products, it was just that they just didn’t use them as part of product marketing until Apple did (for example, how many people know that Windows XP was code named “Whistler”?).To read this article in full or to leave a comment, please click here

Athletes worried about Zika can skip Olympics, but what about tech workers?

Golfer Jordan Spieth announced this morning that he will not play in the Olympic Games because of concerns over the Zika virus, meaning the world’s top four players in his sport have now opted out of going to Brazil. Savannah Guthrie, who hosts Today on NBC, will not be there either. The golfers are self-employed and need answer to no one, while Guthrie is pregnant. All enjoy the power of celebrity.But what of the rank-and-file employees who work for major technology companies sending large contingents to Brazil to provide services and show off their wares? Are they being asked – or compelled -- to ignore the risks? Conversely, could women of child-bearing age be denied the opportunity to go at an employer’s discretion? We asked a number of vendors and an expert in employment law.To read this article in full or to leave a comment, please click here

Microsoft releases a new IFTTT language for wider use

Last month Microsoft introduced Flow, a service that allows you to create conditional connections between its business services. It supported both Microsoft products, such as Office, Office 365 and SharePoint, and non-Microsoft services, such as Twitter, Slack, Google Drive and Dropbox, letting you build conditional actions.For example, you could have a text alert generated when you received an email, automatically pull tweets into an Office app or get Slack notifications when a file is uploaded to a Dropbox folder.To read this article in full or to leave a comment, please click here

GE and Microsoft work together on IoT services in the cloud

GE and Microsoft have teamed up to bring the industrial giant's Predix platform-as-a-service offering to the Azure cloud, the two companies announced Monday. It's a move that helps add to the portfolio of Internet of Things services available through Microsoft's cloud platform, at a time when the company is pushing its service for IoT applications. The announcement came during Microsoft's Worldwide Partner Conference in Toronto, where GE CEO Jeff Immelt talked with Microsoft CEO Satya Nadella on stage.Predix is a platform-as-a-service offering that's designed for building applications that have industrial uses. Predix services that developers can tap into include asset management and anomaly detection offerings, among others. To read this article in full or to leave a comment, please click here

How to marry content, business process management

Alfresco Software was born a decade ago as an open source enterprise content management (ECM) provider and the company has enjoyed growing success with major corporations and government agencies struggling to deal with an explosion of information. More recently, Alfresco jumped into the business process management (BPM) market and its integration of ECM and BPM is gaining from enterprise buyers.To read this article in full or to leave a comment, please click here(Insider Story)

Amazon CTO says cloud can help crashing Pokemon Go

As Pokemon Go continues to be a viral craze, the makers of the game have dealt with the service going down – presumably from peak loads on the game.Amazon CTO Werner Vogels has offered a solution: The cloud.+MORE AT NETWORK WORLD: Armed crooks use Pokemon Go to lure and rob victims +In a post on Twitter from over the weekend, Vogels implied that the game’s makers could use Amazon Web Services' public IaaS cloud to help alleviate intermittent service issues. "Dear cool folks at @NianticLabs please let us know if there is anything we can do to help!" Vogels Tweeted.  To read this article in full or to leave a comment, please click here

DC Fabric Segment Routing Use Case (1)

A couple of weeks ago, I attended a special segment routing Networking Field Day. This set me to thinking about how I would actually use segment routing in a live data center. As always, I’m not so concerned about the configuration aspects, but rather with what bits and pieces I would (or could) put together to make something useful out of these particular 0’s and 1’s. The fabric below will be used as our example; we’ll work through this in some detail (which is why there is a “first part” marker in the title).

benes-segment

This is a Benes fabric, a larger variation of which which you might find in any number of large scale data center. In this network, there are many paths between A and E; three of them are marked out with red lines to give you the idea. Normally, the specific path taken by any given flow would be selected on a somewhat random basis, using a hash across various packet headers. What if I wanted to pin a particular flow, or set of flows, to the path outlined in green?

Let’s ask a different question first—why would I want to do such a thing? There are Continue reading

Serious flaw fixed in widely used WordPress plug-in

If you're running a WordPress website and you have the hugely popular All in One SEO Pack plug-in installed, it's a good idea to update it as soon as possible. The latest version released Friday fixes a flaw that could be used to hijack the site's admin account.The vulnerability is in the plug-in's Bot Blocker functionality and can be exploited remotely by sending HTTP requests with specifically crafted headers to the website.The Bot Blocker feature is designed to detect and block spam bots based on their user agent and referer header values, according to security researcher David Vaartjes, who found and reported the issue.If the Track Blocked Bots setting is enabled -- it's not by default -- the plug-in will log all requests that were blocked and will display them on an HTML page inside the site's admin panel.To read this article in full or to leave a comment, please click here

Serious flaw fixed in widely used WordPress plug-in

If you're running a WordPress website and you have the hugely popular All in One SEO Pack plug-in installed, it's a good idea to update it as soon as possible. The latest version released Friday fixes a flaw that could be used to hijack the site's admin account.The vulnerability is in the plug-in's Bot Blocker functionality and can be exploited remotely by sending HTTP requests with specifically crafted headers to the website.The Bot Blocker feature is designed to detect and block spam bots based on their user agent and referer header values, according to security researcher David Vaartjes, who found and reported the issue.If the Track Blocked Bots setting is enabled -- it's not by default -- the plug-in will log all requests that were blocked and will display them on an HTML page inside the site's admin panel.To read this article in full or to leave a comment, please click here