Archive

Category Archives for "Networking"

How the Internet of Things improves air travel

Air travel has come a long way since the dark days of 2001. Security remains a concern, but the industry is paying increasing attention to innovation and customer service, and Internet of Things (IoT) technologies are playing a big role in efforts to make aviation more efficient and improve the passenger experience. As the costs of Internet-connected sensors and networking equipment continue to plummet, airlines, airport operators, airplane manufacturers and other travel and aviation industry suppliers are finding new ways to deploy and use IoT technologies.IoT-related developments in the air travel market could be applicable in many other industries. For example, IT managers in retail may find inspiration from the ways IoT technology is being used at Miami International Airport. And aircraft and engine makers have found applications for connected systems that could be beneficial to companies throughout manufacturing and heavy industry.To read this article in full or to leave a comment, please click here

Windows hardware demands are going up for first time in seven years

If you go out shopping for a new PC after the Windows 10 Anniversary Update rolls out this summer, you might notice something we haven’t seen in a long, long time. The basic hardware requirements for Windows 10 are going up—albeit just slightly. This is the first such hardware increase since 2009 when Windows 7 rolled out.Starting with the Anniversary Update, Microsoft’s recommended specifications to hardware vendors—as first noticed by WinBeta and Nokia Power User—will see the RAM requirement increase for 32-bit versions from 1GB to 2GB. It’s a minor change to be sure, but it is the first such change in nearly seven years.To read this article in full or to leave a comment, please click here

New DMA Locker ransomware is ramping up for widespread attacks

The TeslaCrypt creators called it quits recently, but unfortunately for users, there's a new ransomware program that's ready to take its place.Called DMA Locker, this threat first appeared in January, but its encryption implementation was so flawed that it was hard to take it seriously. Researchers had no problem developing a file recovery tool for the first two versions.However, its authors have recently fixed all issues and malware researchers believe that with the newly released version 4, DMA Locker has reached maturity and might be the next thing to hit users in widespread attacks.To read this article in full or to leave a comment, please click here

New DMA Locker ransomware is ramping up for widespread attacks

The TeslaCrypt creators called it quits recently, but unfortunately for users, there's a new ransomware program that's ready to take its place.Called DMA Locker, this threat first appeared in January, but its encryption implementation was so flawed that it was hard to take it seriously. Researchers had no problem developing a file recovery tool for the first two versions.However, its authors have recently fixed all issues and malware researchers believe that with the newly released version 4, DMA Locker has reached maturity and might be the next thing to hit users in widespread attacks.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Attacking overconsumption of cloud services

In the early 2000's when the IT world was in the throes of ERP, CRM, SFA and ecommerce, IT infrastructure was invariably designed to support the absolute worst-case scenario. I quickly learned there were two options when launching any self-serve solution: it either flat-lines or takes off like a rocket—there is no in-between. The capacity planning challenge drove the development of grid computing, then virtualization, and finally cloud computing. Although with cloud we now have a way to rapidly scale up to meet increasing demand, it seems we have forgotten scaling down to conserve resources is equally important. Instead of provisioning “just in case” our worst fears came true, I find repeated examples where cloud is provisioned “just because.”To read this article in full or to leave a comment, please click here

Can Enterprise Workloads Run on Bare-Metal Servers?

One of my readers left a comment on my “optimize your data center by virtualizing the serversblog post saying (approximately):

Seems like LinkedIn did it without virtualization :) Can enterprises achieve this to some extent?

Assuming you want to replace physical servers with one or two CPU cores and 4GB of memory with modern servers having dozens of cores and hundreds of GB of memory the short answer is: not for a long time.

Read more ...

Why Bloomberg chose Vidyo to improve its video communications platform

Earlier this year, Vidyo announced that Bloomberg selected it to provide the enabling technology for Nexi, Bloomberg’s new global communications platform that enables the company’s employees to connect over video with each other and the rest of the world. So, I decided to dig a bit deeper into Bloomberg’s decision to use Vidyo and talked with the man responsible for the integration: Jeff Fairbanks, Global Head of AV and Media Technology, Technical Operations at Bloomberg.  I asked Fairbanks if he could describe Bloomberg’s use of video and provide some historical context for why the technology is so important today.To read this article in full or to leave a comment, please click here

Security training programs don’t do enough to mitigate insider risk

Employee-related security risks top the list of concerns for security professionals, but organizations aren't doing enough to prevent negligent employee behavior, according to a new study.Last month, security research firm Ponemon Institute, sponsored by Experian Data Breach Resolution, surveyed 601 individuals at companies with a data protection and privacy training program on the issue of negligent and malicious employee behaviors for the Managing Insider Risk through Training & Culture report.To read this article in full or to leave a comment, please click here

Security training programs don’t do enough to mitigate insider risk

Employee-related security risks top the list of concerns for security professionals, but organizations aren't doing enough to prevent negligent employee behavior, according to a new study.Last month, security research firm Ponemon Institute, sponsored by Experian Data Breach Resolution, surveyed 601 individuals at companies with a data protection and privacy training program on the issue of negligent and malicious employee behaviors for the Managing Insider Risk through Training & Culture report.To read this article in full or to leave a comment, please click here

Google and Oracle’s Android copyright fight is up to a jury now

Oracle and Google’s fierce court fight over the code inside Android went to a jury on Monday after closing arguments that sharply differed on the most basic issues. The federal jury in San Francisco is now deciding whether Google’s use of copyrighted Java code constitutes fair use, an exemption that would free the company from having to pay Oracle damages. At issue is "declaring code" that's part of 37 Java APIs Google used. Google says it simply used selected parts of Java to create something new in the form of Android.To read this article in full or to leave a comment, please click here

How to escape that forced Windows 10 upgrade you mistakenly agreed to

On Monday, hordes of angry Windows users pelted Microsoft with complaints about being lured into upgrading their PCs over the weekend. For months, Microsoft has been urging users running Windows 7 and Windows 8.1 to upgrade to Windows 10 before the free offer expires on July 29. But the series of dialog boxes and other messages that Microsoft has sent users have become increasingly deceptive, burying the opt-out links amid text that appears to commit users to the upgrade.Normally, closing the dialog box by clicking the red box in the upper righthand corner automatically opted out. Over the weekend, clicking that red box started opting users in to the upgrade.To read this article in full or to leave a comment, please click here

How IoT will change the job market

The Internet of Things (IoT) is poised to bring millions of devices online, and as many as a quarter million unique IoT applications will be developed by the year 2020. That means opportunities for skilled developers and technologists will abound. However, there are other, subtler ways the IoT will affect the job market."We're seeing tech companies around the globe getting organized and creating IoT strategies, but where they're struggling is they don't have the processes and talent in-house to make these things happen," says Ryan Johnson, categories director for global freelance marketplace Upwork. By tracking data from Upwork's database, Johnson and his team have identified major technology skills companies need to drive a successful IoT strategy.To read this article in full or to leave a comment, please click here

Lawsuit seeks the secrets behind the H-1B lottery

Two business immigration groups have filed a lawsuit seeking information about how the H-1B visa distribution system -- including the visa lottery -- works. It alleges that the U.S. has no right to keep most of the records secret.It is not surprising that the H-1B distribution system is coming under scrutiny in a lawsuit. The U.S. Citizenship and Immigration Service (USCIS) this year received 236,000 H-1B visa petitions for the 85,000 visas allowed under the current cap. The agency distributes visas each year via a lottery. The odds -- roughly one-in-three -- create a lot of frustration for applicants.To read this article in full or to leave a comment, please click here

How to avoid phishing attacks

Keep the network out of reach of criminalsImage by Susana FernandezAccording to the Verizon data breach investigation report published last month, phishing remains a major data breach weapon of choice. Trend Micro added that ransomware is expected to be one of the biggest threats in 2016 and that a single ransom demand will go much higher, reaching seven figures.To read this article in full or to leave a comment, please click here