Archive

Category Archives for "Networking"

New Ninja desktops roar with Intel’s 72-core supercomputing chip

Colfax's new Ninja desktops are anything but invisible; these workstations can roar with the unprecedented computing power of Intel's latest 72-core supercomputing chips.The workstations have the upcoming Xeon Phi chip code-named Knights Landing, which Intel has claimed is its most powerful chip to date. Intel last year said a limited number of workstations with the chip would become available in 2016. Knights Landing wasn't designed with desktops in mind, but for some of the fastest supercomputers in the world. The 72-core chip can be used as a primary CPU, or as a coprocessor to rev up intense computing tasks, much like GPUs.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Almost all of IT budgets will soon be dedicated to cloud, Intel study finds

The cloud is exploding globally, with most of IT spending soon to be allocated to cloud, according to a new Intel report.The technology company predicts that virtually all IT spending (80 percent) will be on cloud in the next 16 months. One reason is that ever-increasing digital activities “are leveraging cloud computing in some way,” the company said in its press release.And it’s happening quickly, according to the survey of 1,200 IT executives in eight countries, which was conducted by market research provider Vanson Bourne on behalf of Intel.To read this article in full or to leave a comment, please click here

AMC drops ‘texting friendly’ theaters idea faster than a box-office flop

That didn’t take long.In an interview published only two days ago by Variety, the head of AMC Entertainment, Adam Aron, suggested that making his company’s theaters more “texting friendly” would be just the ticket to attract more moviegoers, particularly younger ones.As anyone other than Aron should have expected, reaction to the idea was almost universally negative.And so this morning, while many media outlets were just getting around to reporting on Aron’s texting trial balloon, AMC stuck a pin in it via Twitter: “NO TEXTING AT AMC. Won't happen. You spoke. We listened. Quickly, that idea has been sent to the cutting room floor.”To read this article in full or to leave a comment, please click here

Mark Shuttleworth: ‘Ubuntu keeps GNU/Linux relevant’

In my ongoing quest to interview the leadership of every Linux distribution on the planet (see my interviews with the heads of elementary, Fedora and openSUSE) I reached out to the top dog in the Ubuntu world: Mark Shuttleworth.This is not a hard-hitting, no-holds-barred sort of interview. It’s just a casual chat to hear about Ubuntu from the guy that started it and hopefully, in the process, get to know him a little better.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Mainframes: A technological best bet

I’ve seen a number of great technologies come and go. Some are fun for a while, as they are the first to market, such as game systems, entertainment devices and lifestyle products. But without staying ahead of the competition, they soon become irrelevant. Others simply don’t solve a big enough problem to warrant spending money to become an early adopter, such as Google Glass, Amazon’s Fire mobile phone or HD DVD. How do you know when the time is right to invest in new technology? For personal technology, if you’re like me, you’ll forever be an early adopter and likely always be first in line for the next iPhone or Android device—even if the existing one works perfectly fine. But if you’re committing thousands and thousands of dollars of your company’s limited IT resources, how do you know what you’re buying today will be still be the best technology five years from now—or even next year?To read this article in full or to leave a comment, please click here

IDG Contributor Network: Mainframes: A technological best bet

I’ve seen a number of great technologies come and go. Some are fun for a while, as they are the first to market, such as game systems, entertainment devices and lifestyle products. But without staying ahead of the competition, they soon become irrelevant. Others simply don’t solve a big enough problem to warrant spending money to become an early adopter, such as Google Glass, Amazon’s Fire mobile phone or HD DVD. How do you know when the time is right to invest in new technology? For personal technology, if you’re like me, you’ll forever be an early adopter and likely always be first in line for the next iPhone or Android device—even if the existing one works perfectly fine. But if you’re committing thousands and thousands of dollars of your company’s limited IT resources, how do you know what you’re buying today will be still be the best technology five years from now—or even next year?To read this article in full or to leave a comment, please click here

Hybrid GozNym malware targets customers of 24 financial institutions

A group of cybercriminals have combined two powerful malware programs to create a new online banking Trojan that has already stolen millions of dollars from customers of 24 U.S. and Canadian banks.The new threat has been dubbed GozNym by researchers from IBM X-Force because it combines the stealthy Nymaim malware and the Gozi banking Trojan.The new computer Trojan targets 22 websites that belong to banks, credit unions and e-commerce platforms based in the U.S., and two that belong to financial institutions from Canada. Business banking services appear to be a top target for GozNym's creators, according to the IBM researchers.Nymaim is what researchers call a dropper. Its purpose is to download and run other malware programs on infected computers. It is usually distributed through Web-based exploits launched from compromised websites.To read this article in full or to leave a comment, please click here

Hybrid GozNym malware targets customers of 24 financial institutions

A group of cybercriminals have combined two powerful malware programs to create a new online banking Trojan that has already stolen millions of dollars from customers of 24 U.S. and Canadian banks.The new threat has been dubbed GozNym by researchers from IBM X-Force because it combines the stealthy Nymaim malware and the Gozi banking Trojan.The new computer Trojan targets 22 websites that belong to banks, credit unions and e-commerce platforms based in the U.S., and two that belong to financial institutions from Canada. Business banking services appear to be a top target for GozNym's creators, according to the IBM researchers.Nymaim is what researchers call a dropper. Its purpose is to download and run other malware programs on infected computers. It is usually distributed through Web-based exploits launched from compromised websites.To read this article in full or to leave a comment, please click here

8 cyber security technologies DHS is trying to commercialize

The Department of Homeland Security is publicizing eight new cyber security technologies developed under federal grants that are looking for private businesses to turn them into commercial products.In its fourth “Cyber Security Division Transition to Practice Technology Guide”, DHS outlines the eight technologies that range from malware analysis tools to behavior analysis platforms to randomization software that protects Windows applications.+More on Network World: IRS: Tax deadline looms, scammers get more frantic+To read this article in full or to leave a comment, please click here

8 cyber security technologies DHS is trying to commercialize

The Department of Homeland Security is publicizing eight new cyber security technologies developed under federal grants that are looking for private businesses to turn them into commercial products.In its fourth “Cyber Security Division Transition to Practice Technology Guide”, DHS outlines the eight technologies that range from malware analysis tools to behavior analysis platforms to randomization software that protects Windows applications.+More on Network World: IRS: Tax deadline looms, scammers get more frantic+To read this article in full or to leave a comment, please click here

IDG Contributor Network: 22 new concerns added to Docker security benchmark

Security has, and continues to be, an impediment to container adoption. Whether containers are less or more secure than their virtual machine counterparts is a topic of continued debate.Like any debate, there are merits to arguments on both sides with a bit of FUD interlaced. Many efforts have been undertaken within the container ecosystem to educate adopters and improve their comprehension of available tooling and security postures within platforms and offerings—be that in the form of static analysis (image scanning), runtime vulnerability detection, provenance (image signing), fine-grained authorization, cryptographic verification, etc.The breadth of need for improved security capabilities has provided an opportunity for emerging start-ups to focus specifically on the container security space and others to dedicate their company's mission to securing the Internet. Having spent time with most of the vendors in this space, I'll say that as you might expect, it's a quickly changing landscape. One thing is evident: open source communities and vendors at every layer—from hardware through operating system, container runtime, container image, host-to-cluster orchestrator, PaaS to CaaS—have significantly marshalled forward security-centered improvements in the past year.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 22 new concerns added to Docker security benchmark

Security has, and continues to be, an impediment to container adoption. Whether containers are less or more secure than their virtual machine counterparts is a topic of continued debate.Like any debate, there are merits to arguments on both sides with a bit of FUD interlaced. Many efforts have been undertaken within the container ecosystem to educate adopters and improve their comprehension of available tooling and security postures within platforms and offerings—be that in the form of static analysis (image scanning), runtime vulnerability detection, provenance (image signing), fine-grained authorization, cryptographic verification, etc.The breadth of need for improved security capabilities has provided an opportunity for emerging start-ups to focus specifically on the container security space and others to dedicate their company's mission to securing the Internet. Having spent time with most of the vendors in this space, I'll say that as you might expect, it's a quickly changing landscape. One thing is evident: open source communities and vendors at every layer—from hardware through operating system, container runtime, container image, host-to-cluster orchestrator, PaaS to CaaS—have significantly marshalled forward security-centered improvements in the past year.To read this article in full or to leave a comment, please click here

Google could face EU antitrust charges over Android next week

After a year-long investigation, the European Commission appears ready to accuse Google of abusing its dominant position in the smartphone OS market.It could announce formal antitrust charges as early as next Wednesday, the Financial Times reported Friday.The Commission began its Android investigation on April 15, 2015, the same day that it announced formal antitrust charges against Google in another investigation, accusing the company of favoring its own comparison shopping service over that of rivals.To read this article in full or to leave a comment, please click here