Archive

Category Archives for "Networking"

How to build cybersecurity into outsourcing contracts

Any time a company shares data or provides access to third-parties, it increases its vulnerability to unauthorized access or breach. So in today’s IT environment in which enterprises partner with multiple IT service providers, who in turn may have multiple subcontracters, cyber risks increase exponentially.[ Related: Why CIOs can’t wait to renegotiate their outsourcing contracts ]“Customer data and systems are only as secure as the weakest link in the vendor ecosystem,” says Paul Roy, a partner in the business and technology sourcing practice of Mayer Brown. “The risks for customers are twofold: not only does the customer increase its risk of a data breach, it also increases the risk that it will be in breach of its regulatory or contractual obligations if its vendors fail to comply with such obligations.”To read this article in full or to leave a comment, please click here(Insider Story)

Hands-on with Surface Hub: Microsoft’s huge tablet has some productivity holes

For $21,999, I expected a little more from Microsoft’s new Surface Hub.Don’t get me wrong: the Hub's 84-inch 4K touchscreen, flanked by a pair of eye-height, 1080p cameras, videoconferencing, and full Windows 10 capabilities—all makes for one very impressive package, especially when it dominates one wall of a room. Heck, it practically is the wall. Mark Hachman Microsoft’s Surface Hub is, in a word, enormous.To read this article in full or to leave a comment, please click here

Software-Based Switching Is not SDN

Russ White made an excellent remark while discussing the news that the CloudRouter pushed 650 Gbps through commodity hardware: “If this is software defined networking, then we’ve been doing this since sometime in the 1990’s, perhaps even earlier…

He’s absolutely right – the first routers (like AGS or IGS from Cisco) did all packet forwarding in software, so as I explained during the Introduction to SDN webinar while reaching dozens of gigabits with software-based packet forwarding is exciting, calling it SDN doesn’t make much sense.

Adobe to issue emergency patch for Flash vulnerability

Adobe is working on an emergency patch for its Flash Player after attackers are reportedly exploiting a critical flaw.The vulnerability, CVE-2016-1019, affects Flash Player version 21.0.0.197 on Windows, Mac, Linux and Chrome OS, according to an advisory published on Tuesday.The flaw is being actively exploited on Windows XP and 7 systems running Flash Player versions 20.0.0.306 and earlier."Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system," it said.A patch could be released as soon as Thursday.To read this article in full or to leave a comment, please click here

Adobe to issue emergency patch for Flash vulnerability

Adobe is working on an emergency patch for its Flash Player after attackers are reportedly exploiting a critical flaw.The vulnerability, CVE-2016-1019, affects Flash Player version 21.0.0.197 on Windows, Mac, Linux and Chrome OS, according to an advisory published on Tuesday.The flaw is being actively exploited on Windows XP and 7 systems running Flash Player versions 20.0.0.306 and earlier."Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system," it said.A patch could be released as soon as Thursday.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Ouch, Red Hat gets a slapping. Volkswagen chooses Mirantis for its OpenStack needs

To understand the context here readers need a bit of history. RedHat is, of course, a company that has been wildly successful commercializing open source software (in particular Linux). It is also a big part of the OpenStack open source cloud computing initiative. Mirantis is a company focused solely on helping companies move to OpenStack. These two parties were once upon a time best of friends with Red Hat making a significant investment early in Mirantis' life. And then things soured, to the point where Red Hat started telling customers that it didn't support its own Linux distribution, RHEL, on Mirantis' flavor of OpenStack. There was lots of back and forth, and lots of minutiae around the move, but essentially it indicated, very publicly, that Red Hat and Mirantis' bromance was finished forever.To read this article in full or to leave a comment, please click here

Server software poses soft target for ransomware

An alternate method for infecting computers with ransomware signals a shift in tactics by cybercriminals that could put businesses at greater risk, according to Symantec.A type of ransomware called Samsam has been infecting organizations but is not installed in the usual way."Samsam is another variant in a growing number of variants of ransomware, but what sets it apart from other ransomware is how it reaches its intended targets by way of unpatched server-side software," Symantec wrote.The perpetrators behind Samsam use a legitimate penetration tool called Jexboss to exploit servers running Red Hat's JBoss enterprise application server.To read this article in full or to leave a comment, please click here

Server software poses soft target for ransomware

An alternate method for infecting computers with ransomware signals a shift in tactics by cybercriminals that could put businesses at greater risk, according to Symantec.A type of ransomware called Samsam has been infecting organizations but is not installed in the usual way."Samsam is another variant in a growing number of variants of ransomware, but what sets it apart from other ransomware is how it reaches its intended targets by way of unpatched server-side software," Symantec wrote.The perpetrators behind Samsam use a legitimate penetration tool called Jexboss to exploit servers running Red Hat's JBoss enterprise application server.To read this article in full or to leave a comment, please click here

WhatsApp turns on end-to-end encryption

Facebook-owned WhatsApp has strengthened the encryption of its widely used instant messaging app, a development that in theory makes it harder for law enforcement to gain access to communications.WhatsApp's founders said Tuesday that the application now implements end-to-end encryption, which means only authorized users can decrypt messages."The idea is simple: when you send a message, the only person who can read it is the person or group chat that you send that message to," Jan Koum and Brian Acton wrote in a blog post. "No one can see inside that message. Not cybercriminals. Not hackers. Not oppressive regimes. Not even us."To read this article in full or to leave a comment, please click here

WhatsApp turns on end-to-end encryption

Facebook-owned WhatsApp has strengthened the encryption of its widely used instant messaging app, a development that in theory makes it harder for law enforcement to gain access to communications.WhatsApp's founders said Tuesday that the application now implements end-to-end encryption, which means only authorized users can decrypt messages."The idea is simple: when you send a message, the only person who can read it is the person or group chat that you send that message to," Jan Koum and Brian Acton wrote in a blog post. "No one can see inside that message. Not cybercriminals. Not hackers. Not oppressive regimes. Not even us."To read this article in full or to leave a comment, please click here

Sigfox’s slow but thrifty IoT network is going Down Under

The Sigfox low-power IoT network is due for an expansion that may not be game-changing in practical terms but will certainly look good on a map.Sigfox announced a deal on Tuesday with a partner that will build a network across Australia and New Zealand using the French company's technology. That's a visible win for a vendor competing to connect small Internet of Things devices like sensors and meters around the world.Several vendors and industry groups are pushing technologies for networking small, far-flung objects that may need to run on a single battery for years. These LPWANs (low-power wide-area networks) don't push a lot of data through the air but are more efficient than the cellular infrastructure that talks to smartphones.To read this article in full or to leave a comment, please click here

So, Internet TV streaming is now a thing in hotels?

As a somewhat frequent traveler, I’ve been in enough hotels to realize that entertainment options are not as good as the ones you get at your home. You end up watching the local version of news for whatever city you’re in, or, if you’re lucky, something good is on either HBO or Showtime as you’re drifting off to sleep.If you have to be stuck in your room for a longer period of time, it’s likely that you end up watching Netflix or Amazon Prime streaming on your computer, but you usually need to position the notebook (or tablet if you’re one of THOSE people) near a power source/cord so that the battery doesn’t run out after the third episode of “House of Cards” finishes).To read this article in full or to leave a comment, please click here

Jeff Bezos praises Amazon’s cloud in letter to shareholders

In a letter to shareholders, Amazon.com founder, CEO and Chairman of the board sounds like a proud father talking about the success of the moonshot project that launched the company into being a powerhouse of the cloud computing market.Amazon Web Services is on pace to earn $10 billion in revenue this year, he notes. “AWS is bigger than Amazon.com was at 10 years old, growing at a faster rate,” he adds.+MORE AT NETWORK WORLD: The myth about how Amazon's cloud started that just will not die | Happy 10th birthday AWS +To read this article in full or to leave a comment, please click here

HSRP VRRP GLBP Comparison

HSRP VRRP GLBP Comparison– In this post I am going to cover the similarities and the differences between HSRP VRRP and GLBP protocols. All these technologies provide first hop redundancy for the hosts. I will use the below table for HSRP VRRP GLBP Comparison and the design attributes listed in it. For the more technology comparison tables; please click […]

The post HSRP VRRP GLBP Comparison appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Servers with Nvidia’s Tesla P100 GPU will ship next year

Nvidia's fastest GPU yet, the new Tesla P100, will be available in servers next year, the company said.Dell, Hewlett Packard Enterprise, Cray and IBM will start taking orders for servers with the Tesla P100 in the fourth quarter of this year, Nvidia CEO Jen-Hsun Huang said during a keynote at the GPU Technology Conference in San Jose, California.The servers will start shipping in the first quarter of next year, Huang said Tuesday.The GPU will also ship to companies designing hyperscale servers in-house and then to outsourced manufacturing shops. It will be available for in-house "cloud servers" by the end of the year, Huang said.Nvidia is targeting the GPUs at deep-learning systems, in which algorithms aid in the correlation and classification of data. These systems could help self-driving cars, robots and drones identify objects. The goal is to accelerate the learning time of such systems so the accuracy of results improves over time.To read this article in full or to leave a comment, please click here

Google brings calendar reminders feature to desktop web

Google Calendar users now have the ability to add reminders from their desktop browsers that will follow them around to other Google services, thanks to a feature the company introduced Tuesday.  People can now set reminders in other services like Google Now, Keep and Inbox, and have them show up in their calendar, informing them of what they have to do during the day. Reminders are meant to help people take care of what they need to do, and will follow users around at the top of their calendar until completed. To read this article in full or to leave a comment, please click here