Archive

Category Archives for "Networking"

6 cloud services for growing your small business

Most startups don’t have the budget, or the need, for enterprise software – or an elaborate website. But as your business grows, adding products or services, as well as customers and employees, it makes sense to invest in technology to help manage that growth. Does that mean you need to invest in an ERP or supply chain management system? Probably not. At least not right away. But these six cloud services, all targeted at SMBs, can make scaling your small ecommerce or bricks-and-mortar business a lot easier.[ Related: 7 ways small businesses can leverage customer data ]To read this article in full or to leave a comment, please click here

Global construction company uses analytics to make pricing local

Dayton Superior is a global B2B company that has turned to analytics and optimization to align its prices with local markets.You may not be familiar with Dayton Superior, but you know its work. Headquartered in Miamisburg, Ohio, the 115-year-old global nonresidential concrete construction company has supplied the concrete and other materials for bridges, canals, buildings and stadiums around the world, including the Panama Canal, new World Trade Center Towers and Trump Ocean Club.MORE ON NETWORK WORLD: 15 big data and analytics companies to watch "We're very much involved in all the big, cool buildings going up," says Dayton Superior CEO James McRickard, noting that the company has been heavily involved in the Hudson Yards project on Manhattan's West Side — a 26-to-28 acre mixed-use real estate development over the West Side Rail Yard that will consist of 16 skyscrapers, a school and more than 14 acres of public open space. "We make the stuff that holds it all together."To read this article in full or to leave a comment, please click here

BlackBerry 10 devices are probably dead

While the BlackBerry 10 operating system will live on for at least a couple more years, we’ve likely seen the last of its hardware.Speaking to Gulf News and The National—two English-language newspapers published in United Arab Emirates—BlackBerry CEO and Executive Chairman John Chen said the company has stopped producing BlackBerry 10 smartphones. The company is now focusing on its Android phones, with the goal of being the “most secure Android smartphone for the enterprise,” Chen told Gulf News.To read this article in full or to leave a comment, please click here

The Design Mindset (5)

So far, in our investigation of the design mindset, we’ve—

We also considered the problem of interaction surfaces in some detail along the way. This week I want to wrap this little series up by considering the final step in design, act. Yes, you finally get to actually buy some stuff, rack it up, cable it, and then get to the fine joys of configuring it all up to see if it works. But before you do… A couple of points to consider.

It’s important, when acting, to do more than just, well, act. It’s right at this point that it’s important to be metacongnitive—to think about what we’re thinking about. Or, perhaps, to consider the process of what we’re doing as much as actually doing it. To give you two specific instances…

ooda-complexityFirst, when you’re out there Continue reading

How to get Bash running on Windows

Unix command line users around the world rejoiced when Microsoft announced recently it would be bringing the popular Bash shell to Windows 10 with a forthcoming update. Last Wednesday, the company released a beta build of its operating system that finally had support for the new functionality.To get it working, users have to jump through a few hoops. First, the system is only available right now for users who have build 14316 of Windows 10. To get it, a PC has to be a part of the Windows Insider Program's Fast ring. After installing the beta, users have to toggle Developer Mode on in Settings > Updates and Security > For Developers. From there, they have to open up another settings pane, check the "Windows Subsystem for Linux (Beta)," restart their computer, and open a DOS command prompt and run the bash command.To read this article in full or to leave a comment, please click here

Microsoft offers insight into upcoming Windows 10 features

The new features for Windows 10 keep on coming, and it can be hard to keep track of them all, especially for enterprises that want to decide whether to allow the update that installs these new features on their PCs.Credit Microsoft for keeping people well-informed as to what is coming because between all the preview builds of Windows 10 and individual feature additions, it can get really confusing. So, the company has published a roadmap of upcoming features for Windows 10.The list is broken down by Recently Available, In Public Preview and In Development. Recently Available and In Public Preview are features that users have access to through the Production ring or the Insider Program, respectively.To read this article in full or to leave a comment, please click here

Experts crack Petya ransomware, enable hard drive decryption for free

Security experts have devised a method that allows users to recover data from computers infected with the Petya ransomware program without paying money to cybercriminals.Petya appeared on researchers' radar last month when criminals distributed it to companies through spam emails that masqueraded as job applications. It stood out from other file-encrypting ransomware programs because it overwrites a hard disk drive's master boot record (MBR), leaving infected computers unable to boot into the operating system.The program replaces the drive's legitimate MBR code, which normally starts the operating system, with code that encrypts the master file table (MFT) and shows a ransom note. The MFT is a special file on NTFS volumes that contains information about all other files: their name, size and mapping to hard disk sectors.To read this article in full or to leave a comment, please click here

Experts crack Petya ransomware, enable hard drive decryption for free

Security experts have devised a method that allows users to recover data from computers infected with the Petya ransomware program without paying money to cybercriminals.Petya appeared on researchers' radar last month when criminals distributed it to companies through spam emails that masqueraded as job applications. It stood out from other file-encrypting ransomware programs because it overwrites a hard disk drive's master boot record (MBR), leaving infected computers unable to boot into the operating system.The program replaces the drive's legitimate MBR code, which normally starts the operating system, with code that encrypts the master file table (MFT) and shows a ransom note. The MFT is a special file on NTFS volumes that contains information about all other files: their name, size and mapping to hard disk sectors.To read this article in full or to leave a comment, please click here

NANOG 67 Social Information

 

Wednesday, June 15, 2016

Sponsored by: EdgeConneX

Time: 6:30pm - 10:00pm

Location: Howl at the Moon

Address: 26 West Hubbard Street Chicago, IL 60654

Transportation: Sponsor to provide motor coach transportation to and from the venue.  Meet in Autolobby (B2 Level). 

 **NANOG Badge required for entry**

  

IDG Contributor Network: 7 potential security concerns for wearables

Wearables are rapidly invading the workplace in much the same way that smartphones did. Fitness trackers, smartwatches, head-mounted displays and other new form factors are beginning to capture the public imagination. Sales of wearable electronic devices topped 232 million in 2015, and Gartner forecasts they’ll rise 18.4% this year, when another 274.6 million devices are sold.These wearable devices represent some appealing opportunities for businesses to increase efficiency and gather data, but in the rush to win market share, security concerns are taking a backseat for many manufacturers and app developers. The potential ramifications of unchecked wearable device usage within the enterprise are alarming.To read this article in full or to leave a comment, please click here

Embedded malware shipped on surveillance system sold via Amazon

There’s nothing particularly new about new products being shipped with malware, but if you are in the market for surveillance cameras and are looking for a good deal, then a security researcher warned that even products sold on Amazon come with embedded malware.Security researcher Mike Olsen found a decent deal on an outdoor surveillance CCTV setup, specifically six Sony HD IP cameras and recording equipment which are being sold on Amazon by a seller with “great ratings.”To read this article in full or to leave a comment, please click here

Embedded malware shipped on surveillance system sold via Amazon

There’s nothing particularly new about new products being shipped with malware, but if you are in the market for surveillance cameras and are looking for a good deal, then a security researcher warned that even products sold on Amazon come with embedded malware.Security researcher Mike Olsen found a decent deal on an outdoor surveillance CCTV setup, specifically six Sony HD IP cameras and recording equipment which are being sold on Amazon by a seller with “great ratings.”To read this article in full or to leave a comment, please click here

Welcome to NANOG 67!

 

EdgeConneX would like to welcome our fellow NANOG attendees to Chicago, IL the ‘Windy City’ and host city for the NANOG’s 67th meeting taking place June 13-15 2016.

We are excited to be your spring meeting host and we look forward to offering you an experience that you will never forget.  As avid advocates of the NANOG mission and vision, we are honored to once again bring together this rich community of the world’s leading network operations experts.  From networking, to educational sessions, panel discussions, presentations, and debates, NANOG 67 is not to be missed. 

The ‘Windy City’ is the third most populous city in the United States, with nearly 10 million people in the metro area.  Located off the shores of Lake Michigan, Chicago has a rich history and is famous for outdoor public art and entertainment, Wrigley Field, Da Bears, the rock band Chicago and for being a major world financial center to name a few.  We hope that you will all join us for an eventful evening at Howl at the Moon, where EdgeConneX will be holding the social on Wednesday, June 15, from 6:30 to 10:30pm.  We are looking forward to Continue reading

IDG Contributor Network: Wi-Fi-based positioning improves access point security

Imagine if your router could detect a user’s location to within a few inches? For one thing, hotspot password protection becomes redundant because geographic authentication takes over—the router can be configured to only allow access from within a location, an apartment, say. In-café users could be allowed access without passwords, yet freeloaders on the street get blocked.Researchers think they’ve worked out how to do it.The system “locates users by calculating the ‘time-of-flight’ that it takes for data to travel from the user to an access point,” says Adam Conner-Simons in a recent MIT News article. And it does it with a single access point. That’s unlike other setups that require four or five access points for triangulation-like measuring. One access point determining a user’s position means costs should be lower, and individuals or small businesses can take advantage of the tech.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Wi-Fi-based positioning improves access point security

Imagine if your router could detect a user’s location to within a few inches? For one thing, hotspot password protection becomes redundant because geographic authentication takes over—the router can be configured to only allow access from within a location, an apartment, say. In-café users could be allowed access without passwords, yet freeloaders on the street get blocked.Researchers think they’ve worked out how to do it.The system “locates users by calculating the ‘time-of-flight’ that it takes for data to travel from the user to an access point,” says Adam Conner-Simons in a recent MIT News article. And it does it with a single access point. That’s unlike other setups that require four or five access points for triangulation-like measuring. One access point determining a user’s position means costs should be lower, and individuals or small businesses can take advantage of the tech.To read this article in full or to leave a comment, please click here

Consumers want more value from home IoT products

U.S. consumers are slow to embrace home-based Internet of Things products, with many wary of their cost and usefulness, according to a new survey.Many consumers are skeptical about the value proposition behind home IoT products, according to the survey from market research firm IDC.Reliability was the top concern among those people who expressed interested in home IoT devices. On a one to 10 rating scale, reliability rated nearly a nine when people were asked what home IoT issues needed to improve before they would purchase a system.Following close behind were concerns about cost, with equipment costs, ongoing costs, installation costs, overall value, all scoring above 8.75. Ease of use and security or privacy concerns were also major concerns.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Sysdig and Mesosphere partner to monitor all of those containers

A new partnership being announced today sees Sysdig and Mesosphere getting cozy to enable a more consistent way of developing and delivering applications.These are two interesting vendors in different spaces. Sysdig calls itself a "container visibility company." Essentially what that means is that it offers a container-specific monitoring solution. One can think of it like New Relic and Boundary but with containers as a primary focus. Mesosphere, on the other hand, is the company that commercializes the Mesos open-source project to help scale and automate applications. Mesosphere offers the data center operating system (DCOS), which delivers a simpler administration model for data center operators.To read this article in full or to leave a comment, please click here