Archive

Category Archives for "Networking"

What is blockchain and how does it work?

Blockchain technology backs up Bitcoin to this day, but there’s been a recent groundswell of interest from a variety of industries in making distributed ledger technology work.A blockchain is the structure of data that represents a financial ledger entry, or a record of a transaction. Each transaction is digitally signed to ensure its authenticity and that no one tampers with it, so the ledger itself and the existing transactions within it are assumed to be of high integrity.The real magic comes, however, from these digital ledger entries being distributed among a deployment or infrastructure. These additional nodes and layers in the infrastructure serve the purpose of providing a consensus about the state of a transaction at any given second; they all have copies of the existing authenticated ledger distributed amongst them.To read this article in full or to leave a comment, please click here

12 apps Windows power users must have

Windows power users, ftw!Are you a Windows power user?You know, the guy who everyone approaches when they’re having trouble with their computer. The guy who knows all the shortcuts, tricks and tips for just about any app or program on said computer. The guy who has an app for something most people didn’t even know you could do, let alone have an app for.To read this article in full or to leave a comment, please click here

Barcelona faces the challenge to make its smart city truly smart

Just about every major city wants to be called a smart city, it seems.Take one example: Barcelona made a big splash to be considered a smart city three years ago. Since then, it has installed noise and air quality sensors along a major thoroughfare. There are also smart streetlights, smart parking and even smartphone apps for tourists to use to navigate the city's sights.At the city's Llevant Beach, there are 22 self-powered lighting units, including six that rely on solar and wind power. The wind-powered units can function when wind speed is relatively slow, storing up enough energy to operate as long as six days without pulling electricity from the grid.To read this article in full or to leave a comment, please click here

Optional Windows update aims to protect Microsoft wireless mice against hijacking

Alongside its batch of mandatory security patches released Tuesday, Microsoft also issued an optional update aimed at protecting Windows computers against an attack that could hijack wireless mice to execute malicious commands.The attack, dubbed MouseJack, affects wireless mice and keyboards from many manufacturers, including Microsoft. It was discovered and presented earlier this year by security researchers from IoT security firm Bastille Networks.MouseJack exploits several vulnerabilities in the communications protocols between the USB dongles plugged into computers and the wireless mice and keyboards that are paired with them. These flaws allow attackers to spoof a wireless mouse from up to 100 meters away and send rogue keystrokes instead of clicks to a computer.To read this article in full or to leave a comment, please click here

Optional Windows update aims to protect Microsoft wireless mice against hijacking

Alongside its batch of mandatory security patches released Tuesday, Microsoft also issued an optional update aimed at protecting Windows computers against an attack that could hijack wireless mice to execute malicious commands.The attack, dubbed MouseJack, affects wireless mice and keyboards from many manufacturers, including Microsoft. It was discovered and presented earlier this year by security researchers from IoT security firm Bastille Networks.MouseJack exploits several vulnerabilities in the communications protocols between the USB dongles plugged into computers and the wireless mice and keyboards that are paired with them. These flaws allow attackers to spoof a wireless mouse from up to 100 meters away and send rogue keystrokes instead of clicks to a computer.To read this article in full or to leave a comment, please click here

My VMX installation guide

My VMX installation guide - VMX-installguide.pdf I'm currently writing the 2nd Edition of the MX Series book. In this new edition, I wrote a chapter dedicated to VMX. The 2nd edition of the book will be released in few months: stay tuned :) ! I spent...

My VMX installation guide

My VMX installation guide - VMX-installguide.pdf I'm currently writing the 2nd Edition of the MX Series book. In this new edition, I wrote a chapter dedicated to VMX. The 2nd edition of the book will be released in few months: stay tuned :) ! I spent...

My VMX installation guide

My VMX installation guide - VMX-installguide.pdf I'm currently writing the 2nd Edition of the MX Series book. In this new edition, I wrote a chapter dedicated to VMX. The 2nd edition of the book will be released in few months: stay tuned :) ! I spent...

5G wireless slowly, carefully taking shape

5G wireless is coming, but it has a lot of challenges to overcome, and we’re not going to be enjoying its blazing speeds until 2020 at least. But, at cable industry group CableLabs’ InformED Wireless event on Wednesday in New York, several experts helped provide new hints about the shape of the technology to come.One of the biggest hurdles, it seems, is physics – 5G is going to be a millimeter-wave technology, operating at a much higher frequency than existing Wi-Fi. That’s great if the goal is to move a lot of information quickly – 5G speeds could top 6Gbps in the field – but it raises the issue of range.To read this article in full or to leave a comment, please click here

5G wireless slowly, carefully taking shape

5G wireless is coming, but it has a lot of challenges to overcome, and we’re not going to be enjoying its blazing speeds until 2020 at least. But, at cable industry group CableLabs’ InformED Wireless event on Wednesday in New York, several experts helped provide new hints about the shape of the technology to come.One of the biggest hurdles, it seems, is physics – 5G is going to be a millimeter-wave technology, operating at a much higher frequency than existing Wi-Fi. That’s great if the goal is to move a lot of information quickly – 5G speeds could top 6Gbps in the field – but it raises the issue of range.To read this article in full or to leave a comment, please click here

Will OpenStack Stay Disreputable?

“Keeping It Dirty”

I’ve lived in Durham, North Carolina since 1999 — I love it here, and I’ve finally found home. It’s been recognized as Tastiest Town, a Different Kind of Silicon Valley and one of the Best Places to Live. But it wasn’t always like that. Durham rose up from the ashes of failed tobacco and textile industries to a modern hub of medicine, research, and high-tech firms. Despite Durham’s rise over the past 10 years, non-Durhamites around the Research Triangle remember the Durham of old and are skeptical of it’s newfound success and reputation as a progressive yet gritty town.

Screen Shot 2016-04-13 at 12.04.10 PM

The parallels between the rise of Durham’s revitalization and OpenStack’s popularity are uncanny. You still hear the following comments today:

“Why do you live in Durham, are you crazy?”
“How can you trust OpenStack community developers and run it in production?”

Enterprises continue to be skeptical of OpenStack’s production worthiness, but many companies are betting their businesses on this project. DreamHost, a Cumulus Linux customer, has been running a state-of-the-art OpenStack deployment for over two years. They automate their entire data center with Chef, leveraging Infrastructure as Code principles. Many others use standard DevOps Continue reading

Senators release official draft of federal encryption legislation

The first proposed federal encryption legislation has been released, and had it been established law earlier this year Apple would have had to provide the help the FBI asked for in accessing encrypted data on the iPhone used by a terrorist in San Bernardino.The draft published by Sen. Richard Burr of North Carolina and Sen. Dianne Feinstein of California calls for encryption vendors and others to obey court orders that command them to deliver intelligible versions of encrypted data or to provide technical assistance to make it intelligible.To read this article in full or to leave a comment, please click here

Senators release official draft of federal encryption legislation

The first proposed federal encryption legislation has been released, and had it been established law earlier this year Apple would have had to provide the help the FBI asked for in accessing encrypted data on the iPhone used by a terrorist in San Bernardino.The draft published by Sen. Richard Burr of North Carolina and Sen. Dianne Feinstein of California calls for encryption vendors and others to obey court orders that command them to deliver intelligible versions of encrypted data or to provide technical assistance to make it intelligible.To read this article in full or to leave a comment, please click here

Microsoft is boosting security through hardware in Windows 10 PCs, phones

The burden of Microsoft's efforts to secure Windows 10 is now falling on PC, tablet, and smartphone makers.Microsoft is making a hardware-based security feature called TPM (Trusted Platform Module) 2.0 a minimum requirement on most Windows 10 devices. Starting July 28, the company will require device manufacturers shipping PCs, tablets and smartphones to include TPM 2.0.TPM has been available for years, mostly on business PCs. TPM 2.0 provides a hardware layer to safeguard user data by managing and storing cryptographic keys in a trusted container.The TPM requirement "will be enforced through our Windows Hardware Certification program," Microsoft said in a blog post.To read this article in full or to leave a comment, please click here

Microsoft is boosting security through hardware in Windows 10 PCs, phones

The burden of Microsoft's efforts to secure Windows 10 is now falling on PC, tablet, and smartphone makers. Microsoft is making a hardware-based security feature called TPM (Trusted Platform Module) 2.0 a minimum requirement on most Windows 10 devices. Starting July 28, the company will require device manufacturers shipping PCs, tablets and smartphones to include TPM 2.0. TPM has been available for years, mostly on business PCs. TPM 2.0 provides a hardware layer to safeguard user data by managing and storing cryptographic keys in a trusted container. The TPM requirement "will be enforced through our Windows Hardware Certification program," Microsoft said in a blog post.To read this article in full or to leave a comment, please click here