Archive

Category Archives for "Networking"

5G, Arctic gold rush excite global tech forum attendees

Oulu, Finland -- The 24th Global Forum, an annual policy and strategy conference for technology leaders, was held this week in Oulu, a Nordic university town and research city about 100 miles from the Arctic Circle. Juha sipila Opened by Juha Sipilä, Finland’s current prime minister and a telecommunications engineer by training, the conference theme was “Digitalization: From Disruption to Sustainability.”+ FROM LAST YEAR'S CONFERENCE:Global Forum: Innovation creates opportunity, causes disruption +To read this article in full or to leave a comment, please click here

EMV sets the stage for a better payment future

Yesterday was the deadline. Finally, the United States is switching from the old-fashioned swiping method for credit card transactions to the more secure chip-based system scheme dubbed EMV (for Europay, MasterCard, and Visa, which together originated the technology).The chip is harder to counterfeit, and unlike magnetic stripes, it can't be easily read and duplicated, which is what credit-card counterfeiters have long done. In other countries, the chip is coupled with a PIN, so if someone steals the card, they can't use it unless they also know your PIN -- a form of second-factor authentication U.S. debit cards have long used, but not U.S. credit cards. However, U.S. banks are not requiring the use of PINs with chip cards; the old-fashioned, security-irrelevant signature will still be used here.To read this article in full or to leave a comment, please click here

10 gloriously excessive PC cooling setups

The start of something gloriousImage by SWNS TVThere’s a common refrain in some corners of the PC enthusiast community: “May our frame rates be high and our temperatures low.” More than a mere utterance, it’s a simple, straightforward embrace of the very best that the PC has to offer. There’s a lot of power in those words—and some people truly take them to heart.To read this article in full or to leave a comment, please click here

Risky Business #385 — Richard Bejtlich talks USA/China espionage agreement

******LANGUAGE WARNING: The f-bomb features, unbleeped, once in this week's show. Just a note for those of you with the kids in the car.

On this week's show we're chatting with FireEye's chief security strategist Richard Bejtlich about this new agreement between China and the USA. The two countries have apparently agreed that they won't hack each other with the aim of stealing IP anymore. Questions to Richard include: Are they kidding? And: How did they announce this with a straight face?

read more

Breach at Experian may have exposed data on 15 million consumers linked to T-Mobile

A data breach at credit bureau Experian may have exposed data from T-Mobile USA on about 15 million U.S. consumers.The data includes names, birth dates, addresses and Social Security numbers or other forms of identification like drivers' license numbers, the companies said Thursday. The people affected may not be current T-Mobile subscribers but applied for T-Mobile postpaid services or device financing from Sept. 1, 2013 to Sept. 16, 2015.There's no evidence so far that the data has been used inappropriately, Experian said in a press release. And the company said its consumer credit database was not affected. But the breach is the latest embarrassing security event concerning Experian, a widely used credit-information provider whose services are sometimes offered free after breaches at other companies make consumers nervous about their credit records.To read this article in full or to leave a comment, please click here

Breach at Experian may have exposed data on 15 million consumers linked to T-Mobile

A data breach at credit bureau Experian may have exposed data from T-Mobile USA on about 15 million U.S. consumers.The data includes names, birth dates, addresses and Social Security numbers or other forms of identification like drivers' license numbers, the companies said Thursday. The people affected may not be current T-Mobile subscribers but applied for T-Mobile postpaid services or device financing from Sept. 1, 2013 to Sept. 16, 2015.There's no evidence so far that the data has been used inappropriately, Experian said in a press release. And the company said its consumer credit database was not affected. But the breach is the latest embarrassing security event concerning Experian, a widely used credit-information provider whose services are sometimes offered free after breaches at other companies make consumers nervous about their credit records.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Fiber map sheds light on infrastructure trends and weaknesses

If you've ever wondered just where the fiber conduits that carry our Internet traffic run, wonder no more. Researchers have created a map.Four years in the making, the map, sourced in part from public records, shows the long-haul fiber that carries Internet data around the country. Additionally, locations where multiple cables connect are shown.This kind of map has never existed before.Internet infrastructure Not much is known about "today's physical Internet infrastructure," the researchers say.So they delved in and, through a collection of Tier-1 ISP and cable company maps combined with public records, started to construct a map of the long-haul fiber network (PDF).To read this article in full or to leave a comment, please click here

IDG Contributor Network: Fiber map sheds light on infrastructure trends and weaknesses

If you've ever wondered just where the fiber conduits that carry our Internet traffic run, wonder no more. Researchers have created a map.Four years in the making, the map, sourced in part from public records, shows the long-haul fiber that carries Internet data around the country. Additionally, locations where multiple cables connect are shown.This kind of map has never existed before.Internet infrastructure Not much is known about "today's physical Internet infrastructure," the researchers say.So they delved in and, through a collection of Tier-1 ISP and cable company maps combined with public records, started to construct a map of the long-haul fiber network (PDF).To read this article in full or to leave a comment, please click here

Looking back 30 years as a sysadmin

Looking back after spending more than 30 years as a Unix systems administrator, I have to say that's it's been quite a ride.It certainly wasn't 30+ years of doing the same thing. Instead, the technology and the job have gone through incredible changes along the way. There were dramatic improvements in the hardware that I managed and always plenty of new tools to learn and use.[See also: 18 cardinal rules of systems administration ]Over the years, I went from reveling in how much work I could get done on the command line to grappling with some big issues -- troubleshooting some very complicated problems and figuring out how to best protect my employers' information assets. Along the way, I worked with some amazing individuals, got laid off (once), and learned a lot about what works and doesn't work both from a technical and a career perspective.To read this article in full or to leave a comment, please click here

Looking back 30 years as a sysadmin

Looking back after spending more than 30 years as a Unix systems administrator, I have to say that's it's been quite a ride.It certainly wasn't 30+ years of doing the same thing. Instead, the technology and the job have gone through incredible changes along the way. There were dramatic improvements in the hardware that I managed and always plenty of new tools to learn and use.[See also: 18 cardinal rules of systems administration ]Over the years, I went from reveling in how much work I could get done on the command line to grappling with some big issues -- troubleshooting some very complicated problems and figuring out how to best protect my employers' information assets. Along the way, I worked with some amazing individuals, got laid off (once), and learned a lot about what works and doesn't work both from a technical and a career perspective.To read this article in full or to leave a comment, please click here