The Week in Internet News: The FBI Has Fewer Unopened Encrypted Devices Than Reported

Going dark with encryption: The U.S. FBI, for years now, has complained about its inability to access encrypted information held on the smartphones and other devices owned by criminal suspects. But the agency may have been overstating this so-called “going dark” problem, the Washington Post reported this week. A programming error at the FBI led the agency to report that it has seized about 7,800 mobile devices that it cannot open, but the actual number may be less than 2,000, the story says.

AI as Big Brother: Artificial intelligence is being used to track down criminals by combing through data faster than humans can, reports The Telegraph. The story features AI startup Senzing, an IBM spinoff. Meanwhile, the government of China is increasingly using AI to assist its Great Firewall program, says Internet of Business.

A bad year for security: This year is shaping up to be a terrible year for cybersecurity, due in part to poor Internet of Things security, reports Security Boulevard. In addition to the IoT concerns, 85 percent security executives surveyed worry their countries will experience a crucial infrastructure attack in the next five years.

Banking on blockchain and AI: Banks’ use of blockchain, AI, Continue reading

We’ve Added a CCIE Security v5 Technology Course to Our Video Library!

Check out our latest edition to the INE Library – CCIE Security v5 Technologies: IKEv1 IPsec VPN. This is the latest installment of our CCIE Security v5 technologies series, and focuses on Internet Key Exchange version 1 (IKEv1), Internet Protocol Security (IPsec) and related topics.

 


About this Course:

This course is taught by Piotr Kaluzny and is 2 hours and 27 minutes long. This course is part of a thirty video series covering the CCIE Security v5 Blueprint.


What You’ll Learn:

The course starts with a discussion of basic VPN concepts, followed by a detailed overview of the protocols and hands-on demonstrations. This course also serves as an introduction to more advanced VPN technologies, such as DMVPN or GETVPN.

You can view this course by visiting our streaming site or by purchasing the course at ine.com.

Copying and renaming files on Linux

Linux users have for many decades been using simple cp and mv commands to copy and rename files. These commands are some of the first that most of us learned and are used every day by possibly millions of people. But there are other techniques, handy variations, and another command for renaming files that offers some unique options.First, let’s think about why might you want to copy a file. You might need the same file in another location or you might want a copy because you’re going to edit the file and want to be sure you have a handy backup just in case you need to revert to the original file. The obvious way to do that is to use a command like “cp myfile myfile-orig”.To read this article in full, please click here

IDG Contributor Network: The evolution of storage from on-premises to cloud

Anyone that has kept up with this column knows I tend to focus on one storage architecture more than any other – the hybrid-cloud storage architecture. That’s because I truly believe in its ability to meet the challenges of today’s IT storage – ever-expanding data, multiple sites, a need for flexibility and scale, while simultaneously meeting specific performance demands. For this month’s column, I thought we would take a look at how we got to this point and see if this evolution informs where we might go in the near future.Early days – pre-NAS The very earliest business storage systems were designed for a world long-gone. One in which a business would be expected to manage maybe thousands of files. Even the largest enterprise would have a storage system to support hundreds of concurrent users, no more. These legacy systems had regularly scheduled down time for maintenance, but it was not unusual to not have access for unscheduled reasons.To read this article in full, please click here

IDG Contributor Network: The evolution of storage from on-premise to cloud

Anyone that has kept up with this column knows I tend to focus on one storage architecture more than any other – the hybrid-cloud storage architecture. That’s because I truly believe in its ability to meet the challenges of today’s IT storage – ever-expanding data, multiple sites, a need for flexibility and scale, while simultaneously meeting specific performance demands. For this month’s column, I thought we would take a look at how we got to this point and see if this evolution informs where we might go in the near future.Early days – pre-NAS The very earliest business storage systems were designed for a world long-gone. One in which a business would be expected to manage maybe thousands of files. Even the largest enterprise would have a storage system to support hundreds of concurrent users, no more. These legacy systems had regularly scheduled down time for maintenance, but it was not unusual to not have access for unscheduled reasons.To read this article in full, please click here

Building IoT-ready networks must become a priority

The Internet of Things (IoT) era has arrived, and over the next few years, billions of devices will be connected to company networks. How many? ZK Research has forecast that by 2022, there will be 80 billion connected devices. (Note: I am an employee of ZK Research.) ZK Research Given many network managers struggle running today's networks, adding orders of magnitude more devices certainly won’t make life better. Even if it seems IoT may be a few years off, it’s critical that network professionals start prepping their network now.To read this article in full, please click here

Building IoT-ready networks must become a priority

The Internet of Things (IoT) era has arrived, and over the next few years, billions of devices will be connected to company networks. How many? ZK Research has forecast that by 2022, there will be 80 billion connected devices. (Note: I am an employee of ZK Research.) ZK Research Given many network managers struggle running today's networks, adding orders of magnitude more devices certainly won’t make life better. Even if it seems IoT may be a few years off, it’s critical that network professionals start prepping their network now.To read this article in full, please click here

Announcing DockerCon 2018 Session: Cool Hacks

One of the most anticipated sessions at DockerCon is Cool Hacks, where we showcase a few members of the Docker community pushing the envelope on what you can achieve with Docker, in a demo heavy session, showing trends of what innovators are building on top of the Docker platform. This year, we’ll talk about Space, AI and Serverless!

Past Cool Hacks have gone to be widely used: last year Marcos Nils and Jonathan Leibiusky showed Play with Docker, a Docker playground that you can run in your browser that is now used by tens of thousands of developers and system administrators monthly to learn the basics on Docker and was applied to learning Kubernetes with Play with Kubernetes; And Alex Ellis demoed a FaaS, a portable serverless platform running on top of Swarm, that grew into the OpenFaaS project, one of the 12 installable serverless platforms mentioned in the Cloud Native Foundation Serverless Working Group serverless landscape.

This post should whet your appetite for what to expect in Dockercon 2018 Cool Hacks session.

Docker for Space, software devops in a hardware world, and how we build software to hit an asteroid

Christopher Heistand, Flight Software Lead at Johns Hopkins University Continue reading

Upcoming Webinars: June 2018 and Beyond

Wow. Where did the spring 2018 go? It’s almost June… and time for a refreshed list of upcoming webinars:

Read more ...