New products of the week 5.1.17

New products of the weekImage by HPEOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Bluescape visual collaboration softwareImage by bluescapeTo read this article in full or to leave a comment, please click here

New products of the week 5.1.17

New products of the weekImage by HPEOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Bluescape visual collaboration softwareImage by bluescapeTo read this article in full or to leave a comment, please click here

iPhone 8 Rumor Rollup: long live the battery, here come the cases, plus a new concept design

Perhaps new research that found more iPhone buyers opting for legacy models over the iPhone 7 and 7 Plus will give Apple a little nudge to make sure there's really incentive to buy the forthcoming iPhone 8 (or iPhone X) instead of going with the 7 or 7 Plus later this year.Not that Apple necessarily is going to take any cues from research outfits like Consumer Intelligence Research Partners, but anything to ensure that the next flagship iPhones aren't dull is worth at least pointing out...IPHONE 8 BATTERY LIFE Battery life is far from a glamorous topic, but really, what's more important in terms of an iPhone upgrade for most users? As Apple Insider reports, citing the relentless KGI Securities analyst Ming-Chi Kuo, Apple could be planning to use a logic board format that will allow for more space in the iPhone 8 chassis, and that could mean room for a more powerful and longer lasting battery. To read this article in full or to leave a comment, please click here

iPhone 8 Rumor Rollup: long live the battery, here come the cases, plus a new concept design

Perhaps new research that found more iPhone buyers opting for legacy models over the iPhone 7 and 7 Plus will give Apple a little nudge to make sure there's really incentive to buy the forthcoming iPhone 8 (or iPhone X) instead of going with the 7 or 7 Plus later this year.Not that Apple necessarily is going to take any cues from research outfits like Consumer Intelligence Research Partners, but anything to ensure that the next flagship iPhones aren't dull is worth at least pointing out...IPHONE 8 BATTERY LIFE Battery life is far from a glamorous topic, but really, what's more important in terms of an iPhone upgrade for most users? As Apple Insider reports, citing the relentless KGI Securities analyst Ming-Chi Kuo, Apple could be planning to use a logic board format that will allow for more space in the iPhone 8 chassis, and that could mean room for a more powerful and longer lasting battery. To read this article in full or to leave a comment, please click here

Apple fans are described as ‘Sheeple’ by Merriam-Webster dictionary

In an effort to keep up with the times, Merriam-Webster every year adds hundreds of new words to its dictionary. After all, the language we use on a day-to-day basis is always evolving. Just this past February, for example, Merriam-Webster announced that it added more than 1,000 new words to the dictionary, including some newbies from the tech world such as net neutrality, abandonware, binge-watch and photobomb.And just a few days ago, Merriam-Webster added the word Sheeple to its online dictionary, defining it as "people who are docile, compliant, or easily influenced." Or in other words, "people likened to sheep." Wake up!'Sheeple' is in the dictionary now. https://t.co/pbXVADEoBmTo read this article in full or to leave a comment, please click here

Hackers leak 10 new Orange Is the New Black episodes after Netflix fails to pay ransom

On Saturday, the hacking group The Dark Overlord followed through with threats to release 10 of 13 new Orange Is the New Black episodes that it had in its possession after Netflix failed to pay a ransom. The Dark Overlord, or TDO, allegedly has tried to extort money from other big networks as well and used the leak to threaten those networks.TDO tweeted: “Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we’re all going to have. We’re not playing games anymore.” Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we're all going to have. We're not playing any games anymore.To read this article in full or to leave a comment, please click here

Hackers leak 10 new Orange Is the New Black episodes after Netflix fails to pay ransom

On Saturday, the hacking group The Dark Overlord followed through with threats to release 10 of 13 new Orange Is the New Black episodes that it had in its possession after Netflix failed to pay a ransom. The Dark Overlord, or TDO, allegedly has tried to extort money from other big networks as well and used the leak to threaten those networks.TDO tweeted: “Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we’re all going to have. We’re not playing games anymore.” Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we're all going to have. We're not playing any games anymore.To read this article in full or to leave a comment, please click here

Hackers leak 10 new Orange Is the New Black episodes after Netflix failed to pay ransom

On Saturday, the hacking group The Dark Overlord followed through with threats to release 10 of 13 new Orange Is the New Black episodes that it had in its possession after Netflix failed to pay a ransom. The Dark Overlord, or TDO, allegedly has tried to extort money from other big networks as well and used the leak to threaten those networks.TDO tweeted: “Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we’re all going to have. We’re not playing games anymore.” Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we're all going to have. We're not playing any games anymore.To read this article in full or to leave a comment, please click here

Hackers leak 10 new Orange Is the New Black episodes after Netflix failed to pay ransom

On Saturday, the hacking group The Dark Overlord followed through with threats to release 10 of 13 new Orange Is the New Black episodes that it had in its possession after Netflix failed to pay a ransom. The Dark Overlord, or TDO, allegedly has tried to extort money from other big networks as well and used the leak to threaten those networks.TDO tweeted: “Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we’re all going to have. We’re not playing games anymore.” Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we're all going to have. We're not playing any games anymore.To read this article in full or to leave a comment, please click here

Learning Python: Week2 (Printing, Numbers, and Lists) -Part 1

As discussed in last post,  ( https://crazyrouters.wordpress.com/2017/02/25/learning-python-kirk-byers-python-course/  ) , i will be sharing the my learning on weekly basis as course continues. This will not only motivate me but also help others who are in phase of learning python 3. Kirk discussed about the printing ,raw_input,numbers,List and Tuple . Few of my friends asks to […]

Data center network monitoring best practices part 2: Network alerting, a deeper dive

Network monitoring without alerting is like having a clock without any hands. In the previous post, Eric discussed setting up a monitoring strategy, and in it we scraped the surface of network alerting. In this post we dive into alerting more deeply.

Network alerting on relevant data

Alerting comes in many forms. In the previous post, we discussed how metrics can be set with thresholds to create alerts. This is the most basic level of alerting. CPU alerts are set at 90% of utilization. Disk usage alerts are set to 95% of utilization. There are at least two drawbacks with this level of alerting.

First, by alerting on metric thresholds, we limit ourselves to the granularity of the metrics. Consider a scenario where interface statistics are gathered every five minutes. That limits the ability to capture anomalous traffic patterns to a five minute interval, and at the fast pace of modern datacenters, that level of granularity isn’t acceptable. Limiting the alerting ability based on the thresholds.

Secondly, there are many times when alerts from certain metrics don’t create any actionable activities. For example, an alert on CPU utilization may not directly have an impact on traffic. Since switch CPUs should Continue reading

Intel Moves Xeons To The Moore’s Law Leading Edge

In the wake of the Technology and Manufacturing Day event that Intel hosted last month, we were pondering this week about what effect the tick-tock-clock method of advancing chip designs and manufacturing processes might have on the Xeon server chip line from Intel, and we suggested that it might close the gaps between the Core client chips and the Xeons. It turns out that Intel is not only going to close the gaps, but reverse them and put the Xeons on the leading edge.

To be precise, Brian Krzanich, Intel’s chief financial officer, and Robert Swan, the company’s chief financial

Intel Moves Xeons To The Moore’s Law Leading Edge was written by Timothy Prickett Morgan at The Next Platform.

NSA ends surveillance tactic that pulled in citizens’ emails, texts

The U.S. National Security Agency will no longer sift through emails, texts and other internet communications that mention targets of surveillance.The change, which the NSA announced on Friday, stops a controversial tactic that critics said violated U.S. citizens' privacy rights.The practice involved flagging communications where a foreign surveillance target was mentioned, even if that target wasn't involved in the conversation. Friday’s announcement means the NSA will stop collecting this data.“Instead, this surveillance will now be limited to only those communications that are directly ‘to’ or ‘from’ a foreign intelligence target,” the NSA said in a statement.To read this article in full or to leave a comment, please click here

NSA ends surveillance tactic that pulled in citizens’ emails, texts

The U.S. National Security Agency will no longer sift through emails, texts and other internet communications that mention targets of surveillance.The change, which the NSA announced on Friday, stops a controversial tactic that critics said violated U.S. citizens' privacy rights.The practice involved flagging communications where a foreign surveillance target was mentioned, even if that target wasn't involved in the conversation. Friday’s announcement means the NSA will stop collecting this data.“Instead, this surveillance will now be limited to only those communications that are directly ‘to’ or ‘from’ a foreign intelligence target,” the NSA said in a statement.To read this article in full or to leave a comment, please click here

Stealthy Mac malware spies on encrypted browser traffic

A new malware program that targets macOS users is capable of spying on encrypted browser traffic to steal sensitive information.The new program, dubbed OSX/Dok by researchers from Check Point Software Technologies, was distributed via email phishing campaigns to users in Europe.One of the rogue emails was crafted to look as if it was sent by a Swiss government agency warning recipients about apparent errors in their tax returns. The malware was attached to the email as a file called Dokument.zip.What makes OSX/Dok interesting is that it was digitally signed with a valid Apple developer certificate. These certificates are issued by Apple to members of its developer program and are needed to publish applications in the official Mac App Store.To read this article in full or to leave a comment, please click here

Stealthy Mac malware spies on encrypted browser traffic

A new malware program that targets macOS users is capable of spying on encrypted browser traffic to steal sensitive information.The new program, dubbed OSX/Dok by researchers from Check Point Software Technologies, was distributed via email phishing campaigns to users in Europe.One of the rogue emails was crafted to look as if it was sent by a Swiss government agency warning recipients about apparent errors in their tax returns. The malware was attached to the email as a file called Dokument.zip.What makes OSX/Dok interesting is that it was digitally signed with a valid Apple developer certificate. These certificates are issued by Apple to members of its developer program and are needed to publish applications in the official Mac App Store.To read this article in full or to leave a comment, please click here