Data Transfers Post-Brexit: Smoothing the Transition

The average internet user consumes vast amounts of data on a daily basis but rarely – unless an avid follower of Max Schrems - thinks about how the data flows or the mechanisms and legal arrangements in place to make it all happen. If companies like Cloudflare are doing their job well behind the scenes, you really shouldn’t have to – it just works, and so you can busy yourself emailing, communicating, transacting and sharing information.

Users benefit enormously from the free movement of data, and it is a highly regarded feature of living and doing business within the European Union. With the appropriate legal protections in place, scientific and societal benefits also flow along with the data, and the quality of our lives is improved immensely.

And the internet is an increasingly busy place:

Image courtesy of @LoriLewis and @OfficiallyChadd

Let it flow, let it flow...

The European Commission reported in a communication earlier this year that the European Data Economy – i.e the marketplace where digital data is exchanged as products or services derived from raw data – was estimated at EUR 272 billion in 2015, and that the value is expected to increase to EUR Continue reading

HP’s new Pavilions can supercharge gaming with optional GPUs

Just two days after Microsoft's Windows 10 Creators Update arrived, HP announced two PCs that will come pre-loaded with the new OS.HP refreshed its Pavilion laptops and X360 2-in-1s with new processors and also is offering optional discrete GPUs with the new PCs.You'll be able to select AMD Radeon or Nvidia 940MX graphics when configuring the PCs. Intel or AMD chips (but not Ryzen) can be selected with the PCs.HP realizes entry-level gaming is becoming a basic prerequisite for many laptop users, and discrete GPUs will provide serious graphics punch that integrated graphics can't match. The Pavilion x360 is primarily a laptop but can be used a tablet after you fold the screen. Prices for an entry-level 11.6-inch model, which has only a 720p screen option, will start at US$399.99 with a Pentium N4200 processor, but it can be upgraded to Intel Core i3 or i5 processors. The 14-inch model with Core i3 starts at $499.99, while the 15.6-inch model with Core i5 starts at $699.99. The 14- and 15-inch models can be upgraded to full HD screens.To read this article in full or to leave a comment, please click here

How to Clear Entire Configuration of your Juniper Device

How Does Internet Work - We know what is networking

If you have a Juniper device that needs to be sent to RMA or you are just putting it to some other use on your network, you will probably want to completely clear the configuration on it. There are different ways to do it for different purpose. If you want to securely wipe all data from this device and make it completely like when you received it from the store then next command is the right one to use: root@RSRX> request system zeroize This one will completely wipe your Juniper device and clear configuration together with all data from flash.

How to Clear Entire Configuration of your Juniper Device

IDG Contributor Network: Can Google’s Key Transparency make encrypted email ubiquitous?

Today I’m going to talk about a topic that has gained a lot of attention since the presidential election: encrypted email.Services such as ProtonMail—a secure email system with end-to-end encryption—have reported record signup numbers in recent months. This parallels the increasing adoption and provision of encrypted instant messaging services such as Signal, Telegram, iMessage and WhatsApp. As someone who works in security, I applaud this; more people communicating via encrypted messaging can only be a good thing.+ Also on Network World: Enterprise encryption adoption up, but the devil's in the details + However, there is a big problem with encrypted email, which is that it mostly sucks. The problem lies in the open nature of email itself. Unlike proprietary messaging systems like WhatsApp, email is based on open-standards. Anyone can run their own email server, and you can send an email to anyone in the world just by knowing their email address using any software you like.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can Google’s Key Transparency make encrypted email ubiquitous?

Today I’m going to talk about a topic that has gained a lot of attention since the presidential election: encrypted email.Services such as ProtonMail—a secure email system with end-to-end encryption—have reported record signup numbers in recent months. This parallels the increasing adoption and provision of encrypted instant messaging services such as Signal, Telegram, iMessage and WhatsApp. As someone who works in security, I applaud this; more people communicating via encrypted messaging can only be a good thing.+ Also on Network World: Enterprise encryption adoption up, but the devil's in the details + However, there is a big problem with encrypted email, which is that it mostly sucks. The problem lies in the open nature of email itself. Unlike proprietary messaging systems like WhatsApp, email is based on open-standards. Anyone can run their own email server, and you can send an email to anyone in the world just by knowing their email address using any software you like.To read this article in full or to leave a comment, please click here

Samsung sees strong demand for Galaxy S8 despite Note7 fiasco

Samsung is seeing strong demand for its Galaxy S8 and S8+ smartphones, suggesting that consumers may be looking beyond the company’s debacle with the Galaxy Note7.The company’s head of mobile DJ Koh said at a media event in South Korea on Thursday that pre-orders for the Galaxy S8 and S8+ had outstripped those for its predecessors, the Galaxy S7 and Galaxy S7 edge, which were launched in March last year.A Samsung spokesperson confirmed Koh’s remarks but did not provide figures for the pre-orders for the devices. The company disclosed, however, the number of pre-orders for the S8 and S8+ in home market South Korea, which were at over 728,000.To read this article in full or to leave a comment, please click here

30% off TP-Link Wi-Fi Smart Plug Mini – Deal Alert

This gadget from TP-Link plugs into a standard outlet and allows you to control it from anywhere using your smartphone, or with your voice through an Alexa device. Program on/off times or put it in "away mode" to simulate being home while you're away. The typical list price of $49.99 has been reduced 30% to $34.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

30% off TP-Link Wi-Fi Smart Plug Mini – Deal Alert

This gadget from TP-Link plugs into a standard outlet and allows you to control it from anywhere using your smartphone, or with your voice through an Alexa device. Program on/off times or put it in "away mode" to simulate being home while you're away. The typical list price of $49.99 has been reduced 30% to $34.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

33% off ThermoPro Wireless Digital Cooking Thermometer with Timer and 300 Feet Range – Deal Alert

ThermoPro's wireless cooking thermometer lets you monitor the temps of your food remotely, up to 300 feet away. It includes a built-in timer and programmable temperature alarms. Or if you're unsure, it comes pre-programmed with USDA approved temperatures for various meats. The probe is capable of accurately measuring temps from 16°F to 482°F and comes with a lifetime replacement warranty. ThermoPro's TP07 thermometer averages 4.5 out of 5 stars from over 1,300 people on Amazon (read reviews), where its typical list price of $45.99 has been reduced 33% to $30.59. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Does Google’s TPU Investment Make Sense Going Forward?

Google created quite a stir when it released architectural details and performance metrics for its homegrown Tensor Processing Unit (TPU) accelerator for machine learning algorithms last week. But as we (and many of you reading) pointed out, comparing the TPU to earlier “Kepler” generation GPUs from Nvidia was not exactly a fair comparison. Nvidia has done much in the “Maxwell” and “Pascal” GPU generations specifically to boost machine learning performance.

To set the record straight, Nvidia took some time and ran some benchmarks of its own to put the performance of its latest Pascal accelerators, particularly the ones it aims

Does Google’s TPU Investment Make Sense Going Forward? was written by Timothy Prickett Morgan at The Next Platform.

Munich: Cloudflare’s fifth data center in Germany

Oktoberfest has come early this year! We just turned up our latest data center in Munich: our 110th data center globally, and our fifth in Germany, joining Frankfurt, Düsseldorf, Berlin and Hamburg. Just over a mile away from the historic Hofbräuhaus, our newest deployment helps make six million websites faster across Bavaria, while providing additional redundancy and capacity to withstand attacks.

Oktoberfest kommt früh in diesem Jahr! Wir haben gerade unser 110. Rechenzentrum in München angeschaltet. Wir haben somit fünf Rechenzentren in Deutschland (Frankfurt, Düsseldorf, Berlin, Hamburg und München). Nur ca. 2 Kilometer entfernt vom historischen Hofbräuhaus, wird unser neustes Rechenzentrum sechs Millionen Webseiten im Raum Bayern schneller machen, und zugleich größere Kapazitäten gegen DDoS Attacken bereitstellen.

As TripAdvisor put it: Germany’s third largest city reflects the character of a city and a post card village at the same time.

Wie TripAdvisor es ausdrückt: Deutschlands drittgrößte Stadt spiegelt zugleich den Charakter einer Stadt und eines Dorfes wider.


CC BY-NC-ND 2.0 image by Werner Nieke

Continued Expansion

We have several additional locations being added to our fast expanding network that spans 55 countries. If you have a new city in mind, let us know, Continue reading

Synack: Hackers wanted after firm gets $21.25M funding from Microsoft, HPE

Penetration testing provider Synack is getting an infusion of $21.25 million from the investment arms of Microsoft and HP, among others, and some of it will be used to hire more security analysts to fuel what it calls its hacker-powered intelligence platform.The investment is the Series C round of funding and is led by Microsoft Ventures, but also includes Hewlett Packard Enterprise and Singtel Innov8 to bring total investment in the company to $55 million.+More on Network World: 6 vulnerabilities to watch for on the factory floor+To read this article in full or to leave a comment, please click here

Synack: Hackers wanted after firm gets $21.25M funding from Microsoft, HPE

Penetration testing provider Synack is getting an infusion of $21.25 million from the investment arms of Microsoft and HP, among others, and some of it will be used to hire more security analysts to fuel what it calls its hacker-powered intelligence platform.The investment is the Series C round of funding and is led by Microsoft Ventures, but also includes Hewlett Packard Enterprise and Singtel Innov8 to bring total investment in the company to $55 million.+More on Network World: 6 vulnerabilities to watch for on the factory floor+To read this article in full or to leave a comment, please click here

Shadow Brokers dump contained Solaris hacking tools

After the Shadow Brokers group opened up its archive of exploits allegedly stolen from the United States National Security Agency, security experts found a nasty surprise waiting for Solaris administrators.The Register reported that the dumped Shadow Broker files reference two programs, EXTREMEPARR and EBBISLAND, that would let attackers obtain root access remotely over the network on Solaris boxes running versions 6 to 10 on x86 and SPARC architectures.To read this article in full or to leave a comment, please click here

Shadow Brokers dump contained Solaris hacking tools

After the Shadow Brokers group opened up its archive of exploits allegedly stolen from the United States National Security Agency, security experts found a nasty surprise waiting for Solaris administrators.The Register reported that the dumped Shadow Broker files reference two programs, EXTREMEPARR and EBBISLAND, that would let attackers obtain root access remotely over the network on Solaris boxes running versions 6 to 10 on x86 and SPARC architectures.To read this article in full or to leave a comment, please click here