Microsoft fixes 45 flaws, including three actively exploited vulnerabilities

Microsoft released its monthly security-patch bundle Tuesday, fixing 45 unique vulnerabilities, three of which are publicly known and targeted by hackers.The top priority this month should be given to the Microsoft Office security update because one of the fixed flaws has been actively exploited by attackers since January to infect computers with malware. Over the past few days this vulnerability, tracked as CVE-2017-0199, has seen widespread exploitation.To read this article in full or to leave a comment, please click here

Microsoft fixes 45 flaws, including three actively exploited vulnerabilities

Microsoft released its monthly security-patch bundle Tuesday, fixing 45 unique vulnerabilities, three of which are publicly known and targeted by hackers.The top priority this month should be given to the Microsoft Office security update because one of the fixed flaws has been actively exploited by attackers since January to infect computers with malware. Over the past few days this vulnerability, tracked as CVE-2017-0199, has seen widespread exploitation.To read this article in full or to leave a comment, please click here

Hacked Dallas sirens get extra encryption to fend off future attacks

Dallas city officials have added extra encryption and other security measures to the outdoor warning sirens hacked early Saturday.The hack also prompted the city to evaluate critical systems for potential vulnerabilities, City Manager T.C. Broadnax said in a statement late Monday. City officials are reviewing security for financial systems, a flood warning system, police-fire dispatch and the 911/311 system.To read this article in full or to leave a comment, please click here

Hacked Dallas sirens get extra encryption to fend off future attacks

Dallas city officials have added extra encryption and other security measures to the outdoor warning sirens hacked early Saturday.The hack also prompted the city to evaluate critical systems for potential vulnerabilities, City Manager T.C. Broadnax said in a statement late Monday. City officials are reviewing security for financial systems, a flood warning system, police-fire dispatch and the 911/311 system.To read this article in full or to leave a comment, please click here

Salaries for storage, networking pros continue to rise

While 2016 saw U.S. tech salaries remain essentially flat year-over-year, key skills, especially in the areas of storage and networking, did warrant increases, according to the annual tech salary report from careers site Dice.com.Their recent survey polled 12,907 employed technology professionals online between October 26, 2016 and January 24, 2017. The survey found that, overall, technology salaries in the U.S. were essentially flat year-over-year (-1 percent) at $92,081 in 2016, a slight dip from $93,328 in 2015. However, there are some notable exceptions across the country and for specific skills areas like storage and networking seeing increases, says Bob Melk, president, Dice.com.To read this article in full or to leave a comment, please click here

7 ways Android and Windows 10 can work well together

If you regularly use a Windows 10 PC and an Android phone or tablet, there are several Android apps you can install that can seamlessly link the flow of information between the two. For instance, you can start a quick note on your phone, then finish it later on your Windows 10 PC, or you can receive the same alert on both devices for an appointment.The following Windows 10-friendly Android apps are all from Microsoft -- and all free. To get the kind of interoperability described above, you need to be signed into each of the apps on your Android device with the same Microsoft online account you use to sign into your Windows 10 computer.1. Cortana: Sync reminders between your Windows PC and Android device The Cortana app for Android lets you create reminders that will sync with, and send notifications to, your Windows 10 PC. To set a reminder in the Cortana app for Android, tap the icon on the lower-left of the app’s main screen (it’s the grid icon with 9 squares), tap the “New reminder” icon, type in a name for your reminder, and set the time when you want to be sent a Continue reading

A.I. in the driver’s seat with the enterprise

Artificial intelligence will be a critical driver of U.S. economy. This package shows how three companies are using IBM’s Watson A.I. in innovative ways.GlaxoSmithKline is using Watson to better connect with customers. GSK is rolling out a Watson-based question-and-answer feature first for its Theraflu cold and flu medication, enabling customers to ask questions by voice or text through GSK's online ads.Staples is testing a smart assistant device that looks like its Easy Button, but that customers can use to order products, track shipments and help with returns. Staples sees the Watson-fueled service as an aid to office managers by having the device handle the brunt of their ordering and delivery tracking, so they can work on other tasks.To read this article in full or to leave a comment, please click here

How Brexit will impact IT services

The countdown to the United Kingdom’s separation from the European Union began in late March when U.K. prime minister Theresa May officially triggered the “Brexit.” With just less than two years until the U.K. is officially out of the EU, the date of departure is one of the few certainties regarding the situation. “No country has ever travelled this path, and there is no turning back,” says Craig Wright, managing director for business transformation and outsourcing advisory firm Pace Harmon.[ Related: Brexit: a project doomed to fail ]To read this article in full or to leave a comment, please click here

How Brexit will impact IT services

The countdown to the United Kingdom’s separation from the European Union began in late March when U.K. prime minister Theresa May officially triggered the “Brexit.” With just less than two years until the U.K. is officially out of the EU, the date of departure is one of the few certainties regarding the situation. “No country has ever travelled this path, and there is no turning back,” says Craig Wright, managing director for business transformation and outsourcing advisory firm Pace Harmon.[ Related: Brexit: a project doomed to fail ]To read this article in full or to leave a comment, please click here

Windows Server 2016 Hyper-V: More secure, but not faster

With Windows Server 2016, Microsoft has introduced a lengthy list of improvements to Hyper-V. Along with functional additions like container support, nested virtualization, and increased memory and vCPU limits, you’ll find a number of new features, including production-grade checkpoints and the ability to hot-add memory and network adapters, that ease administration.To read this article in full or to leave a comment, please click here(Insider Story)

Windows Server 2016 Hyper-V: More secure, but not faster

With Windows Server 2016, Microsoft has introduced a lengthy list of improvements to Hyper-V. Along with functional additions like container support, nested virtualization, and increased memory and vCPU limits, you’ll find a number of new features, including production-grade checkpoints and the ability to hot-add memory and network adapters, that ease administration.To read this article in full or to leave a comment, please click here(Insider Story)

Can AI and ML slay the healthcare ransomware dragon?

It’s common knowledge that healthcare organizations are prime – and relatively easy – targets for ransomware attacks. So it is no surprise that those attacks have become rampant in the past several years. The term “low-hanging fruit” is frequently invoked.But according to at least one report, and some experts, it doesn’t have to be that way. ICIT – the Institute for Critical Infrastructure Technology – contends in a recent whitepaper that the power of artificial intelligence and machine learning (AI/ML) can “crush the health sector’s ransomware pandemic.”To read this article in full or to leave a comment, please click here

Can AI and ML slay the healthcare ransomware dragon?

It’s common knowledge that healthcare organizations are prime – and relatively easy – targets for ransomware attacks. So it is no surprise that those attacks have become rampant in the past several years. The term “low-hanging fruit” is frequently invoked.But according to at least one report, and some experts, it doesn’t have to be that way. ICIT – the Institute for Critical Infrastructure Technology – contends in a recent whitepaper that the power of artificial intelligence and machine learning (AI/ML) can “crush the health sector’s ransomware pandemic.”To read this article in full or to leave a comment, please click here

Episode 1 – Top 10 Ways To Break Your Network

In episode 1, we take an introspective look back at some of our biggest mistakes when operating live production networks.  The panel discusses outages that range from a total outage on a global MPLS network, to taking out a core switch due to an over-active case of OCD.  Valuable, hard-earned, lessons are shared by this group of experienced network engineers and possibly a funny story or two.

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


 

Carl Fugate
Guest
Mike Zsiga
Guest
Jody Lemoine
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

 

Audio Only Podcast Feed:

The post Episode 1 – Top 10 Ways To Break Your Network appeared first on Network Collective.

Episode 1 – Top 10 Ways To Break Your Network

In episode 1, we take an introspective look back at some of our biggest mistakes when operating live production networks.  The panel discusses outages that range from a total outage on a global MPLS network, to taking out a core switch due to an over-active case of OCD.  Valuable, hard-earned, lessons are shared by this group of experienced network engineers and possibly a funny story or two.

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


 

Carl Fugate
Guest
Mike Zsiga
Guest
Jody Lemoine
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

 

Audio Only Podcast Feed:

The post Episode 1 – Top 10 Ways To Break Your Network appeared first on Network Collective.

IDG Contributor Network: IoT protects fishing fleets and global fisheries with RPMA technology

The global seafood industry is over $190 billion. Millions of fishers take to the oceans each day to feed local communities and a growing global appetite for seafood.How can the demand for fish be met while maintaining healthy oceans? A new IoT-based solution holds promise.Background: The challenge of monitoring fishing boats Over half of the world’s seafood is exported from developing countries. Much of the catch is from small fishing boats, which are difficult to monitor and protect. Commercial fishing in developing regions typically occurs within 30 miles from land. Establishing a communication channel that can support hundreds of fishing boats spread out over a large area is a challenge. Boats are small and lack dependable power. Devices have to be both affordable and rugged.To read this article in full or to leave a comment, please click here