TSA: “As you can imagine, live anti-tank rounds are strictly prohibited altogether.”

I have detailed the crazy things that the TSA has found in airline travelers checked bags over the past few years but…every once and awhile, something new and cracked turns up. TSA/22MM tank round LAX Recently the agency’s agents reported that a live 22 MM anti-tank round was discovered by TSA agents in a checked bag at Los Angeles (LAX) airport.To read this article in full or to leave a comment, please click here

Legal war with Apple hits Qualcomm’s revenue projections

The legal fight between Apple and Qualcomm on licensing modem technology is turning uglier every day.Apple has filed lawsuits against Qualcomm in countries like the U.S., U.K., China and Japan, accusing the chipmaker of using its dominant market position to overcharge licensing fees.The iPhone maker itself doesn't pay licensing fees directly to Qualcomm. The fees are paid by partners like Foxconn, which makes the iPhone and iPad for Apple.Qualcomm is now accusing Apple of interfering with the licensing payments owed by those partners. Its revenue forecasts for the third quarter are affected, Qualcomm said.The chipmaker on Friday revised its revenue projections for the third fiscal quarter. It is projecting revenue to be between US$5.3 billion and $6.1 billion. That range runs between a decrease of 12 percent and an increase of 1 percent, compared to the same quarter last year. The forecast removes royalty revenues from Apple's contract manufacturers.To read this article in full or to leave a comment, please click here

44% off Logitech Bluetooth Multi-Device Keyboard – Deal Alert

Here's a Bluetooth keyboard for your computer that you can also use with your tablet and smartphone -- switch between all three effortlessly by just turning the dial. And unlike other Bluetooth keyboards, Logitech has integrated a cradle so your device stays propped up at just the right angle as you type. Works with Windows or Mac, Android or iOS, and features a key layout you'll be familiar with on any of those platforms. Logitech's multi-device keyboard currently averages 4 out of 5 stars from over 1,450 people (read reviews) on Amazon, where its typical list price of $49.99 has been recently dropped 44% to just $27.99.  See this deal now on Amazon.To read this article in full or to leave a comment, please click here

54% off Logitech Bluetooth Multi-Device Keyboard – Deal Alert

Here's a Bluetooth keyboard for your computer that you can also use with your tablet and smartphone -- switch between all three effortlessly by just turning the dial. And unlike other Bluetooth keyboards, Logitech has integrated a cradle so your device stays propped up at just the right angle as you type. Works with Windows or Mac, Android or iOS, and features a key layout you'll be familiar with on any of those platforms. Logitech's multi-device keyboard currently averages 4 out of 5 stars from over 1,450 people (read reviews) on Amazon, where its typical list price of $49.99 has been recently dropped 54% to just $22.99.  See this deal now on Amazon.To read this article in full or to leave a comment, please click here

vRealize Network Insight, NSX and Palo Alto Networks for micro-segmentation

 

Data Center cyber security is a fast-moving target where the IT teams need to constantly stay ahead of those that wish to do evil things. As security attacks can come from all directions, externally, and internally as well, the IT teams must fortify all the data, with a zero-trust security approach.  Perimeter security augmented with intrusion detection and protection at the application level are the tools of choice for most data centers. This protects outsiders from getting in, as well as ensuring that the applications do not get impacted by a virus or other forms of malicious activities.

What has not been addressed is the intercommunications of applications amongst themselves, especially within the hypervisor layer, where virtual machines are communicating in an East-West traffic pattern. Traffic never hits the perimeter, and the conversations are happening several layers below the application layers where IDS sits.  East-west traffic, from within the data center, has been an area overlooked as there is a gap organizationally. Simply put no one is paying attention to this area of vulnerability. The network infrastructure security teams are fortifying the perimeter, while the server teams are deploying IDS/IPS solutions. What has gone unnoticed is the East-West Continue reading

Show 337: Ethan & Greg Ask Me Anything Part 2

Todays Weekly Show episode is part 2 of the Packet Pushers Ask Me Anything series. We answer listener questions on certifications, skills development, imposter syndrome, and preferences for fighting giant ducks or small horses (we did say you could ask anything). The post Show 337: Ethan & Greg Ask Me Anything Part 2 appeared first on Packet Pushers.

Sift Science uses machine learning to help businesses reduce fraud while enhancing the user experience​

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Companies that provide online transactional services to consumers or other businesses have to be concerned about fraud. Whether it is renting hotel rooms to travelers, selling books to avid readers, arranging shipping services for hard goods, or any of the thousands of other types of sales and services transacted online, the entity behind the online business needs to know if the end user and transaction can be trusted.The credit reporting company Experian says that e-commerce fraud attack rates spiked 33% in 2016 compared to 2015. Experian attributes this increase to the recent switch to EMV (those chip-based credit cards), which drove fraudsters to online card-not-present fraud, and to the vast number of data breaches in which users’ online credentials were stolen. The Federal Trade Commission says the number of consumers who reported their stolen data was used for credit card fraud increased from 16% in 2015 to 32% in 2016.To read this article in full or to leave a comment, please click here

Sift Science uses machine learning to help businesses reduce fraud while enhancing the user experience​

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Companies that provide online transactional services to consumers or other businesses have to be concerned about fraud. Whether it is renting hotel rooms to travelers, selling books to avid readers, arranging shipping services for hard goods, or any of the thousands of other types of sales and services transacted online, the entity behind the online business needs to know if the end user and transaction can be trusted.The credit reporting company Experian says that e-commerce fraud attack rates spiked 33% in 2016 compared to 2015. Experian attributes this increase to the recent switch to EMV (those chip-based credit cards), which drove fraudsters to online card-not-present fraud, and to the vast number of data breaches in which users’ online credentials were stolen. The Federal Trade Commission says the number of consumers who reported their stolen data was used for credit card fraud increased from 16% in 2015 to 32% in 2016.To read this article in full or to leave a comment, please click here

Microsoft SQL Server on Linux – YES, Linux!

A couple years ago Microsoft embarked on a “Microsoft Loves Linux” initiative to bring Linux into the fold of everything Microsoft.  For a company that has traditionally been known for Windows and Office that has not historically been seen as particularly too Linux friendly, there was a bit of a stretch of the imagination how Microsoft and Linux would end up playing well together.Roll forward a couple years, with the world very much a cloud-based environment, and 1 out of every 3 virtual machines running in Microsoft’s Azure Cloud being a Linux system (and growing), along with more and more Linux growth in the Microsoft ecosystem, the vision of a couple years ago is now very much a reality.To read this article in full or to leave a comment, please click here

Sift Science uses machine learning to help businesses reduce fraud without impacting the user experience  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Companies that provide online transactional services to consumers or other businesses have to be concerned about fraud. Whether it is renting hotel rooms to travelers, selling books to avid readers, arranging shipping services for hard goods, or any of the thousands of other types of sales and services transacted online, the entity behind the online business needs to know if the end user and transaction can be trusted.The credit reporting company Experian says that e-commerce fraud attack rates spiked 33% in 2016 compared to 2015. Experian attributes this increase to the recent switch to EMV (those chip-based credit cards), which drove fraudsters to online card-not-present fraud, and to the vast number of data breaches in which users’ online credentials were stolen. The Federal Trade Commission says the number of consumers who reported their stolen data was used for credit card fraud increased from 16% in 2015 to 32% in 2016.To read this article in full or to leave a comment, please click here

Raspberry Pi roundup: Conduct your own symphony, play some Atari, and Competitor Corner

Homemade musical instruments don’t usually work out very well. I remember the experiment we all had to do with the rubber bands and the empty tissue boxes and finding the resulting sound, well, pretty disappointing. How’s a fifth grader supposed to rock out and impress girls for reasons he only vaguely understands with this thing?!Perhaps unsurprisingly, the age of ubiquitous computers has made the possibilities of the homemade instrument a lot more exciting than the twanging rubber band or the musical comb. (Leaving aside professional stuff like That 1 Guy, who has been weird and excellent for a while.) What we have here is a wild digital “piano,” as inventor Andy Grove calls it, that combines a Raspberry Pi with motion sensors to create a unique musical toy:To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For April 28th, 2017

Hey, it's HighScalability time:

 

Do you understand the power symbol? I always think of O as a circuit being open, or off, and the | as the circuit being closed, or on. Wrong! Really the symbols are binary, 0 for false, or off, 1 for true, or on. Mind blown.

If you like this sort of Stuff then please support me on Patreon.
  • 220,000-Core: largest Google Compute Engine job; 100 million: Netflix subscribers; 1.3M: Sling TV subscribers; 200: Downloadable Modern Art Books; 25%: Americans Won't Subscribe To Traditional Cable; 84%: image payload savings using smart CDN; 10^5: number of world-wide cloud data centers needed; 63%: more Facebook clicks using personality targeting; 2.5 million: red blood cells created per second; 

  • Quotable Quotes:
    • Silicon Valley~ The only reason Gilfoyle and I stayed up 48 f*cking straight hours was to decrease server load, not keep it the same. 
    • Robert Graham: In other words, if the entire Mirai botnet of 2.5 million IoT devices was furiously mining bitcoin, it's total earnings would be $0.25 (25 cents) per day.
    • @BoingBoing: John Deere just told US Copyright office that only corporations can own Continue reading