31% off Luma 3-Piece Whole Home Mesh WiFi System – Deal Alert

Regardless of your home’s size or shape, these 3 powerful Luma devices work together to create an extremely fast, ultra-secure surround WiFi network that’s customized for your home. No more fiddling with extra WiFi extenders to manage dead spots and weak zones. Luma puts you in control. With a few simple taps, you can pause the internet, filter what your kids are looking at online, or set house rules for your network. Luma also secures your devices and neutralizes threats, keeping you in control of your network. The Luma whole house WiFi system averages 4 out of 5 stars from over 1,100 people on Amazon (read recent reviews), where its typical list price of $399 has been reduced 31% to $275.95. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

31% off Luma 3-Piece Whole Home Mesh WiFi System – Deal Alert

Regardless of your home’s size or shape, these 3 powerful Luma devices work together to create an extremely fast, ultra-secure surround WiFi network that’s customized for your home. No more fiddling with extra WiFi extenders to manage dead spots and weak zones. Luma puts you in control. With a few simple taps, you can pause the internet, filter what your kids are looking at online, or set house rules for your network. Luma also secures your devices and neutralizes threats, keeping you in control of your network. The Luma whole house WiFi system averages 4 out of 5 stars from over 1,100 people on Amazon (read recent reviews), where its typical list price of $399 has been reduced 31% to $275.95. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Learn Docker with our DockerCon 2017 Hands-On Labs

We’re excited to announce that DockerCon 2017 will feature a comprehensive set of hands-on labs. We first introduced hands-on labs at DockerCon EU in 2015, and they were also part of DockerCon 2016 last year in Seattle. This year we’re offering a broader range of topics that cover the interests of both developers and operations personnel on both Windows and Linux (see below for a full list)

These hands-on labs are designed to be self-paced, and are run on the attendee’s laptop. But, don’t worry, all the infrastructure will be hosted again this year on Microsoft Azure. So, all you will need is a laptop capable of instantiating a remote session over SSH (for Linux) or RDP (for Windows).

We’ll have a nice space set up in between the ecosystem expo and breakout rooms for you to work on the labs. There will be tables and stools along with power and wireless Internet access as well as lab proctors to answer questions. But, because of the way the labs are set up, you could also stop by, sign up, and take your laptop to a quiet spot and work on your own.

As you can tell, we’re pretty stoked on Continue reading

Adobe Reader, Edge, Safari, and Ubuntu fall during first day at Pwn2Own

Bug hunters have gathered again to test their skills against some of the most popular and mature software programs during the Pwn2Own hacking contest. During the first day, they successfully demonstrated exploits against Microsoft Edge, Apple's Safari, Adobe Reader, and Ubuntu Desktop.The Pwn2Own contest runs every year during the CanSecWest security conference in Vancouver, Canada. It's organized and sponsored by the Zero Day Initiative (ZDI), an exploit acquisition program operated by Trend Micro after its acquisition of TippingPoint.This year the contest has a prize pool of US$1 million for exploits in five categories: virtual machines (VMware Workstation and Microsoft Hyper-V); web browser and plugins (Microsoft Edge, Google Chrome, Mozilla Firefox, Apple Safari, and Flash Player running in Edge); local escalation of privilege (Windows, macOS, and Ubuntu Desktop); enterprise applications (Adobe Reader, Word, Excel, and PowerPoint) and server side (Apache Web Server on Ubuntu Server).To read this article in full or to leave a comment, please click here

Adobe Reader, Edge, Safari, and Ubuntu fall during first day at Pwn2Own

Bug hunters have gathered again to test their skills against some of the most popular and mature software programs during the Pwn2Own hacking contest. During the first day, they successfully demonstrated exploits against Microsoft Edge, Apple's Safari, Adobe Reader, and Ubuntu Desktop.The Pwn2Own contest runs every year during the CanSecWest security conference in Vancouver, Canada. It's organized and sponsored by the Zero Day Initiative (ZDI), an exploit acquisition program operated by Trend Micro after its acquisition of TippingPoint.This year the contest has a prize pool of US$1 million for exploits in five categories: virtual machines (VMware Workstation and Microsoft Hyper-V); web browser and plugins (Microsoft Edge, Google Chrome, Mozilla Firefox, Apple Safari, and Flash Player running in Edge); local escalation of privilege (Windows, macOS, and Ubuntu Desktop); enterprise applications (Adobe Reader, Word, Excel, and PowerPoint) and server side (Apache Web Server on Ubuntu Server).To read this article in full or to leave a comment, please click here

DARPA plan would reinvent not-so-clever machine learning systems

Machine learning systems maybe be smart but they have a lot to discover.Innovative researchers with DARPA hope to achieve superior machine learning systems with a new program called Lifelong Learning Machines (L2M) which has as its primary goal to develop next-generation machine learning technologies that can learn from new situations and apply that learning to become better and more reliable than current constrained systems.+More on Network World: DARPA fortifies early warning system for power-grid cyber assault+To read this article in full or to leave a comment, please click here

DARPA plan would reinvent not-so-clever machine learning systems

Machine learning systems maybe be smart but they have a lot to discover.Innovative researchers with DARPA hope to achieve superior machine learning systems with a new program called Lifelong Learning Machines (L2M) which has as its primary goal to develop next-generation machine learning technologies that can learn from new situations and apply that learning to become better and more reliable than current constrained systems.+More on Network World: DARPA fortifies early warning system for power-grid cyber assault+To read this article in full or to leave a comment, please click here

DARPA plan would reinvent not-so-clever machine learning systems

Machine learning systems maybe be smart but they have a lot to discover.Innovative researchers with DARPA hope to achieve superior machine learning systems with a new program called Lifelong Learning Machines (L2M) which has as its primary goal to develop next-generation machine learning technologies that can learn from new situations and apply that learning to become better and more reliable than current constrained systems.+More on Network World: DARPA fortifies early warning system for power-grid cyber assault+To read this article in full or to leave a comment, please click here

Peering Through Opaque HPC Benchmarks

If Xzibit worked in the HPC field, he might be heard to say “I heard you like computers, so we modeled a computer with your computer so you can simulate your simulations.”

But simulating the performance of HPC applications is more than just recursion for comedic effect, it provides a key mechanism for the study and prediction of application behavior under different scenarios. While actually running the code on the system will yield a measure of the wallclock time, it does little to provide an explanation of what factors impacted that wallclock time. And of course it requires the system

Peering Through Opaque HPC Benchmarks was written by Nicole Hemsoth at The Next Platform.

75% off Etekcity 4 Pack Portable Outdoor LED Camping Lantern with 12 AA Batteries – Deal Alert

Whether used for camping, trick or treating, or power outages, this lantern will provide up to 12 hours of bright omnidirectional LED lighting to see your surroundings. When the battery power of the lantern runs low, the brightness will dim to an energy saving mode to provide longer lasting illumination (up to 4 hours of low power usage). It's lighter, brighter and more portable than most flashlights while still featuring the rugged durability to withstand the outdoors. The military grade exterior is water resistant for more practical use in a high range of environments. Ideal for children, the lantern needs no setup or prepping with fires and oil. The design provides full omnidirectional lighting for clear vision no matter where you may turn. The fold-out collapsible handles make for easier portability and hanging.  This lantern averages 4.8 out of 5 stars on Amazon (read reviews) and the 4 pack's list price of $79.99 has been reduced 75% to $19.99. Check it out on Amazon.To read this article in full or to leave a comment, please click here

Six Flags New England adds VR to another roller coaster

If riding a roller coaster with a virtual Superman isn’t your thing, Six Flags New England has an alternative pitch – get sent into space and fight alien invaders.The Agawam, Mass.-based amusement park today announced that its second coaster will get VR when it opens this spring. Partnering up with Samsung, the company said its Mind Eraser steel coaster will include the “Galactic Attack Virtual Reality Coaster” option, which will include a mixed reality feature that initially will let riders see the real world (including the rider next to them) in addition to the VR graphics. Like the Superman coaster, riders will put on a VR headset while enjoying the physical roller coaster’s drops and spins.To read this article in full or to leave a comment, please click here

Why is incident response automation and orchestration so hot?

I couldn’t attend the RSA Conference this year, but many cybersecurity professionals and my ESG colleagues told me that incident response (IR) automation and orchestration was one of the hottest topics in the halls of the Moscone Center—through the bar at the W hotel and even at the teahouse on the garden at Yerba Buena.   Was this rhetoric just industry hype? Nope. This buzz is driven by the demand side rather than suppliers. In truth, cybersecurity professionals need immediate IR help for several reasons:1. IR is dominated by manual processes. Let’s face it, IR tasks such as fetching data, tracking events or collaborating with colleagues depend upon the organizational, communications and technical skills of individuals within the security operations team. These manual processes ultimately get in the way of overall IR productivity.To read this article in full or to leave a comment, please click here

Why is incident response automation and orchestration so hot?

I couldn’t attend the RSA Conference this year, but many cybersecurity professionals and my ESG colleagues told me that incident response (IR) automation and orchestration was one of the hottest topics in the halls of the Moscone Center—through the bar at the W hotel and even at the teahouse on the garden at Yerba Buena.   Was this rhetoric just industry hype? Nope. This buzz is driven by the demand side rather than suppliers. In truth, cybersecurity professionals need immediate IR help for several reasons:1. IR is dominated by manual processes. Let’s face it, IR tasks such as fetching data, tracking events or collaborating with colleagues depend upon the organizational, communications and technical skills of individuals within the security operations team. These manual processes ultimately get in the way of overall IR productivity.To read this article in full or to leave a comment, please click here

Why is IR Automation and Orchestration So Hot?

I couldn’t attend the RSA Conference this year but many cybersecurity professionals and my ESG colleagues told me that incident response automation and orchestration was one of the hottest topics in the halls of the Moscone Center, through the bar at the W hotel, and even at the teahouse on the garden at Yerba Buena.   Was this rhetoric just industry hype?  Nope.  This buzz is driven by the demand side rather than suppliers.  In truth, cybersecurity professionals need immediate IR help for several reasons:1.      IR is dominated by manual processes.  Let’s face it, IR tasks like fetching data, tracking events, or collaborating with colleagues depend upon the organizational, communications, and technical skills of individuals within the security operations team.  These manual processes ultimately get in the way of overall IR productivity.  In a recent research project, infosec pros were asked: ‘Do you believe that your organization’s incident response efficiency and effectiveness are limited by the time and effort required for manual processes?’ Fifty-two percent of cybersecurity professionals responded, “yes, significantly” while another 41% said, “yes, somewhat.”  Furthermore, 27% of cybersecurity pros say they spend 50% or more of their Continue reading

CBRS Alliance: Shared spectrum services “a near-term opportunity”

The CBRS Alliance, which promotes LTE services in the shared 3.5 GHz Citizens Broadband Radio Service band, is riding high after signing up all of the Big 4 U.S. carriers, plus Samsung, and then seeing a slew of CBRS activity at the recent Mobile World Congress event in Barcelona.Neville Meijers, VP of business development at Qualcomm Technologies and chairman of the board for the CBRS Alliance, says “there’s a lot of interest in the combination of unlicensed and shared spectrum” for a number of use cases being tested for public and private services.I caught up with Meijers shortly after MWC to get up to speed on the latest CBRS action.To read this article in full or to leave a comment, please click here

CBRS Alliance: Shared spectrum services “a near-term opportunity”

The CBRS Alliance, which promotes LTE services in the shared 3.5 GHz Citizens Broadband Radio Service band, is riding high after signing up all of the Big 4 U.S. carriers, plus Samsung, and then seeing a slew of CBRS activity at the recent Mobile World Congress event in Barcelona.Neville Meijers, VP of business development at Qualcomm Technologies and chairman of the board for the CBRS Alliance, says “there’s a lot of interest in the combination of unlicensed and shared spectrum” for a number of use cases being tested for public and private services.I caught up with Meijers shortly after MWC to get up to speed on the latest CBRS action.To read this article in full or to leave a comment, please click here