Spy agency, DOE, see China nearing supercomputing leadership

Advanced computing experts at the National Security Agency and the Department of Energy are warning that China is "extremely likely" to take leadership in supercomputing as early as 2020, unless the U.S. acts quickly to increase spending.China's supercomputing advances are not only putting national security at risk, but also U.S. leadership in high-tech manufacturing. If China succeeds, it may "undermine profitable parts of the U.S. economy," according to a report titled U.S. Leadership in High Performance Computing by HPC technical experts at the NSA, the DOE, the National Science Foundation and other agencies.To read this article in full or to leave a comment, please click here

Spy agency, DOE, see China nearing supercomputing leadership

Advanced computing experts at the National Security Agency and the Department of Energy are warning that China is "extremely likely" to take leadership in supercomputing as early as 2020, unless the U.S. acts quickly to increase spending.China's supercomputing advances are not only putting national security at risk, but also U.S. leadership in high-tech manufacturing. If China succeeds, it may "undermine profitable parts of the U.S. economy," according to a report titled U.S. Leadership in High Performance Computing by HPC technical experts at the NSA, the DOE, the National Science Foundation and other agencies.To read this article in full or to leave a comment, please click here

Hire a DDoS service to take down your enemies

With the onrush of connected internet of things (IoT) devices, distributed denial-of-service attacks are becoming a dangerous trend. Similar to what happened to DNS service provider Dyn last fall, anyone and everyone is in the crosshairs. The idea of using unprotected IoT devices as a way to bombard networks is gaining momentum.The advent of DDoS-for-hire services means that even the least tech-savvy individual can exact  revenge on some website. Step on up to the counter and purchase a stresser that can systemically take down a company.To read this article in full or to leave a comment, please click here

Hire a DDoS service to take down your enemies

With the onrush of connected internet of things (IoT) devices, distributed denial-of-service attacks are becoming a dangerous trend. Similar to what happened to DNS service provider Dyn last fall, anyone and everyone is in the crosshairs. The idea of using unprotected IoT devices as a way to bombard networks is gaining momentum.The advent of DDoS-for-hire services means that even the least tech-savvy individual can exact  revenge on some website. Step on up to the counter and purchase a stresser that can systemically take down a company.To read this article in full or to leave a comment, please click here

More than a third of tech workers are underpaid

IT salaries continue to rise, but many tech workers are still well above the national median income, new research from compensation and salary data solutions company Paysa shows that many tech workers are still underpaid.Paysa used machine learning and AI to examine more than five million resumes of tech and engineering professionals from their salary database and compared their education, experience, skills, work history and current salary to their market value for identical available roles, says Chris Bolte, CEO of Paysa.To read this article in full or to leave a comment, please click here

8 of the weirdest, wildest, most WTF scenes from SXSW

Keep SXSW weirdImage by Caitlin McGarryAustin is already a weird place, but during South by Southwest, the weirdness grows exponentially. Big brands thirsty for attention and tiny startups looking to pitch the hot new app compete to see who can capture the SXSW audience of techies and creatives. The brand presence was more subdued this year than in the past, but that didn’t make the stunts any less bananas. Here are the 8 that made me stop in my tracks.To read this article in full or to leave a comment, please click here

6 apps Apple really needs to make for Android

Android and iOS may be destined to do battle forever, but when it comes to apps, the relationship is a little friendlier. Countless iOS users enjoy Google’s services on their iPhones, and in fact, the acclaimed Gboard keyboard actually began its life as an iOS exclusive before making its way to the Play Store several months later.But while Apple hasn’t been nearly as generous with its offerings, it does offer Apple Music and Beats Pill as a concession to former Beats Music subscribers. However, there’s a load of untapped potential in the Play Store. After all, Apple doesn’t just sell iPhones, and many Android users have other Cupertino-made products that they use on a regular basis. So here are some Apple apps I’d love to see show up in the Play Store:To read this article in full or to leave a comment, please click here

4 ways technology has changed recruitment — for better (and worse)

From professional networking sites and job boards to online applicant systems, technology has revolutionized recruitment, profoundly changing how employers and recruiters find potential candidates. For example, applicant tracking systems and new AI software can help HR departments manage the massive influx of resumes they receive daily, says Michael Fauscette, chief research officer at G2 Crowd, a business software review platform. But, while technology can offer easy solutions, it often has a way of creating new problems in the process."The new AI-powered systems can do a great job sorting through candidates, but the risk is that non-traditional candidates or candidates with unusual experience that might be a very good fit could fall through the rules-based system, even one that learns and improves with 'experience'," he says.To read this article in full or to leave a comment, please click here

Court blocks American from suing Ethiopia for infecting his computer

An appeals court has barred an Ethiopian-born U.S. citizen from filing a civil suit against the African country, which allegedly infected his computer with spyware and monitored his communications.The U.S. Court of Appeals for the District of Columbia Circuit ruled Tuesday that foreign states are immune from suit in a U.S. court unless an exception to the Foreign Sovereign Immunities Act (FSIA) applies.The person, who is referred to in court documents by the pseudonym Kidane, was born in Ethiopia and lived there for 30 years before seeking asylum in the U.S. He lives in Maryland.To read this article in full or to leave a comment, please click here

Court blocks American from suing Ethiopia for infecting his computer

An appeals court has barred an Ethiopian-born U.S. citizen from filing a civil suit against the African country, which allegedly infected his computer with spyware and monitored his communications.The U.S. Court of Appeals for the District of Columbia Circuit ruled Tuesday that foreign states are immune from suit in a U.S. court unless an exception to the Foreign Sovereign Immunities Act (FSIA) applies.The person, who is referred to in court documents by the pseudonym Kidane, was born in Ethiopia and lived there for 30 years before seeking asylum in the U.S. He lives in Maryland.To read this article in full or to leave a comment, please click here

To YANG or Not to YANG, That’s the Question

Yannis sent me an interesting challenge after reading my short “this is how I wasted my time” update:

We are very much committed in automation and use Ansible to create configuration and provision our SP and data center network. One of our principles is that we do rely solely on data available in external resources (databases and REST endpoints), and avoid fetching information/views from the network because that would create a loop.

You can almost feel a however coming in just a few seconds, right?

Read more ...

Killing idle TCP connections

Why

Let’s say you have some TCP connections to your local system that you want to kill. You could kill the process that handles the connection, but that may also kill other connections, so that’s not great. You could also put in a firewall rule that will cause the connection to be reset. But that won’t work on a connection that’s idle (also if one side is initiator then using this method the other side would not tear down its side of the connection). There’s tcpkill, but it needs to sniff the network to find the TCP sequence numbers, and again that won’t work for an idle connection.

Ideally for these long-running connections TCP keepalive would be enabled. But sometimes it’s not. (e.g. it’s not on by default for gRPC TCP connections, and they certainly can be long-running and idle).

You could also do this by attaching a debugger and calling shutdown(2) on the sockets, but having the daemon calling unexpected syscalls thus getting into an unexpected state doesn’t really make for a stable system. Also attaching a debugger hangs the daemon while you’re attached to it.

This post documents how to do this on a Debian system.

Continue reading

Wind River uses virtualization to turn M2M into IoT

Wind River, an IoT software division of Intel, wants to help industrial users bring their legacy machine-to-machine systems into the age of open source and cloud computing.On Tuesday, it introduced software to virtualize industrial applications at the edge of the network, letting enterprises gradually migrate from older M2M technology to modern systems that give them more flexibility.The platform, called Wind River Titanium Control, runs on commodity Xeon hardware and uses widely adopted cloud platforms such as OpenStack and KVM (Kernel-based Virtual Machine). The company has validated hardware systems from major manufacturers to run Titanium Control and pre-validated virtual network applications through its Titanium Cloud Ecosystem, begun in 2014. Titanium Control is targeted at industries like manufacturing, energy and health care.To read this article in full or to leave a comment, please click here

Apple downplays importance of CIA’s iPhone hacking capabilities

In a massive data dump last week, WikiLeaks released thousands upon thousands of highly secretive and sensitive CIA documents that detail the extent of the government agency's spying tools. Aside from interesting tidbits regarding the CIA attempting to eavesdrop on targets via Samsung HD-TVs, the leaked documents also reference the CIA's efforts to hack into iOS devices.In fact, the CIA even has a specialized team devoted entirely towards coming up with security exploits for iOS devices, in particular the iPhone. Even though the iPhone only accounts for less than 15 percent of global smartphone marketshare, Apple's iconic smartphone attracts a disproportionate amount of attention because it's proven to be quite popular among "social, political, diplomatic and business elites."To read this article in full or to leave a comment, please click here

Apple downplays importance of CIA’s iPhone hacking capabilities

In a massive data dump last week, Wikileaks released thousands upon thousands of highly secretive and sensitive CIA documents which detail the extent of the government agency's spying tools. Aside from interesting tidbits regarding the CIA attempting to eavesdrop on targets via Samsung HDTVs, the leaked documents also reference the CIA's efforts to hack into iOS devices.In fact, the CIA even has a specialized team devoted entirely towards coming up with security exploits for iOS devices, and in particular the iPhone. Even though the iPhone only accounts for less than 15% of global smartphone marketshare, Apple's iconic smartphone attracts a disproportionate amount of attention because it's proven to be quite popular among "social, political, diplomatic and business elites."To read this article in full or to leave a comment, please click here

Here’s how we celebrate Pi Day during a blizzard

Yes, the Blizzard of 2017 on the east coast did foil our plan to stream our inaugural Pi Day Challenge live on Facebook and YouTube (we recorded it on Monday instead), but it did not kill our creativity. I submit the Pi Day driveway snow art display. Bob Brown/NetworkWorld Pi Day snow art featuring artist exhausted from shovelingTo read this article in full or to leave a comment, please click here

Google Hangouts won’t disappear for consumers despite enterprise focus

While Google Hangouts is making a shift to serve enterprise users, it won’t be vanishing for consumers.Last week, the company announced that it would be splitting the chat and videoconferencing service into Hangouts Meet and Hangouts Chat, which raised questions about what would happen for those people who still use it in their personal lives.Consumers will still be able to access Hangouts using their personal Google accounts. Hangouts will still appear in the Gmail sidebar on the desktop, even after it splits into Chat and Meet, according to Scott Johnston, director of product management for Hangouts.To read this article in full or to leave a comment, please click here

AWS follows Google with Reserved Instance flexibility changes

Customers who have Reserved Instance contracts with Amazon Web Services will be able to subdivide some of their Linux and Unix virtual machine instances while maintaining their capacity discounts, thanks to pricing changes announced Monday.Reserved Instances allow customers to lock themselves into paying AWS for a certain amount of compute capacity with the company's Elastic Compute Cloud (EC2) in exchange for a discount off its list price. To read this article in full or to leave a comment, please click here