New products of the week 2.13.17

New products of the weekImage by ZenossOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.USM AnywhereImage by alienvaultTo read this article in full or to leave a comment, please click here

New products of the week 2.13.17

New products of the weekImage by ZenossOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.USM AnywhereImage by alienvaultTo read this article in full or to leave a comment, please click here

How San Diego fights off 500,000 cyberattacks a day

Nearly 27 years of network and cybersecurity experience with the Department of Defense didn’t prepare Gary Hayslip for the collection of disparate technologies he encountered when he joined the city of San Diego. “Cities don't get rid of anything. If it works, why get rid of it? So you end up having a lot of diverse technologies connected together. You may have something that's 15 years old connected to stuff that's state of the art,” says Hayslip, whose DoD tenure included 20 years of active-duty military service and seven years working in civil service for the military. “Police cars, ambulances, libraries, water treatment facilities, golf courses … One of the things you learn real quickly: the city of San Diego is $4 billion business. And cities don’t shut down. They run 24/7,” he says. “My almost 27 years in DoD did not prepare me for how interesting city networks are."To read this article in full or to leave a comment, please click here(Insider Story)

10 super-user tricks to boost Windows 10 productivity

Whether you love it or hate it, Windows 10 is here to stay. Unlike previous versions of Windows, there are fewer readily apparent differences between versions. In other words, the Professional version looks a lot like the Home version and it can take some digging to figure out how to leverage the advanced features of Pro.To read this article in full or to leave a comment, please click here(Insider Story)

REVIEW: Windows 10 Yoga Book: The good, the bad, the useful

Lenovo has introduced tablets with unique designs over the years, and their latest Yoga Book, released in October, is one of the most intriguing examples. This hybrid device looks like a mini notebook, but it’s technically a tablet with a swing-open digital drawing and writing pad that can capture your handwriting or sketching when you use its included digital pen.To read this article in full or to leave a comment, please click here(Insider Story)

REVIEW: Windows 10 Yoga Book: The good, the bad, the useful

Lenovo has introduced tablets with unique designs over the years, and their latest Yoga Book, released in October, is one of the most intriguing examples. This hybrid device looks like a mini notebook, but it’s technically a tablet with a swing-open digital drawing and writing pad that can capture your handwriting or sketching when you use its included digital pen.To read this article in full or to leave a comment, please click here(Insider Story)

Expert: Line between cyber crooks and cyber spies getting more blurry

Cybercriminals acting on behalf of national governments and nation-backed espionage agents carrying out cybercrimes for cash on the side is the future of security threats facing corporations and governments, says the former top U.S. attorney in charge of the Department of Justice’s national security division. Morrison & Foerster John Carlin “I think this blending of criminal and national security, whether it’s terrorists or state actors moonlighting as crooks or state actors using criminal groups as a way to distance themselves from the action, I think that is a trend that we saw increasing that’s just going to continue to increase over the next three to five years,” says John Carlin, now an attorney with Morrison & Foerster.To read this article in full or to leave a comment, please click here

Expert: Line between cyber crooks and cyber spies getting more blurry

Cybercriminals acting on behalf of national governments and nation-backed espionage agents carrying out cybercrimes for cash on the side is the future of security threats facing corporations and governments, says the former top U.S. attorney in charge of the Department of Justice’s national security division. Morrison & Foerster John Carlin “I think this blending of criminal and national security, whether it’s terrorists or state actors moonlighting as crooks or state actors using criminal groups as a way to distance themselves from the action, I think that is a trend that we saw increasing that’s just going to continue to increase over the next three to five years,” says John Carlin, now an attorney with Morrison & Foerster.To read this article in full or to leave a comment, please click here

Intel, McAfee dispute heads for settlement talks

A dispute between Intel and security expert John McAfee over the use of his name for another company is headed for settlement talks, according to court records.The move comes shortly after the federal court refused John McAfee and MGT Capital Investments, the company to be renamed, a preliminary injunction on Intel’s transfer of marks and related assets containing the word McAfee, as part of a proposed spin-out by the chipmaker of its security business as a separate company that would be called McAfee.The chip company said in September it had signed the agreement with TPG to set up a cybersecurity company in which Intel shareholders would hold 49 percent of the equity with the balance held by the investment firm.To read this article in full or to leave a comment, please click here

Intel, McAfee dispute heads for settlement talks

A dispute between Intel and security expert John McAfee over the use of his name for another company is headed for settlement talks, according to court records.The move comes shortly after the federal court refused John McAfee and MGT Capital Investments, the company to be renamed, a preliminary injunction on Intel’s transfer of marks and related assets containing the word McAfee, as part of a proposed spin-out by the chipmaker of its security business as a separate company that would be called McAfee.The chip company said in September it had signed the agreement with TPG to set up a cybersecurity company in which Intel shareholders would hold 49 percent of the equity with the balance held by the investment firm.To read this article in full or to leave a comment, please click here

Promoting digital accessibility: For persons with disabilities, with persons with disabilities

The United Nations estimates that one in six people (in Asia and the Pacific) live with disability – that is a total of 650 million people. Persons with Disabilities (PWDs) often face barriers that restrict them from participating in society on an equal basis, including the access to, and use of, information and communication technologies (ICTs).

Mr. Naveed Haq

How to watch the Grammy Awards on your iPhone or iPad

This Sunday, Feb. 12 will be a huge night for horror on TV: AMC's The Walking Dead returns at 9PM EST after its mid-season hiatus and the 59th Grammy Awards program in all its self-congratulatory glory kicks off at 8PM EST from Los Angeles. (Though I suppose last Sunday was an even bigger night of horror for those rooting against the New England Patriots in the Super Bowl...)Adele, Beyonce, Justin Bieber, Drake and Sturgill Simpson are all looking to win Record of the Year, while Chuck D, Jack White and Kelly Clarkson will be among performers during the Grammy show. Ample attention will no doubt be given as well to honoring the many famous musicians, such as Prince and David Bowie, who died last year. Late night talk show host and carpool karaoke crooner James Corden emcees the program.To read this article in full or to leave a comment, please click here

University attacked by its own vending machines, smart light bulbs & 5,000 IoT devices

Today’s cautionary tale comes from Verizon’s sneak peek (pdf) of the 2017 Data Breach Digest scenario. It involves an unnamed university, seafood searches, and an IoT botnet; hackers were using the university’s own vending machines and other IoT devices to attack the university’s network.Since the university’s help desk had previously blown off student complaints about slow or inaccessible network connectivity, it was a mess by the time a senior member of the IT security team was notified. The incident is given from that team member’s perspective; he or she suspected something fishy after detecting a sudden big interest in seafood-related domains.To read this article in full or to leave a comment, please click here

University attacked by its own vending machines, smart light bulbs & 5,000 IoT devices

Today’s cautionary tale comes from Verizon’s sneak peek (pdf) of the 2017 Data Breach Digest scenario. It involves an unnamed university, seafood searches, and an IoT botnet; hackers were using the university’s own vending machines and other IoT devices to attack the university’s network.Since the university’s help desk had previously blown off student complaints about slow or inaccessible network connectivity, it was a mess by the time a senior member of the IT security team was notified. The incident is given from that team member’s perspective; he or she suspected something fishy after detecting a sudden big interest in seafood-related domains.To read this article in full or to leave a comment, please click here

Research: BBR: Congestion-Based Congestion Control – ACM Queue

The BBR algorithm appears to be building critical mass of support in the Internet community which makes reading this research paper even more worthwhile.

When bottleneck buffers are small, loss- based congestion control misinterprets loss as a signal
of congestion, leading to low throughput. Fixing these problems requires an alternative to loss-based congestion control. Finding this alternative requires an understanding of where and how network congestion originates.

BBR: Congestion-Based Congestion Control – ACM Queue : http://queue.acm.org/detail.cfm?id=3022184

The post Research: BBR: Congestion-Based Congestion Control – ACM Queue appeared first on EtherealMind.

Opinion – Vendors Please Stop the Mud Slinging!

I’m not known for going on rants but lately I’ve been seeing a lot of stupid tweets from vendors that have really bothered me. So today I’ll give my best Tom Hollingsworth “networkingnerd” impression and tell you what’s on my mind. To give you an example what the vendor marketing teams are putting out there I give you this piece of work:

NSX marketing tweet
NSX marketing tweet

At first it seems a bit cute and funny. Oh look! It’s Star Wars! All nerds love Star Wars! I do too, just to be clear. What this kind of marketing does though is to dumb down the customers. It insults my intelligence as a Network Architect. Hardware still matters. There still is a physical world. Almost all projects in networking has some kind of existing network so almost all deployments are going to be brownfield to some extent. Please show me the organization that does not have an existing network and is going to deploy something like NSX or ACI for their first network. Please show me the organization that has no legacy systems or applications. Please show me the organization that develops and owns all of their applications and they are all nicely Continue reading