How to set up two-factor authentication for your Apple ID and iCloud account

If you aren’t using two-factor authentication to protect your Apple ID and iCloud account, you really should do it today. Hackers who claim to have millions of stolen iCloud credentials are demanding Apple pay a ransom or they’ll release them—and ZDNet obtained a sample set of credentials and determined they’re real.But guess what? Using two-factor authentication should protect you completely. It’s easy to set up, so take a minute and do it now.To read this article in full or to leave a comment, please click here

How to set up two-factor authentication for your Apple ID and iCloud account

If you aren’t using two-factor authentication to protect your Apple ID and iCloud account, you really should do it today. Hackers who claim to have millions of stolen iCloud credentials are demanding Apple pay a ransom or they’ll release them—and ZDNet obtained a sample set of credentials and determined they’re real.But guess what? Using two-factor authentication should protect you completely. It’s easy to set up, so take a minute and do it now.To read this article in full or to leave a comment, please click here

To punish Symantec, Google may distrust a third of the web’s SSL certificates

Google is considering a harsh punishment for repeated incidents in which Symantec or its certificate resellers improperly issued SSL certificates. A proposed plan is to force the company to replace all of its customers’ certificates and to stop recognizing the extended validation (EV) status of those that have it.According to a Netcraft survey from 2015, Symantec is responsible for about one in every three SSL certificates used on the web, making it the largest commercial certificate issuer in the world. As a result of acquisitions over the years the company now controls the root certificates of several formerly standalone certificate authorities including VeriSign, GeoTrust, Thawte and RapidSSL.To read this article in full or to leave a comment, please click here

To punish Symantec, Google may distrust a third of the web’s SSL certificates

Google is considering a harsh punishment for repeated incidents in which Symantec or its certificate resellers improperly issued SSL certificates. A proposed plan is to force the company to replace all of its customers’ certificates and to stop recognizing the extended validation (EV) status of those that have it.According to a Netcraft survey from 2015, Symantec is responsible for about one in every three SSL certificates used on the web, making it the largest commercial certificate issuer in the world. As a result of acquisitions over the years the company now controls the root certificates of several formerly standalone certificate authorities including VeriSign, GeoTrust, Thawte and RapidSSL.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Holding your WLAN accountable with service-level expectations

In my last post, “#WirelessSucks: Where do we go from here?” I talked about the need for better insight into the root cause of network problems. All too often, the Wi-Fi infrastructure is blamed for bad network connectivity when, in fact, the wired network (e.g. DNS, DHCP, etc.) and/or the mobile devices may be equally at fault. I identified four components that are required to accurately and easily address this problem: Monitoring networks at a service level Real-time visibility into the state of every wireless user A cloud infrastructure to store and analyze real-time state information and aggregate it to the highest level of commonality Machine learning to automate key operational tasks, such as event correlation and packet captures Let’s go into more detail on the first of these requirements: service-level monitoring and enforcement.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Holding your WLAN accountable with service-level expectations

In my last post, “#WirelessSucks: Where do we go from here?” I talked about the need for better insight into the root cause of network problems. All too often, the Wi-Fi infrastructure is blamed for bad network connectivity when, in fact, the wired network (e.g. DNS, DHCP, etc.) and/or the mobile devices may be equally at fault. I identified four components that are required to accurately and easily address this problem: Monitoring networks at a service level Real-time visibility into the state of every wireless user A cloud infrastructure to store and analyze real-time state information and aggregate it to the highest level of commonality Machine learning to automate key operational tasks, such as event correlation and packet captures Let’s go into more detail on the first of these requirements: service-level monitoring and enforcement.To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For March 24th, 2017

Hey, it's HighScalability time:

 This is real and oh so eerie. Custom microscope takes a 33 hour time lapse of a tadpole egg dividing.

If you like this sort of Stuff then please support me on Patreon.

  • 40Gbit/s: indoor optical wireless networks; 15%: energy produced by wind in Europe; 5: new tasty particles; 2000: Qubits are easy; 30 minutes: flight time for electric helicopter; 42.9%: of heathen StackOverflowers prefer tabs;

  • Quotable Quotes:
    • @RichRogersIoT: "Did you know? The collective noun for a group of programmers is a merge-conflict." - @omervk
    • @tjholowaychuk: reviewed my dad's company AWS expenses, devs love over-provisioning, by like 90% too, guess that's where "serverless" cost savings come in
    • @karpathy: Nature is evolving ~7 billion ~10 PetaFLOP NI agents in parallel, and has been for ~10M+s of years, in a very realistic simulator. Not fair.
    • @rbranson: This is funny, but legit. Production software tends to be ugly because production is ugly. The ugliness outpaces our ability to abstract it.
    • @joeweinman: @harrietgreen1 : Watson IoT center opened in Munich... $200 million dollar investment; 1000 engineers #ibminterconnect
    • David Gerard: This [IBM Blockchain Service] is bollocks all the way down.
    • digi_owl Continue reading

62% off Anker PowerLine+ Micro USB 6ft Premium Cable – Deal Alert

With this cable, Anker boasts reinforced stress points with a 10000+ bend lifespan, double-braided nylon exterior and toughened aramid fiber core, laser-welded connectors and a worry-free 18-month warranty. The micro-USB cord is a generous 6 feet in length. Its list price on Amazon is currently discounted to just $10.99. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Moto G5 Plus underscores why the iPhone 8 needs AR

Hands-on testing of Motorola's Moto G5 Plus drives home the point that Apple’s next-generation iPhone better have augmented reality (AR) to retain loyal customers willing to pay three times the cost of the G5 Plus.The next iPhone has to do something significantly different to maintain its premium brand position. AR and perhaps virtual reality (VR) are the only two features on the horizon that will meaningfully differentiate the iPhone 8 from the Moto G5 Plus.Moto G5 Plus features Sometimes smartphone reviews read like an oenophile waxing on about the subtleties of a fine wine. This review will not because the Moto G5 Plus designers deliver on four characteristics consumers want.To read this article in full or to leave a comment, please click here

Rapid GPU Evolution at Chinese Web Giant Tencent

Like other major hyperscale web companies, China’s Tencent, which operates a massive network of ad, social, business, and media platforms, is increasingly reliant on two trends to keep pace.

The first is not surprising—efficient, scalable cloud computing to serve internal and user demand. The second is more recent and includes a wide breadth of deep learning applications, including the company’s own internally developed Mariana platform, which powers many user-facing services.

When the company introduced its deep learning platform back in 2014 (at a time when companies like Baidu, Google, and others were expanding their GPU counts for speech and

Rapid GPU Evolution at Chinese Web Giant Tencent was written by Nicole Hemsoth at The Next Platform.

It’s Personal

<soapbox>

One of the odd things about my job is that I often get to meet people I or someone in my company has written or podcasted about. That might be via a direct mention or an indirect one. For example, my company might cover a product and offer some commentary on it–indirect. We might mention a specific company in a positive or negative light, depending on our opinion–indirect. We might mention specific people if there is a good reason to do so–direct.

Meeting people we’ve talked about, directly or not, brings a poignant perspective to creating content for a wide audience. It’s personal. Somebody made a decision to create the product that way. Some group of humans worked on that standard. Real people decided on that process.

Is it appropriate to cast those people in a negative light and share that opinion with an audience? Sometimes…yes, at times even crucially necessary, if unfortunate. Sometimes…maybe not. Sometimes it’s okay to shut up. To show restraint. To chain the snark monster.

Stirring the pot can be fun. Yelling into a righteous megaphone about where the nasty thing hurt you feels empowering. But it’s only half of the equation. It’s the half that you see. You had a bad experience. You Continue reading

RingCentral aims to unify ‘unified communications’

I started my career as an analyst in 2001, and one of the first reports I wrote was on the topic of “unified communications,” or UC as it’s more commonly called today. The concept is pretty simple: Workers use lots of communications tools, so why not bring them together into a single, easy-to-use tool? Makes sense, doesn’t it? However, a funny thing has happened over the past 15 years. In an effort to give workers more functionality, many specialty UC vendors popped up. I understand the term “specialty UC” is somewhat of an oxymoron, but this is the state of the industry because we now have UC vendors for video, web conferencing, chat, audio conferencing, VoIP, document sharing, file storage and the list goes on. To read this article in full or to leave a comment, please click here

Do Network Professionals Need To Be Programmers?

With the advent of software defined networking (SDN) and the move to incorporate automation, orchestration, and extensive programmability into modern network design, it could easily be argued that programming is a must-have skill. Many networking professionals are asking themselves if it’s time to pick up Python, Ruby or some other language to create programs in the network. But is it a necessity?

Interfaces In Your Faces

The move toward using API interfaces is one of the more striking aspects of SDN that has been picked up quickly. Instead of forcing information to be input via CLI or information to be collected from the network via scraping the same CLI, APIs have unlocked more power than we ever imagined. RESTful APIs have giving nascent programmers the ability to query devices and push configurations without the need to learn cumbersome syntax. The ability to grab this information and feed it to a network management system and analytics platform has extended the capabilites of the systems that support these architectures.

The syntaxes that power these new APIs aren’t the copyrighted CLIs that networking professionals spend their waking hours memorizing in excruciating detail. JUNOS and Cisco’s “standard” CLI are as much relics of the Continue reading

Review: Canary Flex security camera lives up to its name

Canary’s initial foray into the networked home security camera space was very impressive – my colleague David Newman touted its high security settings in the wake of revelations about the general insecurity of these types of devices. The Canary camera was also somewhat large – a cylindrical tower that took up some significant space on your desk, cabinet or shelf.The latest camera the company sent me is the Canary Flex, a much smaller unit meant to be more flexible (hence the name) in terms of placement, but also in power options. Like the Arlo Pro camera, the Canary Flex is powered by an internal battery (it’s charged via USB cable and power adapter). This means you can move the Flex to a location inside or outside your home where there’s no power outlet. The Flex comes with wall mounting screws and a 360-degree magnetic stand so you can position the camera in different spots. Additional accessories, such as a plant mount or twist mount (pictured below), offer even more location choices.To read this article in full, please click here