A cybersecurity risk assessment is a critical part of M&A due diligence  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  As of mid-February, the plan for Verizon Communications to acquire a majority of Yahoo’s web assets is still on, despite the announcement of Yahoo having suffered two massive breaches of customer data in 2013 and 2014. The sale price, however, has been discounted by $350 million, and Verizon and Altaba Inc. have agreed to share any ongoing legal responsibilities related to the breaches. Altaba is the entity that will own the portion of Yahoo that Verizon is not acquiring.To read this article in full or to leave a comment, please click here

A cybersecurity risk assessment is a critical part of M&A due diligence  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  As of mid-February, the plan for Verizon Communications to acquire a majority of Yahoo’s web assets is still on, despite the announcement of Yahoo having suffered two massive breaches of customer data in 2013 and 2014. The sale price, however, has been discounted by $350 million, and Verizon and Altaba Inc. have agreed to share any ongoing legal responsibilities related to the breaches. Altaba is the entity that will own the portion of Yahoo that Verizon is not acquiring.To read this article in full or to leave a comment, please click here

String of fileless malware attacks possibly tied to single hacker group

Several attacks observed over the past few months that rely heavily on PowerShell, open-source tools, and fileless malware techniques might be the work of a single group of hackers.An investigation started by security researchers from Morphisec into a recent email phishing attack against high-profile enterprises pointed to a group that uses techniques documented by several security companies in seemingly unconnected reports over the past two months."During the course of the investigation, we uncovered a sophisticated fileless attack framework that appears to be connected to various recent, much-discussed attack campaigns," Michael Gorelik, Morphisec's vice president of research and development, said in a blog post. "Based on our findings, a single group of threat actors is responsible for many of the most sophisticated attacks on financial institutions, government organizations, and enterprises over the past few months."To read this article in full or to leave a comment, please click here

String of fileless malware attacks possibly tied to single hacker group

Several attacks observed over the past few months that rely heavily on PowerShell, open-source tools, and fileless malware techniques might be the work of a single group of hackers.An investigation started by security researchers from Morphisec into a recent email phishing attack against high-profile enterprises pointed to a group that uses techniques documented by several security companies in seemingly unconnected reports over the past two months."During the course of the investigation, we uncovered a sophisticated fileless attack framework that appears to be connected to various recent, much-discussed attack campaigns," Michael Gorelik, Morphisec's vice president of research and development, said in a blog post. "Based on our findings, a single group of threat actors is responsible for many of the most sophisticated attacks on financial institutions, government organizations, and enterprises over the past few months."To read this article in full or to leave a comment, please click here

Dutch researchers pull almost 43Gbit per second over a ray of light

An experiment by scholars at the Eindhoven University of Technology in the Netherlands has demonstrated a wireless network based on infrared rays that can move data at speeds of 42.8Gbps.The system, which is the work of new Ph.D recipient Joanne Oh, uses light “antennas,” which don’t have any moving parts, translating signals from a fiber-optic cable into infrared light and beaming them to receivers in the same room, which can be tracked by their return signals – when a user’s device moves out of one beam’s area of function, another light antenna can take over.+ALSO ON NETWORK WORLD: Cisco security advisory dump finds 20 warnings, 2 critical + Raspberry Pi roundup: Pi Day, Remembrances of Pis Past, competitor corner, STEM and SKULLSTo read this article in full or to leave a comment, please click here

Dutch researchers pull almost 43Gbit per second over a ray of light

An experiment by scholars at the Eindhoven University of Technology in the Netherlands has demonstrated a wireless network based on infrared rays that can move data at speeds of 42.8Gbps.The system, which is the work of new Ph.D recipient Joanne Oh, uses light “antennas,” which don’t have any moving parts, translating signals from a fiber-optic cable into infrared light and beaming them to receivers in the same room, which can be tracked by their return signals – when a user’s device moves out of one beam’s area of function, another light antenna can take over.+ALSO ON NETWORK WORLD: Cisco security advisory dump finds 20 warnings, 2 critical + Raspberry Pi roundup: Pi Day, Remembrances of Pis Past, competitor corner, STEM and SKULLSTo read this article in full or to leave a comment, please click here

Rough Guide to IETF 98 — In The Loop: IETF Heads to Chicago

It’s almost here! Pack your bags (or start your remote participation browser) and get ready for IETF 98! Starting on Sunday, 26 March, the Internet Engineering Task Force will be in Chicago, Illinois, where about 1000 engineers will spend a week discussing the latest issues in open standards and protocols. As usual, the agenda is packed, and the Internet Society is providing a ‘Rough Guide’ to the IETF via a series of blog posts on topics of mutual interest:

Mr. Olaf Kolkman

Open Hardware Pushes GPU Computing Envelope

The hyperscalers of the world are increasingly dependent on machine learning algorithms for providing a significant part of the user experience and operations of their massive applications, so it is not much of a surprise that they are also pushing the envelope on machine learning frameworks and systems that are used to deploy those frameworks. Facebook and Microsoft were showing off their latest hybrid CPU-GPU designs at the Open Compute Summit, and they provide some insight into how to best leverage Nvidia’s latest “Pascal” Tesla accelerators.

Not coincidentally, the specialized systems that have been created for supporting machine learning workloads

Open Hardware Pushes GPU Computing Envelope was written by Timothy Prickett Morgan at The Next Platform.

Why great chief data officers are hard to find

Chief data officers (CDOs) are among the most highly sought-after executives among corporations for whom data analytics has become a cornerstone of digital strategies. But the rush to promote data-crunching experts to the CDO role has created a new challenge: Finding a leader who can use data to help drive a business transformation.Companies eager to establish data analytics have promoted managers to the CDO role based on their technical wizardry rather than their leadership capabilities, says Joshua Clarke, partner for executive recruiter Heidrick & Struggles, who highlighted the problem in "Choosing the right chief data officer," a new report detailing the rapid evolution of the CDO role.To read this article in full or to leave a comment, please click here

DARPA wants to cultivate the ultimate transistor of the future

Researchers with the Defense Advanced Research Projects Agency will this month present a program that looks to develop a new generation of radiofrequency (RF) and millimeter-wave transistors to address the power and range requirements for billions of wirelessly communicating devices in everything from unmanned aircraft and home appliances to sensors and smartphones.+More on Network World: DARPA plan would reinvent not-so-clever machine learning systems+“The same basic transistor types have been dominant since their invention and we have been engineering the heck out of them for 50 years,” said Dan Green, a program manager in DARPA’s Microsystems Technology Office (MTO) and the overseer of the forthcoming Dynamic Range-enhanced Electronics and Materials (DREaM) program. “We’ve gotten a lot out of that approach, but the focus on so few types of transistor technologies and just a few semiconductor materials also has fundamentally limited us in the RF world.”To read this article in full or to leave a comment, please click here

DARPA wants to cultivate the ultimate transistor of the future

Researchers with the Defense Advanced Research Projects Agency will this month present a program that looks to develop a new generation of radiofrequency (RF) and millimeter-wave transistors to address the power and range requirements for billions of wirelessly communicating devices in everything from unmanned aircraft and home appliances to sensors and smartphones. +More on Network World: DARPA plan would reinvent not-so-clever machine learning systems+ “The same basic transistor types have been dominant since their invention and we have been engineering the heck out of them for 50 years,” said Dan Green, a program manager in DARPA’s Microsystems Technology Office (MTO) and the overseer of the forthcoming Dynamic Range-enhanced Electronics and Materials (DREaM) program. “We’ve gotten a lot out of that approach, but the focus on so few types of transistor technologies and just a few semiconductor materials also has fundamentally limited us in the RF world.”To read this article in full or to leave a comment, please click here

Slack channel names can be written in more languages

Slack’s international customers are now able to set channel names in their native tongue, thanks to an update the group chat service rolled out Thursday. According to an in-app bulletin, users will be able to set up rooms to discuss work and other topics using a wider variety of characters. As a result, users can name channels in Japanese, German, French and a wide variety of other languages. It’s an improvement over Slack’s previous set of heavy restrictions on channel names. The news comes the same week that Microsoft released its competing Teams group chat app to Office 365 customers worldwide. At launch, Microsoft touted that the service supports 19 languages, and a test of its channel creation feature shows that it at least supports channel names using Japanese Hiragana, Simplified Chinese and Cyrillic characters.To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For March 17th, 2017

Hey, it's HighScalability time:

 

Can it be a coincidence trapping autonomous cars is exactly how demons are trapped on Supernatural?

If you like this sort of Stuff then please support me on Patreon.

  • billion billion: exascale operations per second; 250ms: connection time saved by zero round trip time resumption; 800 Million: tons of prey eaten by spiders; 90%: accuracy of quantum computer recognizing trees; 80 GB/s: S3 across 2800 simultaneous functions;

  • Quotable Quotes:
    • @GossiTheDog: Here's something to add to your security threat model: backups. Why steal live data and when you can drive away with exact replica?
    • @ThePublicSquare: "California produces 160% of its 1990 manufacturing, but with just 60% of the workers." -@uclaanderson economist Jerry Nickelsburg
    • @rbranson: makes total sense. I have a friend (who is VC-backed) that has stuff in Azure, GCloud, and AWS to maximize the free credits.
    • @AndrewYNg: If not for US govt funding (DARPA, NSF), US wouldn't be an AI leader today. Proposed cuts to science is big step in wrong direction.
    • @CodeWisdom: "To understand a program you must become both the machine and the program." - Alan Perlis 
    • @codemanship: What does it take Continue reading

Social media companies have a month to update service terms in the EU

Facebook, Twitter and Google have been given a month to make changes to their user agreements in the European Union or face "enforcement action."European consumer authorities put the social media services on notice last November that their terms of service did not comply with EU law, asked them to make changes and to address the problem of scams that misled users of the services.The authorities and the European Commission met with the companies on Thursday to discuss their proposed changes, and gave them a month to make their final proposals, the European Commission said Friday. If those proposals don't satisfy the authorities, then they could take enforcement action, the Commission said.To read this article in full or to leave a comment, please click here