New $29 Pine64 computer takes on Raspberry Pi Compute Module 3

Raspberry Pi's new Compute Module 3 has serious competition coming its way from the maker of the Pine64 board computer.The new SOPINE A64 64-bit computing module is a smaller version of the popular US$15 Pine64 computer.It was announced the same week as the Raspberry Pi Compute Module 3, which is a smaller version of the popular namesake board, was released.At $29, the SOPINE A64 roughly matches the price of the Raspberry Pi Compute Module 3, which ranges from $25 to $30. The new SOPINE will ship in February, according to the website.The SOPINE A64 can't operate as a standalone computer like the Pine64. It needs to be plugged in as a memory slot inside a computer.To read this article in full or to leave a comment, please click here

Fraud for online holiday sales spikes by 31%

Fraud attempts on digital retail sales jumped 31% from Thanksgiving to Dec. 31 over the previous year, according to a survey of purchasing data from ACI Worldwide.The fraud increase was based on hundreds of millions of online transactions with major merchants globally. Also, the number of e-commerce transactions grew by 16% for the same period, ACI said.Some of the fraud attempts came from the use of credit card numbers purchased in underground chat channels, ACI said.“Given the consistent and alarming uptick in fraudulent activity on key dates, merchants must be proactive in their efforts to identify weak spots and define short and long-term strategies for improved security and enhanced customer experience,” said Markus Rinderer, senior vice president of platform solutions at ACI.To read this article in full or to leave a comment, please click here

Fraud for online holiday sales spikes by 31%

Fraud attempts on digital retail sales jumped 31% from Thanksgiving to Dec. 31 over the previous year, according to a survey of purchasing data from ACI Worldwide.The fraud increase was based on hundreds of millions of online transactions with major merchants globally. Also, the number of e-commerce transactions grew by 16% for the same period, ACI said.Some of the fraud attempts came from the use of credit card numbers purchased in underground chat channels, ACI said.“Given the consistent and alarming uptick in fraudulent activity on key dates, merchants must be proactive in their efforts to identify weak spots and define short and long-term strategies for improved security and enhanced customer experience,” said Markus Rinderer, senior vice president of platform solutions at ACI.To read this article in full or to leave a comment, please click here

This is what the first iPhone protoype software looked like

With the iPhone celebrating its 10-year anniversary last week, there have been quite a number of interesting stories highlighting just how impactful Apple's iconic smartphone has been. While there's no denying that the iPhone helped create the modern day smartphone market as we know it, it's just as remarkable that the iPhone has remained the "smartphone to beat" for nearly a decade now.As time has marched on, we've slowly but surely learned more about the process that led to the iPhone's creation. As is well known now, Steve Jobs during the early iPhone development days tasked two separate teams to come up with varying iPhone designs. One such design was to be based on the iPod's clickwheel, while the other was designed to be a touchscreen running a variant of OS X. Ultimately, Apple wisely opted to go with the latter design.To read this article in full or to leave a comment, please click here

AMD talks tough as it drums up support for 32-core Zen server chip

At CES, AMD launched its first Zen chips for PCs, called Ryzen. Next on deck is the 32-core server chip code-named Naples, which will ship in the coming months.Naples doesn't have an official name yet, but the expectations are high. While Ryzen is set up for success in PCs, it's a different story for Naples, which has to take on Intel's juiced-up Xeon chips, which are used in most servers today.AMD is trying to drum up excitement for Naples, which will be released in the first half of this year. It's promoting Naples using the same tactic as it did for Ryzen -- by talking about the performance benefits of the Zen CPU.The Zen CPU core in Naples will provide the same performance benefits as in the Ryzen chips. AMD claims a 40 percent improvement in instructions per cycle, an important metric to measure CPU performance, compared to the company's previous Excavator architecture.To read this article in full or to leave a comment, please click here

Failure to patch known ImageMagick flaw for months costs Facebook $40k

It's not common for a security-conscious internet company to leave a well-known vulnerability unpatched for months, but it happens. Facebook paid a US$40,000 reward to a researcher after he warned the company that its servers were vulnerable to an exploit called ImageTragick.ImageTragick is the name given by the security community to a critical vulnerability that was found in the ImageMagick image processing tool back in May.ImageMagick is a command-line tool that can resize, convert and optimize images in many formats. Web server libraries like PHP’s imagick, Ruby’s rmagick and paperclip, and Node.js’s imagemagick, used by millions of websites, are based on it.To read this article in full or to leave a comment, please click here

Failure to patch known ImageMagick flaw for months costs Facebook $40k

It's not common for a security-conscious internet company to leave a well-known vulnerability unpatched for months, but it happens. Facebook paid a US$40,000 reward to a researcher after he warned the company that its servers were vulnerable to an exploit called ImageTragick.ImageTragick is the name given by the security community to a critical vulnerability that was found in the ImageMagick image processing tool back in May.ImageMagick is a command-line tool that can resize, convert and optimize images in many formats. Web server libraries like PHP’s imagick, Ruby’s rmagick and paperclip, and Node.js’s imagemagick, used by millions of websites, are based on it.To read this article in full or to leave a comment, please click here

Tier 1, Tier 2 and Tier 3 Service Providers

Tier 1,Tier 2 and Tier 3 Service Providers What is tier in the first place ? If you are dealing with Service Provider networks, you hear this term a lot. But how we define Tier 1,Tier 2 and Tier 3 Service Providers ? What should be their infrastructure to be seen as Tier 1 for example […]

The post Tier 1, Tier 2 and Tier 3 Service Providers appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

US alleges systemic employment discrimination at Oracle

The U.S. government says Oracle routinely and systemically pays white men more than women and minorities and that it favors Asian candidates over others in product development and technical roles.The allegations are contained in a lawsuit filed by the Department of Labor that represents the results of a two-year investigation into hiring practices at the Silicon Valley company.The investigation was triggered by a regular compliance review by the government. As a federal contractor, Oracle is prohibited from engaging in discrimination based on race, sex, sexual orientation, gender identity, or national origin.As a result, Oracle stands to lose millions of dollars in federal contracts if the Labor Department can prove its case and the company doesn't change its ways.To read this article in full or to leave a comment, please click here

Modern warfare: Death-dealing drones and … illegal parking?

A cloud of 3D-printed drones big enough to bring down the latest U.S. stealth fighter, the F35, was just one of the combat scenarios evoked in a discussion of the future of warfare at the World Economic Forum in Davos on Wednesday.Much of the discussion focused on the changes computers are bringing to the battlefield, including artificial intelligence and autonomous systems -- but also the way the battlefield is coming to computing, with cyberwar, and social media psyops an ever more real prospect.Former U.S. Navy fighter pilot Mary Cummings, now director of the Humans and Autonomy Lab at Duke University, delivered the first strike."The barrier to entry to drone technology is so low that everyone can have one, and if the Chinese go out and print a million copies of a drone, a very small drone, and put those up against an F35 and they go into the engine, you basically obviate what is a very expensive platform," she said.To read this article in full or to leave a comment, please click here

Modern warfare: Death-dealing drones and … illegal parking?

A cloud of 3D-printed drones big enough to bring down the latest U.S. stealth fighter, the F35, was just one of the combat scenarios evoked in a discussion of the future of warfare at the World Economic Forum in Davos on Wednesday.Much of the discussion focused on the changes computers are bringing to the battlefield, including artificial intelligence and autonomous systems -- but also the way the battlefield is coming to computing, with cyberwar, and social media psyops an ever more real prospect.Former U.S. Navy fighter pilot Mary Cummings, now director of the Humans and Autonomy Lab at Duke University, delivered the first strike."The barrier to entry to drone technology is so low that everyone can have one, and if the Chinese go out and print a million copies of a drone, a very small drone, and put those up against an F35 and they go into the engine, you basically obviate what is a very expensive platform," she said.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 3 tips to improve threat detection and incident response

No matter the height or thickness of any wall you might try to build, the unfortunate reality is someone will most likely be able to breach it. It’s really just a matter of when and how.Just as you close your doors and windows when you leave the house, you need  preventative security measures in place to protect your systems. However, these measures themselves are not enough. If you assume the bad guys will find a way to breach your protective walls, it makes more sense to focus on threat detection and incident response as ways to mitigate damage when the inevitable breach occurs.3 security controls to improve threat detection The following three security controls are surefire ways to strengthen the detective capabilities of your system.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 3 tips to improve threat detection and incident response

No matter the height or thickness of any wall you might try to build, the unfortunate reality is someone will most likely be able to breach it. It’s really just a matter of when and how.Just as you close your doors and windows when you leave the house, you need  preventative security measures in place to protect your systems. However, these measures themselves are not enough. If you assume the bad guys will find a way to breach your protective walls, it makes more sense to focus on threat detection and incident response as ways to mitigate damage when the inevitable breach occurs.3 security controls to improve threat detection The following three security controls are surefire ways to strengthen the detective capabilities of your system.To read this article in full or to leave a comment, please click here

The state of the IT contractor job market in 2017

In 2017, strong demand for IT talent will continue in several roles and industries. Understanding how to wring business value from vast stores of data, knowing how to protect that data from increasingly sophisticated threats and navigating the murky waters of freelancing will characterize the tech job market.To read this article in full or to leave a comment, please click here(Insider Story)