10 offbeat trackers and wacky wearables

10 offbeat trackers and wacky wearables Image by CIOAre you feeling worn out by wearables? Can’t stand the thought of strapping yet another heart-rate-sensing, step-counting, sleep-tracking watch around your wrist? I feel your pain. As someone who frequently reviews activity trackers, I don’t often see bold new features in mainstream devices. But if you look closely at small startups around the globe, you’ll start to notice some cool, slightly crazy, definitely out-there devices that go far beyond counting steps. Some of the claims these device developers make will likely make your eyes roll. Nonetheless, here are 10 wacky wearables and oddball devices that may also pique your curiosity.To read this article in full or to leave a comment, please click here

Google makes AI talent play with Kaggle buy

If you're a company entrenched in an arms race for artificial intelligence (AI) technologies, you could do worse than tapping into a pool of thousands of data scientists to augment your digital products and services.That's the pole position Google holds after acquiring crowdsourcing platform Kaggle last week for an undisclosed sum. Some 600,000 professional data crunchers use Kaggle to build prediction models for such heady challenges as cancer detection and heart disease diagnoses. And experts say Kaggle could help Google facilitate broader adoption of AI technologies."Data science and machine learning is now global and this is a validation of the idea that Google recognizes that most of the smartest people in the world work for somebody else," Neil Jacobstein, who chairs the artificial intelligence and robotics track at Singularity University, told CIO.com. "This is potentially a very positive move, I think, that could make everybody more competitive."To read this article in full or to leave a comment, please click here

How to get started as an IT consultant

For the ambitious IT professional, there are a number of ways to take advantage of today’s hot job market. You could patiently climb the ladder at your organization or jump to an attractive opportunity at another company … or you can go into business for yourself as a consultant.To read this article in full or to leave a comment, please click here(Insider Story)

Want good cyber insurance? Read the fine print

One of the main reasons to buy insurance is to prevent the cost of an accident or other disaster from breaking the bank. But what if simply buying insurance threatens to break the bank?That scenario is starting to worry some organizations, for several reasons.First is the simple but powerful market force of supply and demand. More and more organizations, spooked by regular stories of catastrophic breaches – such as the compromise of more than 1.5 billion Yahoo! accounts, which took down its acquisition value by a reported $350 million – are seeking insurance. And when demand rises, the price tends to do so as well.To read this article in full or to leave a comment, please click here

Want good cyber insurance? Read the fine print

One of the main reasons to buy insurance is to prevent the cost of an accident or other disaster from breaking the bank. But what if simply buying insurance threatens to break the bank?That scenario is starting to worry some organizations, for several reasons.First is the simple but powerful market force of supply and demand. More and more organizations, spooked by regular stories of catastrophic breaches – such as the compromise of more than 1.5 billion Yahoo! accounts, which took down its acquisition value by a reported $350 million – are seeking insurance. And when demand rises, the price tends to do so as well.To read this article in full or to leave a comment, please click here

Expert: Apple may have deployed unauthorized patch by mistake

Last month, reports came out that Apple accidentally installed a fake firmware patch on internal development servers. That's a lesson to all companies to be careful about where they get their patches.What may have happened is that an Apple employee installed a patch shared by the hardware vendor's employee, instead of using the official release of the patch, said Chris Nietzold, senior platform engineer at security appliance manufacturer MBX Systems."They procured the firmware from an unofficial source and didn't follow the official release schedule," he said.The firmware included a potential security vulnerability and Apple reportedly ended its relationship with the supplier, Super Micro Computer, as a result.To read this article in full or to leave a comment, please click here

Expert: Apple may have deployed unauthorized patch by mistake

Last month, reports came out that Apple accidentally installed a fake firmware patch on internal development servers. That's a lesson to all companies to be careful about where they get their patches.What may have happened is that an Apple employee installed a patch shared by the hardware vendor's employee, instead of using the official release of the patch, said Chris Nietzold, senior platform engineer at security appliance manufacturer MBX Systems."They procured the firmware from an unofficial source and didn't follow the official release schedule," he said.The firmware included a potential security vulnerability and Apple reportedly ended its relationship with the supplier, Super Micro Computer, as a result.To read this article in full or to leave a comment, please click here

Expert: Apple may have deployed unauthorized patch by mistake

Last month, reports came out that Apple accidentally installed a fake firmware patch on internal development servers. That's a lesson to all companies to be careful about where they get their patches.What may have happened is that an Apple employee installed a patch shared by the hardware vendor's employee, instead of using the official release of the patch, said Chris Nietzold, senior platform engineer at security appliance manufacturer MBX Systems."They procured the firmware from an unofficial source and didn't follow the official release schedule," he said.The firmware included a potential security vulnerability and Apple reportedly ended its relationship with the supplier, Super Micro Computer, as a result.To read this article in full or to leave a comment, please click here

Pwnie Express eases security remediation with a risk-assessment tool

Pwnie Express is adding a tool that ranks the risks its security service finds on customer networks and makes it easier to remediate them.The new feature of the company’s Pulse service assesses potential vulnerabilities that its sensors detect in customers’ networks and issues a grade in each of four categories. This Device Risk Scorecard points out problems, prioritizes them by urgency and tells how to fix them.The scorecard looks at wireless infrastructure configuration, client connection behaviors, network host configuration, and shadow IT and rogue devices and computes a grade for each. Customers can drill down to find what discoveries account for low scores and follow the remediation suggestions to fix the problems.To read this article in full or to leave a comment, please click here

Pwnie Express eases security remediation with a risk-assessment tool

Pwnie Express is adding a tool that ranks the risks its security service finds on customer networks and makes it easier to remediate them.The new feature of the company’s Pulse service assesses potential vulnerabilities that its sensors detect in customers’ networks and issues a grade in each of four categories. This Device Risk Scorecard points out problems, prioritizes them by urgency and tells how to fix them.The scorecard looks at wireless infrastructure configuration, client connection behaviors, network host configuration, and shadow IT and rogue devices and computes a grade for each. Customers can drill down to find what discoveries account for low scores and follow the remediation suggestions to fix the problems.To read this article in full or to leave a comment, please click here

Cineca’s HPC Systems Tackle Italy’s Biggest Computing Challenges

With over 700 employees, Cineca is Italy’s largest and most advanced high performance computing (HPC) center, channeling their systems expertise to benefit organizations across the nation. Comprised of six Italian research institutions, 70 Italian universities, and the Italian Ministry of Education, Cineca is a privately held, non-profit consortium.

The team at Cineca dedicates itself to tackling the greatest computational challenges faced by public and private companies, and research institutions.  With so many organizations depending on Italy’s HPC centers, Cineca relies on Intel® technologies to reliably and efficiently further the country’s innovations in scientific computing, web and networking-based services, big data

Cineca’s HPC Systems Tackle Italy’s Biggest Computing Challenges was written by Timothy Prickett Morgan at The Next Platform.

Human Infrastructure And Always Planning to Quit and Move On

I did a video for “Speak With A Geek” where I sat down with David Sparks where I talk about approaching your career in a similar fashion to approaching your technology. Your value to the business is determined by how good you are as a piece of human infrastructure.

When you show you can do it for yourself, the people in charge will see that and want to invest in you to bump you up to the next level of productivity. Human infrastructure is no different than physical technical infrastructure, argued Ferro. You purchase a small infrastructure and then you scale it up, spending more money on it, make it bigger, more valuable, and able to do more. That’s no different in how you invest in yourself.

No matter how good your situation is, Ferro advised to “always have one eye on the door.” There is always a better opportunity even when you think yours is the best. For that reason, keep your skills and resume polished at all times and be available for what’s next.

The post Human Infrastructure And Always Planning to Quit and Move On appeared first on EtherealMind.

Python – Kirk Byers Course Week 4 Part 3

This post will describe the exercises and solutions for week four of Kirk Byers Python for Network Engineers.

The final exercise of week 4 is the following.

III. Create a program that converts the following uptime strings to a time in seconds.
uptime1 = 'twb-sf-881 uptime is 6 weeks, 4 days, 2 hours, 25 minutes'
uptime2 = '3750RJ uptime is 1 hour, 29 minutes'
uptime3 = 'CATS3560 uptime is 8 weeks, 4 days, 18 hours, 16 minutes'
uptime4 = 'rtr1 uptime is 5 years, 18 weeks, 8 hours, 23 minutes'

For each of these strings store the uptime in a dictionary using the device name as the key.

During this conversion process, you will have to convert strings to integers.  For these string to integer conversions use try/except to catch any string to integer conversion exceptions.

For example:
int('5') works fine
int('5 years') generates a ValueError exception.

Print the dictionary to standard output.

The first step is to import pretty print which we will use to print the dictionary.

# Import pretty print
import pprint

To do the conversion from years, weeks and days to seconds, we are going to need some constants. Constants are usually defined with the variable Continue reading

US faces limits in busting Russian agents over Yahoo breach

In a rare move, the U.S. has indicted two Russian government agents for their suspected involvement in a massive Yahoo data breach. But what now? Security experts say Wednesday’s indictment might amount to nothing more than naming and shaming Russia. That’s because no one expects the Kremlin to play along with the U.S. indictment. “I can’t imagine the Russian government is going to hand over the two FSB officers,” said Jeremiah Grossman, chief of security strategy at SentinelOne. "Even in the most successful investigations, state hackers are still immune from prosecution or retaliation," said Kenneth Geers, a research scientist at security firm Comodo.To read this article in full or to leave a comment, please click here

US faces limits in busting Russian agents over Yahoo breach

In a rare move, the U.S. has indicted two Russian government agents for their suspected involvement in a massive Yahoo data breach. But what now? Security experts say Wednesday’s indictment might amount to nothing more than naming and shaming Russia. That’s because no one expects the Kremlin to play along with the U.S. indictment. “I can’t imagine the Russian government is going to hand over the two FSB officers,” said Jeremiah Grossman, chief of security strategy at SentinelOne. "Even in the most successful investigations, state hackers are still immune from prosecution or retaliation," said Kenneth Geers, a research scientist at security firm Comodo.To read this article in full or to leave a comment, please click here

Inside the Russian hack of Yahoo: How they did it

One mistaken click. That's all it took for hackers aligned with the Russian state security service to gain access to Yahoo's network and potentially the email messages and private information of as many as 500 million people.The U.S. Federal Bureau of Investigation has been investigating the intrusion for two years, but it was only in late 2016 that the full scale of the hack became apparent. On Wednesday, the FBI indicted four people for the attack, two of whom are Russian spies.Here's how the FBI says they did it:The hack began with a spear-phishing email sent in early 2014 to a Yahoo company employee. It's unclear how many employees were targeted and how many emails were sent, but it only takes one person to click on a link, and it happened.To read this article in full or to leave a comment, please click here

Inside the Russian hack of Yahoo: How they did it

One mistaken click. That's all it took for hackers aligned with the Russian state security service to gain access to Yahoo's network and potentially the email messages and private information of as many as 500 million people.The U.S. Federal Bureau of Investigation has been investigating the intrusion for two years, but it was only in late 2016 that the full scale of the hack became apparent. On Wednesday, the FBI indicted four people for the attack, two of whom are Russian spies.Here's how the FBI says they did it:The hack began with a spear-phishing email sent in early 2014 to a Yahoo company employee. It's unclear how many employees were targeted and how many emails were sent, but it only takes one person to click on a link, and it happened.To read this article in full or to leave a comment, please click here