UK defense secretary urges NATO to fend off Russian cyberattacks

The U.K.’s defense secretary is accusing Russia of using cyber attacks to “disable” democratic processes across the West, and he's demanding that NATO fight back.“NATO must defend itself as effectively in the cyber sphere as it does in the air, on land, and at sea,” Defense Secretary Michael Fallon said. “So adversaries know there is a price to pay if they use cyber weapons.”Fallon made the comments in a Thursday speech about the threat of “Russia’s military resurgence.”He pointed to the Kremlin’s suspected role in influencing last year’s presidential election in the U.S., as part of growing number of alleged cyber attacks that have targeted Western governments.   To read this article in full or to leave a comment, please click here

US Immigration and Customs Enforcement nabs $20M in fake sports gear ahead of Super Bowl 51

Like clockwork, the week leading up to the Super Bowl has seen the federal government tear into the counterfeit sports gear element – this time seizing some $20 million worth of fake jerseys, hats, cell-phone accessories and thousands of other bogus items prepared to be sold to unsuspecting consumers.+More on Network World: 10 of the latest craziest and scariest things the TSA found on your fellow travelers+ ICE/DHS U.S. Immigration and Customs Enforcement (ICE) and Homeland Security Investigations (HSI) teams nabbed 260,000 counterfeit sports-related items during its annual, year-long Operation Team Player sting. Last year ICE seized nearly 450,000 phony items worth an estimated $39 million. In 2014 it grabbed 326,147 phony items worth more than $19.5 million.To read this article in full or to leave a comment, please click here

US Immigration and Customs Enforcement nabs $20M in fake sports gear ahead of Super Bowl 51

Like clockwork, the week leading up to the Super Bowl has seen the federal government tear into the counterfeit sports gear element – this time seizing some $20 million worth of fake jerseys, hats, cell-phone accessories and thousands of other bogus items prepared to be sold to unsuspecting consumers.+More on Network World: 10 of the latest craziest and scariest things the TSA found on your fellow travelers+ ICE/DHS U.S. Immigration and Customs Enforcement (ICE) and Homeland Security Investigations (HSI) teams nabbed 260,000 counterfeit sports-related items during its annual, year-long Operation Team Player sting. Last year ICE seized nearly 450,000 phony items worth an estimated $39 million. In 2014 it grabbed 326,147 phony items worth more than $19.5 million.To read this article in full or to leave a comment, please click here

IDG Contributor Network: A guide to hybrid cloud transformation

Enterprises have made it clear that when it comes to cloud computing, one size does not fit all.  What we’re hearing from the market is the need for consistency with choice, otherwise known as a balanced cloud platform. Unique business needs, along with security, geography and regulatory considerations, dictate a mixing and matching of both public and private cloud solutions—thus the rise of hybrid.Case in point, Forrester surveyed 1,000-plus North American and European enterprise decision makers and found that in the next 12 months 38 percent are building private clouds, 32 percent are building public clouds, and 59 percent are adopting a hybrid model.To read this article in full or to leave a comment, please click here

Microsoft will likely fix Windows SMB denial-of-service flaw on Patch Tuesday

Microsoft will likely wait until February 14 to fix a publicly disclosed vulnerability in the SMB network file sharing protocol that can be exploited to crash Windows computers. The vulnerability was disclosed Thursday when the security researcher who found it posted a proof-of-concept exploit for it on GitHub. There was concern initially that the flaw might also allow for arbitrary code execution and not just denial-of-service, which would have made it critical. The CERT Coordination Center (CERT/CC) at Carnegie Mellon University at first mentioned arbitrary code execution as a possibility in an advisory released Thursday. However, the organization has since removed that wording from the document and downgraded the flaw's severity score from 10 (critical) to 7.8 (high).To read this article in full or to leave a comment, please click here

Microsoft will likely fix Windows SMB denial-of-service flaw on Patch Tuesday

Microsoft will likely wait until February 14 to fix a publicly disclosed vulnerability in the SMB network file sharing protocol that can be exploited to crash Windows computers. The vulnerability was disclosed Thursday when the security researcher who found it posted a proof-of-concept exploit for it on GitHub. There was concern initially that the flaw might also allow for arbitrary code execution and not just denial-of-service, which would have made it critical. The CERT Coordination Center (CERT/CC) at Carnegie Mellon University at first mentioned arbitrary code execution as a possibility in an advisory released Thursday. However, the organization has since removed that wording from the document and downgraded the flaw's severity score from 10 (critical) to 7.8 (high).To read this article in full or to leave a comment, please click here

Friday time killer: Executive Order generator courtesy of Google product manager

Google Senior Product Manager Isaac Hepworth has delivered this Friday diversion dubbed the Executive Order Generator, poking fun at President Trump's early penchant for issuing such rules. Github The tool, on Github, lets you create your own executive order, held up by the Commander in Chief, and encourages you to share it on Twitter (one of Hepworth's former employers, by the way).To read this article in full or to leave a comment, please click here

Driven by eSports, Micron fast-tracks superfast GDDR6 graphics memory

Micron is rushing to release the latest GDDR6 graphics memory by the end of the year, and eSports is a major driver behind the plans.The memory company is speeding up the release of GDDR6 to cope with faster PC and console upgrades. GDDR6 will be significantly faster than its predecessor, GDDR5X, which is still reaching GPUs. Micron had originally planned to release GDDR6 next year.Virtual reality is also driving PC upgrades, but not at the same pace as gaming and eSports, which are forcing faster development of new graphics memory technologies, said Tom Eby, vice president of the computing and networking business unit at Micron.A projected 500 million people will be eSports fans by the end of the decade. Gaming PCs are now being upgraded every three years, which is faster than the previous five-year cycle.To read this article in full or to leave a comment, please click here

Deutsche Telekom Capital Partners bets on Aryaka and SD-WAN

This week, global software-defined WAN (SD-WAN) provider Aryaka announced its series D financing round. The round was led by two new investors, Third Point Ventures and Deutsche Telekom Capital Partners (DTCP), displaying strong endorsement of the company’s global SD-WAN platform. Existing investors participated in the round, too, demonstrating its belief in the potential of SD-WAN and Aryaka. SD-WANs have been seen by some to be the death knell for traditional service providers offering MPLS and IP VPN, and until now, no investment in the technology has been made by a major telecommunications company. To read this article in full or to leave a comment, please click here

Deutsche Telekom Capital Partners bets on Aryaka and SD-WAN

This week, global software-defined WAN (SD-WAN) provider Aryaka announced its series D financing round. The round was led by two new investors, Third Point Ventures and Deutsche Telekom Capital Partners (DTCP), displaying strong endorsement of the company’s global SD-WAN platform. Existing investors participated in the round, too, demonstrating its belief in the potential of SD-WAN and Aryaka. SD-WANs have been seen by some to be the death knell for traditional service providers offering MPLS and IP VPN, and until now, no investment in the technology has been made by a major telecommunications company. To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For February 3rd, 2017

Hey, it's HighScalability time:


 

We live in interesting times. F/A-18 Super Hornets Launch drone swarm.

If you like this sort of Stuff then please support me on Patreon.

  • 100 billion: words needed to train large networks; 73,653: hard drives at Backblaze; 300 GB hour: raw 4k footage; 1993: server running without rebooting; 64%: of money bet is on the Patriots; 950,000: insect species; 374,000: people employed by solar energy; 10: SpaceX launched Iridium Next satellites; $1 billion: Pokémon Go revenue; 1.2 Billion: daily active Facebook users; $7.17 billion: Apple service revenue; 45%: invest in private cloud this year; 

  • Quoteable Quotes:
    • @kevinmarks: #msvsummit @varungyan: Google's scale is about 10^10 RPCs per second in our microservices
    • language: "Order and chaos are not a properties of things, but relations of an observer to something observed - the ability for an observer to distinguish or specify pattern."
    • general_ai: Doing anything large on a machine without CUDA is a fool's errand these days. Get a GTX1080 or if you're not budget constrained, get a Pascal-based Titan. I work in this field, and I would not be able to do Continue reading

Zero-day Windows file-sharing flaw can crash systems, maybe worse

The implementation of the SMB network file sharing protocol in Windows has a serious vulnerability that could allow hackers to, at the very least, remotely crash systems. The unpatched vulnerability was publicly disclosed Thursday by an independent security researcher named Laurent Gaffié, who claims that Microsoft has delayed releasing a patch for the flaw for the past three months. Gaffié, who is known on Twitter as PythonResponder, published a proof-of-concept exploit for the vulnerability on GitHub, triggering an advisory from the CERT Coordination Center (CERT/CC) at Carnegie Mellon University.To read this article in full or to leave a comment, please click here