Ooma adds Internet security service to VoIP platform

Ooma’s VoIP platform has been around for several years now – it provides a home telephone line without having to pay additional fees for landline voice service. Even as phone service prices continue to drop, Ooma can be a good value for people looking for an additional phone line (one example - dedicated 911) beyond just using their mobile phones.But the folks at the company must be noticing that the trend for home phone service is certainly a downward arrow. This means the company needs to offer additional services in order to keep customers interested in their products/offerings. One such service is Internet security, which the company just announced.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Information security priorities for Trump’s administration

Cybersecurity needs to be a top priority for the administration of Donald Trump. The first task should be shoring up government IT systems. As recent attacks have shown, adversaries aren’t afraid to go after political organizations. There’s no reason to suspect they won’t continue to target political entities such as the Democratic National Committee or step up attacks on government agencies.Emphasize that information security applies to all agencies Ideally, a cabinet meeting for all new secretaries should be held within three months of the inauguration to underscore that information security is essential for all agencies to complete their missions. Even secretaries whose agencies are not typically associated with either information security or IT need to be included.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Information security priorities for Trump’s administration

Cybersecurity needs to be a top priority for the administration of Donald Trump. The first task should be shoring up government IT systems. As recent attacks have shown, adversaries aren’t afraid to go after political organizations. There’s no reason to suspect they won’t continue to target political entities such as the Democratic National Committee or step up attacks on government agencies.Emphasize that information security applies to all agencies Ideally, a cabinet meeting for all new secretaries should be held within three months of the inauguration to underscore that information security is essential for all agencies to complete their missions. Even secretaries whose agencies are not typically associated with either information security or IT need to be included.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why the IETF will be key for standardizing 5G

Most people in the mobile industry are aware that the Third-Generation Partnership Project (3GPP)—and Global System for Mobile communication (GSM) before it—has traditionally been the lead standards organization in specifying mobile network functionality. 3GPP logically partitions the mobile network architecture into Radio Access Network (RAN), and Core Network (CN) components.+ Also on Network World: What we talk about when we talk about 5G wireless + 3GPP will continue to be important in 5G, especially for the RAN-related functionality such as the OFDM and massive MIMO specifications for the radio interfaces. However, knowledgeable observers will also be aware of the fact that a significant number of key 5G protocols will be specified in the Internet Engineering Task Force (IETF). Actually, this is just a continuation and acceleration of trends started way back in 3G.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Has IT become too complex to manage?

In the late 1990s, I was responsible for technical operations for a large healthcare organization. We supported more than 5,000 users across 50 locations and supported three distinct lines of business. We were a very progressive organization at the leading edge of technology innovation in healthcare. It was not a simple operation. Well, at least not for 1997. When I compare that environment to what IT leaders face today, however, a shudder of relief washes over me. There is no point in whitewashing this: Managing the function of IT in my day was child’s play compared to the incredible diversity of challenges facing the modern IT leader. Is it so complex, in fact, that it cannot truly be managed?To read this article in full or to leave a comment, please click here

IDG Contributor Network: Has IT become too complex to manage?

In the late 1990s, I was responsible for technical operations for a large healthcare organization. We supported more than 5,000 users across 50 locations and supported three distinct lines of business. We were a very progressive organization at the leading edge of technology innovation in healthcare. It was not a simple operation. Well, at least not for 1997. When I compare that environment to what IT leaders face today, however, a shudder of relief washes over me. There is no point in whitewashing this: Managing the function of IT in my day was child’s play compared to the incredible diversity of challenges facing the modern IT leader. Is it so complex, in fact, that it cannot truly be managed?To read this article in full or to leave a comment, please click here

Japanese government denies report that its defense forces were hacked

Japanese government officials have denied reports that a secure network used by the country's defense forces was attacked earlier this year.An attacker was able to break into the Ground Self-Defense Force's computer systems, sources at the Japanese Ministry of Defense told Kyodo News on Sunday. The ministry and the Self-Defense Forces discovered the attack in September, said the report, which was also relayed by The Japan Times.Kyodo's sources said the hack was believed to be the work of a nation state, and that information may have been leaked in the attack.To read this article in full or to leave a comment, please click here

Japanese government denies report that its defense forces were hacked

Japanese government officials have denied reports that a secure network used by the country's defense forces was attacked earlier this year.An attacker was able to break into the Ground Self-Defense Force's computer systems, sources at the Japanese Ministry of Defense told Kyodo News on Sunday. The ministry and the Self-Defense Forces discovered the attack in September, said the report, which was also relayed by The Japan Times.Kyodo's sources said the hack was believed to be the work of a nation state, and that information may have been leaked in the attack.To read this article in full or to leave a comment, please click here

8 most significant tech gadgets of 2016: Winners and losers

Every year, tech companies come up with fantastic ideas for cutting edge, futuristic products. Some of these products turn into huge hits. Others end up bombing. And still others become precursors or inspirations for the next generation of innovations. Here’s our list of eight products that caught our eye this year.To read this article in full or to leave a comment, please click here(Insider Story)

New products of the week 11.28.16

New products of the weekImage by CAOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.CSTAR for Google ChromeImage by UpGuard To read this article in full or to leave a comment, please click here

New products of the week 11.28.16

New products of the weekImage by CAOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.CSTAR for Google ChromeImage by UpGuard To read this article in full or to leave a comment, please click here

34 – Q-in-VNI and EFP for Hosting Providers

Dear Network and DCI Experts !

While this post is a little bit out of the DCI focus, and assuming many of you already know Q-in-Q, the question is, are you yet familiar with Q-in-VNI? For those who are not, I think this topic is a good opportunity to bring Q-in-VNI deployment with VXLAN EVPN for intra- and inter-VXLAN-based Fabrics and understand its added value and how one or multiple Client VLANs from the double encapsulation can be selected for further actions.

Although it’s not an unavoidable rule per-se, some readers already using Dot1Q tunneling may not necessarily fit into the following use-case. Nonetheless, I think it’s safe to say that most of Q-in-Q deployment have been used by Hosting Provider for co-location requirements for multiple Clients, hence, the choice of the Hosting Provider use-case elaborated in this article.

For many years now, Hosting Services have physically sheltered thousands of independent clients’ infrastructures within the Provider’s Data Centers. The Hosting Service Provider is responsible for supporting each and every Client’s data network in its shared network infrastructure. This must be achieved without changing any Tenant’s Layer 2 or Layer 3 parameter, and must also be done as quickly as possible. For many years, the co-location Continue reading

San Francisco’s Muni transit system reportedly hit by ransomware

San Francisco’s Muni transit system was reportedly hit by ransomware since Friday, leading to the message “You Hacked, ALL Data Encrypted” being displayed on the computer screens at stations, according to newspaper reports.The message asked that cryptom27 at yandex.com should be contacted for the key to unlock the data.Fare payment machines at stations also displayed that they were “out of service,” and San Francisco's Municipal Railway, widely known as Muni, was allowing free rides on its light-rail vehicles as it was unable to charge customers, according to the Examiner.To read this article in full or to leave a comment, please click here

San Francisco’s Muni transit system reportedly hit by ransomware

San Francisco’s Muni transit system was reportedly hit by ransomware since Friday, leading to the message “You Hacked, ALL Data Encrypted” being displayed on the computer screens at stations, according to newspaper reports.The message asked that cryptom27 at yandex.com should be contacted for the key to unlock the data.Fare payment machines at stations also displayed that they were “out of service,” and San Francisco's Municipal Railway, widely known as Muni, was allowing free rides on its light-rail vehicles as it was unable to charge customers, according to the Examiner.To read this article in full or to leave a comment, please click here

Cyber Monday 2016: Deals abound for new iPhones, HDTVs, iPads, headphones and more

Black Friday this year certainly lived up to the hype. With incredible savings to be had on products as far ranging as HDTVs and iPhones, shoppers this year flooded nationwide retailers while also taking advantage of alluring deals online. In fact, Black Friday this year set new all-time records on a number of fronts. According to Adobe, shoppers this year spent approximately $3.34 billion on any number of deals, representing a nearly 22% increase compared to 2015.If you happened to miss out on Black Friday this year, there's no reason to fret. Cyber Monday is just a few hours a way and consumers looking for incredible deals on the latest and greatest tech gadgets have no shortage of options to choose from.To read this article in full or to leave a comment, please click here

No, it’s Matt Novak who is a fucking idiot

I keep seeing this Gizmodo piece entitled “Snowden is a fucking idiot”. I understand the appeal of the piece. The hero worship of Edward Snowden is getting old. But the piece itself is garbage.

The author, Matt Novak, is of the new wave of hard-core leftists intolerant of those who disagree with them. His position is that everyone is an idiot who doesn’t agree with his views: Libertarians, Republicans, moderate voters who chose Trump, and even fellow left-wingers that aren’t as hard-core.

If you carefully read his piece, you’ll see that Novak doesn’t actually prove Snowden is wrong. Novak doesn’t show how Snowden disagrees with facts, but only how Snowden disagrees with the left-wing view of the world. It’s only through deduction that we come to the conclusion: those who aren’t left-wing are idiots, Snowden is not left-wing, therefore Snowden is an idiot.

The question under debate in the piece is:
technology is more important than policy as a way to protect our liberties
In other words, if you don’t want the government spying on you, then focus on using encryption (use Signal) rather than trying to change the laws so they can’t spy on you.

On a Continue reading

Python Basics – Part 1

Let’s start with Python basics, with the help of program .Theory part in posts is just enough to understand the program.

Python Data Type:

  • Numbers
  • Strings
  • List
  • Tuple
  • Dictionary
  1. Numbers :  
    1.  Int                  1 ,10,-145, 22
    2. Float               1.1,0.9,-29.9
    3. Complex        1.4j, 4e+6j
  1. Strings

Way to remember how slices work in string  is to think of the indices as pointing between characters, with the left edge of the first character numbered 0. Then the right edge of the last character of a string of n characters has index n, for example:

“Crazyouters ”  represented in indices form

0 1 2 3 4 5 6 7 8 9 10 11
C r a z y r o u t e r s
-11 -10 -9 -8 -7 -6 -5 -4 -3 -2 -1 0

Program Code : Str.py

str.PNG

Output

str_out

 

There are special operators in strings

Program Code : str1.py

str1

Output

str1out

 

3. List

The list is a most versatile datatype available in Python which can be written as a list of comma-separated values (items) between square brackets. Important Continue reading

Trump Tower changed to Dump Tower on Google Maps

The world became a slightly better place when Fidel Castro died. Unlike President Obama who said, “History will record and judge the enormous impact of this singular figure on the people and world around him,” President-elect Donald Trump bluntly called Catro a “brutal dictator” whose “legacy is one of firing squads, theft, unimaginable suffering, poverty and the denial of fundamental human rights.”Some unknown person with an internet connection also attempted to be blunt, expressing his or her opinion of Donald Trump via Google Maps; the President-elect’s transition headquarters was renamed to the Dump Tower on Google Maps.To read this article in full or to leave a comment, please click here