Review: Linksys WRT3200ACM AC3200 MU-MIMO Gigabit Wi-Fi Router

Imagine that you’re Linksys – you’ve been in the home wireless space for decades, even before the term Wi-Fi was created. You’ve been bought and sold a few times to a bunch of different companies (including Cisco), but you’re still plugging away, creating new wireless routers for home users. Then along comes a wave of new products with wireless mesh capabilities, fancy mobile device apps and a whole bunch of media love. You want to just get up and scream, “Hey, new kids! Get off my damn lawn!”OK, maybe that last metaphor is a stretch – Linksys is not the old guy yelling at the millennials, but this company is still considered one of the major players in the home Wi-Fi space, even if they don’t have a bunch of tiny, shiny new mesh units to speak of (at least yet). Their latest Wi-Fi router is the WRT3200ACM AC3200 MU-MIMO Gigabit Wi-Fi Router, and we were lucky enough to take it out for a spin.To read this article in full or to leave a comment, please click here

DARPA gamification plan to get deep-thinkers, game-changers to collaborate

Got innovation?The Defense Advanced Research Projects Agency this week announced a program it hopes will get the world’s deep-thinkers to collaborate and explore emerging science and technology for advanced applications.+More on Network World: 20 years ago: Hot sci/tech images from 1996+The agency is proposing an online community known as Gamifying the Search for Strategic Surprise (GS3) that would “apply a unique combination of online game and social media technologies and techniques to engage a large number of experts and deep thinkers in a shared analytic process to rapidly identify, understand, and expand upon the potential implications and applications of emerging science and technology. The program will also develop a mechanism to identify and quickly fund research opportunities that emerge from this collaborative process,” DARPA stated.To read this article in full or to leave a comment, please click here

DARPA gamification plan to get deep-thinkers, game-changers to collaborate

Got innovation?The Defense Advanced Research Projects Agency this week announced a program it hopes will get the world’s deep-thinkers to collaborate and explore emerging science and technology for advanced applications.+More on Network World: 20 years ago: Hot sci/tech images from 1996+The agency is proposing an online community known as Gamifying the Search for Strategic Surprise (GS3) that would “apply a unique combination of online game and social media technologies and techniques to engage a large number of experts and deep thinkers in a shared analytic process to rapidly identify, understand, and expand upon the potential implications and applications of emerging science and technology. The program will also develop a mechanism to identify and quickly fund research opportunities that emerge from this collaborative process,” DARPA stated.To read this article in full or to leave a comment, please click here

DARPA gamification plan to get deep-thinkers, game-changers to collaborate

Got innovation?The Defense Advanced Research Projects Agency this week announced a program it hopes will get the world’s deep-thinkers to collaborate and explore emerging science and technology for advanced applications.+More on Network World: 20 years ago: Hot sci/tech images from 1996+The agency is proposing an online community known as Gamifying the Search for Strategic Surprise (GS3) that would “apply a unique combination of online game and social media technologies and techniques to engage a large number of experts and deep thinkers in a shared analytic process to rapidly identify, understand, and expand upon the potential implications and applications of emerging science and technology. The program will also develop a mechanism to identify and quickly fund research opportunities that emerge from this collaborative process,” DARPA stated.To read this article in full or to leave a comment, please click here

IT Automation is in the Spotlight at AWS Re:Invent (and OpsWorks Configuration Management is Just Part of the Story)

Cloud automation

Configuration management is just the start

Automation is getting a lot of attention at AWS:ReInvent this year, as people are noticing that automation is drastically accelerating the pace of innovation within IT organizations. Whether they’re part of a DevOps initiative, attempting to modernize their existing processes, or migrating systems and applications to the cloud, infrastructure-as-code style automation is playing an increasingly bigger part in these efforts - and ‘configuration management’ is getting most of the attention.

In a recent study, IDC’s Melinda-Carol Ballou predicts that the configuration management portion of I&O spending will grow at 8% over the next several years… but the predicted growth of configuration management in public clouds is north of 31%. Similarly, in a separate report, Mary Johnston Turner and David Laing forecast the Automation component of Infrastructure spending in the public cloud to grow at almost 35% - compared to just 12% overall.

The trend is clear: configuration management is seen as critical to cloud adoption and migration. So it’s not surprising that Amazon Web Services announced that it is updating its Opsworks service offering. As environments grow in size, scope, and complexity (which is the new normal in the era of the cloud), the Continue reading

2016’s notable deaths in technology, science & inventions

Paying respectsImage by Network World staffThe worlds of networking, computing, science and inventions have lost pioneering and influential figures in 2016, from those who brought us networked email to the earliest PCs to movie icons. Here’s our modest tribute to these innovators worth remembering. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Clickbait and the Avaya feeding frenzy

A friend I respect a great deal once told me that using Latin makes you sound smart. So, here I go, consciously throwing the term horror vacui your way. Horror vacui is a concept originally from Aristotle that, according to Porter, ‎Park ‎and Daston, “By the thirteenth century, scholastic writers were beginning to attribute to nature … a kind of force by which nature resists allowing a vacuum to form.” Something of this character seems to be happening as people rush to fill the void of no official news about the current business challenges Avaya faces. In absence of any real information, a narrative has evolved in the past several weeks that has not been positive.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How to architect the network so IoT devices are secure

Just as the internet changed everything, a new revolution known as the Internet of Things (IoT) promises to produce even greater disruption.  Primarily because IoT sensors will be utilized everywhere—in hospitals to monitor medical devices, in factories to supervise operations, in buildings for controlling temperature and lighting, etc.  Data from these sensors will be used for operations management, predictive maintenance and much more. Meanwhile, all of these applications are typically integrated with an enterprise’s IT infrastructure. As such, they are introducing a variety of new security challenges.+ Also on Network World: DDoS attacks using IoT devices follow The Manchurian Candidate model + Just like in current IT environments, there is no security silver bullet that can protect IoT devices from every possible cyber threat.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How to architect the network so IoT devices are secure

Just as the internet changed everything, a new revolution known as the Internet of Things (IoT) promises to produce even greater disruption.  Primarily because IoT sensors will be utilized everywhere—in hospitals to monitor medical devices, in factories to supervise operations, in buildings for controlling temperature and lighting, etc.  Data from these sensors will be used for operations management, predictive maintenance and much more. Meanwhile, all of these applications are typically integrated with an enterprise’s IT infrastructure. As such, they are introducing a variety of new security challenges.+ Also on Network World: DDoS attacks using IoT devices follow The Manchurian Candidate model + Just like in current IT environments, there is no security silver bullet that can protect IoT devices from every possible cyber threat.To read this article in full or to leave a comment, please click here

Save 53% Plus an Extra $15 on Oral-B Pro 5000 Bluetooth Rechargeable Toothbrush – Deal Alert

The Oral-B Floss Action rechargeable electric toothbrush features a dentist-inspired round head and MicroPulse bristles for a superior interdental clean. The specialized bristles are designed to reach deep between teeth and remove more plaque than a regular manual toothbrush. A Visible Pressure Sensor on the PRO 5000 lights up to alert you when you are brushing too hard, which may cause harm. Download the Oral-B App on your smartphone and use Bluetooth technology to get real-time feedback while you clean for improved brushing habits. The highly rated brush lists for $160, but it's currently discounted 53% off to $75 on Amazon, where you'll also find an additional $15 off coupon that will be applied at checkout. See it now on Amazon.To read this article in full or to leave a comment, please click here

A year after terrorist attacks, phone privacy laws unchanged – but watch out for Trump

One year ago, 14 people were killed and 22 injured by a husband-and-wife pair of domestic terrorists who attacked a training session of government employees in San Bernardino, Calif. Although the perpetrators were killed in a gun battle with law enforcement within hours of the attack, the FBI’s interest in one terrorist’s iPhone precipitated a public standoff with Apple that captured its own share of national headlines.To read this article in full or to leave a comment, please click here

Why Amazon’s new machine learning tools are so important

The fact that Amazon Web Services announced three new machine learning services this week shouldn’t come as a surprise. Machine learning, artificial intelligence and cognitive computing are hot buzzwords for cloud vendors and the world was waiting to see how AWS would address it at its re:Invent conference in Las Vegas. What may be surprising is how Amazon is positioning these new machine learning tools. +MORE AT NETOWRK WORLD: A peek inside Amazon’s cloud – from global scale to custom silicon | Cool tech at AWS re:Invent +To read this article in full or to leave a comment, please click here

TopSpin Security deploys realistic deceptions to lure and trap attackers

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Every CISO knows it’s not enough to just use prevention tools to try to keep attackers out of the network. CISOs must have the mindset of “they will get in” and plan accordingly with detection tools.According to Gartner, the average time before a breach is detected is more than 200 days, and too often the breach is detected by an outside organization such as a credit card processor or a law enforcement agency. These facts are simply indefensible when a CISO is called before the Board of Directors to discuss preparedness for cyber incidents.To read this article in full or to leave a comment, please click here

TopSpin Security deploys realistic deceptions to lure and trap attackers

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Every CISO knows it’s not enough to just use prevention tools to try to keep attackers out of the network. CISOs must have the mindset of “they will get in” and plan accordingly with detection tools.According to Gartner, the average time before a breach is detected is more than 200 days, and too often the breach is detected by an outside organization such as a credit card processor or a law enforcement agency. These facts are simply indefensible when a CISO is called before the Board of Directors to discuss preparedness for cyber incidents.To read this article in full or to leave a comment, please click here

Implantable medical devices can be hacked to harm patients

It's possible to transmit life-threatening signals to implanted medical devices with no prior knowledge of how the devices work, researchers in Belgium and the U.K. have demonstrated.By intercepting and reverse-engineering the signals exchanged between a heart pacemaker-defibrillator and its programmer, the researchers found they could steal patient information, flatten the device's battery, or send malicious messages to the pacemaker. The attacks they developed can be performed from up to five meters away using standard equipment -- but more sophisticated antennas could increase this distance by tens or hundreds of times, they said."The consequences of these attacks can be fatal for patients as these messages can contain commands to deliver a shock or to disable a therapy," the researchers wrote in a new paper examining the security of implantable cardioverter defibrillators (ICDs), which monitor heart rhythm and can deliver either low-power electrical signals to the heart, like a pacemaker, or stronger ones, like a defibrillator, to shock the heart back to a normal rhythm. They will present their findings at the Annual Computer Security Applications Conference (ACSAC) in Los Angeles next week.To read this article in full or to leave a comment, please click here

Implantable medical devices can be hacked to harm patients

It's possible to transmit life-threatening signals to implanted medical devices with no prior knowledge of how the devices work, researchers in Belgium and the U.K. have demonstrated.By intercepting and reverse-engineering the signals exchanged between a heart pacemaker-defibrillator and its programmer, the researchers found they could steal patient information, flatten the device's battery, or send malicious messages to the pacemaker. The attacks they developed can be performed from up to five meters away using standard equipment -- but more sophisticated antennas could increase this distance by tens or hundreds of times, they said."The consequences of these attacks can be fatal for patients as these messages can contain commands to deliver a shock or to disable a therapy," the researchers wrote in a new paper examining the security of implantable cardioverter defibrillators (ICDs), which monitor heart rhythm and can deliver either low-power electrical signals to the heart, like a pacemaker, or stronger ones, like a defibrillator, to shock the heart back to a normal rhythm. They will present their findings at the Annual Computer Security Applications Conference (ACSAC) in Los Angeles next week.To read this article in full or to leave a comment, please click here