CloudVelox eases migration of core business apps to the cloud

It’s easy to get all “cloud first” when you’re talking about new, greenfield applications. But how do you get the core business applications running in your data center – so-called brownfield apps – easily and efficiently migrated to the cloud? That’s the problem startup CloudVelox set out to solve, with the larger mission of helping CIOs build “boundaryless” hybrid data centers. IDG Chief Content Officer John Gallant spoke with CloudVelox CEO Raj Dhingra about how the company has automated the migration of complex, traditional applications to Amazon Web Services (and Microsoft Azure in the near future). Dhingra explained how companies are using CloudVelox’s One Hybrid Cloud platform to not only migrate apps, but to build cloud-based disaster recovery capabilities and simplify a variety of test/dev chores.To read this article in full or to leave a comment, please click here(Insider Story)

CloudVelox eases migration of core business apps to the cloud

It’s easy to get all “cloud first” when you’re talking about new, greenfield applications. But how do you get the core business applications running in your data center – so-called brownfield apps – easily and efficiently migrated to the cloud? That’s the problem startup CloudVelox set out to solve, with the larger mission of helping CIOs build “boundaryless” hybrid data centers. IDG Chief Content Officer John Gallant spoke with CloudVelox CEO Raj Dhingra about how the company has automated the migration of complex, traditional applications to Amazon Web Services (and Microsoft Azure in the near future). Dhingra explained how companies are using CloudVelox’s One Hybrid Cloud platform to not only migrate apps, but to build cloud-based disaster recovery capabilities and simplify a variety of test/dev chores.To read this article in full or to leave a comment, please click here(Insider Story)

Hackers hide stolen payment card data inside website product images

Attacks that compromise online shops to skim payment card details are increasing and growing in sophistication. The latest technique involves hiding malicious code and stolen data inside legitimate files.A Dutch researcher reported last week that almost 6,000 online shops, most of them built with the Magento content management system, have malicious code that intercepts and steals payment card data during online transactions. The online storefront of the U.S. National Republican Senatorial Committee (NRSC) was among those websites until earlier this month.To read this article in full or to leave a comment, please click here

Hackers hide stolen payment card data inside website product images

Attacks that compromise online shops to skim payment card details are increasing and growing in sophistication. The latest technique involves hiding malicious code and stolen data inside legitimate files.A Dutch researcher reported last week that almost 6,000 online shops, most of them built with the Magento content management system, have malicious code that intercepts and steals payment card data during online transactions. The online storefront of the U.S. National Republican Senatorial Committee (NRSC) was among those websites until earlier this month.To read this article in full or to leave a comment, please click here

WikiLeaks blames US for cutting Assange’s internet connection

WikiLeaks is accusing U.S. Secretary of State John Kerry of trying to stop the site from publishing stolen emails from Hillary Clinton's presidential campaign. Citing "multiple U.S. sources,"  the site tweeted on Tuesday that Kerry had asked the Ecuadorian government to prevent WikiLeaks' founder Julian Assange from releasing more documents.   Assange is currently residing in the Ecuadorian embassy in London, where he has been helping to run the WikiLeaks site. But on Saturday, the Ecuadorian government shut down his internet connection. WikiLeaks claimed that Kerry had private negotiations with Ecuador last month. However, the U.S. Department of State is denying any involvement with cutting Assange's internet connection.To read this article in full or to leave a comment, please click here

WikiLeaks blames US for cutting Assange’s internet connection

WikiLeaks is accusing U.S. Secretary of State John Kerry of trying to stop the site from publishing stolen emails from Hillary Clinton's presidential campaign. Citing "multiple U.S. sources,"  the site tweeted on Tuesday that Kerry had asked the Ecuadorian government to prevent WikiLeaks' founder Julian Assange from releasing more documents.   Assange is currently residing in the Ecuadorian embassy in London, where he has been helping to run the WikiLeaks site. But on Saturday, the Ecuadorian government shut down his internet connection. WikiLeaks claimed that Kerry had private negotiations with Ecuador last month. However, the U.S. Department of State is denying any involvement with cutting Assange's internet connection.To read this article in full or to leave a comment, please click here

Down the rabbit hole, part 4: Securing your email

As I strive to make my life safe and secure from prying eyes, one area stands out as being astoundingly critical: email.Heck, you can barely go 24 hours without another example of leaked or hacked emails being released to the public. Add to that the recent revelations that Yahoo has been working secretly with United States government agencies to scan all email going through their system, and it quickly becomes clear that the majority of us have email accounts that are not even remotely private or secure.To read this article in full or to leave a comment, please click here

Future Economies of Scale for Quantum Computing

Clustering together commodity servers has allowed the economies of scale that enable large-scale cloud computing, but as we look to the future of big infrastructure beyond Moore’s Law, how might bleeding edge technologies capture similar share and mass production?

To say that quantum computing is a success simply because a few machines manufactured by quantum device maker, D-Wave, would not necessarily be accurate. However, what the few purchases of such machines by Los Alamos National Lab, Google, and Lockheed Martin do show is that there is enough interest and potential to get the technology off the ground and

Future Economies of Scale for Quantum Computing was written by Nicole Hemsoth at The Next Platform.

Here’s how Zenefits is trying to reinvent itself

Zenefits had a rough year. The company -- previously a darling of Silicon Valley -- was rocked by a massive insurance scandal in February and has been fighting to regain the trust of customers and regulators since.David Sacks, the Yammer cofounder and former Zenefits COO, has been leading the charge after taking over the CEO role in February. The company made its biggest announcement under his tenure Tuesday, unveiling Z2, a redesign and upgrade of its capabilities.The marquee change of Z2 is a design that brings the app store model popularized by smartphones to the world of human resources. Zenefits's offerings, like vacation tracking, offer letter generation, and employee insurance, are still available as apps in the new Z2 platform. But now, users will also be able to add third-party integrations from a set of 17 services. To read this article in full or to leave a comment, please click here

Half of US adults are profiled in police facial recognition databases

Photographs of nearly half of all U.S. adults -- 117 million people -- are collected in police facial recognition databases across the country with little regulation over how the networks are searched and used, according to a new study.Along with a lack of regulation, critics question the accuracy of facial recognition algorithms. Meanwhile, state, city, and federal facial recognition databases include 48 percent of U.S. adults, said the report from the Center on Privacy & Technology at Georgetown Law. The search of facial recognition databases is largely unregulated, the report said. "A few agencies have instituted meaningful protections to prevent the misuse of the technology," its authors wrote. "In many more cases, it is out of control."To read this article in full or to leave a comment, please click here

Half of US adults are profiled in police facial recognition databases

Photographs of nearly half of all U.S. adults -- 117 million people -- are collected in police facial recognition databases across the country with little regulation over how the networks are searched and used, according to a new study.Along with a lack of regulation, critics question the accuracy of facial recognition algorithms. Meanwhile, state, city, and federal facial recognition databases include 48 percent of U.S. adults, said the report from the Center on Privacy & Technology at Georgetown Law. The search of facial recognition databases is largely unregulated, the report said. "A few agencies have instituted meaningful protections to prevent the misuse of the technology," its authors wrote. "In many more cases, it is out of control."To read this article in full or to leave a comment, please click here

Wi-Fi troubleshooting remains a challenge for most organizations

Bring your own device (BYOD), digital transformation and other trends have raised the bar on Wi-Fi. A decade or so ago, Wi-Fi was a “nice to have” for most organizations, and users understood the tradeoff: high-quality, consistent access through the wired connection or freedom of movement coupled with spotty quality with wireless access.+ Also on Network World: Wi-Fi speeds will triple, get more range with MegaMimo 2.0 +Today, that’s not the case. Wi-Fi is the primary network and a mission-critical resource for most companies, as many devices today do not even have a wired option. Users need high-quality, consistent and secure wireless connectivity to do their jobs. When Wi-Fi isn’t working, it isn’t just internal employees who are affected. Student’s can’t do research, shoppers can’t purchase goods, clinicians can treat patients and IoT devices can’t connect. Poor Wi-Fi is no longer simply an inconvenience; it means lost customers, degraded teaching experiences, lost revenue and brand damage.To read this article in full or to leave a comment, please click here

Flokibot Invades PoS: Trouble in Brazil

Introduction Threat actors salivate at the thought of an increased volume of credit and debit card transactions flowing through endpoints they have compromised with card-stealing malware. While there are many distinct malware families that scrape unencrypted process memory to obtain cards, some of these malware […]

FDA to healthcare execs on DMCA exemption: Researchers will find new medical device flaws

The FDA wants the medical device industry to quickly fix cybersecurity issues, reminding healthcare executives that they may soon be hearing about vulnerabilities more frequently from security researchers thanks to a DMCA exemption which will soon go into effect.Although the Librarian of Congress issued the new exemptions (pdf) last year, there was a one year hold supposedly so various agencies could update their policies. It’s silly, since the exemptions are not permanent; they must be argued and renewed every three years, which basically means security researchers can take advantage of it for two years. They can hope that if their research will take longer than two years, that the exemption is renewed.To read this article in full or to leave a comment, please click here

FDA to healthcare execs on DMCA exemption: Researchers will find new medical device flaws

The FDA wants the medical device industry to quickly fix cybersecurity issues, reminding healthcare executives that they may soon be hearing about vulnerabilities more frequently from security researchers thanks to a DMCA exemption which will soon go into effect.Although the Librarian of Congress issued the new exemptions (pdf) last year, there was a one year hold supposedly so various agencies could update their policies. It’s silly, since the exemptions are not permanent; they must be argued and renewed every three years, which basically means security researchers can take advantage of it for two years. They can hope that if their research will take longer than two years, that the exemption is renewed.To read this article in full or to leave a comment, please click here

Network performance monitoring

Today, network performance monitoring typically relies on probe devices to perform active tests and/or observe network traffic in order to try and infer performance. This article demonstrates that hosts already track network performance and that exporting host-based network performance information provides an attractive alternative to complex and expensive in-network approaches.
# tcpdump -ni eth0 tcp
11:29:28.949783 IP 10.0.0.162.ssh > 10.0.0.70.56174: Flags [P.], seq 1424968:1425312, ack 1081, win 218, options [nop,nop,TS val 2823262261 ecr 2337599335], length 344
11:29:28.950393 IP 10.0.0.70.56174 > 10.0.0.162.ssh: Flags [.], ack 1425312, win 4085, options [nop,nop,TS val 2337599335 ecr 2823262261], length 0
The host TCP/IP stack continuously measured round trip time and estimates available bandwidth for each active connection as part of its normal operation. The tcpdump output shown above highlights timestamp information that is exchanged in TCP packets to provide the accurate round trip time measurements needed for reliable high speed data transfer.

The open source Host sFlow agent already makes use of Berkeley Packet Filter (BPF) capability on Linux to efficiently sample packets and provide visibility into traffic flows. Adding support Continue reading

Self-learning supply chains? The store of the future? A conversation with an expert about what comes next

JDA is a global supply chain and retail planning software company with 4,500 employees and almost a billion dollars in revenue.  Suresh Acharya heads JDA Labs, the company’s 50 person research group exploring the science, emerging technologies and user experiences that are critical to this complex field.  Network World Editor in Chief John Dix recently caught up to Acharya to talk about everything from customer segmentation to self-learning supply chains and the store of the future.  Suresh Acharya, Head of JDA Labs, Research and DevelopmentTo read this article in full or to leave a comment, please click here