Canada recalls Galaxy Note7, says over 70 cases reported in the US

Canada has recalled over 21,900 Galaxy Note7 smartphones after receiving a report of the overheating of the battery of one phone.The Samsung Note7 smartphone battery has the potential to overheat and burn, posing a potential fire hazard, Health Canada, a Canadian federal government department said Monday.The problem with the lithium-ion batteries may, however, turn out to be more serious in the U.S. where already reports of over 70 cases have been received by Samsung, according to the Canadian agency. The U.S. Consumer Product Safety Commission, which is charged with protecting the public from the risk of injury or death linked with certain consumer products, said Friday it was working on an official recall with Samsung but there has been no formal announcement yet of the move.To read this article in full or to leave a comment, please click here

Nvidia Pushes Deep Learning Inference With New Pascal GPUs

No one knows for sure how pervasive deep learning and artificial intelligence are in the aggregate across all of the datacenters in the world, but what we do know is that the use of these techniques is growing and could represent a big chunk of the processing that gets done every millisecond of every day.

We spend a lot of time thinking about such things, and as Nvidia was getting ready to launch its new Tesla P4 and P40 GPU accelerator cards, we asked Ian Buck, vice president of accelerated computing at Nvidia just how much computing could be devoted

Nvidia Pushes Deep Learning Inference With New Pascal GPUs was written by Timothy Prickett Morgan at The Next Platform.

iPhone 8 rumor rollup: Making the case for zirconia ceramics

The hardest news out of Apple during its iPhone 7/7Plus and Apple Watch 2 extravaganza last week is that the company will release a version of its Apple Watch made from ceramic, which as Apple says, is "one of the hardest materials in the world." Speculation this week is that Apple might use some of that zirconia ceramic to build its iPhone 8, too. Why deal with messy Bendgate issues involving its aluminum-body iPhones when it can build its smartphones from stronger material?To read this article in full or to leave a comment, please click here

Nvidia’s new Pascal GPUs can give smart answers

Autonomous cars need a new kind of horsepower to identify objects, avoid obstacles and change lanes. There's a good chance that will come from graphics processors in data centers or even the trunks of cars.With this scenario in mind, Nvidia has built two new GPUs -- the Tesla P4 and P40 -- based on the Pascal architecture and designed for servers or computers that will help drive autonomous cars. In recent years, Tesla GPUs have been targeted at supercomputing, but they are now being tweaked for deep-learning systems that aid in correlation and classification of data."Deep learning" typically refers to a class of algorithmic techniques based on highly connected neural networks -- systems of nodes with weighted interconnections among them.To read this article in full or to leave a comment, please click here

Stop using mobiles for conference calls

Stop using legacy mobile audio, especially for conference calls. There are better alternatives. You’re doing your customers and colleagues a disservice by using mobile audio. It’s time we moved on. PSTN is not much better either – switch to VoIP, and give your ears a break from crappy audio connections.

Refresher: Audio Quality Standards

There are many different methods of encoding speech for transmission across networks. There are trade-offs with each, balancing bandwidth, voice quality, and endpoint requirements. The interesting point is that there is not a direct relationship between bandwidth and quality. Half the bandwidth does not have to mean half the quality.

The Mean opinion score test provides a way of ‘scoring’ the quality of a call. 1 is Bad, 5 is Excellent. G.711 encoding has a score of 4.1, which is very good quality, but uses 64kbps per call. GSM has a score of 3.5, which is the minimum acceptable level…but it only uses 12.2kbps. Pretty good tradeoff if you’re in a bandwidth-constrained environment.

But we’re no longer constrained by bandwidth. We don’t need to squeeze that audio call down to only a few kbps. We can use other options such as FaceTime, Continue reading

A Follow Up on SSH Bastion Hosts

This post is a follow-up on my earlier post on using an SSH bastion host. Since that article was published, I’ve gotten some additional information that I wanted to be sure to share with my readers. It’s possible that this additional information may not affect you, but I’ll allow you to make that determination based on your use case and your specific environment.

Agent Forwarding

You may recall that my original article said that you needed to enable agent forwarding, either via the -A command-line switch or via a ForwardAgent line in your SSH configuration file. This is unnecessary. (Thank you to several readers who contacted me about this issue.) I tested this several times using AWS instances, and was able to transparently connect to private instances (instances without a public IP address) via a bastion host without enabling agent forwarding. This is odd because almost every other tutorial I’ve seen or read instructs readers to enable agent forwarding. I’ve not yet determined why this is the case, but I’m going to do some additional testing and I’ll keep readers posted as I learn more.

Note that I’ve updated the original article accordingly.

The “-W” Parameter vs. Netcat

The Continue reading

Being pushed out of your comfort zone can make your IT career

“’Come to my office. You and I have something to talk about.’”That was the message John Marcante got from Vanguard’s then-chairman, Jack Brennan. It was a few months after Sept. 11, 2001. At the time, tragedy notwithstanding, Marcante was living his professional dream.Back then, he was leading all development for Vanguard’s institutional business. It was one of those jobs that many software-development pros view as the apex of their careers. The sales teams brought him to meet prospects. The client service teams wanted him out in front of valued clients, which included corporations and retirement plans.“That was a really cool job,” says Marcante, now CIO of Vanguard, “and I was in love with it.”To read this article in full or to leave a comment, please click here

Verizon buys Sensity and launches farm pilot with sensor tech

Verizon has been busy building a diverse Internet of Things (IoT) portfolio that includes sensors used on farms as well as on city streets.On Monday, the wireless carrier announced it is buying Sensity Systems for an undisclosed sum.Sensity, based in Sunnyvale, Calif., has focused on using energy-efficient LED lighting to help cities build an IoT platform on city streetlights. The platform can include the use of various sensors on a streetlight pole to monitor weather and city services ranging from parking to public safety.To read this article in full or to leave a comment, please click here

How Jefferson County’s IT Department Improved Their Security Posture with VMware NSX

Jefferson County, Colorado (“Jeffco”) is a local jurisdiction located against the beautiful Rocky Mountains and adjacent to the state capital in Denver.  Jeffco’s IT jefferson-county-colorado-squarelogo-2organization is charged with meeting the needs not only of the various internal departments of the county, but also of serving its half million residents.

As with most IT departments, Jeffco’s IT team has some key priorities to address, including modernizing application infrastructures and bringing more efficiency to business processes — all while fundamentally enhancing security.  It was these needs that led Jeffco to VMware NSX. “We’re doing as much as we can to simplify our infrastructure, yet provide more security, higher up time, and better performance,” says Matt Alexander, Senior Systems Administrator.

Like many other organizations, Jeffco first considered VMware NSX for micro-segmentation.  Their network had followed the traditional model of data center security: perimeter firewalls, DMZ, internal security zone.  But this legacy security model wasn’t enough.  Jeffco recognized the need to treat all network traffic — regardless of whether it originated inside or outside the data center — as potentially insecure.  “From a micro-segmentation and east-west firewalling perspective, we may have had the ability [in the past] but it was exceptionally expensive with physical Continue reading

25% off Black Diamond Spot Headlamp – Deal Alert

If you're camping, hunting, cycling, or even starting a generator in a power outage at night, a headlamp gives you a convenient hands-free light source, and this one from Black Diamond is capable of emitting a powerful 130 lumens of light, with several modes of operation -- low, high, strobe and a red LED mode for preservation of night vision. Power Tap technology allows you to quickly cycle through light modes with just a tap on the light housing vs. a switch or button press. The unit is also IPX4 splash resistant. Averaging 4.5 out of 5 stars from nearly 900 people (read reviews), its typical list price of $39.95 has been reduced to $29.88. See the discounted Black Diamond headlamp now on Amazon.To read this article in full or to leave a comment, please click here

Microsoft gets support for its fight against government gag orders

Microsoft has secured some big allies in a fight against the federal government, including three of its chief rivals, plus a hometown airline. 

Microsoft is fighting the government over its right to tell customers when federal agents request their data and emails. The company filed a lawsuit in April against the federal government, charging such gag orders violate the Constitution and threaten the future of cloud computing. 

+ Also on Network World: Microsoft says tech companies ‘whipsawed’ by conflicting laws on global data transfer +

To read this article in full or to leave a comment, please click here

MySQL zero-day exploit puts some servers at risk of hacking

A publicly disclosed vulnerability in the MySQL database could allow attackers to completely compromise some servers.The vulnerability affects "all MySQL servers in default configuration in all version branches (5.7, 5.6, and 5.5) including the latest versions," as well as the MySQL-derived databases MariaDB and Percona DB, according to Dawid Golunski, the researcher who found it.The flaw, tracked as CVE-2016-6662, can be exploited to modify the MySQL configuration file (my.cnf) and cause an attacker-controlled library to be executed with root privileges if the MySQL process is started with the mysqld_safe wrapper script.The exploit can be executed if the attacker has an authenticated connection to the MySQL service, which is common in shared hosting environments, or through an SQL injection flaw, a common type of vulnerability in websites.To read this article in full or to leave a comment, please click here

snaproute Go BGP Code Dive (10): Moving to Established

In the last post on this topic, we traced how snaproute’s BGP code moved to the open state. At the end of that post, the speaker encodes an open message using packet, _ := bgpOpenMsg.Encode(), and then sends it. What we should be expecting next is for an open message from the new peer to be received and processed. Receiving this open message will be an event, so what we’re going to need to look for is someplace in the code that processes the receipt of an open message. All the way back in the fifth post of this series, we actually unraveled this chain, and found this is the call chain we’re looking for—

  • func (st *OpenSentState) processEvent()
  • st.fsm.StopConnectRetryTimer()
  • bgpMsg := data.(*packet.BGPMessage)
  • if st.fsm.ProcessOpenMessage(bgpMsg) {
    • st.fsm.sendKeepAliveMessage()
    • st.fsm.StartHoldTimer()
    • st.fsm.ChangeState(NewOpenConfirmState(st.fsm)) }

I don’t want to retrace all those steps here, but the call to func (st *OpenSentState) processEvent() (around line 444 in fsm.go) looks correct. The call in question must be a call to a function that processes an event while the peer is in the open state. This call seems to satisfy both Continue reading