What will Trump do with the H-1B visa?

President-elect Donald Trump, working with Congress, may try to make it harder and more expensive to hire H-1B workers. His intent would be to change the economics of visa usage and encourage employers to hire U.S. workers.Trump could do this by working with a bipartisan group in Congress committed to reform. But Trump also has executive power levers and could impose changes on his first day in office. He also can prod various federal agencies to launch investigations into visa use.Ron Hira, associate professor of public policy at Howard University, said it’s too early to predict what a Trump administration will do, if anything, about the visa programs. Republicans and Democrats have splits on this issue in each of their parties, and “business interest groups will be out in full force trying to stop any sensible reform.”To read this article in full or to leave a comment, please click here

Google punishes web backsliders in Chrome

Google said it will deal with website recidivists that have dodged the company's punishments for spreading malware and spawning email scams.When Google flags sites for hosting malicious code or unwanted software, or running some kind of scam, users see warnings in Chrome and other browsers. The alerts appear as long as Google believes the site poses a threat.But after making changes to align their sites with Google's "Safe Browsing" terms, webmasters may ask Google to lift the virtual embargo.Not surprisingly, some took advantage of the mechanism for lifting the warnings. Sites would cease their illicit practices, but only long enough to get back into Google's good graces. Once Google gave the all-clear, the once-dirty-then-clean site would have a serious relapse and again distribute malware or spew phishing emails.To read this article in full or to leave a comment, please click here

Google punishes web backsliders in Chrome

Google said it will deal with website recidivists that have dodged the company's punishments for spreading malware and spawning email scams.When Google flags sites for hosting malicious code or unwanted software, or running some kind of scam, users see warnings in Chrome and other browsers. The alerts appear as long as Google believes the site poses a threat.But after making changes to align their sites with Google's "Safe Browsing" terms, webmasters may ask Google to lift the virtual embargo.Not surprisingly, some took advantage of the mechanism for lifting the warnings. Sites would cease their illicit practices, but only long enough to get back into Google's good graces. Once Google gave the all-clear, the once-dirty-then-clean site would have a serious relapse and again distribute malware or spew phishing emails.To read this article in full or to leave a comment, please click here

Visibility, security top concerns for cloud computing adoption

Enterprises considering adopting public clouds are concerned about where their data is located and how it's protected, according to a new survey by IDG.Companies will have about 60 percent of their IT environment in public, private, or hybrid clouds, according to a survey of about 1,000 IT decision makers.Of those considering public cloud deployments, the top concerns were where data is stored, at 43 percent of respondents, and security, with 41 percent of respondents.And with all the high-profile hacks of well-known online brand names, it's no surprise.To read this article in full or to leave a comment, please click here

How to pick the right cloud storage service

Cloud storage is an indispensable tool in today's hyper-connected world. But unlike the early days of cloud storage, when vendors regularly rolled out new capabilities and routinely bumped up storage limits, the market has matured in terms of capabilities and storage norms. Here are some key factors to consider before choosing a new cloud storage service.Getting started with the cloud One of the first things you should do when choosing between cloud services is compare storage options, features and costs. Free offerings might work if you need only the basics, but some of the most important or advanced capabilities are available only via paid plans. Some cloud services offer very limited storage space for free, and some offer none at all.To read this article in full or to leave a comment, please click here

How to maintain data and document security with a mobile workforce

Pragmatic approachImage by ThinkstockData and document security with today’s mobile workforce can be a difficult challenge. This is not a “one-size-fits-all” problem; one needs to weigh the risks to ensure that you are operating within a tolerable risk level or the opposite in which you put significant controls around devices, hamper productivity for no benefit. Take a pragmatic approach – you want the ability to clearly and justly answer the organization's question of, “Why is this security measure necessary?” As security leaders, we want to allow your teams to move as fast as possible and not deploy a policy or technology because someone touts it as the best way to do something. Security vendor Conga provides these tips for that healthy balance.To read this article in full or to leave a comment, please click here

How to maintain data and document security with a mobile workforce

Pragmatic approachImage by ThinkstockData and document security with today’s mobile workforce can be a difficult challenge. This is not a “one-size-fits-all” problem; one needs to weigh the risks to ensure that you are operating within a tolerable risk level or the opposite in which you put significant controls around devices, hamper productivity for no benefit. Take a pragmatic approach – you want the ability to clearly and justly answer the organization's question of, “Why is this security measure necessary?” As security leaders, we want to allow your teams to move as fast as possible and not deploy a policy or technology because someone touts it as the best way to do something. Security vendor Conga provides these tips for that healthy balance.To read this article in full or to leave a comment, please click here

Windows 10 Build 14965 shows a virtual touchpad that could replace the mouse

Microsoft’s latest Windows Insider build 14965 is showing a "virtual touchpad" feature that could replace the mouse—or in any case, make life easier for Windows tablet users. It puts a touchpad on your tablet screen, so you can use that instead of a mouse whenever you connect your device to a larger display.Features that pop up in builds don't always make it to final versions, of course, but this feature is intriguing. From the sounds of it, first-time setup is fairly easy. When a tablet, such as the Surface Pro 4, is connected to an external display, open the Action Center and tap on the Project Quick Action tile. This will extend the Windows desktop to the external display. Next, long-press the taskbar on your tablet. When it appears select Show touchpad button.To read this article in full or to leave a comment, please click here

After Donald Trump’s victory, Tim Cook sent this letter to Apple employees

Earlier this week, Donald Trump shocked pollsters and political pundits across the country after winning the 2016 U.S. presidential election. Despite an incredibly close race, Trump managed to win the election after over-performing in a number of key battleground states, such as Michigan, Florida and Pennsylvania. Consequently, Trump received more than the needed 270 electoral votes even though Hillary Clinton received more votes in the popular vote.Taking a step back, it would be a gross understatement to call this year's election divisive. Trump is nothing if not controversial, and his recent victory has generated a tremendous amount of backlash and fear on the left and an equal amount of applause on the right.To read this article in full or to leave a comment, please click here

On the ‘Web: Fibbing and SDN

The last post on the topic of SDNs discussed BGP as a southbound interface to control policy. This form of SDN was once common in hyperscale data centers (though not as common as it once was). In our pursuit of out of the way (and hence interestingly different) forms of SDNs (hopefully this series will help you understand the scope and meaning of the concept of SDNs by examining both common and uncommon cases), it’s time to look at another unusual form of policy injection—Fibbing. In fibbing, a centralized controller engineers traffic flow in a link state network by interacting with the control plane directly, rather than interacting with the forwarding plane or the RIB. —ECI

LinkedInTwitterGoogle+Facebook

The post On the ‘Web: Fibbing and SDN appeared first on 'net work.

InfiniBand Breaks Through The 200G Barrier

Moore’s Law may be slowing down performance increases in compute capacity, but InfiniBand networking did not get the memo. Mellanox Technologies has actually picked up the pace, in fact, and is previewing 200 Gb/sec InfiniBand switches and server adapters that are timed to come to market with a slew of Xeon, Opteron, ARM, and Power processors due around the middle of next year.

The new Quantum InfiniBand switch ASIC and its companion ConnextX-6 adapter ASICs come relatively hot on the heels of the 100 Gb/sec Enhanced Data Rate, or EDR, products that were announced in the fall of 2014 and

InfiniBand Breaks Through The 200G Barrier was written by Timothy Prickett Morgan at The Next Platform.

Hacker shows how easy it is to take over a city’s public Wi-Fi network

In a perfect example of how public wireless networks can be dangerous for privacy and security, an Israeli hacker showed that he could have taken over the free Wi-Fi network of an entire city.On his way home from work one day, Amihai Neiderman, the head of research at Israeli cybersecurity firm Equus Technologies, spotted a wireless hotspot that he hadn't seen before. What made it unusual was that it was in an area with no buildings.It turned out that the hotspot he saw, advertised as "FREE_TLV," was part of the citywide free Wi-Fi network set up by the local administration of Tel Aviv, Israel. This made Neiderman wonder: How secure is it?To read this article in full or to leave a comment, please click here

Hacker shows how easy it is to take over a city’s public Wi-Fi network

In a perfect example of how public wireless networks can be dangerous for privacy and security, an Israeli hacker showed that he could have taken over the free Wi-Fi network of an entire city.On his way home from work one day, Amihai Neiderman, the head of research at Israeli cybersecurity firm Equus Technologies, spotted a wireless hotspot that he hadn't seen before. What made it unusual was that it was in an area with no buildings.It turned out that the hotspot he saw, advertised as "FREE_TLV," was part of the citywide free Wi-Fi network set up by the local administration of Tel Aviv, Israel. This made Neiderman wonder: How secure is it?To read this article in full or to leave a comment, please click here

Hacker shows how easy it is to take over a city’s public Wi-Fi network

In a perfect example of how public wireless networks can be dangerous for privacy and security, an Israeli hacker showed that he could have taken over the free Wi-Fi network of an entire city.On his way home from work one day, Amihai Neiderman, the head of research at Israeli cybersecurity firm Equus Technologies, spotted a wireless hotspot that he hadn't seen before. What made it unusual was that it was in an area with no buildings.It turned out that the hotspot he saw, advertised as "FREE_TLV," was part of the citywide free Wi-Fi network set up by the local administration of Tel Aviv, Israel. This made Neiderman wonder: How secure is it?To read this article in full or to leave a comment, please click here

New Dockercast episode and interview with Docker Captain Laura Frank

We recently had the opportunity to catch up with the amazing Laura Frank. Laura is a developer focused on making tools for other developers.As an engineer at Codeship, she works on improving the Docker infrastructure and overall experience for users on Codeship. Previously, she worked on several open source projects to support Docker in the early stages of the project, including Panamax and ImageLayers. She currently lives in Berlin.

Image result for laura frankLaura is also a Docker Captain, a distinction that Docker awards select members of the community that are experts in their field and passionate about sharing their Docker knowledge with others.

As we do with all of these podcasts, we begin with a little bit of history of “How did you get here?” Then we dive into the Codeship offering and how it optimizes its delivery flow by using Docker containers for everything.  We then end up with a “What’s the coolest Docker story you have?”  I hope you enjoy  – please feel free to comment and leave suggestions.

 

In addition to the questions covered in the podcast, we’ve had the chance to ask Laura for a couple additional questions below.

How has Docker impacted what you Continue reading

Tech groups push policy priorities for the Trump administration

Technology trade groups are already pushing out their policy priorities for President-elect Donald Trump's administration, even though his campaign rarely touched on IT issues.With Silicon Valley largely opposed to Trump during the campaign and his tech policy agenda paper thin, policy recommendations from tech trade groups may be an exercise in wishful thinking. Still, several tech groups congratulated Trump on his unexpected victory and expressed optimism about this presidency.One point of optimism for the tech industry was the Trump campaign's last-minute addition of telecommunications networks to a long list of infrastructure projects he hopes to fund. Other infrastructure projects on Trump's list include roads, bridges, tunnels, airports, railroads, ports, pipelines, and the electricity grid, and it's unclear how he plans to pay for the plan, given that Trump also has promised large tax cuts, and whether telecommunications networks would be a priority. To read this article in full or to leave a comment, please click here

Tech groups push policy priorities for the Trump administration

Technology trade groups are already pushing out their policy priorities for President-elect Donald Trump's administration, even though his campaign rarely touched on IT issues.With Silicon Valley largely opposed to Trump during the campaign and his tech policy agenda paper thin, policy recommendations from tech trade groups may be an exercise in wishful thinking. Still, several tech groups congratulated Trump on his unexpected victory and expressed optimism about this presidency.One point of optimism for the tech industry was the Trump campaign's last-minute addition of telecommunications networks to a long list of infrastructure projects he hopes to fund. Other infrastructure projects on Trump's list include roads, bridges, tunnels, airports, railroads, ports, pipelines, and the electricity grid, and it's unclear how he plans to pay for the plan, given that Trump also has promised large tax cuts, and whether telecommunications networks would be a priority. To read this article in full or to leave a comment, please click here