Samsung officially announces the Galaxy Note 7 and a refreshed GearVR

Samsung’s next phone-tablet hybrid device has officially landed. The company introduced the sixth-generation Galaxy Note 7 phablet in New York City on Tuesday. It features the latest hardware, a pressure sensitive stylus, and a spruced up interface, all packaged into a shiny metal-and-glass, water-resistant shell. And for the virtual reality-obsessed, Samsung has announced a new GearVR headset designed just for the Galaxy Note 7.  Meet the new phablet  You might be wondering why there’s no Galaxy Note 6 this year. That’s because Samsung opted to skip that number and jump straight to the number 7 so that its phablet line and flagship family—the Galaxy S7 and Galaxy S7 Edge—are directly aligned. Frankly, it makes sense to have both device types on the same page, so to speak. To read this article in full or to leave a comment, please click here

Microsoft released 10 patches: 5 rated critical, 5 fixed zero-day flaws

It is the first month for Microsoft’s new patching model. Older Windows OSes will be treated like Windows 10, with the patches all rolled into a big bundle meant to fix security and non-security issues. However, there will also be a monthly security update that is supposed to resolve that month’s issues without the previous month's fixes as well. On the third Tuesday of the month, the week after Patch Tuesday, Microsoft will release a preview of the upcoming patches so the non-security fixes can be tested to make sure the big rolled-up patch doesn’t blow anything up on some systems.To read this article in full or to leave a comment, please click here

Microsoft released 10 patches: 5 rated critical, 5 fixed zero-day flaws

It is the first month for Microsoft’s new patching model. Older Windows OSes will be treated like Windows 10, with the patches all rolled into a big bundle meant to fix security and non-security issues. However, there will also be a monthly security update that is supposed to resolve that month’s issues without the previous month's fixes as well. On the third Tuesday of the month, the week after Patch Tuesday, Microsoft will release a preview of the upcoming patches so the non-security fixes can be tested to make sure the big rolled-up patch doesn’t blow anything up on some systems.To read this article in full or to leave a comment, please click here

Supreme Court wrestles with size of damages for Apple design patents

The justices of the U.S. Supreme Court, hearing arguments in a long-running Apple and Samsung patent dispute on Tuesday, seemed to question a 19th-century law that allows huge infringement damages in design patent cases.Questioning lawyers for the two companies, the justices repeatedly referred to a law that instructs courts to award patent damages based on the total profit from the infringing device, instead of from just the infringing pieces of the device.The total-profit rule for design patents may work for simple products, but not for complex ones like smartphones, Justice Stephen Breyer said. "For wallpaper, you get the whole thing," he said, according to Fortune.com. "A Rolls-Royce with the thing on the hood? No, no, no you don’t get profits on the whole car."To read this article in full or to leave a comment, please click here

IDG Contributor Network: The network effect on wealth creation

We live in a network-centric world, and network laws are beginning to govern business models and even global economics. When you understand these laws, you begin to understand why we live in a world where new network-centric business models (think Google, Facebook, Amazon, Airbnb, etc.) become de facto monopolies that result in incredible wealth creation.More important, you might be able to figure out how to put these same network effects to work for your business to spur growth and increase customer and shareholder value.Metcalfe’s Law and network effects The first law to understand is Metcalfe’s Law. As you probably know, Bob Metcalfe is the co-inventor of Ethernet. I’ve met Bob a few times in my career. He’s smart, kind and very intuitive. Back in the dawn of networking, he made an observation about how networks work, and he put an equation behind it. That equation has come to be known as Metcalfe’s Law. Here’s how it goes and why it’s critical for modern business models, not just for the networks that underpin them.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The network effect on wealth creation

We live in a network-centric world, and network laws are beginning to govern business models and even global economics. When you understand these laws, you begin to understand why we live in a world where new network-centric business models (think Google, Facebook, Amazon, Airbnb, etc.) become de facto monopolies that result in incredible wealth creation.More important, you might be able to figure out how to put these same network effects to work for your business to spur growth and increase customer and shareholder value.Metcalfe’s Law and network effects The first law to understand is Metcalfe’s Law. As you probably know, Bob Metcalfe is the co-inventor of Ethernet. I’ve met Bob a few times in my career. He’s smart, kind and very intuitive. Back in the dawn of networking, he made an observation about how networks work, and he put an equation behind it. That equation has come to be known as Metcalfe’s Law. Here’s how it goes and why it’s critical for modern business models, not just for the networks that underpin them.To read this article in full or to leave a comment, please click here

Second group of hackers found also targeting SWIFT users

A second hacking group is also trying to rob banks by exploiting the SWIFT money transfer system, following a US$81 million heist in February that used a similar approach.The cyberattacks have been going on since January and have been targeting companies in the U.S., Hong Kong, Australia, and other countries, according to a Tuesday report from security firm Symantec.A "rough guess" is that about 100 organizations have been hit so far, based on the 74 individual computer infections detected, the security firm added.As part of their attacks, the hackers used malware to cover up records of fraudulent transactions made over SWIFT, preventing their victims from learning about the money theft.To read this article in full or to leave a comment, please click here

Second group of hackers found also targeting SWIFT users

A second hacking group is also trying to rob banks by exploiting the SWIFT money transfer system, following a US$81 million heist in February that used a similar approach.The cyberattacks have been going on since January and have been targeting companies in the U.S., Hong Kong, Australia, and other countries, according to a Tuesday report from security firm Symantec.A "rough guess" is that about 100 organizations have been hit so far, based on the 74 individual computer infections detected, the security firm added.As part of their attacks, the hackers used malware to cover up records of fraudulent transactions made over SWIFT, preventing their victims from learning about the money theft.To read this article in full or to leave a comment, please click here

My CCIE Journey

This is Chapter 1 of my ebook The CCIE Blueprint  It covers my journey from Desktop support engineer to CCIE – it was a long journey and hopefully after reading it you can find things that you can do better and shorten your journey. Enjoy! The CCIE Blueprint – Chapter 1 – My Journey I started […]

The post My CCIE Journey appeared first on CCIE Blog.

With the Galaxy Note7 dead, here are 7 other Android phablets to consider

Cease FireImage by REUTERS/Edgar SuIt’s official: the Galaxy Note7 is no more. The company already pulled out a miracle with its unprecedented recall to address the phone’s defective battery, only to be scorched again when more units started igniting. Samsung has now stopped production and wants you to (again) power off your device for good.To read this article in full or to leave a comment, please click here

Hardware makers unite to challenge Intel with Gen-Z spec

After years of being offered as separate technologies, storage and memory are beginning to merge. It's already happening, for example, with 3D Xpoint, a technology from Intel and Micron that can serve as memory, storage, or both. Now, a new consortium, called Gen-Z, is out to ease the transition to this new class of storage and memory in computers. It's creating a new specification and architecture that will make it easier to add new forms of non-volatile memory to computers. Gen-Z will have a new connector, fabric and data transfer protocol. One goal is to create an open standard so new forms of memory can communicate with processors and accelerators in a coherent manner. Gen-Z will also work with SSDs like QuantX from Micron.To read this article in full or to leave a comment, please click here

Wi-Fi vs. LTE could be the start of a mobile rollercoaster

The long fight over LTE networks sharing frequencies with Wi-Fi may be just the first of many battles as device makers and service providers try to make the most of the limited available spectrum.Around the world, regulators and industry are working on how to let different kinds of networks use the same spectrum. The new techniques and policies they use should lead to better mobile performance in some areas, but it’s also likely that wireless performance will fluctuate more as you move around.LTE-U has grabbed headlines because it involves licensed carriers using some of the channels that consumers depend on for Wi-Fi service, which often is free or runs on users' own routers. Wi-Fi supporters cried foul last year after Qualcomm and some U.S. carriers proposed the technology, and it took until last month for the two sides to reach an apparent peace agreement.To read this article in full or to leave a comment, please click here

Wi-Fi vs. LTE could be the start of a mobile rollercoaster

The long fight over LTE networks sharing frequencies with Wi-Fi may be just the first of many battles as device makers and service providers try to make the most of the limited available spectrum.Around the world, regulators and industry are working on how to let different kinds of networks use the same spectrum. The new techniques and policies they use should lead to better mobile performance in some areas, but it’s also likely that wireless performance will fluctuate more as you move around.LTE-U has grabbed headlines because it involves licensed carriers using some of the channels that consumers depend on for Wi-Fi service, which often is free or runs on users' own routers. Wi-Fi supporters cried foul last year after Qualcomm and some U.S. carriers proposed the technology, and it took until last month for the two sides to reach an apparent peace agreement.To read this article in full or to leave a comment, please click here

Announcing DockerCon 2017

hnfcgcgiliokuyuap5wqnrntzqrqzn7y9abztaxoq8q

The Docker Team is excited to announce the next DockerCon will be in held in Austin, Texas from April 17-20. For anyone not in an event planning role, finding a venue is always an adventure. Finding a venue for a unique event such as DockerCon adds an extra layer of complexity. After inquiring on over 15 venues and visiting 3 cities, we are confident that we have chosen a great venue for DockerCon 2017 and the Docker community.

DockerCon US 2017: Austin

April 17-20, 2017

Between the lively tech community, amazing restaurants and culture, Austin will be a natural fit for DockerCon. A diverse range of companies such as Dell, Whole Foods Market, Rackspace, HomeAway and many more of the hottest IT startups call Austin home. We can’t wait to welcome back many returning DockerCon alumni as well as open the DockerCon doors to so many new attendees and companies in the Austin area.

One of the most exciting additions to the DockerCon program is an extra day of content! We reviewed every attendee survey from Seattle in June, debriefed with Docker Captains and others in the community and came to the overwhelming conclusion that two days was not enough Continue reading

7 enterprise mobile management features in Windows 10

Security and enterprise mobile management (EMM) are big concerns for businesses of all sizes as they scramble to make sure corporate data is secure. And there's no shortage of EMM products, but there are features already baked into your operating system?Microsoft, for example, with its Windows 10 update, Redstone 1 -- officially called the Windows 10 Anniversary Update 1607 -- introduced a slew of new IT friendly features. Here are the six most notable features in the latest update that will get IT celebrating.Windows Information Protection With Windows Information Protection (WIP), previously called enterprise data protection (EDP), IT departments can get a handle on BYOD. It allows you to manage data on enterprise-owned and personal devices to avoid any security issues if a device falls into the wrong hands. Employees won't have to change the devices or apps they use and businesses can have the peace of mind of being able to encrypt and remote-wipe corporate data without affecting personal data.To read this article in full or to leave a comment, please click here

IDG Contributor Network: It’s time to encourage diversity in tech freelancing

It’s no secret the tech industry has a diversity problem. Google, Twitter, Facebook, Microsoft, Yahoo, Amazon, Apple and Pinterest are among the companies that have publicly shared how few of their tech positions are filled by women and minorities.This lack of diversity is a big problem for these companies, affecting their innovation and damaging their culture. One study found that companies with racially diverse leadership teams financially outperform their peers by 35 percent. Diversity boosts the bottom line.To read this article in full or to leave a comment, please click here