iPhones in China are randomly shutting down, owners say

A consumer protection group in China is asking Apple to investigate problems with iPhone 6 and iPhone 6s units automatically shutting off.Recently, iPhone customers in the country have been complaining about the problem to the China Consumers Association, the group said in a statement on Tuesday. The shutdowns occur when the phone’s battery charge drops to between 60 and 50 percent.The problem will persist despite upgrading to the latest version of iOS. It will also occur in both cold environments and at room temperature.  After the automatic shutdown, the phones will also fail to turn on without connecting to a power supply.To read this article in full or to leave a comment, please click here

Super Mari-owned: Startling Nintendo-based vulnerability discovered in Ubuntu

A vulnerability in a multimedia framework present on Version 12.04.5 of Ubuntu can be exploited by sound files meant to be played on the venerable Nintendo Entertainment System, according to security researcher Chris Evans. The vulnerability is the result of a flaw in an audio decoder called libgstnsf.so, which allows gstreamer Version 0.10 to play the NSF files that the NES uses for music. NSF files, when played, use the host system’s hardware to create a virtualized version of the NES’ old 6502 processor and sound hardware in real time. +ALSO ON NETWORK WORLD: Cool Yule Tools 2016: Digital disruption at Santa's Workshop + Android deems Instagram worthy of its presenceTo read this article in full or to leave a comment, please click here

Super Mari-owned: Startling Nintendo-based vulnerability discovered in Ubuntu

A vulnerability in a multimedia framework present on Version 12.04.5 of Ubuntu can be exploited by sound files meant to be played on the venerable Nintendo Entertainment System, according to security researcher Chris Evans. The vulnerability is the result of a flaw in an audio decoder called libgstnsf.so, which allows gstreamer Version 0.10 to play the NSF files that the NES uses for music. NSF files, when played, use the host system’s hardware to create a virtualized version of the NES’ old 6502 processor and sound hardware in real time. +ALSO ON NETWORK WORLD: Cool Yule Tools 2016: Digital disruption at Santa's Workshop + Android deems Instagram worthy of its presenceTo read this article in full or to leave a comment, please click here

Exciting news from CheConf

Eclipse Che is a developer workspace server and cloud IDE. With Che, you can define a workspace with the project code files and all of their dependencies necessary to edit, build, run, and debug them. You can share your workspaces with other team members. And Che drives Codenvy, cloud workspaces for development teams, with access control and other features.

Docker and Eclipse Che
 

Today in the keynote at CheConf 2016, Tyler Jewell made several Docker related announcements.

  1. Che runs on your machine as a Docker container, and generates other containers for workspaces making it a fully Dockerized IDE.
  2. Docker now powers the Che CLI, including most Che utilities like IP lookup, curl, compiling Che, versioning, launching.
  3. Che has added support for Docker Compose files in workspaces, making it really easy to write and debug Compose-based applications, right in Che.
  4. Che agents, such as SSH or language servers for intellisense, are deployed as containers.
  5. Chedir is a command line utility for converting source repos into Dockerized workspaces.
  6. Che is now available in the Docker Store.
  7. Codenvy is packaged as a set of Docker containers. With docker-compose up you start up ten docker containers that run Codenvy on your network.
  8. Codenvy Continue reading

Reactive Malicious Domain Detection (ENTRADA)

One interesting trend of the last year or two is the rising use of data analytics and ANI (Artificial Narrow Intelligence) in solving network engineering problems. Several ideas (and/or solutions) were presented this year at the IETF meeting in Seoul; this post takes a look at one of these. To lay the groundwork, botnets are often controlled through a set of domain names registered just for this purpose. In the same way, domain names are often registered just to provide a base for sending bulk mail (SPAM), phishing attacks, etc. It might be nice for registrars to make some attempt to remove such domains abused for malicious activities, but it’s difficult to know what “normal” activity might look like, or for the registrar to even track the usage of a particular domain to detect malicious activity. One of the papers presented in the Software Defined Network Research Group (SDNRG) addresses this problem directly.

The first problem is actually collecting enough information to analyze in a useful way. DNS servers, even top level domain (TLD) servers collect a huge amount of data—much more than most engineers might suspect. In fact, the DNS system is one of those vast sources of information Continue reading

GitLab ditches the public cloud

Popular developer platform GitLab has concluded that the public IaaS cloud is not an effective platform for hosting its open source file storage system with high input/output demands. So, GitLab is ditching the cloud.In a blog post explaining the decision, GitLab engineers say they’ll transition their CephFS storage tool to bare metal infrastructure that they will manage themselves. GitLab provides a platform to help teams of developers write, test and ship code. GitLab's storage issue is a prime example that not all workloads are ideally suited for the public cloud. GitLab is hardly the first company to pull an application from the public cloud; DropBox announced plans to build out its own cloud platform instead of using Amazon Web Service’s cloud earlier this year, for example. Still, many other enterprises are going all in on the cloud.To read this article in full or to leave a comment, please click here

Netgear’s Arlo Go camera makes security more mobile

In the world of networked cameras used for security situations (in home and at work), most (if not all) of the devices required an external power source as well as access to a Wi-Fi network. Netgear, through its Arlo division/brand, wants to change that with its new line of cameras that run without external power as well as LTE network support. The Arlo Go Mobile HD Security Camera (model LTE-VML4030) uses 3G and 4G LTE (via the AT&T network) for its connectivity, letting users place the cameras in areas where Wi-Fi doesn’t exist (think rural, vacation cabins, marinas, farms, etc.). The camera features quick-charge rechargeable batteries, meaning you don’t have to put them near a power outlet (although you can keep it charged via power cord if you like). For local storage of video footage, a built-in microSD card slot is available (in case Internet access is disrupted). The camera also supports two-way audio (with its built-in microphone and speaker), motion and audio detection, night vision, live viewing and weatherproofing for outdoor placement.To read this article in full or to leave a comment, please click here

Netgear’s Arlo Go camera makes security more mobile

In the world of networked cameras used for security situations (in home and at work), most (if not all) of the devices required an external power source as well as access to a Wi-Fi network. Netgear, through its Arlo division/brand, wants to change that with its new line of cameras that run without external power as well as LTE network support. The Arlo Go Mobile HD Security Camera (model LTE-VML4030) uses 3G and 4G LTE (via the AT&T network) for its connectivity, letting users place the cameras in areas where Wi-Fi doesn’t exist (think rural, vacation cabins, marinas, farms, etc.). The camera features quick-charge rechargeable batteries, meaning you don’t have to put them near a power outlet (although you can keep it charged via power cord if you like). For local storage of video footage, a built-in microSD card slot is available (in case Internet access is disrupted). The camera also supports two-way audio (with its built-in microphone and speaker), motion and audio detection, night vision, live viewing and weatherproofing for outdoor placement.To read this article in full or to leave a comment, please click here

A Deep Learning Supercomputer Approach to Cancer Research

Deep learning and machine learning are major themes at this year’s annual Supercomputing Conference (SC16), both in terms of vendors showcasing systems that are a fit for both high performance computing and machine learning, and in the revelation of new efforts to combine traditional simulations with neural networks for greater efficiency and insight.

We have already described this momentum in the context of announcements from supercomputer makers like Cray, which just unveiled a Pascal GPU-based addition to their modeling and simulation-oriented XC supercomputer line, complete with deep learning frameworks integrated into the stack. The question was, how many HPC workloads

A Deep Learning Supercomputer Approach to Cancer Research was written by Nicole Hemsoth at The Next Platform.

Shooting the supermoon

Heaven for photographers Image by ReutersFull moons are catnip for photographers under ordinary circumstances, but slap a name like supermoon on one, note that it’s the largest of the century, and the cameras will be out in full force. Here’s a selection of images provided by Reuters.New York CityImage by REUTERS/Eduardo MunozTo read this article in full or to leave a comment, please click here

Shooting the supermoon

Heaven for photographers Image by ReutersFull moons are catnip for photographers under ordinary circumstances, but slap a name like supermoon on one, note that it’s the largest of the century, and the cameras will be out in full force. Here’s a selection of images provided by Reuters.New York CityImage by REUTERS/Eduardo MunozTo read this article in full or to leave a comment, please click here

IDG Contributor Network: 2017 breach predictions: The big one is inevitable

We’ve reached that time of year where everyone in the security industry is pulling together predictions for what we expect to see over the next year, and/or slowly backing away from any imperfect predictions we might have put forth the year before.Last year, I offered up a number of predictions, but the one continuing to make huge waves in 2017 is around data integrity attacks. Quite simply, I expect that we’ll see more intricate, complex and undetected data integrity attacks and for two main reasons: financial gain and/or political manipulation.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 2017 breach predictions: The big one is inevitable

We’ve reached that time of year where everyone in the security industry is pulling together predictions for what we expect to see over the next year, and/or slowly backing away from any imperfect predictions we might have put forth the year before.Last year, I offered up a number of predictions, but the one continuing to make huge waves in 2017 is around data integrity attacks. Quite simply, I expect that we’ll see more intricate, complex and undetected data integrity attacks and for two main reasons: financial gain and/or political manipulation.To read this article in full or to leave a comment, please click here

F5 readies ADCs for public cloud

F5, considered the market-share leader in application delivery control (ADC), today released new versions of its flagship BIG-IP product that make it easier to use the company’s load balancer, firewall and other application delivery services not only in data centers but in the public cloud.The maturation of BIG-IP represents a broader shift among ADC vendors to embrace public cloud. Traditionally these ADC products have been optimized for applications that are hosted on infrastructure controlled by customers. As more and more applications shift to the public infrastructure as a service cloud, vendors have evolved their products to work in those environments too.To read this article in full or to leave a comment, please click here

OpenAI will use Microsoft’s cloud, as Azure gains more features

Microsoft's continued investment in artificial intelligence and machine learning technology is paying dividends. The company has partnered with OpenAI, a non-profit company founded earlier this year to advance the field of machine intelligence for the benefit of humanity. As part of the deal, announced Tuesday, OpenAI will use Microsoft Azure as its primary cloud provider, an important win for Microsoft as it competes with the likes of Amazon, Google, and IBM to power the next generation of intelligent applications. OpenAI is backed by the likes of Tesla CEO Elon Musk, controversial investor Peter Thiel, LinkedIn co-founder Reid Hoffman, and Y Combinator Partner Jessica Livingston. To read this article in full or to leave a comment, please click here