Supreme Court will hear Samsung, Apple damages dispute on Tuesday

The U.S. Supreme Court is to hear arguments Tuesday in a closely-watched dispute between Samsung Electronics and Apple on the procedure for calculation of damages for the infringement of design patents.In general terms, a design patent protects the way an article looks, while utility patents address the way an article is used and works, according to the U.S. Patent and Trademark Office. Some older Samsung smartphones were found by a jury in 2012 to have infringed three design patents related to the look of the iPhone, including its face and rounded bezel design, and the icon layout on the home screen.To read this article in full or to leave a comment, please click here

Apple shares rise as Samsung’s Galaxy Note 7 woes continue

At the end of the trading day on Monday, shares of Apple were up nearly 1.75% before ultimately closing at $116.05 per share. All told, Apple stock is now trading at levels not seen since December of 2015.Part of the recent upswing in Apple shares can of course be attributed to better than anticipated iPhone 7 demand. Though the iPhone 7 was initially pegged as a lackluster upgrade, consumers on the whole appear to be impressed with the device's new camera and blazing fast hardware. Recall, pre-orders for the iPhone 7 set new records at both Sprint and T-Mobile.Additionally, analyst reports in recent weeks have suggested that many iPhone buyers are opting for the more margin-friendly iPhone 7 Plus, further padding Apple's bottom line in the process.To read this article in full or to leave a comment, please click here

WikiLeaks dumps another trove of email, allegedly from Clinton aide

U.S. accusations that WikiLeaks is helping Russian hackers influence the upcoming election hasn't stopped the controversial website from dumping emails allegedly stolen from a Hillary Clinton aide.On Monday, WikiLeaks released an additional batch of 2,000 emails stolen from Clinton's campaign chairman, John Podesta, which could fuel negative press coverage of her candidacy.This came after the site dumped the first batch of emails last Friday, the same day U.S. intelligence agencies publicly blamed the Russian government for hacking the emails of U.S. officials and political groups earlier this year.To read this article in full or to leave a comment, please click here

WikiLeaks dumps another trove of email, allegedly from Clinton aide

U.S. accusations that WikiLeaks is helping Russian hackers influence the upcoming election hasn't stopped the controversial website from dumping emails allegedly stolen from a Hillary Clinton aide.On Monday, WikiLeaks released an additional batch of 2,000 emails stolen from Clinton's campaign chairman, John Podesta, which could fuel negative press coverage of her candidacy.This came after the site dumped the first batch of emails last Friday, the same day U.S. intelligence agencies publicly blamed the Russian government for hacking the emails of U.S. officials and political groups earlier this year.To read this article in full or to leave a comment, please click here

Potential Apple Watch snooping: a not-so-paranoid cyberespionage risk

It may sound paranoid, but the next time you enter a highly confidential meeting, leave your smart watch behind. It's possible the device could be spying on you.That's what ministers in the U.K. are reportedly being told. They've recently been banned from wearing Apple Watches during cabinet meetings on fears that the devices could be hacked by Russian cyberspies, according to The Telegraph.Mobile phones have already been prohibited from cabinet meetings, but the U.K. government has reportedly taken the extra step of also banning smart watches.To read this article in full or to leave a comment, please click here

Potential Apple Watch snooping: a not-so-paranoid cyberespionage risk

It may sound paranoid, but the next time you enter a highly confidential meeting, leave your smart watch behind. It's possible the device could be spying on you.That's what ministers in the U.K. are reportedly being told. They've recently been banned from wearing Apple Watches during cabinet meetings on fears that the devices could be hacked by Russian cyberspies, according to The Telegraph.Mobile phones have already been prohibited from cabinet meetings, but the U.K. government has reportedly taken the extra step of also banning smart watches.To read this article in full or to leave a comment, please click here

snaproute Go BGP Code Dive (12): Moving to Established

In last week’s post, the new BGP peer we’re tracing through the snaproute BGP code moved from open to openconfirmed by receiving, and processing, the open message. In processing the open message, the list of AFIs this peer will support was built, the hold timer set, and the hold timer started. The next step is to move to established. RFC 4271, around page 70, describes the process as—

If the local system receives a KEEPALIVE message (KeepAliveMsg (Event 26)), the local system:
 - restarts the HoldTimer and
 - changes its state to Established.

In response to any other event (Events 9, 12-13, 20, 27-28), the local system:
 - sends a NOTIFICATION with a code of Finite State Machine Error,
 - sets the ConnectRetryTimer to zero,
 - releases all BGP resources,
 - drops the TCP connection,
 - increments the ConnectRetryCounter by 1,
 - (optionally) performs peer oscillation damping if the DampPeerOscillations attribute is set to TRUE, and
 - changes its state to Idle.

For a bit of review (because this is running so long, you might forget how the state machine works), the way the snaproute code is written is as a state machine. The way the state machine works is Continue reading

Memory is the Next Platform

A new crop of applications is driving the market along some unexpected routes, in some cases bypassing the processor as the landmark for performance and efficiency. While there is no end in sight for the CPUs dominant role, at least not until Moore’s Law has been buried along the roadside, there is another path—this time, down memory lane.

Just as machine learning oriented applications represent the next development platform, memory appears to be the next platform for compute. While this won’t extend to all application areas, given the thrust of machine learning and memory bandwidth and capacity-strained applications, the more

Memory is the Next Platform was written by Nicole Hemsoth at The Next Platform.

IDG Contributor Network: Tech in banks: Innovating within a sometimes lethargic industry

I was at a conference recently and came across Dawie Olivier, CIO of Westpac Bank and Australasian-operating bank. That it took a trip to Texas to discover someone who lives in the same country as me was an ironic reflection on why industry conferences are still useful events.Notwithstanding the weirdness that we’d never met previously, I was interested to hear of Olivier’s experiences within three different banks in different geographies. After the event, I caught up with him (and thanks must go out to Chef’s awesome PR company for arranging the conversation) to get deeper insight into how banks operate and what it means to innovate within their traditionally constrained environments.To read this article in full or to leave a comment, please click here

OSPF to IS-IS Migration

There are many reasons of OSPF to IS-IS migration, specifically for the Service Provider networks. Some of these reasons are shared later in the case study. OSPF to IS-IS migration can be done in three ways. In this article I will share, ‘  ship in the night approach ‘ which relies on having both routing […]

The post OSPF to IS-IS Migration appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Certificate policy violations force reform at StartCom and WoSign

The top management of StartCom and WoSign will be replaced and the two certificate authorities will undergo audits after browser vendors discovered that they mis-issued many digital certificates, violating industry rules. The investigation launched by Mozilla led to the discovery of 13 instances where China-based WoSign and its subsidiary StartCom issued certificates with various types of problems. Evidence was also found that both CAs issued certificates signed with the SHA-1 algorithm after Jan. 1 in violation of industry rules and intentionally backdated them to avoid being caught. As a result, Mozilla said that it has lost faith in the ability of WoSign and StartCom to correctly carry out the functions of a CA and announced that it will stop trusting new certificates from the two companies. Apple followed suit and announced its own ban for future WoSign and StartCom certificates last week.To read this article in full or to leave a comment, please click here

Certificate policy violations force reform at StartCom and WoSign

The top management of StartCom and WoSign will be replaced and the two certificate authorities will undergo audits after browser vendors discovered that they mis-issued many digital certificates, violating industry rules. The investigation launched by Mozilla led to the discovery of 13 instances where China-based WoSign and its subsidiary StartCom issued certificates with various types of problems. Evidence was also found that both CAs issued certificates signed with the SHA-1 algorithm after Jan. 1 in violation of industry rules and intentionally backdated them to avoid being caught. As a result, Mozilla said that it has lost faith in the ability of WoSign and StartCom to correctly carry out the functions of a CA and announced that it will stop trusting new certificates from the two companies. Apple followed suit and announced its own ban for future WoSign and StartCom certificates last week.To read this article in full or to leave a comment, please click here

Collecting Docker Swarm service metrics

This article demonstrates how to address the challenge of monitoring dynamic Docker Swarm deployments and track service performance metrics using existing on-premises and cloud monitoring tools like Ganglia, Graphite, InfluxDB, Grafana, SignalFX, Librato, etc.

In this example, Docker Swarm is used to deploy a simple web service on a four node cluster:
docker service create --replicas 2 -p 80:80 --name apache httpd:2.4
Next, the following script tests the agility of monitoring systems by constantly changing the number of replicas in the service:
#!/bin/bash
while true
do
docker service scale apache=$(( ( RANDOM % 20 ) + 1 ))
sleep 30
done
The above test is easy to set up and is a quick way to stress test monitoring systems and reveal accuracy and performance problems when they are confronted with container workloads.

Many approaches to gathering and recording metrics were developed for static environments and have a great deal of difficulty tracking rapidly changing container-based service pools without missing information, leaking resources, and slowing down. For example, each new container in Docker Swarm has unique name, e.g. apache.16.17w67u9157wlri7trd854x6q0. Monitoring solutions that record container names, or even worse, index data by container name, will suffer from bloated Continue reading

Doxing, trolling and ‘grossly offensive’ communications are now illegal in the UK

To observe Hate Crime Awareness Week, the UK’s Crown Prosecution Service (CPS) is cracking down on internet bullies and trolls. Actions like posting humiliating photoshopped images of people on social media platforms, creating derogatory hashtags and doxing can get cyber bullies prosecuted.CPS published new social media guidelines to help prosecutors determine which online actions are illegal. The guidelines take aim at doxing, inciting virtual mobbing – encouraging others to participate in online harassment – and fake social media profiles used for online abuse to name but a few.Retweeting something the CPS considers “grossly offensive, indecent, obscene or false” can also land a person in legal hot water. Yet Alison Saunders, CPS director of public prosecutions, stressed to the BCC that prosecutors can’t use the guidelines to “stifle free speech.” People in the UK better check out what actions are now illegal since saying you didn’t know it was illegal just won’t cut it.To read this article in full or to leave a comment, please click here