Verizon, AT&T find new markets as traditional revenues flatten

With their purchases of DirecTV, AOL and Yahoo, the nation's two biggest wireless carriers -- AT&T and Verizon -- have pivoted beyond their traditional business in the search for alternative revenues.Those purchases -- the latest being Verizon's announcement Monday to snap up Yahoo for $4.8 billion -- came about because the carriers realized more than two years ago that traditional wireless services are becoming saturated in the U.S. As a result, wireless services revenues have shrunk or remained flat in recent quarters.To read this article in full or to leave a comment, please click here

Intel has quietly snuffed out its Project Tango smartphone as it rethinks augmented reality

Intel's RealSense 3D camera technology was the star of last year's Intel Developer Forum in San Francisco. Along with robots and drones that used RealSense to "see" the world around them, CEO Brian Krzanich showed the first prototype smartphone to incorporate the technology.The phone went on sale in January for US$399, along with a software kit that allowed developers to built augmented reality applications using RealSense and Google's Project Tango platform. It put Intel on the front edge of mobile AR, a technology that's now having its breakout moment thanks to Pokémon Go.To read this article in full or to leave a comment, please click here

Google lets third parties extend its productivity software on Android

Google is using third parties to make its productivity apps more useful on Android. The company announced Thursday that it's now possible to bring functionality from apps like Scanbot, DocuSign, and ProsperWorks into Docs and Sheets on its mobile operating system.The third-party add-ons will let users do things like access CRM data, start to electronically sign a document, and create mobile apps based on data they have stored in a spreadsheet. The new add-ons are aimed at making it easier for people to get work done within Google Docs and Sheets while they're on the go.Google is in tight competition with Microsoft to attract users to its productivity suite, and both companies are working to bring the power of third-party applications into the apps people already use to get things done.To read this article in full or to leave a comment, please click here

PQ Show 87: Private Cloud Is For Real

Todays Priority Queue looks at the real state of private cloud. While public cloud gets the most media attention, and some analyst firms argue that private cloud doesnt make sense for most companies, its a myth that theres only one way to do cloud. The post PQ Show 87: Private Cloud Is For Real appeared first on Packet Pushers.

Anticipating Black Hat

I was at CiscoLive a few weeks ago in the 100 degree+ heat of Las Vegas and like other cybersecurity professionals I am off to Sin City again next week for Black Hat.Now Black Hat has become a technically-focused little brother of the RSA Security Conference, chock full of cybersecurity geeks at the beginning of the week and forensic investigators, researchers, analysts, and hackers as Black Hat turns to Defcon.  Given this focus, I’m looking forward to hearing about a number of things including:1.      Anti-ransomware fact and hyperbole.  Last December, I predicted a rise in ransomware in my blog, even going so far to talk about enterprise ransomware that impacted multiple systems on the network simultaneously.  Unfortunately, I was right about this one as ransomware has become a cybersecurity scourge of 2016.  Nasty stuff and once you’re hit, there is little you can do except replace the hard drive, reimage systems and hope you’ve done a recent full backup.  Alternatively, you can pony up a bunch of rubles to Vladimir in Odessa.  Nevertheless, there are in fact ways to prevent ransomware before it bricks your system.  New types of Continue reading

Anticipating Black Hat

I was at CiscoLive a few weeks ago in the 100 degree+ heat of Las Vegas and like other cybersecurity professionals I am off to Sin City again next week for Black Hat.Now Black Hat has become a technically-focused little brother of the RSA Security Conference, chock full of cybersecurity geeks at the beginning of the week and forensic investigators, researchers, analysts, and hackers as Black Hat turns to Defcon.  Given this focus, I’m looking forward to hearing about a number of things including:1.      Anti-ransomware fact and hyperbole.  Last December, I predicted a rise in ransomware in my blog, even going so far to talk about enterprise ransomware that impacted multiple systems on the network simultaneously.  Unfortunately, I was right about this one as ransomware has become a cybersecurity scourge of 2016.  Nasty stuff and once you’re hit, there is little you can do except replace the hard drive, reimage systems and hope you’ve done a recent full backup.  Alternatively, you can pony up a bunch of rubles to Vladimir in Odessa.  Nevertheless, there are in fact ways to prevent ransomware before it bricks your system.  New types of Continue reading

Changing the Exascale Efficiency Narrative at Memory Start Point

With this summer’s announcement of China’s dramatic shattering of top supercomputing performance numbers using ten million relatively simple cores, there is a slight shift in how some are considering the future of the world’s fastest, largest systems.

While one approach, which will be seeing with the pre-exascale machines at the national labs in the United States, is to build complex systems based on sophisticated cores (with a focus on balance in terms of memory) the Chinese approach with the top Sunway TaihuLight machine, which is based on lighter weight, simple, and cheap components and using those in volume, has

Changing the Exascale Efficiency Narrative at Memory Start Point was written by Nicole Hemsoth at The Next Platform.

Long-running malvertising campaign infected thousands of computers per day

Security researchers have shut down a large-scale malvertising operation that used sophisticated techniques to remain undetected for months and served exploits to millions of computers.The operation, dubbed AdGholas, has been running since at least October 2015. According to security vendor Proofpoint, the gang behind it managed to distribute malicious advertisements through more than 100 ad exchanges, attracting between 1 million and 5 million page hits per day.The Proofpoint researchers estimate that 10 to 20 percent of computers that loaded the rogue ads were redirected to servers hosting exploit kits -- web-based attack tools that attempt to silently exploit vulnerabilities in popular applications in order to install malware.To read this article in full or to leave a comment, please click here

Long-running malvertising campaign infected thousands of computers per day

Security researchers have shut down a large-scale malvertising operation that used sophisticated techniques to remain undetected for months and served exploits to millions of computers.The operation, dubbed AdGholas, has been running since at least October 2015. According to security vendor Proofpoint, the gang behind it managed to distribute malicious advertisements through more than 100 ad exchanges, attracting between 1 million and 5 million page hits per day.The Proofpoint researchers estimate that 10 to 20 percent of computers that loaded the rogue ads were redirected to servers hosting exploit kits -- web-based attack tools that attempt to silently exploit vulnerabilities in popular applications in order to install malware.To read this article in full or to leave a comment, please click here

Microsoft brings Edge JavaScript engine to Linux, Mac OS X

If you ever needed a sign that a new era has dawned at Microsoft, this is it: The company announced it is bringing ChakraCore to Linux and OS X. ChakraCore is the main element of the Chakra JavaScript engine used in both the Microsoft Edge browser and the company's Universal Windows Platform. So, the company whose not-invented-here mentality was so iron-clad in the 1990s is now developing a JavaScript browser and app engine for its two competitor desktop operating systems. + Also on Network World: Microsoft cozies up to Linux containers +To read this article in full or to leave a comment, please click here

Florida men sue Microsoft over ‘coerced’ upgrades to Windows 10

Three Florida men have filed a lawsuit in a Florida federal court against Microsoft, charging that the company "coerced" them into upgrading to Windows 10 and that the "unintentional" upgrades damaged their PCs, resulting in lost time and money.The three -- Al Khafaji, Ahmad Abdulreda and Robert Stahl -- were the first to sue Microsoft at the federal level for running a campaign to get Windows 7 and Windows 8.1 users to accept the free upgrade to Windows 10. That offer expires Friday.INSIDER Review: Enterprise guide to Windows 10 "Microsoft engaged in a reckless and negligent premise with catastrophic consequences for some of Defendant's customers whose devices were rendered useless and incapable of normal recovery operations," the complaint stated. "Plaintiffs were coerced into adopting Windows 10 or had Windows 10 installed in various unintentional manners with subsequent damage to their computers after which Plaintiffs sustained unnecessary and avoidable stress, confusion, loss of time and significant monetary damage all at the hands of Defendant."To read this article in full or to leave a comment, please click here

IDG Contributor Network: $1 trillion in IT spending to be ‘affected’ by the cloud

IT is moving to the cloud big time, says research and consulting firm Gartner. And while we’ve been aware of that for a while, the firm has also been coming up with some staggering corroborating numbers.It says that by 2020, $1 trillion in IT spending will be “affected” by the shift to cloud. That’s roughly a little under a third of all IT spending, which in 2015 was $3.41 trillion globally and is projected to be $3.79 trillion in 2020, according to Gartner’s Q2 2016 forecast, published earlier this month.+ Also on Network World: Spending on public cloud IT infrastructure to hit $23.3 billion +To read this article in full or to leave a comment, please click here

IDG Contributor Network: $1 trillion in IT spending to be ‘affected’ by the cloud

IT is moving to the cloud big time, says research and consulting firm Gartner. And while we’ve been aware of that for a while, the firm has also been coming up with some staggering corroborating numbers.It says that by 2020, $1 trillion in IT spending will be “affected” by the shift to cloud. That’s roughly a little under a third of all IT spending, which in 2015 was $3.41 trillion globally and is projected to be $3.79 trillion in 2020, according to Gartner’s Q2 2016 forecast, published earlier this month.+ Also on Network World: Spending on public cloud IT infrastructure to hit $23.3 billion +To read this article in full or to leave a comment, please click here

DC Fabric Segment Routing Use Case (2)

In the first post we covered a bit of the basics around segment routing in the data center. Let’s return to the first use case to see if we can figure out how we’d actually implement the type of traffic steering needed to segregate mouse and elephant flows. Let’s return to our fabric and traffic flows and think about how we could shape traffic using segment routing.

benes-segment

There are two obvious ways to shape traffic in this way—

IGP-Prefix segments

The first way would be to impose a label stack that forces traffic along a path that touches, or passes through, each of the devices along the path. In this case, that would mean imposing a path on the traffic originating behind the ToR at A so it must pass through [F,G,D,E]. The flow of traffic through the data center will look something like—

  • Somehow classify the traffic as belonging to the flow that should be shaped to follow only the [F,G,D,E] path
  • Impose the path as a label stack, so the SR header (really just a label stack in this situation, remember?) will contain [F,G,D,E]
  • Forward the packet, with the label, to the next hop in the stack, Continue reading

Baguette vending machine is the greatest invention since sliced bread

I can’t believe this exists. I certainly can’t believe it works well. But, heck, I’d pay good money to find out that I’m wrong. And San Franciscans now have the opportunity.From a report on SFGate: Shut down the tech industry because San Francisco now has the only new piece of innovation it ever needs: a vending machine that dispenses hot baguettes.The Le Bread Xpress vending machine is up and running on Market and 15th at the new Myriad market hall. The baguettes are part-baked at a bakery and finished in the vending machine after you place your order. Bet the name came to them in less time than it takes to bake bread.To read this article in full or to leave a comment, please click here

Google beefs Linux up kernel defenses in Android

Future versions of Android will be more resilient to exploits thanks to developers' efforts to integrate the latest Linux kernel defenses into the operating system. Android's security model relies heavily on the Linux kernel that sits at its core. As such, Android developers have always been interested in adding new security features that are intended to prevent potentially malicious code from reaching the kernel, which is the most privileged area of the operating system. One older example is Security Enhancements for Android (SEAndroid), a set of kernel add-ons and tools that make exploitation of certain vulnerabilities harder by enforcing access controls.To read this article in full or to leave a comment, please click here

Google beefs Linux up kernel defenses in Android

Future versions of Android will be more resilient to exploits thanks to developers' efforts to integrate the latest Linux kernel defenses into the operating system. Android's security model relies heavily on the Linux kernel that sits at its core. As such, Android developers have always been interested in adding new security features that are intended to prevent potentially malicious code from reaching the kernel, which is the most privileged area of the operating system. One older example is Security Enhancements for Android (SEAndroid), a set of kernel add-ons and tools that make exploitation of certain vulnerabilities harder by enforcing access controls.To read this article in full or to leave a comment, please click here