What to expect from Tuesday’s big Google hardware event

We know that Google is set to release a slew of hardware Tuesday at an event in San Francisco, including smartphones, smart home devices and even a new Wi-Fi router. Here’s what the leaks and rumors say about the specifics of the company’s big release day tomorrow.Bye, bye, NexusGoogle is set to release the already-widely-leaked Pixel and Pixel XL smartphones, which will boast flagship specs and run totally stock Android. It’s the same idea as the Nexus line of phones – top-end smartphones designed to showcase the possibilities of the operating system free from the modifications that OEMs impose on their own devices.ALSO ON NETWORK WORLD: Tim Cook: Augmented reality will be an essential part of your daily life, like the iPhone | U.S. cellular carriers charge too much, and here’s proofTo read this article in full or to leave a comment, please click here

A few cool tech startups I came across at Boston’s HUBweek

"Do you like movies?"That was the ice-breaker laid on me by Pilot Analytics CEO and Founder Alan Xie as he caught me spying his start-up's space at last week's HUBweek Demo Day event in Boston, trying to figure out what the heck the company did.Being on a shoestring budget, the recent Harvard University grad and his colleagues decided to forego a more elaborate booth set-up, instead relying a a couple of laptops, some basic branding in the form of cardboard cutouts and their story. This outfit has a system for crunching numbers to help movie studios better gauge how much they might make on a movie, no matter how awful it sounds. Factors such as genre, cast and geographical viewing markets all play roles, of course.To read this article in full or to leave a comment, please click here

73% off amFilm Tempered Glass Screen Protector for iPhone 7/6/6s (2-Pack) – Deal Alert

These Amazon best-selling screen protectors from amFilm are specifically designed for iPhone 7, 6S, and 6. Ultra thin-0.3mm thickness is reliable and resiliant, and promises full compatibility with touchscreen sensitivity. Also ultra-clear with 99.9% transparency to allow an optimal, natural viewing experience. Highly durable and scratch resistant/chip resistant, this strong protector will guarantee your cell phone the best protection against drops, bumps, scratches and normal wear and tear. Over 8,200 reviewers on Amazon give this item an average of 4.5 out of 5 stars (read reviews). Amazon indicates that its list price has been dramatically reduced to just $8, and for that price you will receive 2 glass Screen Protector, wet/dry wipes, squeeze card, installation guide and dust removal stickers. See the discounted screen protectors on Amazon.To read this article in full or to leave a comment, please click here

IoT: We’re serfs and pawns

There is a huge problem with the ugly Internet of Things (IoT). Many IoT thingies have the security of wet tissue paper, and they’re being used in large swarms and masses to wreak havoc. A colleague of mine, Stephen Satchell, says misbehaving IoT devices should bear the full front of the Consumer Product Safety Commission and be recalled, every last one of them.  Recalled. Why won’t this happen? Let me speculate. It’s because our own government, that is to say the more covert parts of the U.S. government, has its own cadre of botnets and control vectors that allows them interesting windows into foreign lands. To read this article in full or to leave a comment, please click here

IoT: We’re serfs and pawns

There is a huge problem with the ugly Internet of Things (IoT). Many IoT thingies have the security of wet tissue paper, and they’re being used in large swarms and masses to wreak havoc. A colleague of mine, Stephen Satchell, says misbehaving IoT devices should bear the full front of the Consumer Product Safety Commission and be recalled, every last one of them.  Recalled. Why won’t this happen? Let me speculate. It’s because our own government, that is to say the more covert parts of the U.S. government, has its own cadre of botnets and control vectors that allows them interesting windows into foreign lands. To read this article in full or to leave a comment, please click here

Dell EMC patches critical flaws in VMAX enterprise storage systems

Dell EMC has fixed six flaws in its management interfaces for VMAX enterprise storage systems, including three vulnerabilities that are rated critical and could lead to the exposure of sensitive files or a complete system compromise.One of the critical flaws is located in the Unisphere for VMAX enterprise storage arrays, an appliance that provides a web-based management interface to provision, manage, and monitor such systems.More specifically, the flaw is in the GraniteDS library that provides server-side support for the Flash-based portion of the Unisphere web application. According to researchers from vulnerability management firm Digital Defense, the issue allows unauthenticated attackers to retrieve arbitrary text files from the virtual appliance with root privileges.To read this article in full or to leave a comment, please click here

Dell EMC patches critical flaws in VMAX enterprise storage systems

Dell EMC has fixed six flaws in its management interfaces for VMAX enterprise storage systems, including three vulnerabilities that are rated critical and could lead to the exposure of sensitive files or a complete system compromise.One of the critical flaws is located in the Unisphere for VMAX enterprise storage arrays, an appliance that provides a web-based management interface to provision, manage, and monitor such systems.More specifically, the flaw is in the GraniteDS library that provides server-side support for the Flash-based portion of the Unisphere web application. According to researchers from vulnerability management firm Digital Defense, the issue allows unauthenticated attackers to retrieve arbitrary text files from the virtual appliance with root privileges.To read this article in full or to leave a comment, please click here

What’s New in Tower 3: User Interface

Ansible-Tower-3-blog-series.png

In July, we released Ansible Tower 3. In this blog series, we will take a deeper dive into Tower changes that were all designed to make our product simpler and easier to scale Ansible automation across your environments. In our last post, our Senior Software Engineer Chris Meyers highlights what's new in the Tower 3 installer.

If you’d like to learn more about the release, our Director of Product Bill Nottingham for wrote a complete overview of the Ansible Tower 3 updates.

Simplifying the UX

The most common feedback we have received from existing Tower users concerns usability and the need to improve it. The Ansible Tower UI team was tasked to address this, along with new workflows and features, during the development of Tower 3. This was no small task as the team had to change every single page served to the user. 

Tower 2.4.5 and earlier versions offered many ways of doing the same thing, often resulting in inconsistent flows and context switching. The team wanted the new interface to reflect how simple Ansible is. So the goal became offering a common flow for interacting with objects in the app and providing more context where possible.

Continue reading

Hackers find little demand for their stolen NSA hacking tools

The hackers who are auctioning off cyberweapons allegedly stolen from the National Security Agency are growing annoyed and want cash.The ShadowBrokers' sale of the stolen tools has so far generated little interest, and over the weekend, the hackers complained in a message posted online, using broken English."TheShadowBrokers is not being interested in fame. TheShadowBrokers is selling to be making money," the hackers said.As of Monday, their auction only had one substantial bid at 1.5 bitcoins, or US $918. Many of the other bids were valued at less than $1. To read this article in full or to leave a comment, please click here

Hackers find little demand for their stolen NSA hacking tools

The hackers who are auctioning off cyberweapons allegedly stolen from the National Security Agency are growing annoyed and want cash.The ShadowBrokers' sale of the stolen tools has so far generated little interest, and over the weekend, the hackers complained in a message posted online, using broken English."TheShadowBrokers is not being interested in fame. TheShadowBrokers is selling to be making money," the hackers said.As of Monday, their auction only had one substantial bid at 1.5 bitcoins, or US $918. Many of the other bids were valued at less than $1. To read this article in full or to leave a comment, please click here

Where’s the bottom for Microsoft’s Internet Explorer?

Millions more deserted Microsoft's browsers last month, adding to what can only be described as a collapse of the company's place in the browser world.According to analytics vendor Net Applications, the combined user share of Internet Explorer and Edge fell 1.9 percentage points in September, ending the month at 30.6%.The string of losses showed no sign of letting up: September's decline was the sixth in a row of 1.9 percentage points or more. IE and Edge have shed 18 percentage points so far this year, a 39% decline in just eight months. Simply put, no other browser has bled user share this quickly, with the possible exception of Netscape Navigator in the 1990s.To read this article in full or to leave a comment, please click here

Tim Cook: Augmented reality will be an essential part of your daily life, like the iPhone

Apple CEO Tim Cook has a hunch about the future of augmented reality, and whether it will ever become mainstream.This weekend, Cook said that it will take some time for AR to become “acceptable.” But once that happens, AR experiences will be an integral part of our daily lives, comparing the emerging technology to the iPhone and eating three meals a day.“I do think that a significant portion of the population of developed countries, and eventually all countries, will have AR experiences every day, almost like eating three meals a day. It will become that much a part of you,” Cook said during his panel at a tech conference in Utah. Cook then admitted that there are technical challenges preventing AR from becoming a reality.To read this article in full or to leave a comment, please click here

Microsoft points to a transition of Windows 10 Mobile to 64-bit

There's a lot to like in Microsoft's Windows 10 Mobile for smartphones, but it has one glaring weakness: It still is a 32-bit OS.But a transition to 64-bit for the OS was inevitable as memory capacity in smartphones goes up, Microsoft said during a presentation at the Ignite conference last week. Windows 10 Mobile lags behind Apple's iOS and Google's Android, which transitioned to 64 bits a few years ago. Many new Windows phones already have 64-bit ARM-based Qualcomm processors, but the OS still runs as 32 bit.Thirty-two bits is "not really a limitation for us since the devices are all 4GB [of RAM] or less. But that will change over the next couple of years," said Jason Whitehorn, partner software engineer manager of the Windows and Devices Group at Microsoft.To read this article in full or to leave a comment, please click here

Elephant Flows, Fabrics, and I2RS

The last post in this series on I2RS argues that this interface is designed to augment, rather than replace, the normal, distributed routing protocol. What sort of use case could we construct that would use I2RS in this way? What about elephant flows in data center fabrics? An earlier post considers how to solve the elephant flow using segment routing (SR); can elephant flows also be guided using I2RS? The network below will be used to consider this question.

benes-segment

Assume that A hashes a long lived elephant flow representing some 50% of the total bandwidth available on any single link in the fabric towards F. At the same time, A will hash other flows, represented by the red flow lines, onto each of the three links towards the core of the fabric in pretty much equal proportion. Smaller flows that are hashed onto the A->F link will likely suffer, while flows hashed onto the other two links will not.

This is a particularly bad problem in applications that have been decomposed into microservices, as the various components of the application tend to rely on fairly fixed delay and jitter budgets over the network to keep everything synchronized and running quickly. Continue reading

Your Docker agenda for the month of October

From webinars to workshops, meetups to conference talks, check out our list of events that are coming up in October!

Cs9pXS-WYAQsZTJ.jpg

Online

Oct 13: Docker for Windows Server 2016 by Michael Friis

Oct 18: Docker Datacenter Demo by Moni Sallama and Chris Hines.

 

Official Docker Training Course

View the full schedule of instructor led training courses here!

Introduction to Docker: This is a two-day, on-site or classroom-based training course which introduces you to the Docker platform and takes you through installing, integrating, and running it in your working environment.

Oct 11-12: Introduction to Docker with Xebia – Paris, France

Oct 19-20: Introduction to Docker with Contino – London, United Kingdom

Oct 24-25: Introduction to Docker with AKRA – Krakow, Germany

 

Docker Administration and Operations: The Docker Administration and Operations course consists of both the Introduction to Docker course, followed by the Advanced Docker Topics course, held over four consecutive days.

Oct 3-6: Docker Administration and Operations with Azca – Madrid, Spain

Oct 11-15: Docker Administration and Operations with TREEPTIK – Paris, France

Oct 18-21: Docker Administration and Operations with Vizuri – Raleigh, NC

Oct 18-22: Docker Administration and Operations with TREEPTIK – Aix en Provence, France

Oct 24-27: Continue reading

The craziest stories of the tech sector

Network World started its Wider Net stories in 2003 in an effort to lighten up our news pages, acknowledging that there is a lot more to the world of enterprise networking and IT other than speeds and feeds of switches and routers and WAN links. The story approach was modeled somewhat after the Wall Street Journal's famed and quirky front page A-Hed articles (i.e., the middle column), but tended more to networking topics, from "When animals attack…networks" to the story of networking's most famous couple, Alice and Bob of security lesson fame. While Network World did away with its formal weekly Wider Net articles when the publication switched over to publishing twice a month, we've tried to continue mixing in lighthearted pieces through our blogs and in other places on our website and print magazine. Here are some of our favorites:To read this article in full or to leave a comment, please click here