6 expert tips to better secure third-party network access

Third-party accessImage by Harris & Ewing Collection (Library of Congress)Earlier this year, the Soha Third-Party Advisory Group conducted a study that surveyed more than 200 enterprise IT and security C-Level executives, directors and managers about the daily challenges they face providing fast and secure third-party application access to their contractors and suppliers. The survey revealed that 98 percent of respondents do not consider third-party access a top priority in terms of IT initiatives and budget allocation. This is a huge concern, considering that third parties cause or are implicated in 63 percent of all data breaches.To read this article in full or to leave a comment, please click here

6 expert tips to better secure third-party network access

Third-party accessImage by Harris & Ewing Collection (Library of Congress)Earlier this year, the Soha Third-Party Advisory Group conducted a study that surveyed more than 200 enterprise IT and security C-Level executives, directors and managers about the daily challenges they face providing fast and secure third-party application access to their contractors and suppliers. The survey revealed that 98 percent of respondents do not consider third-party access a top priority in terms of IT initiatives and budget allocation. This is a huge concern, considering that third parties cause or are implicated in 63 percent of all data breaches.To read this article in full or to leave a comment, please click here

5 tech trends that have Turing Award winners worried

Technology has considerable potential to make the world better, but those benefits are far from guaranteed. Plenty of downsides can pop up along the way, and some of them have Turing Award winners especially worried.1. The internet echo chamber "Technology by itself is not evil, but people can use it for bad things," Barbara Liskov, an Institute Professor at MIT, told an audience of journalists Thursday at the Heidelberg Laureate Forum in Germany. "I do worry a lot about what's going on."The ability to selectively filter out news and opinions that don't agree with one's own viewpoint is one of Liskov's top concerns.To read this article in full or to leave a comment, please click here

Saving Backup/Rescue Config on Juniper

A lot of times I find myself having to back a config up on a Juniper before I start work. Usually, I want a quick point I can restore to if I need to rollback. So enter rescue configurations to the, errr, rescue?

request system configuration rescue save

This saves the current saved system configuration as a rescue configuration you can easily rollback to with.

#rollback rescue
#commit

You can also save the current configuration to file using:
>file copy /config/juniper.conf.gz /var/tmp/temp_backup.cfg

/config/juniper.conf.gz is synonymous with the current running configuration.

Potentially, you could stash files in /var/tmp/ and restore them using the above. And restore using your backup with #load replace /var/tmp/temp_backup.cfg

View your stashed files using file list /var/tmp


Vint Cerf’s dream do-over: 2 ways he’d make the internet different

Vint Cerf is considered a father of the internet, but that doesn't mean there aren't things he would do differently if given a fresh chance to create it all over again."If I could have justified it, putting in a 128-bit address space would have been nice so we wouldn't have to go through this painful, 20-year process of going from IPv4 to IPv6," Cerf told an audience of journalists Thursday during a press conference at the Heidelberg Laureate Forum in Germany.IPv4, the first publicly used version of the Internet Protocol, included an addressing system that used 32-bit numerical identifiers. It soon became apparent that it would lead to an exhaustion of addresses, however, spurring the creation of IPv6 as a replacement. Roughly a year ago, North America officially ran out of new addresses based on IPv4.  To read this article in full or to leave a comment, please click here

Vint Cerf’s dream do-over: 2 ways he’d make the internet different

Vint Cerf is considered a father of the internet, but that doesn't mean there aren't things he would do differently if given a fresh chance to create it all over again."If I could have justified it, putting in a 128-bit address space would have been nice so we wouldn't have to go through this painful, 20-year process of going from IPv4 to IPv6," Cerf told an audience of journalists Thursday during a press conference at the Heidelberg Laureate Forum in Germany.IPv4, the first publicly used version of the Internet Protocol, included an addressing system that used 32-bit numerical identifiers. It soon became apparent that it would lead to an exhaustion of addresses, however, spurring the creation of IPv6 as a replacement. Roughly a year ago, North America officially ran out of new addresses based on IPv4.  To read this article in full or to leave a comment, please click here

Majority of US users opt to stay with Galaxy Note7 after recall

Samsung Electronics may have some comfort after its debacle with faulty batteries in the Galaxy Note7 smartphone.The South Korean company reported Thursday that about 500,000 devices, or half of the recalled Galaxy Note7 phones sold in the U.S., have been exchanged through its program.Interestingly, "90 percent of Galaxy Note7 owners have been opting to receive the new Galaxy Note7," since the phones became available on Wednesday, Samsung said. That figure suggests that most of the users of the Note7 have chosen to stay with the smartphone model, with new batteries, rather than go in for a refund or exchange the phone with another Samsung model.To read this article in full or to leave a comment, please click here

Dell plans to move VR content creation to the cloud

Dell wants to prove that you don't need a high-end GPU in your computer to create content for virtual reality headsets. Instead, the company wants to move VR content creation into the cloud with new computing products it plans to release. The goal is to add more mobility and security to VR content creation. Among the new products planned are thin clients that run applications stored in remote servers or appliances. The servers will have GPUs that power VR content creation on  virtual desktops. Virtual reality is an interesting market, and Dell will have products to talk about in the future, said Jeff McNaught, executive director of cloud client computing at Dell.To read this article in full or to leave a comment, please click here

Yahoo uncovered breach after probing a black market sale

A hacker's attempt to sell user data he claimed was stolen from Yahoo actually led the company to uncover a far more severe breach.Yahoo confirmed Thursday a data breach, which affects at least 500 million users, but it could be unrelated to the black market sale of alleged Yahoo accounts, according to a source familiar with the matter.The information comes even as security experts have been questioning why Yahoo took so long to warn the public when it was known that a hacker was claiming to be selling the data online around early August.To read this article in full or to leave a comment, please click here

Yahoo uncovered breach after probing a black market sale

A hacker's attempt to sell user data he claimed was stolen from Yahoo actually led the company to uncover a far more severe breach.Yahoo confirmed Thursday a data breach, which affects at least 500 million users, but it could be unrelated to the black market sale of alleged Yahoo accounts, according to a source familiar with the matter.The information comes even as security experts have been questioning why Yahoo took so long to warn the public when it was known that a hacker was claiming to be selling the data online around early August.To read this article in full or to leave a comment, please click here

Pushing Database Scalability Up And Out With GPUs

What is good for the simulation and the machine learning is, as it turns out, also good for the database. The performance and thermal limits of traditional CPUs have made GPUs the go-to accelerator for these workloads at extreme scale, and now databases, which are thread monsters in their own right, are also turning to GPUs to get a performance and scale boost.

Commercializing GPU databases takes time, and Kinetica, formerly known as GPUdb, is making a bit of a splash ahead of the Strata+Hadoop World conference next week as it brags about the performance and scale of the parallel

Pushing Database Scalability Up And Out With GPUs was written by Timothy Prickett Morgan at The Next Platform.

Hackers have a treasure trove of data with the Yahoo breach

The massive breach at Yahoo means that a treasure trove of stolen data is in the hands of hackers -- putting millions of internet users at risk.At least half a billion Yahoo accounts have been affected in one of the biggest data breaches in history. Information including names, email addresses, telephone numbers and hashed passwords may have been stolen.Yahoo has blamed the attack on a "state-sponsored actor," but it's far from clear who hacked the internet company and how the culprits pulled off the attack.Blaming it on a state-sponsored actor, however, indicates that Yahoo may have found evidence that the hackers were targeting the company over a long period of time, said Vitali Kremez, a cybercrime analyst at security firm Flashpoint.To read this article in full or to leave a comment, please click here

Hackers have a treasure trove of data with the Yahoo breach

The massive breach at Yahoo means that a treasure trove of stolen data is in the hands of hackers -- putting millions of internet users at risk.At least half a billion Yahoo accounts have been affected in one of the biggest data breaches in history. Information including names, email addresses, telephone numbers and hashed passwords may have been stolen.Yahoo has blamed the attack on a "state-sponsored actor," but it's far from clear who hacked the internet company and how the culprits pulled off the attack.Blaming it on a state-sponsored actor, however, indicates that Yahoo may have found evidence that the hackers were targeting the company over a long period of time, said Vitali Kremez, a cybercrime analyst at security firm Flashpoint.To read this article in full or to leave a comment, please click here

Apple Car rumors resurface amid new buyout rumors

One of the more fascinating rumors surrounding Apple these days rests on whether or not the company will ever roll out an Apple branded electric car. Undoubtedly, Apple has been spending lots of R&D resources on its electric car initiative, but whether or not that research will actually result in a car remains to be seen.That said, there were some interesting rumors in the news this week. First and foremost, a report surfaced indicating that Apple was potentially interested in acquiring McLaren, a company that most people know as a purveyor of expensive sports cars and incredibly fast Formula 1 race cars. That rumor naturally got the Apple blogosphere going but it wasn’t long before a McLaren spokesperson came forward and denied the report.To read this article in full or to leave a comment, please click here

Installing a Specific Version of Docker Engine

In this post, I’m going to show you how to install a specific version of the Docker Engine package on Ubuntu. While working on a side project (one that will hopefully bear fruit soon), I found myself in need of installing a slightly older version of Docker Engine (1.11 instead of 1.12, to be specific). While this task isn’t hard, it also wasn’t clearly spelled out anywhere, and this post aims to help address that shortcoming.

If you’ve followed the instructions to add the Docker Apt repos to your system as outlined here, then installing the Docker Engine (latest version) would be done something like this:

apt-get install docker-engine

If you do an apt-cache search docker-engine, though, you’ll find that the “docker-engine” package is a metapackage that refers to a variety of different versions of the Docker Engine. To install a specific version of the Docker Engine, then, simply append the version (as described by the results of the apt-cache search docker-engine command) to the end, like this:

apt-get install docker-engine=1.11.2-0~trusty

This will install version 1.11.2 of the Docker Engine.

You’ll use the same syntax when you need to install a specific Continue reading

Here are the 2016 Ig Nobel Prize ‘winners’

“Congratulations”Let’s say you’re a scientist, and you’ve worked your entire adult life at your discipline. You do a sort of offbeat study, for valid scientific reasons, and figure, hey, this’ll get a laugh in whatever journal is relevant to your field, and then somebody calls you from Cambridge, Mass., and tells you you’ve won science’s equivalent of a Razzie. These are this year’s Ig Nobel Prize winners. Enjoy.To read this article in full or to leave a comment, please click here

Here are the 2016 Ig Nobel Prize ‘winners’

“Congratulations”Let’s say you’re a scientist, and you’ve worked your entire adult life at your discipline. You do a sort of offbeat study, for valid scientific reasons, and figure, hey, this’ll get a laugh in whatever journal is relevant to your field, and then somebody calls you from Cambridge, Mass., and tells you you’ve won science’s equivalent of a Razzie. These are this year’s Ig Nobel Prize winners. Enjoy.To read this article in full or to leave a comment, please click here

5 Minutes with the Docker Captains

Docker Captain is a distinction that Docker awards select members of the community that are both experts in their field and are passionate about sharing their Docker knowledge with others.

captains-final+title

This week we are highlighting 3 of our outstanding Captains who are making September one filled with Docker learnings and events. Read on to learn more about how they got started, what they love most about Docker, and why Docker.

Alex Ellis

Alex is a Principal Application Developer with expertise in the full Microsoft .NET stack, Node.js and Ruby. He enjoys making robots and IoT-connected projects with Linux and the Raspberry PI microcomputer. He is a writer for Linux User and Developer magazine and also produces tutorials on Docker, coding and IoT for his tech blog at alexellis.io.

As a Docker Captain, how do you share that learning with the community?

I started out by sharing tutorials and code on my blog alexellis.io and on Github. More recently I’ve attended local meet-up groups, conferences and tech events to speak and tell a story about Docker and cool hacks. I joined Twitter in March and it’s definitely a must-have for reaching people.

Why do you like Docker?

Docker Continue reading

IBM shows how fast its brain-like chip can learn

Developing a computer that can be as decisive and intelligent as humans is on IBM's mind, and it's making progress toward achieving that goal.IBM's computer chip called TrueNorth is designed to emulate the functions of a human brain. The company is now running tests and benchmarking TrueNorth to demonstrate how fast and power efficient the chips can be compared to today's computers.The results of the head-to-head contest are impressive. IBM says TrueNorth can engage in deep learning and make decisions based on associations and probabilities, much like human brains. It can do so while consuming a fraction of the power used by chips in other computers for the same purpose.To read this article in full or to leave a comment, please click here