55% off Travel Cord Organizer – Electronics Accessories Case & Cable Organizer – Deal Alert

Designed to protect and safeguard your electronic gadgets and save time on the go by easily storing and finding everything you need. This travel organizer offers a secure storage space for cord management, laptop and computer accessories putting everything you need in one place. This organizer also gives you special space inside for credit cards, passports, also for boarding passes, smartphone, tickets and has many pockets where you can put coins, keys, USB, SIM card, earphones, and other small accessories. Give yourself or someone else the gift of stress-free travel.  The travel cord organizer's typical list price of $30.99 has been reduced 55% to $13.99. See the discounted Travel Cord Organizer now on Amazon.To read this article in full or to leave a comment, please click here

Intel’s siloed business units unify around IoT and connectivity

Intel has many disparate business units doing their own thing. The challenging task of tethering them is a top priority for Intel's second-in-command, Venkata Renduchintala.Renduchintala, known as Murthy, was appointed last November to run Intel's PC, client, and internet of things businesses. He's made his presence felt: Within six months of his appointment, Intel cut struggling products like mobile CPUs and sharpened its focus on growth areas of IoT, servers, and connectivity.One common thread in all the areas of growth is connectivity, with modems and wireless products now as important to Intel as its CPUs. Intel needed a serious kick in its modem development efforts, which is why CEO Brian Krzanich poached Renduchintala from Qualcomm, a bitter Intel rival, where he was in charge of connectivity offerings. To read this article in full or to leave a comment, please click here

Binding to an IPv6 Subnet

In the original framework of the IP architecture, hosts had network interfaces, and network interfaces had single IP addresses. These days, many operating systems allow a configuration to add additional addresses to network interfaces by enumerating these additonal addresses. But can we bind a network interface to an entire subnet of IP addresses without having to enumerate each and every individual address?

NuData Security adds ‘unspoofable’ dimensions to the identity process  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  In 2012, the social networking site LinkedIn suffered a data breach in which username/password combinations were stolen. Four years later, in 2016, at least 117 million sets of credentials from this breach were available for purchase online. MySpace suffered a similar data breach, and years later 427 million sets of credential were posted online.These events have prompted e-commerce companies that have not suffered a data breach to urge their customers to change their passwords as soon as possible.To read this article in full or to leave a comment, please click here

Closing the incident response gap: Q&A with Sean Convery of ServiceNow

A decade ago, security meant a big firewall at a single ingress point. All devices and applications were under IT’s tight control, so they did not create significant security risks. Today, everything has changed. The rise of cloud computing, BYOD, shadow IT, WiFi devices, software defined everything and other trends have blown up the tightly controlled model and created a rather chaotic system. Adding to the challenge is that attackers are getting smarter and targeting IoT systems and end users directly, which often bypasses the security technology. This is why some security experts say there are two types of organizations, those that have been breached and know about it and those that have been breached and don’t know about it. To read this article in full or to leave a comment, please click here

Closing the incident response gap: Q&A with Sean Convery of ServiceNow

A decade ago, security meant a big firewall at a single ingress point.  All devices and applications were under IT’s tight control, so they did not create significant security risks.  Today, everything has changed.  The rise of cloud computing, BYOD, shadow IT, WiFi devices, software defined everything and other trends have blown up the tightly controlled model and created a rather chaotic system. Adding to the challenge is that attackers are getting smarter and targeting IoT systems and end users directly, which often bypasses the security technology.  This is why some security experts say there are two types of organizations, those that have been breached and know about it and those that have been breached and don’t know about it. To read this article in full or to leave a comment, please click here

Closing the incident response gap: Q&A with Sean Convery of ServiceNow

A decade ago, security meant a big firewall at a single ingress point.  All devices and applications were under IT’s tight control, so they did not create significant security risks.  Today, everything has changed.  The rise of cloud computing, BYOD, shadow IT, WiFi devices, software defined everything and other trends have blown up the tightly controlled model and created a rather chaotic system. Adding to the challenge is that attackers are getting smarter and targeting IoT systems and end users directly, which often bypasses the security technology.  This is why some security experts say there are two types of organizations, those that have been breached and know about it and those that have been breached and don’t know about it. To read this article in full or to leave a comment, please click here

Your Guide to ContainerCamp UK

#ContainerCamp UK kicks off tomorrow in the heart of London’s Piccadilly and we can hardly contain our excitement. There are loads of Docker talks that you won’t want to miss!

 

Friday, September 9th

 

9:55 am: Ben Firshman, Director of Product Management at Docker – Building serverless apps with Docker

Everyone’s talking about serverless right now. For good reason – it’s makes distributed apps much simpler to build, scale, and maintain. In this session, Ben will demonstrate how you can use Docker to mix in serverless techniques – right now – and how serverless is going to change how you build distributed apps in the future.

CpGEo3vWIAE8WOf

 

11:15 am: Nishant Totla, Docker Software Engineer – Orchestrating Linux containers while tolerating failures

Management of containers in production requires special care in order to keep the application up and running. In this session, learn the mechanisms and architecture of the Docker Engine orchestration platform (using a framework called swarmkit) to tolerate failures of services and machines, from cluster state replication and leader-election to container re-scheduling logic when a host goes down.

CrI9jkrW8AAbTGW

 

12:35 pm Lightening Talk: #DockerCaptain Nicholas Deloof – Continuous delivery in a container world

 

Continue reading

Box’s developer platform revamped with new content types, UI tools

While Box is probably best known for its user-facing storage and content services, the company is also operating a separate platform for developers, and it received a handful of updates Thursday.The platform, which lets developers integrate Box's tools for managing content into the apps they're building, now supports new content types, annotations, and watermarking. In addition, the company launched a new set of tools for building web user interfaces and a revamped developer console.Continuing to upgrade the platform may make it more appealing to developers, at a time when Box is fighting to be one of the services that developers take to power their applications. The Box Platform gives developers the ability to build Box's file storage and content services capabilities into an application, without having to build all of that themselves.To read this article in full or to leave a comment, please click here

What Apple really just announced: 4 new things to lose

As expected, the iPhone 7 that Apple announced yesterday will ship without a headphone jack. For many people, possibly including me, that will be a deal killer, but not necessarily for the obvious reasons. See also: When it comes to the iPhone’s headphone jack, I’m with Woz Because while there won’t be a headphone jack in the box, there will be an adapter, so you can still connect all those suddenly obsolescent non-Lightning headphones all us Luddites have been spending big bucks on for the past 10 years.To read this article in full or to leave a comment, please click here

Need to build a customer community? This new Salesforce tool can help

Engaging customers is an ongoing challenge for companies large and small, but Salesforce has been working to make it easier. On Thursday, the CRM giant took its efforts a big step further with the launch of Lightning Bolt, a new product designed to jump-start the process of building customer communities, portals, and websites.Last year, Salesforce introduced Lightning Templates for Community Cloud, enabling companies to create customized communities for their customers, partners, and employees. Lightning Bolt takes the template concept up another notch.To read this article in full or to leave a comment, please click here

Government ill-equipped to thwart cyberwarfare

In January, V. Miller Newton, CEO and president of PKWARE, made his annual list of predictions for most likely cyberattacks of the year. Number 3 on the list: The U.S. electrical grid will be attacked. He's been making predictions since 2011, and claims 95 percent accuracy so far (he also predicts that healthcare systems were at risk and that smart watches would be hacked). [ Related: Battling cyberattacks with bombs? ] "This country's infrastructure runs on antiquated technology and systems," he says. "We've already seen an electrical power grid hacked in December of last year in Ukraine," which blacked out 103 cities and partially blacked out an additional 186.To read this article in full or to leave a comment, please click here

The Galaxy Note 7 implicated in dramatic Jeep and house fires, reports say

Those who have yet to return their faulty Galaxy Note 7 are literally playing with fire. Two incidents this week illustrate just how seriously Note 7 owners ought to take the threat of the phone’s faulty battery. One example comes from a St. Petersburg, Florida man who left his new Note 7 charging inside of his Jeep while unloading furniture. He returned to find the car consumed in flames. The aftermath is pretty devastating. Fox 13 The aftermath of a Jeep that was completely engulfed in flames from what was likely a Note 7 catching fire.To read this article in full or to leave a comment, please click here

Google puts screws to HTTP with new warnings in Chrome

Google today continued its campaign to tighten the screws on unencrypted web traffic as it outlined the next steps it will take with Chrome to warn users of insecure connections.Starting with Chrome 56, which is currently scheduled to ship in stable format on Jan. 31, 2017, the browser will mark sites that transmit either passwords or credit card information over HTTP connections as "non-secure."The move will be "Part of a long-term plan to mark all HTTP sites as non-secure," Emily Schechter, a product manager in the Chrome security team, said in a post to a company blog Thursday. The plan, Schechter continued, "will take place in gradual steps, based on increasingly stringent criteria."To read this article in full or to leave a comment, please click here

Google puts screws to HTTP with new warnings in Chrome

Google today continued its campaign to tighten the screws on unencrypted web traffic as it outlined the next steps it will take with Chrome to warn users of insecure connections.Starting with Chrome 56, which is currently scheduled to ship in stable format on Jan. 31, 2017, the browser will mark sites that transmit either passwords or credit card information over HTTP connections as "non-secure."The move will be "Part of a long-term plan to mark all HTTP sites as non-secure," Emily Schechter, a product manager in the Chrome security team, said in a post to a company blog Thursday. The plan, Schechter continued, "will take place in gradual steps, based on increasingly stringent criteria."To read this article in full or to leave a comment, please click here

FBI arrests hackers who allegedly dumped details on government agents

U.S. authorities have arrested two suspects allegedly involved in dumping details on 29,000 officials with the FBI and the Department of Homeland Security.Andrew Otto Boggs and Justin Gray Liverman have been charged with hacking into the internet accounts of senior U.S. government officials and breaking into government computer systems.Both suspects were arrested on Thursday, according to the U.S. Department of Justice.Boggs, age 22, and Liverman, 24, are from North Carolina and are allegedly part of a hacking group called Crackas With Attitude.From October 215 until February, they used hacking techniques, including "victim impersonation" to trick internet service providers and a government help desk into giving up access to the accounts, the DOJ alleged.To read this article in full or to leave a comment, please click here

FBI arrests hackers who allegedly dumped details on government agents

U.S. authorities have arrested two suspects allegedly involved in dumping details on 29,000 officials with the FBI and the Department of Homeland Security.Andrew Otto Boggs and Justin Gray Liverman have been charged with hacking into the internet accounts of senior U.S. government officials and breaking into government computer systems.Both suspects were arrested on Thursday, according to the U.S. Department of Justice.Boggs, age 22, and Liverman, 24, are from North Carolina and are allegedly part of a hacking group called Crackas With Attitude.From October 215 until February, they used hacking techniques, including "victim impersonation" to trick internet service providers and a government help desk into giving up access to the accounts, the DOJ alleged.To read this article in full or to leave a comment, please click here

20% off Kuna Smart Home Security Outdoor Light & Camera – Deal Alert

Kuna is a smart home security camera in a stylish outdoor light that detects and allows you to interact with people outside your door. The security device includes HD live and recorded video, two-way intercom, alarm, smart motion detection alerts to your phone, and more. Easy 15 minute installation with no batteries to replace so you have continuous protection around the clock. Be protected at all times - Access HD live video with its 720P wide angle camera, communicate via its two way intercom from your mobile device, or activate its 100 dB alarm siren. Smart light control lets you turn on or off your lights remotely, or program a schedule for when you're away. Access live video or review & download events for 2 hours free or up to 30-days on an optional subscription plan, starting as low as $4.99 per month. This Kuna security light averages 4 out of 5 stars from over 330 people (read reviews), and its typical list price of $199 has been reduced 20% to $159. See the discounted Kuna Smart Home Security Light and Camera on Amazon.To read this article in full or to leave a comment, please click here

20% off Kuna Smart Home Security Outdoor Light & Camera – Deal Alert

Kuna is a smart home security camera in a stylish outdoor light that detects and allows you to interact with people outside your door. The security device includes HD live and recorded video, two-way intercom, alarm, smart motion detection alerts to your phone, and more. Easy 15 minute installation with no batteries to replace so you have continuous protection around the clock. Be protected at all times - Access HD live video with its 720P wide angle camera, communicate via its two way intercom from your mobile device, or activate its 100 dB alarm siren. Smart light control lets you turn on or off your lights remotely, or program a schedule for when you're away. Access live video or review & download events for 2 hours free or up to 30-days on an optional subscription plan, starting as low as $4.99 per month. This Kuna security light averages 4 out of 5 stars from over 330 people (read reviews), and its typical list price of $199 has been reduced 20% to $159. See the discounted Kuna Smart Home Security Light and Camera on Amazon.To read this article in full or to leave a comment, please click here