IDG Contributor Network: Cheers! Choose the right wine with Sommely IoT smart caps

Choosing the right wine for a meal takes both skill and a little luck. It’s an area where many wine drinkers could use some help.Sommely wine caps help when a sommelier isn’t available.This elegant IoT-based solution combines wine recommendations, inventory management and the ability to physically locate wine bottles. It addresses a need that’s common in managing other perishable inventories, such as: What is in the inventory? When are the items in inventory about to expire? Which items in the inventory best meet the demand? Where is the physical location of the items so that they can be easily retrieved? Wine selection is a complex decision with dozens of wine varieties and thousands of brands. To read this article in full or to leave a comment, please click here

Why Microsoft’s Edge browser is missing its edge

The introduction of Windows 10 in October 2014 also brought along a new default web browser named Edge. The company has been touting Edge as a replacement for Internet Explorer (IE), which is now into its third decade of service for the company. But user adoption of the new browser isn’t piling up the way the company would probably like.To read this article in full or to leave a comment, please click here(Insider Story)

US investigates Russia for attempting to hack the election

Intelligence and law enforcement agencies are reportedly investigating whether Russia has launched a broad, covert operation to disrupt the U.S. elections in November.Officials believe that Russia appears to be attempting to spread disinformation and hack into U.S. political systems in an effort to undermine confidence in the upcoming election, according to a report in the Washington Post. Investigators do not have "definitive" proof of a Russian operation, but there is "significant concern," the Post quoted an anonymous senior intelligence official as saying.To read this article in full or to leave a comment, please click here

US investigates Russia for attempting to hack the election

Intelligence and law enforcement agencies are reportedly investigating whether Russia has launched a broad, covert operation to disrupt the U.S. elections in November.Officials believe that Russia appears to be attempting to spread disinformation and hack into U.S. political systems in an effort to undermine confidence in the upcoming election, according to a report in the Washington Post. Investigators do not have "definitive" proof of a Russian operation, but there is "significant concern," the Post quoted an anonymous senior intelligence official as saying.To read this article in full or to leave a comment, please click here

Box unveils new Relay workflow tool in partnership with IBM

Companies that want to try simplifying the tangled mess of their internal workflows will be able to use a new tool from Box to help.Box Relay is a new product the enterprise storage company announced on Tuesday that's aimed at giving employees a way to manage and track the process of doing  repetitive work, like submitting expense reports and getting agreements approved.Using Relay, power users will be able to design workflows that they can then share with co-workers inside an organization and people from other companies who work with them. According to Chris Yeh, Box's senior vice president of product, Relay is aimed at making Box the system that people use to get work done together, in addition to storing files.To read this article in full or to leave a comment, please click here

BrandPost: Survey reveals desire and constraints of enterprise network modernization

There’s broad recognition among enterprises of the need for network modernization, but many decision-makers are constrained by the prospect of capital equipment outlays, proving a solid return on investment, or fear of being locked into a proprietary solution. Those are key findings in a soon to be published survey conducted by IDG Research Services. One third of IT decision-makers think it’s highly likely their organizations will modernize their network connectivity strategies over the next year and another 46 percent indicate there’s some likelihood. Today, virtually every enterprise places a premium on flexibility and agility, and few are willing to commit to long-term, costly outlays for network technology that can’t adapt to their future needs.To read this article in full or to leave a comment, please click here

MacBook Battery Replacement Requires Admin Credentials?

Over the weekend, I investigated the possibility of Apple replacing the tired battery in my four year old rMBP13. Yes, they can do it. It’s $199 for that particular model. But they also require an admin-level username and password for the device. Here’s an excerpt from the chat session.


Apple support rep:

What is the Admin Name and password for your Mac?

Me:

Will not share. Definitely should not be required for a battery replacement.

Apple support rep:

It is required. When the Mac goes to the repair depot that is required. You can remove that information so there is just an automatic log in. And you can set it up again when you get it back. We do not ask for any information that is not required.

Me:

Okay, then we’re done here. Thanks very much for your help!


An automatic log in, while an improvement from a certain point of view, isn’t a fix. No, you don’t have to know the user/pass now to access the system now, but you’re still on the system with admin-level credentials. Anyone with admin equivalent credentials to the system can, with a minimum of effort, get into whatever part of the file system Continue reading

An Engineer’s Top Six Reasons to Attend AnsibleFest Brooklyn 2016

Why-Attend-Ansible-Fest-Brooklyn-Blog.png

AnsibleFest is coming to Brooklyn 

We've held two record breaking AnsibleFests this year with exceptional audiences and technical content. Rolling forward, there are going to be some great resources for engineers and infrastructure managers at Brooklyn on October 10 and 11th.

Whether you are an Ansible contributor or a user, there will be content for you. For contributors, the Ansible Contributor Summit on the October 10th is a wealth of information. If you are a user, you’ll have fantastic opportunities to speak with people along the entire spectrum of the Ansible DevOps and development experience both from Ansible core engineers to engineers and managers from other companies using Ansible. So let’s talk about six great reasons to join us at AnsibleFest in Brooklyn on October 11th:

1) First, it’s in Brooklyn

Brooklyn is a great hub of technology. Companies such as Bank of America, Comcast, HBO and J. Crew will be in attendance. Presentations will cover everything from the greenfield world in which companies began DevOps and Ansible to technical deep dives into issues and solutions. It’s likely that if our presenters have done it, there are lessons to be learned from their experience, and their experiences will be on display.

2) Ask an Expert

Continue reading

Stealthy, tricky to remove rootkit targets Linux systems on ARM and x86

Security researchers have identified a new family of Linux rootkits that, despite running from user mode, can be hard to detect and remove.Called Umbreon, after a Pokémon character that hides in the darkness, the rootkit has been in development since early 2015 and is now being sold on the underground markets. It targets Linux-based systems on the x86, x86-64 and ARM architectures, including many embedded devices such as routers.According to malware researchers from antivirus firm Trend Micro, Umbreon is a so-called ring 3 rootkit, meaning that it runs from user mode and doesn't need kernel privileges. Despite this apparent limitation, it is quite capable of hiding itself and persisting on the system.To read this article in full or to leave a comment, please click here

Stealthy, tricky to remove rootkit targets Linux systems on ARM and x86

Security researchers have identified a new family of Linux rootkits that, despite running from user mode, can be hard to detect and remove.Called Umbreon, after a Pokémon character that hides in the darkness, the rootkit has been in development since early 2015 and is now being sold on the underground markets. It targets Linux-based systems on the x86, x86-64 and ARM architectures, including many embedded devices such as routers.According to malware researchers from antivirus firm Trend Micro, Umbreon is a so-called ring 3 rootkit, meaning that it runs from user mode and doesn't need kernel privileges. Despite this apparent limitation, it is quite capable of hiding itself and persisting on the system.To read this article in full or to leave a comment, please click here

Big Data Rides Up The Cloud Abstraction Wave

There is no workload in the datacenter that can’t, in theory and in practice, be supplied as a service from a public cloud. Big Data as a Service, or BDaaS for short, is an emerging category of services that delivers data processing for analytics in the cloud and it is getting a lot of buzz these days – and for good reason. These BDaaS products vary in features, functions, and target use cases, but all address the same basic problem: Big data and data warehousing in the cloud is deceptively challenging and customers want to abstract away the complexity.

Data

Big Data Rides Up The Cloud Abstraction Wave was written by Timothy Prickett Morgan at The Next Platform.

SSH Agent on OS X

There’s a lot of information on the intertoobs about getting ssh-agent “working” in OS X and even more articles about when and how the stock behavior of ssh-agent changed (mostly with respect to how ssh-agent interacted with the Keychain).

This article doesn’t cover or care about any of that.

This article is concerned with:

  • Enabling ssh-agent in such a way that I can “ssh-add” in one terminal window and that same agent (and the loaded keys) is available in all of my other terminal windows.
  • Enabling use of ssh-agent from MacPorts and/or Homebrew and not the older ssh-agent that OS X ships with in /usr/bin.
  • To avoid having to put my keys in the Keychain (just a matter of preference).

Compatibility

Beware, reader. There’s an awful lot of outdated, inaccurate information out there on how to modify ssh-agent behavior on OS X. Guess what? OS X changes from version to version! Many articles out there cater to older versions of the OS and are either no longer applicable (due to changes in OS X behavior) or plain don’t work (due to functional changes in the software).

The steps below have been tested with OS X El Capitan (10.11).

What’s Continue reading

How blockchain will disrupt your business

Like mobile and cloud, blockchain — first implemented in the original source code of bitcoin in 2009 — stands poised to profoundly disrupt business. If it lives up to its promise, it won't just be financial institutions that are disrupted."If you can transfer money or something of value through the internet just like another form of data, what else can you do with it? It provides a way to establish trust in the digital world," says Angus Champion de Crespigny, Financial Services Blockchain and Distributed Infrastructure Strategy Leader, Ernst & Young. "How do you ensure something is the original copy of something on the internet? Prior to blockchain technology, you couldn't."To read this article in full or to leave a comment, please click here

5 tips to better understand millennial managers

Millennials are now the largest generation in the U.S. workforce, which means they're quickly infiltrating every rank in corporate America -- especially middle management. While millennials want much of the same things as previous generations, they also have different values and expectations for their employers.To read this article in full or to leave a comment, please click here

7 tips for making a good impression at your new job

The first month in a new job is arguably one of the most critical, as it can set the tone for your entire tenure with the company. Your actions and reactions can make or break your reputation at your new company and can impact your entire career, says Todd Dean, co-founder and CMO of mobile employment app Wirkn. Here are Dean's six tips for making your first month at a new role one of your best.To read this article in full or to leave a comment, please click here(Insider Story)