25 surprising facts about Facebook

25 things you probably don’t know about FacebookImage by ThinkstockFacebook may have started out as a small website available only to Harvard students, but the site has enjoyed what is arguably an unparalleled level of growth over the past 12 years. Whereas some social networks of years past have tended to cater to one particular demographic, Facebook is unique insofar that it is used and enjoyed by both teens and adults alike, not to mention the many businesses and organizations use it to engage with customers and patrons. Indeed, for many people across the globe, Facebook is the one site that they tend to spend the most time on a day-to-day basis.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Got skills? Volunteer your IoT expertise to make a difference

Sometimes a little help is all it takes, especially when you have technical skills to offer.You may have exactly the skills a non-profit needs to expand its social impact. Or perhaps you could help a motivated youth get his or her first technical job. Your technical expertise becomes even more meaningful when volunteered for the greater good. How do you start?Answer these questions to find the volunteering opportunities that could make the most of your skills. What social cause inspires you? Education? Environmental issues? Helping the disadvantaged? Disaster relief? What skills do you have to share? Programming? Systems design? Training? How much time can you allocate to volunteering? Could you volunteer onsite or only online? Your answers will help narrow the search of non-profits to research. The Idealist directory lists thousands of non-profit organizations. Here are three I’ve volunteered with that look for technical experts. Perhaps one might be right for you, too?To read this article in full or to leave a comment, please click here

New products of the week 8.15.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.24-Port Dual GigE Console ServerKey features: A 24-port, out-of-band console access solution.  Includes dual 10/100/1000Base-T Ethernet ports to allow connection to both a primary production network and a secondary maintenance network.  Also features dual power inlets. More info.To read this article in full or to leave a comment, please click here

New products of the week 8.15.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.24-Port Dual GigE Console ServerKey features: A 24-port, out-of-band console access solution.  Includes dual 10/100/1000Base-T Ethernet ports to allow connection to both a primary production network and a secondary maintenance network.  Also features dual power inlets. More info.To read this article in full or to leave a comment, please click here

Relocated at last

Just a quick note to let you know that I am now based in the San Francisco Bay Area. After much preparation, and administrative hassle, everything is now sorted. My company has relocated me to the Bay Area, where I will work at the San Jose HQ.

Anna has of course joined me. We’re living in short-term accommodation in San Francisco right now, and over the next couple of months we’ll figure out where we want to stay long-term.

Lots to do, and lots to learn. But I think it will be a good move for me professionally, and I hope that Anna enjoys it too.

If you live in the Bay Area, or you’re passing through, I’d love to catch up with you, once we get settled. I’m looking forward to being able to unpack my bags in about a week or so!

iPhone 7 Rumor Rollup: Holes in this story; leaky week; 3 or 2 models?

With Apple expected to announce the iPhone 7 on Sept. 7, time is running short to squeeze in fresh rumors about the next magical smartphone, which is expected to boast a more powerful processor, more storage, better camera technology and improved water resistance. But have no fear, as such speculation is indeed swirling.Holes in this iPhone 7 story On Friday, bloggers hopped on a report from France’s Nowhereelse website, which shared a schematic supposedly from an Apple partner in China that shows an iPhone 7 possibly outfitted with a microphone rather than the 3.5mm headphone jack that is rumored to be disappearing. AppleInsider posted the headline: “Alleged ‘iPhone 7’ schematics hint at mic instead of second speaker.”To read this article in full or to leave a comment, please click here

HEI Hotels reports point-of-sale terminals breach

HEI Hotels & Resorts has reported a possible compromise of payment card information at its point-of-sale terminals, the latest in a string of attacks on such systems at hotels, hospitals and retailers.The company, which manages close to 60 Starwood, Hilton, Marriott, Hyatt and InterContinental properties, said it appears that malicious software was installed on the payment processing systems at certain properties, with the aim of harvesting the card data as it was routed through the systems.The compromise may have possibly affected the personal information of some hotel customers who made payment card purchases at point-of-sale terminals, such as food and beverage outlets, at certain HEI managed properties.To read this article in full or to leave a comment, please click here

HEI Hotels reports point-of-sale terminals breach

HEI Hotels & Resorts has reported a possible compromise of payment card information at its point-of-sale terminals, the latest in a string of attacks on such systems at hotels, hospitals and retailers.The company, which manages close to 60 Starwood, Hilton, Marriott, Hyatt and InterContinental properties, said it appears that malicious software was installed on the payment processing systems at certain properties, with the aim of harvesting the card data as it was routed through the systems.The compromise may have possibly affected the personal information of some hotel customers who made payment card purchases at point-of-sale terminals, such as food and beverage outlets, at certain HEI managed properties.To read this article in full or to leave a comment, please click here

Mom discovered twin daughters’ bedroom being streamed via Live Camera Viewer app

If you were considering potential vacation locations, then the Android app Live Camera Viewer for IP Cams is purportedly “for travelers to have a spy sneak peek at travel destinations.” Yet children’s bedrooms would never occur to me as a travel destination. A heartsick mom in Texas found out her kids’ bedrooms were being live-streamed via the app.ABC News recounted a story that started with a mom and son duo from Oregon; they had been surfing satellite images of Earth. The Oregon mom found the Live Camera Viewer app while looking for more satellite feeds. That’s when she saw a broadcast from Houston, Texas, of a little girl’s bedroom.To read this article in full or to leave a comment, please click here

Mom discovered twin daughters’ bedroom being streamed via Live Camera Viewer app

If you were considering potential vacation locations, then the Android app Live Camera Viewer for IP Cams is purportedly “for travelers to have a spy sneak peek at travel destinations.” Yet children’s bedrooms would never occur to me as a travel destination. A heartsick mom in Texas found out her kids’ bedrooms were being live-streamed via the app.ABC News recounted a story which started with a mom and son duo from Oregon; they had been surfing satellite images of Earth. The Oregon mom found the Live Camera Viewer app while looking for more satellite feeds. That’s when she saw a broadcast from Houston, Texas, of a little girl’s bedroom.To read this article in full or to leave a comment, please click here

Segment Routing on JUNOS – The basics

Anybody who’s been to any seminar, associated with any major networking systems manufacturer or bought any recent study material, will almost certainly have come across something new called “Segment Routing” it sounds pretty cool – but what is it and why has it been created?

To understand this we first need to rewind to what most of us are used to doing on a daily basis – designing/building/maintaining/troubleshooting networks, that are built mostly around LDP or RSVP-TE based protocols. But what’s wrong with these protocols? why has Segment-Routing been invented and what problems does it solve?

Before we delve into the depths of Segment-Routing, lets first remind ourselves of what basic LDP based MPLS is. LDP or “Label Distribution Protocol” was first invented around 1999, superseding the now defunct “TGP” or “Tag distribution protocol” in order to solve the problems of traditional IPv4 based routing. Where control-plane resources were finite in nature, MPLS enabled routers to forward packets based solely on labels, rather than destination IP address, allowing for a much more simple design. The fact that the “M” in MPLS stands for “Multiprotocol” allowed engineers to support a whole range of different services and encapsulations, that could be tunnelled Continue reading

Guccifer 2.0 takes credit for hacking another Democratic committee

The hacker who claims to have breached the Democratic National Committee’s computers is now taking credit for hacking confidential files from a related campaign group.Guccifer 2.0 alleged on Friday that he also attacked the servers of the Democractic Congressional Campaign Committee (DCCC). He posted some of the purported files on his blog, and is promising journalists "exclusive materials" if they contact him directly.Although Guccifer 2.0 claims to be a lone hacktivist, some security experts believe he's actually a persona created by Russian government hackers who want to influence the U.S. presidential election.To read this article in full or to leave a comment, please click here

Guccifer 2.0 takes credit for hacking another Democratic committee

The hacker who claims to have breached the Democratic National Committee’s computers is now taking credit for hacking confidential files from a related campaign group.Guccifer 2.0 alleged on Friday that he also attacked the servers of the Democractic Congressional Campaign Committee (DCCC). He posted some of the purported files on his blog, and is promising journalists "exclusive materials" if they contact him directly.Although Guccifer 2.0 claims to be a lone hacktivist, some security experts believe he's actually a persona created by Russian government hackers who want to influence the U.S. presidential election.To read this article in full or to leave a comment, please click here