Windows 10 troubleshooting and fixes revisited

Long before the Windows 10 Anniversary Update appeared, it was obvious that Microsoft was putting more energy and effort into its troubleshooting tools. These are readily available by typing "trouble" into Cortana (or the search box, if you prefer) and then selecting the Troubleshooting (Control panel) result. What I didn't know at the time was that the future of Windows 10 didn't include fix-its.To read this article in full or to leave a comment, please click here(Insider Story)

Apple patches iOS security flaws found in spyware targeting activist

To spy on a human rights activist, hackers allegedly connected to a Middle Eastern government used three previously unknown vulnerabilities in Apple’s iOS.The claims -- from research at Toronto-based Citizen Lab and mobile security firm Lookout -- focus on spyware that targeted Ahmed Mansoor, an activist in the United Arab Emirates.Earlier this month, Mansoor received an SMS text message on his iPhone claiming to offer “new secrets” about tortured detainees in his country. However, inside the message was a link that, once clicked, can infect an iPhone with spyware, using three zero-day exploits of iOS, the research found.To read this article in full or to leave a comment, please click here

Apple patches iOS security flaws found in spyware targeting activist

To spy on a human rights activist, hackers allegedly connected to a Middle Eastern government used three previously unknown vulnerabilities in Apple’s iOS.The claims -- from research at Toronto-based Citizen Lab and mobile security firm Lookout -- focus on spyware that targeted Ahmed Mansoor, an activist in the United Arab Emirates.Earlier this month, Mansoor received an SMS text message on his iPhone claiming to offer “new secrets” about tortured detainees in his country. However, inside the message was a link that, once clicked, can infect an iPhone with spyware, using three zero-day exploits of iOS, the research found.To read this article in full or to leave a comment, please click here

Apple patches iOS against potent zero-day spyware attack

Apple is issuing patches for three iOS zero-day vulnerabilities known as Trident that have been exploited for years by an Israel-based spyware vendor against a human rights activist, an investigative journalist and others.The attack, called Pegasus, is flexible, letting attackers steal a broad range of data from iPhones and iPads, according to the firms that discovered it.“In this case, the software is highly configurable: depending on the country of use and feature sets purchased by the user, the spyware capabilities include accessing messages, calls, emails, logs, and more from apps including Gmail, Facebook, Skype, WhatsApp, Viber, FaceTime, Calendar, Line, Mail.Ru, WeChat, SS, Tango, and others,” according to a blog post by Lookout Security, which, along with Citizen Lab, unearthed the vulnerabilities and Pegasus.To read this article in full or to leave a comment, please click here

Apple patches iOS against potent zero-day spyware attack

Apple is issuing patches for three iOS zero-day vulnerabilities known as Trident that have been exploited for years by an Israel-based spyware vendor against a human rights activist, an investigative journalist and others.The attack, called Pegasus, is flexible, letting attackers steal a broad range of data from iPhones and iPads, according to the firms that discovered it.“In this case, the software is highly configurable: depending on the country of use and feature sets purchased by the user, the spyware capabilities include accessing messages, calls, emails, logs, and more from apps including Gmail, Facebook, Skype, WhatsApp, Viber, FaceTime, Calendar, Line, Mail.Ru, WeChat, SS, Tango, and others,” according to a blog post by Lookout Security, which, along with Citizen Lab, unearthed the vulnerabilities and Pegasus.To read this article in full or to leave a comment, please click here

Informatica CEO: ‘Data security is an unsolved problem’

Companies today are awash in data, but current tools and processes are not enabling them to keep it secure.That's according to Informatica CEO Anil Chakravarthy, whose says his company -- which has traditionally focused on data management and integration -- is embarking on a major push to go further into data security."You hear about breaches all the time -- just imagine all the ones you're not hearing about," Chakravarthy said in a recent interview. "Data security today is an unsolved problem for customers."Last year, Informatica launched a product called Secure@Source that promises a data-centric approach to information security by helping organizations identify and visualize sensitive data wherever it resides.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Survey: Kids now online at age 3

The Internet has changed young children’s lives and they now are as comfortable picking up an iPad as they are a coloring book.Kids now spend twice as much time on the Internet as they did 10 years ago, and it’s escalating, research from an age-verification software developer has discovered.UK-based Agechecked says that over a quarter of kids there (28 percent) are using the Internet before they attend their first school. The statutory school age there is from five years old.And “one in six children, or 16 percent, begin their online experience at age three or under” the report (PDF) claims. Parents need to get aware, the company believes, and they should be acquainting themselves with their kids’ habits.To read this article in full or to leave a comment, please click here

12 most powerful hyperconverged infrastructure vendors

For organizations that want the agility of public cloud infrastructure but want the security and peace of mind of hosting the hardware on their own premises, hyperconverged infrastructure has emerged as a dominant hardware platform for hosting private clouds, virtual desktops and new application development environments. Over the past five years the hyperconverged infrastructure (HCI) market has evolved out of its preceding converged infrastructure (CI). Like CI, HCI’s foundational elements include an integrated compute, network and storage infrastructure offering. Unlike CI, HCI goes a step further with a software that sits atop the virtualized components that control the entire system. This creates software-defined storage, networking and compute, allowing resources to be spun up and down rapidly and through API calls. Research firm Forrester predicts that HCI systems will “become ubiquitous” as a common platform for deploying on-premises infrastructure.To read this article in full or to leave a comment, please click here

Why cloud architecture matters: The advantages of multi-instance vs. multi-tenant

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

The first public cloud services went live in the late 1990s using a legacy construct called a multi-tenant architecture, and while features and capabilities have evolved, many cloud services are still based on this 20th century architecture. That raises serious questions about how legacy clouds prepare for calamity. While all architectures are susceptible to hardware failures and other issues that cause outages, the clouds that use a  multi-instance architecture can better minimize the impact of an outage. 

To read this article in full or to leave a comment, please click here

Why cloud architecture matters: The advantages of multi-instance vs. multi-tenant

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.The first public cloud services went live in the late 1990s using a legacy construct called a multi-tenant architecture, and while features and capabilities have evolved, many cloud services are still based on this 20th century architecture. That raises serious questions about how legacy clouds prepare for calamity. While all architectures are susceptible to hardware failures and other issues that cause outages, the clouds that use a  multi-instance architecture can better minimize the impact of an outage. To read this article in full or to leave a comment, please click here

How CloudHealth Technologies keeps your clouds healthy

The world of cloud management is a fractured and busy one. There are cloud managers that help you control costs, ones that help you track usage, ones that monitor performance and others that provide infrastructure provisioning.Cloud Health Technologies Founder and CTO Joe Kinsella saw an opportunity in the market four years ago for another type of cloud management product: One that integrates all of those disparate cloud management tools together and provides centralized visibility into them. CloudHealth Technologies was born.+MORE AT NETWORK WORLD: 4 Tips for buying cloud management software +To read this article in full or to leave a comment, please click here

50% off Sennheiser PC 363D High Performance Surround Sound Gaming Headset – Deal Alert

Combining Sennheiser headphone and microphone engineering with Dolby Laboratory 7.1 surround sound techhologies takes gaming to another dimension. Sennheiser's technology angles the drivers in the ear cups channeling the sound directly into your ears. This improves sonic detail, definition and dynamics. Dolby's 7.1 technology comes via a USB sound card providing headphone control and remarkable spacial effects letting you accurately pin point sounds with 3D like dimensionality. Averaging 4.5 out of 5 stars on Amazon (read reviews), the list price of $299.95 has been reduced a significant 50% to just $149.95.  See the discounted Sennheiser PC 363D surround sound gaming headset now on Amazon.To read this article in full or to leave a comment, please click here

STP/RSTP election process

Just a quick reminder on STP election process (thanks to Dmitry Figol): Choose Root bridge: lowest Bridge ID (priority + system mac) all ports on a Root bridge are designated Choose Root port on each non-root bridge: lowest path cost to the root lowest neighbor Bridge ID lowest neighbor’s Port ID (port priority + internal port number)

Reaction: Forced Updates

The controversy over Microsoft forcing upgrades on users is in the news again, as the EFF has posted an article once again about the forced upgrades to Windows 10, and the various data collection schemes Microsoft has put in place. I understand the concern, but… A couple of points to consider, starting with forced upgrades—

When I worked in customer support I sometimes wished we had forced upgrades (rather than paid ones, in fact). There are so many times someone doesn’t upgrade past an obvious bug. We would spend hours working around the bug because they didn’t want to upgrade. It probably cost the company I worked for millions of dollars in support a year so we could refrain from saying, “take two upgrades and call me in the morning.”

As an operator, I see the other side of this story—if I don’t need the upgrade, or I’m not hitting the bug, I shouldn’t need to upgrade.

The world of IoT—in fact, the world in which we live, where millions of machines are used as botnets without the knowledge of their owners—is pretty frightening without forced upgrades. I wonder how many millions of dollars a year machines with Continue reading