iPhone 7 Rumor Rollup: WWDC invites; Storage party; 3-year cycles

It can be painful enough stretching out iPhone rumors for a year or two, but a new report suggests Apple is changing its cycle for major iPhone refreshes from 2 years to 3. In other words, yes, the iPhone 7 and iPhone 7 Plus could be as boring as headlines have claimed.Nikkei reports that a slowing smartphone market and a lack of room for enhancements have forced Apple to change its ways. Nikkei says look to 2017 if you want excitement:"On the other hand, the 2017 model will likely involve major enhancements and design changes, including adoption of an organic electroluminescent display. The new device will also be able to create more complex tactile vibrations on the display because of a tiny, but high-performance motor equipped inside."To read this article in full or to leave a comment, please click here

Nest CEO Tony Fadell set to leave the company

In an announcement that was rather sudden though perhaps not all that surprising, Tony Fadell on Friday said that he will be stepping down as the CEO of Nest. A legendary Silicon Valley figure, Fadell is not only credited as being the man behind the creation of the iPod but also played an important role in the early development of the iPhone. Following his departure from Apple in 2008, Fadell went on to co-found Nest where the company received numerous accolades for its thermostat.In early 2014, Google agreed to purchase Nest for $3.2 billion. At first glance, the acquisition seemed to be a smart strategic move, especially given the push towards smart appliances in the home. But over the past few years, Nest hasn't exactly performed up to expectations. In recent months, we've seen reports of employee discontent along with reports that the higher ups at Google were expecting more product rollouts from the Nest team.To read this article in full or to leave a comment, please click here

TeamViewer denies hack, blames hijacked accounts on password reuse

A plethora of people with the remote desktop tool TeamViewer have been in an uproar after their machines were remotely hijacked; in some cases over the past month or so, users had their bank or PayPal accounts sucked dry. TeamViewer denied it has been hacked and launched two new security measures.After experiencing a TeamViewer takeover, IBM security researcher Nick Bradley thinks password reuse may be the problem. Bradley said he was gaming on his PC when he lost control of his mouse and TeamViewer popped up. He killed the app and dashed downstairs to another PC which had TeamViewer.To read this article in full or to leave a comment, please click here

TeamViewer Hacked or Breached or Something

If you’re a user of TeamViewer, the very popular “remote support, remote access, and online meeting software” for Windows, OS X, Linux, Chrome OS, iOS and Android, you might want to take a second to change all of your passwords. In fact, before you finish this article, before you learn why you should change your TeamViewer passwords, go change them right now to be really strong passwords and take down any copies you usually leave running that aren’t absolutely necessary … it’s that big a deal. Okay? Done? Good. The reason for my urging you to take immediate action is that through as yet undetermined means, someone or ones have managed to acquire an unknown but apparently huge number of TeamViewer account credentials and as a consequence, a number of TeamViewer users claim to have suffered huge financial losses.To read this article in full or to leave a comment, please click here

Watching Steve Jobs stare slack-jawed at Muhammad Ali

Everyone who has a personal story about Muhammad Ali is sharing it today, including this remarkable anecdote from Dan Bricklin, father of the spreadsheet, originally posted online in 1999. “For those of you too young to remember Ali as the most famous person in the world, let me tell you about the one time I saw him in person. I was at Ben Rosen / Esther Dyson's PC conference in Palm Springs, California; January 1983, I think. Ali was attending a fighter's training camp at the same hotel. We were walking to some event outside. I was next to Steve Jobs and maybe Bill Gates was there. Ali walked down the street. I just remember how we all stopped to watch, mouths open, even Steve. I remember how well he carried himself and his tailored clothes. It made our industry seem small -- here were our top people and all we could do was stand and stare as ‘the Greatest’ walked by oblivious to us and our industry.”To read this article in full or to leave a comment, please click here

EVPN – the basics

So I decided to take a deep dive into eVPN, I’ll mostly be looking into VLAN-aware bundling, as per RFC 7432 – and mostly because I think this will fit more closely, with the types of deployments most of the customers are used to – good old IRB interfaces and bridge-tables!

As everyone knows, VPLS has been available for many years now and it’s pretty widely deployed, most of the customers I see have some flavour of VPLS configured on their networks and use it to good effect – so why eVPN? what’s the point in introducing a new technology if the current one appears to work fine.

The reality is that multipoint layer-2 VPNs (VPLS) were never quite as polished as layer-3 VPNs, when layer-3 VPNs were first invented they became, and still are the in many cases the “go to” technology for layer-3 connectivity across MPLS networks, and the technology itself hasn’t really changed that much for well over a decade. The same cannot be said for VPLS, over the years we’ve had many different iterations of the technology:

  • Vanilla VPLS
    • LDP signalled
    • BGP signalled
  • H-VPLS (hierarchical VPLS)
    • BGP based
    • LDP based
  • VPLS auto-discovery

Along with the different Continue reading

Ping on you! – Beta 2.0 is online

Nicer, more stable, AJAX/JSON enabled pingonyou.com and also preparations in background to introduce the 24/7 Monitoring feature.

So here we are. First a bit of short history, if you have seen the first version of the pingonyou.com, you probably had a sense of 90’s view of the page just by looking at it. Everything was static HTML and all updates were actually refreshing the whole page (including every new line in the ping functionality needed a whole site refresh!). This was also including the fact that the design and color selection was really very basic. If you want to have a look on the old version, simply go to previous articles on this blog (where pictures are) for a comparison or here is a picture of beta 1.0. But lets now focus on the new version which is available from today!

Ping on You – Beta 2.0

The first thing is the color-scheme, after trying out several dozens of combinations, the blue variant was the best overall that provide both good console readability and combined with the fact that the functions that it provides needed to be categorized much better. First everyone that comes Continue reading

Google’s Nest may become a different kind of IoT company after CEO Fadell leaves

Nest co-founder and CEO Tony Fadell is leaving the company, a move that may mark a shift in strategy for one of the early stars of the Internet of Things.Fadell founded the startup, which makes connected thermostats and other smart-home gear, in 2011 with co-founder Matt Rogers. Google bought Nest in 2014. In a blog post on Friday, Fadell didn’t say much about why he was leaving but said he would become an advisor to Alphabet, the parent company of Nest and Google, and its CEO, Larry Page.The resignation came after news reports that said Nest was suffering from internal turmoil. In his parting note, Fadell said the company was growing fast and had a bright future.To read this article in full or to leave a comment, please click here

Doing eDiscovery, Litigation Hold, and Addressing Journaling in Office 365

Retaining and “journaling” content has been a key requirement of organizations for years, however as organizations have migrated to Office 365, plus with Microsoft’s shift to new and improved eDiscovery tools, the process of “holding” and “searching” for content has changed.This article covers a whole new series of best practices that EVERY legal department, compliance officer, and content / Office 365 administrator needs to read, understand, and ensure they have Office 365 setup properly so that when the time comes and they need to do eDiscovery of content, that the information they are looking for has actually been held and managed for future look-up.To read this article in full or to leave a comment, please click here

The quantum era has begun, this CEO says

Quantum computing's full potential may still be years away, but there are plenty of benefits to be realized right now.So argues Vern Brownell, president and CEO of D-Wave Systems, whose namesake quantum system is already in its second generation.Launched 17 years ago by a team with roots at Canada's University of British Columbia, D-Wave introduced what it called "the world's first commercially available quantum computer" back in 2010. Since then the company has doubled the number of qubits, or quantum bits, in its machines roughly every year. Today, its D-Wave 2X system boasts more than 1,000.The company doesn't disclose its full customer list, but Google, NASA and Lockheed-Martin are all on it, D-Wave says. In a recent experiment, Google reported that D-Wave's technology outperformed a conventional machine by 100 million times.To read this article in full or to leave a comment, please click here

Maersk hopes drones can deliver sweet savings

Shipping giant Maersk Group made headlines earlier this year when it used a drone to deliver a bucket of cookies to a tanker at sea. That was just the beginning of an effort the company thinks could dramatically change its business.The company is evaluating ways to expand its use of drones and plans a bigger test later this year, said Markus Kuhn, a supply chain manager at Maersk, at the Drones Data X conference in San Francisco.In January, the company made a drone fly 250 meters from one of its barges to a tanker and drop off a batch of cookies. It's now looking for a drone-making partner for a test flight that would haul a 10-kilogram package for 10 kilometers.To read this article in full or to leave a comment, please click here

Next-Generation ThunderX2 ARM Targets Skylake Xeons

Networking chip maker Cavium is one of the ARM server chip upstarts that is taking on Intel’s hegemony in the datacenter, and is probably getting the most traction among its ARM peers in the past year with its ThunderX multicore processors.

The first-generation ThunderX chips are seeing the most interest from hyperscalers and HPC centers, plus a few cloud builders, telcos, and large enterprises, that want to explore the possibilities of a different server architecture, and they will be even more intrigued by the second-generation ThunderX2 processors, which Cavium unveiled earlier this week at the Computex trade show in Taipei,

Next-Generation ThunderX2 ARM Targets Skylake Xeons was written by Timothy Prickett Morgan at The Next Platform.

Microsoft continues campaign to shut down stupid software pirates

Microsoft this week filed another lawsuit in federal court accusing unidentified individuals with stealing its software by illegally activating more than 1,000 copies of Windows 7, Vista and 8, and Office 2010 and 2013.The suit, filed with a Seattle court on Wednesday, was the latest in a string of cases opened by the Redmond, Wash. company in an effort to quash piracy."Microsoft's cyberforensics have identified over one thousand product activations originating from IP address 66.51.73.111 ('the IP Address'), which is presently assigned to Earthlink Inc., and which, on information and belief, is being used by the Defendants in furtherance of the unlawful conduct alleged herein," Microsoft's lawyers wrote in the complaint.To read this article in full or to leave a comment, please click here

10% off Bose SoundLink Color Bluetooth Speaker- Deal Alert

The SoundLink Color from Bose is designed to be portable and durable, while still delivering the full, rich sound you would expect from Bose. Pairing is easy with simple voice prompts, and the unit can be paired with two devices, so when the first stops the second one can play. It comes in several stylish colors, has an auxiliary input jack for non-Bluetooth devices, and delivers up to 8 hours of music on a single charge. The speaker averages 4.5 out of 5 stars from nearly 5,000 customers (read reviews) and can be purchased at 10% off its regular listing price ($116 - See on Amazon).To read this article in full or to leave a comment, please click here

Enterprises Are Investing in Network Security Analytics

If I’ve heard it once, I’ve heard it one thousand times.  Traditional security controls are no longer effective at blocking cyber-threats so enterprise organizations are deploying new types of security defenses and investing in new tools to improve incident detection and response.Unfortunately, this can be more difficult than it seems.  Why?  Effective Incident detection and response depends upon security analytics technology and this is where the confusion lies.  It turns out that there are lots of security analytics tools out there that approach this problem from different angles.  Given this reality, where the heck do you start?Based upon lots of qualitative and quantitative research, I’m finding that many large organizations with experienced security teams tend to jump into security analytics by focusing their effort on the network for several reasons:To read this article in full or to leave a comment, please click here