$29.99 for the IT Security & Ethical Hacking Certification Training ($1,895 value) – Deal Alert

If you’re looking to enter a rapidly growing field, snag this course bundle in IT Security & Ethical Hacking. Instructors walk you through training for three industry-recognized certification exams: CompTIA Security+ Cisco’s CCNA Security Certified Ethical Hacker For a limited time, the bundle of courses is only $29.99--a steal considering it’s jam-packed with over 48 hours of courses and 50 hours of advanced training. If you wanted, you could finish all the material in only 4 to 6 weeks, and pass all your exams in record time.To read this article in full or to leave a comment, please click here

$29.99 for the IT Security & Ethical Hacking Certification Training ($1,895 value) – Deal Alert

If you’re looking to enter a rapidly growing field, snag this course bundle in IT Security & Ethical Hacking. Instructors walk you through training for three industry-recognized certification exams: CompTIA Security+ Cisco’s CCNA Security Certified Ethical Hacker For a limited time, the bundle of courses is only $29.99--a steal considering it’s jam-packed with over 48 hours of courses and 50 hours of advanced training. If you wanted, you could finish all the material in only 4 to 6 weeks, and pass all your exams in record time.To read this article in full or to leave a comment, please click here

Weaving Accelerators Into The Memory Complex

In the first part of this series on the proposed Cache Coherence Interconnect for Accelerators (CCIX) standard, we talked about the issues of cache coherence and the need to share memory across various kinds of compute elements in a system. In this second part, we will go deeper into the approach of providing memory coherence across CPUs and various kinds of accelerators that have their own local memory.

A local accelerator could potentially be anything. You want something to execute faster than what is possible in today’s generic processors, and so you throw specialized hardware at the problem. Still,

Weaving Accelerators Into The Memory Complex was written by Timothy Prickett Morgan at The Next Platform.

Campaigns use Big Data for political gain

With the presidential nominating conventions looming, the candidates are getting ready to add to the hundreds of millions they’ve already spent to tell you about themselves – but only what they want you to know about themselves.Meanwhile, they have also been spending millions of dollars collecting information about you – and you have no say in what is collected.Which means that, in the era of Big Data, if you’re a potential voter, they know a lot more about you than you know about them.[ ALSO ON CSO: When tech trips up presidential candidates ]To read this article in full or to leave a comment, please click here

Campaigns use Big Data for political gain

With the presidential nominating conventions looming, the candidates are getting ready to add to the hundreds of millions they’ve already spent to tell you about themselves – but only what they want you to know about themselves.Meanwhile, they have also been spending millions of dollars collecting information about you – and you have no say in what is collected.Which means that, in the era of Big Data, if you’re a potential voter, they know a lot more about you than you know about them.[ ALSO ON CSO: When tech trips up presidential candidates ]To read this article in full or to leave a comment, please click here

Defective products could result from cyberattacks on industrial 3D printers

Many 3D printers lack cybersecurity features, which presents opportunities to introduce defects as components are being built, a new study shows.The study, performed by a team of cybersecurity and materials engineers at New York University, concluded that with the growth of cloud-based and decentralized 3D printer production supply chains, there can be "significant risk to the reliability of the product."Additive manufacturing (3D printing) is creating a globally distributed manufacturing process and supply chain spanning multiple services, and therefore raises concerns about the reliability of the manufactured product, the study stated.To read this article in full or to leave a comment, please click here

Defective products could result from cyberattacks on industrial 3D printers

Many 3D printers lack cybersecurity features, which presents opportunities to introduce defects as components are being built, a new study shows.The study, performed by a team of cybersecurity and materials engineers at New York University, concluded that with the growth of cloud-based and decentralized 3D printer production supply chains, there can be "significant risk to the reliability of the product."Additive manufacturing (3D printing) is creating a globally distributed manufacturing process and supply chain spanning multiple services, and therefore raises concerns about the reliability of the manufactured product, the study stated.To read this article in full or to leave a comment, please click here

New Locky ransomware version can operate in offline mode

The creators of the widespread Locky ransomware have added a fallback mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers.Security researchers from antivirus vendor Avira have found a new Locky variant that starts encrypting files even when it cannot request a unique encryption key from the attacker's servers because the computer is offline or a firewall blocks the communication.Calling home to a server is important for ransomware programs that use public key cryptography. In fact, if they're unable to report back to a server after they infect a new computer, most such programs don't start encrypting files.To read this article in full or to leave a comment, please click here

New Locky ransomware version can operate in offline mode

The creators of the widespread Locky ransomware have added a fallback mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers. Security researchers from antivirus vendor Avira have found a new Locky variant that starts encrypting files even when it cannot request a unique encryption key from the attacker's servers because the computer is offline or a firewall blocks the communication. Calling home to a server is important for ransomware programs that use public key cryptography. In fact, if they're unable to report back to a server after they infect a new computer, most such programs don't start encrypting files.To read this article in full or to leave a comment, please click here

A smaller version of Raspberry Pi 3 is coming soon

A smaller version of the popular Raspberry Pi 3 will go on sale in a few months.Raspberry Pi is developing a new version of its Compute Module, a single-board computer that plugs into specific on-board memory slots. The new Pi will be more like a mini-computer inside a computer, and it won't come with a power supply.The Compute Module will have similar circuitry to that of Raspberry Pi 3, a wildly successful computer that can be a PC replacement. But it will be smaller, with the memory, CPU, and storage embedded tightly on a board. The differences between the Compute Module and the Raspberry Pi 3 will be subtle. While the Compute Module will have a 64-bit ARM processor like the Pi 3, it won't have Wi-Fi, Eben Upton, founder of Raspberry Pi, said in an interview with IDG News Service.To read this article in full or to leave a comment, please click here

What’s hot at Cisco Live

Cisco held its annual customer conclave in Las Vegas this week and aside from the actual heat – which averaged about 109 every day – it was clear from the start that security was the hottest topic. As one Cisco exec put it “it’s great to be at what’s becoming quickly the biggest security conference in the world.”There were of course some other technologies discussed at the show. Here we take a look at some of the hottest topics from Cisco Live.CEO Chuck RobbinsThis is Chuck Robbins first Cisco Live as CEO and he put his stamp on the show. In his keynote he played up all manner of areas Cisco will need to battle in to stay out in front of competitors. In the security realm he said that the two things that are going to be most important in the future are security and innovating over and over quickly. "Our acquisition strategy is core. It's core to our overall innovation strategy," Robbins said. “We’ve bought over 190 companies. Since I was named CEO in May a year ago we’ve actually bought 15, so we’ve been sort of active.”To read this article in Continue reading

What’s hot at Cisco Live

Cisco held its annual customer conclave in Las Vegas this week and aside from the actual heat – which averaged about 109 every day – it was clear from the start that security was the hottest topic. As one Cisco exec put it “it’s great to be at what’s becoming quickly the biggest security conference in the world.”There were of course some other technologies discussed at the show. Here we take a look at some of the hottest topics from Cisco Live.CEO Chuck RobbinsThis is Chuck Robbins first Cisco Live as CEO and he put his stamp on the show. In his keynote he played up all manner of areas Cisco will need to battle in to stay out in front of competitors. In the security realm he said that the two things that are going to be most important in the future are security and innovating over and over quickly. "Our acquisition strategy is core. It's core to our overall innovation strategy," Robbins said. “We’ve bought over 190 companies. Since I was named CEO in May a year ago we’ve actually bought 15, so we’ve been sort of active.”To read this article in Continue reading

What’s hot at Cisco Live!

Cisco held its annual customer conclave in Las Vegas this week and aside from the actual heat – which averaged about 109 every day – it was clear from the start that security was the hottest topic. As one Cisco exec put it “it’s great to be at what’s becoming quickly the biggest security conference in the world.”There were of course some other technologies discussed at the show. Here we take a look at some of the hottest topics from Cisco Live!CEO Chuck RobbinsThis is Chuck Robbins first Cisco Live! as CEO and he put his stamp on the show. In his keynote he played up all manner of areas Cisco will need to battle in to stay out in front of competitors. In the security realm he said that the two things that are going to be most important in the future are security and innovating over and over quickly. "Our acquisition strategy is core. It's core to our overall innovation strategy," Robbins said. “We’ve bought over 190 companies. Since I was named CEO in May a year ago we’ve actually bought 15, so we’ve been sort of active.”To read this article in Continue reading

What’s hot at Cisco Live!

Cisco held its annual customer conclave in Las Vegas this week and aside from the actual heat – which averaged about 109 every day – it was clear from the start that security was the hottest topic. As one Cisco exec put it “it’s great to be at what’s becoming quickly the biggest security conference in the world.”There were of course some other technologies discussed at the show. Here we take a look at some of the hottest topics from Cisco Live!CEO Chuck RobbinsThis is Chuck Robbins first Cisco Live! as CEO and he put his stamp on the show. In his keynote he played up all manner of areas Cisco will need to battle in to stay out in front of competitors. In the security realm he said that the two things that are going to be most important in the future are security and innovating over and over quickly. "Our acquisition strategy is core. It's core to our overall innovation strategy," Robbins said. “We’ve bought over 190 companies. Since I was named CEO in May a year ago we’ve actually bought 15, so we’ve been sort of active.”To read this article in Continue reading

What’s hot at Cisco Live!

Cisco held its annual customer conclave in Las Vegas this week and aside from the actual heat – which averaged about 109 every day – it was clear from the start that security was the hottest topic. As one Cisco exec put it “it’s great to be at what’s becoming quickly the biggest security conference in the world.”There were of course some other technologies discussed at the show. Here we take a look at some of the hottest topics from Cisco Live!CEO Chuck RobbinsThis is Chuck Robbins first Cisco Live! as CEO and he put his stamp on the show. In his keynote he played up all manner of areas Cisco will need to battle in to stay out in front of competitors. In the security realm he said that the two things that are going to be most important in the future are security and innovating over and over quickly. "Our acquisition strategy is core. It's core to our overall innovation strategy," Robbins said. “We’ve bought over 190 companies. Since I was named CEO in May a year ago we’ve actually bought 15, so we’ve been sort of active.”To read this article in Continue reading

Cisco’s Corporate Social Responsibility gets some long-deserved recognition

Cisco is known as many things: the market leader in networking, collaboration, security and other markets. The company is also widely regarded as a thought leader in both the enterprise and service provider segments. Investors consider Cisco to be strong, stable stock. Much of your opinion of Cisco depends on the lens through which you look at the company. Cisco should also be known as being a great citizen of the world because of all the good work its Corporate Social Responsibility (CSR) team does. Using the company’s massive resources to make the planet a better place was always a passion of former CEO John Chambers and that’s carried over to current CEO, Chuck Robbins. Its Networking Academy has educated millions of people across the globe, including many in underdeveloped nations, giving people an opportunity to get jobs and be successful.To read this article in full or to leave a comment, please click here

FCC hails ‘monumental’ vote opening new spectrum for 5G and IoT

The U.S. Federal Communications Commission has voted to open nearly 11 gigahertz of high-band spectrum to new wireless uses, hailing it as a "monumental step" that will greatly increase network capacity for 5G and the Internet of Things.The FCC on Thursday adopted new rules for spectrum above 24 GHz, in a vote that Commission Chairman Tom Wheeler described as one of the most important decisions commissioners will make this year."This is a big day for our nation," he said. "This is a big day for our agency."The commission's vote makes the U.S. the first nation to open up spectrum for the coming 5G services, and the decision may serve as a blueprint for other countries. The spectrum allows for data transfer rates of up to 10 Gbps, but signals can travel only short distances, meaning small cell deployments will be needed to deliver most wireless services.To read this article in full or to leave a comment, please click here