iOS 10 on the iPad Pro: The 8 features you need to know

The iPad Pro is a productivity powerhouse—or at least, that’s what Apple wants it to be. The 12.9-inch Pro was released last November, and the 9.7-inch model debuted in March, so we weren’t expecting to see any new hardware at Apple’s Worldwide Developers Conference in June. But we were hoping Apple would add some iPad-only features in iOS 10 that would fix a few problems and make the Pros even more awesome, or at least show off some new partner apps that take advantage of all that screen real estate.Alas, the iPad was a footnote in iOS 10’s parade of features. The device gets most of the good stuff, like the revamped Messages app, a new lock screen with rich notifications, and smarter Photos, but the iPad-only tweaks are just that: minor changes.To read this article in full or to leave a comment, please click here

Researchers add software bugs to reduce the number of… software bugs

Researchers are adding bugs to experimental software code in order to ultimately wind up with programs that have fewer vulnerabilities.The idea is to insert a known quantity of vulnerabilities into code, then see how many of them are discovered by bug-finding tools.By analyzing the reasons bugs escape detection, developers can create more effective bug-finders, according to researchers at New York University in collaboration with others from MIT’s Lincoln Laboratory and Northeastern University.They created large-scale automated vulnerability addition (LAVA), which is a low-cost technique that adds the vulnerabilities. “The only way to evaluate a bug finder is to control the number of bugs in a program, which is exactly what we do with LAVA,” says Brendan Dolan-Gavitt, a computer science and engineering professor at NYU’s Tandon School of Engineering.To read this article in full or to leave a comment, please click here

Researchers add software bugs to reduce the number of… software bugs

Researchers are adding bugs to experimental software code in order to ultimately wind up with programs that have fewer vulnerabilities.The idea is to insert a known quantity of vulnerabilities into code, then see how many of them are discovered by bug-finding tools.By analyzing the reasons bugs escape detection, developers can create more effective bug-finders, according to researchers at New York University in collaboration with others from MIT’s Lincoln Laboratory and Northeastern University.They created large-scale automated vulnerability addition (LAVA), which is a low-cost technique that adds the vulnerabilities. “The only way to evaluate a bug finder is to control the number of bugs in a program, which is exactly what we do with LAVA,” says Brendan Dolan-Gavitt, a computer science and engineering professor at NYU’s Tandon School of Engineering.To read this article in full or to leave a comment, please click here

Stretching Software Across Future Exascale Systems

If money was no object, then arguably the major nations of the world that always invest heavily in supercomputing would have already put an exascale class system into the field. But money always matters and ultimately supercomputers have to justify their very existence by enabling scientific breakthroughs and enhancing national security.

This, perhaps, is why the Exascale Computing Project establish by the US government last summer is taking such a measured pace in fostering the technologies that will ultimately result in bringing three exascale-class systems with two different architectures into the field after the turn of the next decade. The

Stretching Software Across Future Exascale Systems was written by Timothy Prickett Morgan at The Next Platform.

IDG Contributor Network: Cajun redux? Avaya’s focus on data networking misses the mark

While channel surfing recently I landed on a reality TV show where people bid on abandoned homes without knowing what’s inside. Occasionally, something of true value is found—maybe even something that might make the new owners wealthy. One might say that something like this happened when Avaya acquired Nortel Enterprise Solutions (NES) in 2009.Comparatively, Avaya inherited rooms upon rooms where old Aunt Norty had stashed the detritus of her life. There were, however, many treasures. One find, known today as the company’s SDN Fx™ Architecture, might be compared to a Picasso found stashed away in the attic. That’s the good news.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cajun redux? Avaya’s focus on data networking misses the mark

While channel surfing recently I landed on a reality TV show where people bid on abandoned homes without knowing what’s inside. Occasionally, something of true value is found—maybe even something that might make the new owners wealthy. One might say that something like this happened when Avaya acquired Nortel Enterprise Solutions (NES) in 2009.Comparatively, Avaya inherited rooms upon rooms where old Aunt Norty had stashed the detritus of her life. There were, however, many treasures. One find, known today as the company’s SDN Fx™ Architecture, might be compared to a Picasso found stashed away in the attic. That’s the good news.To read this article in full or to leave a comment, please click here

Check this out: Walmart Pay for iOS & Android can now be used in all of retailer’s US stores

The following email subject lines appeared in my inbox on Wednesday just a couple of hours apart:* Walmart Pay Now Available in all Walmart Stores Nationwide (from Walmart PR)* Map of Walmart store closings (from a market research firm making a larger point about rapid changes in retail and consumer packaged goods markets) My first thought, upon noticing the juxtaposition, was well, having 154 fewer stores in the US this year probably made it easier for Walmart to roll out its mobile payment app nationwide.MORE: 7 reasons mobile payments still aren't mainstreamTo read this article in full or to leave a comment, please click here

Check this out: Walmart Pay for iOS & Android can now be used in all of retailer’s US stores

The following email subject lines appeared in my inbox on Wednesday just a couple of hours apart:* Walmart Pay Now Available in all Walmart Stores Nationwide (from Walmart PR)* Map of Walmart store closings (from a market research firm making a larger point about rapid changes in retail and consumer packaged goods markets) My first thought, upon noticing the juxtaposition, was well, having 154 fewer stores in the US this year probably made it easier for Walmart to roll out its mobile payment app nationwide.MORE: 7 reasons mobile payments still aren't mainstreamTo read this article in full or to leave a comment, please click here

Here’s how secret voice commands could hijack your smartphone

Kitten videos are harmless, right? Except when they take over your phone. Researchers have found something new to worry about on the internet. It turns out that a muffled voice hidden in an innocuous YouTube video could issue commands to a nearby smartphone without you even knowing it. The researchers describe the threat in a research paper to be presented next month at the USENIX Security Symposium in Austin, Texas. They also demonstrate it in this video. Voice recognition has taken off quickly on phones, thanks to services like Google Now and Apple's Siri, but voice software can also make it easier to hack devices, warned Micah Sherr, a Georgetown University professor and one of the paper’s authors.To read this article in full or to leave a comment, please click here

Here’s how secret voice commands could hijack your smartphone

Kitten videos are harmless, right? Except when they take over your phone. Researchers have found something new to worry about on the internet. It turns out that a muffled voice hidden in an innocuous YouTube video could issue commands to a nearby smartphone without you even knowing it. The researchers describe the threat in a research paper to be presented next month at the USENIX Security Symposium in Austin, Texas. They also demonstrate it in this video. Voice recognition has taken off quickly on phones, thanks to services like Google Now and Apple's Siri, but voice software can also make it easier to hack devices, warned Micah Sherr, a Georgetown University professor and one of the paper’s authors.To read this article in full or to leave a comment, please click here

DockerCon 2016 Videos: Black Belt Track

Videos from the Black Belt track at DockerCon 2016 are now posted online!

Black Belt talks are advanced technical deep dives presented by Docker experts. These sessions are code and demo heavy and light on the slides. From Docker internals to advanced container orchestration, security and networking, this track should delight most container ninjas.

Watch all of the sessions from the Black Belt track below or head to YouTube for the DockerCon 2016 playlist to watch more talks from the conference.


 

The Golden Ticket: Docker and High Security Microservices by Aaron Grattafiori



Check out the slides + video of @dyn___’s #DockerCon talk on #Docker security + #microservices
Click To Tweet



 

Cloning Running Servers with Docker and CRIU by Ross Boucher, Playground Theory



Learn about cloning running servers with #Docker and #CRIU by watching @boucher’s #DockerCon talk
Click To Tweet



 

Docker for Mac and Windows: The Insider’s Guide by Justin Cormack, Docker



Watch @justincormack’s #DockerCon talk for the inside scoop on #Docker for Mac and Windows
Click To Tweet



 

Containerd: Building a Container Supervisor by Michael Crosby, Docker



Watch @crosbymichael’s session on the #Docker ecosystem & lifecycle at #DockerCon 2016
Click To Tweet



 

Continue reading

Support from the Source: Getting Official Docker Support

Docker is the open platform to build, ship and run any application, anywhere. Whether legacy or microservices, Linux or Windows, Docker provides an OS, infrastructure and application architecture agnostic platform for developers and IT organizations to accelerate their application pipeline. Organizations often look for additional tooling and support as they look to bring Dockerized applications into production with SLAs that mirror their own service level commitments to their customers. Docker is available as free open source software or combined with commercial support with enterprise class service levels.

 

Open Source Support

The Docker team and community collaborate together to release updates to the Docker Engine and other related projects every couple of months. Open source support for the Docker Engine is provided through IRC, GitHub, and Docker Forums for the latest released version of Docker software. Any bugs and issues are filed, in the open, to the Docker repo for contributors and maintainers to ask for more information and discuss resolutions. Fixes and patches are then applied and released as incremental versions to the upstream Docker software.

 

Docker Commercial Support

Docker also provides commercial support for the upstream Docker Engine software directly and through authorized support partners. Commercial Continue reading

Car hacking: Thieves armed with laptops are stealing cars

Thieves armed with laptops are hacking into electronic ignitions of late-model cars to steal the vehicles. Police and insurers sounded the warning to raise awareness about the latest car-theft trend.The Houston Police Department pointed at surveillance footage that shows two suspects, one of whom used a laptop, before stealing a 2010 Jeep Wrangler Unlimited. The first suspect opened the Jeep’s hood to reportedly cut the alarm. The footage below took place about 10 minutes later when a second suspect jimmied the door open, climbed inside and then did something with a laptop before stealing the Jeep. “If you are going to hot-wire a car, you don’t bring along a laptop,” Houston Police Department Officer James Woods told the Wall Street Journal. “We don’t know what he is exactly doing with the laptop, but my guess is he is tapping into the car’s computer and marrying it with a key he may already have with him so he can start the car.”To read this article in full or to leave a comment, please click here

Car hacking: Thieves armed with laptops are stealing cars

Thieves armed with laptops are hacking into electronic ignitions of late-model cars to steal the vehicles. Police and insurers sounded the warning to raise awareness about the latest car-theft trend.The Houston Police Department pointed at surveillance footage that shows two suspects, one of whom used a laptop, before stealing a 2010 Jeep Wrangler Unlimited. The first suspect opened the Jeep’s hood to reportedly cut the alarm. The footage below took place about 10 minutes later when a second suspect jimmied the door open, climbed inside and then did something with a laptop before stealing the Jeep. “If you are going to hot-wire a car, you don’t bring along a laptop,” Houston Police Department Officer James Woods told the Wall Street Journal. “We don’t know what he is exactly doing with the laptop, but my guess is he is tapping into the car’s computer and marrying it with a key he may already have with him so he can start the car.”To read this article in full or to leave a comment, please click here

New Mac backdoor program steals keychain contents

Researchers have identified a new Mac backdoor program that's designed to steal credentials stored in the OS-encrypted keychain and give attackers control over the system. Dubbed OSX/Keydnap by researchers from antivirus vendor ESET, this is the second backdoor program targeting Macs found by antivirus firms in the past few days. It's not clear how Keydnap is distributed, but it arrives on computers in the form of a zip archive. Inside there's an executable file with an apparently benign extension such as .txt or .jpg that actually has a space character at the end. The file also has an icon indicating an image or text file.To read this article in full or to leave a comment, please click here

New Mac backdoor program steals keychain contents

Researchers have identified a new Mac backdoor program that's designed to steal credentials stored in the OS-encrypted keychain and give attackers control over the system. Dubbed OSX/Keydnap by researchers from antivirus vendor ESET, this is the second backdoor program targeting Macs found by antivirus firms in the past few days. It's not clear how Keydnap is distributed, but it arrives on computers in the form of a zip archive. Inside there's an executable file with an apparently benign extension such as .txt or .jpg that actually has a space character at the end. The file also has an icon indicating an image or text file.To read this article in full or to leave a comment, please click here

Microsoft COO Kevin Turner leaves to head a financial trading company

Microsoft COO Kevin Turner is leaving after 11 years in the role. He won't be replaced.Employees learned of the move Thursday in an email message from CEO Satya Nadella, in which he outlined his plans for reorganizing the company's senior leadership team.Nadella highlighted the importance of having "one feedback loop" across the company to reinforce customer value and satisfaction. To achieve this, he said, he will more deeply integrate the sales, marketing and services group with the rest of the company, under a single senior leadership team.To read this article in full or to leave a comment, please click here