How auto repair chain accelerates networking with SD-WAN

Businesses needing broadband connectivity while rapidly expanding are finding an alternative to traditional wide area network infrastructure. Service King Collision Repair Centers, for example, is using software-defined wide area network (SD-WAN) to support new auto repair centers, a move that has helped reduce the company's operational costs even as it grows its footprint across 23 states. Service King's CIO Derek Kramer. Service King's store locations have grown to more than 300 todayfrom 100 in 2012, necessitating rapid adoption of new network connectivity, says CIO Derek Kramer. Service King had relied on MPLS for several years but this no longer proving efficient as the chain expanded. "MPLS [Multiprotocol Label Switching] has done well, but can it grow as quickly as we're growing?" Kramer says. "We found more times than not that was a challenge."To read this article in full or to leave a comment, please click here

How auto repair chain accelerates networking with SD-WAN

Businesses needing broadband connectivity while rapidly expanding are finding an alternative to traditional wide area network infrastructure. Service King Collision Repair Centers, for example, is using software-defined wide area network (SD-WAN) to support new auto repair centers, a move that has helped reduce the company's operational costs even as it grows its footprint across 23 states. Service King's CIO Derek Kramer. Service King's store locations have grown to more than 300 todayfrom 100 in 2012, necessitating rapid adoption of new network connectivity, says CIO Derek Kramer. Service King had relied on MPLS for several years but this no longer proving efficient as the chain expanded. "MPLS [Multiprotocol Label Switching] has done well, but can it grow as quickly as we're growing?" Kramer says. "We found more times than not that was a challenge."To read this article in full or to leave a comment, please click here

How to decide when to buy software and when to build it

The appeal of the cloud has long been that you don’t need to do everything yourself, leaving you more time and resources to concentrate on what makes your company stand out. A classic example is that you buy electricity from the grid rather than running your own fleet of generators because having electricity doesn’t make you unique. The same is true of internal software, which you need to be efficient and reliable, but in most cases you don’t need it to set you apart from your competitors.To read this article in full or to leave a comment, please click here(Insider Story)

Ex-Secret Service agent who investigated Silk Road may have stolen another $700,000

"Plead guilty, then steal more" seems to have been the motto of a former corrupt federal agent involved in the Silk Road investigation.Ex-U.S. Secret Service Special Agent Shawn Bridges, who was part of Baltimore’s Silk Road Task Force and stole $820,000 in bitcoins during the investigation that led to Ross Ulbricht’s conviction, eventually pled guilty to money laundering and obstruction of justice. Bridges, who had served as the forensics and technical expert on the task force, was sentenced to nearly five years, 71 months, in prison. Yet newly unsealed court documents show that Bridges is suspected of stealing another $700,000 in bitcoins after he pled guilty about two months before he was sentenced.To read this article in full or to leave a comment, please click here

Ex-Secret Service agent who investigated Silk Road may have stolen another $700,000

Plead guilty, then steal more seems to have been the motto of a former corrupt federal agent involved in the Silk Road investigation.Ex-U.S. Secret Service Special Agent Shawn Bridges, who was part of Baltimore’s Silk Road Task Force and stole $820,000 in bitcoins during the investigation that led to Ross Ulbricht’s conviction, eventually pled guilty to money laundering and obstruction of justice. Bridges, who had served as the forensics and technical expert on the task force, was sentenced to nearly five years, 71 months, in prison. Yet newly unsealed court documents show that Bridges is suspected of stealing another $700,000 in bitcoins after he pled guilty but about two months before he was sentenced.To read this article in full or to leave a comment, please click here

Cities Get Super with Ruckus

By: Wendy Stanton, Marketing Manager What happened to the days of pay phone booths where Superman used to change his clothes, manual cash registers with the comforting “brrrring!” and parking lots where employees collected cash instead of automated pay machines?...

Lenovo ThinkPwn UEFI exploit also affects products from other vendors

A critical vulnerability that was recently found in the low-level firmware of Lenovo ThinkPad systems also reportedly exists in products from other vendors, including HP and Gigabyte Technology.An exploit for the vulnerability was published last week and can be used to execute rogue code in the CPU's privileged SMM (System Management Mode).This level of access can then be used to install a stealthy rootkit inside the computer's Unified Extensible Firmware Interface (UEFI) -- the modern BIOS -- or to disable Windows security features such as Secure Boot, Virtual Secure Mode and Credential Guard that depend on the firmware being locked down.To read this article in full or to leave a comment, please click here

Lenovo ThinkPwn UEFI exploit also affects products from other vendors

A critical vulnerability that was recently found in the low-level firmware of Lenovo ThinkPad systems also reportedly exists in products from other vendors, including HP and Gigabyte Technology.An exploit for the vulnerability was published last week and can be used to execute rogue code in the CPU's privileged SMM (System Management Mode).This level of access can then be used to install a stealthy rootkit inside the computer's Unified Extensible Firmware Interface (UEFI) -- the modern BIOS -- or to disable Windows security features such as Secure Boot, Virtual Secure Mode and Credential Guard that depend on the firmware being locked down.To read this article in full or to leave a comment, please click here

Google teams with UK eye hospital on AI disease diagnosis

Google's DeepMind AI business unit is hoping to teach computers to diagnose eye disease, using patient data from a U.K. hospital.Using deep learning techniques, DeepMind hopes to improve diagnosis of two eye conditions: age-related macular degeneration and diabetic retinopathy, both of which can lead to sight loss. If these conditions are detected early enough, patients' sight can be saved.One way doctors look for signs of these diseases is by examining the interior of the eye, opposite the lens, an area called the fundus. They can do this either directly, with an ophthalmoscope, or by taking a digital fundus scan. Another diagnostic technique is to take a non-invasive three-dimensional scan of the retina using process called optical coherence tomography (OCT).To read this article in full or to leave a comment, please click here

8 ingredients of an effective disaster recovery plan

Earlier this month, a monkey caused a nationwide power outage in Kenya. Millions of homes and businesses were without electricity. Which just goes to show that “not all disasters come in the form of major storms with names and categories,” says Bob Davis, CMO, Atlantis Computing.“Electrical fires, broken water pipes, failed air conditioning units [and rogue monkeys] can cause just as much damage,” he says. And while “business executives might think they’re safe based on their geographic location,” it’s important to remember that “day-to-day threats can destroy data [and] ruin a business,” too, he says. That’s why it is critical for all businesses to have a disaster recovery (DR) plan.To read this article in full or to leave a comment, please click here

8 ingredients of an effective disaster recovery plan

Earlier this month, a monkey caused a nationwide power outage in Kenya. Millions of homes and businesses were without electricity. Which just goes to show that “not all disasters come in the form of major storms with names and categories,” says Bob Davis, CMO, Atlantis Computing.“Electrical fires, broken water pipes, failed air conditioning units [and rogue monkeys] can cause just as much damage,” he says. And while “business executives might think they’re safe based on their geographic location,” it’s important to remember that “day-to-day threats can destroy data [and] ruin a business,” too, he says. That’s why it is critical for all businesses to have a disaster recovery (DR) plan.To read this article in full or to leave a comment, please click here

Juniper NXTWORK – A New and Better Kind of Conference

NXTWORK 2016

Last November, I was invited to the inaugural Juniper customer summit, NXTWORK 2015, and it was a great event. I’m pleased to see that NXTWORK2016 is happening again this year, October 3rd – 5th, 2016 at the Santa Clara Marriott in Santa Clara, CA.

NXTWORK 2015

Rewind the clock to last year. For years, Juniper users have wanted a Juniper technical event if not to rival Cisco Live, then at least to offer some of the same benefits to the attendees. As anybody who organizes a conference will tell you, it’s no mean feat to get even a small event right — Cisco has had 26 years to get Live to where it is now — so I can only imagine how daunting it must be to set up the first Juniper customer event, knowing full well that everything you do will be compared to Cisco Live, just as I am doing now. Wisely, it seems that Juniper decided to look at the basics of what attendees would expect to be at the conference, then wrap those up in its own unique way. While there were a few minor inevitable teething issues, my overwhelming feeling at the end of the conference Continue reading

Best Deals of The Month – Deal Alert

Best Deals of The Month - Deal AlertCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found in the past month. All items are highly rated, and dramatically discounted.58% off RAVPower FileHub Wireless Hard Drive, WiFi Bridge & Sharing Media StreamerYou may find many uses for this versatile and powerful file hub from RAVPower, currently discounted 58% on Amazon from $75.99 down to just $31.99.  This hub Let up to 5 devices wirelessly connect to the FileHub wireless network, to access its SD card and/or USB storage to share files.  It also has Media server capabilities, allowing wirelessly connected devices to stream audio and video from any attached storage device.To read this article in full or to leave a comment, please click here

8 noteworthy improvements in the Windows 10 Anniversary Update

Since the initial release of Windows 10 last July, Microsoft has been working to improve the look and feel of its flagship desktop operating system and has solicited user input and feedback through the Windows Feedback app, which has been integrated into all Windows 10 versions. And the company shows every sign of reading, considering and often acting upon user requests for interface changes and improvements. Thus, you'll see lots helpful, if small, changes to the Windows 10 UI, as the company works to complete what is now called the "Anniversary Update," which will be released on August 2. Here are the most noteworthy of those changes and additions.To read this article in full or to leave a comment, please click here(Insider Story)

Investing in your employees’ career growth drives satisfaction

Today's workforce is less concerned with perks like ping-pong tables, dry cleaning services and on-site massages than they are with their future, according to recent research. If your organization is struggling to attract and retain IT talent, perhaps it's time to rethink your benefits and perks strategy.To read this article in full or to leave a comment, please click here(Insider Story)

11 signs your kid is hacking — and what to do about it

I've shared a lot of security knowledge in my tenure as InfoWorld's Security Advisor. But what I've never shared before is that much of my initial computer security defense knowledge, which I turned into my first book, came from trying to stop my teenage stepson from being a malicious hacker.I was newly dating his mother and he was a precocious 15-year-old who liked messing around with electronics and computers. He and his closest friends also flirted with malicious hacking, including harassing "ignorant" users, DoS-ing popular computer networks, making malware, and all sorts of unquestionably illegal and unethical hacking behavior.To read this article in full or to leave a comment, please click here

11 signs your kid is hacking — and what to do about it

I've shared a lot of security knowledge in my tenure as InfoWorld's Security Advisor. But what I've never shared before is that much of my initial computer security defense knowledge, which I turned into my first book, came from trying to stop my teenage stepson from being a malicious hacker.I was newly dating his mother and he was a precocious 15-year-old who liked messing around with electronics and computers. He and his closest friends also flirted with malicious hacking, including harassing "ignorant" users, DoS-ing popular computer networks, making malware, and all sorts of unquestionably illegal and unethical hacking behavior.To read this article in full or to leave a comment, please click here

Examining man-in-the-middle attacks

Caught in the middleImage by LookoutDoes the screen above look familiar? It should. Millions of people around the world connect to public Wi-Fi networks on their mobile devices as they travel and try to stay connected. The problem is, not all networks are official. The image above is that of a fake, or spoofed, hotel Wi-Fi network, but you can’t tell just by looking at it.To read this article in full or to leave a comment, please click here

Is your car secure? Maybe not, but enterprise users can still learn something

If you're looking for a good lesson in enterprise security, there might be a few sitting in the parking lot. The automotive field is a glaring example of "worst practices" in security, say several automotive experts. And, the problem is only getting worse, not better.Over the past few years, the cars have come under fire for many things -- constant recalls, safety hazards, and diesel-engine tricks to name a few-- but security experts have noticed a disturbing trend.While it might be hard to break into a BMW unless you have a rock handy, there hasn't been as much effort in protecting wireless signals, establishing standards, creating new regulations and laws, and patching much more aggressively.To read this article in full or to leave a comment, please click here