Intel ships Kaby Lake chips, pointing to PC availability in a few months

Tablets and laptops with Intel's 7th Generation Core chips code-named Kaby Lake should become available in the coming months.Intel is shipping Kaby Lake chips to PC makers now, CEO Brian Krzanich during Intel's earnings call Wednesday. Systems with new processors usually become available a few months after Intel delivers the chips.Kaby Lake will succeed current Core processors named Skylake. The new chip has the underpinnings of Skylake and won't necessarily be smaller in size, but it'll provide speed improvements over its predecessor, Krzanich said.That raises a question: should you wait a few months for Kaby Lake instead of upgrading to a Skylake PC now? Experts generally say you should buy a PC as and when you need it rather than wait for the next improvement to come along.To read this article in full or to leave a comment, please click here

2016 Cisco Live, US – Geeks for life. — Just another day at the office…

CiscoLive 2016 LasVegas was my absolute favorite CiscoLive EVER!  They just keep getting better and better and better every year!  I so adore my “Nerd Herd” friends.

I was going to write a blog.. but I just couldn’t find the words……

So please enjoy my friend’s blog (@amyengineer) reblogged here. ?

Fish  ?


Putting together a wrap up post on Cisco Live US always makes me smile, and 2016 is no exception. As many of you know, this CLUS marked 5 years since Tom and a small group of engineers first bonded over networking nerdiness and an addiction to 140 characters. We’ve followed and helped each other through […]

via 2016 Cisco Live, US – Geeks for life. — Just another day at the office…

Intel profit slides on costs related to layoffs

Intel's profit dropped sharply last quarter due to heavy costs from a restructuring announced in April, though sales were up thanks to the company's powerful data center group.Intel's profit for the quarter, ended July 2, was $1.3 billion, down from $2.7 billion a year earlier, the company announced Wednesday. Revenue climbed 3 percent to $13.5 billion.Intel said in April that it would axe 12,000 jobs worldwide, or 11 percent of its staff, in a plan to cut costs and focus on growing businesses like server processors and chips for the internet of things.In the process, it canceled the development of low-power Atom processors and more or less gave up on the smartphone and tablet markets -- areas where it's never done well.To read this article in full or to leave a comment, please click here

Wireless on wheels? Cable can play at that game, too

When lots of people gather for concerts or sports events, cellular carriers often bring their networks to the scene with cell towers mounted on trucks, or COWs (cells on wheels). Not to be outdone, Comcast is joining the fray using Wi-Fi.The U.S. cable giant will bring WoW (Wi-Fi on Wheels) to the Democratic National Convention in Philadelphia next week. WoW is what it sounds like: a van with six access points (APs) mounted on a 40-foot mast.Each AP points in a different direction so the truck can deliver strong signals over a wide area. It can serve as many as 3,000 people within a range of 500 feet, according to Comcast. Those users can get speeds as much as five times as fast as cellular, the company says.To read this article in full or to leave a comment, please click here

Wireless on wheels? Cable can play at that game, too

When lots of people gather for concerts or sports events, cellular carriers often bring their networks to the scene with cell towers mounted on trucks, or COWs (cells on wheels). Not to be outdone, Comcast is joining the fray using Wi-Fi.The U.S. cable giant will bring WoW (Wi-Fi on Wheels) to the Democratic National Convention in Philadelphia next week. WoW is what it sounds like: a van with six access points (APs) mounted on a 40-foot mast.Each AP points in a different direction so the truck can deliver strong signals over a wide area. It can serve as many as 3,000 people within a range of 500 feet, according to Comcast. Those users can get speeds as much as five times as fast as cellular, the company says.To read this article in full or to leave a comment, please click here

Hackers are targeting the Rio Olympics, so watch out for these cyberthreats

The Olympic Games in Rio de Janeiro will attract more than just athletes and tourists this year. Hackers from across the world will also be on the prowl, trying to exploit the international event.  That means visitors to the Olympics and even people watching from home should be careful. Cyberthreats related to the games will probably escalate over the coming weeks and could creep into your inbox or the websites you visit.Don't click if it's too good to be true The Olympics have become a beacon for cyber criminals, said Samir Kapuria, senior vice president with security firm Symantec. A great deal of money is spent on the international event, so hackers naturally want a slice of the pie, he added.To read this article in full or to leave a comment, please click here

Hackers are targeting the Rio Olympics, so watch out for these cyberthreats

The Olympic Games in Rio de Janeiro will attract more than just athletes and tourists this year. Hackers from across the world will also be on the prowl, trying to exploit the international event.  That means visitors to the Olympics and even people watching from home should be careful. Cyberthreats related to the games will probably escalate over the coming weeks and could creep into your inbox or the websites you visit.Don't click if it's too good to be true The Olympics have become a beacon for cyber criminals, said Samir Kapuria, senior vice president with security firm Symantec. A great deal of money is spent on the international event, so hackers naturally want a slice of the pie, he added.To read this article in full or to leave a comment, please click here

39% off Pebble Time Smartwatch – Deal Alert

With this deal, the Pebble Time smartwatch is currently sub-$100, which for some may make this a worthwhile purchase considering everything it can do. First off, the Pebble Time gives you all of your notifications in a glance, from calendar items to texts, emails and incoming call data. Pebble Health comes built-in, and tracks your activity and sleep with daily and weekly reporting. A built-in mic lets you take voice notes or give quick responses. Choose from thousands of watch faces and apps. The Pebble Time is water resistant up to 30 meters, and its e-paper screen reads clearly in bright sun and is scratch resistant. Its battery lasts up to 7 days on a single charge. There is a lot packed into this highly rated wearable, which averages 4 out of 5 stars on Amazon from over 630 customers (read reviews). With the current 29% off deal you can pick it up for just $91.90, a significant discount from its typical $149.99 list price. See the Pebble Time Smartwatch now on Amazon.To read this article in full or to leave a comment, please click here

Cisco patches critical exposure in management software

Cisco has patched what it called a critical vulnerability in its Unified Computing System (UCS) Performance Manager software that could let an authenticated, remote attacker execute commands.+More on Network World: Quick look: Cisco Tetration Analytics+Cisco UCS Performance Manager versions 2.0.0 and prior are affected and the problem is resolved in Cisco UCS Performance Manager versions 2.0.1 and later. UCS Performance Manager collects information about UCS servers, network, storage, and virtual machines.According to Cisco the vulnerability is due to insufficient input validation performed on parameters that are passed via an HTTP GET request. An attacker could exploit this vulnerability by sending crafted HTTP GET requests to an affected system. An exploit could allow the attacker to execute arbitrary commands with the privileges of the root user.To read this article in full or to leave a comment, please click here

Cisco patches critical exposure in management software

Cisco has patched what it called a critical vulnerability in its Unified Computing System (UCS) Performance Manager software that could let an authenticated, remote attacker execute commands.+More on Network World: Quick look: Cisco Tetration Analytics+Cisco UCS Performance Manager versions 2.0.0 and prior are affected and the problem is resolved in Cisco UCS Performance Manager versions 2.0.1 and later. UCS Performance Manager collects information about UCS servers, network, storage, and virtual machines.According to Cisco the vulnerability is due to insufficient input validation performed on parameters that are passed via an HTTP GET request. An attacker could exploit this vulnerability by sending crafted HTTP GET requests to an affected system. An exploit could allow the attacker to execute arbitrary commands with the privileges of the root user.To read this article in full or to leave a comment, please click here

Cisco patches critical exposure in management software

Cisco has patched what it called a critical vulnerability in its Unified Computing System (UCS) Performance Manager software that could let an authenticated, remote attacker execute commands.+More on Network World: Quick look: Cisco Tetration Analytics+Cisco UCS Performance Manager versions 2.0.0 and prior are affected and the problem is resolved in Cisco UCS Performance Manager versions 2.0.1 and later. UCS Performance Manager collects information about UCS servers, network, storage, and virtual machines.According to Cisco the vulnerability is due to insufficient input validation performed on parameters that are passed via an HTTP GET request. An attacker could exploit this vulnerability by sending crafted HTTP GET requests to an affected system. An exploit could allow the attacker to execute arbitrary commands with the privileges of the root user.To read this article in full or to leave a comment, please click here

Microsoft wants to help small businesses book appointments online

Small business owners are getting a new feature tailored just for them in Microsoft Office 365 -- a full-service system for scheduling appointments for their services over the internet.Microsoft Bookings is a new service that makes it possible for business owners to create their own scheduling page, and then let potential customers make an appointment online. It's supposed to be a boon for businesses used to running that process through a series of emails, phone calls, or text messages.Customers will be able to look at a list of prices, and then schedule time for an appointment with a list of employees. Bookings will then email the customers a confirmation including an invitation they can put on their calendars.To read this article in full or to leave a comment, please click here

Hackers have targeted 130 restaurants at Cicis pizza chain

More than 130 restaurants at the Cicis pizza chain were the recent target of hackers, and customers' credit card data may have been stolen.The company reported the data breach on Tuesday and posted a list of the restaurants affected, most of which are located in Texas.The hackers struck by secretly installing malware into the restaurant’s point-of-sale systems. Other companies, including fast-food chain Wendy’s and retailer Target, have been attacked in the same way in order to steal payment card data.To read this article in full or to leave a comment, please click here

Hackers have targeted 130 restaurants at Cicis pizza chain

More than 130 restaurants at the Cicis pizza chain were the recent target of hackers, and customers' credit card data may have been stolen.The company reported the data breach on Tuesday and posted a list of the restaurants affected, most of which are located in Texas.The hackers struck by secretly installing malware into the restaurant’s point-of-sale systems. Other companies, including fast-food chain Wendy’s and retailer Target, have been attacked in the same way in order to steal payment card data.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Is container virtual networking a blessing or a curse?

Who doesn’t love the fundamental promise of containers? Simple development, segmented applications, rolling changes, etc. They are certainly a blessing to both developers and operations. But if not thoughtfully designed, container virtual networking could be the curse that plagues us for years.Let’s start with a little perspective. The rise and wide deployment of virtual machines and containers coincides with mainstream data center networking evolving from a hierarchical layer 2/3 network to a flatter layer 2 interconnect. Since cloud infrastructure is inherently multi-tenant, traditionally virtual LANs have been used to isolate applications and tenants sharing a common infrastructure. But as containerized applications explode in number, the VLAN maximum size limit of 4,096 becomes grossly inadequate for very large cloud computing environments.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Is container virtual networking a blessing or a curse?

Who doesn’t love the fundamental promise of containers? Simple development, segmented applications, rolling changes, etc. They are certainly a blessing to both developers and operations. But if not thoughtfully designed, container virtual networking could be the curse that plagues us for years.Let’s start with a little perspective. The rise and wide deployment of virtual machines and containers coincides with mainstream data center networking evolving from a hierarchical layer 2/3 network to a flatter layer 2 interconnect. Since cloud infrastructure is inherently multi-tenant, traditionally virtual LANs have been used to isolate applications and tenants sharing a common infrastructure. But as containerized applications explode in number, the VLAN maximum size limit of 4,096 becomes grossly inadequate for very large cloud computing environments.To read this article in full or to leave a comment, please click here