IDG Contributor Network: Ping Identity invests in blockchain vendor to create new identity standard

Now, this is interesting.Ping Identity is a well-known identity vendor. Basically, Ping handles authentication, single sign-on (SSO) and other identity-related functions that large organizations have. The company competes with vendors such as OneLogin and Okta. So, what is it doing investing in a formerly stealthy blockchain vendor?It seems Ping sees blockchain as a potential disruptor for identity session management. It's so excited about it that it is spending some of its hard-earned cash to invest in Swirlds, a new platform that is creating the "hashgraph," a distributed consensus platform. Swirlds sees itself as solving some of the limitations that are inherent in blockchain. Swirlds contends that it delivers the three legs of the consensus stool: fairness, distributed trust and resilience to Denial of Service attacks.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Ping Identity invests in blockchain vendor to create new identity standard

Now, this is interesting.Ping Identity is a well-known identity vendor. Basically, Ping handles authentication, single sign-on (SSO) and other identity-related functions that large organizations have. The company competes with vendors such as OneLogin and Okta. So, what is it doing investing in a formerly stealthy blockchain vendor?It seems Ping sees blockchain as a potential disruptor for identity session management. It's so excited about it that it is spending some of its hard-earned cash to invest in Swrlds, a new platform that is creating the "hashgraph," a distributed consensus platform. Swrlds sees itself as solving some of the limitations that are inherent in blockchain. Swrlds contends that it delivers the three legs of the consensus stool: fairness, distributed trust and resilience to Denial of Service attacks.To read this article in full or to leave a comment, please click here

How to prepare to interview for a temporary position

Temporary jobs are on the rise. According to research from CareerBuilder and Economic Modeling Specialist Intl., nearly three million people are employed in a temporary job with a projected 173,478 additional temp jobs expected to open up from 2016 to 2018. The study found that 47 percent of companies plan to hire temporary or contract workers in 2016, and just under 60 percent of that group also plan to consider transitioning temporary workers to permanent employees at some point. Tech jobs are at the forefront of temporary work, with computer service representatives, computer user support specialists, software developers and application developers expected to see the most growth in contract jobs.To read this article in full or to leave a comment, please click here(Insider Story)

Petition condemns Windows 10 upgrade practices, asks EFF to investigate

A petition launched Friday asks the Electronic Frontier Foundation (EFF) to investigate Microsoft's aggressive moves to convince and cajole users into upgrading to Windows 10.The request was launched on Change.org, a popular online petition website, and by early Monday had garnered more than 470 signatures.+ ALSO ON NETWORK WORLD Microsoft blows trust and credibility with forced upgrade +To read this article in full or to leave a comment, please click here

Researchers wirelessly hack Mitsubishi Outlander Hybrid SUV, turn off anti-theft alarm

Security researcher Ken Munro of Pen Test Partners hacked the Mitsubishi Outlander plug-in hybrid electric vehicle (PHEV). He discovered several vulnerabilities, including being able to disable the anti-theft alarm from a laptop.U.S. drivers may be unfamiliar with the vehicle. Had Mitsubishi Outlander Plug-In Hybrid sales started in 2013 as originally proposed, it would have been the first plug-in hybrid SUV available in the U.S. But it didn't. The 2017 model is expected to hit showrooms late this fall, with an estimated $42,000 as a base price. In the U.K., it is the “bestselling hybrid.”To read this article in full or to leave a comment, please click here

Trouble down under: Amazon cloud goes down in Australia

Amazon Web Services reported a multi-hour service disruption to core features of its IaaS public cloud in Sydney, Australia over the weekend.It’s one of the highest-profile hiccups the cloud provider has had in recent months.+MORE AT NETWORK WORLD: Father’s Day 2016 gift ideas for the techie Dad +According to the Amazon Web Services’ Service Health Dashboard, the company’s virtual machine service named Elastic Compute Cloud (EC2) began experiencing connectivity issues at 10:47 PM PDT Saturday, which was 3:47 PM on Sunday in Sydney. The issue was finally resolved more than 12 hours later by 4:50 AM local Sydney time. AWS said a single Availability Zone within the region lost power (AWS regions are each made up of at least two or more Availability Zones). AWS said by 1 AM local Sydney time about 80% of the EC2 and Elastic Block Storage (EBS) instances that had been impacted were resolved. A handful of other ancillary services were almost impacted in the region.To read this article in full or to leave a comment, please click here

Researchers wirelessly hack Mitsubishi Outlander Hybrid SUV, turn off anti-theft alarm

Security researcher Ken Munro of Pen Test Partners hacked the Mitsubishi Outlander plug-in hybrid electric vehicle (PHEV). He discovered several vulnerabilities, including being able to disable the anti-theft alarm from a laptop.U.S. drivers may be unfamiliar with the vehicle. Had Mitsubishi Outlander Plug-In Hybrid sales started in 2013 as originally proposed, it would have been the first plug-in hybrid SUV available in the U.S. But it didn't. The 2017 model is expected to hit showrooms late this fall, with an estimated $42,000 as a base price. In the UK, it is the “bestselling hybrid.”To read this article in full or to leave a comment, please click here

Widespread exploits evade protections enforced by Microsoft EMET

It's bad news for businesses. Hackers have launched large-scale attacks that are capable of bypassing the security protections added by Microsoft's Enhanced Mitigation Experience Toolkit (EMET), a tool whose goal is to stop software exploits.Security researchers from FireEye have observed Silverlight and Flash Player exploits designed to evade EMET mitigations such as Data Execution Prevention (DEP), Export Address Table Access Filtering (EAF) and Export Address Table Access Filtering Plus (EAF+). The exploits have been recently added to the Angler exploit kit.Angler is one of the most widely used attack tools used by cybercriminals to launch Web-based, "drive-by" download attacks. It is capable of installing malware by exploiting vulnerabilities in users' browsers or browser plug-ins when they visit compromised websites or view maliciously crafted ads.To read this article in full or to leave a comment, please click here

Widespread exploits evade protections enforced by Microsoft EMET

It's bad news for businesses. Hackers have launched large-scale attacks that are capable of bypassing the security protections added by Microsoft's Enhanced Mitigation Experience Toolkit (EMET), a tool whose goal is to stop software exploits.Security researchers from FireEye have observed Silverlight and Flash Player exploits designed to evade EMET mitigations such as Data Execution Prevention (DEP), Export Address Table Access Filtering (EAF) and Export Address Table Access Filtering Plus (EAF+). The exploits have been recently added to the Angler exploit kit.Angler is one of the most widely used attack tools used by cybercriminals to launch Web-based, "drive-by" download attacks. It is capable of installing malware by exploiting vulnerabilities in users' browsers or browser plug-ins when they visit compromised websites or view maliciously crafted ads.To read this article in full or to leave a comment, please click here

Health insurer dedicates IT group to work with Digital Experience team

Sean Radlich is Manager of Digital Experience at HealthNow New York, one of the leading health insurance companies in upstate New York servicing about a million members.  Headquartered in Buffalo, NY, the company operates BlueCross BlueShield of Western New York (Buffalo), BlueShield of Northeastern New York (Albany), Health Now Brokerage Concepts (Blue Bell, PA) and Health Now Administrative Services (across the Northeast US and California).  Network World Editor in Chief John Dix recently spoke with Radlich about the organization’s digital initiatives and how his team works with IT.  Sean Radlich, Manager of Digital Experience, HealthNow New YorkTo read this article in full or to leave a comment, please click here

Working with JunOs and Optics

Found myself troubleshooting a pesky fibre connection that wouldn’t come up. I was looking for a command that would show me if a light was being received on the interface and found these beauties:

show interfaces diagnostics optics xe-4/1/0

show chassis pic fpc-slot 4 pic-slot 1

The first shows information on light levels on the relevant optic. The second will help you figure out what type of cabling you need to be using. Handy when you don’t know if it should be single or multi mode.

 


Samsung’s new, water-resistant Galaxy S7 Active survives severe crash tests

Samsung's new Galaxy S7 Active is a toughened-up version of the flagship Galaxy S7 that won't fail if dropped on the ground or in water. The Android smartphone has a 5.1-inch screen with a 2560 x 1440 pixel resolution, and  32GB of storage. It sports a 12-megapixel rear-facing camera and a 5-megapixel front camera. It also has a fingerprint reader, and support for Samsung Pay. The smartphone will be available through AT&T on June 10. You can shell out US$794.99 for the handset, or buy it via AT&T Next, which cuts the price of phones down into monthly installments. AT&T Next also provides options to upgrade the handset at certain intervals.To read this article in full or to leave a comment, please click here

Verizon’s ‘Can you hear me now?’ guy is now selling us Sprint. This is wrong.

Paul Marcarelli – an actor better known as the “Can you hear me now?” guy – spent nine years profiting from a Verizon ad campaign that made his face famous and that phrase a part of the lexicon. That gig ended in 2011.Now he’s begun selling Sprint. In the new commercial he says he switched teams because Sprint’s service has become so wonderful. In real life, we all know he switched because Sprint is now helping him pay his bills. That’s fine. If AT&T had wanted Marcarelli’s services it would be the wonders of AT&T that the actor would be extolling on TV. Here’s the ad: Now there’s absolutely nothing to criticize about an actor earning a living. But that doesn’t mean there’s nothing wrong here.To read this article in full or to leave a comment, please click here

Verizon’s ‘Can you hear me now?’ guy is now selling us Sprint. This is wrong.

Paul Marcarelli – an actor better known as the “Can you hear me now?” guy – spent nine years profiting from a Verizon ad campaign that made his face famous and that phrase a part of the lexicon. That gig ended in 2011.Now he’s begun selling Sprint. In the new commercial he says he switched teams because Sprint’s service has become so wonderful. In real life, we all know he switched because Sprint is now helping him pay his bills. That’s fine. If AT&T had wanted Marcarelli’s services it would be the wonders of AT&T that the actor would be extolling on TV. Here’s the ad: Now there’s absolutely nothing to criticize about an actor earning a living. But that doesn’t mean there’s nothing wrong here.To read this article in full or to leave a comment, please click here

Tips from a Network Detective

Put your detective hat on your head and your Network Detective badge on your lapel.  It’s times for another installment in the Network Detective Series.

Are we going on our first “case” together?  Nope.  Not just yet.  ?

In this series I’m not going to be able to always call out every time my “techniques” and “methodologies” steer me one way or the other on a case.  But over time you will notice there is a thread in there.  A guiding framework and methodology.

So before we go on our first “case” together… I want to pass on to you what are really my major guiding principles for when I’m on a case.  The “TOP” tips that I think have the biggest return on your time investment as a Network Detective.

helpful_tips_74943355

  1. Be Methodical
  2. Know What is Normal (Knowledge is Key)
  3. Get to the “Crime Scene” as Fast as You Can
  4. Have “Crime Scene Maps”  that Help and don’t Hinder
  5. Let the Clues and Evidence Guide You
  6. Learn and Improve

Tip #1: Be Methodical

Detection is, or ought to be, an exact science and should be treated in the same cold and unemotional manner.

-Sherlock Continue reading

IDG Contributor Network: Wi-Fi 911: Running with scissors?

Emergency 911 services first materialized in the United States when the Alabama Telephone Company established the service in the sleepy little town of Haleyville on Feb. 16, 1968. At that time, phone companies knew the installation address and phone number of each and every telephone device, and calls were routed based on this information. While seemingly unsophisticated by today’s standards, at the time, it was considered quite a feat of engineering.The process remained valid until Sept. 21 of 1983 when the world changed forever. In a historic decision by the Federal Communications Commission, the Motorola 8000X, the world's first commercially available portable cell phone, was approved for service and personal mobility took on a brand-new meaning. What was the cost of this miraculous technology? For just under $4,000, consumers could ‘cut the cord’ that tethered them to the wall -- a small price to pay for a device that would revolutionize and redefine telecommunications history.To read this article in full or to leave a comment, please click here

Hackers breach social media accounts of Mark Zuckerberg and other celebrities

Over the weekend hackers managed to access Facebook founder Mark Zuckerberg's Twitter and Pinterest accounts, as well as the social media accounts of other celebrities. Someone posted to Zuckerberg’s Twitter feed on Sunday, claiming to have found his password in account information leaked from LinkedIn. A group calling itself the OurMine Team took credit for breaking into Zuckerberg's Twitter, Pinterest and Instagram accounts, but there's no evidence that the Instagram account has been breached. "You were in LinkedIn Database with password 'dadada'," read a message supposedly posted by hackers from Zuckerberg's @finkd Twitter account. To read this article in full or to leave a comment, please click here

Hackers breach social media accounts of Mark Zuckerberg and other celebrities

Over the weekend hackers managed to access Facebook founder Mark Zuckerberg's Twitter and Pinterest accounts, as well as the social media accounts of other celebrities. Someone posted to Zuckerberg’s Twitter feed on Sunday, claiming to have found his password in account information leaked from LinkedIn. A group calling itself the OurMine Team took credit for breaking into Zuckerberg's Twitter, Pinterest and Instagram accounts, but there's no evidence that the Instagram account has been breached. "You were in LinkedIn Database with password 'dadada'," read a message supposedly posted by hackers from Zuckerberg's @finkd Twitter account. To read this article in full or to leave a comment, please click here