Microsoft Surface 5 could be powered by Intel’s Kaby Lake CPU

With the Surface 4/Surface Book doing very well and grabbing more and more market share, Microsoft isn’t saying much about the next generation of its tablet/notebook products. However, a leak from China may have some clues.All that’s known is that the next generation of Surface products was pushed back to early 2017. A leak to Indian publication Mobipicker.com says one reason for the delay is because Microsoft wanted to use the latest processor from Intel, code-named Kaby Lake. Kaby Lake is expected in the third quarter, which would make shipping by year’s end pretty tough. So, Microsoft simply pushed Surface 5 into next year rather than rushing it.To read this article in full or to leave a comment, please click here

New Windows 10 build brings Ink improvements, container support

Microsoft has released a new beta build of Windows 10 aimed at enhancing various aspects of the operating system, including support for the LastPass extension in the Edge browser, as the company hurtles toward releasing a major update in the coming months. Build 14361, released Wednesday, includes updated icons, the LastPass password manager extension for Microsoft Edge, and support for running Docker containers natively on Windows. Windows Ink, Microsoft's tools for working with pen input on a touchscreen Windows 10 device, also received several improvements.The build is another one on the road to what Microsoft is calling the Windows 10 Anniversary Update -- a major release of its latest operating system that packs in a slew of new features. To read this article in full or to leave a comment, please click here

Forget fingerprints; Iris scans could validate mobile payments

While mobile payment systems like Apple Pay and Samsung Pay are growing, they haven't lived up to the hype that surrounded their arrival in 2014.But newer biometrics security technologies beyond the use of fingerprint scans could boost adoption rates when purchases are made in-store with smartphones. Those technologies include palm vein sensors or even sensors that assess a person's typing patterns or movements.INSIDER: 5 ways to prepare for Internet of Things security threats For online purchases, iris scans could help authenticate buyers. And while SMS (Short Messaging Service) is an option, banks want greater security when using SMS payments. That's where a multimodal approach -- integrating facial, voice and behavorial scans into what's required for a purchase -- might help.To read this article in full or to leave a comment, please click here

Forget fingerprints; Iris scans could validate mobile payments

While mobile payment systems like Apple Pay and Samsung Pay are growing, they haven't lived up to the hype that surrounded their arrival in 2014.But newer biometrics security technologies beyond the use of fingerprint scans could boost adoption rates when purchases are made in-store with smartphones. Those technologies include palm vein sensors or even sensors that assess a person's typing patterns or movements.INSIDER: 5 ways to prepare for Internet of Things security threats For online purchases, iris scans could help authenticate buyers. And while SMS (Short Messaging Service) is an option, banks want greater security when using SMS payments. That's where a multimodal approach -- integrating facial, voice and behavorial scans into what's required for a purchase -- might help.To read this article in full or to leave a comment, please click here

Meet us in Dallas, TX for NANOG 68!

NANOG is traveling to Dallas, Texas for NANOG 68. This will be NANOG's third back-to-back meeting with DNS-OARC and fifteenth back-to-back meeting with American Registry for Internet Numbers (ARIN 38). We will be gathering at the Fairmont Dallas.

Dallas, home to 18 Fortune 500 companies, is the 9th largest city in the United States. The Telecom Corridor, a high-tech business concentration located just 15 miles north of Downtown Dallas, is home to over 1,600 companies focused in areas of equipment & component manufacturing, telecommunications, data processing, hosting and service providers.  The microchip was invented in Dallas in 1958.

NANOG 68 takes place on October 17-19, 2016 and will offer a great opportunity to network with colleagues, freshen-up skills, learn advanced networking techniques, and discover new network applications.  NANOG 68 will be hosted by  

 

                                   

 

 

 

 

D-Link camera can be hijacked to become a spy-cam

D-Link is working to fix a weakness that allows attackers to take over remote control of one of its cameras so they can eavesdrop, and the company is checking whether others of its products have similar vulnerabilities.The vulnerability allows for the injection of malicious code and forces a password reset, which means attackers can gain remote access to the camera’s feed, thereby enabling eavesdropping, according to Senrio, a startup that monitors devices, scores how vulnerable they are and alerts when it detects suspicious behavior.It also means that regardless of how strong a password users set up, it can be overridden.The camera – D-Link DCS-930L Network Cloud Camera – might not be the only device affected by the vulnerability, a spokesperson for Senrio says. “Senrio has also agreed to evaluate a number of additional D-link products to assess if the vulnerability can be found in the firmware in those items,” the spokesperson said in an email.To read this article in full or to leave a comment, please click here

D-Link camera can be hijacked to become a spy-cam

D-Link is working to fix a weakness that allows attackers to take over remote control of one of its cameras so they can eavesdrop, and the company is checking whether others of its products have similar vulnerabilities.The vulnerability allows for the injection of malicious code and forces a password reset, which means attackers can gain remote access to the camera’s feed, thereby enabling eavesdropping, according to Senrio, a startup that monitors devices, scores how vulnerable they are and alerts when it detects suspicious behavior.It also means that regardless of how strong a password users set up, it can be overridden.The camera – D-Link DCS-930L Network Cloud Camera – might not be the only device affected by the vulnerability, a spokesperson for Senrio says. “Senrio has also agreed to evaluate a number of additional D-link products to assess if the vulnerability can be found in the firmware in those items,” the spokesperson said in an email.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Public cloud causing enterprise IT to change

A few weeks ago, I sat on a panel hosted by CenturyLink on sustainability and efficiency in IT. At CenturyLink’s sunny Irvine, California, data center my co-panelists gathered ahead of going on stage and on camera. One of the panelists remarked that enterprise IT was dying—dying—slowly dying. But I believe this characterization is too broadly phrased and an inaccurate choice of words. The enterprise’s data center paradigm has changed irrevocably. And it will progress on its change cycle as enterprises embark on fewer new builds, and trends show that market share favors the commercial data center service providers. The paradigm of public cloud puts the sometimes outmoded ways of the enterprise data centers and legacy enterprise IT into an unfavorable light. But rest assured, there are some positive signs for enterprise IT—and good results ahead—but some changes do need to occur.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can enterprise IT seem like a good deal again?

A few weeks ago, I sat on a panel hosted by CenturyLink on sustainability and efficiency in IT. At CenturyLink’s sunny Irvine, California, data center my co-panelists gathered ahead of going on stage and on camera. One of the panelists remarked that enterprise IT was dying—dying—slowly dying. But I believe this characterization is too broadly phrased and an inaccurate choice of words.The enterprise’s data center paradigm has changed irrevocably. And it will progress on its change cycle as enterprises embark on fewer new builds, and trends show that market share favors the commercial data center service providers. The paradigm of public cloud puts the sometimes outmoded ways of the enterprise data centers and legacy enterprise IT into an unfavorable light. But rest assured, there are some positive signs for enterprise IT—and good results ahead—but some changes do need to occur.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can enterprise IT seem like a good deal again?

A few weeks ago, I sat on a panel hosted by CenturyLink on sustainability and efficiency in IT. At CenturyLink’s sunny Irvine, California, data center my co-panelists gathered ahead of going on stage and on camera. One of the panelists remarked that enterprise IT was dying—dying—slowly dying. But I believe this characterization is too broadly phrased and an inaccurate choice of words.The enterprise’s data center paradigm has changed irrevocably. And it will progress on its change cycle as enterprises embark on fewer new builds, and trends show that market share favors the commercial data center service providers. The paradigm of public cloud puts the sometimes outmoded ways of the enterprise data centers and legacy enterprise IT into an unfavorable light. But rest assured, there are some positive signs for enterprise IT—and good results ahead—but some changes do need to occur.To read this article in full or to leave a comment, please click here

This company uses AI to stop cyberattacks before they start

An ounce of prevention is worth a pound of cure, as the old saying goes, and that's just as true in cybersecurity as it is in health. So believes Cylance, a startup that uses AI to detect and prevent cyberattacks.On Wednesday, Cylance announced that it just raised a whopping US $100 million in Series D funding. It will use the new infusion to expand its sales, marketing, and engineering programs.Dubbed CylanceProtect, the company's flagship product promises AI-based endpoint security while using a fraction of the system resources required by the approaches used in most enterprises today. Enabling that are technologies including machine learning.To read this article in full or to leave a comment, please click here

This company uses AI to stop cyberattacks before they start

An ounce of prevention is worth a pound of cure, as the old saying goes, and that's just as true in cybersecurity as it is in health. So believes Cylance, a startup that uses AI to detect and prevent cyberattacks.On Wednesday, Cylance announced that it just raised a whopping US $100 million in Series D funding. It will use the new infusion to expand its sales, marketing, and engineering programs.Dubbed CylanceProtect, the company's flagship product promises AI-based endpoint security while using a fraction of the system resources required by the approaches used in most enterprises today. Enabling that are technologies including machine learning.To read this article in full or to leave a comment, please click here

35% off Samsung Level U Pro Bluetooth Wireless In-ear Headphones – Deal Alert

The Samsung Level U Pro Wireless Headphones combine Ultra High Quality Audio (UHQA) technology with noise-isolating ear gels to deliver clear, vivid sound. It's designed to comfortably sit around the neck, and is splash and sweat resistant. The headphones can take calls as well. Calls and music are controlled intuitively through smart magnets in the earbuds. The Level U Pro averages 4 out of 5 stars on Amazon from over 220 customers (read reviews). It's typical list price of $99.99 has been reduced by 35% to just $64.50. Learn more and review buying options now on Amazon.To read this article in full or to leave a comment, please click here

Open Sourcing CloudFlare’s UI Framework

Open Sourcing CloudFlare’s UI Framework

Late last year, the CloudFlare UI team made a huge decision: to change JavaScript frameworks from Backbone & Marionette to React & Redux.

We’ve been one of the single biggest Backbone+Marionette apps on the web for a while now, and the decision to move was not taken lightly. On our team we have a former core team member of the Marionette team (myself), and the author of several popular Backbone projects: Backgrid and Backbone Paginator.

In the spirit of the open web, we want to share more about what we’re doing. This starts by open sourcing the UI framework that we have spent the last few months building.

Introducing cf-ui

While moving to React, we’ve taken our existing Backbone UI framework and rebuilt it from scratch on top of React. This includes over 50 packages that include dozens of components, utilities, test helpers, and more.

Open Sourcing CloudFlare’s UI Framework

Examples: https://cloudflare.github.io/cf-ui
GitHub: https://github.com/cloudflare/cf-ui

We’re not open sourcing cf-ui because we think our buttons are any better than anyone else’s buttons, but because it’s an opportunity to share some of the technical decisions that we’ve made while building out a massive React application. The hope is that this will be Continue reading

Should You Care About Cloud Native?

To hear vendors tell the story, every enterprise in the world will be running cloud native applications on hybrid cloud networks any second now. In fact, if you’re not already firing up those containers, your business is behind. I mean…gosh…you’re probably losing thousands of dollars each minute because you’re not agile enough. You’ll be doing massive layoffs before you’re done reading this article just to stay alive. Nonsense.

Vetting vendors via VoIP

Who among us hasn’t set up a new and unique email account for a particular commercial transaction just so we’ll know who to blame when the account gets flooded with spam? Well, a member of Reddit’s community devoted to systems administration (r/sysadmin) says he took the tactic a step further … actually, 12 steps further.From a post headlined: “How to get blacklisted as a vendor.” Yesterday I was hunting for a new vendor. Mostly out of curiosity (but also to help me in picking a company that's not completely sleazy) I set up a batch of temporary phone numbers in our VoIP system, 12 in all, and called each vendor from a different number.To read this article in full or to leave a comment, please click here