AT&T and Samsung detail security gaps

Cybersecurity would seem to be a top priority for enterprises, but there are still breaches and apparent gaps in their defenses and the way that companies respond to attacks.In separate announcements on Monday, both AT&T and Samsung drew attention to the dilemma. They recommended new enterprise security assessments that build on the services already offered by both companies.Samsung announced a new partnership with Booz Allen Hamilton to help enterprises find and address gaps in their mobile security. This approach includes a two-day, on-site mobile security assessment for each client, using a model based on security standards from the bodies like the National Institutes of Standards and Technology, among others.To read this article in full or to leave a comment, please click here

AT&T and Samsung detail security gaps

Cybersecurity would seem to be a top priority for enterprises, but there are still breaches and apparent gaps in their defenses and the way that companies respond to attacks.In separate announcements on Monday, both AT&T and Samsung drew attention to the dilemma. They recommended new enterprise security assessments that build on the services already offered by both companies.Samsung announced a new partnership with Booz Allen Hamilton to help enterprises find and address gaps in their mobile security. This approach includes a two-day, on-site mobile security assessment for each client, using a model based on security standards from the bodies like the National Institutes of Standards and Technology, among others.To read this article in full or to leave a comment, please click here

NERSC Preps for Next Generation “Cori” Supercomputer

The powerful Cori supercomputer, now being readied for deployment at NERSC (The National Energy Research Scientific Computing Center), has been named in honor of Gerty Cori. Cori was a Czech-American biochemist (August 15, 1896 – October 26, 1957) who became the first American woman to be awarded the Nobel Prize.

Cori (a.k.a. NERSC-8) is the Center’s newest supercomputer. Phase 1 of the system is currently installed with Phase 2 slated to be up and running this year.  Phase 1 is a Cray XC40 supercomputer based on the Intel Haswell multi-core processor with a theoretical peak performance of 1.92 petaflops/sec. It

NERSC Preps for Next Generation “Cori” Supercomputer was written by Nicole Hemsoth at The Next Platform.

When prepend fails, what next? (3)

We began this short series with a simple problem—what do you do if your inbound traffic across two Internet facing links is imbalanced? In other words, how do you do BGP load balancing? The first post looked at problems with AS Path prepend, while the second looked at de-aggregating and using communities to modify the local preference within the upstream provider’s network.

There is one specific solution I want to discuss a bit more before I end this little series: de-aggregation. Advertising longer prefixes is the “big hammer” of routing; you should always be careful when advertising more specifics. The Default Free Zone (DFZ) is much like the “commons” of an old village. No-one actually “owns” the routing table in the global Internet, but everyone benefits from it. De-aggregating don’t really cost you anything, but it does cost everyone else something. It’s easy enough to inject another route into the routing table, but remember the longer prefix you inject shows up everywhere in the world. You’re fixing your problem by taking up some small amount of memory in every router that’s connected to the DFZ in the world. If everyone de-aggregates, everyone has to buy larger routers and more Continue reading

IDG Contributor Network: Flash flood alerts: How sonar IoT systems help protect communities in Honduras

Rivers in Honduras flood frequently and suddenly, wreaking havoc, washing away houses, ruining crops and displacing families. Could IoT help provide early warning of floods?Robert Ryan-Silva took on this challenge with the Hidrosónico project. As director of the DAI maker lab, he’s an expert in applying technology for humanitarian projects around the world.Many villages and farms in Honduras are prone to flooding because they are on river banks. Designing a solution was challenging. It had to detect rising flood waters and alert families to evacuate in time. The solution had to be affordable, rugged and easy to install. Making things harder was the fact that mobile phones had only 20 percent penetration in Honduras.To read this article in full or to leave a comment, please click here

App makers should take responsibility for the effects of their creations

Imagine you’re a parent, living with your family in a quiet suburban subdivision. With very little traffic, your kids happily play in the street in front of your house. And then one day, construction begins on a distant thoroughfare, and suddenly hundreds of cars are racing down your formerly sleepy side street seeking to avoid the backup. And those cars didn’t arrive there randomly, they were sent there by traffic and navigation apps like Google’s Waze.For increasing numbers of people around the country, there’s no need to imagine this scenario, they’re already living it. And it brings up a couple of important questions: Who’s fault is this problem, and what can—and should—be done about it? The answers, unfortunately, aren’t simple.To read this article in full or to leave a comment, please click here

The Challenge Of Coding Across HPC Architectures

With the International Supercomputing 2016 conference fast approaching, the HPC community is champing at the bit to share insights on the latest technologies and techniques to make simulation and modeling applications scale further and run faster.

The hot topic of conversation is often hardware at such conferences, but hardware is easy. Software is the hard part, and techniques for exploiting the compute throughput of an increasingly diverse collection of engines – from multicore CPUs to GPUs to DSPs and to FPGAs – evolve more slowly than hardware. And they do so by necessity.

The OpenACC group is getting out ahead

The Challenge Of Coding Across HPC Architectures was written by Timothy Prickett Morgan at The Next Platform.

App stores and Linux repositories: Maybe the worst ideas ever

Eight years ago, Nokia released a Linux-powered tablet dubbed the N810. It’s a very cool little device, with a rather pleasant-to-use slide-out keyboard, running a Debian-based distribution known as Maemo.That little tablet went everywhere with me. At one point I—no joke— owned two of them. I could do some pretty remarkable things with that little beauty—from making Skype calls (back when I still used Skype) to running a full-blown version of Gimp. It was a complete, powerful desktop computer in my pocket.Recently, I decide to dust off my trusty old N810 to use it again. It’s a Linux-based computer, so why not. Right?To read this article in full or to leave a comment, please click here

A popular cloud privacy bill stalls in the Senate

A bill to give email and other documents stored in the cloud new protections from government searches may be dead in the U.S. Senate over a proposed amendment to expand the FBI's surveillance powers.The Electronic Communications Privacy Act Amendments Act would require law enforcement agencies to get court-ordered warrants to search email and other data stored with third parties for longer than six months.Under U.S. law, police need warrants to get their hands on paper files in a suspect's home or office and on electronic files stored on his computer or in the cloud for less than 180 days. But under the 30-year-old ECPA, police agencies need only a subpoena, not reviewed by a judge, to demand files stored in the cloud or with other third-party providers for longer than 180 days.To read this article in full or to leave a comment, please click here

A popular cloud privacy bill stalls in the Senate

A bill to give email and other documents stored in the cloud new protections from government searches may be dead in the U.S. Senate over a proposed amendment to expand the FBI's surveillance powers.The Electronic Communications Privacy Act Amendments Act would require law enforcement agencies to get court-ordered warrants to search email and other data stored with third parties for longer than six months.Under U.S. law, police need warrants to get their hands on paper files in a suspect's home or office and on electronic files stored on his computer or in the cloud for less than 180 days. But under the 30-year-old ECPA, police agencies need only a subpoena, not reviewed by a judge, to demand files stored in the cloud or with other third-party providers for longer than 180 days.To read this article in full or to leave a comment, please click here

VMware buys Arkin to help increase virtual networking adoption

VMware Monday announced plans to acquire Arkin, a specialist in helping customers manage physical and virtual networks, for an undisclosed sum.Arkin says its tools provide “cross-domain visibility,” which means that it can aggregate operational data from both virtual and physical infrastructures. Correlating this data can help organizations root out the cause of problems and fix them faster.+MORE M&A: Microsoft buys LinkedIn for $26.2 billion | Symantec scoops up Blue Coat for $4.65 billion +To read this article in full or to leave a comment, please click here

Microsoft buys LinkedIn for $26.2B to expand its business products

Microsoft has made a big bet on LinkedIn, announcing Monday that it will spend nearly $26.2 billion in cash to purchase the enterprise-focused social networking and recruiting company. The acquisition -- which is the largest in Microsoft's history and one of the biggest tech acquisitions ever -- will combine the world's largest enterprise-focused social network with one of the biggest enterprise software companies.It's more than just a social play, though. In addition to LinkedIn's core professional networking product, Microsoft also gains access to products including presentation- sharing software SlideShare and professional training service Lynda.com. To read this article in full or to leave a comment, please click here

Machine learning could help companies react faster to ransomware

File-encrypting ransomware programs have become one of the biggest threats to corporate networks worldwide and are constantly evolving by adding increasingly sophisticated detection-evasion and propagation techniques.In a world where any self-respecting malware author makes sure that his creations bypass antivirus detection before releasing them, enterprise security teams are forced to focus on improving their response times to infections rather than trying to prevent them all, which is likely to be a losing game.Exabeam, a provider of user and entity behavior analytics, believes that machine-learning algorithms can significantly improve ransomware detection and reaction time, preventing such programs from spreading inside the network and affecting a larger number of systems.To read this article in full or to leave a comment, please click here