Apple patches vulnerable OS X Git version that put developers at risk

Apple has released a new version of its Xcode development tool in order to patch two critical vulnerabilities in the Git source code management client.The Git vulnerabilities, CVE‑2016‑2324 and CVE‑2016‑2315, have been known since mid-March and can be exploited when cloning a repository with a specially crafted file structure. This allows attackers to execute malicious code on systems where such cloning operations were initiated.Xcode is an integrated development environment (IDE) used by a large number of developers to write applications for OS X and iOS. It includes a package called the OS X Command Line Tools for Xcode that contains the open-source Git client.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Hit by DDoS? You will likely be struck again

More than half of all DDoS strikes have resulted in some kind of customer data loss, intellectual property theft or disappearance of money, according to a new report from Neustar.It’ll happen again, too. The IT firm also discovered that the vast majority of organizations (82 percent) are attacked again after the first DDoS onslaught.“DDoS attacks continue to pose a legitimate threat as a dangerous weapon used to create chaos and hold organizations hostage,” Neustar says in the report.Not many are “spared,” the security outfit says, and almost half of those blitzed once were thrashed six or more times.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Hit by DDoS? You will likely be struck again

More than half of all DDoS strikes have resulted in some kind of customer data loss, intellectual property theft or disappearance of money, according to a new report from Neustar.It’ll happen again, too. The IT firm also discovered that the vast majority of organizations (82 percent) are attacked again after the first DDoS onslaught.“DDoS attacks continue to pose a legitimate threat as a dangerous weapon used to create chaos and hold organizations hostage,” Neustar says in the report.Not many are “spared,” the security outfit says, and almost half of those blitzed once were thrashed six or more times.To read this article in full or to leave a comment, please click here

Mashing Up OpenStack With Hyperconverged Storage

While innovators in the HPC and hyperscale arenas usually have the talent and often have the desire to get into the code for the tools that they use to create their infrastructure, most enterprises want their software with a bit more fit and finish, and if they can get it so it is easy to operate and yet still in some ways open, they are willing to pay a decent amount of cash to get commercial-grade support.

OpenStack has pretty much vanquished Eucalyptus, CloudStack, and a few other open source alternatives from the corporate datacenter, and it is giving

Mashing Up OpenStack With Hyperconverged Storage was written by Timothy Prickett Morgan at The Next Platform.

To go from IT to IoT, build on your skills

The Internet of Things is growing so fast, it’s an obvious place to look for career growth.IoT is already a reality at 29 percent of enterprises, according to a Gartner survey taken late last year. Fourteen percent said they would implement it this year, and 64 percent said they plan to use some form of IoT eventually.Yet, like a lot of IoT technology, jobs in this vast field are still evolving out of what's been in place for years. Instead of aiming for a whole new job, the best strategy may be to add some skills to the ones you already have.There will be plenty of new things to do in enterprises that adopt IoT systems, which can make companies more efficient and generate new sources of revenue. And some people are working on IoT full time. But for now, most companies heading in that direction are still scouting it out.To read this article in full or to leave a comment, please click here

Simplivity attacks the ‘unbearable complexity’ of IT

Hyperconvergence is a relatively new buzzword but Westborough, Mass.,-based Simplivity is already boasting of creating version 3.0 of this emerging IT model. In this installment of the IDG CEO Interview Series, Simplivity CEO Doron Kempel talked with IDG US Media Chief Content Officer John Gallant about how Simplivity’s OmniStack outperforms competitors like Nutanix and claims customers deploying workloads on Simplivity can save 22% to nearly 50% compared to running them on Amazon Web Services. Kempel also talked about Simplivity’s partnerships with Cisco, VMware and Lenovo and explored why it took nearly four years to bring the company’s vision of hyperconvergence to reality. To read this article in full or to leave a comment, please click here(Insider Story)

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here

The Future of SharePoint is All About You

This morning (May 4, 2016), I had the pleasure of being in San Francisco for Microsoft’s “Future of SharePoint” event, which coincided with the general availability date for SharePoint 2016. This is the second time I’ve been in San Francisco for a major SharePoint event. The last time was in 2003, for the launch of SharePoint 2003. It’s amazing how far things have come in the past 13 years! The future of SharePoint is now – and the future is all about you and me – and making it easier to connect and collaborate and get work done in a way that brings the information we need to make key decisions to the places we need it, in the format we need it in, and on the device we are currently using. The future of SharePoint is all about people – and there should be no doubt that Microsoft is continuing to invest in providing great people experiences with SharePoint. While I am super focused on user experiences in SharePoint, and Microsoft has shown users a whole lotta love in the announcements today, developers are going to be pretty happy too – along with the folks focused on security and Continue reading

Interop: NBase-T makes “low-speed” Ethernet splash

LAS VEGAS --The growing number of vendors supporting 2.5 and 5 Gigabit Ethernet over twisted pair copper cabling demonstrated the interoperability of a variety of new gear at the Interop event here.The NBase-T Alliance showed off an assortment of 2.5 and 5GBase-T products – from switches to NICs -- it says show new applications for NBase-T products, including the ability to aggregate data at 2.5G and 5G Ethernet data across 802.11ac Wave2 access points and improved speed links to network-attached storage devices. The Alliance noted that Dell’Oro Group predicted recently that there will be a doubling of ports shipped every year in the 2.5G and 5G Ethernet market over the next 3 years.To read this article in full or to leave a comment, please click here

Interop: NBase-T makes “low-speed” Ethernet splash

LAS VEGAS --The growing number of vendors supporting 2.5 and 5 Gigabit Ethernet over twisted pair copper cabling demonstrated the interoperability of a variety of new gear at the Interop event here.The NBase-T Alliance showed off an assortment of 2.5 and 5GBase-T products – from switches to NICs -- it says show new applications for NBase-T products, including the ability to aggregate data at 2.5G and 5G Ethernet data across 802.11ac Wave2 access points and improved speed links to network-attached storage devices. The Alliance noted that Dell’Oro Group predicted recently that there will be a doubling of ports shipped every year in the 2.5G and 5G Ethernet market over the next 3 years.To read this article in full or to leave a comment, please click here

Interop: NBase-T makes “low-speed” Ethernet splash

LAS VEGAS --The growing number of vendors supporting 2.5 and 5 Gigabit Ethernet over twisted pair copper cabling demonstrated the interoperability of a variety of new gear at the Interop event here.The NBase-T Alliance showed off an assortment of 2.5 and 5GBase-T products – from switches to NICs -- it says show new applications for NBase-T products, including the ability to aggregate data at 2.5G and 5G Ethernet data across 802.11ac Wave2 access points and improved speed links to network-attached storage devices. The Alliance noted that Dell’Oro Group predicted recently that there will be a doubling of ports shipped every year in the 2.5G and 5G Ethernet market over the next 3 years.To read this article in full or to leave a comment, please click here

Storage Performance Models Highlight Burst Buffers at Scale

For storage at scale, particularly for large scientific computing centers, burst buffers have become a hot topic for both checkpoint and application performance reasons. Major vendors in high performance computing have climbed on board and we will be seeing a new crop of big machines featuring burst buffers this year to complement the few that have already emerged.

The what, why, and how of burst buffers can be found in our interview with the inventor of the concept, Gary Grider at Los Alamos National Lab. But for centers that have already captured the message and are looking for the

Storage Performance Models Highlight Burst Buffers at Scale was written by Nicole Hemsoth at The Next Platform.