Hyperscalers And Clouds On The Xeon Bleeding Edge

Hyperscalers and cloud builders are different in a lot of ways from the typical enterprise IT shop. Perhaps the most profound one that has emerged in recent years is something that used to be only possible in the realm of the most exotic supercomputing centers, and that is this: They get what they want, and they get it ahead of everyone else.

Back in the day, before the rise of mass customization of the Xeon product line by chip maker Intel, it was HPC customers who were often trotted out as early adopters of a new processor technology and usually

Hyperscalers And Clouds On The Xeon Bleeding Edge was written by Timothy Prickett Morgan at The Next Platform.

Senators release official draft of federal encryption legislation

The first proposed federal encryption legislation has been released, and had it been established law earlier this year Apple would have had to provide the help the FBI asked for in accessing encrypted data on the iPhone used by a terrorist in San Bernardino.The draft published by Sen. Richard Burr of North Carolina and Sen. Dianne Feinstein of California calls for encryption vendors and others to obey court orders that command them to deliver intelligible versions of encrypted data or to provide technical assistance to make it intelligible.To read this article in full or to leave a comment, please click here

Senators release official draft of federal encryption legislation

The first proposed federal encryption legislation has been released, and had it been established law earlier this year Apple would have had to provide the help the FBI asked for in accessing encrypted data on the iPhone used by a terrorist in San Bernardino.The draft published by Sen. Richard Burr of North Carolina and Sen. Dianne Feinstein of California calls for encryption vendors and others to obey court orders that command them to deliver intelligible versions of encrypted data or to provide technical assistance to make it intelligible.To read this article in full or to leave a comment, please click here

Microsoft is boosting security through hardware in Windows 10 PCs, phones

The burden of Microsoft's efforts to secure Windows 10 is now falling on PC, tablet, and smartphone makers.Microsoft is making a hardware-based security feature called TPM (Trusted Platform Module) 2.0 a minimum requirement on most Windows 10 devices. Starting July 28, the company will require device manufacturers shipping PCs, tablets and smartphones to include TPM 2.0.TPM has been available for years, mostly on business PCs. TPM 2.0 provides a hardware layer to safeguard user data by managing and storing cryptographic keys in a trusted container.The TPM requirement "will be enforced through our Windows Hardware Certification program," Microsoft said in a blog post.To read this article in full or to leave a comment, please click here

Microsoft is boosting security through hardware in Windows 10 PCs, phones

The burden of Microsoft's efforts to secure Windows 10 is now falling on PC, tablet, and smartphone makers. Microsoft is making a hardware-based security feature called TPM (Trusted Platform Module) 2.0 a minimum requirement on most Windows 10 devices. Starting July 28, the company will require device manufacturers shipping PCs, tablets and smartphones to include TPM 2.0. TPM has been available for years, mostly on business PCs. TPM 2.0 provides a hardware layer to safeguard user data by managing and storing cryptographic keys in a trusted container. The TPM requirement "will be enforced through our Windows Hardware Certification program," Microsoft said in a blog post.To read this article in full or to leave a comment, please click here

Something strange just happened with North Korea’s Internet

Ever since North Korea directly connected to the Internet in 2010, there's been a lot of interest in how the world's most closed country maintains and uses the link.It connects a handful of Web sites in Pyongyang serving propaganda to the world and allows foreigners in the country largely unfiltered access to the Internet. It also provides monitored access to an unknown number of senior officials, scientists, and university students.Yet for everything we've learned, there's still a lot we don't know and now there's a new mystery: Last week, the country's sole Internet link with the rest of the world went down for about three hours. It was the longest outage of the year and meant the entire country was disconnected from the Internet, according to monitoring by Dyn Research.To read this article in full or to leave a comment, please click here

This big-data startup combines AI with human savvy to help make sense of your data

Turning data into insight is one of the top business challenges today, and it becomes especially tricky when the data in question is unstructured. Artificial intelligence has a mixed track record there, but a young startup aims to get better results by bringing humans back into the picture.Spare5 on Wednesday released a new platform that applies a combination of human insight and machine learning to help companies make sense of unstructured data, including images, video, social media content, and text messages. The result, it says, are "game-changing insights delivered cost-effectively and at scale."To read this article in full or to leave a comment, please click here

Cable industry players eye wireless expansion, say analysts

Cable companies are already among the very biggest players in the wireless world, but analysts speaking at industry group CableLabs’ InformED Wireless event Wednesday in New York said that opportunities for further growth exist.Specifically, said Jonathan Chaplin of New Street Research, it’s a “matter of time” before the cable industry (presumably meaning either Comcast or TWC) moves more heavily into wireless, whether via an acquisition or some form of partnership with an existing player.+ALSO ON NETWORK WORLD: Verizon to replace copper with fiber optic Internet in Boston + Google Fiber to be free for select affordable housing residents+To read this article in full or to leave a comment, please click here

FBI reportedly bought exploit from hackers to access San Bernardino iPhone

The FBI reportedly paid professional hackers a one-time fee for a previously unknown vulnerability that allowed the agency to unlock the iPhone of San Bernardino shooter.The exploit allowed the FBI to build a device capable of brute-forcing the iPhone's PIN without triggering a security measure that would have wiped all of its data, the Washington Post reported Tuesday, citing unnamed sources familiar with the matter.The hackers who provided the exploit to the FBI find software vulnerabilities and sometimes sell them to the U.S. government, the newspaper reported.To read this article in full or to leave a comment, please click here

FBI reportedly bought exploit from hackers to access San Bernardino iPhone

The FBI reportedly paid professional hackers a one-time fee for a previously unknown vulnerability that allowed the agency to unlock the iPhone of San Bernardino shooter.The exploit allowed the FBI to build a device capable of brute-forcing the iPhone's PIN without triggering a security measure that would have wiped all of its data, the Washington Post reported Tuesday, citing unnamed sources familiar with the matter.The hackers who provided the exploit to the FBI find software vulnerabilities and sometimes sell them to the U.S. government, the newspaper reported.To read this article in full or to leave a comment, please click here

IRS: Tax deadline looms, scammers get more frantic

The Internal Revenue Service said today with the approaching tax filing April 18th deadline scammers are becoming even more desperate that ever to steal your money and identity.The IRS said there has been a 400% surge in phishing and malware incidents in this tax season alone and that scam artists are more frequently masquerade as being from the IRS, a tax company and sometimes even a state revenue department.+More on Network World: IRS warns of nasty W-2 phishing scheme+To read this article in full or to leave a comment, please click here

IRS: Tax deadline looms, scammers get more frantic

The Internal Revenue Service said today with the approaching tax filing April 18th deadline scammers are becoming even more desperate that ever to steal your money and identity.The IRS said there has been a 400% surge in phishing and malware incidents in this tax season alone and that scam artists are more frequently masquerade as being from the IRS, a tax company and sometimes even a state revenue department.+More on Network World: IRS warns of nasty W-2 phishing scheme+To read this article in full or to leave a comment, please click here

IRS: Tax deadline looms, scammers get more frantic

The Internal Revenue Service said today with the approaching tax filing April 18th deadline scammers are becoming even more desperate that ever to steal your money and identity.The IRS said there has been a 400% surge in phishing and malware incidents in this tax season alone and that scam artists are more frequently masquerade as being from the IRS, a tax company and sometimes even a state revenue department.+More on Network World: IRS warns of nasty W-2 phishing scheme+To read this article in full or to leave a comment, please click here

CCIE SPv4 Rack Rentals Now Available

Rack Rentals for INE’s CCIE Service Provider v4 topology are now available at rentals.ine.com.

Both CCIE RSv5 Full Scale Labs and CCIE SPv4 now share the same topology in the scheduler, which consists of the following devices:

  • 20 x IOS XE virtual machine instances (R1 – R20)
  • 4 x IOS XRv virtual machine instances (R21 – R24)
  • 4 x Catalyst 3560 physical switches (SW1 – SW4)

IOS XRv instances can be managed through the control panel similar to other devices in the topology, as seen below:

cPacket Provides Distributed, Line-Rate, Real-Time Packet Analysis

The core cPacket value proposition is that of deep packet inspection and analysis at line rate in a scalable, distributed manner. Rather than merely directing traffic to various tools for analysis by creating a visibility fabric, cPacket handles both the functions of visibility fabrics as well as traffic analysis tools.

The post cPacket Provides Distributed, Line-Rate, Real-Time Packet Analysis appeared first on Packet Pushers.