Real Time Deals: Our Picks for Best Tech Discounts Happening Right Now

Our top 5 quick fire list of real-time deals, found around the web and available for only a few days. Discounted by $1,300 at BestBuy.com: Samsung 65" Class (64.5" Diag.) LED 4K Ultra HD Smart 3D TV. Save $800 at BestBuy on Sony's 65" Class (64.5" Diag.) - LED - 2160p - Smart - 3D - 4K Ultra HD TV Save $80 (reg $179.99) - Plus Free Shipping - on Sony's BDPS6500 – Streaming 4K Upscaling 3D Wi-Fi Built-In Blu-ray Player Discounted by $100 with free shipping: Microsoft - Surface Pro 4 - 12.3" - 128GB - Intel Core i5 Save $204.85 (reg $379) on the LaView 4 Camera 960H Security System, 4 Channel 960H DVR w/500GB HDD and 4 600TVL Black Bullet Camera Surveillance Kit To read this article in full or to leave a comment, please click here

Top 5 Tech Discounts For Feb 23 & 24

Our top 5 quick fire list of real-time deals, found around the web and available for only a few days.Discounted by $1,300 at BestBuy.com: Samsung 65" Class (64.5" Diag.) LED 4K Ultra HD Smart 3D TV.Save $800 at BestBuy on Sony's 65" Class (64.5" Diag.) - LED - 2160p - Smart - 3D - 4K Ultra HD TVTo read this article in full or to leave a comment, please click here

Latest attack against Russian bank employees highlights the threat to financial institutions

The employees of at least six Russian banks were recently the target of a well-crafted email attack where hackers masqueraded as the Russian Central Bank to trick them into installing malware.The incident is the latest in a string of malware attacks against financial institutions over the past year. Together they signal a shift in focus for many cybercriminal groups, from stealing money from bank customers to stealing money directly from banks themselves.According to researchers from Symantec, employees from different Russian banks received emails in December offering them employment at the Central Bank of Russia. The messages were sent from a domain that closely resembled that of the Russian Central Bank and contained a link to an archive file with a Trojan named Ratopak inside.To read this article in full or to leave a comment, please click here

Mark Zuckerberg on Apple vs. FBI: ‘We’re sympathetic with Apple’

Mark Zuckerberg is the latest tech leader to voice his support of Apple against the FBI.“We’re sympathetic with Apple,” the Facebook CEO told the audience at Mobile World Congress in Barcelona on Monday. “We believe encryption is a good thing that people will want.”Even though Zuckerberg was clearly in support of Apple’s case for user privacy, the Facebook CEO acknowledged both sides. + BACKGROUND ON APPLE: Tim Cook refuses order to help unlock terrorist's iPhone 5c +“At the same time, we feel we have a pretty big responsibility to help prevent terrorism,” Zuckerberg said, adding that Facebook cooperates with authorities to remove terrorist posts, profiles, or pages. “We have very strong policies that if there’s content [on Facebook] promoting terrorism, we’ll kick them off.”To read this article in full or to leave a comment, please click here

FAQ: Everything we know so far about Apple’s battle with the FBI

At this writing, Apple’s battle with the FBI over how much it can and should help in the investigation of the San Bernardino shootings is less than a week old. But already it’s explosive to say the least. The government has accused Apple of being more concerned with marketing than the fight against terrorism, and Apple has drawn a line in the sand, saying that complying with the FBI’s request “would undermine the very freedoms and liberty our government is meant to protect.”This fight isn’t going to be over anytime soon, so we’ll keep this FAQ updated as events unfold. If you have more questions—or want to respectfully debate the implications this case will have on privacy and security—please chime away in the comments and we’ll do our best to make everything about this confusing case as clear as possible.To read this article in full or to leave a comment, please click here

Countless computers vulnerable to MouseJack attack through wireless mice and keyboards

Countless wireless mice and keyboards can be hacked from 100 yards away leaving their host machines and the networks they are attached to open to malware, Bastille has discovered.The problem, which is being called MouseJack, affects Amazon, Dell, Gigabyte, HP, Lenovo, Logitech and Microsoft products, the company says, and likely more vendors’ gear that they haven’t tested. Logitech alone shipped its billionth mouse in 2008, so the problem is widespread.+More on Network World: Startup Trusona is launching what it claims to be a 100% accurate authentication scheme aimed at corporate executives+To read this article in full or to leave a comment, please click here

Bill Gates backs the U.S. government in Apple’s iPhone privacy standoff

Microsoft founder Bill Gates says he supports the U.S. government in its efforts to unearth the contents of a terrorist’s iPhone, countering a trend by other tech leaders to back Apple’s refusal to code a backdoor into its iOS operating system.Gates appears to have made the case, however, that he is in favor of the government’s request because he feels it is narrowly worded. “This is a specific case where the government is asking for access to information,” Gates told the Financial Times in a story published Monday night Pacific time. “They are not asking for some general thing; they are asking for a particular case.”To read this article in full or to leave a comment, please click here

Blessay: Successful Private Clouds Aren’t Spoken Of In Public

You don’t hear much about successful “Private Clouds” because they aren’t done in public. Two takeaways. People are talking a lot about public cloud because its good business not necessarily because its good technology [1] Private Clouds are being successfully deployed in vast numbers and no one is talking about them. This is also good […]

The post Blessay: Successful Private Clouds Aren’t Spoken Of In Public appeared first on EtherealMind.

Apple and the FBI will need to compromise, Cisco’s CEO says

Cisco Systems CEO Chuck Robbins gave up a chance to strongly support enterprise mobility partner Apple in its fight with the FBI over iPhone encryption.Asked about the controversy during a press briefing at Mobile World Congress, Robbins said he doesn't think vendors should put back doors in products. But when it comes to personal privacy versus national security, "There needs to be a balance," he said. Ultimately, the two sides will need to compromise, Robbins said.+ ALSO ON NETWORK WORLD Tim Cook refuses order to help unlock terrorist's iPhone 5c +To read this article in full or to leave a comment, please click here

Apple and the FBI will need to compromise, Cisco’s CEO says

Cisco Systems CEO Chuck Robbins gave up a chance to strongly support enterprise mobility partner Apple in its fight with the FBI over iPhone encryption.Asked about the controversy during a press briefing at Mobile World Congress, Robbins said he doesn't think vendors should put back doors in products. But when it comes to personal privacy versus national security, "There needs to be a balance," he said. Ultimately, the two sides will need to compromise, Robbins said.+ ALSO ON NETWORK WORLD Tim Cook refuses order to help unlock terrorist's iPhone 5c +To read this article in full or to leave a comment, please click here

Label Switched Multicast – An Introduction

There are two common methods for transporting multicast packets within an MPLS-based Layer 3 VPN:

  1. Generic Routing Encapsulation (GRE) with Protocol Independent Multicast (PIM) (also known as “draft-rosen”)
  2. Label Switched Multicast (LSM)

There’s also a third method which uses Resource Reservation Protocol—Traffic Engineering (RSVP-TE) but I’m not going to get into that one.

In this first post in a series on LSM, I’ll describe how draft-rosen works, how LSM works, and then compare and contrast the two. Subsequent posts will focus solely on LSM.

At the end of this post, you will be able to describe conceptually how the control and data planes work with LSM and what the pros and cons are of LSM as compared to draft-rosen.

I will not be covering any theory on multicast or MPLS and will instead recommend that you be familiar with both topics before reading further.

Here we go!

Draft-rosen

All in all, draft-rosen is not all that different from running PIM-Sparse Mode (SM) in a non-MPLS network.

Draft-rosen requires that the MPLS network — the P and PE routers — all be multicast enabled and all run PIM. Each PE that is participating in the draft-rosen multicast network will form a Continue reading

Cross Continental vMotion with VMware NSX and IBM Softlayer Cloud

Ten years ago, using VMware vMotion to migrate a Virtual Machine from one server to another, even in the same rack without interruption, was considered black magic, prompting raised eyebrows and a flurry of questions.  Today, it takes quite a bit more than just a standard host-to-host vMotion to solicit a similar response.Recently however, we received a reaction similar to the days of old, rich with the nostalgia of the early days of vMotion. Continue reading

Apple vs. FBI case colors European debate about securing digital identity

Although Apple does not exhibit at Mobile World Congress, the giant trade show in Barcelona, the company casts a long shadow over it.The iPhone maker's influence there extends to app developers, accessory vendors and, now, the debate about securing digital identity.In a keynote session on security at the show, moderator Michael O'Hara asked presenters whether they sided with Apple or the U.S. government in the legal dispute over whether Apple should help the Federal Bureau of Investigation unlock an iPhone belonging to the employer of one of the San Bernardino attack suspects.For Simon Segars, CEO of ARM, the company that designs the microprocessors found in most smartphones, "It's a complex situation, there are rights and wrongs."To read this article in full or to leave a comment, please click here