Sponsored Post: Digit, iStreamPlanet, Instrumental, Redis Labs, Jut.io, SignalFx, InMemory.Net, VividCortex, MemSQL, Scalyr, AiScaler, AppDynamics, ManageEngine, Site24x7

Who's Hiring?

  • Digit Game Studios, Irish’s largest game development studio, is looking for game server engineers to work on existing and new mobile 3D MMO games. Our most recent project in development is based on an iconic AAA-IP and therefore we expect very high DAU & CCU numbers. If you are passionate about games and if you are experienced in creating low-latency architectures and/or highly scalable but consistent solutions then talk to us and apply here.

  • As a Networking & Systems Software Engineer at iStreamPlanet you’ll be driving the design and implementation of a high-throughput video distribution system. Our cloud-based approach to video streaming requires terabytes of high-definition video routed throughout the world. You will work in a highly-collaborative, agile environment that thrives on success and eats big challenges for lunch. Please apply here.

  • As a Scalable Storage Software Engineer at iStreamPlanet you’ll be driving the design and implementation of numerous storage systems including software services, analytics and video archival. Our cloud-based approach to world-wide video streaming requires performant, scalable, and reliable storage and processing of data. You will work on small, collaborative teams to solve big problems, where you can see the impact of your work on the business. Continue reading

Join the Packet Pushers – Live SD-WAN Podcast with Viptela Nov. 4 in NYC

Next week, the Packet Pushers will be recording a podcast live in front of a crowd in NYC. We'll be talking SD-WAN deployment with Viptela customers who have been actively rolling out the solution. With this show, we want to move from "what is SD-WAN?" to "how is SD-WAN working for you?" Sign up to attend this event here:
http://viptela.com/sd-wan-evening-with-packet-pushers-part-2/

The post Join the Packet Pushers – Live SD-WAN Podcast with Viptela Nov. 4 in NYC appeared first on Packet Pushers.

Who Wants To Save Forever?

Save-icon

At the recent SpectraLogic summit in Boulder, much of the discussion centered around the idea of storing data and media in perpetuity. Technology has arrived at the point where it is actually cheaper to keep something tucked away rather than trying to figure out whether or not it should be kept. This is leading to a huge influx of media resources being available everywhere. The question now shifts away from storage and to retrieval. Can you really save something forever?

Another One Bites The Dust

Look around your desk. See if you can put your hands on each of the following:

* A USB Flash drive
* A DVD-RW
* A CD-ROM
* A Floppy Disk (bonus points for 5.25")

Odds are good that you can find at least three of those four items. Each of those items represents a common way of saving files in a removal format. I’m not even trying to cover all of the formats that have been used (I’m looking at you, ZIP drives). Each of these formats has been tucked away in a backpack or given to a colleague at some point to pass files back and forth.

Yet, each of these formats Continue reading

OpenStack Summit – Tokyo – 2015 – Tuesday 27th – Show Notes

It’s Tuesday morning, it’s 9am and the keynote started off in a blaze of glory.

Over 5000 attendees are present, from 56 countries. The opening presenter with a huge amount of energy stated:

OpenStack is the greatest open source project!

Can we argue with that? The obvious one being Linux, but a second place isn’t to be argued with.

Egle Sigler, Principal Architect, RackSpace, OpenStack Foundation Board Member: Use devstack, which provides visibility against usability for defcore. The more it’s used, the better the visibility. All goes to the common good.

DefCore sets base requirements by defining 1) capabilities, 2) code and 3) must-pass tests for all OpenStack products. This definition uses community resources and involvement to drive interoperability by creating the minimum standards for products labeled "OpenStack."

Lachlan Evenson: Lithium Technologies: Highly energetic Aussie, spoke about rapid development and deployment. Via the presentation, Lachlan showcased a realtime app built on Google tech; containers in OpenStack using Kubernetes and a five "minute deployment". Also demonstrated a home grown dashboard with honeycomb visualisation for each type of OpenStack project. Also via Slack, he showed the use of Kubot (A Kubernetes Slack ‘bot’) to talk to Kubernetes and scale up Continue reading

Judge suggests DOJ wants Apple to work for government by unlocking encrypted iPhone

When Apple and the DOJ were back in court Monday, arguing over Apple’s refusal to unlock an iPhone seized by law enforcement during an investigation, Magistrate Judge James Orenstein told government attorneys, “What you're asking them [Apple] to do is do work for you.”But Justice Department attorney Saritha Komatireddy argued that it has compelled Apple to unlock at least 70 devices since 2008. The government believes it has the power to force Apple to comply under the All Writs Act. Just Security explained, “Under the government’s interpretation of the All Writs Act, anyone who makes software could be dragooned into assisting the government in investigating users of the software. If the court adopts this view, it would give investigators immense power.”To read this article in full or to leave a comment, please click here

Cisco buying Lancope for $450M

Cisco this week said it would acquire security vendor Lancope for $452.5 million to bolster its threat visibility portfolio for enterprise networks.Lancope specializes in network behavior analytics, threat visibility and security intelligence. Its StealthWatch product is designed to continuously monitor the enterprise network and identify suspicious traffic patterns to detect attacks.+MORE ON NETWORK WORLD: Cisco plans to embed security everywhere+To read this article in full or to leave a comment, please click here

Webmasters have only hours to deploy patches, Joomla incident shows

Four hours -- that's the time Joomla website owners had to apply a patch recently before attackers started to exploit the flaw it fixed. Those who still haven't updated their websites are likely to find them compromised. On Thursday, the developers of Joomla released version 3.4.5 of the popular content management system in order to fix an SQL injection vulnerability that allows attackers to gain administrative privileges by hijacking an active administrator session. Less than four hours after the update's release and the publishing of a technical overview by security researchers at Trustwave, attackers were already exploiting the flaw. Web security firm Sucuri said it saw attacks against two of its customers who operate very popular Joomla-based websites.To read this article in full or to leave a comment, please click here

Plexxi Named New Hampshire High Tech Council Product of the Year Finalist

We’re proud to announce that the Plexxi Switch 2 was named one of the top five finalists for “product of the year” by the New Hampshire High Tech Council. The Product of the Year award celebrates innovative products developed in the past year by New Hampshire-based technology companies and provides a platform for entrepreneurs and inventors to receive advice, promotion, and podium time in front of hundreds of tech leaders at the finalist event.

The winner will be announced at the High Tech Council’s awards event on November 12 at the Manchester Country Club in Bedford. We’ll be there presenting the Switch 2 live to the audience.

The launch of Plexxi Switch 2 Series was an incredible milestone for us and it’s with this groundbreaking technology that we’re poised to lead the next era of IT. In his article on the Switch 2 for Network World, Jim Duffy explains the technology well. Jim writes, “Plexxi’s Switch 2 Series consolidates the network fabric into a single tier for optimized east/west application traffic. It also eliminates the need for multiple switch types typically found in leaf/spine architectures.”

We are proud to be a technology company based in New Hampshire and Continue reading

From start to finish, inside a PayPal Phishing scam

One of the world's most targeted brands...Image by PayPalPayPal is one of the most commonly targeted brands for Phishing, nearly equal to banks when it comes to potential financial gain for criminals.Today, we're revisiting the concept of how to spot a Phishing email by focusing on a recent Phishing campaign that's targeting PayPal customers. We'll start by pointing out visual cues that will help you avoid becoming a victim, but we'll also go thorough the scam completely so you can see what it looks like.To read this article in full or to leave a comment, please click here

Getting Started with VMware NSX Distributed Firewall – Part 2

In Part 1, I covered traditional segmentation options. Here, I introduce VMware NSX Distributed Firewall for micro-segmentation, showing step-by-step how it can be deployed in an existing vSphere environment.

Now, I have always wanted a distributed firewall. Never understood why I had to allow any more access to my servers than was absolutely necessary. Why have we accepted just network segmentation for so long? I want to narrow down allowed ports and protocols as close to the source/destination as I can.

Which brings me to my new favorite tool – VMware NSX Distributed Firewall. Continue reading

EU will fund car, hospital and airport IT security research

Smart cars, airports and hospitals are likely to increasingly become targets for hackers -- and now the European Union's Agency for Network and Information Security (ENISA) has them in its sights too.The agency has added intelligent transport systems and smart health services to its remit for 2016. It plans to analyse the security risks inherent in their communications networks, and wants governments to take up its recommendations for securing them by 2017, it said Monday.The research will focus on the problems posed by the introduction of smart objects and machine-to-machine communications to replace humans in airport supply chains, whether that's for the delivery of spare parts to aircraft, luggage to conveyor belts or bottled water to airport stores.To read this article in full or to leave a comment, please click here

Review: Carbon Black and Cylance: The new face of endpoint security

We know by now that traditional anti-virus doesn’t work, or at least doesn’t work well enough to be the sole line of defense against endpoint exploits. And while the traditional endpoint protection vendors have learned some new tricks and offer some solid features, most enterprises need more.They want an endpoint product that can prevent zero-day infections from happening and they want to be more proactive.To read this article in full or to leave a comment, please click here(Insider Story)

New endpoint security tools target zero-day attacks

Differing approaches to endpoint securityTraditional anti-virus doesn’t work well enough to be the sole line of defense against endpoint exploits. And while the traditional AV vendors have learned some new tricks and offer some solid features, most enterprises need more. They want an endpoint product that can prevent zero-day exploits and they want to be more proactive. We looked at two relatively new products, Carbon Black (now owned by Bit9) and Cylance Protect. Both are designed to approach securing your endpoints from a different and more complete perspective. Read the full review.To read this article in full or to leave a comment, please click here

Senate to battle Tuesday on controversial CISA cybersecurity bill

The U.S. Senate is scheduled to consider early Tuesday the Cybersecurity Information Sharing Act of 2015, a controversial bill that is intended to encourage businesses to share information about cyberthreats with the government by providing them immunity from customer lawsuits.The CISA bill has been criticized by civil rights groups and some companies in the technology industry, which claim the proposed legislation, dubbed a surveillance bill in disguise, provides loopholes for government intelligence agencies like the National Security Agency to get access to personal information of users.The bill has powerful backers though, including industry groups, many lawmakers and the White House, which believe the legislation is necessary in the wake of a large number of recent cyberattacks on companies and government agencies.To read this article in full or to leave a comment, please click here

MIT Media Lab turns 30

Happy 30thThe MIT Media Lab will celebrate its 30th anniversary on Oct. 30 with an invitation-only symposium hosted by Penn & Teller, a choice which seems more than fitting given how much of the center’s work over the years has appeared magical before being woven into our everyday lives. What follows is a representative sample of the lab’s better known accomplishments.To read this article in full or to leave a comment, please click here

Power-sipping San Francisco network could have IoT devices buzzing

A wireless network planned for San Francisco could once again make the local library the best place to go for information.The data collected there won’t be much fun to read, but it may help consumers, businesses and local agencies take advantage of connected objects. The city agreed to install antennas at its libraries as part of a pilot project by French vendor SigFox to build a network for the Internet of Things. Each antenna will cover a broad swath of the city, and it could allow San Francisco to expand the IoT services it offers today.The city is no stranger to IoT. It already uses connected sensors and meters to determine the demand for parking on certain streets and periodically adjust hourly rates so drivers are more likely to find a space when they arrive. Rates go up on more crowded blocks and down on less crowded ones, but no more than once per month. The program is active in seven pilot areas around the city and uses an app to show drivers the current rates.To read this article in full or to leave a comment, please click here

UK arrests teenager in connection with TalkTalk hack

U.K. police arrested a 15-year-old boy in Northern Ireland on Monday in connection with the data breach at TalkTalk, as the broadband and phone provider faces growing criticism over its handling of the incident.The teenager, detained in Country Antrim, could face charges under the Computer Misuse Act, the Metropolitan Police said.TalkTalk's website was breached on Oct. 21, resulting in the loss of customer names, addresses, birth dates, email addresses, phone numbers, account information, payment card and bank account details.To read this article in full or to leave a comment, please click here