US to begin talks on drone privacy standards

A U.S. government agency will start its third attempt to develop voluntary privacy standards for an emerging area of technology, this time with a series of meetings on drone privacy scheduled to begin Aug. 3.The U.S. National Telecommunication and Information Administration has already hosted similar discussions on mobile app privacy and facial recognition privacy but with mixed results. Privacy groups pulled out of the facial recognition discussions in June, saying the process wouldn’t lead to enough protections for consumers.To read this article in full or to leave a comment, please click here

The 10 most powerful supercomputers on Earth

The biggest supercomputers out thereThe twice-yearly top500 listing of the world’s most powerful supercomputers is out, and even if there are few surprises, the presence of a brand-new system on the top 10 is intriguing. Here’s your illustrated list of the 10 mightiest computing machines on the planet, as of June 2015.To read this article in full or to leave a comment, please click here

UK man arrested for stealing half a penny’s worth of power to charge iPhone

As ridiculous as it was when police in Georgia arrested an electric car owner for stealing five cents of electricity, it may be more ridiculous that a UK man was arrested for stealing about a 'penny's worth' of power after charging his iPhone on a train.The entire episode was "ridiculous," artist Robin Lee told the London Evening Standard. He had plugged his iPhone into the train to charge it during a trip that took about "eight or nine minutes" and was then arrested for "abstracting electricity."To read this article in full or to leave a comment, please click here

Oracle extends cloud suite to cover entire order-fulfillment process

Oracle took another step forward in its efforts to bolster its cloud offerings Monday with the launch of two new products designed to help companies conduct their entire order-fulfillment processes in the cloud.Oracle Order Management Cloud and Oracle Global Order Promising Cloud are both extensions of the company’s Supply Chain Management Cloud and aim to provide modern order-management, visibility and fulfillment capabilities.The new Order Management Cloud focuses on order capture and fulfillment with the goal of improving order handling. Among the potential benefits for users are centralized order monitoring and the ability to proactively manage order exceptions. Companies can also define, implement and maintain their own fulfillment policies without the need for technical programming tools, Oracle said.To read this article in full or to leave a comment, please click here

Interviewing for the “Ideal Candidate”: Looking for “Nerdvana” – New Packet Pushers Blog

I was going through a stock photo website the other day and came across a “formula” that was supposed to equal the “perfect job candidate”.  I chuckled a little out loud.  The person sitting next to me looked over at what was on my laptop screen. Paused. Then asked me what I look for when I’m interviewing someone.  What is my “perfect job candidate?”

perfect_job_candidate_136353023

 

 

 

 

 

 

 

…. For the rest please go to Packet Pushers

packetpushers (1)

http://packetpushers.net/interviewing-for-the-ideal-candidate-looking-for-nerdvana/

Speaking Geek at Solarwinds’ Thwack Community

geekspeak

Thwack!

For the new few months in addition to posting here, I’ll be making some blog posts over on SolarwindsThwack Community in their “Geek Speak” blogs, on the general topic of network management. I won’t be reposting the content here, but I’ll be sharing the links each time I post, and I hope you can find a moment to read them, rate the post if you are that way inclined, and maybe even comment! I know have some very smart readers, and Thwack has some smart users too, so the conversation should be great!

Solarwinds Thwack is a light-hearted community providing specific product support and templates for Solarwinds products, but also offering more general support on networking-related issues through blogs, community forums and product forums. It’s kind of a fun place to dig around, and the users are usually not short of an opinion on most topics. Signing up for an account is easy and free, and then you can post comments and join in the discussion!

Here’s the intro to the first post in the series, called “Do You Monitor Your Network Interfaces? at Geek Speak

Thwack Blog Post 1

Hope to see you over there!

 

Disclosures

I am participating in the Solarwinds Continue reading

Cyberespionage group Pawn Storm uses exploit for unpatched Java flaw

A sophisticated group of hackers known for targeting military, government and media organizations is currently using an exploit for a vulnerability in Java that hasn’t been patched by Oracle.The zero-day exploit was recently observed by researchers from antivirus vendor Trend Micro in attacks against the armed forces of an unnamed NATO country and a U.S. defense organization. Those targets received spear-phishing emails that contained links to Web pages hosting the exploit.The cyberespionage group, known as APT28 and Pawn Storm, has been active since at least 2007. Some security vendors believe that it operates out of Russia and has ties to that country’s intelligence services.To read this article in full or to leave a comment, please click here

Huawei buys software networking tech from Irish Amartus

Chinese networking giant Huawei has bought the software-defined networking (SDN) division of Irish telecom software maker Amartus.Amartus’ senior team and product staff in Ireland will join Huawei, which sees the acquisition as a way to expand its investment in research and development in Ireland and Europe, it said in a news release.The part of privately held Amartus that remains unsold will continue serving current customers and will focus on providing telecom software development, integration expertise and services to vendors and service providers.Amartus’s main product is Chameleon SDS, which it describes as a “service orchestration platform” for cloud and network services. It allows telecom operators to control networks virtually and automate the delivery of network services.To read this article in full or to leave a comment, please click here

IoT analytics brings new levels of innovation to new product development

Studies show that around 40% of products fail. But what if product designers could understand what features are most and least popular, which components tend to fail sooner than others, and how customers actually use products versus how designers think they use them? And, what if product developers could then utilize these insights to develop products that perform better, potentially cost less and, most importantly, are aligned with actual customer needs?

Innovative product development teams in pretty much every industry are beginning to look at ways to translate enormous streams of real time machine data into actionable information to improve the product development process by understanding where product innovation is necessary, which features are most desirable, and how to lower their overall cost of ownership.

To read this article in full or to leave a comment, please click here

How OPM data breach could have been prevented

The recently disclosed data breach at the U.S. government's Office of Personnel Management follows a long history of lax security at the agency, according to the inspector general's office.In testimony before a joint House subcommittee hearing, Michael Esser, OPM's assistant inspector general for audits, told lawmakers that the agency's "long history of systemic failures to properly manage its IT infrastructure" may have invited a pair of related hacking incidents that compromised more than 21 million current and former government employees' personal information.[ Related: The OPM lawsuit will only make the lawyers rich ]To read this article in full or to leave a comment, please click here

DEF CON: Come hack the Internet of Things

The Internet of Things is talked about a lot and many people are unsure what it really is, but at DEF CON 23 this summer in Las Vegas, that should become a lot more clear as attendees compete to hack IoT devices.“Pwning IoT via Hardware Attacks” is a competition starting this year as part of IoT Village, a new sector of the conference focusing on security of proliferating device such as sensors, meters, industrial controls and smart appliances.A LOOK BACK: Leftovers of Black Hat, Defcon As part of the village attendees can enter their successful compromises against IoT devices in an attempt to win prizes. The entries will be judged on the severity of the compromise – how thoroughly a machine is taken over – and how it can be accessed, such as remotely or without being detectable, says Chase Schultz, a security researcher for Independent Security Evaluators (ISE), which is organizing the competition.To read this article in full or to leave a comment, please click here