Microsoft offers researchers $500K to work on HoloLens

Microsoft is offering academic researchers in the U.S. a chance to get their hands on its HoloLens augmented reality headgear later this year with a new program that will award funding and hardware to a handful of projects that will put the new gear to use.The company put out a request for proposals Monday seeking projects that will help “to better understand the role and possible applications for holographic computing in society.” Microsoft will pick “approximately five” proposals and give the researchers behind them a grant of up to $100,000 and two HoloLens development kits. In particular, Microsoft said it’s interested in seeing its technology used for things like data visualization, new forms of collaboration, interactive art and new teaching tools.To read this article in full or to leave a comment, please click here

1 Year Anniversary for Networking With Fish

It seems like just yesterday I was at CiscoLive in San Francisco asking people I had met on twitter about their experiences blogging as well as hosting a web page.  Today?  Last week marked the 1 year anniversary of “Networking With Fish”.

I want to say thank you.

Those of you who know me, know that I’m not much on the idea of one person’s success being solely on them.  That can be a philosophical debate for some other day.  But suffice it to say I had nothing to do with the IQ or EQ I was born with.  Also while I was studying for my certifications…. I was reading documents and books that other people wrote.

So too with success of Networking With Fish.

So please indulge me for one moment on this 1 year Anniversary to say “thank you” to all those who were instrumental in the success of this web site.  Your mug is in the mail.  :)

Russ White – Much starts with Russ. My CiscoLive career started because he asked me to be a speaker for CiscoLive 2006.  My becoming a CiscoLive Session Group Manager is because he Continue reading

Operational Annoyances: Validating SSL VIPs

Trust

In the last two posts I described tools to validate the required intermediate SSL certificate chain for a given server certificate, and to validate that the private key and server certificate are a match. Once the SSL configuration is deployed though, how do we check that everything is working correctly and the new certificate is in place?

Checking deployed SSL Certificates and Intermediates

The simple answer is “use one of the tools already out there on the Internet.” That’s a fair answer, and I have been known to use some of these. A quick Google search shows a validator on SSLShopper:

Operational Annoyances: Validating SSL VIPs

There’s also a similar tool on DigiCert:

DigiCert

These are great tools and I strongly encourage using them to check your sites. However, there’s one situation where they can’t help you, and that’s when your site is only accessible internally. How do I do certificate validation for private sites?

OpenSSL To The Rescue. Again

Yet again, OpenSSL is my tool of choice because not only can it open an SSL connection to a VIP, but it can also show the certificates it is sent. You may be thinking “Why not just use a web browser?” Again, Continue reading

The truth about Intel’s Broadwell vs. Haswell CPU

Intel’s fifth-generation Broadwell CPU has been the default laptop processor of choice since its debut in January, but it’s been difficult to get a real bead on just how much of an improvement it really was over its Haswell predecessor.That’s because unlike desktops, where it’s easy to control the environment they run in, laptops are complete packages. I tried to compare the updated ThinkPad Carbon X1 Carbon with Broadwell to the Haswell ThinkPad Carbon X1, for instance, but it wasn’t quite apples-to-apples. I initially determined that the Broadwell CPU was significantly faster than the Haswell. Something didn’t ring right, though, and ultimately I decided Lenovo’s redesign of the laptop likely contributed to the results and really made it useless to try to draw any conclusion on the CPUs themselves.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Monday, July 6

Surveillance firm Hacking Team gets hackedWho watches the watchmen? Italian online surveillance company Hacking Team appears to have been hacked, with attackers releasing what purports to be a trove of internal documents showing how the company helps governments around the world spy on their citizens. CSO has the details.Microsoft’s $2.5B marketing budget: Minecraft on Windows 10Is Microsoft counting on pester power to push Windows 10 sales? The company will release a special version of Minecraft for its new operating system when it goes on sale at the end of this month, PC World reports. Minecraft’s author Markus “Notch” Persson famously said he would rather not see the game on PCs at all than have it distributed through the Windows store—but since Microsoft paid $2.5 billion for his company Mojang last year, it calls the shots.To read this article in full or to leave a comment, please click here

Reaction: SD-WAN and Multiple Metrics

Ivan has posted a reaction to Ethan, which prompts me to… Okay, let’s start at the beginning. Ethan wrote a nice post on SD-WAN and the “shortest path we always wanted,” covering some of the positive and negative aspects of software defined WAN.

Ivan responded with this post, in which he says several interesting things, prompting some thoughts from yours truly…

Routing in SD-WAN environment is almost trivial…

Depends on what you mean when you say “routing…” If routing here means the discovery of the topology, and computing a best path through a topology, then controller based (centralized) “routing” is almost certainly more complex than distributed routing protocols. If routing here means, “take into consideration a wide swath of policies, including which link is most loaded right now, which link has the shortest queues, and lots of other things, and compute me a best path,” then a controller based centralized system is most likely going to be less complex. Take a gander through my last set of NANOG slides if you want to see where my thinking lies in this area — or read my new book on network complexity if you want a longer explanation.

The question is — Continue reading

Leak of ZeusVM malware building tool might cause botnet surge

The Internet could see a new wave of botnets based on the ZeusVM banking Trojan after the tools needed to build and customize the malware program were published online for free.The source code for the builder and control panel of ZeusVM version 2.0.0.0 was leaked sometime in June, according to a malware research outfit called Malware Must Die (MMD). The leak was kept under wraps by the researchers as they tried to stop the files from becoming widely available, an effort that ultimately exceeded their resources.As a result, the group decided to go public with the information Sunday in order to alert the whole security community so that mitigation strategies can be developed.To read this article in full or to leave a comment, please click here

New products of the week 07.06.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.RADIUS-as-a-ServiceKey features: JumpCloud’s RADIUS-as-a-Service (RaaS) provides a secure, cloud-based solution that enables IT admins to better control WiFi and VPN access without having to install separate RADIUS services or appliances. More info.To read this article in full or to leave a comment, please click here

What is Second Wave Wi-Fi?

The second wave of 802.11ac is coming ashore and the new MU-MIMO technology (Multi-User, Multiple Input Multiple Output) is going to make a splash. It’s one of the biggest improvements to Wi-Fi we’ve seen to date with the potential to greatly increase wireless network throughput and make a huge difference in dense, high capacity networks.To read this article in full or to leave a comment, please click here(Insider Story)

Italian surveillance software maker, Hacking Team, allegedly breached

An Italian developer of surveillance software, Hacking Team, which has previously been sharply criticized by digital activists, has apparently suffered a large data breach.Hacking Team develops surveillance tools that it has maintained are legally sold to governments for law-abiding investigations. But critics contend the company’s software has been used to spy on dissidents, human rights activists and journalists.On Sunday, it appeared that Hacking Team’s Twitter feed was taken over. The banner on the page had been changed to “Hacked Team.” Several posts contained screenshots that are purportedly of the stolen data, which included emails sent by Hacking Team’s founder and CEO, Vincent Vincenzetti.To read this article in full or to leave a comment, please click here