Top Tech CEOs Make 190 Times As Much As You

The New York Times and Equilar recently published a study of the 200 highest-paid CEOs of publicly traded companies. Twenty-two executives from the tech industry made the list, including leaders from hardware and software vendors, telco and cable companies, and Web giants. As you might expect, it pays to be a CEO. Microsoft’s Satya Nadella […]

Author information

Drew Conry-Murray

I'm a tech journalist, editor, and content director with 17 years' experience covering the IT industry. I'm author of the book "The Symantec Guide To Home Internet Security" and co-author of the post-apocalyptic novel "Wasteland Blues," available at Amazon.

The post Top Tech CEOs Make 190 Times As Much As You appeared first on Packet Pushers Podcast and was written by Drew Conry-Murray.

Twitter, to curb abuse, lets users share block lists

Twitter, to reduce abusive content on its site, is letting users share lists of the people they block, so they can more easily silence those account holders on their own profiles.With the changes, users can save an exported file of the accounts they block to share with others. Users can import a list of the blocked accounts so they can block them all at once, rather than blocking the accounts individually.Twitter, in a blog post, said it hopes the tool will help people on the site who face similar problems or who experience high volumes of unwanted interactions.To read this article in full or to leave a comment, please click here

Cisco boosts cloud software, lines up ISVs to write Internet of Everything services

SAN DIEGO -- Cisco this week enhanced its cloud software and lined up a roster of ISVs to create services for the company’s Internet of Everything initiative.Cisco added security, management and support for more hypervisors to its Intercloud Fabric software, an application that connects private, public and hybrid clouds together for workload mobility. Cisco also enlisted 35 software developers – including Citrix, F5, Cloudera, Hortonworks and Chef -- to build services for the Intercloud and offer them through an Intercloud Marketplace.Areas ISVs will target include development platforms for production applications, containers and community-based open source programs; big data and analytics; and IoE cloud services, such as network control, performance, security, data virtualization, energy management, and business services like collaboration and consistent portals from Cisco’s Services Exchange Platform.To read this article in full or to leave a comment, please click here

NTSB wants auto industry to speed collision avoidance technology adoption

The National Transportation Safety Board this week said it wants to see auto collision avoidance technology implemented in cars more quickly and recommended that such equipment become standard on all new passenger and commercial vehicles.The NTSB said that only 4 out of 684 passenger vehicle models in 2014 included a complete forward collision avoidance system as a standard feature. When these systems are offered as options, they are often bundled with other non-safety features, making the overall package more expensive.“You don’t pay extra for your seatbelt,” said Chairman NTSB Christopher Hart in a statement. “And you shouldn’t have to pay extra for technology that can help prevent a collision altogether.”To read this article in full or to leave a comment, please click here

Installation Guide for Kali Linux

Originally posted on MakeThingsEasy:

Introducing Kali Linux

The creators of BackTrack have released a new, advanced penetration testing Linux distribution named Kali Linux. BackTrack 5 was the last major version of the BackTrack distribution. The creators of BackTrack decided that to move forward with the challenges of cyber security and modern testing a new foundation was needed. Kali Linux was born and released March 13th 2013. Kali Linux is based on Debian and an FHS-Compliant file system.

Kali has many advantages over the BackTrack. It comes with many more updated tools. The tools and streamlined with Debian repositories and synchronized four times a day. That means users have the latest package updates and security fixes. The new compliant file systems translate into running most tools from anywhere on the system. Kali has also made customization, unattended installation, and flexible desktop environments and strong feature in Kali Linux.

View original 858 more words


VMware patches virtual machine escape issue on Windows

VMware has released security updates for several of its virtualization products in order to address critical vulnerabilities that could allow attackers to break out of virtual machines and execute rogue code on the host operating systems.The code execution flaws affect the Windows versions of VMware Workstation, VMware Player and VMware Horizon Client. They were discovered by Kostya Kortchinsky of the Google Security Team and stem from a printer virtualization feature that allows a virtual machine’s guest OS to access the printer attached to the host computer.“On VMware Workstation 11.1, the virtual printer device is added by default to new VMs, and on recent Windows Hosts, the Microsoft XPS Document Writer is available as a default printer,” Kortchinsky explained in an advisory. “Even if the VMware Tools are not installed in the Guest, the COM1 port can be used to talk to the Host printing Proxy.”To read this article in full or to leave a comment, please click here

Microsoft acquires BlueStripe for operations management

To help enterprise customers better manage applications sprawled across hybrid clouds, Microsoft has purchased BlueStripe Software, a provider of technology for watching over distributed applications.Microsoft plans to fold BlueStripe’s software into its System Center and Operations Management Suite software for managing IT resources, giving users more details on how their applications are running on premise and in the cloud.“BlueStripe’s enterprise-class solution enables IT professionals to move from monitoring IT at the infrastructure level to gaining visibility into applications at the transaction level,” Mike Neil, Microsoft general manager for the enterprise cloud operations, wrote in a blog post Wednesday.To read this article in full or to leave a comment, please click here

German parliament may need to replace all software and hardware after hack

All software and hardware in the German parliamentary network might need to be replaced. More than four weeks after a cyberattack, the government hasn’t managed to erase spyware from the system, according to a news report.Trojans introduced to the Bundestag network are still working and are still sending data from the internal network to an unknown destination, several anonymous parliament sources told German publication Der Spiegel.In May, parliament IT specialists discovered hackers were trying to infiltrate the network. So far, they have been unable to mitigate the attack.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Orchestration means more than rapid provisioning of carrier services

Service orchestration is important, but there's a lot more to it than being able to allow customers to quickly self-provision connections and bandwidth. Orchestration should also mean being able to rapidly detect and resolve connection problems.I read a lot about service orchestration, and the top vendors and industry organizations that talk to me about it are manifold. There's the MetroEthernet Forum (MEF), with its Third Network, and Lifecycle Service Orchestration vision. There are companies like CENX, Cyan, and Tail-f (now part of Cisco). All too often, the messages are good, but repetitive: Customers are sick of waiting weeks or months for new connections. They want to be able to do their own moves, adds, and changes. They want to have MPLS service or Carrier Ethernet to have the agility of, say, the ubiquitous Internet.To read this article in full or to leave a comment, please click here

Cloud startup Zettabox touts privacy and local storage to appeal to EU customers

Anticipating the approval of stricter data protection rules in the European Union, cloud storage startup Zettabox bets it will be able to compete against bigger rivals by guaranteeing customers that their data will be housed in Europe.Zettabox, whose service came out of beta on Wednesday, is entering a market dominated by U.S. cloud providers. To differentiate itself, Zettabox is setting up storage space in data centers across the continent so companies and governments can store data in their home countries if they want to.Zettabox has offices in London and Prague and was founded by James Kinsella and Robert McNeal, U.S. executives who have been working on the service for over two years.To read this article in full or to leave a comment, please click here

Apple deploying camera-equipped cars to improve its maps service

Apple has confirmed it’s deploying camera-equipped cars to capture data—including images—to improve its mapping service.The cars have been spotted in several U.S. cities over the past few months, leading to speculation that Apple was collecting mapping data to better compete with Google Maps.“Some of the data” the cars collect will appear in future updates of Apple Maps, the company said Wednesday. Beyond mentioning images, Apple didn’t say what additional information the vehicles would collect. Apple also didn’t share what it would do with the data that doesn’t make it into Maps.To read this article in full or to leave a comment, please click here

House panel adds requirements to ICANN transition

A U.S. House of Representatives subcommittee has approved a bill that would add new requirements before a government agency ends its oversight of ICANN, the coordinator of the Internet’s domain name system.The goal of the Domain Openness Through Continued Oversight Matters (DOTCOM) Act is to safeguard Internet users and ensure a smooth transition away from U.S. National Telecommunications and Information Administration (NTIA) oversight of ICANN’s key domain-name functions, supporters said.Wednesday’s voice vote approving the DOTCOM Act in the Internet subcommittee of the House Energy and Commerce Committee sends the bill to the full committee for action.To read this article in full or to leave a comment, please click here

The Duqu cyberespionage group compromised venues hosting Iran nuclear negotiations

A state-sponsored espionage group that uses a malware platform called Duqu has compromised the computer networks of several hotels and venues that hosted negotiations over Iran’s nuclear program.The attacks that took place in 2014 and this year involved the use of a new version of the Duqu cyberespionage malware, according to antivirus firm Kaspersky Lab, which also found the malware on its own systems.Kaspersky Lab discovered in early spring that several of its internal systems had been compromised and the subsequent investigation resulted in the identification of what the company now calls Duqu 2.0.Duqu is a highly sophisticated malware platform used for cyberespionage that was originally found in 2011. It is believed to be related to Stuxnet, the computer worm developed by the U.S. and Israel to sabotage Iran’s nuclear program.To read this article in full or to leave a comment, please click here

iBGP Fall-over Trick

BGP fall-over is a neat BGP convergence optimisation technique whereby BGP peering is brought down as soon as the route to neighbor disappears from a routing table. The difference between external and internal BGP is that the former usually peers over a directly-attached interface so that when the interface to neighbor is disconnected, route is withdrawn from the routing table which triggers eBGP fall-over to bring down the neighborship. iBGP, on the other hand, normally uses device loopbacks to establish peering sessions. What this means is if a summary or a default route is present in the routing table (either static or learned via IGP), there is always a route to iBGP neighbor. In this case BGP has to wait for default 180 seconds (3 x keepalive timer) to bring down the neighborship and withdraw all the routes learned from dead neighbor.
To overcome that there’s a route-map option for a neighbor fall-over command which allows user to specify the exact prefix for which to look in the routing table. In the example below, the router will look for specific host routes representing neighbor’s loopbacks and will trigger reconvergence as soon as those routes disappear.

Continue reading

Outgoing Cisco CEO Chambers fesses up to mistakes, touts company’s grit

SAN DIEGO – Reflecting on a two-decade tenure as Cisco CEO marked by enviable success, John Chambers says he wishes the company could have moved faster. “Mistakes that I’ve made [have been] when I haven’t moved fast enough” into new market opportunities, Cisco’s outgoing CEO said to a room full of reporters during an open-ended question-and-answer session at the Cisco Live conference in San Diego. “Or I moved too fast without process behind it.” It was perhaps Chambers’ last meeting with the press as CEO given that he will step down in late July. Incoming CEO Chuck Robbins shared the stage and fielded questions along Chambers. (See How Chambers kept a high profile.)To read this article in full or to leave a comment, please click here

Microsoft Surface Hub goes on sale in September

Microsoft has a gigantic new member of its Surface family of touch-enabled devices called the Surface Hub, a widescreen all-in-one computer that can act as the focal point of conference-room meetings.Announced in January, the Surface Hub will go on sale in September, according to Brian Eskridge, senior manager for the Microsoft Surface Hub. Pre-orders for the computer begin Wednesday.The company is marketing the Surface Hub as a less expensive, and easier to maintain, replacement for the traditional assortment of office audio-video and computer equipment used in today’s conference rooms.To read this article in full or to leave a comment, please click here

Rethinking Centralization

In general, my line of thinking here is this: some things work well when they’re distributed, others work well when they’re centralized. Our bodies have a “central nervous system,” which is tied to a single point of failure (the brain), though our brains turn out to have some redundancy. On the other hand, other systems in our bodies are distributed, such as our reaction to being cut (and bleeding to death). What we need to start doing is thinking through what works well where, and figuring out how to move each one to that specific destination.

Another parallel in this space is what we’re facing now in application development. We like to say that we’re moving towards the cloud — which means thin clients and thick servers. The reality is, though, services are being broken down into microservices and distributed, and a lot of the processing that takes place does so on the client side by code pushed there from the server. In other words, our belief that the cloud “centralizes everything” is an oversimplification.

Taking one step back, we can always build centralized systems that scale to today’s requirements — the challenge is that we don’t know what tomorrow’s Continue reading