Tech News


NYC current conditions
14°
mist
humidity: 77%
wind: 3m/s SE
H 14 • L 13
14°
Tue
19°
Wed
22°
Thu
22°
Fri
19°
Sat
Weather from OpenWeatherMap

Linuxtoday.com

KDevelop 5.1.1 is the first stabilization and bugfix release of the major KDevelop 5.1 release launched back in March 2017 with lots of goodies

Posted: May 29, 2017, 5:00 pm

ostechnix: AURdroid is a free Android that allows Arch Linux users to browse the AUR (Arch User Repository) from the mobile phone, tablets or any Android devices.

Posted: May 29, 2017, 1:00 pm

Linus Torvalds: Hey, things continue to look good, and rc3 isn't even very big.

Posted: May 29, 2017, 1:00 am

Peppermint 8 is based on the Ubuntu 16.04.2 LTS (Xenial Xerus) operating system and the HWE (hardware enablement) Linux 4.8 kernel and graphics stacks from Ubuntu 16.10 (Yakkety Yak)

Posted: May 28, 2017, 9:03 pm

LinuxAndUbuntu: File transfer between Linux and Windows can be done using SAMBA which is an open source software suite that provides seamless file and print services to SMB/CIFS clients, allowing interoperability between Unix/Linux based system and Windows-based system.

Posted: May 28, 2017, 5:00 pm

Tecmint: Certain Linux distros such as Ubuntu, Linux Mint, Mandriva just to mention but a few, make it possible to reboot/halt/shutdown the system as a normal user, by default.

Posted: May 28, 2017, 8:21 am

Good engineers become great engineers when they follow these rules.

Posted: May 28, 2017, 1:00 am

This post will provides a quick guide how to Linux get ip address, subnet and related networking information.

Posted: May 27, 2017, 9:00 pm

MakeTechEasier: Building a custom Linux kernel sounds terrifyingly difficult, but it's really not that hard.

Posted: May 27, 2017, 5:00 pm

eWEEK - RSS Feed

eWeek - RSS Feed

A10 Networks Application Intelligence Report (AIR) reveals insights about how much individuals value their mobile applications and their smartphones.
Posted: May 26, 2017, 7:20 pm
The Acer Spin 1 Windows 10 tablet/notebook provides some strong features, such as a large screen at a starting price of just $329.
Posted: May 26, 2017, 6:00 pm
Supervisory Control and Data Acquisition (SCADA) systems are a core element of modern infrastructure and like all forms of technology are at risk from security vulnerabilities.
Posted: May 26, 2017, 5:31 pm
Intel, the current leader in supplying enterprise storage disks, is feeling the pressure from Samsung.
Posted: May 26, 2017, 4:02 pm
NEWS ANALYSIS: Individuals and businesses need to be prepared for a constant series of ransomware waves using exploits from ShadowBrokers as cyber-criminals ramp up their game.
Posted: May 26, 2017, 2:52 pm
Check Point software claims that mobile apps were being used in one of the largest ever malware campaigns on Google Play.
Posted: May 26, 2017, 12:24 pm
Specialized cloud enables enterprises to run a supply chain with confidence with the business intelligence required to meet customer expectations on delivery time, cost and convenience.
Posted: May 26, 2017, 11:40 am
Human-centric cloud security solution for web, email and cloud-access security brokers provides reporting and context to address biggest risks--internal and external.
Posted: May 26, 2017, 10:11 am
The ruggedized Toughbook CF-33 has a 3:2 aspect ratio display for less scrolling and more on-screen information for users in one glance.
Posted: May 26, 2017, 9:45 am
DAILY VIDEO: Red Hat Enterprise Linux 7.4 set to improve security features; Google, IBM, Lyft collaborate on Istio open microservices technology; Infosys harnessing 'purposeful AI' to aid digital transformations; and there's more.
Posted: May 26, 2017, 9:23 am
Expanded functionality in DevOps platform runs and automates applications directly in Amazon Web Services.
Posted: May 26, 2017, 8:55 am
Power BI customers can now get insights into the Office 365 usage habits of their workforces, data they can use to rally power users behind their digital transformation initiatives.
Posted: May 26, 2017, 8:34 am
Codenvy's technology platform is based on the open-source Eclipse Che online developer workspace effort, providing a cloud based Integrated Developer Environment for building code.
Posted: May 25, 2017, 7:42 pm
Enterprises should consider these nine principles when designing next generation storage infrastructures to support business critical workloads.
Posted: May 25, 2017, 6:51 pm
Developers will have access to a massive new inventory of APIs—7,500, give or take a few—in what the company claims will become the world’s largest API marketplace.
Posted: May 25, 2017, 6:08 pm
The European Union's General Data Protection Regulation (GDPR) rules include strict requirements on breach reporting and disclosure that organizations need to prepare for, to avoid potential penalties.
Posted: May 25, 2017, 4:36 pm
Security firm raises new funds as it aims to give back to existing shareholders and grow technology base that can help defend against issues like WannaCry.
Posted: May 25, 2017, 1:06 pm
SPARTAN Cloud is the first security product that enables secure connections to AWS, Azure and Google Cloud based on Transport Layer Security (TLS).
Posted: May 25, 2017, 1:02 pm
The Google Ads Data Hub will give advertiser better insight into how users are interacting with their web ads across mobile and other devices.
Posted: May 25, 2017, 12:27 pm
DAILY VIDEO: Microsoft unveils long-awaited Surface Pro hybrid tablet; Check Point discovers media subtitle vulnerability impacting millions; Citrix plans to add machine learning to its cloud later this year; and there's more.
Posted: May 25, 2017, 10:58 am
TriCore Solutions fills a big need in Rackspace's pivot from its original internet hosting business to a managed services provider.
Posted: May 25, 2017, 10:20 am
In a year, Europe's General Data Protection Regulation goes into effect and Microsoft is working to get its cloud customers ready.
Posted: May 25, 2017, 8:45 am
For many organizations the threat of data breaches and data thefts caused by insiders is an even bigger worry than cyber-attacks by outsiders. Here are the steps IT managers should take to prevent data losses caused by insiders.
Posted: May 24, 2017, 7:27 pm
The new Surface Pro hybrid tablet/laptop is support to replace the aging Surface Pro 4. But most of the enhancements are hidden away inside the device.
Posted: May 24, 2017, 5:54 pm
Beta release of Red Hat's flagship Linux platform adds support for Network Bound Disk Encryption and the USBGuard software framework, providing improved security.
Posted: May 24, 2017, 4:51 pm
NEWS ANALYSIS: Quantum computing's potential for cracking encryption worries the National Security Agency, so it is developing standards and strategies to support encryption in a post-quantum world.
Posted: May 24, 2017, 2:23 pm
Quick Base is establishing itself as a leading proponent of the citizen-development genre—even more so now since it was spun out of Intuit (as QuickBase) about a year ago.
Posted: May 24, 2017, 2:03 pm
Istio, an open source microservices environment, will help developers manage, monitor and secure traffic between services, companies say.
Posted: May 24, 2017, 11:39 am
The company's new artificial intelligence platform aims to bring intelligence and automation to complex business processes.
Posted: May 24, 2017, 11:10 am
DAILY VIDEO: Google for Jobs employs machine learning to help people find work; WannaCry ransomware raises stakes for cyber-security insurance; Skyport Systems extends secure server protection to hybrid cloud edge; and there's more.
Posted: May 24, 2017, 9:01 am

Network World LAN & WAN

The shift to software-defined networks (SDN) was the catalyst to usher in a whole new way of running networks—and that’s through software. Some may argue that network engineers have been using software for decades, as every good router jockey had a laptop filled with scripts and templates that could be cut and pasted into the command line interface. This ad hoc model is highly error prone and not scalable, which is why human error still accounts for much of the downtime with respect to networks. 

Historically, Cisco hasn’t exactly helped its customers be more proficient with software. Oh sure, it had programs such as the Cisco Technology Developer Program (CTDP) that were targeted at developers, but what about the network engineer? The person who wants to do his job more efficiently? For that audience, Cisco didn’t have an answer. 

To read this article in full or to leave a comment, please click here

Posted: May 25, 2017, 5:58 pm

I was recently invited to participate on a panel at a major IT conference, where questions from the audience provided an interesting window into the top issues that networking professionals are dealing with as part of their organizations’ digital transformation.

Every enterprise, it seems, is planning a cloud strategy.  On closer inspection, most are already using the cloud in the form SaaS ERP and CRM applications like Salesforce, NetSuite, etc. These applications have performed well enough on top of traditional, legacy networks.

However, newer, more multi-dimensional cloud applications are forcing businesses to look for ways to make their networks more agile. One of these is Microsoft Office 365.  Microsoft is aggressively investing in their infrastructure to provide a superior experience for users. Nevertheless, the enterprise network, and more specifically the wide area network (WAN), remains one of the biggest impediments to providing an on-premise caliber quality of experience for cloud applications. Finding the most efficient exit to Office 365 and best performance server are usually the culprits.

To read this article in full or to leave a comment, please click here

Posted: May 25, 2017, 4:15 pm

Network traffic analysis should be used more in the fight against malware. That’s because pointers show up on the network “weeks and even months” in advance of new malicious software being uncovered, scientists from the Georgia Institute of Technology explain in an article on the school’s website.

The researchers, who have been studying historic network traffic patterns, say the latest malware tracking should take advantage of inherent network-supplied barometers and stop simply focusing on trying to identify malware code already on networks and machines. By analyzing already-available, suspicious network traffic created by the hackers over a period of time, administrators will be able to pounce and render malware harmless before it can perform damage.

To read this article in full or to leave a comment, please click here

Posted: May 25, 2017, 11:00 am

In my recent blogs, I have written about automation tying the network to other domains of IT, and how it’s a capability available today that you should start using.

Machine learning is another hot topic. While the timeline is several years out for many machine learning applications in networking, it has the potential to be one of those rare technologies that comes along every few decades and fundamentally transforms how networks run.

To read this article in full or to leave a comment, please click here

Posted: May 24, 2017, 2:00 pm

If there’s one application that brings chills to the hearts of SD-WAN implementers it’s providing a predictable real-time voice service. So let’s talk about how SD-WANs might help.

The problem with voice

We need to separate from the theory of voice and the reality of voice. The theory goes something like this. The Internet is fine for email and web browsing. It’s even pretty good for personal voice. But if I want to deliver a voice service, day-in-day out without a hiccup, then I run into a problem. Voice is a real-time protocol with strict tolerances around latency, loss and jitter. Exceed those tolerances and symptoms common to a poor voice service set in. Increased delays from traffic routing or lost packets disrupt voice calls. Outages and brownouts can cause calls to drop.

To read this article in full or to leave a comment, please click here

Posted: May 23, 2017, 7:00 pm

Thousand megabit broadband is a turning point for internet delivery speeds. Newer tech, such as virtual reality, and the incumbents, such as video streaming, will benefit. Right now, though, only about 17 percent of the U.S.’s population has access to those super-fast speeds, which are primarily delivered by fiber, according to Viavi Solution’s latest Gigabit Monitor report.

Although Gigabit is kicking in, it’s not going to be particularly simple to implement at the networking level, internet metrics company Ookla said earlier this month. Upgraded, wired installs will likely handle the throughput better than existing, now commonly used Wi-Fi, among other things, the company said.

To read this article in full or to leave a comment, please click here

Posted: May 19, 2017, 3:46 pm

The Linksys DPC3008 Cable Modem delivers high-speed broadband connectivity to your home and office with download speeds up to 340 Mbps and upload speeds up to 120 Mbps. The Gigabit Ethernet port provides high-speed network performance, while DOCSIS 3.0 support ensures you can connect directly to your existing cable broadband service. Comcast-certified, the DPC3008's simple setup allows you to get connected quickly and easily. It also allows you to stop paying monthly modem-rental fees. If you have broadband internet from Comcast or similar providers, you're probably paying a monthly fee to rent the cable modem, so do the math and you may find this one pays for itself in short time. The Linksys modem typically lists for $42.92, but with this deal you get it for 53% off, or just $19.99. See this deal on Amazon.

To read this article in full or to leave a comment, please click here

Posted: May 19, 2017, 1:14 pm

NordVPN gives you a private and fast path through the public Internet. All of your data is protected every step of the way using revolutionary 2048-bit SSL encryption even a supercomputer can’t crack. Access Hulu, Netflix, BBC, ITV, Sky, RaiTV and much more from anywhere in the world. Unmetered access for 6 simultaneous devices. You're sure to find dozens of good uses for a VPN. Take advantage of the current 72% off deal that makes all of this available to you for just $3.29/month (access deal here). This is a special deal available for a limited time.

To read this article in full or to leave a comment, please click here

Posted: May 18, 2017, 3:29 pm

The carrier-led Small Cell Forum has revealed the names of the founding members of an Enterprise Advisory Council designed to help address the need for more wireless coverage to meet rising demand.

The Forum — whose members include the likes of AT&T, Cisco and Huawei —had previously said it was forming such a council, but had not disclosed any member organization names. It also had said it was working with hotels and others in the hospitality industry to plot strategies for boosting cellular coverage to meet the needs of their customers (an industry, by the way, that hasn't always been very hospitable when it comes to wireless service, as seen in the Wi-Fi blocking schemes of some).

To read this article in full or to leave a comment, please click here

Posted: May 16, 2017, 4:02 am

Effective network troubleshooting requires experience and a detailed understanding of a network’s design. And while many great network engineers possess both qualities, they still face the daunting challenge of manual data collection and analysis.

The storage and backup industries have long been automated, yet, for the most part, automation has alluded the network, forcing engineering teams to troubleshoot and map networks manually. Estimates from a NetBrain poll indicate that network engineers spend 80% of their troubleshooting time collecting data and only 20% analyzing it. With the cost of downtime only getting more expensive, an opportunity to significantly reduce the time spent collecting data is critical.

To read this article in full or to leave a comment, please click here

Posted: May 15, 2017, 9:10 pm

A gamble on a relatively unknown technology four years ago is paying off for a logistics company, which is using the software to shave millions of dollars off its bandwidth connectivity costs. Today freight forwarding company JAS Global is leveraging a software-defined wide area network (SD-WAN) to run cloud applications, according to JAS CIO Mark Baker. Eventually, Baker hopes to use the SD-WAN as the backbone of a predictive analytics strategy to grow the business.

SD-WANs allow companies to set up and manage networking functionality, including VPNs, WAN optimization, VoIP and firewalls, using software to program traffic routing typically conducted by routers and switches. Just as virtualization software disrupted the server market, SD-WANs are shaking the networking equipment market.

To read this article in full or to leave a comment, please click here

Posted: May 12, 2017, 7:43 pm

First of all, that used phone you’re thinking about buying – the one on Craigslist going for a ridiculously low price – is almost certainly stolen. You know that. We all know it.

Yet if you’re intent on buying a used phone – and don’t want to buy a hot one – the wireless industry has just given you a new tool that will allow you to be reasonably confident that the phone hasn’t been reported stolen lost.

From a CTIA press release:

CTIA, the U.S. wireless industry association, today announced the launch of a new tool www.stolenphonechecker.org to provide consumers with free one stop access to determine if a used or refurbished smartphone has been reported as stolen or lost.

To read this article in full or to leave a comment, please click here

Posted: May 12, 2017, 2:45 pm

This week, SD-WAN vendor Aryaka released its “2017 State of the WAN Report,” which summarizes a global study conducted by the vendor that looks at WAN trends across a number of verticals and across every region of the globe for 2016.

The study was conducted by aggregating data from Aryaka’s customer base. The global SD-WAN vendor has analyzed connectivity to and from over 5,000 locations around the world across more than 550 enterprise organizations. The network data was rolled up and analyzed to see what’s happening on the enterprise WAN.

Aryaka also provided a comparison with last year’s data set, which provides insight into how things have changed over the past 12 months.

To read this article in full or to leave a comment, please click here

Posted: May 11, 2017, 3:14 pm

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Internet of Things applications have diverse connectivity requirements in terms of range, data throughput, energy efficiency and device cost. WiFi is often an obvious choice because in-building WiFi coverage is almost ubiquitous, but it is not always the appropriate choice.  This article examines the role WiFi can play and two emerging IEEE standards, 802.11ah and 802.11ax.

Data transfer requirements for IoT vary from small, intermittent payloads like utility meters to large amounts of continuous data such as real-time video surveillance. Range requirements can span from very short distances for wearables to several kilometers for weather and agriculture applications.

To read this article in full or to leave a comment, please click here

Posted: May 11, 2017, 3:05 pm

Is it possible that a writer at The Onion has previously toiled as a network engineer … or systems administrator? He or she at least did their homework to produce a “story” headlined: “Network Engineer Would Be Systems Manager If He Could Do It All Over Again.”

From the “story.”

Reflecting wistfully on what he might have made of himself had he chosen a different profession, Dynatrend Solutions network engineer Alan Miller said Wednesday that he would be a systems manager if he had the chance to go back and do it all over again.

To read this article in full or to leave a comment, please click here

Posted: May 11, 2017, 2:52 pm

A conservative group took credit for a barrage of anti-net neutrality comments posted on the U.S. Federal Communications Commission's website this week, but it denied generating fake activism.

The Center for Individual Freedom said it did not use a bot to generate comments after news reports raised questions about the legitimacy of the posts. Between Monday and early Wednesday afternoon, the FCC had received more than 128,000 comments duplicating the language provided by CFIF.

To read this article in full or to leave a comment, please click here

Posted: May 11, 2017, 12:20 pm

When I saw that the creators of the Andrew File System (AFS) had been named recipients of the $35K ACM Software System Award, I said to myself "That's cool, I remember AFS from the days of companies like Sun Microsystems... just please don't ask me to explain what the heck it is."

Don't ask my colleagues either. A quick walking-around-the-office survey of a half dozen of them turned up mostly blank stares at the mention of the Andrew File System, a technology developed in the early 1980s and named after Andrew Carnegie and Andrew Mellon. But as the Association for Computing Machinery's award would indicate, AFS is indeed worth knowing about as a foundational technology that paved the way for widely used cloud computing techniques and applications.

To read this article in full or to leave a comment, please click here

Posted: May 10, 2017, 9:20 pm

ThousandEyes, a network intelligence company with the ability to monitor performance from hundreds of vantage points across the Internet, has insight into a variety of services across the globe, including public DNS service providers.  In this article we’ll dive into our results from testing 10 of the most popular public DNS resolvers, with the goal of helping you make informed conclusions about your choice of provider. We observed a wide range of performance across different services, both globally and from region to region.

The Domain Name System (DNS) is the internet’s system for converting alphabetic web addresses into numeric IP addresses. If a given service’s DNS records are unavailable, the service is effectively down and inaccessible to everyone.  DNS can also have a substantial impact on page load time and web page performance. While it’s just the first step of many in the page load process (see the below image), any increase in DNS lookup time will directly increase load times. DNS lookup time, in turn, is directly affected by latency to the DNS server.

To read this article in full or to leave a comment, please click here

Posted: May 10, 2017, 8:25 pm

Branch sites are ideal places to make networking simpler and less expensive. There's often little or no IT expertise there, and it's harder to justify costs because only a fraction of a company's business happens at a given branch.

Yet the rise of software-defined WANs and branch offices, designed to scale back the expense and complexity of far-flung networks, has left some parts of the problem unsolved, according to SD-WAN startup Versa Networks.

For one thing, replacing branch appliances for each function with applications running on one system may raise software compatibility issues that are even more complicated than wiring up several boxes. Also, swapping out private WAN links for lower-priced internet service can open branches up to some new security threats.

To read this article in full or to leave a comment, please click here

Posted: May 10, 2017, 12:36 pm

Verizon this week said it would begin offering x86-based servers with OpenStack software aimed at customers looking to support all manner of advanced cloud, software defined networking and network functions virtualization-based enterprises.

+More on Network World: Extreme offers glimpse of integrated Avaya, Brocade technology future+

According to Verizon, letting customers use a combination of off the shelf hardware over a distributed deployment of OpenStack will let them decouple hardware from software and frees them from proprietary hardware. OpenStack is developed by some 150 companies from AT&T to IBM and Red Hat to Cisco, Dell EMC and others. The open software controls large pools of compute, storage, and networking resources throughout a data center, managed typically through a single dashboard.

To read this article in full or to leave a comment, please click here

Posted: May 9, 2017, 7:30 pm

WIRED

Review: Audeze iSine 20
With the right tunes and the right setting, it becomes clear that what Audeze has done here borders on miraculous. The post Review: Audeze iSine 20 appeared first on WIRED.
Author: Dan Starkey
Posted: May 29, 2017, 11:00 am
Why You Should Keep Funding Kickstarter Projects That Don’t Deliver
Despite being a gamble for the consumer, crowdfunding is the only way a small group of people can turn their idea into a sustainable company. The post Why You Should Keep Funding Kickstarter Projects That Don't Deliver appeared first on WIRED.
Author: Marc Barros
Posted: May 28, 2017, 11:00 am
Take a Load Off With These 6 Swanky Camping Hammocks
Looking for a free-floating, ultralight shelter on the go? We've got you. The post Take a Load Off With These 6 Swanky Camping Hammocks appeared first on WIRED.
Author: Chris Wright
Posted: May 27, 2017, 12:00 pm
Assistants, Please
Is there anything your phone can't do these days? The post Assistants, Please appeared first on WIRED.
Author: Wired Staff
Posted: May 26, 2017, 6:18 pm
Minutiae: The Curious App That Captures Your Unfiltered Life
Think of it like the anti-Instagram. The post Minutiae: The Curious App That Captures Your Unfiltered Life appeared first on WIRED.
Author: Liz Stinson
Posted: May 26, 2017, 11:00 am
Let’s All Ditch Our Cars and Start Riding Cargo Bikes
A human-powered cargo rig like Yuba's Supermarche shows how to make urban cycling work at scale. The post Let's All Ditch Our Cars and Start Riding Cargo Bikes appeared first on WIRED.
Author: Michael Calore
Posted: May 25, 2017, 12:00 pm
DJI’s New Palm-Sized Drone Responds To a Wave of Your Hand
DJI unveiled a new drone today, and isn't it just the cutest little thing? The post DJI's New Palm-Sized Drone Responds To a Wave of Your Hand appeared first on WIRED.
Author: Michael Calore
Posted: May 24, 2017, 4:25 pm
Review: Origin PC EON15-S Gaming Laptop
A solid gaming configuration, starting at just $999. The post Review: Origin PC EON15-S Gaming Laptop appeared first on WIRED.
Author: Christopher Null
Posted: May 24, 2017, 2:00 pm
Sphero’s New Cars Toy Is the Fanciest RC Car You Ever Did See
Take Lightning McQueen for a spin with this app-controlled toy. The post Sphero’s New Cars Toy Is the Fanciest RC Car You Ever Did See appeared first on WIRED.
Author: Paul Sarconi
Posted: May 24, 2017, 2:00 pm
Intel’s Plan to Thunderbolt 3 All of the Things
Two years after Intel embraced USB-C for Thunderbolt 3, it's taking another big step toward the mainstream. The post Intel's Plan to Thunderbolt 3 All of the Things appeared first on WIRED.
Author: Brian Barrett
Posted: May 24, 2017, 1:00 pm