Tech News

NYC current conditions
clear sky
humidity: 44%
wind: 4m/s NW
H -1 • L -1
Weather from OpenWeatherMap

Use a Raspberry Pi to DIY a digital photo frame that streams photos from the cloud.

Posted: February 16, 2019, 6:00 pm

Happy official birthday to the Steam client for Linux

Posted: February 16, 2019, 2:00 pm

The BackBox Linux operating system promises to offer Amazon Web Services users an optimal environment for professional penetration testing operations

Posted: February 16, 2019, 7:00 am

The following guide shows you how to Flush the DNS Cache in Ubuntu 18.04

Posted: February 15, 2019, 11:00 pm

Opening folders in Ubuntu is one of the basic tasks you will perform as a regular Ubuntu user.

Posted: February 15, 2019, 10:00 pm

2DayGeek: Simple methods to change hostname in Linux.

Posted: February 15, 2019, 9:00 pm

ostechnix: This brief tutorial describes how to run particular commands without sudo password in Unix-like operating systems.

Posted: February 15, 2019, 8:00 pm

Knowing how much traffic your web server can handle when under stress is essential for planning future grow of your website or application.

Posted: February 15, 2019, 7:00 pm

Yum is the default package manager for RPM packages on RHEL & CentOS.

Posted: February 15, 2019, 6:00 pm

eWEEK - RSS Feed

eWeek - RSS Feed

Forward Networks' software platform enables network and applications teams to verify intent and predict network behavior, Forward’s solution brings the benefits of intent-based networking to large enterprises: agility, predictability, and scalability.
Posted: February 16, 2019, 5:57 am
Red Hat's new Integration suite brings together multiple tools and services to help developers with integration tasks.
Posted: February 15, 2019, 5:54 pm
Symantec is looking to reduce the risk of business email compromise attacks with a new offering that makes it easier to implement and manage Domain-based Message Authentication, Reporting and Conformance (DMARC) for email authenticity.
Posted: February 15, 2019, 4:06 pm
DAILY VIDEO: POTUS signs an order aimed at boosting AI in federal agencies, and Ericsson and Intel partner on a 5G platform.
Posted: February 15, 2019, 3:00 pm
eWEEK DATA POINTS: This human-aided AI, or “artificial artificial intelligence,” is fast becoming a competitive advantage for early adopters. In the coming years, these competitive advantages will transition into table stakes, and organizations who don’t adopt AI will be less efficient and less competitive.
Posted: February 15, 2019, 1:00 pm
Marketing and IT departments both stand to benefit from improvements in the latest version of the Adobe Experience Cloud. A core feature is its ability to help brands automatically deliver the right content to the right individual.
Posted: February 15, 2019, 11:01 am
The company’s offering includes microservices and container support and integrated Kubernetes to enable networks to quickly meet changing business demands.
Posted: February 15, 2019, 10:45 am
Squelch is a new-gen customer experience bot developer for online businesses that serves customers after the sale — from handling onboarding on day one through trouble tickets on day 1,001.
Posted: February 15, 2019, 1:39 am
NEWS ANALYSIS: The Amazon HQ2 situation has demonstrated that companies seeking to relocate into an area from elsewhere need more than assurance from state leadership. They also need to ensure that they have support from local authorities and community leaders.
Posted: February 15, 2019, 12:38 am
Artificial intelligence is becoming a standard feature of enterprise applications, but Cogitai said its new Continua platform advances the state-of-the-art by creating self-learning autonomous services capable of driving business outcomes.
Posted: February 14, 2019, 7:44 pm
eWEEK DATA POINTS: The RSA Conference 2019 is nearly here, and with it comes discussion of a number of core cyber-security topics, including DevSecOps, cloud, threat intelligence and identity.
Posted: February 14, 2019, 7:08 pm
Microsoft Azure continues to broaden its virtual machine offerings to give customers the power and features they require for all uses.
Posted: February 14, 2019, 7:03 pm
DAILY VIDEO: Clubhouse is breaking down barriers for developers and project teams, and Check Point is refining its security offerings to meet evolving demands.
Posted: February 14, 2019, 6:00 pm
PROCUREMENT NEWS: This project aims to satisfy the federal Office of Management & Budget’s (OMB) mandate to streamline the acquisition lifecycle by reducing the need for multiple concurrent procurements of similar nature.
Posted: February 14, 2019, 4:00 pm
NEW PRODUCT ANALYSIS: The IBM I platform (the second “I” stands for Integrated) is converged packaged software platform that evolved out of that legendary AS400, and it is even more amazing.
Posted: February 14, 2019, 1:48 am
The companies will combine technologies to create a platform to enable service providers to more quickly launch services around 5G, NFV and the cloud.
Posted: February 14, 2019, 1:28 am
eWEEK is creating a new series of articles which examine all sectors of IT and present up-to-date research and analysis on the leading companies in each space. It's all designed for enterprise buyers of hardware, software, services and cloud products to have more and better information in hand when the time comes to make an investment.
Posted: February 14, 2019, 12:46 am
DAILY VIDEO: Motorola rolls out next-gen Moto G7 smartphones, and researchers warn of a malicious container escape vulnerability.
Posted: February 13, 2019, 7:00 pm
New release of Palo Alto Network's core operating system platform adds multiple new features including a DNS security service and a Policy Optimizer capability.
Posted: February 13, 2019, 4:31 pm
Join Chris Preimesberger, Editor-in-Chief of e WEEK, and experts from Sophos, as they highlight the emerging cyberattack trends that will be prevalent throughout 2019 and beyond, as well as how companies can protect themselves.
Posted: February 13, 2019, 3:39 pm
PRODUCT ANALYSIS: In health care, where the workstations-on-wheels (WOWs) that clinicians use are thin-client terminals running Citrix VDI, some consistent issues have surfaced. Nyansa has come up with a new solution for these connectivity-based problems.
Posted: February 13, 2019, 3:39 pm
Deceiving attackers is one thing, but getting information from an attack that can help improve overall defences, is even better.
Posted: February 13, 2019, 3:12 pm
eWEEK DATA POINTS: From the C-suite to employees to customers, the comfort factor is increasing for artificial intelligence (AI). A recent research report from Genpact lends key insights into these trends, as well as recommendations to senior leaders about how to further encourage employees to embrace new initiatives which deploy this emerging technology.
Posted: February 13, 2019, 5:45 am
JOIN US: This is a chat-based conversation about how IT is rapidly evolving into a new phase that may turn out to be as important as, if not more important than, the cloud itself.
Posted: February 13, 2019, 1:00 am
TREND ANALYSIS: More elemental things—such as human emotion and social connectedness—play as big a role in determining the health and well-being of people as any lab diagnostic or surgical procedure.
Posted: February 13, 2019, 12:05 am
eWEEK DATA POINTS: The Linux Foundation's Cloud Native Computing Foundation (CNCF) is among the most active and successful, open-source organizations today. What are the key metrics and reasons behind the CNCF's growth?
Posted: February 12, 2019, 9:27 pm
NEWS ANALYSIS: Executive order promises access to government information, calls for investment and standards, but it is short on specifics and does not request funding.
Posted: February 12, 2019, 8:59 pm
Qualys is adding patch management capabilities to its Cloud Platform, providing organizations with an integrated capability to discover IT assets as well as manage and patch vulnerabilities.
Posted: February 12, 2019, 4:12 pm
DAILY VIDEO: Major airlines at risk from check-in system flaw, Wandera reports, and Dell EMC eyes the edge for open networking.
Posted: February 12, 2019, 3:00 pm
eWEEK DATA POINTS: Former Dell storage executive Laz Vekiarides of ClearSky Data offers readers key insight about the potential impact Dell’s newly public status could have on enterprise data storage and management.
Posted: February 12, 2019, 2:00 am

Network World Networking

Quantum computing is still in its infancy, but you wouldn’t know it judging from the investments pouring into the space.

To read this article in full, please click here

(Insider Story)
Posted: February 15, 2019, 10:28 pm

Edge computing container specialist Vapor IO has organized the Kinetic Edge Alliance, a group of hardware, software and networking companies that plan to collaborate on accelerating the integration edge solutions.

The list of partners includes Federated Wireless, Linode, MobiledgeX, Packet, StackPath, Alef Mobitech, Detecon International, Hitachi Vantara, New Continuum Data Centers, Pluribus Networks, and Seagate Technology.

The Alliance plans to target the top 30 U.S. metro markets with its products, which cover nearly 50 percent of the U.S. population. So far, Vapor IO has begun rollouts in Chicago but plans for five more cities this year: Chicago, Pittsburgh, Atlanta, Dallas, Los Angeles, and Seattle.

To read this article in full, please click here

Posted: February 14, 2019, 6:45 pm

If you’re a VPN subscriber and have ever wondered just how secure the supposedly encrypted pipe that you’re using through the internet is — and whether the anonymity promise made by the VPN provider is indeed protecting your privacy— well, your hunches may be correct. It turns out several of these connections are not secure.

Academics say they’ve discovered a whopping 13 programming errors in 61 separate VPN systems tested recently. The configuration bungles “allowed Internet traffic to travel outside the encrypted connection,” the researchers say.

The independent research group, made up of computer scientists from UC San Diego, UC Berkeley, University of Illinois at Chicago, and Spain’s Madrid Institute of Advanced Studies (IMDEA) with International Computer Science Institute, write in the Conversation this month, some of which is redistributed by Homeland Security Newswire, that six of 200 VPN services also scandalously monitored user traffic. That’s more serious than unintended leaks, the team explains — users trust providers not to snoop. The point of a VPN is to be private and not get monitored. VPN use ranges from companies protecting commercial secrets on public Wi-Fi to dissidents.

To read this article in full, please click here

Posted: February 13, 2019, 8:09 pm

It’s a common tactic to combine two technologies for synergy sake, but Lentiq really has a unique idea. It is combining the concept of the data lake with edge computing into what it calls “interconnected micro data lakes,” or data pools.

“Data pools” are micro-data lakes that function like a data lake while supporting popular apps such as Apache Spark, Apache Kafka, and Streamsets software, or “everything a data scientist or data engineer needs,” according to the company.

The data pools exist independently across different clouds, and governance rules are enforced only when the data moves, so each department will have the tools needed for their use cases and access to the data they need.

To read this article in full, please click here

Posted: February 13, 2019, 12:36 pm

With SD-WAN becoming remote users’ primary access to cloud-based applications, and with organizations deploying multi-cloud environments to optimize performance, it’s important for IT pros to choose SD-WAN technology that supports secure, low-latency and easy-to-manage connectivity to their cloud providers.

To read this article in full, please click here

(Insider Story)
Posted: February 12, 2019, 11:00 am

Cisco said it's closed its deal to buy optical-semiconductor firm Luxtera for $660 million, bringing it the advanced optical technology customers will need for speed and throughput for future data-center and webscale networks.

When Cisco announced the deal in December, Rob Salvagno, Cisco's vice president of Corporate Business Development, said, “As system port capacity increases from 100GbE to 400GbE and beyond, optics plays an increasingly important role in addressing network infrastructure constraints, particularly density and power requirements.”

To read this article in full, please click here

Posted: February 8, 2019, 11:00 pm

With all major mobile carriers expected to offer 5G this year, enterprises that want to take advantage of this next-gen mobile data service need to start thinking about how to support it on site.

To read this article in full, please click here

(Insider Story)
Posted: February 8, 2019, 11:00 am

SD-WAN products have been available for the better part of five years. Early adopters of the technology focused primarily on transport-related issues such as replacing or augmenting MPLS with broadband. As any technology matures and moves out of the early adopter phase, the buying criteria changes — and SD-WAN is no different.

In 2018, a ZK Research survey asked respondents to rank SD-WAN buying criteria, and security came out as the top response, well ahead of technology innovation and price. (Note: I am employee of ZK Research.) To better understand this trend and what it means to network professionals, I sat down with Fortinet’s executive vice president of products and solutions, John Maddison, who sets the company’s product strategy, making him well versed in both SD-WAN and security.

To read this article in full, please click here

Posted: February 8, 2019, 10:30 am

Today, connectivity to the Internet is easy; you simply get an Ethernet driver and hook up the TCP/IP protocol stack. Then dissimilar network types in remote locations can communicate with each other. However, before the introduction of the TCP/IP model, networks were manually connected but with the TCP/IP stack, the networks can connect themselves up, nice and easy. This eventually caused the Internet to explode, followed by the World Wide Web.

So far, TCP/IP has been a great success. It’s good at moving data and is both robust and scalable. It enables any node to talk to any other node by using a point-to-point communication channel with IP addresses as identifiers for the source and destination. Ideally, a network ships the data bits. You can either name the locations to ship the bits to or name the bits themselves. Today’s TCP/IP protocol architecture picked the first option. Let’s discuss the section option later in the article.

To read this article in full, please click here

Posted: February 7, 2019, 7:31 pm

Hyperconvergence is an IT framework that combines storage, computing and networking into a single system in an effort to reduce data center complexity and increase scalability. Hyperconverged platforms include a hypervisor for virtualized computing, software-defined storage, and virtualized networking, and they typically run on standard, off-the-shelf servers. Multiple nodes can be clustered together to create pools of shared compute and storage resources, designed for convenient consumption.

The use of commodity hardware, supported by a single vendor, yields an infrastructure that's designed to be more flexible and simpler to manage than traditional enterprise storage infrastructure. For IT leaders who are embarking on data center modernization projects, hyperconvergence can provide the agility of public cloud infrastructure without relinquishing control of hardware on their own premises.

To read this article in full, please click here

Posted: February 7, 2019, 7:11 pm

IPv6 has characteristics lacking in IPv4 that make it advantageous for internet of things deployments, such as supporting large IoT networks, helping preserve battery life of IoT devices and reducing administrative and maintenance burden.  Could IoT be helping to drive IPv6 adoption in enterprise networks?

To read this article in full, please click here

(Insider Story)
Posted: February 6, 2019, 11:00 am

Technology is always evolving. However, in recent time, two significant changes have emerged in the world of networking. Firstly, the networking is moving to software that can run on commodity off-the-shelf hardware. Secondly, we are witnessing the introduction and use of many open source technologies, removing the barrier of entry for new product innovation and rapid market access.

Networking is the last bastion within IT to adopt the open source. Consequently, this has badly hit the networking industry in terms of slow speed of innovation and high costs. Every other element of IT has seen radical technology and cost model changes over the past 10 years. However, IP networking has not changed much since the mid-’90s.

To read this article in full, please click here

Posted: February 5, 2019, 5:55 pm

Network capacity planning aims to ensure that sufficient bandwidth is provisioned, allowing network SLA targets, such as delay, jitter, loss, and availability, to be reliably met. It's a complex, error-prone task with serious financial implications. Until recently, the network data necessary for insightful capacity planning was generally only available via static, historical, after-the-fact reports. This situation is now rapidly changing.

To read this article in full, please click here

(Insider Story)
Posted: February 5, 2019, 11:00 am

As the number of cyber attacks increases, the demand for penetration tests – to determine the strength of a company’s defense – is also going up. People are worried about their companies’ networks and computer systems being hacked and data being stolen. Plus, many regulatory standards such PCI and HITRUST require these tests to be performed on at least an annual basis.

The demand for these tests is only going to increase as attackers get more sophisticated. And it’s essential these tests catch all possible vulnerabilities.

Benefits and gaps of penetration tests

Penetration tests involve live tests of computer networks, systems, or web applications to find potential vulnerabilities. The tester actually attempts to exploit the vulnerabilities and documents the details of the results to their client. They document how severe the vulnerabilities are and recommend the steps that should be taken in order to resolve them.

To read this article in full, please click here

Posted: February 1, 2019, 1:18 pm

Solutions are needed to replace the archaic air-gapping of computers used to isolate and protect sensitive defense information, the U.S. Government has decided.

Air-gapping is the common practice of physically isolating data-storing computers from other systems, computers and networks so they theoretically can’t be compromised because there is nothing connecting the machines.

However, many say air-gapping is no longer practical, as the cloud and internet take a hold of massive swaths of data and communications.

To read this article in full, please click here

Posted: January 31, 2019, 2:32 pm

Cisco has rolled out a new family of switches, software, developer tools and blueprints to meld IoT and industrial networking with intent-based networking and classic IT security, monitoring and application-development support.

To take on the daunting task the company unveiled a new family of industrial-networking Catalyst switches, IoT developer tools and support for Cisco’s DevNet developer program, and it validated IoT network design blueprints customers can work with to build solid IoT environments.  

To read this article in full, please click here

Posted: January 30, 2019, 5:50 pm

Cisco is significantly spreading its data-center technology to help customers grow and control hybrid, multicloud or hyperconverged edge environments.

In a series of announcements at its Cisco Live! customer gathering in Barcelona, the company sought to expand its data center-influence by extending its Application Centric Infrastructure (ACI) to the cloud, extending its hyperconverged HyperFlex offering to the edge and bolstering the management capabilities of its CloudCenter offering.

To read this article in full, please click here

Posted: January 29, 2019, 8:38 pm

A smartphone can be a key part of a network troubleshooting toolkit.

To read this article in full, please click here

(Insider Story)
Posted: January 29, 2019, 11:00 am

The Internet of Things (IoT) is no longer some futuristic thing that’s years off from being something IT leaders need to be concerned with. The IoT era has arrived. In fact, Gartner forecasts there will be 20.4 billion connected devices globally by 2020.

An alternative proof point is the fact that when I talk with people about their company's IoT plans, they don’t look at me like a deer in headlights as they did a few years ago. In fact, often the term “IoT” doesn’t even come up. Businesses are connecting more “things” to create new processes, improve efficiency, or improve customer service.

As they do, though, new security challenges arise. One of which is there's no “easy button.” IT professionals can’t just deploy some kind of black box and have everything be protected. Securing the IoT is a multi-faceted problem with many factors to consider, and it must be built into any IoT plan.

To read this article in full, please click here

Posted: January 28, 2019, 5:11 pm

Today, the wide area network (WAN) is a vital enterprise resource. Its uptime, often targeting availability of 99.999%, is essential to maintain the productivity of employees and partners and also for maintaining the business’s competitive edge.

Historically, enterprises had two options for WAN management models — do it yourself (DIY) and a managed network service (MNS). Under the DIY model, the IT networking and security teams build the WAN by integrating multiple components including MPLS service providers, internet service providers (ISPs), edge routers, WAN optimizers and firewalls.

The components are responsible for keeping that infrastructure current and optimized. They configure and adjust the network for changes, troubleshoot outages and ensure that the network is secure. Since this is not a trivial task, therefore many organizations have switched to an MNS. The enterprises outsource the buildout, configuration and on-going management often to a regional telco.

To read this article in full, please click here

Posted: January 28, 2019, 5:00 pm

Gear Latest

We found the best tech bargains for the long holiday weekend from Beats, Dyson, and more.
Author: WIRED Staff
Posted: February 16, 2019, 12:00 pm
Product designer Chris Messina snagged @chris as his Instagram name. It’s been awesome—and terrible. Plus: Amazon splits with NYC, on the Gadget Lab podcast.
Author: WIRED Staff
Posted: February 15, 2019, 8:24 pm
Learn how to make fantastic cold brew with our picks for the best cold-brew coffee makers, best cold-brew coffee grounds, and our advice.
Author: Jeffrey Van Camp
Posted: February 15, 2019, 1:00 pm
Sennheiser's high-end earbuds are completely wire-free, but they aren't completely hassle-free.
Author: Jeffrey Van Camp
Posted: February 14, 2019, 4:00 pm
Rollerblades, climbing shoes, and more—here’s our favorite gear for warding off the winter blues.
Author: Adrienne So
Posted: February 14, 2019, 12:00 pm
It's only a couple months old, but Sony's miniature PS Classic has dropped from $100 to just $50.
Author: Jeffrey Van Camp
Posted: February 13, 2019, 5:39 pm
Drag your finger on the in-app map and the mobile Route Builder translates your scrawl into an ideal path. The beta version debuts soon for Strava Summit users.
Author: Robbie Gonzalez
Posted: February 13, 2019, 12:00 pm
Tuesday's big event, in which Twitter CEO Jack Dorsey answered questions from journalist Kara Swisher, was peppered with typos that muddied the message.
Author: Emily Dreyfuss
Posted: February 13, 2019, 12:42 am
What are the consequences (and conveniences) of the tech giant acquiring the home router company?
Author: Lauren Goode
Posted: February 12, 2019, 1:25 am
These are our favorite baby monitors and cameras to help you keep an eye (or ear) on your kids at night. Wi-Fi, radio, long range, audio, and app-based monitors included.
Author: Adrienne So
Posted: February 11, 2019, 2:00 pm
Even with a few glitches, these cute wirefree, true wireless workout earbuds are still worth the price.
Author: Adrienne So
Posted: February 10, 2019, 1:00 pm
It's never been harder to buy the right Apple laptop. Let us help you with our MacBook buying guide.
Author: WIRED Staff
Posted: February 9, 2019, 1:00 pm
If you’re planning on giving someone a thoughtful present this Valentine’s Day, we’ve rounded up a score of great gift scores.
Author: WIRED Staff
Posted: February 9, 2019, 12:00 pm
One of our favorite laptops for portable playtime now offers improved graphics performance and battery life.
Author: Christopher Null
Posted: February 8, 2019, 2:00 pm
Bigger power cells and more-efficient components are helping smartphone manufacturers give consumers what they really want: phones that don't require frequent charging.
Author: Lauren Goode
Posted: February 7, 2019, 1:00 pm
You may not recognize the name, but you'll be instantly impressed with this multicooker's capabilities.
Author: Joe Ray
Posted: February 7, 2019, 1:00 pm
With messaging apps and Stories, Facebook’s emphasis on mobile features also highlights some of the company’s greatest vulnerabilities as it looks ahead.
Author: Lauren Goode
Posted: February 6, 2019, 12:00 pm
Very few chat apps offer the unsend feature. As it turns out, that’s for a few very good, or at least understandable, reasons.
Author: Brian Barrett
Posted: February 6, 2019, 12:15 am
Smart thermostats, light bulbs, and leak sensors are just a few of the many ways to cut down your electric bill and raise the energy efficiency of your house.
Author: Adrienne So
Posted: February 5, 2019, 1:00 pm
Two dog owners review three dog DNA tests. The results offered some surprises, some welcome relief… and some fart research.
Author: Sarah Fallon
Posted: February 5, 2019, 12:00 pm