IBM intros new generation of IBM Power servers

IBM intros new generation of IBM Power servers

IBM is keeping the faith for Unix just like it is for mainframes. It has announced a new Unix-based server, the IBM Power E1080, the first in a family that is based on the POWER10 processor. IBM announced the POWER10 processor last year. Designed on a 7nm process, it is expected to deliver up to a three-fold improvement in capacity and processor energy efficiency within the same power envelope as IBM POWER9. It features a…

Read More

Simplified Insertion of Cisco Secure Firewall with AWS Route Table Enhancement – Cisco Blogs

Simplified Insertion of Cisco Secure Firewall with AWS Route Table Enhancement – Cisco Blogs

Cisco Secure Firewall provides industry-leading firewall capabilities for Amazon Virtual Private Cloud (VPC)and resources deployed inside. Customers use these firewalls to protect north-south and east-west traffic. Typically, we provide north-south traffic inspection in AWS infrastructure by deploying a load balancer and adding firewalls behind it. Another approach uses Amazon VPC Ingress Routing to steer traffic to Cisco Secure Firewalls. Since the AWS VPC Ingress Routing feature launched, we’ve waited for a similar feature for east-west…

Read More

Machine learning is a great tool for cybersecurity, but be cautious, expert says

Machine learning is a great tool for cybersecurity, but be cautious, expert says

Supervised and unsupervised machine learning are good ways to detect threats. But what’s the difference? TechRepublic’s Karen Roby spoke with Chris Ford, VP of product for Threat Stack, about supervised and unsupervised machine learning. The following is an edited transcript of their conversation. SEE: Hiring Kit: Video Game Programmer (TechRepublic Premium) More about artificial intelligence Christopher Ford: Supervised and unsupervised learning are techniques that help to facilitate different use cases within the sphere of machine…

Read More

Sleeping and waiting on Linux

Sleeping and waiting on Linux

The Linux sleep and wait commands allow you to run commands at a chosen pace or capture and display the exit status of a task after waiting for it to finish. Sleep simply inserts a timed pause between commands. Wait, on the other hand, waits until a process completes before notifying you that it has finished. Sleep The sleep command pauses for a specified time. It’s generally used in a script, but works on the…

Read More

Dark web prices drop for credit cards but soar for PayPal accounts

Dark web prices drop for credit cards but soar for PayPal accounts

Selling prices for stolen PayPal accounts have shot up by 194%, according to research by Comparitech. Image: Getty Images/iStockphoto The dark web acts as a virtual marketplace for a variety of ill-gotten or illegal items, including drugs, guns, phony documents, counterfeit currency, malware kits, and, of course, personal information. A hacker who obtains sensitive user data is likely to try to hawk it on the dark web. But as with any marketplace, prices vary depending…

Read More

Stay on top of your online security with our Protection Score

Stay on top of your online security with our Protection Score

How protected am I online?  Customers often ask us some version of this question. It’s a good question and in the past, there was no direct answer – only recommendations. For instance, we recommend online protection that goes beyond antivirus to include identity and privacy protection, as well as promoting safety best practices like using multi-factor authentication. We wondered if there was a simpler and easier way to advise customers how to better protect themselves.  A recent survey shows how important online security has become to consumers. We found that 74% of you have concerns about keeping your information private online.  57% want to be…

Read More

AWS, NetApp team up for a cloud-native file system

AWS, NetApp team up for a cloud-native file system

Amazon Web Services and NetApp have teamed up to tie NetApp’s on-prem storage and its proprietary OS for storage-disk arrays to AWS’s managed file-storage service, FSx. Called Amazon FSx for NetApp ONTAP, the service provides things like capacity scaling, maintenance, and updates so on-prem staff doesn’t have to. Performance management with automatic tiering between local storage and fully elastic AWS storage is provided by AWS as well. This is not a new area for AWS,…

Read More

Data Breach Lawsuit Against Sonic Will Proceed

Data Breach Lawsuit Against Sonic Will Proceed

Litigation filed against American fast-food chain Sonic over a 2017 data breach has been allowed to proceed. Financial institutions brought a lawsuit against Sonic Corp after it emerged that financial data belonging to customers of the restaurant had been stolen in a cyber-attack. The attacker(s) installed malware on a point-of-sale system used at hundreds of Sonic franchises. In a data breach notice issued at the time of the attack, Sonic stated: “Sonic Drive-In has discovered that credit and debit card numbers may have…

Read More

UCS X-Series: Unbox the future today – Cisco Blogs

UCS X-Series: Unbox the future today – Cisco Blogs

Cisco announced the UCS X-Series back in June which garnered a lot of press. But I know how hard it is to keep up with industry news, so I thought a blog series was a good way to familiarize / refamiliarize you with our next gen modular system. Why UCS X-Series? Our strategy has always been to focus on inflection points in the industry and to understand what is coming next. To remove complexity, making…

Read More
1 3,517 3,518 3,519 3,520 3,521 3,964