alphadogg writes: Google’s latest foray into open-source software is a cloud-based top-level-domain registrar platform called Nomulus, bringing a substantial chunk of the company’s gigantic internet infrastructure into the public eye. What Nomulus does, in essence, is manage the domain names under a top-level domain.
alphadogg writes: It wasn’t long ago that the big spectator sport in IaaS cloud computing was to watch a leading provider such as Microsoft or Amazon Web Services announce price cuts and then ready for its rivals to follow suit. The new game in town plays out in a similar way, except now the vendors are matching or one-upping each other with new data centers and cloud computing regions.
alphadogg writes: Wyoming’s 250-person Enterprise Technology Services group knew it had a good thing in its open-source Enterprise Extensible Code Library, but it chose to keep things under wraps outside of the state until last week when members of that team attended an annual confab for state government CIOs. The library of reusable code is designed to slash the time and cost it takes to build apps, and provide a platform for others to build upon, possibly resulting in a consolidated app dev system nationwide in the US.
alphadogg writes: The Annals of Improbable Research doles out its annual awards for unusual scientific research, including for studying the effects of wearing polyester, cotton or wool trousers on the sex life of rats, and, later, on humans.
alphadogg writes: U.S. Department of Homeland Security’s Robert Silvers says his purpose in speaking at the Security of Things Forum in Cambridge on Thursday wasn’t to scare anyone, but then he went ahead and called on everyone in the room to “accelerate everything you’re doing” to secure the internet of things. As the Assistant Secretary for Cyber Policy at DHS says, IoT security is a public safety issue that involves protecting both the nation’s physical and cyber infrastructures. More specifically, DHS is formulating a series of unifying principles – and best practices — relating to IoT security, including how to patch stuff that’s already in the field and not relying on an unsustainable physical recall process. Building security into the cloud will also be an option.
alphadogg writes: The FBI has issued a plea for those who have been hit by ransomware to report this to federal law enforcement so that the country can get a better sense of just how bad this problem really is. The FBI does not encourage people paying ransom, but encourages victims to reach out to their local FBI office and/or file a complaint with the Internet Crime Complaint Center regardless of whether they did pay.
alphadogg writes: Carnegie Mellon University is boasting that nearly half (48%) of incoming School of Computer Science undergraduates are women, a new diversity record for the institution. This echoes results at another top-notch computer science school, the University of Illinois Urbana-Champaign's College of Engineering, which says 46% of its 190 incoming freshmen CompSci students are women. That's up from 24% the year before. These and other schools say the results stem from stepping up STEM outreach to women in middle and high school.
alphadogg writes: Having seen all sorts of makeshift fixes – from post-it notes to bandages to condom wrappers – used to block wireless access point LEDs from beaming and sometimes blinking, some IT shops have begun turning off the lights altogether even though it can make their jobs a little tougher.
alphadogg writes: It’s become increasingly common over the past decade or so to see laws being passed to either mandate the use of open-source software or, at the very least, encourage people in government who make procurement decisions to do so. Here’s a map of the status of open-source laws around the world.
alphadogg writes: Cyber-reasoning platform Mayhem pulled down the $2 million first prize in a DARPA-sponsored Cyber Grand Challenge competition that pitted entrants against each other in the classic hacking game Capture the Flag, never before played by programs running on supercomputers. A team from Carnegie Mellon University spin-out All Secure entered Mayhem in the competition against six other programs played in front of thousands in the ballroom of the Paris hotel in Las Vegas. Most of the spectators were in town for the DEF CON hacker conference starting Friday at the same site.
alphadogg writes: Google Chief Education Evangelist called on universities this week at the Campus Technology 2016 conference in Boston to embrace cultural change to better synch their services with the needs of tech-savvy students. “I’ve been in education for 10 years and I remember talking to CIOs at universities saying technology is not a differentiator for their schoolsthat students don’t pick schools based on their technology,” Casap said. “I can tell you that’s starting to change.”
alphadogg writes: A first-of-its-kind gathering dedicated to re-inventing telco central offices as open source-infused data centers will take place on Friday at Google's Sunnyvale Tech Campus. The CORD Summit, hosted by the Open Networking Lab (On.Lab) and The Linux Foundation, promotes the use of technologies such as Network Functions Virtualization (NFV), software-defined networking (SDN) and the cloud "to bring datacenter economics and cloud agility to service providers' Central Office." Link to Original Source
alphadogg writes: The new documentary about Stuxnet, ‘Zero Days’, says the U.S. had a far larger cyber operation against Iran called Nitro Zeus that has compromised the country’s infrastructure and could be used as a weapon in any future war. Quoting unnamed sources from inside the NSA and CIA, the movie says the Nitro Zeus program has infiltrated the systems controlling communications, power grids, transportation and financial systems, and is still ready to “disrupt, degrade and destroy” that infrastructure if a war should break out with Iran. The movie, by academy award winning director Alex Gibney, opened in U.S. theaters this weekend.
alphadogg writes: Researchers are adding bugs to experimental software code in order to ultimately wind up with programs that have fewer vulnerabilities. The idea is to insert a known quantity of vulnerabilities into code, then see how many of them are discovered by bug-finding tools. By analyzing the reasons bugs escape detection, developers can create more effective bug-finders, according to researchers at New York University in collaboration with others from MIT’s Lincoln Laboratory and Northeastern University. http://www.ieee-security.org/T... They created large-scale automated vulnerability addition (LAVA), which is a low-cost technique that adds the vulnerabilities.
alphadogg writes: As the Wi-Fi Alliance starts certifying the latest gigabit-speed products to work together, users may not get as excited as they did for some earlier standards. On Wednesday, the industry group launched its certification program for IEEE 802.11ac Wave 2, a technology that’s been on the market for more than a year. Wave 2 can deliver up to 6.8Gbps (bits per second) and lets an access point talk to more than one device at a time. But due to issues like timing and wired backhaul, Wave 2 adoption has been relatively slow.