You are here


Dyn, a major domain name system host that monitors and routes internet traffic, suffered a massive distributed denial of service (DDoS) attack Friday morning, as the New York Times reports.

The DDoS attack temporarily shut off access to Twitter, Netflix, Spotify, Box, Github, Airbnb, Reddit, Etsy, SoundCloud, The Times and other websites.

According to the Wall Street Journal, the attack started at around 7:10 a.m. Eastern time on Friday, and Dyn said its services were running again around 9:20 a.m. The company didn’t disclose the source of the attack, the Journal noted. 

Read More

Facebook doesn't want to just be for sharing photos and memes at the office — the social network now wants to be an enterprise collaboration tool. 

Earlier this week Facebook unveiled Workplace (formerly known as Facebook at Work), a chat and collaboration service that will cost $1 to $3 per month per user

Wired notes that "Facebook charges $3 a head for a business’s first thousand monthly active users, $2 each for 1,001 to 10,000 users, and just $1 each for over 10,000 users." Slack costs $6.67 or $12.50 per month per user for its paid plans. Facebook said Workplace will be free for non-profits and educational institutions.

Read More

Symantec and VMware unveiled a strategic partnership to unify endpoint management and broader threat security. As part of the announcement at VMware's Connect 2016 conference in Atlanta, Symantec joined the VMware Mobile Security Alliance, a group of digital security companies that work to mitigate mobile threats by providing advanced security solutions that are seamlessly integrated into the VMware AirWatch Enterprise Mobility Management Platform

Read More

Virtualized IT environments — and the tools used to manage them — can provide unmatched flexibility and scalability, but they can also require skills that SMB IT staffs sometimes lack, says Cliff Grossner of IHS Markit.

To help smooth the learning curve, companies should ask these questions:

  • How much automation is built into the platform; that is, how much can the user do by simply dragging and dropping on a user-friendly interface?
  • How much of our work can the user do by setting up simple policies?
  • What capabilities does the tool or platform have without requiring new code or scripts?

Finally, organizations need to devote the time and resources necessary to train their IT staffs for this new environment, Grossner advises. “Building the skill set in the team is critical to managing virtualized resources,” he says. “Humans need to modify their processes and skills to use technology well.”

Read More

Until recently, Trimont Real Estate Advisors operated its own data center onsite. With a new headquarters in the company’s future, Raquel Brown, managing director of IT and security, was on the hunt to find a new infrastructure solution. At the same time, she had to increase redundancy and ensure performance wouldn’t suffer. Ultimately, she decided to work with a colocation provider.

“Trimont is an international company, so the ability to easily expand our data center footprint internationally as needed was important,” Brown explains. “Moving our data center had various benefits, but redundancy, in all aspects — connectivity, power, as well as physical ­security — was at the top of our list.”

The company’s disaster recovery plan evolved at the same time, and the cloud played a big part of it, she says.

Read More

Google says that a recently disclosed vulnerability to Android devices, known as QuadRooter, is not as dangerous as first thought. According to Google, a feature built into the Android operating itself blocks 90 percent of the potentially exposed devices from the vulnerability. 

According to ZDNet, researchers at security firm Check Point disclosed "four previously undisclosed security vulnerabilities found in Android phones and tablets that ship with Qualcomm chips could let a hacker take full control of an affected device." The vulnerability was said to affect more than 900 million devices. 

Read More

Form factor: Enterprises can choose from several types of cellular routers, including an embedded interface that's located inside an enterprise-grade router, an external add-on to an existing router and various types of stand-alone USB routers. Deciding which type to use depends on the application.

Speed: Buying a 4G LTE-compatible cellular router doesn't guarantee high-speed data rates. In many rural areas, users must settle for 3G or even slower service. In many remote locations, such as across vast areas of Southwestern deserts and Northern forests, cellular data service is simply unavailable.

Wi-Fi compatibility: Router models are often designed to work with both cellular and Wi-Fi networks. Besides saving space and reducing network complexity, many of these devices provide automatic failover/failback capabilities to support business continuity in the event of a wired service failure.

Read More

  1. Pinpoint pressing business problems: Retailers must identify specific pain points that can benefit from a predictive analysis, such as sagging sales or soaring shipping costs. Next, they should determine the exact questions that need to be answered, such as, “How will lowering the price of a widget by $5 affect sales in regions A, B and C?” or “How will adding $1 to a widget's shipping price affect sales during the next holiday season?”

  2. Manage the data: As the number of data sources multiplies, so does the challenge of effective data management. Retailers can gain control over data resources by understanding the types of data being acquired, as well as its format, ownership, location, accessibility and value in achieving complete predictive insights.

    Read More