GIXnews

OECD Rank UK 8th for Fixed Broadband Penetration as Fibre Optic Grows

By Mark Jackson, ISPreview UK | July 23rd, 2014 The Organisation for Economic Co-operation and Development, which covers 34 countries that support democracy and a market economy, has reported that at the end of 2013 the United Kingdom ranked 8th for fixed line broadband penetration (i.e. 35.2 subscribers per 100 inhabitants). Fibre optic (FTTH/P/B) connections …

OECD Rank UK 8th for Fixed Broadband Penetration as Fibre Optic Grows Read More »

Comcast Reaches Key Milestone In Launch Of IPv6 Broadband Network

By John Brzozowski, Comcast | July 22nd, 2014 On the heels of the second anniversary of World IPv6 Launch, Comcast – already recognized as the world’s largest native broadband IPv6 deployment – is pleased to announce that 100 percent of Comcast’s broadband network has been fully deployed to support IPv6 dual stack connectivity. In addition, …

Comcast Reaches Key Milestone In Launch Of IPv6 Broadband Network Read More »

Apple “inadvertently admitted” to iOS backdoor: forensics expert

By John Cox, Network World | July 22nd, 2014 Apple has “inadvertently admitted” to creating a “backdoor” in iOS, according to a post by a forensics scientist, iOS author and ex-hacker. Apple has “inadvertently admitted” to creating a “backdoor” in iOS, according to a new post by a forensics scientist, iOS author and former hacker, …

Apple “inadvertently admitted” to iOS backdoor: forensics expert Read More »

Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices

By Jonathan Zdziarski, zdziarski.com | July 20th, 2014 The presentation contains: overview of a number of undocumented high-value forensic services running on every iOS device examples of forensic artifacts acquired that should never come off the device without user consent surveillance mechanisms to bypass personal security (intended for enterprises), but make potential targets suspicious design …

Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices Read More »

Tor Project working to fix weakness that can unmask users

By Lucian Constantin, Techworld | July 22nd, 2014 The anonymity software’s developers believe they’ve identified the problem. Developers of Tor software believe they’ve identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users. The Black Hat organizers recently announced that …

Tor Project working to fix weakness that can unmask users Read More »

Small cell device tech set to connect workplace Wi-Fi with 3G and LTE

By Matt Hamblen, Computerworld | July 22nd, 2014 Cisco sees its effort to bring small cell devices to businesses leading to explosive growth of the technology. Small cell technology products today are used to fill in gaps where traditional cellular has problems working — such as between downtown buildings that aren’t reached by traditional cell …

Small cell device tech set to connect workplace Wi-Fi with 3G and LTE Read More »

IEEE forms 25G Ethernet study group

By Jim Duffy, Network World | July 22nd, 2014 The standards organization has formed an 802.3 25G Ethernet study group to consider market opportunities and requirements. On the heels of the formation of a vendor consortium to promote the need, the IEEE this week said it will explore standardization of 25Gbps Ethernet. The standards organization …

IEEE forms 25G Ethernet study group Read More »

Hackers inside Chinese military steal U.S. corporate trade secrets

By David Geer, CSO | July 22nd, 2014 In May, a grand jury in the Western District of Pennsylvania indicted five members of the Chinese military on charges of hacking and economic espionage, according to a May 19 U.S. Department of Justice media release. Per the same release, the targets were six U.S. enterprises operating …

Hackers inside Chinese military steal U.S. corporate trade secrets Read More »

UK ISP Adult Internet Website Blocking Report Finds Limited Take-up

By Mark Jackson, ISPreview UK | July 22nd, 2014 Ofcom has today published a new report that looks at the measures adopted by four of the largest broadband ISPs (BT, Virgin Media, TalkTalk and Sky Broadband) to help parents “protect children from harmful content online” by offering network-level filtering (censorship) systems to block adult sites. …

UK ISP Adult Internet Website Blocking Report Finds Limited Take-up Read More »

Listo! Medellin, Colombia: CloudFlare’s 28th Data Center

“What’s that? CloudFlare’s 28th data center is in Medellin, Colombia!?” With the World Cup at an end, so too is our latest round of data center expansion. Following deployments in Madrid, Milan and São Paulo, we are thrilled to announce our 28th data center in Medellin, Colombia. Most of Colombia’s 22 million Internet users are …

Listo! Medellin, Colombia: CloudFlare’s 28th Data Center Read More »

Listo! Medellin, Colombia: CloudFlare’s 28th Data Center

“What’s that? CloudFlare’s 28th data center is in Medellin, Colombia!?” With the World Cup at an end, so too is our latest round of data center expansion. Following deployments in Madrid, Milan and São Paulo, we are thrilled to announce our 28th data center in Medellin, Colombia. Most of Colombia’s 22 million Internet users are …

Listo! Medellin, Colombia: CloudFlare’s 28th Data Center Read More »

Big Switch aims to control the cloud with SDN product

By Jim Duffy, Network World | July 22nd, 2014 Big Switch Networks this week is unveiling an SDN controller designed to bring Google-like hyperscale networking to enterprises. Big Switch Networks this week is unveiling an SDN controller designed to bring Google-like hyperscale networking to enterprises. The software, called Cloud Fabric, runs on bare metal switches …

Big Switch aims to control the cloud with SDN product Read More »

Google Docs: 3 incredibly useful tools for edits and revisions

By Alex Campbell, PC World | July 22nd, 2014 Check out the collaboration-friendly tools built into Google Docs, and learn how to set some handy preferences. Google’s cloud productivity suite, whatever you want to call it, has been making inroads in the world of work and collaboration. And it’s not just because there’s no software …

Google Docs: 3 incredibly useful tools for edits and revisions Read More »

How the Internet of Things could become a critical part of disaster response

By Phil Johnson, ITworld | July 22, 2014 Researchers have concluded that those billions of connected devices could help save lives in the event of disaster, even one that knocks out the Internet. The huge network of connected devices could be used to aid communications among first responders after a disaster. Image credit: REUTERS/China Daily. …

How the Internet of Things could become a critical part of disaster response Read More »

A guide to the confusing Internet of Things standards world

By Colin Neagle, Network World | July 21st, 2014 Google’s Thread standard for communication between devices connected to the Internet of Things joins several similar efforts. Google recently announced a new networking protocol called Thread that aims to create a standard for communication between connected household devices. If that description sounds familiar, that’s because it …

A guide to the confusing Internet of Things standards world Read More »