Articles about Vendor

Tripping over

Symantec carpeted over dodgy certificates, again

Symantec has confirmed that it's revoked another bunch of wrongly-issued certificates. Andrew Ayer of certificate vendor and wrangler SSLMate went public with his discovery last week. The mis-issued certs were issued for example.com, and a bunch of variations of test.com (test1.com, test2.com and so on). On Saturday, Symantec …
Bug

Windows 10 networking bug derails Microsoft's own IPv6 rollout

A bug in Windows 10 is undermining Microsoft's efforts to roll out an IPv6-only network at its Seattle headquarters. According to Redmond's principal network engineer Marcus Keane, the software giant is struggling to move over to the decade-old networking technology due to a DHCPv6 bug in Windows 10, which made it "impossible …
Kieren McCarthy, 19 Jan 2017
Lost box, photo via Shutterstock

Cumulus Networks writes its name on a white box

Open networking operating system vendor Cumulus Networks is about to start selling hardware – but it's not going to start actually making the stuff. Rather, the maker of the Cumulus Linux distribution has decided to give new users an easy entry-level purchase by installing and configuring its operating system on bare-metal …
Stormtrooper heart photo via shutterstock

Seduced by the Docker side: Microsoft's support could be first shot fired in the Container Wars

Docker was arguably a dumb thing for you to do with your time last year. Developers loved it but enterprises weren’t so sure. That was then, but now Microsoft – mighty in enterprise tech and filled with deep and abiding love for open source – is perhaps Docker's best friend. Not only is Microsoft getting behind Docker-style …
Matt Asay, 19 Jan 2017

Can all-flash arrays, spinning disks and hybrid really live together?

Conventional wisdom says that for performance-sensitive applications, you want all-flash arrays (AFAs), while for less-critical applications and bulk storage, disk is better. How can you use them in conjunction with each other? What would a joint AFA/hybrid/disk environment look like? Broadly speaking, there are two types of …
Danny Bradbury, 19 Jan 2017
zombie_648

Linux is part of the IoT security problem, dev tells Linux conference

The Mirai botnet? Just the “tip of the iceberg” is how security bods at this week's linux.conf.au see the Internet of Things. Presenting to the Security and Privacy miniconf at linux.conf.au, embedded systems developer and consultant Christopher Biggs pointed out that Mirai's focus on building a big DDoS cannon drew attention …
Image by ALESYA LS https://www.shutterstock.com/gallery-168750824p1.html

Chrome dev explains how modern browsers make secure UI just about impossible

Google Chrome engineer Eric Lawrence has described the battle of browser barons against the 'line of death', an ever-diminishing demarcation between trusted content and the no-man's land where phishers dangle their poison. The line, Lawrence (@ericlaw) says, is a conceptual barrier between content that browser developers …
Darren Pauli, 19 Jan 2017

Inspur inspires DDN to be its HPC reseller

DDN has signed a deal for Inspur to sell tested and configured systems to worldwide HPC customers, using DDN storage alongside Inspur servers, networking, software and services. Inspur is the third of three main Chinese server and systems suppliers, the others being Huawei and Lenovo. It quotes Gartner stats to say it was the …
Chris Mellor, 18 Jan 2017
Space_Shuttle_launch

Hyperconvergered-ception: HPE swallows SimpliVity

Analysis SimpliVity, the second-placed hyperconverged infrastructure appliance startup, has been bought by HPE for $650m, setting the stage for mainstream vendor dominance of the hyperconverged market. HPE now has its own proprietary software stack plus a 3PAR-style hardware-accelerated product line that will fit nicely above its …
Chris Mellor, 18 Jan 2017

Did somebody say object storage? 9 ways to tell if there's a point

Comment Object storage is a relatively new market segment that has continued to grow steadily and is starting to find more reasons for adoption. For the uninitiated, object stores are used to hold large volumes of unstructured data, where each "object" is essentially a file with no specific format (also called a binary file). Object …
Chris Evans, 18 Jan 2017
AI

Sysadmin chatbots: We have the technology

Storage Blockhead Chatbots are flashing up in our future view as something that could improve an admin's lot. Instead of using a GUI with nested and drill-down screen forms to do their job, they'll have a new form of Command Line Interface, only this will be a Chat Line Interface to a chatbot. Array vendor Tintri is showing how this could be …
Chris Mellor, 16 Jan 2017
Cloud desktop

Cloud hardware spend hits US$8.4bn/quarter, as traditional kit sinks

Abacus-shuffling outfit IDC has updated its Worldwide Quarterly Cloud IT Infrastructure Tracker with sales data for Q3 2016 and predictions for spend in 2017. In 2016's third quarter the firm says “vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and …
Simon Sharwood, 16 Jan 2017

Google floats prototype Key Transparency to tackle secure swap woes

Google has released an open-source technology dubbed Key Transparency, which is designed to offer an interoperable directory of public encryption keys. Key Transparency offers a generic, secure way to discover public keys. The technology is built to scale up to internet size while providing a way to establish secure …
John Leyden, 13 Jan 2017
Container-ship

Do containers stack up as data storage building blocks?

Storage Architect There’s an almost religious divide between those who see containers as entirely stateless objects and others taking a more pragmatic approach that says state and containers is an inevitable thing. In the stateless model, data is assumed to be replicated and protected by many container instances, so the loss of any individual …
Chris Evans, 13 Jan 2017

iPhone hacking biz Cellebrite hacked

The Israeli company that found fame when it was fingered as a potential source of hacking software used by the FBI to crack open an iPhone has itself been hacked. In a statement on its website, Cellebrite today admitted that an "external web server" containing the company's license management system had been accessed by an …
Kieren McCarthy, 12 Jan 2017
The Japanese pulsar-snooping balloon

A deduping backup target startup going public – who'd a thought it?

Exagrid, whch produces deduping disk backup target arrays, announced record revenue for the fourth 2016 quarter; its 12th,consecutive cash-positive quarter. It grew double digits over the previous quarter and same quarter of the prior year as well as for the full year of 2016 over 2015. The company wants to increase the …
Chris Mellor, 12 Jan 2017

Brexit contributes to backup appliance sales fall

EMEA geography purpose-built backup appliance sales shrank 9 per cent annually in the third 2016 quarter, through there were pockets of growth. IDC's Worldwide Quarterly Purpose-Built Backup Appliance Tracker reveals that capacty shipped grew 23 per cent to 237PB over the same period. The report says vendor revenue in Western …
Chris Mellor, 12 Jan 2017
Panasonic Toughbook CF-54

Oh ALIS, don't keep us waiting: F-35 jet's software 'delayed'

Key software for the troubled F-35 fighter jet has been repeatedly delayed, causing problems for the British armed forces as they wait for Americans to iron out the bugs. The F-35’s Autonomic Logistics Information System (ALIS) is the heart of the support offering bundled with the F-35 by its manufacturer, Lockheed Martin. …
Gareth Corfield, 12 Jan 2017
Silhouette of spy discerning password from code uses a command on graphic user interface

Digital video recorder installers master password list 'leaked' – claims

Xiongmai, the vendor behind many Mirai-vulnerable DVRs, has earned the consternation of security watchers once again. The vendor's 2017 list of superuser passwords for certain DVRs – designed only for CCTV installers to access customer installations – appears to have leaked online. "If the creds are what we think they are, …
John Leyden, 11 Jan 2017

SCC veterans set to leave the building after two decades

Nigh on 20-year SCC veteran Andy Wright is hanging up his company overalls to take a commercial director role and board seat at reseller XMA, sister company to distributor Westcoast. SCC CEO James Rigby confirmed to El Reg that Wright, who was also his firm’s commercial director, will leave at the beginning of March. “He’s …
Paul Kunert, 11 Jan 2017
Grain silos by Scott Davis

How do file store-and-share firms avoid that sinking syncing feeling?

Interview With the demise of Bitcasa, EMC selling off Syncplicity, and so forth, the enterprise file sync and share market might appear moribund. What’s happened is a trend of consolidation plus an addition of functionality for other content functions. EFSS on its own is no longer viable. That’s the underlying message we received from …
Chris Mellor, 11 Jan 2017

Anti-smut law dubs PCs, phones 'pornographic vendor machines', demands internet filters

Over to North Dakota, US, now and a new front in the war against cyber-smut has opened up. A proposed law will force porno-blocking filters onto computers and smartphones sold in the conservative state – with a charge to remove the censorship. Bill 1185 [PDF] will require laptops, cellphones and other internet-capable devices …
Iain Thomson, 11 Jan 2017
Rock climbing, image via Shutterstock

Talena wants to be distributed database data management rock

Analysis Talena was founded in 2013 to develop data management software for Big Data and non-relational database applications. Its data management software provides backup, recovery, test data management and archiving capabilities for Cassandra, Couchbase, Hadoop, and Vertica. The company claims its software integrates machine learning …
Chris Mellor, 10 Jan 2017
Valerie

What happens in Vegas doesn't stay in Vegas: Razer prototypes nicked

CES 2017 The head of gaming PC company Razer says someone stole a pair of prototype devices from its booth at the CES conference. Min-Liang Tan did not say what precisely was stolen from the booth, where Razer had been showcasing both its new hardware and concept offerings, but he suggested the heist could be the work of a rival vendor …
Shaun Nichols, 09 Jan 2017
Armitage_Siren

Tintri, thrown on the El Reg grill: We'll support NVMe! We promise!

Interview El Reg has been quizzing array vendor after array vendor on their views about the technology change from SAS/SATA to NVMe flash drives and to NVMe over Fabrics array access. Today it's the turn of Tintri, and it thinks NVMe is an important technology watershed, but not as huge as the change from disk to solid state storage – the …
Chris Mellor, 09 Jan 2017

Splunk: Why we dumped Perforce for Atlassian's Bitbucket of Gits

Analysis Kurt Chase, director of engineering services at Splunk, is effusive about Atlassian's Git-based Bitbucket but doesn't have a lot of nice things to say about jilted source control system Perforce. As it turns out, Perforce has a rather jaundiced view of Git as a way to manage software. But more on that later. Two years ago, …
Thomas Claburn, 06 Jan 2017

D-Link sucks so much at Internet of Suckage security – US watchdog

America's trade watchdog is suing D-Link, alleging the router and camera vendor failed to implement basic security protections in its gear. The FTC said that its complaint was based on D-Link's failure to take "reasonable steps" to secure its products, putting the privacy of citizens everywhere at risk as a result. "Hackers …
Shaun Nichols, 06 Jan 2017
Image by GTS http://www.shutterstock.com/gallery-519838p1.html

Netgear unveils world's easiest bug bounty

Netgear has broken ranks from the consumer router security shame factory to offer a bug bounty sporting extra rewards for chained exploits. Hoping to shake the SOHOpeless tag, the vendor will hand out up to US$15,000 for hackers reporting global remote unauthorised access from the internet to Netgear devices, and unauthorised …
Darren Pauli, 06 Jan 2017
Some of the Super Pressure Balloon. M. McCarthy, submitted to the ABC

2016 – the year 3D XPoint came down to earth from Planet Hype

Storage Review in 2016 Storage in 2016 saw its on-premises SAN/filer array heartland assaulted by the public cloud on the one hand, and hyper-converged and software-defined storage on the other. The now-classic dual-controller disk array went hybrid to keep storing primary data, but all-flash arrays are taking on that role and so the hybrids went …
Chris Mellor, 05 Jan 2017

Dotdot. Who's there? Yet another IoT app layer

Internet of Things bods at the Zigbee Alliance have unveiled what they are calling a “universal language” for IoT, dotdot. A rebrand and potential expansion of the group's existing application layer, Zigbee Cluster Library (ZCL), dotdot is now being touted by the alliance as the one true solution for getting different IoT …
Gareth Corfield, 04 Jan 2017
Hello Barbie

Mattel's parenting takeover continues with Alexa-like dystopia

Today in “what could possibly go wrong?”, the company that gave the world the infamous “Hello Barbie” now wants its Amazon Alexa look-alike in kids' bedrooms. To wild applause from consumer gadget media, Mattel is pitching its Aristotle (with a female voice because that's how Greek philosophers roll these days) as a virtual …

Busted Oracle finance cloud leaves Rutgers Uni unable to foot bills

Rutgers University is struggling to pay its bills on time amid a prolonged outage of its Oracle-powered management systems. It is claimed this IT failure led to power outages within its campus after supplies were cut off due to non-payment. The hedgerow-league college, in New Jersey, US, has publicly admitted its Cornerstone …
Shaun Nichols, 03 Jan 2017
android_toys_648

Android tops 2016 vuln list, with 523 bugs

Of any single product, CVE Details reckons, Android had the most reported vulnerabilities in 2016 – but as a vendor, Adobe still tops the list. The analysis is limited by the fact that only vulnerabilities passing through Mitre's Common Vulnerabilities and Exposures (CVE) database are counted. That's a statistically worthwhile …

Russian 'grid attack' turns out to be a damp squib

Updated Russian hackers have not penetrated America's electricity grid, in spite of an end-of-year media flurry saying they did. The story was triggered because an anonymous source told the Washington Post miscreants had infiltrated the grid, when in fact – as the story was later amended to read – one Burlington Electric Department …
13 inch telescope Spaceguard Center, photo: Spaceguard Center

HPE bucks trend to retain high-end server crown

IDC bean-counters saw strong high-end server revenue growth in the third quarter high-performance technical computing market but revenue falls in low-end sysyems. HPC server sales growth contrasts with the decline in the overall world-wide server market, which IDC says shrank by 7 per cent to $12.5 Bn in the year since the …
Chris Mellor, 30 Dec 2016
Robot hand human skull photo via Shutterstock

2016: The Rise of the Intelligent (cloud) Machines

Review of 2016 Blame Mark Zuckerberg. Not for the election of Donald Trump as US president, but for Artificial Intelligence becoming the trend du jour in enterprise tech circles in 2016. Back in those now forgotten days of January, before The Great Inversion of 2016, Zuckerberg was surely kicking his heels when he set himself that “personal …
Gavin Clarke, 25 Dec 2016

US healthcare under siege: Got good insurance?

US healthcare organisations, including hospitals, are increasingly vulnerable to medical device hijacks as well as the growing ransomware threat, according to a new study by security vendor TrapX. A total of 93 major attacks occurred during 2016. Hackers were responsible for almost a third (31.42 per cent) of all major HIPAA ( …
John Leyden, 23 Dec 2016
Google bikes outside Google HQ. Photo by Randy Miramontez/Shutterstock - for editorial use only.

'Twas Brillo but then Android Things, which watched as Google Weaved its Nest

Comment Google has launched the developer preview of Android Things, updating and rebranding the Brillo IoT operating system which was unveiled over a year ago. Designed for medium-complexity devices, like home hubs, thermostats, and security cameras, the stripped-down version of Android has had zero success in the market. The new …
Wireless Watch, 22 Dec 2016
shutterstock_annoyed_man_on_phone

Radical 5G rules proposed, but UK can address woeful coverage right now

Analysis The UK’s National Infrastructure Commission (NIC) has blasted the level of coverage achieved with 4G and urged early action to deploy 5G more effectively. The organisation’s report particularly highlighted the role small cells will play in providing good services in urban areas, and on roads and railways, where the NIC says …
Wireless Watch, 21 Dec 2016
Man in suit counts out piles of dollars. Photo via Shutterstock

WANdisco scores $1m self-driving car deal under back-from-the-dead CEO

Replication vendor WANDisco has won a million-dollar deal with a car manufacturer, vindicating CEO Dave Richard’s reinstatement. Earlier this year Richards was ousted as CEO in a coup orchestrated by ex-WANdisco chairman Paul Walker. Walker was then ousted himself seven days later, in a fightback by leading investors and Dave …
Chris Mellor, 21 Dec 2016
Insurance guys photo via Shutterstock

Sayonara North America: Insurance guy got your back when Office 365 doesn't?

Move to the cloud, they said, everything will be better, they said. Security, reliability, scale. We take the work and the worry off your hands. Except nothing is that simple or straight forward – and that includes cloud. When your IT ran the tin and it crashed, they weren’t running your entire business. If a server flamed out …
Danny Bradbury, 21 Dec 2016
man crying, image via Shutterstock

Back up a minute. So you're saying they're buying fewer appliances?

Glory days... not really. IDC sees the purpose-built backup appliance (PBBA) market shrinking in the third 2016 quarter, by almost 8 per cent on an annual basis, to $737.5mn. This is the market dominated by Dell EMC’s Data Domain products. And it seems to be affected, like storage arrays, by an enterprise buying slowdown. The …
Chris Mellor, 20 Dec 2016
A person holding a radio

Houston, we have a problem: 'App dev stole our radio station'

A Texas radio station claims the software developer hired to build its mobile app has "gone rogue" – and is attempting to take control of the station. KCOH, a talk radio station in Houston, has filed a lawsuit [PDF] in the Harris County Court seeking a restraining order against Johnny Taylor and his company, Mobile Encryption …
Shaun Nichols, 16 Dec 2016
LG Roboking Turbo+Homeview

Could a robot vacuum cleaner monitor your data centre?

Can you monitor a data centre with a vacuum cleaner? The Register decided that question had to be answered after learning about LG's Roboking Turbo+Homeview (model VR66803VMNP), a robot vacuum cleaner packing a webcam and WiFi so the images the camera captures can be viewed from afar. Robot vacuums now are well-known product …
Simon Sharwood, 16 Dec 2016

What’s next after hyperconvergence?

So, you’ve had a crack at hyperconverged architecture. You’ve bought your cloud-in-a-box solution from Nutanix, VMware or whomever and tried it out on a pilot project - something manageable and discrete that didn’t interfere with the rest of your architecture too much. And now that you’ve dipped your toe in the water, you’d like …
Danny Bradbury, 15 Dec 2016

It's a ratchet: Old storage guard face incoming tech squeeze

Analysis Squeezed between the giant pressures of hyper-convergence, the public cloud, object storage and software-defined/cheap commodity hardware, the old guard storage suppliers face shrinkage into shadows of their former dominant selves. Ten years ago and before that Dell, EMC, HDS, HPE, IBM and NetApp represented the bulk of on- …
Chris Mellor, 13 Dec 2016
Google bikes outside Google HQ. Photo by Randy Miramontez/Shutterstock - for editorial use only.

Look out, Brussels: Google's moving the goalposts, barks price comparison rival

Google’s leading European competition critics say its search results are a “significant leak in its money-making machines,” drawing regulators attentions to the ad giant’s conflicts of interests. The FairSearch founders, Adam and Shivaun Raff, accuse Google of moving the goalposts in the battle over price comparison engines, …
Andrew Orlowski, 12 Dec 2016
The Incredible Shrinking Man

Shrinkage!? But it's sooo big! More data won't leave storage biz proud

Analysis The enterprise storage market is in a period of data growth according to IDC-forcasted zettabyte heaven, right? Er, no, because it's it entered a recessionary period, with negative growth. Says IDC. Total factory revenue of $8.8bn was reported for the quarter, down 3.2 per cent down on the year while the number of …
Chris Mellor, 09 Dec 2016

Moscow says writing infrastructure attack code is a thought crime

Malware writers whose wares are used by separate attackers to pop Russian national infrastructure could end up fined and in jail, if a new Russian bill become law. The bill (Number 47571-7, Russian) reported by local media threatens those involved in the manufacture of malware subsequently used in damaging attacks against …
Darren Pauli, 09 Dec 2016
flames_648

US think-tank wants IoT device design regulated, because security

Washington DC think tank the Institute for Critical Infrastructure Technology is calling for regulation on "negligence" in the design of internet-of-things (IoT) devices. Researchers James Scott and Drew Spaniel point out in their report Rise of the Machines: The Dyn Attack Was Just a Practice Run [PDF] that IoT represents a …
Team Register, 09 Dec 2016