Lost in the cloud? Dedicated servers as a real alternative DatacenterDynamics
View post:
Lost in the cloud? Dedicated servers as a real alternative - DatacenterDynamics
Earlier this week, Microsoft released the December 2022 Patch Tuesday updates for various supported versions of Windows. Now, the company has warned that the latest Windows Server updates could prevent IT admins from creating new virtual machines (VMs) in some Hyper-V hosts.
After installing KB5021249 on Hyper-V hosts managed by Software Defined Networking (SDN) configured System Center Virtual Machine Manager (VMM), you might receive an error on workflows involving creating a new Network Adapter (also called a Network Interface Card or NIC) joined to a VM network or a new Virtual Machine (VM) with a Network Adapter joined to a VM network, Microsoft explained on the Windows Health Dashboard.
Specifically, IT admins could encounter Ethernet connection errors while creating a new virtual machine or a network adapter on an existing virtual machine. Additionally, these errors might appear when the SLB Load Balancer or SDN RAS Gateway services fail. Administrators may also see Ethernet connection warning messages during live migrations of non-highly available VMs.
The issue only affects new network adapters created after installing the latest Patch Tuesday updates (KB5021237 and KB5021249) on Windows Server 2019 and Windows Server 2022. However, it doesnt cause connection issues for existing VMs with network adapters.
Thankfully, Microsoft says that its engineers are currently working on a fix that should be arriving in the near future. As a workaround, Microsoft suggests users to run the following commands in PowerShell with administrator privileges:
$lang = (Get-WinSystemLocale).NameC:Windowssystem32wbemmofcomp.exe C:Windowssystem32wbem$langVfpExt.mflC:Windowssystem32wbemmofcomp.exe C:Windowssystem32wbemVfpExt.mof
Microsoft has provided a dedicated script to help organizations with large-scale deployments on the SCVMM Management Server. Moreover, there is also a post-installation script that can be used with patching tools. IT admins can download both scripts from this support page.
Read the original here:
Microsoft to Fix New Bug Breaking Hyper-V VMs in Windows Server - Petri.com
Discord is expanding on Connections, a feature that allows users to show what music they're listening to (among other things), by providing a way for folks to verify their identity using accounts on other platforms. Starting in the next few weeks, admins will be able to offer dedicated server roles to users who have authenticated profiles with accounts elsewhere.
The core idea behind these Linked Roles is to provide a stronger sense of trust. The platforms that support this feature at the outset are Xbox, PlayStation, Steam, Epic Games, Battle.net, League of Legends, Riot Games, Reddit, TikTok, Twitter, YouTube, Twitch, Instagram, Spotify, Facebook, GitHub, Crunchyroll, PayPal and eBay. Discord bots for Destiny 2 (Charlemagne) and Roblox (Bloxlink) support Linked Roles too.
Discord
You can show these connected accounts on your Discord profile, along with certain details like your follower count or eBay seller feedback rating. If you're selling your art on Discord, for instance, you can indicate to potential customers that the work on a DeviantArt profile is actually yours, since the accounts will be linked. Discord admins and moderators can also choose to offer server roles with perks, such as access to certain channels, to users who authenticate their accounts with Connections and meet various conditions.
Admins will be able to select the parameters for unlocking Linked Roles. They can stipulate, for instance, that a user needs to link to a Steam account that's a certain number of days old and/or has a minimum number of Dota 2 or Team Fortress 2 items to show that they're genuine players. From a server's dropdown menu, users will be able to view the requirements for each Linked Role. Each role will automatically be granted to their profiles when they meet the conditions.
Discord
Discord is keeping privacy in mind here. Admins and moderators won't automatically gain access to info from your Connections even if you've already linked accounts before joining a server. You'll need to manually opt-in to a server's Linked Roles before details from your connected accounts are accessible. Moreover, if you're eligible, you can snag a Linked Role on a server without having to show any details from your Connections on your profiles. Discord can handle things on the back end without admins or moderators being able to see your info.
Linked Roles build on previous Connections features, such as being able to show off whatever Xbox or PlayStation game you're playing on your Discord profile. Discord is rolling out Linked Roles at a time when Twitter is upending its approach to account verification. Cross-platform authentication can help to verify a person's identity. You'll be able to tell, for instance, if a Discord profile actually belongs to a big name Instagram, YouTube or TikTok creator thanks to those accounts being linked.
Discord
Meanwhile, Discord is starting to roll out green checkmarks next to Connections for certain services. The icon will show that the connected app is from a vetted developer. Discord says this will "help establish an important level of trust between apps from developer partners and the millions of users who interact with those apps every day across Discord."
As of today, 22 of these "official" apps are available. Next year, Discord will start offering an application process for developers who want to have their apps designated as official. In the meantime, using a new API, developers can create or update apps to support Connections features.
All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission. All prices are correct at the time of publishing.
More:
Discord users can soon verify their identities with linked accounts - Engadget
Navy Pier will host the party of the year on the biggest night of the year in the opulent and historic Aon Grand Ballroom.
New Year on the Pier features premium catering and bar, dancing and live band and DJ entertainment, ending with a festive midnight countdown followed by a fireworks show at midnight. Doors open at 8 p.m., and the party concludes at 1 a.m.
Matt Kysia from Kysia Live returns as the master of ceremonies. Entertainment includes The Lakeshore Encores, performing a variety of pop, Motown and funk; Supersonic trio Treble Squad, consisting of a violinist, saxophonist and drummer performing electronic music; and Kice, a DJ and producer based out of Chicago.
The general admission Celebration Package includes premium spirits, craft and domestic beers, house wines, champagne, gourmet appetizers, party favors for the duration of the event, and photo opportunities galore.
VIP admission also includes access to the VIP-only balcony, exclusive rooftop access to view the fireworks, private food stations, ultra-premium bar, party favors and express entry.
A limited number of VIP Lounge Table Packages will be made available. The VIP Lounge Table Package includes 12 VIP tickets with lounge seating, skybox view of the stage and dance floor, dedicated server with table-side appetizer trays, beer and cocktail table service, and premium champagne.
For more information or tickets, visit the website at navypier.org.
Follow this link:
Navy Pier to host party to celebrate New Year's - The Beverly Review
Driving new open networking solutions and enhanced service experiences across high-performance compute and multi-cloud landscapes
HSINCHU, Taiwan, December 13, 2022--(BUSINESS WIRE)--Edgecore Networks, the leader in open networking solutions, today announces the hyper-cloud appliance solution for high-performance network visibility monitoring, hardware-enhanced virtualized security, and mobile LTE/5G gateway applications. Fueled by the Intel Tofino Expandable Architecture, the CSP-7550 is a server-switch based on Intel Xeon Scalable processors with built-in AI accelerators. The switch system includes 32 x 100 GbE network ports based on a P4 programmable Intel Tofino Intelligent Fabric Processor (IFP) and optimized for the Intel Xeon Scalable platform increasing CPU capacity and performance for virtual machine consolidation and density, as well as boosting memory bandwidth.
As a network solution provider, Edgecore understands the requirements of modern network deployments and is dedicated to delivering new levels of service and breakthrough performance for operators, unlocking the potential of open networking and releasing a new service experience across mobile and multi-cloud landscapes. The CSP-7550 is a powerful platform optimized for the Intel Tofino Expandable Architecture to deliver large and fast table lookups, high-performance computing, and predictable forwarding times. The CSP-7550 gives cloud service providers the scalability to handle increasing traffic loads and demanding computing requirements.
The CSP-7550 includes eight DDR4 DIMM slots per CPU, with local storage options including two SATA III or PCIe. It supports four open PCIe slots for customers to choose whatever kind of standard FPGA, Smart NIC, or AI/ML PCIe cards etc. for different applications. In addition, the CSP-7550 supports an optional FPGA card, which has a high-speed connection to the Tofino chipset. With the FPGA card, the CSP-7550 is able to support extra-large tables for hundreds of millions of session entries or provide tens of GBs of high-speed buffering for Hierarchical Quality of Service (HQoS).
The CSP-7550 is a truly open platform, operators have the flexibility to install an operating system and application software that precisely suits their needs or build their own customized device that represents a solid future-proof investment. The CSP-7550 also supports Enterprise SONiC Distribution by Edgecore, with various applications and features that can be easily added and integrated based on a customers needs.
With its server-grade computing and hardware-enhanced security capabilities, the CSP-7550 is an ideal solution as a Server Load balancer (SLB), Network Packet Broker (NPB), Broadband Network Gateway (BNG), or 5G User Plane Function (UPF). The new server-switch solution delivers high-performance and flexibility in cloud data centers and at the edge, enhancing computing, switching, and storage applications to meet the demands of modern network deployments.
Nanda Ravindran, Vice President of Product Management of Edgecore, said, "Edgecore's new hyper cloud appliance delivers the industrys leading turnkey solution for the most demanding of network environments. Network operators are starting to embrace open network solutions and requiring more powerful platforms for high-performance computing. CSP-7550 Server-switch with enhanced CPU capacity and performance enables value-added application development to address continuously expanding network requirements. Edgecore offers greater choice and flexibility for network operators to build modern networking infrastructures for the multi-cloud and mobile-centric world."
"As the industry is gearing towards programmable infrastructure, we are pleased to offer multi-terabit performance with Intel Tofino Expandable Architecture optimized for customers evolving edge-to-cloud requirements, such as load balancing, security, telco user plane functions and broadband gateways," said Barry Davis, General Manager of Marketing and Software Planning at Intel. "Based on P4 Tofino Expandable Architecture, which combines fully programmable Intel Tofino Intelligent Fabric Processors (IFPs) with Intel Xeon Scalable CPUs and accelerators such as Intel Stratix 10 MX FPGA cards, our integrated solution will fulfill many different deployment requirements ranging from medium businesses to carrier-level service providers."
About Edgecore Networks
Edgecore Networks Corporation is a wholly owned subsidiary of Accton Technology Corporation, the leading network ODM. Edgecore Networks delivers wired and wireless networking products and solutions through channel partners and system integrators worldwide for data center, service provider, enterprise, and SMB customers. Edgecore Networks is the leader in open networking, providing a full line of open 1G-400G Ethernet switches, core routers, cell site gateways, virtual PON OLTs, packet transponders, and Wi-Fi access points that offer a choice of commercial and open source NOS and SDN software. For more information, visit http://www.edge-core.com.
All trademarks, service marks, registered marks, or registered service marks are the property of their respective owners.
2022 Edgecore Networks. The information contained herein is subject to change without notice. Edgecore Networks shall not be liable for technical or editorial errors or omissions contained herein.
Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries.
View source version on businesswire.com: https://www.businesswire.com/news/home/20221213005098/en/
Contacts
Lucille Lulucille_lu@edge-core.com +886-3-505-3674
More:
A little-known phone monitoring app called Xnspy has stolen data from tens of thousands of iPhones and Android devices, the majority whose owners are unaware that their data has been compromised.
Xnspy is one of many so-called stalkerware apps sold under the guise of allowing a parent to monitor their childs activities, but are explicitly marketed for spying on a spouse or domestic partners devices without their permission. Its website boasts, to catch a cheating spouse, you need Xnspy on your side, and, Xnspy makes reporting and data extraction simple for you.
Stalkerware apps, also known as spouseware, are surreptitiously planted by someone with physical access to a persons phone, bypassing the on-device security protections, and are designed to stay hidden from home screens, which makes them difficult to detect. Once installed, these apps will silently and continually upload the contents of a persons phone, including their call records, text messages, photos, browsing history and precise location data, allowing the person who planted the app near-complete access to their victims data.
But new findings show many stalkerware apps are riddled with security flaws and are exposing the data stolen from victims phones. Xnspy is no different.
Security researchers Vangelis Stykas and Felipe Solferini spent months decompiling several known stalkerware apps and analyzing the edges of the networks that the apps send data to. Their research, presented at BSides London this month, identified common and easy to find security flaws in several stalkerware families, including Xnspy, such as credentials and private keys left behind in the code by the developers and broken or nonexistent encryption. In some cases the flaws are exposing the victims stolen data, now sitting on someone elses insecure servers.
During their research, Stykas and Solferini discovered clues and artifacts that identified the individuals behind each operation, but they declined to share details of the vulnerabilities with the stalkerware operators or publicly disclose details about the flaws for fear that doing so would benefit malicious hackers and further harm victims. Stykas and Solferini said that all of the flaws they found are easy to exploit and have likely existed for years.
Others have waded into murkier legal waters by exploiting those easy-to-find vulnerabilities with the apparent aim of exposing stalkerware operations as a form of vigilantism. A huge cache of internal data taken from the servers of TheTruthSpy stalkerware and its affiliate apps and given to TechCrunch earlier this year allowed us to notify thousands of victims whose devices were compromised.
Since our investigation into TheTruthSpy, TechCrunch has obtained further caches of stalkerware data, including from Xnspy, exposing their operations and the individuals who profit from the surveillance.
Xnspy advertises its phone monitoring app for spying on a persons spouse or domestic partner. Image Credits: TechCrunch (screenshot)
Data seen by TechCrunch shows Xnspy has at least 60,000 victims dating back to 2014, including thousands of newer compromises recorded as recently as 2022. The majority of victims are Android owners, but Xnspy also has data taken from thousands of iPhones.
Many stalkerware apps are built for Android since it is easier to plant a malicious app than on an iPhone, which have tighter restrictions on which apps can be installed and what data can be accessed. Instead of planting a malicious app, stalkerware for iPhones tap into a devices backup stored in Apples cloud storage service iCloud.
With a victims iCloud credentials, the stalkerware continually downloads the devices most recent iCloud backup directly from Apples servers without the owners knowledge. ICloud backups contain the majority of a persons device data, allowing the stalkerware to steal their messages, photos and other information. Enabling two-factor authentication makes it far more difficult for malicious individuals to compromise a persons online account.
The data we have seen contains more than 10,000 unique iCloud email addresses and passwords used for accessing a victims cloud-stored data, though many of the iCloud accounts are connected to more than one device. Of that number, the data contains more than 6,600 authentication tokens, which had been actively used to exfiltrate victims device data from Apples cloud, though many had expired. Given the possibility of ongoing risk to victims, TechCrunch provided the list of compromised iCloud credentials to Apple before publication.
The Xnspy data we obtained was unencrypted. It also included information that further unmasked Xnspys developers.
Konext is a small development startup in Lahore, Pakistan, manned by a dozen employees, according to its LinkedIn page. The startups website says the startup specializes in bespoke software for businesses that seek all-in-one solutions, and claims to have built dozens of mobile apps and games.
What Konext doesnt advertise is that it develops and maintains the Xnspy stalkerware.
The data seen by TechCrunch included a list of names, email addresses and scrambled passwords registered exclusively to Konext developers and employees for accessing internal Xnspy systems.
The cache also includes Xnspy credentials for a third-party payments provider that are tied to the email address of Konexts lead systems architect, according to his LinkedIn, and who is believed to be the principal developer behind the spyware operation. Other Konext developers used credit cards registered to their own home addresses in Lahore for testing the payment systems used for Xnspy and TrackMyFone, an Xnspy clone also developed by Konext.
Some of Konexts employees are located in Cyprus, the data shows.
Konext, like other stalkerware developers, makes a concerted effort to conceal its activities and keep the identities of its developers from public view, likely to shield from the legal and reputational risks that come with facilitating covert surveillance on a massive scale. But coding mistakes left behind by Konexts own developers further link its involvement in developing stalkerware.
TechCrunch found that Konexts website is hosted on the same dedicated server as the website for TrackMyFone, as well as Serfolet, a Cyprus-based entity with a conspicuously barebones website, which Xnspy says processes refunds on behalf of its customers. No other websites are hosted on the server.
TechCrunch contacted Konexts lead systems architect by email for comment, both to his Konext and Xnspy email addresses. Instead, a person named Sal, whose Konext email address was also in the data but declined to provide their full name, responded to our email. Sal did not dispute or deny the companys links to Xnspy in a series of emails with TechCrunch, but declined to comment. When asked about the number of compromised devices, Sal appeared to confirm his companys involvement, saying in one email that the figures you quoted dont match with what we have. When asked for clarity, Sal did not elaborate.
Xnspy is the latest in a long list of flawed stalkerware apps: mSpy, Mobistealth, Flexispy, Family Orbit, KidsGuard and TheTruthSpy have all exposed or compromised their victims data in recent years.
If you or someone you know needs help, the National Domestic Violence Hotline (1-800-799-7233) provides 24/7 free, confidential support to victims of domestic abuse and violence. If you are in an emergency situation, call 911. The Coalition Against Stalkerware also has resources if you think your phone has been compromised by spyware. You can contact this reporter on Signal and WhatsApp at +1 646-755-8849 or zack.whittaker@techcrunch.com by email.
Read more:
Read more:
Xnspy stalkerware spied on thousands of iPhones and Android devices - TechCrunch
Mishi Choudhary and Faisal Farooqui
For days, hundreds of dedicated healthcare professionals at Delhis prestigious AIIMS had to work with pen and paper to register a sea of patients waiting in long queues after a ransomware attack. What should have been a seamless task of admitting patients in the hospital or rendering check-ups and diagnostic services in the outpatient department had to be done as it was in the 1970s and 80s.
This is because on November 23 the core or main servers of AIIMS were hijacked (or held hostage) by an unknown, faceless enemy who could have been operating as a single individual or a group or organisation. The servers were partially restored on December 6 and online appointments were restored earlier this week.
Read full opinion on TOI+
Views expressed above are the author's own.
END OF ARTICLE
Continue reading here:
Get inside Wall Street with StreetInsider Premium. Claim your 1-week free trial here.
DOWNERS GROVE, IL / ACCESSWIRE / December 15, 2022 / IDGlobal Corp. (OTC PINK:IDGC) - is pleased to announce acquiring a 4000 sq. ft. specialized facility, thus extending the Company's service range with ultimate Cybersecurity as a Service (CaaS) and Virtual Power Plant platform solutions, through the Utmost Tech Research & Development Center, Ltd., based in Poland. Utmost Tech through UTXO is on a mission to scale up its' existing data center infrastructure and upgrade the computing power with the latest technology from Nvidia - the Grace Hopper H100 GPU architecture.
High Performance Computing - to answer rapidly growing demand for big data processing and artificial intelligence apps the IT world is migrating from CPU-based data center architecture into the GPU architecture with distributed microservices that provides computing power outperforming by 20x the old CPU-based datacenters.
UTXO is specialized in manufacturing and servicing of multiple electronics devices, including industrial computers and High-Performance Computing servers, dedicated for data centers and AI factories. The Company has established procurement process of electronics components from partners that include Nvidia and Intel as well as many distributors world-wide. The basic building block of the UTXO's AI Factory Data Center is the AI Wall which consists of 20 UT-8xGPU (or 20x UT-4xGPU) servers installed in 5 racks, 4 servers per rack. Additional rack for switches is installed in the middle to assure proper, same length cable distribution. This size optimizes both performance and cost while still minimizing system bottlenecks so that complex workloads are well supported. "A single AI Wall is capable of 48 AI PFLOPS. The UTXO AI Factory consists of 4 AI Walls connected via two layer switching system, providing 192 Peta FLOPS across 80 servers, states Marcin Michel, CEO of UTXO Technologies, Inc."
"The Company is elated on the progress we have made over the last quarter of the year, and we will be providing a lot more details on the various products, forecasts and projections, as well as lending more insight as to the future of IDGC, states interim CEO, Sebastien Dufort."
ABOUT UTXO TECHNOLOGIES, INC. (WWW.UTMOSTTECH.COM)
UTXO is a multi-disciplinary hi-tech organization consisting of several teams experienced in advanced IT solutions, electronics, software and hardware development, as well as nano material science. The teams are dedicated disruptive innovators in the energy sector, highly focused within the world of distributed renewable energy solutions. The teams work together under DevOps principles providing to UTXO Clients advanced IT services & Machine Learning Operations that run on modern High Power Computing distributed GPU server infrastructure, owned and operated by UTXO.
IDGC's Plan of Operations.
IDGC is an emerging growth company under the JOBS Act of 2012 and, as a diversified holding company, will focus on emerging and middle-market international investment opportunities through its subsidiaries. IDGlobal Corp. is an organization engaged in the business of fostering early-stage companies through the different developmental phases until the companies have sufficient financial, human, and physical resources to function on their own.
Safe Harbor Statement under the Private Securities Litigation Reform Act of 1995: The statements contained herein are forward-looking statements that are subject to risks and uncertainties that could cause actual results to differ materially from those expressed in the forward-looking statements, including, but not limited to, certain delays beyond the Company's control with respect to market acceptance of new technologies or products, delays in testing and evaluation of products, and other risks detailed from time to time in the Company's filings with the Securities and Exchange Commission. Please read the full disclaimer at http://www.idglobalcorp.io.
Contact: [emailprotected] for more information
SOURCE: ID Global Corporation
View source version on accesswire.com: https://www.accesswire.com/731965/UTXO-Technologies-Inc-Wholly-Owned-Subsidiary-of-IDGlobal-Corp-Is-Pleased-to-Announce-a-Real-Estate-Investment-Transaction-to-Open-the-Companys-First-AI-Factory
See original here:
UTXO Technologies, Inc., Wholly Owned Subsidiary of IDGlobal ... - StreetInsider.com
Just over a year after beloved local gathering spot LHosteria closed in Aspen, another restaurant that wants to be the hub of the local dining scene has opened in its place.
PARC Aspen officially opened Dec. 16 but enjoyed a soft opening on Dec. 13.
The below-street level eatery has been fully-renovated in a farmhouse style, the walls whitewashed, and the space heavily brightened. Gone are the days of dark corners and the dim lighting of PARCs predecessor.
According to the PARC Aspen website, the new restaurant is focused on revitalizing the local dining scene in Aspen with a menu of locally-sourced, seasonally-curated dishes.
The idea of locally-sourced and seasonal or as our server put it, Aspen seasonal also extends to the cocktail menu, which highlights a few Roaring Fork Valley and Colorado-based distilleries, plus a section dedicated to winter flavors.
The selection of cocktails is broken down into five sections, starting with PARC Aspen specialties. Just about every mainstream spirit option is represented in the specialties section, and the liquor is paired with some more unique ingredients, such as a tequila drink called the Spiral Incline that has tomatillo in it, and the Newbury Park, which is the drink that caught my eye first because of its flavors.
The Newbury Park is made with Roaring Fork Vodka, raspberry, beet, Domaine De Canton Ginger Liqueur and topped with Fever Tree. The result is a beautiful and bright raspberry-colored drink that you might be able to trick your mind into thinking is just a healthy juice, thanks to the beets. The taste is slightly beet-forward on the first sip, but the finish is all tart raspberry. The warming and spicy presence of the ginger is there but not overwhelming, and I believe the presence of the bubbles from the Fever Tree helps dilute the ginger flavor a contribution to keeping the drink light. Vodka, although not my preferred liquor by any means, was definitely the correct spirit choice for the cocktail because its easily hidden and doesnt take away from the fresh, fun flavor of the drink. I would honestly rate this a 10 out of 10 and can see this being an easy go-to drink.
Next up on the PARC Aspen cocktail list is a short section of zero-proof cocktails, two options to be exact, followed by two hot alcoholic drinks (620 Toddy and Mulled Wine), and then a nice selection of classic cocktails, including an Old Fashioned, Jimmys style, and the spirit-forward Vesper.
My next, and final, cocktail of the evening came from the seasonal Winter Specialties section.
Two of the drinks in this section sound like good, creamy, dessert cocktails, while the other two seem more appropriate for sipping with your meal.
I chose the A White Winter cocktail, made again with Roaring Fork Vodka, St-Germain Elderflower Liqueur, white cranberry and egg white.
This drink appeared and was totally different than my expectations but not in a bad way.
Its served in a martini glass and is indeed the color of a white winter with a nice amount of foam from the egg whites and garnished with a dash of bright-blue sugar crystals. It tastes like youre drinking a cloud, both in texture and flavor. Somehow all the ingredients, when mixed together, seem to cancel each other out. There are floral notes of the St-Germain on the nose, but the first flavor on the tongue is somehow cotton candy-esque. Although the drink starts off white, like a wintery day in Aspen, by the end, it turns an icy blue, thanks to the sugar crystals on top.
I wont go into discussing the food because this is a drink column, after all, but, safe to say, it did not disappoint, and it was full of flavor.
I already have my eyes on some other cocktails I want to try from the menu such as the Blueberry Glacier found on the Winter Specialties section and look forward to seeing how the restaurant changes with the seasons, as it finds its foothold in Aspen.
Cheers, PARC Aspen, youre off to a great start!
Follow this link: