Posts

Showing posts from August 12, 2018

VM Explorer 7.1 Released with vSphere 6.7 Support

Image
Another data protection vendor, Microfocus, released a VM Explorer compatible with the latest version of VMware vSphere 6.7. If you're new to this, you should know that VM Explorer was previously built by Swiss company Trilead. Since then HPE and now Microfocus took over the development and release cycles. VM Explorer 7.1 Released with vSphere 6.7 […] Read the full post VM Explorer 7.1 Released with vSphere 6.7 Support at ESX Virtualization . via Latest imported feed items on VMware Blogs https://ift.tt/2w69HTs If New feed item from https://blogs.vmware.com/feed , then send me an email at kr

Overview of vSphere Web Client Storage Plugin

Image
This article throws light on the advantages of using vSphere web client storage plugin to deal with data center storage. Also, this article talks about the overview on development and testing of vSphere storage plugin and what are prerequisites for development The post Overview of vSphere Web Client Storage Plugin appeared first on Calsoft Inc. Blog . via Latest imported feed items on VMware Blogs https://ift.tt/2nvzH73 If New feed item from https://blogs.vmware.com/feed , then send me an email at kr

Astronomy Picture of the Day: The Pencil Nebula in Red and Blue

Image
The Pencil Nebula in Red and Blue This shock wave plows through interstellar space at over 500,000 kilometers per hour. Near the top and moving up in this sharply detailed color composite, thin, bright, braided filaments are actually long ripples in a cosmic sheet of glowing gas seen almost edge-on. Cataloged as NGC 2736 , its elongated appearance suggests its popular name, the Pencil Nebula . The Pencil Nebula is about 5 light-years long and 800 light-years away, but represents only a small part of the Vela supernova remnant . The Vela remnant itself is around 100 light-years in diameter, the expanding debris cloud of a star that was seen to explode about 11,000 years ago. Initially, the shock wave was moving at millions of kilometers per hour but has slowed considerably, sweeping up surrounding interstellar material. In the featured narrow-band, wide field image, red and blue col

Lenovo unveils its thinnest and lightest professional notebook

Image
Lenovo's Thinkpad range has long offered solutions for power users with notebooks like the X1 Carbon . Its Thinkpad P series aimed to preserve functionality in a slimmer overall package, and the Thinkpad P1 and Thinkpad P72 -- its two latest laptops -- look set to do the same. Where previous models might have suffered from bulky power supplies, the Thinkpad P1 offers a 35 percent size reduction. At just 18.4 mm thin, and 3.76 pounds, it earns the distinction of being Lenovo's thinnest and lightest workstation laptop ever. Its equipped with a high-res 4K 15.6-inch screen, and you'll be getting NVIDIA's Quadro P series graphics cards (maximum P2000) for professional performance. The P1 packs an 8th gen Intel Core processor that boasts clock speeds of up to 4.6GHz. Beneath the slender chassis lies 64 GB of DDR4 memory and a decent 4TB storage, which is stil

Android exploit targeted apps' shoddy use of external storage

Image
Many mobile security flaws revolve around obvious avenues like websites or deep, operating system-level exploits. The security team at Check Point, however, has discovered another path: apps that make poor use of external storage like SD cards. While apps would ideally stick to internal storage (which Google sandboxes against outside influence) as much as possible, som e apps have relied unnecessarily on unprotected external storage and didn't bother to validate the data coming from that space. An intruder could take advantage of that poor security policy to manipulate the data and cause havoc -- Check Point called it a "man-in-the-disk" attack. An attack typically works by convincing the user to download a seemingly innocuous app that monitors the external storage use of legitimate software. When the legit apps check for updates, their hostile cou

Elaborate hack turned Amazon Echo speakers into spies

Image
Some people worry that hackers could infiltrate their smart speakers and spy on them , but that hasn't been the practical reality -- not for Amazon's Echo , at least. A team of researchers from China's Tencent has come about as close as you can get right now, however. They've disclosed an attack on the Echo that uses both a modified speaker and a string of Alexa web interface vulnerabili ties to remotely eavesdrop on regular models. It sounds nefarious, but it requires more steps than would be viable for most intruders. The team created a rogue Echo by removing a flash memory chip from the device, modifying its firmware to get root access, and soldering it back on its circuit board. After that, the group put the speaker on the same WiFi network as untouched Echos. The researchers used Amazon's whole-home communication protocol plus the Alexa inter

Material with eagle-like grasp could lead to grippier robot hands

Image
Most materials bulge out when you squeeze them, pushing the energy outside. But that's not always what you want -- wouldn't it sometimes be better for them to collapse and hold the energy inside? These exotic materials (known as auxetics) already exist on a basic level, but they tend to be so fragile that you can only use them once. A team of UK scientists may have a better way: they've designed auxetic materials that can repeatedly collapse and store energy many times without breaking or expending additional energy, grabbing on much like an eagle's talon. The key was to produce 3D lattices that are both curved to distribute forces and fold in ways that latch on to the energy, with a "building block" inside ratcheting like the claws of a bird of prey. If you want to unlatch the material and restore its original shape, you only have to

Machine learning can 'fingerprint' programmers

Image
Programmers tend to have their own distinct styles, but it's not really feasible to pore over many lines of code looking for telltale cues about a program's author. Now, that might not be necessary. Researchers have developed a machine learning system that can 'de-anonymize' programmers, whether it's through raw source code or compiled binaries. As explained to Wired , the approach trains an algorithm to recognize a programmer's coding structure based on examples of their work, and uses those to pinpoint common traits in code samples. You don't need large chunks of a given program, either -- short snippets are often enough. In a test using results from Google's Code Jam, the AI-based technology was relatively accurate, though far from foolproof. With 600 programmers and eight samples each, the system could identify creators 83 percent

Google may bring Windows 10 support to multiple Chromebooks

Image
You might not have to splurge on a Pixelbook if you're pining after a Chromebook with Windows 10 support . XDA-Developers has learned through source code that Campfire, the feature that would let Chrome OS dual-boot Windows 10, would be available in multiple "variants" -- that is, on more than one Chrome OS device. This wouldn't mean that any and all Go ogle-powered PCs would have the option. Hardware makers would have to verify that Windows worked properly, and it'd be out of the question for the many Chrome machines that only have a small amount of flash storage. Recent code comments suggest you'd need at least 40GB of space, and many Chromebooks have 32GB or less. The good news: you might not need to jump through hoops to turn it on. You wouldn't need to enable Developer Mode (and thus compromise your PC's security) or fl

'Elder Scrolls: Legends' may skip PS4 due to cross-play ban

Image
Sony's ban on cross-play for PS4 titles may create more than just inconveniences for some gamers. Bethesda's senior global marketing VP Pete Hines told Game Informer in an interview that the console version of The El der Scrolls: Legends won't launch on any system that doesn't support cross-play -- in other words, it would skip the PS4. The card battling title revolves around an experience you can carry from device to device, Hines said, and it would be unacceptable to have one version walled off from everything else. The feature is "essentially non-negotiable," the executive said. Bethesda isn't making the firmest stand against Sony's policies, since other games like Fallout 76 are still destined for the PS4. It's doing this because Legends ' cross-play is a selling point, and because a card game doesn't need the

Tesla may get help from Saudi Arabia in its bid to go private

Image
Tesla may recruit an unusual ally in its effort to become a private company and take more control over its fate. A Bloomberg source has claimed that Saudi Arabia's Public Investment Fund is in talks that could make it a "significant investor" in Tesla as part of the electric car company's plan to go private. The f unding arm has already amassed a five percent stake in Tesla, but this suggests it would grab a larger slice if the plan went forward. Neither Tesla nor PIF has commented on the rumored talks. Reuters noted on August 11th that the Saudi Arabian fund wasn't actively involved in backing Tesla's potential move, but that didn't rule out talks. It may sound odd for the Earth's largest oil exporter to back a company that would ultimately undermine its main industry, but the source indicated that this dependence is prec