Endurance International Group has announced that its board of directors has appointed Jeffrey H. Fox as president and chief executive officer, effective August 22.
Fox, who will also join the company’s board of directors, succeeds Endurance founder Hari Ravichandran.
“Jeff’s extensive experience leading strategy and operations for organizations in the technology, information services, and telecom industries make him ideally suited to lead the company as it focuses on balancing operational execution with profitable growth and free cash flow generation,” said James C. Neary, Chairman of the Board of Directors of Endurance International Group.
Executive leadership experience Fox brings to Endurance includes a stint from 2010 to 2012 as CEO of Convergys Corporation, and he has served since then as chairman of the board. He founded and is currently a principle of investment and advisory firm The Circumference Group LLC. Fox also previously served as COO, Group President – Shared Services, and Group President – Alltel Information Services for Alltel Corporation.
“I am excited to begin working with the board and the talented team at Endurance,” said Fox. “I have a deep appreciation for the dedication that has gone into building this company and am honored to have been selected to guide it through its next phase.”
The company announced in April it had adopted a plan to transition to a new “CEO who can take Endurance to the

 

DreamHost filed legal arguments Friday in opposition to a request by the U.S. Department of Justice (DOJ) for personally identifiable information, including IP addresses, for 1.3 million website visits, according to an announcement on the company’s blog.
DreamHost is the host of website disruptj20.org, which was dedicated to organizing protests during the inauguration of President Donald Trump on January 20. It received a grand jury subpoena soon after the inauguration and protests, and complied by providing the government with information about the website owner.
In July, the DOJ issuing a search warrant (PDF) to DreamHost seeking visitor logs, contact information, email content, and photos of thousands of people from the website. The company calls this attempt “a strong example of investigatory overreach and a clear abuse of government authority” in the blog post, and challenged the request in inquiries to the DOJ. The DOJ responded by filing a motion (PDF) to compel the host to comply with the warrant.
DreamHost received 466 requests for information from governments in 2014, and VP of Brand & Community Brett Dunst told the WHIR that the number of requests the company receives from law enforcement is reasonably consistent from year to year. The motion for disruptj20.org data is different from most law enforcement requests in procedure and scope, according to Dunst.
“It is unusual because the motion to compel came after we had basically asked for

 

DreamHost filed legal arguments Friday in opposition to a request by the U.S. Department of Justice (DOJ) for personally identifiable information, including IP addresses, for 1.3 million website visits, according to an announcement on the company’s blog.
DreamHost is the host of website disruptj20.org, which was dedicated to organizing protests during the inauguration of President Donald Trump on January 20. It received a grand jury subpoena soon after the inauguration and protests, and complied by providing the government with information about the website owner.
In July, the DOJ issuing a search warrant (PDF) to DreamHost seeking visitor logs, contact information, email content, and photos of thousands of people from the website. The company calls this attempt “a strong example of investigatory overreach and a clear abuse of government authority” in the blog post, and challenged the request in inquiries to the DOJ. The DOJ responded by filing a motion (PDF) to compel the host to comply with the warrant.
DreamHost received 466 requests for information from governments in 2014, and VP of Brand & Community Brett Dunst told the WHIR that the number of requests the company receives from law enforcement is reasonably consistent from year to year. The motion for disruptj20.org data is different from most law enforcement requests in procedure and scope, according to Dunst.
“It is unusual because the motion to compel came after we had basically asked for

 

Brought to you by Data Center Knowledge
Everybody was probably sporting smiles on Monday at Hurricane Electric’s headquarters in Fremont, California. Why? The tier 2 network operator, which runs a vital part of the internet’s backbone, announced it’s become the first network in the world to connect to over 4,000 IPv6 networks. If they handed out gold medals for such things, this would be the company’s second trophy for the same category. In 2010 it became the first to connect to 1,000 IPv6 networks.
That likely doesn’t mean much to the average Joe or Jane on the street and it probably won’t attract more than passing interest from most IT workers, but it’s an important milestone for anyone who earns their living by harnessing the infrastructure of the internet — like service providers and data center operators. In case you don’t know, Hurricane Electric is both.
IPv6 — for Internet Protocol version 6 — is the new addressing system for the internet that will eventually replace IPv4, which has been used since the ancient days of ARPANET. IPv4 works just fine, but as a 32-bit system is limited to 4.29 billion addresses. That seemed like enough to last forever when it was first pressed into service in 1983, but that was before the days of the public internet, which began to rapidly eat through available IP addresses by the late 1990s. The limitation became even more alarming around 2007 with introduction of the iPhone, which heralded the coming of the

 

Brought to you by Data Center Knowledge
Everybody was probably sporting smiles on Monday at Hurricane Electric’s headquarters in Fremont, California. Why? The tier 2 network operator, which runs a vital part of the internet’s backbone, announced it’s become the first network in the world to connect to over 4,000 IPv6 networks. If they handed out gold medals for such things, this would be the company’s second trophy for the same category. In 2010 it became the first to connect to 1,000 IPv6 networks.
That likely doesn’t mean much to the average Joe or Jane on the street and it probably won’t attract more than passing interest from most IT workers, but it’s an important milestone for anyone who earns their living by harnessing the infrastructure of the internet — like service providers and data center operators. In case you don’t know, Hurricane Electric is both.
IPv6 — for Internet Protocol version 6 — is the new addressing system for the internet that will eventually replace IPv4, which has been used since the ancient days of ARPANET. IPv4 works just fine, but as a 32-bit system is limited to 4.29 billion addresses. That seemed like enough to last forever when it was first pressed into service in 1983, but that was before the days of the public internet, which began to rapidly eat through available IP addresses by the late 1990s. The limitation became even more alarming around 2007 with introduction of the iPhone, which heralded the coming of the

 

GoDaddy has declared neo-nazi website the Daily Stormer is in violation of its terms of service and cancelled its domain registration, with Google and French web host Scaleway following suit.
A tweet was sent to GoDaddy Sunday picturing a post on the Daily Stormer which made disparaging personal remarks about the woman murdered during violent events in Charlottesville, Virginia, and calling for the company to revoke the website’s domain registration agreement. In response GoDaddy replied Sunday evening that it had given the site 24 hours notice of the cancellation of its registration.

We informed The Daily Stormer that they have 24 hours to move the domain to another provider, as they have violated our terms of service.
— GoDaddy (@GoDaddy) August 14, 2017
GoDaddy has previously faced criticism as it attempted to walk a fine line between accepting customer’s rights to free speech and enforcing terms of service which prohibit customer use which “promotes, encourages or engages in terrorism, violence.”
The WHIR has reached out to GoDaddy for comment.
The domain was transferred to Google by Monday morning, but Google responded that it too was cancelling the registration due to violation of its terms of service, a company representative told Vox in an email.
Another Twitter user identified Scaleway as the Daily Stormer’s server host by tracing its IP address, and requested the company shut it down. The company, which appears to have been unaware it was

 

One of the really cool parts of the digital revolution has been the work we’ve done to give analog devices a digital footprint. This involves manufacturing, healthcare, automotive, power, and so much more.
With that comes a new concept as we evolve traditional systems into the digital age – Digital Twins. To better understand this concept, it’s important to define what a digital twin actually is.
In the world of digital transformations, a digital twin is a virtual or digital representation of a physical asset, object, or even manufacturing process. The idea is to continuously learn and provide data insights around vast operations. Consider this, more than 800,000 digital twins of jet engines, locomotives, power generation equipment and more already are helping GE and customers to make their machines and processes more productive.
See also: How to Change Executive Perceptions around Digital Transformation
You can leverage information, data sciences, and powerful systems to enable digital twins of supply chain management, entire factory processes, and even inventory management. So, for example, your digital twin, coupled with the data and the applications which support it can help make tens of thousands of decisions that are required every year across the vast supply chain and factory operations.
As large enterprises continue to work through these digital transformation initiatives, they’ll be looking at more ways to be competitive and improve productivity. According

 

Brought to you by MSPmentor
A re-examination has been underway in recent years about the ideal structure for login passwords, the effectiveness of which is more important than ever in an age of ubiquitous cyber attacks.
The work was done at the National Institute of Standards and Technology (NIST), a division of the U.S. Department of Commerce charged with setting cyber security rules for non-military federal government agencies.
This summer, NIST researchers released Special Publication 800-63, which outlines new best practices dictating an end to frequent password changes, and a move away from pithy combinations of upper and lower-case letters, numbers and symbols.
Those guideline changes were thrust into the spotlight this week after former NIST manager Bill Burr – who created the original password standards in 2003 – said in a media interview that the previous approach was obsolete and based on inadequate information.
“Much of what I did I now regret,” the now-retired 72-year-old told The Wall Street Journal.
While NIST’s standards are only binding on employees of the covered federal agencies, they are often looked to and adopted by large and small businesses and other organizations as best practices.
The new guidelines suggest going away from passwords with rudimentary complexity restrictions like “MSPmentor2017!” which can be easily cracked by hackers and might offer the user a false sense of security.
Requiring that such passwords be changed regularly

 

(Bloomberg) — Space Exploration Technologies Corp. will carry a Hewlett Packard Enterprise Co. computing system that is designed to last longer and may help pave the way for extended periods of space travel, such as the journey to Mars.
SpaceX will take the system, a box that can process data from experiments, on its Dragon Spacecraft that will be launched from Cape Canaveral on Aug. 14 to the International Space Station.
Other computing systems used in space have to be replaced frequently because the difficult conditions caused them to degrade, a spokesman for Hewlett Packard said. Its Spaceborne Computer is designed to last for a year, which it says is roughly the amount of time it would take to travel to Mars. NASA aims to send humans to Mars in the 2030s.
“A mission to Mars will require sophisticated on-board computing resources that are capable of extended periods of uptime,” Alain Andreoli, senior vice president and General Manager at Hewlett Packard’s Data Center Infrastructure Group, said in a blog post.
“To meet these requirements, we need to improve technology’s viability in space in order to better ensure mission success,” Andreoli said. “By sending a supercomputer to space, HPE is taking the first step in that direction.”

 

Brought to you by IT Pro
Microsoft has been warning users about tech support scams for years, and this week shared how it is seeing these scams continue to evolve by targeting victims through emailed links that lead to tech support scam websites.
The spam emails, according to Microsoft, use social engineering techniques to get users to click suspicious links. Once a target clicks on the link, they are led to a tech support scam website, “which use various scare tactics to trick users into calling hotlines and paying for unnecessary ‘technical support services’ that supposedly fix contrived device, platform, or software problems.”
A survey last year, cited by Microsoft, found that two out of three people have experienced a tech support scam in the previous 12 months.
As Microsoft explains in a blog post, while typically tech support scams leverage a mix of techniques, including malicious ads, malware, and cold calling, email lets them “cast a wider net.”
“The technical support scam websites employ various social engineering techniques to compel users to call the provided hotlines,” Microsoft said.  ”They warn about malware infection, license expiration, and system problems. Some scams sites display countdown timers to create a false sense of urgency, while others play an audio message describing the supposed problem.”
Microsoft has been tracking tech support scams for years, working with law enforcement to investigate tech support fraud networks and

© 2012 Webhosting news Suffusion theme by Sayontan Sinha