How we selected 10 hot business continuity startups to watch

The selection process for our business-continuity-startup roundup began with dozens of recommendations and nominations sent via HARO, LinkedIn, Twitter, and subscribers to the Startup50 email newsletter.This roundup, however, was challenging to flesh out because in the IT world, business continuity is a subset of storage.[ Check out 10 hot storage companies to watch. | Get regularly scheduled insights by signing up for Network World newsletters. ] Plenty of vendors pitched DevOps, security, and networking companie but none of those were a good fit for business continuity. You could make a case that all of those things help ensure business continuity, but they all fit better in different categories.To read this article in full, please click here

How we selected 10 hot business continuity startups to watch

The selection process for our business-continuity-startup roundup began with dozens of recommendations and nominations sent via HARO, LinkedIn, Twitter, and subscribers to the Startup50 email newsletter.This roundup, however, was challenging to flesh out because in the IT world, business continuity is a subset of storage.[ Check out 10 hot storage companies to watch. | Get regularly scheduled insights by signing up for Network World newsletters. ] Plenty of vendors pitched DevOps, security, and networking companie but none of those were a good fit for business continuity. You could make a case that all of those things help ensure business continuity, but they all fit better in different categories.To read this article in full, please click here

How we selected 10 hot business continuity startups to watch

The selection process for our business-continuity-startup roundup began with dozens of recommendations and nominations sent via HARO, LinkedIn, Twitter, and subscribers to the Startup50 email newsletter.This roundup, however, was challenging to flesh out because in the IT world, business continuity is a subset of storage.[ Check out 10 hot storage companies to watch. | Get regularly scheduled insights by signing up for Network World newsletters. ] Plenty of vendors pitched DevOps, security, and networking companie but none of those were a good fit for business continuity. You could make a case that all of those things help ensure business continuity, but they all fit better in different categories.To read this article in full, please click here

Reaction: The Importance of Open APIs

Over at CIMI, Tom Nolle Considers whether the open API is a revolution, or a cynical trap. The line of argument primarily relates to accessing functions in a Virtual Network Function (VNF), which is then related to Network Function Virtualization (NFV). The broader point is made in this line:

One important truth about an API is that it effectively imposes a structure on the software on either side of it. If you design APIs to join two functional blocks in a diagram of an application, it’s likely that the API will impose those blocks on the designer.

This is true—if you design the API first, it will necessarily impose information flow between the different system components, and even determine, at least to some degree, the structure of the software modules on either side of the API. For instance, if you decide to deploy a single network appliance vendor, then your flow of building packet filters will be similar across all devices. However, if you add a second vendor into the mix, you might find the way packet filters are described and deployed are completely different, requiring a per-device module that moves from intent to implementation.

While this problem will always Continue reading

10 hot business-continuity startups to watch

In the current landscape business continuity is about a lot more than natural disasters: Denial of service attacks, ransomware and even network outages can undermine business continuity, and while moving applications to the cloud might seem like a viable solution, cloud providers aren’t immune to outages.To read this article in full, please click here(Insider Story)

10 hot business-continuity startups to watch

In the current landscape business continuity is about a lot more than natural disasters: Denial of service attacks, ransomware and even network outages can undermine business continuity, and while moving applications to the cloud might seem like a viable solution, cloud providers aren’t immune to outages.To read this article in full, please click here(Insider Story)

Interview with Juniper Networks Ambassador Jeff Fry

In this first ever Juniper Ambassador interview, I spend time with fellow Juniper Ambassador Jeff Fry at the Juniper NXTWORK 2018 conference in Las Vegas. We discuss his life as an Ambassador, his job at Dimension Data, his recent contribution to the 2018 Juniper Ambassador’s Cookbook, his interest in DevOps and automation, and his contribution …

Wi-Fi site survey tips

Wi-Fi can be fickle. The RF signals and wireless devices don’t always do what’s expected – it’s as if they have their own minds at times. A Wi-Fi network that’s been quickly or inadequately designed can be even worse, spawning endless complaints from Wi-Fi users. But with proper planning and surveying, you can better design a wireless network, making you and your Wi-Fi users much happier. Here are some tips for getting started with a well-planned Wi-Fi site survey.Use the right tools for the job If you’re only trying to cover a small building or area that requires a few wireless access points (AP), you may be able to get away with doing a Wi-Fi survey using a simple Wi-Fi stumbler or analyzer on your laptop or mobile device. You’ll even find some free apps out there. Commercial options range from a few dollars to thousands of dollars for the popular enterprise vendors.To read this article in full, please click here

ICT Diplomacy: A Change in the Dynamics

12 October to 6 November 1998, Minneapolis, United States: a point in time that cannot be forgotten. The ITU Plenipotentiary conference (PP-98) took place, recognizing perhaps for the first time points that impacted the future of Information and Communication Technologies (ICT) diplomacy.

The conference acknowledged the need to have the private sector as part of the union membership, together with the “associates category” for some of its study groups. Furthermore, the resolution calling for the World Summit on the Information Society (WSIS) first emerged, introducing ITU’s role in the “evolution of Internet as a means of global communication.”

The scene prior to this was an intense discussion on digital evolution. Governments were starting to understand how ICTs could help solve many issues and contribute to economic growth. The “divide” that was once prevailing between the north and the south economically, or between the developing and developed world, quickly started to shift to a “digital divide,” not only between different countries and regions, but among one country and its own boundaries and cities.

In 2001, the ITU Council approved the WSIS Summit in two phases (2003 in Geneva and 2005 in Tunisia). Later, the UN General Assembly approved the Continue reading

What Makes a Security Company?

When you think of a “security” company, what comes to mind? Is it a software house making leaps in technology to save us from DDoS attacks or malicious actors? Maybe it’s a company that makes firewalls or intrusion detection systems that stand guard to keep the bad people out of places they aren’t supposed to be. Or maybe it’s something else entirely.

Tradition Since Twenty Minutes Ago

What comes to mind when you think of a traditional security company? What kinds of technology do they make? Maybe it’s a firewall. Maybe it’s an anti-virus program. Or maybe it’s something else that you’ve never thought of.

Is a lock company like Schlage a security company? Perhaps they aren’t a “traditional” IT security company but you can guarantee that you’ve seen their products protecting data centers and IDF closets. What about a Halon system manufacturer? They may not be a first thought for security, but you can believe that a fire in your data center is going cause security issues. Also, I remember that I learned more about Halon and wet/dry pipe fire sprinkler systems from my CISSP study than anywhere else.

The problem with classifying security companies as “traditional” or “non-traditional” Continue reading

The Week in Internet News: Artificial Intelligence Will Affect Every Job

AI and your job: Artificial Intelligence will affect 100 percent of the jobs out there, IBM CEO Ginni Rometty predicted, as noted at ZDNet.com. Everyone will have to change the way they work, she said. IBM’s work with its Watson AI system “starts with a fundamental belief that it’s going to change 100 percent of jobs, 100 percent of industries, and 100 percent of professions,” she added.

AI and your vote: Meanwhile, AI is creating new threats to election security, says CBS News. AI will help hackers better design attacks against voting systems, some security experts said. Automated bots can also be used to help hackers guess passwords, they said.

Big money for AI: Before we leave AI as a topic, the Massachusetts Institute of Technology has announced it will spend US$1 billion on a new college of computing with an AI focus, Fortune reports. The new college will serve as an interdisciplinary hub for data and computer science-related work.

Call it a comeback: BlackBerry, the down-on-its-luck smartphone maker, plans to reinvent itself as a secure Internet of Things hub, FT.com reports. Building on its past reputation as a maker of secure phones, BlackBerry wants to become a Continue reading

Cloudflare Peering Portal – Beta

Cloudflare Peering Portal - Beta
Cloudflare Peering Portal - Beta

It can be a big deal for Internet users when Cloudflare rolls into town. After our recent Mongolia launch, we received lots of feedback from happy customers that all of a sudden, Internet performance noticeably improved.

As a result, it's not a surprising that we regularly receive requests from all over the world to either peer with our network, or to host a node. However, potential partners are always keen to know just how much traffic will be served over that link. What performance benefits can end-users expect? How much upstream traffic will the ISP save? What new bandwidth will they have available for traffic management?

Starting today, ISPs and hosting providers can request a login to the Cloudflare Peering Portal to find the answers to these questions. After validating ownership of your ASN, the Cloudflare network team will provide a login to the newly launched Peering Portal - Beta. You can find more information at: cloudflare.com/partners/peering-portal/

What problem does peering solve?

If you're new to the core infrastructure of the Internet, the best way to understand peering is to frame the problems it solves:

  1. Bandwidth costs money
  2. Internet users don't like slow websites
  3. Network operators have limited Continue reading

Red Hat underpins the growing importance of Linux and open source

While you may not spend a lot of time thinking about this, the role Linux plays in the technology that we all use everyday is growing quite significantly. In an effort to more fully appreciate this, I had an opportunity to speak with the new vice resident and general manager of Red Hat's RHEL Business Unit — Dr. Stefanie Chiras — and ask about her vision for RHEL and Linux in general. She was very enthusiastic — not just for Red Hat, but for the open source movement overall and the rising importance of Linux.Chiras started with Red Hat in July — not quite four months ago — and already describes herself as a “true Red Hatter.” She explained that she has had a serious focus on Linux for the last six years or more. As she points out, we all do development differently these days because of the open source movement. The changes in just the last five years have moved us to very different ways of doing things whether we're working on public or private clouds, containers, or bare metal.To read this article in full, please click here