A Maryland-based EchoStar subsidiary best known as a provider of network management services announced today that it will offer a managed SD-WAN product as part of its HughesON lineup.
Hughes Network Systems’ new Hughes Managed SD-WAN is aimed at distributed businesses that mostly use broadband communications, simplifying the management of those connections and ensuring that demanding applications like video run smoothly.
MORE ON NETWORK WORLD: Switches coming out this year will drive open networking forward + Trump turns to H-1B advocates for adviceTo read this article in full or to leave a comment, please click here
Microsoft announced today that it has added support for the Intel-backed Clear Linux distribution in instances for its Azure public cloud platform.It’s the latest in a lengthy string of Linux distributions to become available on the company’s Azure cloud. Microsoft already supports CentOS, CoreOS, Debian, Oracle Linux, Red Hat Enterprise Linux, SUSE Enterprise Linux, OpenSUSE and Ubuntu in Azure instances.+ALSO ON NETWORK WORLD: Windows 10 peeping: Microsoft fails to understand the uproar + Oracle patches raft of vulnerabilities in business applicationsTo read this article in full or to leave a comment, please click here
Free Software Foundation
The Free Software Foundation Tuesday announced a major rethinking of the software projects that it supports, putting top priority on a free mobile operating system, accessibility, and driver development, among other areas.
The foundation has maintained the High Priority Projects list since 2005, when it contained just four free software projects. Today’s version mostly identifies priority areas, along with a few specific projects in key areas:To read this article in full or to leave a comment, please click here
Dominic Orr, the president of Hewlett Packard Enterprise's Aruba, will retire at the end of January in order to spend more time with his family and pursue personal interests, the company announced this week.Orr has been the president of Aruba, which was acquired by HPE in 2015, for 11 years. He’s a veteran of the networking industry, having worked at Nortel Networks, Alteon, and Bay Systems in his lengthy career. Taking over for Orr will be Aruba founder Keerti Melkote, who currently serves as senior vice president and general manager.“Dom has created the unique ‘customer first, customer last’ culture, innovator's mindset, and the making business personal attitude that are all cornerstones of our organization’s DNA that we will continue to carry forward,” said Melkote. “While he will certainly be missed, he leaves the organization well-positioned to continue to grow and prosper.”To read this article in full or to leave a comment, please click here
Jay Y. Lee, the current head of the Samsung Group, will be questioned by a special prosecutor Thursday as part of an investigation into a wide-ranging corruption scandal in South Korea that has reached all the way to the country’s president.The case centers on allegations that Samsung, among other businesses, paid millions of dollars to a mysterious associate of President Park Geun-hye in exchange for favorable government decisions. That associate, Choi Soon-sil, is accused of accepting payments for her daughter’s competitive equestrian career as bribes.+ALSO ON NETWORK WORLD: US Intel report: Russia allegedly obtained 'compromising' info on Trump + Amazon Alexa ‘wins’ CES, but how well does the virtual assistant really perform?To read this article in full or to leave a comment, please click here
The Raspberry Pi roundup is back from its winter holidays, and boy, has it ever been nerding out. There’s nothing like being back at the old homestead to make you read well-loved old classics like the Harry Potter books.Appropriately, then, for the first Raspberry Pi roundup after the festive season, we’ve got a copy of the Daily Prophet that does what a wizarding newspaper is supposed to do, thanks to the technical wizardry of Piet Rullens. (And the always excellent Raspberry Pi Foundation blog for bringing it to our attention.)
Rullens turned a trip to the Harry Potter theme park in Orlando into an attractively designed and authentic-looking Daily Prophet poster, thanks to a cunningly placed Raspberry Pi 3 and some skillful cutting. An IR distance sensor, when tripped, fires up the screen, which plays a clip of Rullens at the amusement park.To read this article in full or to leave a comment, please click here
In the space of a decade, Apple’s iPhone has gone from being a consumer craze to the single product that some say most affects the design and operation of enterprise IT, turning a controlled, top-down environment into something far more open.“I think the iPhone was probably one of the most impactful pieces of technology to come into the IT world since computing,” said VMware VP and chief information security officer Alex Tosheff, commenting on the 10th anniversary of the Apple iPhone, which was introduced on Jan. 9, 2007. VMware
VMware VP and chief information security officer Alex Tosheff: Feeling iPhone's impactTo read this article in full or to leave a comment, please click here
Sweet 15Image by AppleApple announced the iPhone on January 9, 2007, and brought computing into the palms of our hands. More than any other device since the PC, the iPhone represents a change in the way citizens of wealthy countries interact with the world. Of course, the iPhone isn’t just a single gadget, but rather 15 of them. Have a look.To read this article in full or to leave a comment, please click here
Shipments of 802.11ac wave 2 access points doubled in volume in the third quarter of 2016, as the newer wireless technology begins to reach further into the mainstream.According to statistics from IHS Markit, the new tech accounted for about 10% of all wireless access points shipped during the third quarter, up from 5% in the previous quarter. That’s more than half a million wave 2 access points sold during those months.+ALSO ON NETWORK WORLD: Facebook gets 2017 tech industry Year in Apologies rolling + Donald Trump offers cybersecurity warning: 'No computer is safe'To read this article in full or to leave a comment, please click here
In recognition of the increasingly central role open source technology has played for the networking sector, the Linux Foundation today named Arpit Joshipura as its general manager for networking and orchestration.
Joshipura, a veteran tech executive who has worked at Dell, Ericsson, and Nortel, among others, is considered by the organization to be a foundational contributor to open source software in general and networking in particular. Currently, he’s the chief marketing officer for Prevoty, an application security startup in Los Angeles.
+ ALSO ON NETWORK WORLD: Say goodbye to MS-DOS command prompt | Trump’s plan for protecting IT jobs raises hopes, fears +To read this article in full or to leave a comment, please click here
One year ago, 14 people were killed and 22 injured by a husband-and-wife pair of domestic terrorists who attacked a training session of government employees in San Bernardino, Calif. Although the perpetrators were killed in a gun battle with law enforcement within hours of the attack, the FBI’s interest in one terrorist’s iPhone precipitated a public standoff with Apple that captured its own share of national headlines.To read this article in full or to leave a comment, please click here
The Raspberry Pi is a happy-go-lucky little gizmo, isn’t it? I always associate it with education, cheap ways to get kids into programming, innocent little hobbyist projects and general “the world is a nice place” activity. And not unreasonably.Surely nobody would turn such an innocuous gadget into something malicious or dangerous, ri-oh, wait I forgot what sort of world we were living in for just a moment:Yeah, it’s some sort of missile guidance system, according to the string of Russian-language LiveJournal pages credited by Popular Mechanics, whose original report can be found here. Popular Mechanics says there’s hints in there that the weapon is guided by sound, which would be highly unusual for a weapon that isn’t designed to attack, say, submarines.To read this article in full or to leave a comment, please click here
The Raspberry Pi is a happy-go-lucky little gizmo, isn’t it? I always associate it with education, cheap ways to get kids into programming, innocent little hobbyist projects and general “the world is a nice place” activity. And not unreasonably.Surely nobody would turn such an innocuous gadget into something malicious or dangerous, ri-oh, wait I forgot what sort of world we were living in for just a moment:Yeah, it’s some sort of missile guidance system, according to the string of Russian-language LiveJournal pages credited by Popular Mechanics, whose original report can be found here. Popular Mechanics says there’s hints in there that the weapon is guided by sound, which would be highly unusual for a weapon that isn’t designed to attack, say, submarines.To read this article in full or to leave a comment, please click here
The concept of 5G wireless has been around for a long time, but only recently have meaningful moves taken place to bring the new technology to customers.5G stakeholders – which include silicon giants such as Qualcomm and Intel, infrastructure players like Ericsson and Nokia, and, of course the major wireless carriers – have been unsurprisingly bullish on the technology’s rapid advance, announcing numerous breakthroughs and field trials over the past several months. We’ve constructed a timeline of these 5G trials, embedded below, to give you a visual sense of how much action has been taking place.+ MORE: Read our 5G FAQ +To read this article in full or to leave a comment, please click here
The concept of 5G wireless has been around for a long time, but only recently have meaningful moves taken place to bring the new technology to customers.5G stakeholders – which include silicon giants such as Qualcomm and Intel, infrastructure players like Ericsson and Nokia, and, of course the major wireless carriers – have been unsurprisingly bullish on the technology’s rapid advance, announcing numerous breakthroughs and field trials over the past several months. We’ve constructed a timeline of these 5G trials, embedded below, to give you a visual sense of how much action has been taking place.+ MORE: Read our 5G FAQ +To read this article in full or to leave a comment, please click here
So what is 5G, exactly, anyway?
Well, if you’re asking about “exactly,” it doesn’t exist yet.
Oh, that helps me a lot.
Sorry. But the best answer to your question is probably that 5G is sort of a catch-all name to describe the next generation of carrier wireless technology that’s going to be slinging tweets and videos and connected home signals from the internet to your smartphone or your smartwatch or, really, any smart object you’ve got handy.
So why’s it better than 4G? Haven’t we had enough Gs?
Oh, not hardly. You see, 5G – like 4G, and the rest of the Gs, in fact – is entirely a marketing term, meant to give an overview of a certain generation of carrier wireless tech. Most of what we’ve got in this country that we refer to as 4G is called LTE, although regular LTE isn’t quite 4G, according to standards groups, and LTE Advanced.To read this article in full or to leave a comment, please click here
A vulnerability in a multimedia framework present on Version 12.04.5 of Ubuntu can be exploited by sound files meant to be played on the venerable Nintendo Entertainment System, according to security researcher Chris Evans.
The vulnerability is the result of a flaw in an audio decoder called libgstnsf.so, which allows gstreamer Version 0.10 to play the NSF files that the NES uses for music. NSF files, when played, use the host system’s hardware to create a virtualized version of the NES’ old 6502 processor and sound hardware in real time.
+ALSO ON NETWORK WORLD: Cool Yule Tools 2016: Digital disruption at Santa's Workshop + Android deems Instagram worthy of its presenceTo read this article in full or to leave a comment, please click here
A vulnerability in a multimedia framework present on Version 12.04.5 of Ubuntu can be exploited by sound files meant to be played on the venerable Nintendo Entertainment System, according to security researcher Chris Evans.
The vulnerability is the result of a flaw in an audio decoder called libgstnsf.so, which allows gstreamer Version 0.10 to play the NSF files that the NES uses for music. NSF files, when played, use the host system’s hardware to create a virtualized version of the NES’ old 6502 processor and sound hardware in real time.
+ALSO ON NETWORK WORLD: Cool Yule Tools 2016: Digital disruption at Santa's Workshop + Android deems Instagram worthy of its presenceTo read this article in full or to leave a comment, please click here
Fast and powerfulThe twice-annual Top500 list of the most powerful supercomputers in the world (adjudged by their performance on the Linpack benchmark) is out this morning, and there are a pair of newcomers on the list. Check it out.TrinityImage by Los Alamos National LaboratoryTo read this article in full or to leave a comment, please click here
Fast and powerfulThe twice-annual Top500 list of the most powerful supercomputers in the world (adjudged by their performance on the Linpack benchmark) is out this morning, and there are a pair of newcomers on the list. Check it out.TrinityImage by Los Alamos National LaboratoryTo read this article in full or to leave a comment, please click here