A math storyImage by NASAThe film Hidden Figures details an inspiring story about three particular African-American women mathematicians who were highly indispensable to the achievement of early spaceflight. The movie also involves some cool old mainframes and other high tech gear. Take a gander.To read this article in full or to leave a comment, please click here
A significantly zany yearImage by Reuters/ Thomas PeterAs we close out the year and look at some of the, shall we say more interesting, stories of the year we find quite a tech collection. Everything from NASA’s poop challenge and the most significant advances in Ethernet’s illustrious history to the rise of robot doctor overlords. Take a look at 30 of the year's weirdest, wackiest and coolest sci/tech stories.To read this article in full or to leave a comment, please click here
A significantly zany yearImage by Reuters/ Thomas PeterAs we close out the year and look at some of the, shall we say more interesting, stories of the year we find quite a tech collection. Everything from NASA’s poop challenge and the most significant advances in Ethernet’s illustrious history to the rise of robot doctor overlords. Take a look at 30 of the year's weirdest, wackiest and coolest sci/tech stories.To read this article in full or to leave a comment, please click here
Interesting posts this week from a few Cisco executives taking a look forward into what should be a very interesting networking world in 2017.+More on Network World: 5 enterprise technologies that will shake things up in 2017+First up was Cisco’s Jeff Reed, Senior Vice President Enterprise Infrastructure and Solutions Group who had a blog on the top 10 list for future 2017 network trends. It reads as follow:To read this article in full or to leave a comment, please click here
Interesting posts this week from a few Cisco executives taking a look forward into what should be a very interesting networking world in 2017.+More on Network World: 5 enterprise technologies that will shake things up in 2017+First up was Cisco’s Jeff Reed, Senior Vice President Enterprise Infrastructure and Solutions Group who had a blog on the top 10 list for future 2017 network trends. It reads as follow:To read this article in full or to leave a comment, please click here
Interesting posts this week from a few Cisco executives taking a look forward into what should be a very interesting networking world in 2017.+More on Network World: 5 enterprise technologies that will shake things up in 2017+First up was Cisco’s Jeff Reed, Senior Vice President Enterprise Infrastructure and Solutions Group who had a blog on the top 10 list for future 2017 network trends. It reads as follow:To read this article in full or to leave a comment, please click here
It may be a brave new world in 2017 but it’s also a darn scary one for IT security professionals.READ MORE ON NETWORK WORLD: 5 enterprise technologies that will shake things up in 2017+Just take a look at some recent Gartner assessments of the security situation:
By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk.
By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016.
By 2018, 25% of corporate data traffic will flow directly from mobile devices to the cloud, bypassing enterprise security controls.
Through 2018, over 50% of IoT device manufacturers will not be able to address threats from weak authentication practices.
So what technologies are going to change this scenario back in favor of IT? The new security AAA: Automation, analytics and artificial intelligence say proponents.To read this article in full or to leave a comment, please click here
It may be a brave new world in 2017 but it’s also a darn scary one for IT security professionals.READ MORE ON NETWORK WORLD: 5 enterprise technologies that will shake things up in 2017+Just take a look at some recent Gartner assessments of the security situation:
By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk.
By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016.
By 2018, 25% of corporate data traffic will flow directly from mobile devices to the cloud, bypassing enterprise security controls.
Through 2018, over 50% of IoT device manufacturers will not be able to address threats from weak authentication practices.
So what technologies are going to change this scenario back in favor of IT? The new security AAA: Automation, analytics and artificial intelligence say proponents.To read this article in full or to leave a comment, please click here
It may be a brave new world in 2017 but it’s also a darn scary one for IT security professionals.READ MORE ON NETWORK WORLD: 5 enterprise technologies that will shake things up in 2017+Just take a look at some recent Gartner assessments of the security situation:
By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk.
By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016.
By 2018, 25% of corporate data traffic will flow directly from mobile devices to the cloud, bypassing enterprise security controls.
Through 2018, over 50% of IoT device manufacturers will not be able to address threats from weak authentication practices.
So what technologies are going to change this scenario back in favor of IT? The new security AAA: Automation, analytics and artificial intelligence say proponents.To read this article in full or to leave a comment, please click here
It may be a brave new world in 2017 but it’s also a darn scary one for IT security professionals.READ MORE ON NETWORK WORLD: 5 enterprise technologies that will shake things up in 2017+Just take a look at some recent Gartner assessments of the security situation:
By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk.
By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016.
By 2018, 25% of corporate data traffic will flow directly from mobile devices to the cloud, bypassing enterprise security controls.
Through 2018, over 50% of IoT device manufacturers will not be able to address threats from weak authentication practices.
So what technologies are going to change this scenario back in favor of IT? The new security AAA: Automation, analytics and artificial intelligence say proponents.To read this article in full or to leave a comment, please click here
In rejecting a $335 million damage award to Cisco, a California jury gave Arista Networks a key verdict in part of the expansive patent infringement lawsuit the two networking companies are fighting over.While the jury found Arista had copied some of Cisco Command Line Interface it declined it declined to award in damages. The jury also found that Arista did not infringe the single patent remaining in the case as well as Cisco’s asserted copyrights in its user manuals.+More on Network World: Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety+To read this article in full or to leave a comment, please click here
In rejecting a $335 million damage award to Cisco, a California jury gave Arista Networks a key verdict in part of the expansive patent infringement lawsuit the two networking companies are fighting over.While the jury found Arista had copied some of Cisco Command Line Interface it declined to award in damages. The jury also found that Arista did not infringe the single patent remaining in the case as well as Cisco’s asserted copyrights in its user manuals.+More on Network World: Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety+To read this article in full or to leave a comment, please click here
IBM and NASA have had one of the longest, most successful relationships in the high-tech world and it looks like the future holds much the same.While the relationship has its roots in the very beginnings of the space program as well as large-scale computing, its current incarnation in many cases revolves around the cognitive computing specialties found in IBM’s Watson system.+More on Network World: NASA: Top 10 space junk missions+Watson uses machine learning and natural language and image recognition to develop all manner of intelligent answers to tough challenges. The system has been successfully deployed in the healthcare industry where the system has become a trusted adviser to hospitals and research centers working for people fighting cancer. The CBS news program “60 Minutes” recently devoted a large segment on Watson and the success it has had in this battle (See more here).To read this article in full or to leave a comment, please click here
IBM and NASA have had one of the longest, most successful relationships in the high-tech world and it looks like the future holds much the same.While the relationship has its roots in the very beginnings of the space program as well as large-scale computing, its current incarnation in many cases revolves around the cognitive computing specialties found in IBM’s Watson system. The forthcoming movie Hidden Figures in fact shows some of the earliest IBM and NASA computing interactions. Hidden Figures follows a group of African-American female mathematicians who calculated flight trajectories on IBM computers for John Glenn's first orbital flight in 1962.To read this article in full or to leave a comment, please click here
Looking to put a high-tech solution to a deadly problem the U.S. Department of Transportation has issued a proposed rule to standardize the development and implementation of vehicle communications technologies in cars and trucks. The idea is to enable a multitude of new crash-avoidance applications that could save lives by preventing “hundreds of thousands of crashes every year by helping vehicles “talk” to each other,” the DOT stated.+More on Network World: Six key challenges loom over car communication technology+To read this article in full or to leave a comment, please click here
Looking to put a high-tech solution to a deadly problem the U.S. Department of Transportation has issued a proposed rule to standardize the development and implementation of vehicle communications technologies in cars and trucks. The idea is to enable a multitude of new crash-avoidance applications that could save lives by preventing “hundreds of thousands of crashes every year by helping vehicles “talk” to each other,” the DOT stated.+More on Network World: Six key challenges loom over car communication technology+To read this article in full or to leave a comment, please click here
A US trade judge ruled today that Arista Networks infringed on two Cisco switch patents – the second important victory the networking giant has won against Arista in their ongoing legal confrontation since it began in 2014.U.S. International Trade Commission Judge MaryJoan McNamara issued the so-called “initial determination” on the case which now must be reviewed by the ITC. In the end should the ITC find against Arista its switches could once again be banned from import into the US. The ITC you may recall ruled against Arista in another part of this case and between June and August the company could not import those products. In November Arista announced that US Customs has given it permission to resume importing its networking gear in the United States.To read this article in full or to leave a comment, please click here
A US trade judge ruled today that Arista Networks infringed on two Cisco switch patents – the second important victory the networking giant has won against Arista in their ongoing legal confrontation since it began in 2014.U.S. International Trade Commission Judge MaryJoan McNamara issued the so-called “initial determination” on the case which now must be reviewed by the ITC. In the end should the ITC find against Arista its switches could once again be banned from import into the US. The ITC you may recall ruled against Arista in another part of this case and between June and August the company could not import those products. In November Arista announced that US Customs has given it permission to resume importing its networking gear in the United States.To read this article in full or to leave a comment, please click here
A US trade judge ruled today that Arista Networks infringed on two Cisco switch patents – the second important victory the networking giant has won against Arista in their ongoing legal confrontation since it began in 2014.U.S. International Trade Commission Judge MaryJoan McNamara issued the so-called “initial determination” on the case which now must be reviewed by the ITC. In the end should the ITC find against Arista its switches could once again be banned from import into the US. The ITC you may recall ruled against Arista in another part of this case and between June and August the company could not import those products. In November Arista announced that US Customs has given it permission to resume importing its networking gear in the United States.To read this article in full or to leave a comment, please click here
Cisco’s Talos security group this week warned that a variant of trojan monster Zeus has begun to garner a following in the cyber-underworld as a hard-to-detect attack mechanism.“[Floki bot] is based on the same codebase that was used by the infamous Zeus trojan, the source code of which was leaked in 2011. Rather than simply copying the features that were present within the Zeus trojan ‘as-is’, Floki Bot claims to feature several new capabilities making it an attractive tool for criminals,” Talos wrote.+More on Network World: 20 years ago: Hot sci/tech images from 1996+To read this article in full or to leave a comment, please click here