Michael Cooney

Author Archives: Michael Cooney

Quick look: Cisco Tetration Analytics

Deeper understandingTetration Analytics gathers information from hardware and software sensors and analyzes the information using big data analytics. The system promises to give IT managers a deeper understanding of their data center resources as well as simplify operational reliability, application migrations to SDN and the cloud as well as security montoring. (Read the full story to Cisco's new platform.)To read this article in full or to leave a comment, please click here

Quick look: Cisco Tetration Analytics

Deeper understandingTetration Analytics gathers information from hardware and software sensors and analyzes the information using big data analytics. The system promises to give IT managers a deeper understanding of their data center resources as well as simplify operational reliability, application migrations to SDN and the cloud as well as security montoring. (Read the full story to Cisco's new platform.)To read this article in full or to leave a comment, please click here

Quick look: Cisco Tetration Analytics

Deeper understandingTetration Analytics gathers information from hardware and software sensors and analyzes the information using big data analytics. The system promises to give IT managers a deeper understanding of their data center resources as well as simplify operational reliability, application migrations to SDN and the cloud as well as security montoring. (Read the full story to Cisco's new platform.)To read this article in full or to leave a comment, please click here

Cisco platform lets IT rein-in disruptive data center operations, security, applications

Two years in the making, Cisco today rolled out a turnkey, full-rack appliance that promises to do just about everything it takes to control a data center -- from easing IT operations and controlling security to application monitoring.The platform, Cisco Tetration Analytics gathers information from hardware and software sensors and analyzes the information using big data analytics and machine learning to offer IT managers a deeper understanding of their data center resources. The system will dramatically simplify operational reliability, application migrations to SDN and the cloud as well as security monitoring, said Yogesh Kaushik, Cisco senior director of product management, Tetration.To read this article in full or to leave a comment, please click here

Cisco platform lets IT rein-in disruptive data center operations, security, applications

Two years in the making, Cisco today rolled out a turnkey, full-rack appliance that promises to do just about everything it takes to control a data center -- from easing IT operations and controlling security to application monitoring.The platform, Cisco Tetration Analytics gathers information from hardware and software sensors and analyzes the information using big data analytics and machine learning to offer IT managers a deeper understanding of their data center resources. The system will dramatically simplify operational reliability, application migrations to SDN and the cloud as well as security monitoring, said Yogesh Kaushik, Cisco senior director of product management, Tetration.To read this article in full or to leave a comment, please click here

Cisco platform lets IT rein-in disruptive data center operations, security, applications

Two years in the making, Cisco today rolled out a turnkey, full-rack appliance that promises to do just about everything it takes to control a data center -- from easing IT operations and controlling security to application monitoring.The platform, Cisco Tetration Analytics gathers information from hardware and software sensors and analyzes the information using big data analytics and machine learning to offer IT managers a deeper understanding of their data center resources. The system will dramatically simplify operational reliability, application migrations to SDN and the cloud as well as security monitoring, said Yogesh Kaushik, Cisco senior director of product management, Tetration.To read this article in full or to leave a comment, please click here

FBI: Business e-mail scam losses top $3 billion, a 1,300% increase in since Jan.

The FBI’s Internet Crime Complaint Center (IC3) this week said the scourge it calls the Business Email Compromise continues to rack-up victims and money – over $3 billion in losses so far.+More on Network World: FBI/FTC: Watch those e-mails from your “CEO”+The BEC scam is typically carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion to conduct unauthorized transfers of funds, the IC3 stated.The impact of the scam is detailed I the IC3 stats released this week including:To read this article in full or to leave a comment, please click here

NASA describes out of this world data glitch that almost finished its planet hunter

NASA’s highly successful Kepler space telescope has had more than its share of near fatal experiences.The latest happened in April when the spacecraft went into “Emergency Mode” which among other things allows for priority access to ground-based communications via NASA’s Deep Space Network. NASA noted at the time that the spacecraft is nearly 75 million miles from Earth, making the communication slow. Even at the speed of light, it takes 13 minutes for a signal to travel to the spacecraft and back.The spacecraft has since returned to normal function.To read this article in full or to leave a comment, please click here

National Intelligence office wants to perfect the art of security deception

Sometimes a great offense is much better than a stout defense, especially when it comes to protecting enterprise assets.This week the advanced technology developers from the Intelligence Advance Research Projects Activity (IARPA) office put out a Request For Information about how to best develop better denial and deception technologies – such as honeypots or deception servers for example -- that would bolster cyber security.To read this article in full or to leave a comment, please click here

National Intelligence office wants to perfect the art of security deception

Sometimes a great offense is much better than a stout defense, especially when it comes to protecting enterprise assets.This week the advanced technology developers from the Intelligence Advance Research Projects Activity (IARPA) office put out a Request For Information about how to best develop better denial and deception technologies – such as honeypots or deception servers for example -- that would bolster cyber security.To read this article in full or to leave a comment, please click here

US intelligence unit to advance management of virtual desktop security, systems

Getting a handle on cloud-based virtual operations is no easy task. Next month researchers from the Intelligence Advance Research Projects Activity (IARPA) will introduce a new program that looks to address that management concern by developing better technology to manage and secure Virtual Desktop Infrastructure (VDI) environments.+More on Network World: Intelligence agency wants computer scientists to develop brain-like computers+IARPA, the radical research arm of the of the Office of the Director of National Intelligence will introduce the Virtuous User Environment (VirtUE) which it says aims to “creatively define and develop user environments that are more dynamic, secure, auditable, transferrable, and efficient than the current offerings provided by traditional physical workstations and commercial VDI; develop innovative, dynamic analytics and infrastructures that can leverage these newly developed user environments to both automatically detect and deter security threats that IC user environments will be subject to in the new cloud infrastructure.”To read this article in full or to leave a comment, please click here

US intelligence unit to advance management of virtual desktop security, systems

Getting a handle on cloud-based virtual operations is no easy task. Next month researchers from the Intelligence Advance Research Projects Activity (IARPA) will introduce a new program that looks to address that management concern by developing better technology to manage and secure Virtual Desktop Infrastructure (VDI) environments.+More on Network World: Intelligence agency wants computer scientists to develop brain-like computers+IARPA, the radical research arm of the of the Office of the Director of National Intelligence will introduce the Virtuous User Environment (VirtUE) which it says aims to “creatively define and develop user environments that are more dynamic, secure, auditable, transferrable, and efficient than the current offerings provided by traditional physical workstations and commercial VDI; develop innovative, dynamic analytics and infrastructures that can leverage these newly developed user environments to both automatically detect and deter security threats that IC user environments will be subject to in the new cloud infrastructure.”To read this article in full or to leave a comment, please click here

US intelligence unit to advance management of virtual desktop security, systems

Getting a handle on cloud-based virtual operations is no easy task. Next month researchers from the Intelligence Advance Research Projects Activity (IARPA) will introduce a new program that looks to address that management concern by developing better technology to manage and secure Virtual Desktop Infrastructure (VDI) environments.+More on Network World: Intelligence agency wants computer scientists to develop brain-like computers+IARPA, the radical research arm of the of the Office of the Director of National Intelligence will introduce the Virtuous User Environment (VirtUE) which it says aims to “creatively define and develop user environments that are more dynamic, secure, auditable, transferrable, and efficient than the current offerings provided by traditional physical workstations and commercial VDI; develop innovative, dynamic analytics and infrastructures that can leverage these newly developed user environments to both automatically detect and deter security threats that IC user environments will be subject to in the new cloud infrastructure.”To read this article in full or to leave a comment, please click here

Cisco: IP traffic will surpass the zettabyte level in 2016

IP traffic will grow in a massive way as 10 billion new devices come online over the next five years.Those are just a couple of the amazing facts found in Cisco’s 11th annual Visual Networking Index look at all things in the communications world.+More on Network World: The most momentous tech events of the past 30 years+To read this article in full or to leave a comment, please click here

Cisco: IP traffic will surpass the zettabyte level in 2016

IP traffic will grow in a massive way as 10 billion new devices come online over the next five years. Those are just a couple of the amazing facts found in Cisco’s 11th annual Visual Networking Index look at all things in the communications world. +More on Network World: The most momentous tech events of the past 30 years+To read this article in full or to leave a comment, please click here

Cisco: IP traffic will surpass the zettabyte level in 2016

IP traffic will grow in a massive way as 10 billion new devices come online over the next five years. Those are just a couple of the amazing facts found in Cisco’s 11th annual Visual Networking Index look at all things in the communications world. +More on Network World: The most momentous tech events of the past 30 years+To read this article in full or to leave a comment, please click here

Cisco: IP traffic will surpass the zettabyte level in 2016

IP traffic will grow in a massive way as 10 billion new devices come online over the next five years. Those are just a couple of the amazing facts found in Cisco’s 11th annual Visual Networking Index look at all things in the communications world. +More on Network World: The most momentous tech events of the past 30 years+To read this article in full or to leave a comment, please click here

OpenSwitch finds critical home at Linux Foundation

The OpenSwitch Project took a significant development step this week when it became the first full feature network operating system project of the Linux Foundation.+More on Network World: Feeling jammed? Not like this I bet+The move gives OpenSwitch a neutral home where it can receive all the necessary support for long-term growth and sustainability – including back-office, technical infrastructure and ecosystem development services, said Michael Dolan, VP of Strategic Programs at The Linux Foundation.While the Linux Foundation hosts other projects in the networking space, the addition of OpenSwitch makes available a complete NOS solution, from the ASIC drivers to the APIs,’ that will run on reference hardware and in hypervisors, he stated.To read this article in full or to leave a comment, please click here

OpenSwitch finds critical home at Linux Foundation

The OpenSwitch Project took a significant development step this week when it became the first full feature network operating system project of the Linux Foundation.+More on Network World: Feeling jammed? Not like this I bet+The move gives OpenSwitch a neutral home where it can receive all the necessary support for long-term growth and sustainability – including back-office, technical infrastructure and ecosystem development services, said Michael Dolan, VP of Strategic Programs at The Linux Foundation.While the Linux Foundation hosts other projects in the networking space, the addition of OpenSwitch makes available a complete NOS solution, from the ASIC drivers to the APIs,’ that will run on reference hardware and in hypervisors, he stated.To read this article in full or to leave a comment, please click here

OpenSwitch finds critical home at Linux Foundation

The OpenSwitch Project took a significant development step this week when it became the first full feature network operating system project of the Linux Foundation.+More on Network World: Feeling jammed? Not like this I bet+The move gives OpenSwitch a neutral home where it can receive all the necessary support for long-term growth and sustainability – including back-office, technical infrastructure and ecosystem development services, said Michael Dolan, VP of Strategic Programs at The Linux Foundation.While the Linux Foundation hosts other projects in the networking space, the addition of OpenSwitch makes available a complete NOS solution, from the ASIC drivers to the APIs,’ that will run on reference hardware and in hypervisors, he stated.To read this article in full or to leave a comment, please click here

1 66 67 68 69 70 83