Archive

Category Archives for "Network World SDN"

Future Intel CPUs could be cobbled together using different parts

Today’s processors, made using a single continuous slab of silicon, may soon give way to multiple chips interconnected at high speeds, Intel said Tuesday morning.Intel said its new Embedded Multi-die Interconnect Bridge, or EMIB, technology would let a 22nm chip connect to a 10nm chip and a 14nm chip, all on the same processor.“For example, we can mix high-performance blocks of silicon and IP together with low-power elements made from different nodes for extreme optimization,” said Intel’s Murthy Renduchintala, who heads the Client, IoT, and Systems Architecture Group.That’s a radical departure from how the company has constructed most CPUs and SoCs, where all components of a CPU or SoC are built on the same process. To read this article in full or to leave a comment, please click here

Windows 10’s next major update arrives April 11

After months of waiting, beta tests, and trickles of information about new features, the next major update for Windows 10 will arrive on April 11. Microsoft announced Wednesday that the Creators Update, as it’s known, will start rolling out to users of the company’s latest operating system in roughly two weeks.The update includes a slew of new features, including changes to the Microsoft Edge browser, improvements to gaming on Windows 10 and more features for devices with touch screens. As the name implies, the Creators Update includes new tools for people who make and consume media on their PCs, including a new Paint3D app that updates Microsoft’s classic drawing tool to create three-dimensional models.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cloud Foundry Foundation launches developer certification

Many years ago I created and ran the CloudU program, a vendor-neutral cloud education initiative that, in its day, had many thousands of individuals participate and graduate from the program. The rationale for creating the program back then was what I saw occurring in the industry: much interest in cloud as a concept, but little understanding of what it actually is and how to use it. Bear in mind this was years ago, before cloud became the default position for everything.RELATED: 10 tech skills that will boost your salary The idea of providing education programs to help individuals transition into a new way of thinking and working is a good one. A similar situation exists today with the move away from server-based infrastructures (be they physical or virtual) and into container or serverless-based approaches. Essentially we’re seeing challenges around the understanding and implementation of new “cloud native” ways of building applications.To read this article in full or to leave a comment, please click here

Pajama-wearing remote worker stereotypes shattered

A recent satirical piece in the New Yorker played the stereotypical remote worker for laughs -- disheveled, disoriented, starved for human contact, still in his pajamas after who-knows-how-many-days. Unproductive, he calls 911 for help. While it's hilarious -- and for those who work from home, there's certainly a few grains of truth buried within -- new research from Future Workplace and Polycom might finally put to rest the perception that remote workers are lazy, anti-social and unproductive.The report, The Human Face of Remote Working, polled 25,234 employees across 12 countries, including the U.S., Canada, Brazil, Japan, the UK, India, Singapore, Germany, Russia, France, Australia and China. Of the respondents, 55 percent held managerial or higher job titles; 58 percent are responsible for care in some capacity and 68 percent are parents. The study found that despite the remote working stigma of laziness and isolation, remote workers are more empathetic, desire human connection and pick up the phone more than their in-office counterparts.To read this article in full or to leave a comment, please click here

Review: Windows 10 Creators Update is worth waiting for

Windows 10 Creators Update is coming for you, and it will get you sooner or later. The question is whether to embrace Creators Update immediately or to wait a few months until the bugs get worked out—because, as we learned with Anniversary Update, there will be bugs.Many who rushed to Anniversary Update paid the price with inexplicable freezes, broken antivirus utilities, stalled or disabled apps, disappearing volumes and drives, changed settings, and a legion of installation problems. No doubt many of those users wished they had waited the four months for Anniversary Update to reach Current Branch for Business status—Microsoft’s designation for builds that are finally stable enough for enterprise deployment.To read this article in full or to leave a comment, please click here

RIP Raimund Genes, Trend Micro CTO

I learned this past Saturday that my good friend and Trend Micro CTO, Raimund Genes, passed away suddenly last week.  Raimund was only 54.If you were lucky enough to cross paths with Raimund, you probably share my profound sorrow at his passing.  For those who never had the pleasure of a meeting, allow me to provide a few thoughts about him: I first met Raimund at an industry event where he was supposed to go through a PowerPoint presentation with me.  Upon shaking my hand, he said something like, “let’s skip the formalities of a canned presentation, go to the bar, get a drink, and just talk.”  We did have a drink at the bar that day, but what I remember most was an hour of insightful and entertaining banter.  He was both informal and informative simultaneously and we immediately connected. One of the things that I love about my job is that I get to speak to some of the smartest cybersecurity people – professionals, researchers, technology vendors, legislators, etc. – on a regular basis.  Out of this exceptional population however, some people stand out.  I call these folks my “beacons” Continue reading

9 biggest information security threats through 2019

The information security threat landscape is constantly evolving. To help you navigate the terrain, each year the Information Security Forum (ISF) — a nonprofit association that researches and analyzes security and risk management issues on behalf of its members — puts out its Threat Horizon report to provide members with a forward-looking view of the biggest security threats over a two-year period. What follows are the nine biggest threats on the horizon through 2019 that your organization may have to manage and mitigate.Theme 1: Disruption from an over-reliance on fragile connectivity Organizations today depend of instant and uninterrupted connectivity, smart physical devices and trustworthy people. But that dependence makes them vulnerable to attacks on core internet infrastructure, devices used in daily business and key people with access to mission-critical information.To read this article in full or to leave a comment, please click here

Refurbishing Samsung Note7s for resale is a ‘disastrous’ plan, analyst says

Just two days before Samsung's launch of the Galaxy S8 on Wednesday, the company announced it will consider using some recalled Galaxy Note7 smartphones for re-sale as refurbished or as rental phones.One analyst bashed the plan as "disastrous," while another said Samsung is performing a "balancing act" following the Note7 fallout when some units overheated and caught fire.Samsung also said in a statement on Monday that it could detach salvageable components from the Note7s for reuse. It may also extract metals like copper, gold, silver and nickel from the devices using environmentally friendly methods.To read this article in full or to leave a comment, please click here

Report: Samsung’s flagship smartphones tank just before Galaxy S8 launch

A financial report cited by South Korea’s Yonhap News says that Samsung’s higher-end smartphones are accounting for a rapidly decreasing share of the company’s sales.Premium smartphones account for just 29% of Samsung’s smartphone sales, down from 75% in mid-2013, Yonhap quotes a Hana Financial Investment report as saying. The disastrous battery problems experienced by the Samsung Galaxy Note 7 undoubtedly have a lot to do with the company’s shrinking premium device sales, but the report indicates that those sales were already in decline before the Note 7 incidents began to attract widespread negative publicity.To read this article in full or to leave a comment, please click here

Amazon Connect brings contact centers to the cloud

Amazon today released Connect, a contact center as a service offering hosted in the Amazon Web Services cloud.The move represents AWS attempting to jump into a burgeoning market for cloud-based contact center software, while continuing to push AWS into the enterprise communications market. Just last month AWS announced Chime, a cloud-based Unified Communication as a Service (UCaaS) offering.+MORE AT NETWORK WORLD: Amazon Web Services vs. Microsoft Azure vs. Google Cloud Platform | This is not the sort of publicity Avaya was seeking +To read this article in full or to leave a comment, please click here

Being a Linux user isn’t weird anymore

A few days ago, I was down at the Starbucks in my local bookstore—sipping on a hot chocolate, using the free (but rather pokey) Wi-Fi, and getting some work done.This is pretty typical for me. Since I work from home, it’s nice to get out of the house and shake things up a little bit. Working for a few hours at a coffee shop tends to be just about right. I’m not the only person in the world who uses coffee shops as short term offices—it’s become so normal, it’s almost a cliché.The one thing that typically sets me apart from the other people working from any given coffee shop is my computer. I run Linux (currently openSUSE with GNOME). And often, I’ll have some sort of unusual Linux-powered gadget with me (such as my PocketCHIP or my trusty old Nokia N810). To read this article in full or to leave a comment, please click here

The insecurities list: 10 ways to improve cybersecurity

A friend asked me to list all of the cybersecurity things that bug me and what he should be diligent about regarding user security. We talked about access control lists, MAC layer spoofing, and a bunch of other topics and why they mattered. You should come up with a list of head-desk things.After a bit of thought, here’s a list. It’s by NO means comprehensive, and it’s not an organized best practices document. Instead, these are marbles that roll around in my head and bother me a lot.1. Ban and route to null t.co, bit.ly, and other URL shorteners Why? Especially in phishing emails, a user has no idea where the link is going, what’s behind that link, or what kind of benevolent or conversely malicious payload is going to load in the default browser. Sure, your anti-malware or antivirus tool, or even the browser’s own instinct, might prevent a page load that opens a back door into your network. Maybe.To read this article in full or to leave a comment, please click here

Windows Insider Program surpasses 10 million users

Microsoft announced that the Windows Insider Program—its global community of testers who run interim builds of Windows 10 and serve as beta testers/guinea pigs for what might be an unstable build on their personal machines—has passed the 10 million mark.It's taken a while to get here after a fast start. The program launched in September 2014 with the modest hopes of getting 400,000 enthusiasts on board. Instead, it hit 1 million after a few weeks. Back in August 2015, the number stood at 6 million people, and less than a month later Microsoft said it was up to 7 million.RELATED: 11 hidden tips and tweaks for Windows 10 Then things got quiet. Clearly an 18-month lag between the 7 million and 10 million mark means things plateaued, and perhaps Microsoft didn't want to admit it. To read this article in full or to leave a comment, please click here

LastPass is scrambling to fix another serious vulnerability

For the second time in two weeks developers of the popular LastPass password manager are working to fix a serious vulnerability that could allow malicious websites to steal user passwords or infect computers with malware.Like the LastPass flaws patched last week, the new issue was discovered and reported to LastPass by Tavis Ormandy, a researcher with Google's Project Zero team. The researcher revealed the vulnerability's existence in a message on Twitter, but didn't publish any technical details about it that could allow attackers to exploit it.To read this article in full or to leave a comment, please click here

Malware infection rate of smartphones is soaring – Android devices often the target

Smartphones are by far the most popular target of mobile malware, and the infection rate is soaring, according to new research by Nokia.During the second half of 2016, the increase in smartphone infections was 83% following on the heels of a 96% increase during the first half of the year, according to Nokia’s latest Mobile Threat Intelligence Report gathered from devices on which Nokia NetGuard Endpoint Security is deployed in Europe, North America, Asia Pacific and the Middle East.+More on Network World:  Cisco Talos warns of Apple iOS and MacOS X.509 certificate flaw+To read this article in full or to leave a comment, please click here

44% off Smartphone Screen Magnifier with Foldable Stand – Deal Alert

Enlarge your smartphone's display and watch a bigger screen at a longer distance, minimizing eye fatigue. The magnifier with integrated stand is designed to be foldable, lightweight and portable. It currently averages 4.5 out of 5 stars from almost 500 reviewers on Amazon (read reviews), where its list price of $26.99 is currently discounted 44% to just $14.99. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

How politics is impacting your company’s productivity

It's difficult to escape politics in America -- the Trump administration dominates the network news cycle, social media feeds and nearly every corner of pop culture. And it's starting to affect the workplace, according to a survey of 500 full-time U.S. employees by Wakefield Research in conjunction with BetterWorks, a company that offers performance management software.The results found that 87 percent of employees "read political social media posts at work," while 80 percent said they have discussed politics with professional contacts or colleagues. Meanwhile, nearly half said they had seen a political conversation turn into an argument at work.To read this article in full or to leave a comment, please click here