Archive

Category Archives for "Network World SDN"

What’s Microsoft after with Windows Server on ARM?

It was unclear today exactly what kind of edge Microsoft might gain by partnering with Qualcomm and others to run Windows Server on ARM processors, an analyst said."Microsoft must see something that is interesting enough to port over Azure and Windows," said Patrick Moorhead, principal analyst at Moor Insights & Strategy, in a Wednesday interview. "But Qualcomm has not provided any details other than how many cores it has and that it's 10-nanometer, so I can't give any empirical comparison between it and, say, Intel."Today, Microsoft announced it was collaborating with Qualcomm, Cavium and other chip makers to use ARM in its own data centers to run cloud workloads. The Redmond, Wash. company did not discuss plans to move beyond internal applications. It has, however, pledged that the more general purpose Windows 10 will run on consumer- and business-grade personal computers.To read this article in full or to leave a comment, please click here

5G and beyond: National Science Foundation plunks down $6 million for advanced wireless research

The National Science Foundation today announced that it would hand out a total of $6.1 million in research funding for Northeastern University and US Ignite, Inc in a partnership designed to hasten the development of advanced wireless technologies.US Ignite is a non-profit dedicated to creating uses for futuristic wireless technology, and it will pair off with Northeastern University to create the Platforms for Advanced Wireless Research project office, working to perform vetting, documentation and management for projects under the PAWR program.“Through experimental research platforms that are at the scale of small cities and communities and designed by the U.S. academic and industry wireless research community, PAWR will explore robust new wireless devices, communication techniques, networks, systems and services that will revolutionize the nation's wireless systems,” the NSF stated.To read this article in full or to leave a comment, please click here

Comey: Strong encryption “shatters” privacy-security bargain

FBI Director James Comey told a Boston audience this morning that “ubiquitous strong encryption” – the kind now available on most smartphones and other digital devices – is threatening to undermine the “bargain” that he said has balanced privacy and security in the US since its founding. Actually, he went further, declaring that such default encryption “shatters” the bargain. “This is a big deal, and I urge you to continue to engage in a hard conversation about it. I love privacy, but I also love the bargain,” he said, noting that the FBI’s inability to crack encrypted devices means the investigative “room” where the agency works is increasingly growing dark, and therefore undermining security.To read this article in full or to leave a comment, please click here

How CRM buyers can negotiate the best deal

CRM software buyers should choose wisely the first time because the software becomes so embedded in the organization that switching to a different vendor is unlikely, according to procurement analysts at market research firm IBIS World Inc.To read this article in full or to leave a comment, please click here(Insider Story)

Senators push FCC to keep its net neutrality rules

The U.S. Federal Communications Commission should reverse course and keep the net neutrality rules it passed just two years ago, several Democratic senators said Wednesday.The FCC has not yet moved to repeal the regulations prohibiting broadband providers from selectively blocking or slowing web traffic, but the agency's new chairman, Republican Ajit Pai, has called the rules a "mistake."Broadband customers, however, still need the protections of the net neutrality rules, several Democratic members of the Senate Commerce, Science, and Transportation Committee said during a hearing.To read this article in full or to leave a comment, please click here

Microsoft and NVIDIA partner to bring GPUs to the public cloud

The cloud has been a core component of almost every organization's IT strategy for the past five years. However, I believe we are reaching a cloud “tipping point” where it will be used for dramatically different things than it has in the past.The first wave of cloud growth was fueled by organizations looking for a cheaper alternative to running servers on premises. The next wave of cloud growth will be driven by organizations looking to fundamentally change their businesses through the use of advanced technologies like machine learning and artificial intelligence (AI).Over the past year, we have seen a veritable cornucopia of AI use cases included playing poker and Go, writing news stories, filing insurance claims, driving cars and writing code. This current phase of cloud moves it from being a “nice to have” to an absolute, slam dunk, need to have as it’s almost impossible for a business to have the scale and elasticity required to power an AI platform.To read this article in full or to leave a comment, please click here

Juniper product development chief resigns, company resets engineering makeup

Juniper is reshaping some of its top executive roles as Jonathan Davidson, executive VP and general manager of the firm’s Development and Innovation group resigned from the company.Davidson, a former Cisco executive in charge products such as the Cisco 7200 and Enterprise ASR 1000 product management team joined Juniper in 2010 to lead the company’s Security, Switching and Solutions Business Unit. He ultimately became executive vice president and general manager of the Juniper Development and Innovation group, where he replaced Rami Rahim who is now the company’s CEO.To read this article in full or to leave a comment, please click here

Third-party releases ‘nano-patch’ for Microsoft zero day bug

The delay in last month's Patch Tuesday fixes has caused considerable angst given there were several known problems, including two disclosed by Google.Microsoft is on track, as far as we know, for a patch release next week, but one company isn't waiting. It has issued its own fix for a minor bug.A U.K. security company called ACROS Security has released what they call their first "nano-patch" for CVE-2017-0038, a bug in EMF image format parsing logic that does not adequately check image dimensions specified in the image file being parsed against the amount of pixels in the file.If image dimensions are large enough, the parser is tricked into reading memory contents beyond the memory-mapped EMF file being parsed. An attacker could use this vulnerability to steal sensitive data in memory or as an aid in other exploits when ASLR needs to be defeated.To read this article in full or to leave a comment, please click here

Microsoft’s Windows Server OS runs on ARM, with help from Qualcomm

Microsoft has warmed up to Qualcomm to make a Windows 10 PC based on its ARM chip, and now the companies are bringing Windows Server OS to ARM. For the first time ever, Microsoft is expected to show the Windows Server OS running on an ARM server. The server runs on Qualcomm's Centriq 2400, an ARM-based chip designed for cloud servers. The server is being shown at the Open Project Compute Summit being held in Santa Clara, California, on Wednesday and Thursday.The ARM-based Windows Server hardware is for Microsoft's internal use. No information was shared on when Windows Server would be available for ARM servers. The ARM-based Windows Server hardware is for Microsoft's internal use. The company didn't share information about when Windows Server would be available for ARM servers.To read this article in full or to leave a comment, please click here

Apple, Cisco, Microsoft and Samsung react to CIA targeting their products

From the trove of CIA documents dumped by WikiLeaks, we’ve heard a lot about attacks the agency could pull off against TVs and smartphones. Some of companies with targeted products have issued their initial responses.October 2014 notes discuss the CIA’s Embedded Devices Branch (EDB) and what it should target. For the “really non-technical,” the CIA would define “embedded systems” as “The Things in the Internet of Things.” But the fact that the CIA intended to exploit IoT should not surprise anyone, considering that in 2012, then-CIA Director David Petraeus said the CIA “cannot wait to spy on you” through your smart internet-connected devices.To read this article in full or to leave a comment, please click here

Review: JAM Voice speaker adds Amazon Alexa support

Amazon offers several options for people who want to experience the Echo/Alexa voice-controlled assistance technology. For $180 (or $130 if you buy the Amazon Tap) you can buy the full Amazon Echo speaker system; if you already own a Bluetooth speaker system you can get the $50 Echo Dot.If you’re not down with the Amazon hardware, you have another third-party option. The JAM Voice ($50, via Amazon) from JAM Audio is a Wi-Fi and Bluetooth speaker that includes Amazon Alexa Voice Service integration. The tiny speaker offers up to four hours of play time and recharges via USB cable (power outlet adapter not included).The speaker sets up via the JAM Wi-Fi app, letting you connect the speaker to your existing Wi-Fi network (you need Internet connectivity in order to use the Alexa voice services). If you don’t want to utilize that option, you can connect via Bluetooth like every other portable Bluetooth speaker. The JAM Voice also integrates with JAM Audio’s other Wi-Fi speaker systems (the Rhythm and Symphony) to give you multi-room audio.To read this article in full or to leave a comment, please click here

IDG Contributor Network: ScyllaDB another contender to the open source NoSQL database crown

The world of the database is one of those areas that sees lots of people obsessing over details that to outside observers would seem trivial. Graph, NoSQL, SQL, distributed—so many choices.So, when ScyllaDB told me about a funding round that they’d raised and their stated intention to replace Apache Cassandra, I was interested—if slightly skeptical. Not skeptical because of anything I know about ScyllaDB per se, but simply because of the busy-ness of the space.+ Also on Network World: Google’s new cloud service is a unique take on a database + The launch only a couple of weeks ago of Google’s Cloud Spanner database, an offering developed from the internal tools that Google itself uses, certainly upped the database ante. Google’s assertion that Cloud Spanner gives users all the benefits of both regular relational and NoSQL databases put all other database offerings on guard.To read this article in full or to leave a comment, please click here

CIA false flag team repurposed Shamoon data wiper, other malware

The U.S. Central Intelligence Agency documents published by WikiLeaks Tuesday shows that one of the agency's teams specializes in reusing bits of code and techniques from public malware samples.According to the leaked documents the Umbrage team is part of the Remote Development Branch under the CIA's Center for Cyber Intelligence. It maintains a library of techniques borrowed from in-the-wild malware that could be integrated into its own projects.To read this article in full or to leave a comment, please click here

IT professionals think Apple devices are easier to manage, according to new survey

A recent survey has found that your IT department thinks a Mac is more manageable than a PC or Chromebook.According to a survey of IT professionals, Macs and iOS devices are easier to manage when it comes to security, device configuration, software deployment, and support. Of those surveyed, 62 percent said the Mac is as easy or easier to deploy than PC, and 93 percent said it’s as easy or easier to deploy an iPhone or iPad over another device.While most IT professionals found Apple’s products easier to manage overall, that was not the case when it comes to Mac integration. Only 36 percent of IT professionals claimed that it was easy or easier to integrate Macs into other environments. The survey is based on responses from 300 IT professionals and was commissioned by Jamf, the software management firm that focuses solely on Apple devices.To read this article in full or to leave a comment, please click here

How pay transparency and equity help employers retain workers

More than ever, companies are updating their compensation strategy and practice to build more trusting relationships with their workforce, emphasizing pay transparency and equity, according to the 2017 Compensation Best Practices Report from cloud compensation services company PayScale.The 2017 Compensation Best Practices Report (CBPR) is based on data from 7,700 executives, line of business managers, human resource leaders and compensation practitioners, and reflects current attitudes about compensation, business growth, hiring and retention. The latest annual report shows a shift is underway at many companies as key talent markets are becoming increasingly competitive.To read this article in full or to leave a comment, please click here

What’s the value in attack attribution?

For those who pursue forensic analysis with the hope of identifying and prosecuting an attacker, they likely will find that the time spent on attack attribution is fruitless.If, however, they are looking to use what they gain through attack attribution to inform their overall security procedures from prevention to response, the effort yields valuable results.Many experts in the industry have questioned whether there is any value to attribution. SafeBreach CTO & co-founder Itzik Kotler said, "The only interesting aspect in attribution itself is to classify and put information in a box and use it over and over again."Kolter offered a hypothetical in which right now CNN gets hacked by the Chinese. "That someone can or cannot attribute it to the Chinese doesn't matter. It does matter if we can say we think this is from China," Kolter said.To read this article in full or to leave a comment, please click here

Smackdown: Office 365 vs. G Suite collaboration

Ever since I can remember, Silicon Valley has been enamored with the idea of group editing of documents. Very little good writing gets done that way, of course. It’s like the joke that a camel is a horse designed by committee. Office 365 vs. G Suite: Meeting collaborationTo read this article in full or to leave a comment, please click here(Insider Story)

Ryzen CPUs explained: Everything you need to know about AMD’s disruptive multicore chips

After a decade of fielding ho-hum FX-series processors, AMD’s finally released its highly disruptive Ryzen chips, throwing down the gauntlet and challenging Intel’s supremacy in high-end computing.AMD’s new Ryzen chips include several CPUs (and CPU families) of various levels of potency. What’s more, Ryzen introduces a completely new motherboard platform, and the processors require different memory and coolers than their predecessors. There’s a lot to sift through—so let’s sift!Here’s everything you need to know about AMD’s Ryzen.Meet AMD’s Ryzen CPUs AMD Details about the AMD Ryzen chips announced thus far.To read this article in full or to leave a comment, please click here

Here’s how Microsoft has rethought its approach to email

Two years ago, Microsoft made a massive shift in the way it approached the email market. In January 2015, the company launched Outlook for iOS and Android, free professional-grade email apps for two platforms that Microsoft previously underserved in that regard.Outlook for iOS and its Android sibling were special, because they supported Gmail, Yahoo and iCloud email, in addition to Microsoft’s Outlook.com, Office 365 and Exchange email offerings. While connecting to third party email providers isn't new for Outlook, offering one-click support for different email providers at launch sent a message that this wouldn't be locked to the Microsoft ecosystem.To read this article in full or to leave a comment, please click here

Consumer Reports decision to rate cybersecurity is a huge deal

Conventional wisdom has it that most consumers simply don’t pay much attention to computer security and privacy issues. Perhaps worse, they don’t think they can do much to protect themselves without foregoing many of the benefits of our digital, connected age. Consumer Reports is trying to change both of those things. Consumer Reports’ new cybersecurity standard The influential publication and public-interest organization announced on Monday that it has collaborated on a digital consumer-protection standard designed to define “how companies should build these products to really be good for consumers in terms of privacy and other issues,” said Maria Rerecich, who directs electronics testing at Consumer Reports, in a statement. To read this article in full or to leave a comment, please click here