Archive

Category Archives for "Network World Wireless"

IDG Contributor Network: Weaveworks moves beyond Docker with plug-in for Kubernetes

An announcement coming today from networking vendor Weaveworks is interesting in and of itself, but even more so when seen in the broader context. Weaveworks is the vendor behind Weave, a networking and monitoring tool for the Docker containerization platform. The company is today announcing the availability of a plug-in for the Kubernetes cloud-native operating system. Weave Net 1.5 works with the Kubernetes Container Networking Interface and allows multicast networking integrated with Kubernetes-based applications. Weaveworks is talking up the applicability of this offering to specific verticals, in particular, the financial services industry:To read this article in full or to leave a comment, please click here

iPhone 7 concept video is jaw-dropping

A new iPhone 7 concept video circulating across the web is absolutely mesmerizing and well worth taking a look at. Now does the video bear any resemblance to what Apple will likely introduce later this fall? Not a chance. Still, sometimes we need a well-crafted concept video to remind us that there's still a lot of room for innovation out there.Put together by Glaxon Paul, the iPhone 7 and iPhone 7 Pro concepts below envision a sleek device framed by an edge-to-edge display with a dynamic home button that can not only change color, but display images as well. Spec wise, the concept dreams of a 4K display coupled with a 20 megapixel rear camera and a 12 megapixel camera on the front.To read this article in full or to leave a comment, please click here

‘Your face is big data:’ The title of this photographer’s experiment says it all

Got privacy? You may think you do, but a recent experiment by a Russian photographer suggests otherwise.In a project entitled, "Your face is big data," Rodchenko Art School student Egor Tsvetkov began by photographing about 100 people who happened to sit across from him on the subway at some point. He then used FindFace, a facial-recognition app that taps neural-network technology, to try to track them down on Russian social media site VK.It was ridiculously easy to find 60 to 70 percent of the subjects aged between 18 and 35 or so, he found, although for older people it was more difficult.To read this article in full or to leave a comment, please click here

Intel to ship thumb-sized Compute Sticks with Skylake chips in late April

If you've been waiting patiently for Intel's new Compute Sticks with Skylake chips, there's good news: Those thumb-sized PCs will start shipping on April 29.The three Compute Sticks, which have Intel's Core M3 and M5 chips, can turn a TV or display with an HDMI port into a PC. All you need to do is plug the Compute Stick into the HDMI port.These new Compute sticks were announced in January at CES. Starting at US $299, the Skylake-based Compute Sticks aren't priced as low as older models but pack the processing power of lightweight laptops.The benefits of Compute Sticks are still debated. These computers rate high in portability but have memory, storage, and port limitations. Users also need to lug around a wireless keyboard and mouse.To read this article in full or to leave a comment, please click here

Zuckerberg teases Aries and Terragraph projects to expand data networks

Facebook plans to unveil two projects on Wednesday that promise to improve Internet connectivity for users in cities and urban areas. The two, called Aries and Terragraph, will be detailed at its F8 conference in San Francisco, CEO Mark Zuckerberg said on Tuesday. Together, they represent an extension of Facebook's connectivity efforts that so far have been most closely identified with Aquila, a high-flying drone designed by the company to beam down an Internet signal to remote areas. Getting people online and keeping them connected is key to Facebook's expansion plans. After all, it won't be able to persuade new users to come to its services if the Internet connection isn't reliable.To read this article in full or to leave a comment, please click here

Facebook’s Zuckerberg takes shot at Donald Trump

Mark Zuckerberg, co-founder and CEO of Facebook, used his keynote speech at the company's annual developer conference today to take on Republican presidential front-runner Donald Trump.As Zuckerberg took the stage, he briefly mentioned what the audience of about 8,000 developers, analyst and press expected -- virtual reality and artificial intelligence.Then his speech quickly took a different turn and, without mentioning Trump by name, Zuckerberg took on the controversial businessman and his campaign platform.+ ALSO: Donald Trump vs. Steve Jobs: The tale of two con artists +To read this article in full or to leave a comment, please click here

IDG Contributor Network: Datera emerges from stealth to offer another take on cloud scale-out storage

Stealthy startup Datera is launching today with its promise to bring an Amazon Web Services (AWS) cloud-type of offering to large enterprises and service providers.If that sounds like an offering you might have heard before, it's probably because for the past six to eight years, a number of vendors, seeing the traction that AWS has gained, have jumped on the bandwagon and offered a value proposition in the same area. There have been broad cloud operating system offerings, including OpenStack, CloudStack and Eucalyptus, more specialist storage platforms such as Ceph, Gluster, SimpliVity and Nutanix and hyperconverged offerings form the likes of VMware, Dell and Hewlett Packard. It's a busy space and one that is hanging off incredible growth in awareness and adoption of cloud offerings.To read this article in full or to leave a comment, please click here

Microsoft endorses EU-US Privacy Shield data sharing pact

Microsoft is throwing its weight behind the EU-U.S. Privacy Shield agreement, which is intended to safeguard the privacy of European Union citizens when their personal information is exported to the U.S. for processing.But a document leaked late last week suggests the proposed agreement does not have the backing of EU data protection authorities, who are meeting this week to finalize their position on it.Microsoft will seek approval to conduct data transfers under the agreement, its Vice President for EU Government Affairs, John Frank, wrote in a blog post Monday.To read this article in full or to leave a comment, please click here

Adobe to issue emergency patch for Flash vulnerability

Adobe is working on an emergency patch for its Flash Player after attackers are reportedly exploiting a critical flaw. The vulnerability, CVE-2016-1019, affects Flash Player version 21.0.0.197 on Windows, Mac, Linux and Chrome OS, according to an advisory published on Tuesday. The flaw is being actively exploited on Windows XP and 7 systems running Flash Player versions 20.0.0.306 and earlier. "Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system," it said. A patch could be released as soon as Thursday.To read this article in full or to leave a comment, please click here

Save 74% on RAVPower’s 16750mAh External Battery Power Bank – Deal Alert

The RAVPower 16750mAh External Battery Power Bank has a list price of $114.99, but with the current 74% discount you can save $85 and buy it now via Amazon for just $29.99.The Power Bank measures roughly 5x3 inches and weighs just 10.9oz, making it portable enough for travel. The unit is capable of charging an iPhone 6 almost 6 times, a Galaxy S6 almost 4 times, or one full charge for an iPad Air. It can charge multiple devices simultaneously, automatically detecting and delivering the optimal charging current for each connected device. An ultra reliable A+ Lithium-Ion battery provides over 500 battery charge cycles. The portable power bank will automatic shutdown if a short circuit or overload output occurred while unit is charging, protecting your device from damage.To read this article in full or to leave a comment, please click here

IDC: Cloud is eating legacy systems

New research from IDC shows that spending on infrastructure to run public and private clouds continues to grow at leaps and bounds as spending on non-cloud infrastructure decreases.  +MORE AT NETWORK WORLD: 10 Best Cloud SLA practices + IDC’s Worldwide Quarterly Cloud IT Infrastructure Tracker tracks spending patterns of users and service providers, along with revenues of vendors to paint a picture of cloud adoption trends. Infrastructure spending on public and private cloud technology – which includes servers, storage and Ethernet switching – grew 21.9% in 2015 to be a $29 billion industry. Cloud technology made up almost one-third (32%) of all IT infrastructure sales; that’s up from $28.6% in 2014.To read this article in full or to leave a comment, please click here

The battle between LTE and Wi-Fi may have left LTE-U out in the cold

After more than a year of rancor over whether it would hurt Wi-Fi, a technology that lets LTE networks use unlicensed spectrum may have already missed its window of opportunity.LTE-Unlicensed is designed to improve cellular service by tapping into some of the frequencies used by Wi-Fi and other unlicensed technologies. But almost as soon as LTE-U was proposed in late 2014, Wi-Fi supporters pounced. They charged that it would drown out Wi-Fi signals because LTE didn’t know how to make room for other users.+ PRIMER: LTE-U: A quick explainer +To read this article in full or to leave a comment, please click here

How to manage IT in a growing business: Implementing IT policies

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors. As business leaders grow their companies, corporate assets should always be top of mind. As such, business leaders should be implementing IT policies early on in order to set standards and expectations for employees when it comes to the use of corporate technology and managing corporate data. In parts one and two of this three-part series, I rolled out a playbook on when companies should hire their first IT consultant and what to keep in mind when appointing a CIO. In this third and final part of this series on the IT Lifecycle I’ll discuss when companies should start rolling out formal IT policies and how to do so.To read this article in full or to leave a comment, please click here

How to manage IT in a growing business: Appointing a CIO

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors. Timing is everything when hiring a CIO. The primary function of a CIO is to be forward-looking for developing and implementing IT initiatives, but it can be difficult for a CIO to fulfill this duty if he or she is brought in too late and provided with inadequate technologies and processes. The earlier a company invests in a CIO, the earlier everyone can be in tune with what will make the business most efficient. But most companies don’t know when it’s too early and when it’s too late. In the first article of this three-part series on the IT Lifecycle, I discussed recommendations for when to hire an IT consultant, and what to consider when doing so. During this process, it’s important to recognize when a CIO will be a valuable addition. In this second part of the series, I will continue to follow Joe’s Widget Shop, a hypothetical software development company, as they move onto the next stage in the IT lifecycle. I’ll provide you with insight on what to look for when appointing a CIO Continue reading

DARPA moves toward spacecraft that can fly 10X in 10-days

DARPA this month will explain what it wants in the next development phase of its reusable Mach 10 satellite taxi capable of carrying and deploying a 3,000- 5,000 lb. satellite into low earth orbit (LEO) at a target cost of less than $5M per launch.+More on Network World: DARPA: Show us how to weaponize benign technologies+DARPA’s Experimental Spaceplane (XS-1) system would have a reusable first stage that would fly to hypersonic speeds at a suborbital altitude. At that point, one or more expendable upper stages would separate and deploy a satellite LEO. The reusable first stage would then return to earth, land and be prepared for the next flight. Modular components, durable thermal protection systems and automatic launch, flight and recovery systems should significantly reduce logistical needs, enabling rapid turnaround between flights.To read this article in full or to leave a comment, please click here

How to manage IT in a growing business: Using consultants

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors. Few companies are founded with a CIO. For many, the first IT “hire” is the company’s founder, whose job description may include activities like IT purchasing, networking and IT support, alongside planning, marketing and business development. Eventually, that changes. But when? And how? In my role as a chief operations officer, I’ve helped many companies build out their IT operations as they grow from startups to SMBs and beyond. In this three-part series, I’ll explain the IT life cycle of a hypothetical startup called Joe’s Widget Shop, a software development company.To read this article in full or to leave a comment, please click here

63% Discount on Garmin fenix 2 GPS Watch – Deal Alert

The $399.99 list price on the Garmin's fenix 2 GPS Watch is currently discounted by a staggering $200. At 63% off, you can pick this one up on Amazon for $149.99. The fenix 2 currently averages 4 out of 5 stars on Amazon by over 410 people (see reviews).The watch features high-sensitivity GPS positioning, and a 3-axis compass with altimeter and barometer, and is designed for a multi-sport athlete. Take it with you running, climbing, hiking, riding, swimming, skiing -- the fenix 2 quickly switches between feature sets. It delivers real-time performance data such as time, distance, pace, calories, speed, lap data, and heart rate (when paired with a monitor: see here).  When paired with HRM-Run monitor2, fenix 2 provides feedback on Running form by measuring cadence (number of steps per minute), vertical oscillation (bounce in your Running motion), and ground contact time. To read this article in full or to leave a comment, please click here

22 insults no developer wants to hear

The technology world is a bit different than the pretty, coiffed world of suits and salesdroids where everyone is polite, even when they hate your guts and think you’re an idiot. Suit-clad managers may smile and hide their real message by the way they say you’re doing “great, real great pal,” but programmers often speak their minds, and when that mind has something unpleasant to say, look out, feelings.Parsing, unpacking, and sorting the insults that developers sling takes a thick skin. No one likes being told their ideas and code are anything less than insanely great, but some slights are better than others, cutting to the core of your coding faults. In fact, a good insult can contain a road map for moving your project forward. If your rival is willing to explain what you need to do to make your code worth using, well, that’s worth putting up with someone calling you or your code “heavy,” “crufty,” or “full of anti-patterns.”To read this article in full or to leave a comment, please click here

How to recover from disaster

Evacuation planImage by REUTERS/Khaled Abdullah Just like an evacuation plan at your home when a fire strikes, you need a disaster recovery blueprint set aside so that everyone in the company knows what to do and where to go when disaster strikes the network. Here’s a list of 10 tips that will help keep things calm.To read this article in full or to leave a comment, please click here

Are IT executives blind to cybersecurity threats?

Is your company’s cybersecurity keeping you up at night?If you're an IT professional, the answer to that question is probably yes. If you're an IT executive, the answer to that question might be no – even if you work at the same company.What we're seeing, says Jack Danahy, co-founder of Barkly, a Boston-based endpoint security startup company, "is a breakdown in communication."That's what Barkly found in its "Cybersecurity Confidence Report." In it, Barkly surveyed of 350 IT professionals and found that 50 percent are not confident in their current security products or solutions.To read this article in full or to leave a comment, please click here