Archive

Category Archives for "Networking"

IDG Contributor Network: Disposable IoT ready to open new opportunities

The Internet of Things (IoT) has transformed how industries operate and how people interact with one another. We have seen an impressive array of new IoT deployments from an explosion of smart city applications across the U.S., to sensors implanted in the horns of critically-endangered rhinos in Africa. The evolution of IoT has connected devices at record speed and provided useful business intelligence to solve complex, real-world problems.IoT devices outnumbered the world’s population for the first time this year. In a recent report, worldwide spending for IoT in 2017 is estimated to have grown 16.7% reaching $800 billion with an expected total of $1.4 trillion per year by 2021. The proliferation of IoT devices can be attributed to the fact that it is now much cheaper and easier to gather information from sensors.To read this article in full, please click here

Big trouble down on the IoT farm

You would think that modern farms would be fertile ground for the Internet of Things (IoT). And in many ways, you’d be right: Smart tractors and other farm equipment, coupled with GPS-equipped smart sensors tracking everything temperature to moisture to soil acidity, mean the IoT can help today’s high-tech farmers plant and harvest more efficiently than ever before.Who benefits from IoT on the farm? But if you believe a recent expose in Motherboard, all is not well down on the IoT farm. It turns out that many of the benefits of IoT — and the big data it generates — in agriculture fall not to the farmers, but to the so-called BigAg equipment makers and seed and fertilizer companies.To read this article in full, please click here

Teaching Sri Lankan Girls How to Code

Girls in Technology is a community-based initiative to help increase schoolgirls’ participation in emerging Internet technology careers. The pilot project, lead by the Internet Society Sri Lanka Chapter and supported by Beyond the Net Funding Programme, will provide grade 9 girls with coding lessons and extracurricular activities to help them select ICT subjects at grade 10. Niranjan Meegammana, project leader and director of the Shilpa Sayura Foundation, explains how this initiative will contribute to gender equality in STEM education and help the young women reach for the stars.

Internet Society: What motivated the Chapter to take this initiative?

Niranjan Meegammana: Sri Lanka is fast becoming a hub for technology and innovation, offering a wide range of careers in technology fields. However, girls pursuing a career in technology still remain a limited number. Girls are representing 50.28% of school population, but only 20% are actually studying ICT. The gender gap keeps on growing and generating a labor surplus. The root cause of this problem is the scarcity of opportunities for girls and teachers in the Internet sector.

Which innovative solutions will the project attempt to solve this problem?

Girls in Technology is implemented by Sri Lanka Chapter with Continue reading

BrandPost: Can an SMB Really Afford IT Downtime

A recent blog post about the negative impact of a 1990s server room talked about downtime and its tremendous impact on any organization. It is now incumbent upon the IT team to do all it can to ensure that IT systems—and the infrastructure that supports them—are as reliable as possible. The spread of digital systems to every aspect of the business makes any service interruption a serious problem for all employees and many of your customers.Small and midsize businesses (SMBs) depend on their servers, storage, and network equipment to keep the company running, but failures do occur. In many cases, these outages result not from the equipment itself, but the racks, cooling, and power infrastructure on which this equipment depends. Based on research from the Institute, cooling and power failures that result from outmoded rack or data center infrastructure cause more than one-third of all unplanned outages. However, an outage is more than just an interruption in business operations; it can result in substantial data loss. To read this article in full, please click here

BrandPost: What is the Adaptive Network?

Since the introduction of the first Public Switched Telephone Network, networks have continually evolved. Through the various stages of development—from fixed endpoints in the early Internet to today’s broadband networks that connect mobile users to massive data centers and bandwidth behemoths like Netflix, Amazon, and Facebook—networks have adjusted to accommodate new demands.The once-static infrastructure is undergoing a more profound transformation than ever before. The latest incarnation is autonomous networking, which is a trend that has been building for some time. The autonomous network runs without much human intervention. It can configure, monitor and maintain itself independently.To read this article in full, please click here

Blockchain and Digital Identity – A Good Fit?

Every time you see “Login with Facebook” or “Login with Twitter” etc. on a website or use login credentials issued by your employer or school, you’re using Identity and Access Management (IAM) technologies in the background. IAM has become central to our online interactions, but like a lot of infrastructure it’s largely invisible to users (at least when it’s well designed and implemented). IAM is evolving rapidly, the stakes are high, and enterprises face an increasingly complex and puzzling digital identity landscape. There is also growing concern that businesses know too much about us, and therefore end users should reclaim control over their own identities. IAM is a hot topic in the technology world, with new architectures, business models, and philosophies all in play.

Blockchain technology (sometimes also called distributed ledger technology – DLT) is also gaining attention. Proponents advocate it for a wide variety of use cases, including IAM. Blockchain is a broad class of relatively new data security methods, with certain properties of potential value in IAM. Many IAM companies have launched identity registration solutions “on the blockchain,” while others are developing new blockchain-inspired infrastructure for distributing information about users (called “attributes” and used to inform decisions about Continue reading

Container Monitoring

CA Technologies Container Monitoring Sponsored Article The Container Monitoring Essentials hub page discusses the importance of containers in today’s datacenter environment, predicting that containers will—in time—be the means by which all workloads are deployed on server platforms.

A few buckets of cold water on the Broadcom-Qualcomm-Intel merger talk

The M&A activity in the chip business isn’t restricted to the big guys snapping up promising startups. The titans are talking marriage, but really, there should be no merger between any of the three giants that are Intel, Broadcom, and Qualcomm.On Friday, The Wall Street Journal reported that Intel was closely watching Broadcom’s hostile bid for Qualcomm in the hopes that Broadcom would fail so it could buy Broadcom. The deal would be valued at an insane $170 billion.Intel issued a denial over the weekend, saying it was only looking to assimilate and absorb several recent acquisitions.The White House steps in, stops Broadcom-Qualcomm merger Meanwhile, the Broadcom-Qualcomm talks persisted despite Qualcomm’s resistance to the idea until Monday, when President Donald Trump issued an executive order blocking the merger, citing national security concerns. I didn’t think he could do that.To read this article in full, please click here