Archive

Category Archives for "Networking"

New developments in the net neutrality debate

Democrats in the USA haven’t given up on net neutrality since the FCC voted to repeal the 2015 Open Internet Order in December.

Senator Markey, a Democrat from Massachusetts, has put forward a bill that would use the Congressional Review Act (CRA) to reverse the Federal Communications Commission’s (FCC) decision. The CRA allows lawmakers 60 legislative days after the FCC submits its regulations to Congress to take action.

That bill now has the support of more than 40 Senators, including Senator Susan Collins (R-Maine), its first Republican supporter.

Senator Markey needs 52 votes to get the bill passed in the Senate, which is unlikely given that Republicans remain in control of both chambers of Congress. Nevertheless, Democrats see value in forcing a vote on the bill ahead of the 2018 midterm elections. Polls indicate that 83 per cent of Americans support keeping the FCC’s net neutrality rules.

If the bill fails to move forward, Congress may pursue a legislative solution – a bill that would codify net neutrality rules into law, rather than a reversal of the FCC’s decision. In fact, the Republicans are possibly signaling an appetite to come to a legislative solution to this issue. Regardless of Continue reading

2018 state of resilience: the pressure is on

As we swerve onto the runway in 2018, IT leaders are finding themselves under increased pressure to ensure security, high availability and disaster recovery for the applications and systems under their care. The results of several surveys underscore the concerns of nearly 6,000 IT professionals around the globe.These surveys, conducted in 2017 by Vision Solutions, now part of Syncsort, collected responses from 5,632 professionals to determine their key business continuity concerns and their strategies for addressing high-profile hacking attacks, data breaches, disruptive natural disasters and escalating storage and data accessibility needs. The results highlight their areas of greatest concern and the key initiatives they are putting into place for moving forward.To read this article in full, please click here

2018 state of resilience: The pressure is on

As we swerve onto the runway in 2018, IT leaders are finding themselves under increased pressure to ensure security, high availability and disaster recovery for the applications and systems under their care. The results of several surveys underscore the concerns of nearly 6,000 IT professionals around the globe.These surveys, conducted in 2017 by Vision Solutions, now part of Syncsort, collected responses from 5,632 professionals to determine their key business continuity concerns and their strategies for addressing high-profile hacking attacks, data breaches, disruptive natural disasters, and escalating storage and data accessibility needs. The results highlight their areas of greatest concern and the key initiatives they are putting into place for moving forward.To read this article in full, please click here

2018 state of resilience: The pressure is on

As we swerve onto the runway in 2018, IT leaders are finding themselves under increased pressure to ensure security, high availability and disaster recovery for the applications and systems under their care. The results of several surveys underscore the concerns of nearly 6,000 IT professionals around the globe.These surveys, conducted in 2017 by Vision Solutions, now part of Syncsort, collected responses from 5,632 professionals to determine their key business continuity concerns and their strategies for addressing high-profile hacking attacks, data breaches, disruptive natural disasters, and escalating storage and data accessibility needs. The results highlight their areas of greatest concern and the key initiatives they are putting into place for moving forward.To read this article in full, please click here

2018 state of resilience: the pressure is on

As we swerve onto the runway in 2018, IT leaders are finding themselves under increased pressure to ensure security, high availability and disaster recovery for the applications and systems under their care. The results of several surveys underscore the concerns of nearly 6,000 IT professionals around the globe.These surveys, conducted in 2017 by Vision Solutions, now part of Syncsort, collected responses from 5,632 professionals to determine their key business continuity concerns and their strategies for addressing high-profile hacking attacks, data breaches, disruptive natural disasters and escalating storage and data accessibility needs. The results highlight their areas of greatest concern and the key initiatives they are putting into place for moving forward.To read this article in full, please click here

Welcome Salt Lake City and Get Ready for a Massive Expansion

Welcome Salt Lake City and Get Ready for a Massive Expansion

Welcome Salt Lake City and Get Ready for a Massive Expansion

We just turned up Salt Lake City, Utah — Cloudflare's 120th data center. Salt Lake holds a special place in Cloudflare's history. I grew up in the region and still have family there. Back in 2004, Lee Holloway and I lived just up into the mountains in Park City when we built Project Honey Pot, the open source project that inspired the original idea for Cloudflare.

Welcome Salt Lake City and Get Ready for a Massive Expansion

Salt Lake also holds a special place in the history of the Internet. The University of Utah, based there, was one of the original four Arpanet locations (along with UCLA, UC Santa Barbara, and the Stanford Research Institute). The school also educated the founders of great technology companies like Silicon Graphics, Adobe, Atari, Netscape, and Pixar. Many were graduates of the computer graphics department lead by Professors Ivan Sutherland and David Evans.

Welcome Salt Lake City and Get Ready for a Massive Expansion

In 1980, when I was seven years old, my grandmother, who lived a few blocks from the University, gave me an Apple II+ for Christmas. I took to it like a duck to water. My mom enrolled in a continuing education computer course at the University of Utah teaching BASIC programming. I went with her to the classes. Unbeknownst to the Continue reading

Leverage the power of the mainframe to make sense of your IoT data

Companies today face incredible challenges around compliance, security and analytics, as their data lakes fill with invaluable information from ever more sensors. And tomorrow’s challenges will be no easier. As the digital age expands to cover all facets of our lives, more and more computing power will be necessary to process all of the data created.Take the explosion of Internet of Things (IoT) as an example. We have only sampled the benefits that the IoT can provide. In the words of Dan Mitchell, a retail analytics industry expert with SAS, IoT can be fundamentally described as “a network of connected physical objects embedded with sensors. IoT allows these devices to communicate, analyze, and share data about the physical world around us via networks and cloud-based software platforms.”To read this article in full, please click here

Leverage the power of the mainframe to make sense of your IoT data

Companies today face incredible challenges around compliance, security and analytics, as their data lakes fill with invaluable information from ever more sensors. And tomorrow’s challenges will be no easier. As the digital age expands to cover all facets of our lives, more and more computing power will be necessary to process all of the data created.Take the explosion of Internet of Things (IoT) as an example. We have only sampled the benefits that the IoT can provide. In the words of Dan Mitchell, a retail analytics industry expert with SAS, IoT can be fundamentally described as “a network of connected physical objects embedded with sensors. IoT allows these devices to communicate, analyze, and share data about the physical world around us via networks and cloud-based software platforms.”To read this article in full, please click here

Chipping Away At Technical Debt

We’re surrounded by technical debt every day. We have a mountain of it sitting in distribution closets and a yard full of it out behind the data center. We make compromises for budget reasons, for technology reasons, and for political reasons. We tell ourselves every time that this is the last time we’re giving in and the next time it’s going to be different. Yet we find ourselves staring at the landscape of technical debt time and time again. But how can we start chipping away at it?

Time Is On Your Side

You may think you don’t have any time to work on the technical debt problem. This is especially true if you don’t have the time due to fixing problems caused by your technical debt. The hours get longer and the effort goes up exponentially to get simple things done. But it doesn’t have to be that way.

Every minute you spend trying to figure out where a link goes or a how a server is connected to the rest of the pod is a minute that should have been spent documenting it somewhere. In a text document, in a picture, or even on the back of a Continue reading

Impact of Intel and Micron ending their NAND partnership is negligible

Intel and Micron earlier this week announced an end to their long-term joint development partnership for 3D NAND memory. What does this mean for buyers of Intel SSDs? Turns out, not much — if anything.On the surface, it looks like a blow to Intel — which makes chips, not memory — but in fact, it has that base covered. Intel has a 300-mm fab in Dalian, China, that it began to convert to produce 3D NAND flash memory in 2015. With Dalian online, Intel simply didn’t need Micron any more.Intel and Micron will still partner on other things This is hardly a split between the two. The companies will complete development of their third-generation of 3D NAND flash technology, which will be delivered toward the end of this year.To read this article in full, please click here

IDG Contributor Network: 4th-gen UI

Once every few decades, we experience a broad shift in how people interact with computers. Think about it. How long have you been relying on your mouse to click on the things you want to interact with? In many ways, the typical user interfaces model hasn’t changed much since 1984 but we’re finally in the midst of a major new shift.What I’m calling the fourth-gen user interface has arrived, and it will create a truly dramatic shift for users over the next few years. These new interfaces will leverage technologies like ubiquitous connected devices, location-based services, speech recognition, computer vision, biometrics and even augmented reality (AR).  This isn’t your dad’s computing environment.To read this article in full, please click here