Archive

Category Archives for "Networking"

5 more open source companies to watch in 2017

An exciting class of startups with a focus on enterprise IT are those built on open source foundations, in some cases commercializing and adding value to an already popular open source project.We recently highlighted 5 such open source-oriented companies, and below we introduce you to 5 more. Note that this list only contains companies that have announced funding over the past year or so, and isn't intended to be an all-inclusive compilation. Without further ado…ConfluentFounded: 2014To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why are mainframes still in the enterprise data center?

In the recent past, I've had the opportunity to speak with representatives of Cobol-IT, Compuware, Heirloom Computing, TmaxSoft and a few others who have targeted enterprises still using mainframes.A few of them, such as Compuware, are focused on adding rapid application development and deployment (aka DevOps) to the mainframe, making the environment seem relevant today.+ Also on Network World: Why banks love mainframes + Most of the others, however, are focused on convincing enterprises that it is finally time for them to abandon the mainframe and move those workloads to industry-standard x86 systems running Windows or Linux or, perhaps, to midrange Unix systems.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why are mainframes still in the enterprise data center?

In the recent past, I've had the opportunity to speak with representatives of Cobol-IT, Compuware, Heirloom Computing, TmaxSoft and a few others who have targeted enterprises still using mainframes.A few of them, such as Compuware, are focused on adding rapid application development and deployment (aka DevOps) to the mainframe, making the environment seem relevant today.+ Also on Network World: Why banks love mainframes + Most of the others, however, are focused on convincing enterprises that it is finally time for them to abandon the mainframe and move those workloads to industry-standard x86 systems running Windows or Linux or, perhaps, to midrange Unix systems.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How open banking can drive competitive advantage

In the banking sector, the concept of “open” can seem contradictory. Banks traditionally have a “duty of care” to protect their assets rigorously, as required by regulators and customers. Yet today banks are faced with increasingly complex requirements.The blending of the financial and technology sectors has created a world in which banks protect our assets, but they are also asked to constantly innovate, create new customer channels or services, and maintain compliance across a changing regulatory landscape. To keep pace and remain competitive, banks must take another page from the technology world and embrace open architectures.  + Also on Network World: Financial services firm adopts agile for digital development + APIs are a mainstay of today’s technology and start-up culture, and they are a primary mechanism for building open architectures and platforms. From Yahoo to Facebook, Google, Amazon and more, industry vanguards and emerging companies alike have allowed third parties to access and build upon their codes and platforms via APIs. While giving peers and, in some cases, competitors “access to the house” might seem counterintuitive, the results are remarkable—continuous, rapid innovation, continued product development, and an open ecosystem of knowledge sharing.To read this article in full Continue reading

IDG Contributor Network: How open banking can drive competitive advantage

In the banking sector, the concept of “open” can seem contradictory. Banks traditionally have a “duty of care” to protect their assets rigorously, as required by regulators and customers. Yet today banks are faced with increasingly complex requirements.The blending of the financial and technology sectors has created a world in which banks protect our assets, but they are also asked to constantly innovate, create new customer channels or services, and maintain compliance across a changing regulatory landscape. To keep pace and remain competitive, banks must take another page from the technology world and embrace open architectures.  + Also on Network World: Financial services firm adopts agile for digital development + APIs are a mainstay of today’s technology and start-up culture, and they are a primary mechanism for building open architectures and platforms. From Yahoo to Facebook, Google, Amazon and more, industry vanguards and emerging companies alike have allowed third parties to access and build upon their codes and platforms via APIs. While giving peers and, in some cases, competitors “access to the house” might seem counterintuitive, the results are remarkable—continuous, rapid innovation, continued product development, and an open ecosystem of knowledge sharing.To read this article in full Continue reading

IDG Contributor Network: MasterCard puts a finger on fraud

Most credit card verification systems only verify whether the card is valid and not if the presenter is the authorized cardholder. MasterCard intends to address that with its newly introduced card with a built-in fingerprint sensor.This new MasterCard gives customers the option of using a single digit rather than a PIN. It’s a very impressive development, particularly since it works with existing chip readers.+ Also on Network World: Google’s Trust API: Bye-bye passwords, hello biometrics? + The card gives new meaning to the title “cardholder” as the customer must physically hold the card during the transaction. There’s a fingerprint sensor on the face of the card that syphons enough power from the chip reader to read and validate a fingerprint. If dirt, sweat or other factors prevent validation, the transaction can be completed with a PIN.To read this article in full or to leave a comment, please click here

IDG Contributor Network: MasterCard puts a finger on fraud

Most credit card verification systems only verify whether the card is valid and not if the presenter is the authorized cardholder. MasterCard intends to address that with its newly introduced card with a built-in fingerprint sensor.This new MasterCard gives customers the option of using a single digit rather than a PIN. It’s a very impressive development, particularly since it works with existing chip readers.+ Also on Network World: Google’s Trust API: Bye-bye passwords, hello biometrics? + The card gives new meaning to the title “cardholder” as the customer must physically hold the card during the transaction. There’s a fingerprint sensor on the face of the card that syphons enough power from the chip reader to read and validate a fingerprint. If dirt, sweat or other factors prevent validation, the transaction can be completed with a PIN.To read this article in full or to leave a comment, please click here

One the ‘net: The Network Collective and Choosing a Routing Protocol

The Network Collective is a new and very interesting video cast of various people sitting around a virtual table talking about topics of interest to network engineers. I was on the second episode last night, and the video is already (!) posted this morning. You should definitely watch this one!

In episode 2 our panel discusses some key differences between routing protocols and the details that should be considered before choosing to implement one over another. Is there any difference between IGP routing protocols at this point? When does it make sense to run BGP in an enterprise network? Is IS-IS an old and decaying protocol, or something you should viably consider? Russ White, Kevin Myers, and the co-hosts of Network Collective tackle these questions and more.

The post One the ‘net: The Network Collective and Choosing a Routing Protocol appeared first on rule 11 reader.

29% off Cooler Master Hyper 212 EVO CPU Cooler with 120mm PWM Fan – Deal Alert

The Hyper 212 EVO now features four Cooler Master patented Continuous Direct Contact (CDC) heat pipes that are tightly packed into a flat array on the CPU Cooler base. This acts as a virtual vapor chamber that dissipates a large amount of heat. The aluminum fin structure has been optimized to provide the perfect performance balance between high and low speed fan operations.  The fan averages 4.4 out of 5 stars from over 7,600 people on Amazon (read reviews here), where its typical list price of $34.99 has been reduced 29% to just $24.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

McAfee: Wave of Shamoon cyberattacks being coordinated by a single group

The waves of cyberattacks that have rocked Saudi Arabia over the past few months are linked to the earlier Shamoon attacks. However, the initial 2012 attack was the work of a single group, whereas the latest attacks have been carried out by different groups of varying skills and expertise, all following instructions provided by one malicious actor, McAfee researchers have found.Researchers at McAfee Strategic Intelligence believe the 2012 Shamoon attacks against Saudi Arabia’s state-run oil company Saudi Aramco and Qatari natural gas company RasGas, the attacks last November against Saudi organizations, and these latest attacks are all the work of hacker groups supported and coordinated by a single actor, and not the efforts of multiple gangs operating independently, said McAfee principal engineer Christiaan Beek and McAfee chief scientist Raj Samani. To read this article in full or to leave a comment, please click here

McAfee: Wave of Shamoon cyberattacks being coordinated by a single group

The waves of cyberattacks that have rocked Saudi Arabia over the past few months are linked to the earlier Shamoon attacks. However, the initial 2012 attack was the work of a single group, whereas the latest attacks have been carried out by different groups of varying skills and expertise, all following instructions provided by one malicious actor, McAfee researchers have found.Researchers at McAfee Strategic Intelligence believe the 2012 Shamoon attacks against Saudi Arabia’s state-run oil company Saudi Aramco and Qatari natural gas company RasGas, the attacks last November against Saudi organizations, and these latest attacks are all the work of hacker groups supported and coordinated by a single actor, and not the efforts of multiple gangs operating independently, said McAfee principal engineer Christiaan Beek and McAfee chief scientist Raj Samani. To read this article in full or to leave a comment, please click here

Report: Top 25 IT security products

Nothing beats hearing from your peers about which IT security products have been successful in the enterprise. IT Central Station, which collects reviews from verified enterprise IT product users, has compiled a report that identifies 25 top-rated products in security categories such as cloud security, firewalls, security information and event management (SIEM), application security and internet of things (IoT) security.IT Central Station selected the product leaders in each security category. The report uses a scoring methodology based on a combination of buyer interest, the number of reviews (at least 10), and the average rating in those reviews.To read this article in full or to leave a comment, please click here(Insider Story)

Security-as-a-service model gains traction

With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research."The security challenge for mid-tier businesses is multi-dimensional," Daniel Cummins, analyst at 451 Research, said in a statement. "For these businesses, everything seems to be increasing — attack frequency, compliance requirements, complexity, costs and the number of security products that need to be managed. Cloud-based security-as-a-service offers potentially significant advantages in terms of simplicity and access to security that may prove to be less complex and expensive than traditional approaches."To read this article in full or to leave a comment, please click here

Security-as-a-service model gains traction

With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research."The security challenge for mid-tier businesses is multi-dimensional," Daniel Cummins, analyst at 451 Research, said in a statement. "For these businesses, everything seems to be increasing — attack frequency, compliance requirements, complexity, costs and the number of security products that need to be managed. Cloud-based security-as-a-service offers potentially significant advantages in terms of simplicity and access to security that may prove to be less complex and expensive than traditional approaches."To read this article in full or to leave a comment, please click here

Report: Top 25 IT security products

Nothing beats hearing from your peers about which IT security products have been successful in the enterprise. IT Central Station, which collects reviews from verified enterprise IT product users, has compiled a report that identifies 25 top-rated products in security categories such as cloud security, firewalls, security information and event management (SIEM), application security and internet of things (IoT) security.To read this article in full or to leave a comment, please click here(Insider Story)

Security-as-a-service model gains traction

With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research."The security challenge for mid-tier businesses is multi-dimensional," Daniel Cummins, analyst at 451 Research, said in a statement. "For these businesses, everything seems to be increasing — attack frequency, compliance requirements, complexity, costs and the number of security products that need to be managed. Cloud-based security-as-a-service offers potentially significant advantages in terms of simplicity and access to security that may prove to be less complex and expensive than traditional approaches."To read this article in full or to leave a comment, please click here