Archive

Category Archives for "Networking"

FCC chairman to announce plans to repeal net neutrality

The chairman of the U.S. Federal Communications Commission is expected to announce plans to repeal the agency's 2015 net neutrality rules on Wednesday.Chairman Ajit Pai, a Republican, will likely announce a plan to reverse course on the 2-year-old regulations and end the agency's classification of broadband as a regulated, common-carrier service. In a Wednesday speech, Pai will reportedly announce that he is scheduling a vote for the FCC's May 18 meeting to begin the process of repealing the rules.Pai has called the net neutrality rules a mistake that "injected tremendous uncertainty into the broadband market." President Donald Trump, who appointed Pai as the FCC's chairman, has also criticized the regulations.To read this article in full or to leave a comment, please click here

How your company needs to train workers in cybersecurity

With workplace cyberattacks on the rise, industry experts are pressing businesses to train their workers to be more vigilant than ever to protect passwords and sensitive data and to recognize threats.“It is imperative for organizations of all sizes to instill among employees the critical role they play in keeping their workplace safe and secure,” said Michael Kaiser, executive director of the National Cyber Security Alliance, a group that promotes education on the safe and secure use of the internet. The group's members include such major technology companies as Cisco, Facebook, Google, Intel and Microsoft.To read this article in full or to leave a comment, please click here

How your company needs to train workers in cybersecurity

With workplace cyberattacks on the rise, industry experts are pressing businesses to train their workers to be more vigilant than ever to protect passwords and sensitive data and to recognize threats.“It is imperative for organizations of all sizes to instill among employees the critical role they play in keeping their workplace safe and secure,” said Michael Kaiser, executive director of the National Cyber Security Alliance, a group that promotes education on the safe and secure use of the internet. The group's members include such major technology companies as Cisco, Facebook, Google, Intel and Microsoft.To read this article in full or to leave a comment, please click here

IBM applies AI to factory QA

IBM's Watson artificial intelligence technology has found plenty of white-collar work in places like hospitals and banks, but soon it will be off to get its hands dirty on the factory floor.Working with ABB, a maker of industrial plant, IBM has developed a new AI assistant to help factory workers spot manufacturing defects on the production line.Connected to an existing industrial monitoring system, ABB Ability, it will help manufacturers improve speed, yield, and uptime, according to ABB.The Cognitive Visual Inspection system, as IBM calls it, pipes images from a UHD (ultra-high-definition) camera to an instance of IBM's Watson software that has been trained to detect and classify production faults in real time.To read this article in full or to leave a comment, please click here

Cisco switch taps into Time Sensitive Ethernet; software bolsters industrial network mgmt.

Cisco this week took the wraps off three products aimed at increasing the speed of communications while controlling and analyzing the substantial data stream of the factory floor.The products build on Cisco’s Connected Factory portfolio which offers a variety of technologies from networking and security to analytics the company says will help customers quickly and more securely integrate industrial automation and control with business systems while improving industrial and manufacturing operational costs and efficiency.+More on Network World: Ethernet: Are there worlds left to conquer?+To read this article in full or to leave a comment, please click here

Cisco switch taps into Time Sensitive Ethernet; software bolsters industrial network mgmt.

Cisco this week took the wraps off three products aimed at increasing the speed of communications while controlling and analyzing the substantial data stream of the factory floor.The products build on Cisco’s Connected Factory portfolio which offers a variety of technologies from networking and security to analytics the company says will help customers quickly and more securely integrate industrial automation and control with business systems while improving industrial and manufacturing operational costs and efficiency.+More on Network World: Ethernet: Are there worlds left to conquer?+To read this article in full or to leave a comment, please click here

Developing Software The Right Way, with Intent and Carefulness

This blog post / write-up is long overdue. I’m the guy that’s gone from electronics and hardware person, to embedded software, software, networking and now back to software with a keen interest in programmable hardware. Whilst I haven’t had to quite start from scratch in software again, it’s been a long journey to get proficient. Therefore, perusing Twitter, Facebook, Reddit, conference notes and videos, occasionally something comes up which is interesting. Psychologically, coding is interesting (note how no-one says programmer any more? Who writes programs?). It gives away something about your personality, current learned/learning state and your happiness levels. It gives away how you view the world and how you handle danger. Seriously. I can hear those thoughts that say “Whatever dude”. Look at how some developers handle failure prone code. Do they check for errors in a shotgun style approach, or with the accuracy of a sniper?

What caught my eye back in January was a Tweet from one of my coding heroes, William Kennedy. The top one started a thought process off that I’ve been chewing on for months.

@goinggodotnet
Thinking about the diff between ignorance vs carelessness as it relates to writing software. These two words Continue reading

Sketchy rumor claims Apple will release two iPhone 8 models this year

Just when we thought we had a grasp on Apple's 2017 iPhone plans, a sketchy rumor has entered the fray and turned everything upside down. According to a recent report from Micgadget, Apple this year will release only two brand new iPhone models. Recall, most other rumors we've seen thus far pointed to Apple releasing three new iPhones this year: an iPhone 7s, an iPhone 7s Plus, and an edgeless iPhone 8 with an OLED display.Micgadget's alleged sources within Foxconn, however, seem to claim otherwise. Some our friends from Foxconn confirmed that Foxconn received an order for two new models. It’s mean that Apple will [release] two, not three models.To read this article in full or to leave a comment, please click here

Amazon’s ambitious global cloud expansion plans

Public IaaS cloud providers have been on a dizzying streak of announcing and opening new data centers to power their operations, and according to the CEO of Amazon Web Services Andy Jassy, that’s not expected to slow down any time soon.“We are not close to being done expanding geographically,” Jassy said at AWS’s San Francisco Summit last week. “I think virtually every tier one country will have an AWS region over time and I think many of the emergent countries will as well.”+MORE AT NETWORK WORLD: A peek inside Amazon’s cloud, from global scale to custom hardware | Deep dive comparison of cloud storage options from Amazon, Microsoft and Google +To read this article in full or to leave a comment, please click here

Amazon Will Comp You A Dash Button When You Buy 2, and Then $4.99 Once You Use It – Deal Alert

This deal on Amazon will net you 2 Dash Buttons for the price of 0, making this a no-brainer if you've been thinking about trying Dash out. Right now if you buy two Dash Buttons, Amazon will give you one of them for free, and then a $4.99 credit the first time you actually use it (list price on a Dash Button is $4.99). Amazon Dash is a simple Wi-Fi connected gadget that lets you order your favorite things with just the push of a button. Keep it by your washing machine, your pet food, or in the bathroom closet. When you notice you're running low, just press the button and Amazon ships it right out. Each button gets tied to a specific product from Amazon's library of over 300 brands, in categories such as (click each category to see samples) household supplies, beverage & grocery, health & personal care, beauty products, pets, kids & baby, and more. Access this deal on Amazon. To read this article in full or to leave a comment, please click here

Lessons learned from the failure of Ubuntu Touch

With the death of yet another open source/free software/Linux-based mobile platform, Ubuntu Touch, clearly it is time for us to sit down and have a frank discussion about what we in the free software world can reasonably accomplish in a mobile platform. One of the biggest issues—if not THE biggest issue—with Ubuntu Touch was that it simply had goals that were far too aggressive to reasonably achieve. It suffered from the all-too-common malady known in software development as feature creep. Ubuntu Touch was not simply a project to bring the existing Ubuntu system to mobile hardware and add functionality specific to that hardware (such as phone dialing, cell data, etc.). The project also contained: To read this article in full or to leave a comment, please click here

Cybersecurity skills shortage impact on technology innovation

The global cybersecurity skills shortage continues to be a critical issue. For example, ESG research found 45% of organizations report a “problematic shortage” of cybersecurity skills today, more than any other area within IT.Want more? Here are a few tidbits from last year’s research project done in conjunction with the Information Systems Security Association (ISSA). In a survey of 437 cybersecurity professionals and ISSA members: 29% of cybersecurity professionals said the global cybersecurity skills shortage has had a significant impact on their organization. Another 40% said the global cybersecurity skills shortage has impacted their organization “somewhat.” When asked to identify the impact of the cybersecurity skills shortage: 54% said it increased the cybersecurity staff’s workload 35% said their organization had to hire and train junior staff rather than hire people with the appropriate level of experience necessary 35% said the cybersecurity skills shortage has created a situation whereby the infosec team hasn’t had time to learn or use its security technologies to their full potential While the cybersecurity skills shortage endures, the industry itself remains white hot. According to a recent Bloomberg business article, the cybersecurity industry is expected to grow about 7% a year through 2019 to Continue reading

Cybersecurity skills shortage impact on technology innovation

The global cybersecurity skills shortage continues to be a critical issue. For example, ESG research found 45% of organizations report a “problematic shortage” of cybersecurity skills today, more than any other area within IT.Want more? Here are a few tidbits from last year’s research project done in conjunction with the Information Systems Security Association (ISSA). In a survey of 437 cybersecurity professionals and ISSA members: 29% of cybersecurity professionals said the global cybersecurity skills shortage has had a significant impact on their organization. Another 40% said the global cybersecurity skills shortage has impacted their organization “somewhat.” When asked to identify the impact of the cybersecurity skills shortage: 54% said it increased the cybersecurity staff’s workload 35% said their organization had to hire and train junior staff rather than hire people with the appropriate level of experience necessary 35% said the cybersecurity skills shortage has created a situation whereby the infosec team hasn’t had time to learn or use its security technologies to their full potential While the cybersecurity skills shortage endures, the industry itself remains white hot. According to a recent Bloomberg business article, the cybersecurity industry is expected to grow about 7% a year through 2019 to Continue reading

Respond to ransomware in three steps: secure, assess, recover

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Your help desk email and phones start lighting up. Your CIO is in your office looking stressed and staring at you. Quickly, you learn your company is the latest target of a ransomware attack.Logically, you shouldn’t be in this position. The latest detection software and data protection tactics are commonplace at your organization, intending to keep you out of this mess. Also, you have followed all best practices to ensure maximum data availability, so it’s likely your backups and disaster recovery sites were impacted as well. At this point, all that matters is that your data has been kidnapped, and you need to restore operations as soon as possible.To read this article in full or to leave a comment, please click here

Respond to ransomware in three steps: secure, assess, recover

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Your help desk email and phones start lighting up. Your CIO is in your office looking stressed and staring at you. Quickly, you learn your company is the latest target of a ransomware attack.

Logically, you shouldn’t be in this position. The latest detection software and data protection tactics are commonplace at your organization, intending to keep you out of this mess. Also, you have followed all best practices to ensure maximum data availability, so it’s likely your backups and disaster recovery sites were impacted as well. At this point, all that matters is that your data has been kidnapped, and you need to restore operations as soon as possible.

To read this article in full or to leave a comment, please click here