Archive

Category Archives for "Networking"

How to derive real, actionable insights from your data lake: Five best practices

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.More businesses are embarking on data lake initiatives than ever before, yet Gartnerpredicts 90% of deployed data lakes will be useless through 2018 as they’re overwhelmed with data with no clear use cases. Organizations may see the value of having a single repository to house all enterprise data, but lack the resources, knowledge and processes to ensure the data in the lake is of good quality and actually useful to the business.  To truly leverage your organization’s data lake to derive real, actionable insights, there are five best practices to keep in mind:To read this article in full or to leave a comment, please click here

How to derive real, actionable insights from your data lake: Five best practices

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

More businesses are embarking on data lake initiatives than ever before, yet Gartnerpredicts 90% of deployed data lakes will be useless through 2018 as they’re overwhelmed with data with no clear use cases. Organizations may see the value of having a single repository to house all enterprise data, but lack the resources, knowledge and processes to ensure the data in the lake is of good quality and actually useful to the business.  To truly leverage your organization’s data lake to derive real, actionable insights, there are five best practices to keep in mind:

To read this article in full or to leave a comment, please click here

Microsoft adds another layer to the Windows 10 patching onion

Microsoft yesterday added another update cycle to Windows 10's monthly patching, saying that the new collection of non-security-only fixes would give corporate customers the "increased flexibility" they had demanded.On Monday, Michael Niehaus, director of Windows 10 product marketing, announced the new monthly update, saying that the company would initially issue it only to customers running 1703, the upgrade also known as Creators Update, which launched earlier this month."We will routinely offer one (or sometimes more than one) additional update each month," Niehaus wrote in a post to a company blog. "These additional cumulative updates will contain only new non-security updates" [emphasis added].To read this article in full or to leave a comment, please click here

FCC chairman plans to ‘reverse the mistake’ of net neutrality

The U.S. Federal Communications Commission will vote on May 18 to kick off a proceeding to "reverse the mistake" of the agency's 2-year-old net neutrality rules, FCC Chairman Ajit Pai said.The rulemaking proceeding would be the first step toward repealing the regulations and reversing the agency's 2015 decision to classify broadband as a regulated, telecom-like service.Pai didn't provide a lot of detail about his proposal during a speech Wednesday, but during the rulemaking, the FCC will seek public comment on how best to move forward with new net neutrality rules or guidelines, he said. The FCC is scheduled to release the text of Pai's proposal on Thursday.To read this article in full or to leave a comment, please click here

FCC chairman plans to ‘reverse the mistake’ of net neutrality

The U.S. Federal Communications Commission will vote on May 18 to kick off a proceeding to "reverse the mistake" of the agency's 2-year-old net neutrality rules, FCC Chairman Ajit Pai said.The rulemaking proceeding would be the first step toward repealing the regulations and reversing the agency's 2015 decision to classify broadband as a regulated, telecom-like service.Pai didn't provide a lot of detail about his proposal during a speech Wednesday, but during the rulemaking, the FCC will seek public comment on how best to move forward with new net neutrality rules or guidelines, he said. The FCC is scheduled to release the text of Pai's proposal on Thursday.To read this article in full or to leave a comment, please click here

Don’t Miss our Self-Healing Networks Session at the Red Hat Summit

One of my favorite technology catch phrases is “all technology fails”, but when thinking about the network that thought becomes a very scary one. Yes, while all technology does fail, you will always do your best to not have the network be one of those. The concept of healing networks from a conceptual standpoint (the will to want to detect an issue and fix it as soon as possible) is not a new one, as network monitoring is always at the front of any network engineer's mind. We are just fortunate in this day and age to be able to take advantage of newer tools that provide better solutions. Ansible to the rescue!

If you are attending the Red Hat Summit, please make sure not to miss the Discovery Zone session entitled “Self-Healing Networks with Ansible” on Thursday, May 4th at 10:15AM.

In this presentation we will cover topics, such as:

  • Why Capturing Metrics from Your Network is Important
  • Defining Failure States
  • Auto-Remediation versus Remediation (if remediation is the optimal course of action)
  • How Are The “Small" Guys Doing It?
  • Best Use Cases for Ansible Core and Ansible Tower
  • How Can Consulting Services help?

At the end of this session, Continue reading

Companion mobile app exposed Hyundai cars to potential hijacking

The mobile application that accompanies many Hyundai cars exposed sensitive information that could have allowed attackers to remotely locate, unlock, and start vehicles.The vulnerability was patched in the latest version of the mobile app released in March but was publicly disclosed on Tuesday. It is the latest in a string of flaws found over the past few years in the "smart" features added by vehicle manufacturers to their cars.The Hyundai issue was discovered by independent researchers William Hatzer and Arjun Kumar when analyzing the MyHyundai with Blue Link mobile app.Blue Link is a subscription-based technology that's available for many Hyundai car models released after 2012. It allows car owners to remotely locate their vehicles in case of theft, to remotely unlock them if they lose or misplace their keys, and even to remotely start or stop their engine when they're parked and locked.To read this article in full or to leave a comment, please click here

Companion mobile app exposed Hyundai cars to potential hijacking

The mobile application that accompanies many Hyundai cars exposed sensitive information that could have allowed attackers to remotely locate, unlock, and start vehicles.The vulnerability was patched in the latest version of the mobile app released in March but was publicly disclosed on Tuesday. It is the latest in a string of flaws found over the past few years in the "smart" features added by vehicle manufacturers to their cars.The Hyundai issue was discovered by independent researchers William Hatzer and Arjun Kumar when analyzing the MyHyundai with Blue Link mobile app.Blue Link is a subscription-based technology that's available for many Hyundai car models released after 2012. It allows car owners to remotely locate their vehicles in case of theft, to remotely unlock them if they lose or misplace their keys, and even to remotely start or stop their engine when they're parked and locked.To read this article in full or to leave a comment, please click here

5 more open source companies to watch in 2017

An exciting class of startups with a focus on enterprise IT are those built on open source foundations, in some cases commercializing and adding value to an already popular open source project.We recently highlighted 5 such open source-oriented companies, and below we introduce you to 5 more. Note that this list only contains companies that have announced funding over the past year or so, and isn't intended to be an all-inclusive compilation. Without further ado…ConfluentFounded: 2014To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why are mainframes still in the enterprise data center?

In the recent past, I've had the opportunity to speak with representatives of Cobol-IT, Compuware, Heirloom Computing, TmaxSoft and a few others who have targeted enterprises still using mainframes.A few of them, such as Compuware, are focused on adding rapid application development and deployment (aka DevOps) to the mainframe, making the environment seem relevant today.+ Also on Network World: Why banks love mainframes + Most of the others, however, are focused on convincing enterprises that it is finally time for them to abandon the mainframe and move those workloads to industry-standard x86 systems running Windows or Linux or, perhaps, to midrange Unix systems.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why are mainframes still in the enterprise data center?

In the recent past, I've had the opportunity to speak with representatives of Cobol-IT, Compuware, Heirloom Computing, TmaxSoft and a few others who have targeted enterprises still using mainframes.A few of them, such as Compuware, are focused on adding rapid application development and deployment (aka DevOps) to the mainframe, making the environment seem relevant today.+ Also on Network World: Why banks love mainframes + Most of the others, however, are focused on convincing enterprises that it is finally time for them to abandon the mainframe and move those workloads to industry-standard x86 systems running Windows or Linux or, perhaps, to midrange Unix systems.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How open banking can drive competitive advantage

In the banking sector, the concept of “open” can seem contradictory. Banks traditionally have a “duty of care” to protect their assets rigorously, as required by regulators and customers. Yet today banks are faced with increasingly complex requirements.The blending of the financial and technology sectors has created a world in which banks protect our assets, but they are also asked to constantly innovate, create new customer channels or services, and maintain compliance across a changing regulatory landscape. To keep pace and remain competitive, banks must take another page from the technology world and embrace open architectures.  + Also on Network World: Financial services firm adopts agile for digital development + APIs are a mainstay of today’s technology and start-up culture, and they are a primary mechanism for building open architectures and platforms. From Yahoo to Facebook, Google, Amazon and more, industry vanguards and emerging companies alike have allowed third parties to access and build upon their codes and platforms via APIs. While giving peers and, in some cases, competitors “access to the house” might seem counterintuitive, the results are remarkable—continuous, rapid innovation, continued product development, and an open ecosystem of knowledge sharing.To read this article in full Continue reading

IDG Contributor Network: How open banking can drive competitive advantage

In the banking sector, the concept of “open” can seem contradictory. Banks traditionally have a “duty of care” to protect their assets rigorously, as required by regulators and customers. Yet today banks are faced with increasingly complex requirements.The blending of the financial and technology sectors has created a world in which banks protect our assets, but they are also asked to constantly innovate, create new customer channels or services, and maintain compliance across a changing regulatory landscape. To keep pace and remain competitive, banks must take another page from the technology world and embrace open architectures.  + Also on Network World: Financial services firm adopts agile for digital development + APIs are a mainstay of today’s technology and start-up culture, and they are a primary mechanism for building open architectures and platforms. From Yahoo to Facebook, Google, Amazon and more, industry vanguards and emerging companies alike have allowed third parties to access and build upon their codes and platforms via APIs. While giving peers and, in some cases, competitors “access to the house” might seem counterintuitive, the results are remarkable—continuous, rapid innovation, continued product development, and an open ecosystem of knowledge sharing.To read this article in full Continue reading

IDG Contributor Network: MasterCard puts a finger on fraud

Most credit card verification systems only verify whether the card is valid and not if the presenter is the authorized cardholder. MasterCard intends to address that with its newly introduced card with a built-in fingerprint sensor.This new MasterCard gives customers the option of using a single digit rather than a PIN. It’s a very impressive development, particularly since it works with existing chip readers.+ Also on Network World: Google’s Trust API: Bye-bye passwords, hello biometrics? + The card gives new meaning to the title “cardholder” as the customer must physically hold the card during the transaction. There’s a fingerprint sensor on the face of the card that syphons enough power from the chip reader to read and validate a fingerprint. If dirt, sweat or other factors prevent validation, the transaction can be completed with a PIN.To read this article in full or to leave a comment, please click here

IDG Contributor Network: MasterCard puts a finger on fraud

Most credit card verification systems only verify whether the card is valid and not if the presenter is the authorized cardholder. MasterCard intends to address that with its newly introduced card with a built-in fingerprint sensor.This new MasterCard gives customers the option of using a single digit rather than a PIN. It’s a very impressive development, particularly since it works with existing chip readers.+ Also on Network World: Google’s Trust API: Bye-bye passwords, hello biometrics? + The card gives new meaning to the title “cardholder” as the customer must physically hold the card during the transaction. There’s a fingerprint sensor on the face of the card that syphons enough power from the chip reader to read and validate a fingerprint. If dirt, sweat or other factors prevent validation, the transaction can be completed with a PIN.To read this article in full or to leave a comment, please click here

One the ‘net: The Network Collective and Choosing a Routing Protocol

The Network Collective is a new and very interesting video cast of various people sitting around a virtual table talking about topics of interest to network engineers. I was on the second episode last night, and the video is already (!) posted this morning. You should definitely watch this one!

In episode 2 our panel discusses some key differences between routing protocols and the details that should be considered before choosing to implement one over another. Is there any difference between IGP routing protocols at this point? When does it make sense to run BGP in an enterprise network? Is IS-IS an old and decaying protocol, or something you should viably consider? Russ White, Kevin Myers, and the co-hosts of Network Collective tackle these questions and more.

The post One the ‘net: The Network Collective and Choosing a Routing Protocol appeared first on rule 11 reader.

29% off Cooler Master Hyper 212 EVO CPU Cooler with 120mm PWM Fan – Deal Alert

The Hyper 212 EVO now features four Cooler Master patented Continuous Direct Contact (CDC) heat pipes that are tightly packed into a flat array on the CPU Cooler base. This acts as a virtual vapor chamber that dissipates a large amount of heat. The aluminum fin structure has been optimized to provide the perfect performance balance between high and low speed fan operations.  The fan averages 4.4 out of 5 stars from over 7,600 people on Amazon (read reviews here), where its typical list price of $34.99 has been reduced 29% to just $24.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here