Archive

Category Archives for "Networking"

Users’ orders: Make it easier to build hybrid clouds

A funny thing happened on the way to the hybrid cloud: Building the infrastructure was a pain in the neck.That's what enterprise IT people in the Open Networking User Group have discovered Last year, public cloud providers persuaded C-level executives to move significant corporate workloads to the cloud, but the tools weren't there to make it work, said Nick Lippis, co-founder and co-chairman of ONUG."There is a ton of custom work that has to be done," Lippis said.So the user group, which includes IT executives from hundreds of enterprises, chose building hybrid cloud infrastructure as its focus for this year. It will be the main topic at ONUG Spring 2017, taking place next week in San Francisco.To read this article in full or to leave a comment, please click here

Researchers build a microprocessor from flexible materials

Researchers have built a primitive microprocessor out of a two-dimensional material similar to graphene, the flexible conductive wonder material that some believe will revolutionize the design and manufacture of batteries, sensors and chips.With only 115 transistors, their processor isn't going to top any benchmark rankings, but it's "a first step towards the development of microprocessors based on 2D semiconductors," the researchers at Vienna University of Technology said in a paper published in the journal Nature this month.To read this article in full or to leave a comment, please click here

DARPA opens massive “Colosseum” to develop radical wireless applications

DARPA today said it the opened unique and massive testbed it will use as a battleground for researchers to build and test autonomous, intelligent and collaborative wireless technologies.Calling it a “magnificent electronic arena” The Colosseum will be primarily used to host the Defense Advanced Research Projects Agency’s $3.75 million three-year Spectrum Collaboration Challenge (SC2), which will pit researchers against each other to develop what the agency calls radically new technologies for “using and managing access to the electromagnetic spectrum in both military and civilian domains.”To read this article in full or to leave a comment, please click here

DARPA opens massive “Colosseum” to develop radical wireless applications

DARPA today said it the opened unique and massive testbed it will use as a battleground for researchers to build and test autonomous, intelligent and collaborative wireless technologies.Calling it a “magnificent electronic arena” The Colosseum will be primarily used to host the Defense Advanced Research Projects Agency’s $3.75 million three-year Spectrum Collaboration Challenge (SC2), which will pit researchers against each other to develop what the agency calls radically new technologies for “using and managing access to the electromagnetic spectrum in both military and civilian domains.”To read this article in full or to leave a comment, please click here

Microsoft updates Office Online Server, announces release schedule

Microsoft announced it intends to stick to a twice-per-year cadence of major releases for Windows 10 and Office. Along with that, it has updated the Office Online Server for data centers.Office Online Server basically lets companies deliver Office Online to their users from their data centers rather than over the internet and from Microsoft’s servers. Microsoft introduced the Office Online Server (OOS) as a successor to Office Web Apps Server 2013.+ Also on Network World: Microsoft ends updates for Windows 7/8.1 on new processors + Office Online is not the same as Office 365. There are differences in the apps, although the core remains the same. One thing different is that Office Online doesn’t use the ribbon in some apps. But the basics—Word, Excel, Powerpoint and OneNote—are all there. Outlook is available only through Outlook.com.To read this article in full or to leave a comment, please click here

Forget signatures for malware detection. SparkCognition says AI is 99% effective  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  The notion of detecting malware by looking for malicious file signatures is obsolete. Depending on which source is cited, anywhere from 300,000 to one million new malware files are identified every day.Kaspersky Lab says it finds 323,000 files daily, AV-TEST claims to discover more than 390,000 new malicious programs every day, and Symantec says it uncovers almost a million new threats per day. No matter how you count it, that’s a lot of malicious software being unleased into the wild day after day.To read this article in full or to leave a comment, please click here

Forget signatures for malware detection. SparkCognition says AI is 99% effective  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  The notion of detecting malware by looking for malicious file signatures is obsolete. Depending on which source is cited, anywhere from 300,000 to one million new malware files are identified every day.Kaspersky Lab says it finds 323,000 files daily, AV-TEST claims to discover more than 390,000 new malicious programs every day, and Symantec says it uncovers almost a million new threats per day. No matter how you count it, that’s a lot of malicious software being unleased into the wild day after day.To read this article in full or to leave a comment, please click here

75% off Lamicall S1 Cell Phone Dock – Deal Alert

Designed on a low center of gravity makes it stable. The extended hooks keep the phone in safety, and rubber cushions protect the phone from scratches and sliding. Suitable height, perfect angle of view when using Facetime and YouTube, makes it so easy to read message and emails. Compatible with iPhone and Android phones even when they have an added case.  The doc averages 4.8 out of 5 stars from over 4,500 reviewers on Amazon (86% rate a full 5 stars: see reviews), where its typical list price of $36.99 has been reduced 19% to $29.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

MIT selling 8 million coveted IPv4 addresses; Amazon a buyer

MIT is selling half of its 16 million valuable IPv4 addresses – an increasingly scarce stash it has held since the birth of the Internet. While details of the sale have not been made public, at least some of those addresses have already been transferred to Amazon.MIT says it will use the proceeds of the sale to finance its own IPv6 network upgrades and “support activities focused on the future of the Internet and the global cyber-infrastructure.”From an announcement by Next Generation MITnet. Fourteen million of these IPv4 addresses have not been used, and we have concluded that at least eight million are excess and can be sold without impacting our current or future needs, up to the point when IPv6 becomes universal and address scarcity is no longer an issue. The Institute holds a block of 20 times 10^30 (20 nonillion) IPv6 addresses.To read this article in full or to leave a comment, please click here

MIT selling 8 million coveted IPv4 addresses; Amazon a buyer

MIT is selling half of its 16 million valuable IPv4 addresses – an increasingly scarce stash it has held since the birth of the Internet. While details of the sale have not been made public, at least some of those addresses have already been transferred to Amazon.MIT says it will use the proceeds of the sale to finance its own IPv6 network upgrades and “support activities focused on the future of the Internet and the global cyber-infrastructure.”From an announcement by Next Generation MITnet. Fourteen million of these IPv4 addresses have not been used, and we have concluded that at least eight million are excess and can be sold without impacting our current or future needs, up to the point when IPv6 becomes universal and address scarcity is no longer an issue. The Institute holds a block of 20 times 10^30 (20 nonillion) IPv6 addresses.To read this article in full or to leave a comment, please click here

MIT selling 8 million coveted IPv4 addresses; Amazon a buyer

MIT is selling half of its 16 million valuable IPv4 addresses – an increasingly scarce stash it has held since the birth of the Internet. While details of the sale have not been made public, at least some of those addresses have already been transferred to Amazon.MIT says it will use the proceeds of the sale to finance its own IPv6 network upgrades and “support activities focused on the future of the Internet and the global cyber-infrastructure.”From an announcement by Next Generation MITnet. Fourteen million of these IPv4 addresses have not been used, and we have concluded that at least eight million are excess and can be sold without impacting our current or future needs, up to the point when IPv6 becomes universal and address scarcity is no longer an issue. The Institute holds a block of 20 times 10^30 (20 nonillion) IPv6 addresses.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Is your company spending on the right security technologies?

Investing in security technologies is a given for most companies today, and with stories of breaches and hacks making headlines every week, the importance of these tools has risen to prominence.While there’s no shortage of security technologies to choose from, the big question that remains is: How does a company choose the right security investments? Many organizations struggle to implement the right tools to manage and mitigate risk, and getting all of these solutions to actually work together often presents an even bigger challenge.With that in mind, here are three considerations that can help companies make the right decisions when it comes to investing in security technology:To read this article in full or to leave a comment, please click here

IDG Contributor Network: Is your company spending on the right security technologies?

Investing in security technologies is a given for most companies today, and with stories of breaches and hacks making headlines every week, the importance of these tools has risen to prominence.While there’s no shortage of security technologies to choose from, the big question that remains is: How does a company choose the right security investments? Many organizations struggle to implement the right tools to manage and mitigate risk, and getting all of these solutions to actually work together often presents an even bigger challenge.With that in mind, here are three considerations that can help companies make the right decisions when it comes to investing in security technology:To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why banks should stay well clear of blockchain

If the financial services industry is banking on blockchain as the basis for new service innovation, it will be sorely disappointed. Blockchain's design principles are completely at odds with those of the industry, and the technology is fraught with flaws that could be catastrophic for financial institutions.I’ll come on to why in a moment. Clearly, there is a lot of hype and momentum around blockchain. WANdisco sees this first hand: We’re increasingly being approached by banks that think this is the kind of thing we do (it isn’t). And why are they interested? Because senior directors and investors have heard the buzz and concluded that this is something they need—that if they don’t seize the opportunity, they’ll miss out. They’re wrong. Banks need blockchain like a hole in the head.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why banks should stay well clear of blockchain

If the financial services industry is banking on blockchain as the basis for new service innovation, it will be sorely disappointed. Blockchain's design principles are completely at odds with those of the industry, and the technology is fraught with flaws that could be catastrophic for financial institutions.I’ll come on to why in a moment. Clearly, there is a lot of hype and momentum around blockchain. WANdisco sees this first hand: We’re increasingly being approached by banks that think this is the kind of thing we do (it isn’t). And why are they interested? Because senior directors and investors have heard the buzz and concluded that this is something they need—that if they don’t seize the opportunity, they’ll miss out. They’re wrong. Banks need blockchain like a hole in the head.To read this article in full or to leave a comment, please click here

Cybersecurity skills shortage threatens the mid-market

Each year, respondents ESG's annual global survey of IT and cybersecurity professionals are asked to identify the area where their organizations have a problematic shortage of skills. For the sixth year in a row, cybersecurity skills topped the list—this year, 45% of the 641 respondents said their organization has a problematic shortage of cybersecurity skills. Now, the cybersecurity skill shortage isn’t picky; it impacts all organizations across industries, organizational size, geography, etc. Nevertheless, global cybersecurity may be especially problematic for organizations in the mid-market, from 100 to 999 employees.Keep in mind that the skills shortage isn’t limited to headcount. Rather, it also includes skills deficiencies—situations where security staff members don’t have the right skills to address the dynamic and sophisticated threat landscape. To read this article in full or to leave a comment, please click here

Cybersecurity skills shortage threatens the mid-market

Each year, respondents ESG's annual global survey of IT and cybersecurity professionals are asked to identify the area where their organizations have a problematic shortage of skills. For the sixth year in a row, cybersecurity skills topped the list—this year, 45% of the 641 respondents said their organization has a problematic shortage of cybersecurity skills. Now, the cybersecurity skill shortage isn’t picky; it impacts all organizations across industries, organizational size, geography, etc. Nevertheless, global cybersecurity may be especially problematic for organizations in the mid-market, from 100 to 999 employees.Keep in mind that the skills shortage isn’t limited to headcount. Rather, it also includes skills deficiencies—situations where security staff members don’t have the right skills to address the dynamic and sophisticated threat landscape. To read this article in full or to leave a comment, please click here