Archive

Category Archives for "Networking"

Staples hires its very first CISO

Staples has hired its first chief information security officer (CISO), a key new member of the office supply giant's team that combines traditional IT and digital transformation. Staples New Staples CISO  Brett Wahlin CISO Brett Wahlin, who will report to the company's CTO, will be responsible for enterprise-wide information, product and data security during a time in which Staples looks to expand its delivery business.  His responsibilities extend into areas such as connected devices (think Amazon Echo/Google Home digital assistant competition in the office), fraud and loss prevention. To read this article in full or to leave a comment, please click here

Staples hires its very first CISO

Staples has hired its first chief information security officer (CISO), a key new member of the office supply giant's team that combines traditional IT and digital transformation. Staples New Staples CISO  Brett Wahlin CISO Brett Wahlin, who will report to the company's CTO, will be responsible for enterprise-wide information, product and data security during a time in which Staples looks to expand its delivery business.  His responsibilities extend into areas such as connected devices (think Amazon Echo/Google Home digital assistant competition in the office), fraud and loss prevention. To read this article in full or to leave a comment, please click here

Linux Foundation to develop tool for building blockchain business networks

The Linux Foundation announced a new software project under its Hyperledger open consortium aimed at creating a collaboration tool for building blockchain business networks -- or smart contracts -- and their deployment across a distributed ledger.The new project, called Hyperleder Composer, is a modeling language based on JavaScript and with REST API support, that allows non-developers and developers to model their business network. The language also supports modeling of relationships and data validation rules.For example, all blockchain business networks share certain elements, such as assets, participants, identities, transactions, and registries. With existing blockchain or distributed ledger technologies, it can be difficult for organizations to take a blockchain business use case and map the concepts into running code.To read this article in full or to leave a comment, please click here

McNealy sees Sun’s past in IoT’s future

When Sun Microsystems said, "The network is the computer," it might have been talking about the Internet of Things, which was little more than an idea at the time. Today, more machines than ever are talking to other machines, and computing is being distributed across far-flung networks.Onetime Sun CEO Scott McNealy sees some of the legendary company's vision coming to fruition in an IoT "data bus" from a small Silicon Valley outfit called Real-Time Innovations. On Tuesday, McNealy became the first member of RTI's Advisory Board.RTI's data bus is middleware for delivering the right information at the right time to all the people and systems that need it. The software runs on meshed computing nodes that can be a small as a microcontroller, and it uses several kinds of network connections to make sure the data gets through.To read this article in full or to leave a comment, please click here

McNealy sees Sun’s past in IoT’s future

When Sun Microsystems said, "The network is the computer," it might have been talking about the Internet of Things, which was little more than an idea at the time. Today, more machines than ever are talking to other machines, and computing is being distributed across far-flung networks.Onetime Sun CEO Scott McNealy sees some of the legendary company's vision coming to fruition in an IoT "data bus" from a small Silicon Valley outfit called Real-Time Innovations. On Tuesday, McNealy became the first member of RTI's Advisory Board.RTI's data bus is middleware for delivering the right information at the right time to all the people and systems that need it. The software runs on meshed computing nodes that can be a small as a microcontroller, and it uses several kinds of network connections to make sure the data gets through.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Tricentis and Panaya automate SAP testing

One criticism that I have never heard leveled at enterprise software vendor SAP is that it over simplifies things. Quite the opposite. In fact, SAP is well known for being a seriously complicated set of applications that offers huge amounts of flexibility, but huge amounts of complexity to go with it. Perhaps that is why a Google search on “SAP implementations gone wrong” brings up a steady stream of disaster stories.So, at first blush the partnership between Tricentis and Panaya makes sense. Panaya is a division of outsourcing company Infosys. It helps organizations using SAP and Oracle solutions to be more agile (and, yes, for the naysayers, “agile” is a relative term). It also helps with testing and collaboration across the entire software release process.To read this article in full or to leave a comment, please click here

Oracle hits back at modular Java critics

With voting on a module system for Java set to close within the Java community, a high-ranking official at Oracle is again defending the plan amid criticism from Red Hat.Modularity is the main feature in Java 9, which is due to arrive July 27—if the disagreement over modularization does not hold up the release. Oracle's Mark Reinhold, chief architect in the company's Java platform group, sent out an email on an openjdk mailing list Monday, arguing the issues being brought up have already been covered.To read this article in full or to leave a comment, please click here

IT worker who trained H-1B-holding replacement aims for Congress

Craig Diangelo was an IT worker at Northeast Utilities in Connecticut until he completed training his H-1B-visa-holding replacement. He was one of about 200 who lost their jobs in 2014 after two India-based IT offshore outsourcing firms took over their work at what is now called Eversource.Diangelo, at first, was quiet, bound by severance agreements signed with the company. Then he started speaking out. Craig Diangelo Craig DiangeloTo read this article in full or to leave a comment, please click here

How to check for the Intel Active Management exploit that lets hackers take over your PC

If you think you're immune from a scary exploit found in Intel's Active Management Technology just because you're a consumer, think again.The exploit, disclosed on May 1, lets bad actors bypass authentication in Intel's remote management hardware to take over your PC. This hardware, built into enterprise-class PCs, lets IT administrators remotely manage fleets of computers—install patches and software, and even update the BIOS as though they were sitting in front of it. It is, in essence, a God-mode.Here's the fine print: Many early news reports said "consumer PCs are unaffected." But what Intel actually said was, "consumer PCs with consumer firmware" are unaffected.To read this article in full or to leave a comment, please click here

How to check for the Intel Active Management exploit that lets hackers take over your PC

If you think you're immune from a scary exploit found in Intel's Active Management Technology just because you're a consumer, think again.The exploit, disclosed on May 1, lets bad actors bypass authentication in Intel's remote management hardware to take over your PC. This hardware, built into enterprise-class PCs, lets IT administrators remotely manage fleets of computers—install patches and software, and even update the BIOS as though they were sitting in front of it. It is, in essence, a God-mode.Here's the fine print: Many early news reports said "consumer PCs are unaffected." But what Intel actually said was, "consumer PCs with consumer firmware" are unaffected.To read this article in full or to leave a comment, please click here

6 things you need to know about IoT security

Security, trust and data integrityImage by ThinkstockThe emergence of IoT is altering our personal technology security paradigm and is a game-changer in customer/business interaction, in part due to the wide scope of available data and sheer number of devices collecting this data. McKinsey & Company estimates the IoT ecosystem will generate $6 trillion in value by 2025. Successful IoT offerings rely on the perception of benefit they can deliver to businesses and consumers while creating a proportionate foundation of security, trust, and data integrity. There are important ways that IoT technology can reduce data security risk while improving customer experience in a connected world.To read this article in full or to leave a comment, please click here

6 things you need to know about IoT security

Security, trust and data integrityImage by ThinkstockThe emergence of IoT is altering our personal technology security paradigm and is a game-changer in customer/business interaction, in part due to the wide scope of available data and sheer number of devices collecting this data. McKinsey & Company estimates the IoT ecosystem will generate $6 trillion in value by 2025. Successful IoT offerings rely on the perception of benefit they can deliver to businesses and consumers while creating a proportionate foundation of security, trust, and data integrity. There are important ways that IoT technology can reduce data security risk while improving customer experience in a connected world.To read this article in full or to leave a comment, please click here

6 things you need to know about IoT security

Security, trust and data integrityImage by ThinkstockThe emergence of IoT is altering our personal technology security paradigm and is a game-changer in customer/business interaction, in part due to the wide scope of available data and sheer number of devices collecting this data. McKinsey & Company estimates the IoT ecosystem will generate $6 trillion in value by 2025. Successful IoT offerings rely on the perception of benefit they can deliver to businesses and consumers while creating a proportionate foundation of security, trust, and data integrity. There are important ways that IoT technology can reduce data security risk while improving customer experience in a connected world.To read this article in full or to leave a comment, please click here

15 of the highest paying jobs in IT

Technology offers some of the highest paying and diverse jobs of any industry. While traditional tech roles like software engineer and product manager are still in high demand as CIOs struggle to find skilled IT pros, roles in sales, marketing and business development all offer healthy salaries and an alternate path into the industry.To read this article in full or to leave a comment, please click here(Insider Story)

ServiceNow taps AI to automate everyday workflows

ServiceNow is bringing enhanced machine-learning capabilities to its Now Platform for business process automation to help customers prevent outages, automatically route service requests, and predict and benchmark IT performance.The AI capabilities will be offered through the upcoming Intelligent Automation Engine, announced at the company's Knowledge conference in Orlando Tuesday. The move strengthens ServiceNow's base in IT management while making further inroads into other areas of the enterprise.The machine-learning capabilities will be brought into ServiceNow's cloud services for security, customer service, and HR. The Intelligent Automation Engine's algorithms are based on technology the company acquired through its purchase of DxContinuum in January.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Holographic Wi-Fi visually maps environments

Wi-Fi’s explosive growth is gaining even more momentum.Recently the Wi-Fi Alliance launched a certified program for “meter-level accuracy for indoor device location data” using its technology. Now, that location add-on tool is about to be joined by a kind of three-dimensional, Wi-Fi-derived holographic imaging. Both use the ubiquitous Wi-Fi data network we’ve come to know and love.Holographic Wi-Fi is a way to create three-dimensional images of spaces. It’s achieved by coupling Wi-Fi radio with graphical holograms.+ Also on Network World: Wi-Fi expanding to indoor location services + Some uses for the technology could be tracking products as they’re manufactured and move along in the production process, as well as searching for victims buried in collapsed buildings, say researchers from the Technical University of Munich who are developing the system.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Holographic Wi-Fi visually maps environments

Wi-Fi’s explosive growth is gaining even more momentum.Recently the Wi-Fi Alliance launched a certified program for “meter-level accuracy for indoor device location data” using its technology. Now, that location add-on tool is about to be joined by a kind of three-dimensional, Wi-Fi-derived holographic imaging. Both use the ubiquitous Wi-Fi data network we’ve come to know and love.Holographic Wi-Fi is a way to create three-dimensional images of spaces. It’s achieved by coupling Wi-Fi radio with graphical holograms.+ Also on Network World: Wi-Fi expanding to indoor location services + Some uses for the technology could be tracking products as they’re manufactured and move along in the production process, as well as searching for victims buried in collapsed buildings, say researchers from the Technical University of Munich who are developing the system.To read this article in full or to leave a comment, please click here

Workflow Enhanced Networking (WEN)

Software Defined Networking (SDN) offered lots of hope, a centralized control-plane, programmable network functions and authenticated network nodes. Once we all stopped laughing and rolling around the floor with rib ache, the reality of SDN dawned quickly. It was a nice academic thought and set of experiments, but for the masses, the original meaning of SDN has changed significantly. The software giants with mountains of cash will drive technology like this early and possibly pave the way for the rest of us eventually, but for the masses of enterprises that vendors serve and that have more immediate requirements, SDN isn’t something that’s had massive adoption. The question of ‘why’ is a pretty obvious place to start and you don’t have to look too far before you find answers.

I will not get in to the overlay and underlay arguments here. These have been done to death already. Lots of organizations and vendors offer various takes on the middle-ground, far left and far right. This isn’t a product pitch either.

This post is around the “next onwards step” as opposed to changing the world. I also ‘feel’, this is the natural pull as opposed to the industry push we’ve come to Continue reading