Archive

Category Archives for "Networking"

IDG Contributor Network: Cloud failures can occur anywhere on the hype cycle

Cloud architecture has settled into its “plateau of productivity” phase in the hype cycle. It has gone through experimental adoption, irrational enthusiasm, and despondent disillusion. Does that mean cloud projects are more likely to succeed now? Good question. The answer depends on both the business and engineering side of the project.On the productivity plateau, the battle is over. Efficient implementations blithely pile up profits for the stakeholders. Stop! This is not exactly my experience as a software engineer and architect. Projects succeed and fail in every stage of the hype cycle. The predominant reasons for failure may change with the phase, but a more mature technology is no guarantee of success. An engineer builds systems to meet the stakeholders’ requirements. The hype cycle is perception and expectation, not requirements.To read this article in full or to leave a comment, please click here

Openfabric: A Short Video of the IETF Presentation

The most current version of the draft can be found here. There is one more comment from Uma that still needs to be addressed, and one more section that needs to be added. There will probably be more changes, as well, over time. These sorts of drafts do not happen through one person; a number of folks have worked on various bits of the draft, including Shawn, Nikos, Ivan, Les, Naiming, Uma, and others—the folks who have added ideas, etc., are included in the contributors section, which is always worth paying attention to!

The post Openfabric: A Short Video of the IETF Presentation appeared first on 'net work.

US trade lobbying group attacked by suspected Chinese hackers

A group of what appears to be Chinese hackers infiltrated a U.S. trade-focused lobbying group as the two countries wrestle with how they treat imports of each other's goods and services.The APT10 Chinese hacking group appears to be behind a "strategic web compromise" in late February and early March at the National Foreign Trade Council, according to security vendor Fidelis Cybersecurity.The NFTC lobbies for open and fair trade and has pledged to work with U.S. President Donald Trump to "find ways to address Chinese policies that frustrate access to their market and undermine fair trade, while at the same time encouraging a positive trend in our trade relationship." Trump will meet with China President Xi Jinping in Florida this week.To read this article in full or to leave a comment, please click here

US trade lobbying group attacked by suspected Chinese hackers

A group of what appears to be Chinese hackers infiltrated a U.S. trade-focused lobbying group as the two countries wrestle with how they treat imports of each other's goods and services.The APT10 Chinese hacking group appears to be behind a "strategic web compromise" in late February and early March at the National Foreign Trade Council, according to security vendor Fidelis Cybersecurity.The NFTC lobbies for open and fair trade and has pledged to work with U.S. President Donald Trump to "find ways to address Chinese policies that frustrate access to their market and undermine fair trade, while at the same time encouraging a positive trend in our trade relationship." Trump will meet with China President Xi Jinping in Florida this week.To read this article in full or to leave a comment, please click here

5 reasons developers love containers

Linux containers have been around for almost a decade, but it was only with the release of Docker four years ago that large numbers of developers began to adopt the technology.  Now it seems that containers are everywhere and their popularity continues to rise.To read this article in full or to leave a comment, please click here(Insider Story)

Tableau switches to subscription pricing for its BI products

Tableau is making a big change in the way it sells its business intelligence products. The company announced Thursday that all of its software will be available as a subscription, rather than a single license plus a service fee.Businesses will need to pay $70 per user per month for a license of Tableau Desktop Professional, and $35 per user per month for Tableau Server. That compares to the company’s boxed software prices of $2000 for Desktop, plus a $400 annual renewal fee for software updates, and $800 for Server, plus a $200 annual fee.It’s a move that will provide additional flexibility, scalability and risk mitigation for Tableau customers, according to Francois Ajenstat, the company’s chief product officer.To read this article in full or to leave a comment, please click here

How a trucking company sped up mobile app development

Employees want access to business applications from mobile devices, which is a conundrum for CIOs: Do they adapt legacy software designed to run on desktops and laptops to run on smartphones and tablets or buy a platform that enables such portability with minimal coding? Trucking conglomerate Paccar chose the latter option to help deliver mobile applications across the company’s DAF, Peterbilt, Leyland and Kenworth business units, says CIO Lily Ley. Paccar Paccar's CIO Lily Ley.To read this article in full or to leave a comment, please click here

Windows 3.1: Twenty-five years later, it’s still a Microsoft milestone

Happy Birthday, Windows 3.1Imagine a world without the Start button. No, I'm not talking about Windows 8. Dig deep into your memory, and you may recall a time when Windows 3.1 ruled the Earth.Twenty-five years ago this month, Microsoft released version 3.1 of its MS-DOS graphical-shell-turned-operating-system. Windows 3.1 became the first version of Windows to be widely distributed with new PCs, cementing the dominance of Microsoft's OS on the IBM PC platform and signaling the dawn of the Golden Age of Windows.To read this article in full or to leave a comment, please click here

Cisco targets digital business transformation with new certifications

Cisco has rolled out new certifications and training for networking professionals looking to bolster their digital networking skillsets.“The workforce is changing and needs to evolve to handle a more software-centric, automated digital ecosystem,” Tejas Vashi, senior director, product strategy and marketing for Learning@Cisco.+More on Network World: Cisco issues variety of security warnings on wireless gear+Vashi said the digital network requires new skills and network engineers need to adapt to rapidly evolving technologies in analytics, software-defined networking, mobility, security and virtualization and cloud services. Traditional hardware-centric, manually configured networking models will be unable to scale and keep pace of digital businesses.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 3 things CIOs need to know about tech talent

With demand for technology talent increasing and IT facing competition for the best people from vendors, startups, and even other functions within their own companies, a tight labor market is quickly moving up the list of CIO challenges. They know that the best strategies for digital transformation will amount to nothing if they don’t have the right talent to implement them.But before IT leaders change their talent strategies, they need to understand what IT employees want and expect from their job. Recent findings from CEB’s Global Talent Monitor reveal three facts about IT staff and the way they think about compensation, job opportunities and personal development (Disclosure: I am employed by CEB).To read this article in full or to leave a comment, please click here

Get a $20 Discount If You Buy 3 Echo Dots on Amazon, For A Limited Time – Deal Alert

Alexa in every room? Get 3 Echo Dots for less than the price of one Amazon Echo, and save $20 on top with this limited time deal. Echo Dot is a hands-free, voice-controlled device that uses Alexa to play music, control smart home devices, provide information, read the news, set alarms, read audiobooks from Audible, and more. In fact, new Alexa "skills" are being created all the time. Amazon has quietly published a special code that will apply a $20 discount when you buy 3 Echo Dots -- good until 4/25 only. Just put them in your cart and apply the code DOT3PACK to activate this deal. If you're in the market for a few Dots, jump over to Amazon and claim your discount while it lasts.To read this article in full or to leave a comment, please click here

F-Secure buys Little Flocker to combat macOS ransomware

With attacks against Mac users growing in number and sophistication, endpoint security vendor F-Secure has decided to acquire Little Flocker, a macOS application that provides behavior-based protection against ransomware and other malicious programs.Little Flocker can be used to enforce strict access controls to a Mac's files and directories as well as its webcam, microphone and other resources. It's particularly effective against ransomware, spyware, computer Trojans and other malicious programs that attempt to steal, encrypt or destroy files.F-Secure plans to integrate Little Flocker, which it calls "the most advanced security technology available for Macs," into its new Xfence technology. Xfence is designed to  add behavioral-based protection to its existing endpoint security products for macOS.To read this article in full or to leave a comment, please click here

F-Secure buys Little Flocker to combat macOS ransomware

With attacks against Mac users growing in number and sophistication, endpoint security vendor F-Secure has decided to acquire Little Flocker, a macOS application that provides behavior-based protection against ransomware and other malicious programs.Little Flocker can be used to enforce strict access controls to a Mac's files and directories as well as its webcam, microphone and other resources. It's particularly effective against ransomware, spyware, computer Trojans and other malicious programs that attempt to steal, encrypt or destroy files.F-Secure plans to integrate Little Flocker, which it calls "the most advanced security technology available for Macs," into its new Xfence technology. Xfence is designed to  add behavioral-based protection to its existing endpoint security products for macOS.To read this article in full or to leave a comment, please click here

29% off Zendure A8 26,800mAh Portable Battery Bank with LED Display – Deal Alert

One of the world's highest capacity portable chargers. Charge Zendure while charging your devices at full speed with a single wall charger, a feature rarely seen in other power banks. The QC port outputs 5-6V/3.0A,6-9V/2.0A,9-12V/1.5A (18W Max) when connected to a compatible device. Charges an iPhone 6s 9 times and the Galaxy S6 over seven times. Durable, stylish, and built to retain 95% of its charge after 6 months without use. An LED digital display accurately shows the remaining capacity. The product averages 4.5 out of 5 stars on Amazon from over 570 people (read recent reviews). The typical list price has been reduced a generous 29%. See this deal on Amazon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Flatbed scanners are latest cyberattack vector

Office scanners are now susceptible to attack, according to researchers. The ubiquitous office equipment’s light-sensitivity can allow passing vehicles, or laser-carrying drones to trigger malware in a network, says a research team from two Israeli universities.The computer experts say they have been able to successfully create a test “covert channel” between a server and flatbed scanner. The proof-of-concept hack, in some experimental cases, was performed almost a kilometer away from the scanner. They used a kind of infiltrating illumination to fool the device.Numerous light sources could be used, they say. Hijacked smart bulbs and lasers were both used for the data-grab in experiments, the Ben-Gurion University of the Negev, and Weizmann Institute of Science researchers say in their paper (PDF).To read this article in full or to leave a comment, please click here