Archive

Category Archives for "Networking"

Senator: Russia used ‘thousands’ of internet trolls during US election

The Russian government used "thousands" of internet trolls and bots to spread fake news, in addition to hacking into political campaigns leading up to the 2016 U.S. election, according to one lawmaker.Disinformation spread on social media was designed to raise doubts about the U.S. election and the campaign of Democratic presidential candidate Hillary Clinton, said Senator Mark Warner, a Virginia Democrat."This Russian propaganda on steroids was designed to poison the national conversation in America," Warner said Thursday during a Senate hearing on Russian election hacking. The Russian government used "thousands of paid internet trolls" and bots to spread disinformation on social media.To read this article in full or to leave a comment, please click here

Samsung reboots its smart home, IoT strategy with the Galaxy S8

Samsung has a portfolio of devices and appliances that would make Apple envious. But unlike Apple, Samsung devices don't work well together.With the Galaxy S8 smartphones and other new products, Samsung hopes that will change. The company is setting in motion a grand plan to build smart homes where its devices operate seamlessly and provide a consistent user experience.Samsung's S8 smartphones will be able to activate appliances through Connect, an app based on the company's SmartThings platform. With just a flick of the finger, the app will allow users to start a robot vacuum cleaner, dim lights, or even ask a Family Hub refrigerator to analyze contents and send a supermarket shopping list.To read this article in full or to leave a comment, please click here

What is bitemporal and why should the enterprise care?

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Today, databases are the primary system of record, and organizations are required to keep an accurate picture of all the facts, as they occur. Unfortunately, traditional databases are only temporal and cannot provide a truly accurate picture of your business at different points-in-time.What organizations need today, particularly in regulated industries, is support for bitemporal data.  With a bitemporal database, you can store and query data along two timelines with timestamps for both valid times—when a fact occurred in the real world (“what you knew”), and also system time—when that fact was recorded to the database (“when you knew it”). To read this article in full or to leave a comment, please click here

What is bitemporal and why should the enterprise care?

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Today, databases are the primary system of record, and organizations are required to keep an accurate picture of all the facts, as they occur. Unfortunately, traditional databases are only temporal and cannot provide a truly accurate picture of your business at different points-in-time.

What organizations need today, particularly in regulated industries, is support for bitemporal data.  With a bitemporal database, you can store and query data along two timelines with timestamps for both valid times—when a fact occurred in the real world (“what you knew”), and also system time—when that fact was recorded to the database (“when you knew it”). 

To read this article in full or to leave a comment, please click here

10 practical privacy tips for the post-privacy internet

ISPs and providers can now sell your data and browser histories. The U.S. Congress sold you out. If you had any browsing dignity, you don’t now. Too bad you couldn’t pay the legislators as much as the data wolves.You should have been doing these things all along, but now it’s time to decide just how much dignity you have. Most of you won’t bother. This isn’t for you. Click away, and go surf.For those remaining, take these privacy tips seriously.1. Educate yourself about cookies and clean them out regularly For some of you, this means a daily cleanout. What you DO NOT clean out (will cause you hassles) are cookies associated with financial institutions. They will put you through a drill when they don’t find the cookie that they like. Scrape them. Every browser has the ability to do this, with Chrome being the most difficult. But we’re not surprised because it’s from Google—the company whose very life depends on knowing information about you.To read this article in full or to leave a comment, please click here

10 practical privacy tips for the post-privacy internet

ISPs and providers can now sell your data and browser histories. The U.S. Congress sold you out. If you had any browsing dignity, you don’t now. Too bad you couldn’t pay the legislators as much as the data wolves.You should have been doing these things all along, but now it’s time to decide just how much dignity you have. Most of you won’t bother. This isn’t for you. Click away, and go surf.For those remaining, take these privacy tips seriously.1. Educate yourself about cookies and clean them out regularly For some of you, this means a daily cleanout. What you DO NOT clean out (will cause you hassles) are cookies associated with financial institutions. They will put you through a drill when they don’t find the cookie that they like. Scrape them. Every browser has the ability to do this, with Chrome being the most difficult. But we’re not surprised because it’s from Google—the company whose very life depends on knowing information about you.To read this article in full or to leave a comment, please click here

IBM technology creates smart wingman for self-driving cars

IBM said that it has patented a machine learning technology that defines how to shift control of an autonomous vehicle between a human driver and a vehicle control processor in the event of a potential emergency.+More on Network World: IBM on the state of network security: AbysmalBasically the patented IBM system employs onboard sensors and artificial intelligence to determine potential safety concerns and control whether self-driving vehicles are operated autonomously or by surrendering control to a human driver.To read this article in full or to leave a comment, please click here

IBM technology creates smart wingman for self-driving cars

IBM said that it has patented a machine learning technology that defines how to shift control of an autonomous vehicle between a human driver and a vehicle control processor in the event of a potential emergency.+More on Network World: IBM on the state of network security: AbysmalBasically the patented IBM system employs onboard sensors and artificial intelligence to determine potential safety concerns and control whether self-driving vehicles are operated autonomously or by surrendering control to a human driver.To read this article in full or to leave a comment, please click here

Do you own your social media contacts or does your employer?

Who among us hasn't taken a contact list when they left a job? Whether you leave voluntarily or involuntarily, one of the things you pack up is your Rolodex, or the modern equivalent, to take with you to the next job. It's pretty much standard.But what if you are a public figure and have a sizable social media following? Can you keep your millions of Facebook and/or Twitter followers? That issue has not been hashed out, but it might be in Dallas.+ Also on Network World: Facebook working with fact-checkers to weed out fake news + The Blaze, a news network established by talk show host Glenn Beck, is in the midst of parting company with its highest profile on-air talent aside from Beck. The company is severing ties with Tomi Lahren, a hotheaded 24-year-old whose on-air blasts of "snowflakes" and Black Lives Matter have made her a rising star in conservative circles.To read this article in full or to leave a comment, please click here

SS8’s time machine is designed to automate the hunt for compromises  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  When it comes to enterprise security, it has long been established that prevention, though critical, is not enough. Prevention largely depends on knowing what is bad and priming security devices like firewalls and intrusion prevention systems with the rules necessary to keep bad stuff out. The problem is, something can be bad but nobody knows it yet, so there’s no rule to put in the firewall. An attacker’s damage can be done long before the rule is created.To read this article in full or to leave a comment, please click here

SS8’s time machine is designed to automate the hunt for compromises  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  When it comes to enterprise security, it has long been established that prevention, though critical, is not enough. Prevention largely depends on knowing what is bad and priming security devices like firewalls and intrusion prevention systems with the rules necessary to keep bad stuff out. The problem is, something can be bad but nobody knows it yet, so there’s no rule to put in the firewall. An attacker’s damage can be done long before the rule is created.To read this article in full or to leave a comment, please click here

What Is Network Collective?

In short, Network Collective is a bi-weekly video roundtable where data networking engineers talk about industry trends, challenging projects, and what it takes to do network engineering day-to-day.  For a more thorough description of what were up to, please take a minute to watch the video above.

If you want to know exactly who is behind Network Collective, you can find that information on our Who Is Network Collective? page.And if you’re interested in being a guest on Network Collective, please tell us a little bit about who you are by filling out the form here.

The post What Is Network Collective? appeared first on Network Collective.

Mobile networks still stink, with more workers coming

A new survey sponsored by NetMotion Software and WBR Digital shows that mobile network connectivity problems are the top reason for mobile-related trouble ticket submissions at enterprise companies. But that might not matter in terms of growth – as the same survey indicated that more than half the companies (56%) expected their mobile workforce to increase this year.Despite Wi-Fi networks and mobile WAN (3G, 4G, etc.) being available for the better part of a decade or more, as well as mobile devices that have been in the hands of workers for almost the same amount of time, frustrations still exist when it comes to mobile networks. “Intermittent network connectivity or poor application stability can leave an employee cut off from essential information they need to do their jobs, leading to a frustrated worker and an unsatisfactory customer engagement,” the executive summary notes.To read this article in full or to leave a comment, please click here

Extreme-ly Interesting Times In Networking

If you’re a fan of Extreme Networks, the last few months have been pretty exciting for you. Just yesterday, it was announced that Extreme is buying the data center networking business of Brocade for $55 million once the Broadcom acquisition happens. Combined with the $100 million acquisition of Avaya’s campus networking portfolio on March 7th and the purchase of Zebra Wireless (nee Motorola) last September, Extreme is pushing itself into the market as a major player. How is that going to impact the landscape?

Building A Better Business

Extreme has been a player in the wireless space for a while. Their acquisition of Enterasys helped vault them into the mix with other big wireless players. Now, the rounding out of the portfolio helps them complete across the board. They aren’t just limited to playing with stadium wifi and campus technologies now. The campus networking story that was brought in through Avaya was a must to help them compete with Aruba, A Hewlett Packard Enterprise Company. Aruba owns the assets of HPE’s campus networking business and has been leveraging them effectively.

The data center play was an interesting one to say the least. I’ve mused recently that Brocade’s data center business Continue reading