Archive

Category Archives for "Networking"

DARPA opens massive “Colosseum” to develop radical wireless applications

DARPA today said it the opened unique and massive testbed it will use as a battleground for researchers to build and test autonomous, intelligent and collaborative wireless technologies.Calling it a “magnificent electronic arena” The Colosseum will be primarily used to host the Defense Advanced Research Projects Agency’s $3.75 million three-year Spectrum Collaboration Challenge (SC2), which will pit researchers against each other to develop what the agency calls radically new technologies for “using and managing access to the electromagnetic spectrum in both military and civilian domains.”To read this article in full or to leave a comment, please click here

DARPA opens massive “Colosseum” to develop radical wireless applications

DARPA today said it the opened unique and massive testbed it will use as a battleground for researchers to build and test autonomous, intelligent and collaborative wireless technologies.Calling it a “magnificent electronic arena” The Colosseum will be primarily used to host the Defense Advanced Research Projects Agency’s $3.75 million three-year Spectrum Collaboration Challenge (SC2), which will pit researchers against each other to develop what the agency calls radically new technologies for “using and managing access to the electromagnetic spectrum in both military and civilian domains.”To read this article in full or to leave a comment, please click here

Microsoft updates Office Online Server, announces release schedule

Microsoft announced it intends to stick to a twice-per-year cadence of major releases for Windows 10 and Office. Along with that, it has updated the Office Online Server for data centers.Office Online Server basically lets companies deliver Office Online to their users from their data centers rather than over the internet and from Microsoft’s servers. Microsoft introduced the Office Online Server (OOS) as a successor to Office Web Apps Server 2013.+ Also on Network World: Microsoft ends updates for Windows 7/8.1 on new processors + Office Online is not the same as Office 365. There are differences in the apps, although the core remains the same. One thing different is that Office Online doesn’t use the ribbon in some apps. But the basics—Word, Excel, Powerpoint and OneNote—are all there. Outlook is available only through Outlook.com.To read this article in full or to leave a comment, please click here

Forget signatures for malware detection. SparkCognition says AI is 99% effective  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  The notion of detecting malware by looking for malicious file signatures is obsolete. Depending on which source is cited, anywhere from 300,000 to one million new malware files are identified every day.Kaspersky Lab says it finds 323,000 files daily, AV-TEST claims to discover more than 390,000 new malicious programs every day, and Symantec says it uncovers almost a million new threats per day. No matter how you count it, that’s a lot of malicious software being unleased into the wild day after day.To read this article in full or to leave a comment, please click here

Forget signatures for malware detection. SparkCognition says AI is 99% effective  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  The notion of detecting malware by looking for malicious file signatures is obsolete. Depending on which source is cited, anywhere from 300,000 to one million new malware files are identified every day.Kaspersky Lab says it finds 323,000 files daily, AV-TEST claims to discover more than 390,000 new malicious programs every day, and Symantec says it uncovers almost a million new threats per day. No matter how you count it, that’s a lot of malicious software being unleased into the wild day after day.To read this article in full or to leave a comment, please click here

75% off Lamicall S1 Cell Phone Dock – Deal Alert

Designed on a low center of gravity makes it stable. The extended hooks keep the phone in safety, and rubber cushions protect the phone from scratches and sliding. Suitable height, perfect angle of view when using Facetime and YouTube, makes it so easy to read message and emails. Compatible with iPhone and Android phones even when they have an added case.  The doc averages 4.8 out of 5 stars from over 4,500 reviewers on Amazon (86% rate a full 5 stars: see reviews), where its typical list price of $36.99 has been reduced 19% to $29.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

MIT selling 8 million coveted IPv4 addresses; Amazon a buyer

MIT is selling half of its 16 million valuable IPv4 addresses – an increasingly scarce stash it has held since the birth of the Internet. While details of the sale have not been made public, at least some of those addresses have already been transferred to Amazon.MIT says it will use the proceeds of the sale to finance its own IPv6 network upgrades and “support activities focused on the future of the Internet and the global cyber-infrastructure.”From an announcement by Next Generation MITnet. Fourteen million of these IPv4 addresses have not been used, and we have concluded that at least eight million are excess and can be sold without impacting our current or future needs, up to the point when IPv6 becomes universal and address scarcity is no longer an issue. The Institute holds a block of 20 times 10^30 (20 nonillion) IPv6 addresses.To read this article in full or to leave a comment, please click here

MIT selling 8 million coveted IPv4 addresses; Amazon a buyer

MIT is selling half of its 16 million valuable IPv4 addresses – an increasingly scarce stash it has held since the birth of the Internet. While details of the sale have not been made public, at least some of those addresses have already been transferred to Amazon.MIT says it will use the proceeds of the sale to finance its own IPv6 network upgrades and “support activities focused on the future of the Internet and the global cyber-infrastructure.”From an announcement by Next Generation MITnet. Fourteen million of these IPv4 addresses have not been used, and we have concluded that at least eight million are excess and can be sold without impacting our current or future needs, up to the point when IPv6 becomes universal and address scarcity is no longer an issue. The Institute holds a block of 20 times 10^30 (20 nonillion) IPv6 addresses.To read this article in full or to leave a comment, please click here

MIT selling 8 million coveted IPv4 addresses; Amazon a buyer

MIT is selling half of its 16 million valuable IPv4 addresses – an increasingly scarce stash it has held since the birth of the Internet. While details of the sale have not been made public, at least some of those addresses have already been transferred to Amazon.MIT says it will use the proceeds of the sale to finance its own IPv6 network upgrades and “support activities focused on the future of the Internet and the global cyber-infrastructure.”From an announcement by Next Generation MITnet. Fourteen million of these IPv4 addresses have not been used, and we have concluded that at least eight million are excess and can be sold without impacting our current or future needs, up to the point when IPv6 becomes universal and address scarcity is no longer an issue. The Institute holds a block of 20 times 10^30 (20 nonillion) IPv6 addresses.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Is your company spending on the right security technologies?

Investing in security technologies is a given for most companies today, and with stories of breaches and hacks making headlines every week, the importance of these tools has risen to prominence.While there’s no shortage of security technologies to choose from, the big question that remains is: How does a company choose the right security investments? Many organizations struggle to implement the right tools to manage and mitigate risk, and getting all of these solutions to actually work together often presents an even bigger challenge.With that in mind, here are three considerations that can help companies make the right decisions when it comes to investing in security technology:To read this article in full or to leave a comment, please click here

IDG Contributor Network: Is your company spending on the right security technologies?

Investing in security technologies is a given for most companies today, and with stories of breaches and hacks making headlines every week, the importance of these tools has risen to prominence.While there’s no shortage of security technologies to choose from, the big question that remains is: How does a company choose the right security investments? Many organizations struggle to implement the right tools to manage and mitigate risk, and getting all of these solutions to actually work together often presents an even bigger challenge.With that in mind, here are three considerations that can help companies make the right decisions when it comes to investing in security technology:To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why banks should stay well clear of blockchain

If the financial services industry is banking on blockchain as the basis for new service innovation, it will be sorely disappointed. Blockchain's design principles are completely at odds with those of the industry, and the technology is fraught with flaws that could be catastrophic for financial institutions.I’ll come on to why in a moment. Clearly, there is a lot of hype and momentum around blockchain. WANdisco sees this first hand: We’re increasingly being approached by banks that think this is the kind of thing we do (it isn’t). And why are they interested? Because senior directors and investors have heard the buzz and concluded that this is something they need—that if they don’t seize the opportunity, they’ll miss out. They’re wrong. Banks need blockchain like a hole in the head.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why banks should stay well clear of blockchain

If the financial services industry is banking on blockchain as the basis for new service innovation, it will be sorely disappointed. Blockchain's design principles are completely at odds with those of the industry, and the technology is fraught with flaws that could be catastrophic for financial institutions.I’ll come on to why in a moment. Clearly, there is a lot of hype and momentum around blockchain. WANdisco sees this first hand: We’re increasingly being approached by banks that think this is the kind of thing we do (it isn’t). And why are they interested? Because senior directors and investors have heard the buzz and concluded that this is something they need—that if they don’t seize the opportunity, they’ll miss out. They’re wrong. Banks need blockchain like a hole in the head.To read this article in full or to leave a comment, please click here

Cybersecurity skills shortage threatens the mid-market

Each year, respondents ESG's annual global survey of IT and cybersecurity professionals are asked to identify the area where their organizations have a problematic shortage of skills. For the sixth year in a row, cybersecurity skills topped the list—this year, 45% of the 641 respondents said their organization has a problematic shortage of cybersecurity skills. Now, the cybersecurity skill shortage isn’t picky; it impacts all organizations across industries, organizational size, geography, etc. Nevertheless, global cybersecurity may be especially problematic for organizations in the mid-market, from 100 to 999 employees.Keep in mind that the skills shortage isn’t limited to headcount. Rather, it also includes skills deficiencies—situations where security staff members don’t have the right skills to address the dynamic and sophisticated threat landscape. To read this article in full or to leave a comment, please click here

Cybersecurity skills shortage threatens the mid-market

Each year, respondents ESG's annual global survey of IT and cybersecurity professionals are asked to identify the area where their organizations have a problematic shortage of skills. For the sixth year in a row, cybersecurity skills topped the list—this year, 45% of the 641 respondents said their organization has a problematic shortage of cybersecurity skills. Now, the cybersecurity skill shortage isn’t picky; it impacts all organizations across industries, organizational size, geography, etc. Nevertheless, global cybersecurity may be especially problematic for organizations in the mid-market, from 100 to 999 employees.Keep in mind that the skills shortage isn’t limited to headcount. Rather, it also includes skills deficiencies—situations where security staff members don’t have the right skills to address the dynamic and sophisticated threat landscape. To read this article in full or to leave a comment, please click here

Steam Link Is 18% Off – Mirror Your Gaming Setup to TV at 1080p – Deal Alert

The Steam Link allows existing Steam gamers to expand the range of their current gaming set up via their home network. Just connect your Steam PC or Steam Machine to your home network, plug into a TV, and stream your games to the Link at 1080p. Video and audio data is sent from your computer to the Steam Link, while your controller input is sent back in real time. Virtually every game that your computer runs can be played on your TV. Steam Controller, Xbox One USB wired, Xbox 360 USB wired, Xbox 360 wireless, PS4, PS3 wired and Wii-U Pro controllers are compatible, as are many third-party Xbox controllers. Steam Link's typical price is $50, but right now you can get it on Amazon for just $41. See the significantly discounted Steam Link on Amazon.To read this article in full or to leave a comment, please click here

The AMD Effect might be back—and that’s a good thing

In the early part of this century, Intel had become fat, dumb and lazy, not to mention complacent. Competitors such as AMD, Cyrix and VIA had been vanquished, and Intel stood alone on the x86 market. Its product offerings were a confusing mess of code names and features that confused even a propellerhead like me. Then AMD made its move. It introduced the Athlon, a dual-core, 64-bit x86 processor with the memory controller on the CPU. Intel pooh-poohed all of this. It had a 64-bit strategy called Itanium. No one needed 64 bits anyway.+ Also on Network World: Ryzen CPUs explained: Everything you need to know about AMD's disruptive multicore chips + Intel would eat its words. Once Microsoft and the Linux community introduced 64-bit versions of their operating systems, Athlon and its server equivalent Opteron would take off like a shot. Not because of performance, but because they shattered the 4GB memory limit of 32-bit processors. Now you could have servers with 8GB, 16GB or more, if you could afford it, and the age of server consolidation and virtualization had begun.To read this article in full or to leave a comment, please click here