Archive

Category Archives for "Networking"

Why great chief data officers are hard to find

Chief data officers (CDOs) are among the most highly sought-after executives among corporations for whom data analytics has become a cornerstone of digital strategies. But the rush to promote data-crunching experts to the CDO role has created a new challenge: Finding a leader who can use data to help drive a business transformation.Companies eager to establish data analytics have promoted managers to the CDO role based on their technical wizardry rather than their leadership capabilities, says Joshua Clarke, partner for executive recruiter Heidrick & Struggles, who highlighted the problem in "Choosing the right chief data officer," a new report detailing the rapid evolution of the CDO role.To read this article in full or to leave a comment, please click here

DARPA wants to cultivate the ultimate transistor of the future

Researchers with the Defense Advanced Research Projects Agency will this month present a program that looks to develop a new generation of radiofrequency (RF) and millimeter-wave transistors to address the power and range requirements for billions of wirelessly communicating devices in everything from unmanned aircraft and home appliances to sensors and smartphones.+More on Network World: DARPA plan would reinvent not-so-clever machine learning systems+“The same basic transistor types have been dominant since their invention and we have been engineering the heck out of them for 50 years,” said Dan Green, a program manager in DARPA’s Microsystems Technology Office (MTO) and the overseer of the forthcoming Dynamic Range-enhanced Electronics and Materials (DREaM) program. “We’ve gotten a lot out of that approach, but the focus on so few types of transistor technologies and just a few semiconductor materials also has fundamentally limited us in the RF world.”To read this article in full or to leave a comment, please click here

DARPA wants to cultivate the ultimate transistor of the future

Researchers with the Defense Advanced Research Projects Agency will this month present a program that looks to develop a new generation of radiofrequency (RF) and millimeter-wave transistors to address the power and range requirements for billions of wirelessly communicating devices in everything from unmanned aircraft and home appliances to sensors and smartphones. +More on Network World: DARPA plan would reinvent not-so-clever machine learning systems+ “The same basic transistor types have been dominant since their invention and we have been engineering the heck out of them for 50 years,” said Dan Green, a program manager in DARPA’s Microsystems Technology Office (MTO) and the overseer of the forthcoming Dynamic Range-enhanced Electronics and Materials (DREaM) program. “We’ve gotten a lot out of that approach, but the focus on so few types of transistor technologies and just a few semiconductor materials also has fundamentally limited us in the RF world.”To read this article in full or to leave a comment, please click here

Slack channel names can be written in more languages

Slack’s international customers are now able to set channel names in their native tongue, thanks to an update the group chat service rolled out Thursday. According to an in-app bulletin, users will be able to set up rooms to discuss work and other topics using a wider variety of characters. As a result, users can name channels in Japanese, German, French and a wide variety of other languages. It’s an improvement over Slack’s previous set of heavy restrictions on channel names. The news comes the same week that Microsoft released its competing Teams group chat app to Office 365 customers worldwide. At launch, Microsoft touted that the service supports 19 languages, and a test of its channel creation feature shows that it at least supports channel names using Japanese Hiragana, Simplified Chinese and Cyrillic characters.To read this article in full or to leave a comment, please click here

Social media companies have a month to update service terms in the EU

Facebook, Twitter and Google have been given a month to make changes to their user agreements in the European Union or face "enforcement action."European consumer authorities put the social media services on notice last November that their terms of service did not comply with EU law, asked them to make changes and to address the problem of scams that misled users of the services.The authorities and the European Commission met with the companies on Thursday to discuss their proposed changes, and gave them a month to make their final proposals, the European Commission said Friday. If those proposals don't satisfy the authorities, then they could take enforcement action, the Commission said.To read this article in full or to leave a comment, please click here

33% discount until 1st of April 2017 on all CCDE Products !

    33%  Discount – Limited seats ! On all CCDE Products It is only valid until 1st of April 2017 33% OFF On Below Products !  CCDE In-Depth  New CCDE Workbook buy now » Live/Instructor-Led  Online CCDE Training  buy now » Self Paced CCDE Training Lifetime Access buy now »   Discount is valid for both Online […]

The post 33% discount until 1st of April 2017 on all CCDE Products ! appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

17% off Ecobee3 Lite Wi-Fi Alexa Compatible Smart Thermostat – Deal Alert

Ecobee understands your local weather, schedule and desired comfort settings, to ensure your home is at the right temperature at the right time. Control it using your mobile device from anywhere, or using your voice via the Alexa service.  Get free monthly reports on how much energy you’ve saved and tips on how you can save even more. Ecobee monitors your heating and cooling systems and alerts you if it senses that something isn’t working properly. Currently the smart WiFi thermostat is discounted 17% off its typical list price, saving you $29. Get the Ecobee3 thermostat on Amazon now for $139.92. To read this article in full or to leave a comment, please click here

13% off Ecobee3 Lite Wi-Fi Alexa Compatible Smart Thermostat – Deal Alert

Ecobee understands your local weather, schedule and desired comfort settings, to ensure your home is at the right temperature at the right time. Control it using your mobile device from anywhere, or using your voice via the Alexa service.  Get free monthly reports on how much energy you’ve saved and tips on how you can save even more. Ecobee monitors your heating and cooling systems and alerts you if it senses that something isn’t working properly. Currently the smart WiFi thermostat is discounted 13% off its typical list price, saving you $22.52. Get the Ecobee3 thermostat on Amazon now for $146.48. To read this article in full or to leave a comment, please click here

Networking Field Day 15 – A new delegate emerges

Networking Field Day 15Yet again I find myself honored, and questioning their selection methods, by being selected for a Networking Field Day event. Networking Field Day 15 kicks off April 6 and 7th in San Jose California. Each and every Tech Field Day event is always an amazing opportunity to engage with vendors and industry peers. But trust me, I’m using the term peer rather loosely… While we may work in the same industry, many of these folks are way smarter than me! It seems the delegate list for NFD15 is certainly no exception to that rule! While I’ve met and become friends with roughly 75% of the “team” I get to meet a couple new faces which is always exciting. At least one of these faces I’ve spent hours talking to on Skype, but never actually met in person. I’m looking at you Nicolas. ;)

Networking Field Day Vendors

I took a look at the vendor list for this as soon as I heard they needed another delegate. Looking at the current line-up I got pretty excited, everything seems rather relevant to things I want to see! Looks like we’re going to see presentations from Gigamon, which specializes in the network tap and visibility market. I Continue reading

IDG Contributor Network: How to get the most out of data, services in a multi-cloud world

There’s no doubt that we’re quickly moving toward a multi-cloud-dominated world. By the end of 2018, over half of enterprise-class businesses will subscribe to more than five different public cloud services.1 The pragmatic reality for the vast majority of enterprises is that their IT, and thus their data and services, will span multiple data centers and computing clouds. This will accelerate fragmentation of data and systems that have to be seamlessly integrated to yield their full potential.Despite the benefits promised by public cloud, most enterprises can’t realistically move all their data off premises for various reasons—because data sets are too large to move in bulk or because of other preventative regulatory, privacy or security requirements, for example.  To read this article in full or to leave a comment, please click here

Ask.com serves as a conduit for malware – again

Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were compromised last November and then again the very next month using pretty much the same attack methods.In both cases attackers managed to infiltrate the Ask.com updater infrastructure to the point that they used legitimate Ask signing certificates to authenticate malware that was masquerading as software updates.And in both cases Ask Partner Network (APN), which distributes the Ask.com toolbar, told the security vendors who discovered the incidents that it had fixed the problem. The first one was discovered by security vendor Red Canary, and the second was caught by Carbon Black, whose researchers just wrote about it in their company blog.To read this article in full or to leave a comment, please click here

Ask.com serves as a conduit for malware – again

Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were compromised last November and then again the very next month using pretty much the same attack methods.In both cases attackers managed to infiltrate the Ask.com updater infrastructure to the point that they used legitimate Ask signing certificates to authenticate malware that was masquerading as software updates.And in both cases Ask Partner Network (APN), which distributes the Ask.com toolbar, told the security vendors who discovered the incidents that it had fixed the problem. The first one was discovered by security vendor Red Canary, and the second was caught by Carbon Black, whose researchers just wrote about it in their company blog.To read this article in full or to leave a comment, please click here

Cobol plays major role in U.S. government breaches

New research is turning on its head the idea that legacy systems -- such as Cobol and Fortran -- are more secure because hackers are unfamiliar with the technology.New research found that these outdated systems, which may not be encrypted or even documented, were more susceptible to threats.By analyzing publicly available federal spending and security breach data, the researchers found that a 1% increase in the share of new IT development spending is associated with a 5% decrease in security breaches."In other words, federal agencies that spend more in maintenance of legacy systems experience more frequent security incidents, a result that contradicts a widespread notion that legacy systems are more secure," the paper found. The research paper was written by Min-Seok Pang, an assistant professor of management information systems at Temple University, and Huseyin Tanriverdi, an associate professor in the Information, Risk and Operations Department at the University of Texas at Austin.To read this article in full or to leave a comment, please click here

Cobol plays major role in U.S. government breaches

New research is turning on its head the idea that legacy systems -- such as Cobol and Fortran -- are more secure because hackers are unfamiliar with the technology.New research found that these outdated systems, which may not be encrypted or even documented, were more susceptible to threats.By analyzing publicly available federal spending and security breach data, the researchers found that a 1% increase in the share of new IT development spending is associated with a 5% decrease in security breaches."In other words, federal agencies that spend more in maintenance of legacy systems experience more frequent security incidents, a result that contradicts a widespread notion that legacy systems are more secure," the paper found. The research paper was written by Min-Seok Pang, an assistant professor of management information systems at Temple University, and Huseyin Tanriverdi, an associate professor in the Information, Risk and Operations Department at the University of Texas at Austin.To read this article in full or to leave a comment, please click here