Archive

Category Archives for "Networking"

iPhone 8 Rumor Rollup: Fresh spate of delayed shipment speculation swirls; plus, good pricing news

Speculation is heating up again this week regarding the possibility that Apple might delay the arrival of its iPhone 8 (or iPhone X) smartphone until October or November due to technical issues related to the lamination of its new curved OLED displays as well as with its 3D sensing system.Apple historically has released its new flagship iPhones in September, but scuttlebutt in the supply chain says things could be otherwise in 2017. Speculation is that Apple could roll out its 7s and 7s Plus phones in September, with the high-end iPhone 8 becoming available shortly afterwards.MORE: Apple's Mobility Partner Program comes out of hidingTo read this article in full or to leave a comment, please click here

Zdravo, Beograde! Cloudflare network spans 30 European cities

CC-BY 2.0 image by De kleine rode kater

Since Cloudflare began with our very first data center in Chicago, we are especially excited that our expansion takes us to its sister city. Where the Sava meets the Danube, Belgrade (Serbia) is home to Cloudflare’s 107th data center.

Пошто је Клаудфлер почео са првим дата центом у Чикагу посебно смо узбуђени што нас је наше ширење одвело у побратимљен град. Тамо где се Сава улива у Дунав, Београд, у Србији је дом Клаудфлеровог 107. дата центра.

Pošto je Cloudflare počeo sa prvim data centrom u Čikagu posebno smo uzbuđeni što nas je naše širenje odvelo u pobratimljen grad. Tamo gde se Sava uliva u Dunav, Beograd, u Srbiji je dom Cloudflare-ovog 107. data centra.

As a member of the Serbian Open Exchange, the leading internet exchange point in the country, we are excited to help make 6 million websites even faster for nearly 6 million Internet users. Belgrade is seeing growth in employment across the technology industry, ranging from the Microsoft Development Center to Serbian gaming company Nordeus to startups such as TeleSkin and Content Insights.

Као члан Serbian Open Exchage-а, водећег internet exchange-a у Србији, драго нам Continue reading

Good-bye Internet pioneers. Hello, Oath?

After its acquisition of Yahoo wraps up, Verizon plans to place AOL and Yahoo under the umbrella of a new company, called Oath.AOL chief executive Tim Armstrong on Monday announced the move on Twitter, writing, "Billion+ Consumers, 20+ Brands, Unstoppable Team. #TakeTheOath. Summer 2017."AOL, which owns the Huffington Post, Engadget and TechCrunch, will pool all of the properties with Yahoo under the Oath umbrella, according to Armstrong, in an interview with CNBC."This is a sad thing for everyone who remembers when Yahoo and AOL were riding high," said Dan Olds, an analyst for OrionX. "For many people, AOL was their first experience with the Internet and was probably their first email address. A lot of people's first experience with Internet search, and other services, was probably with Yahoo. Unfortunately, the companies couldn't keep up with the ever-changing competition and fell into the backwaters of the Internet."To read this article in full or to leave a comment, please click here

IDG Contributor Network: The evolution of data center segmentation

Data center transformation has delivered better resource utilization, scalability and automation for data center environments. While software-defined networking (SDN) and automation platforms can tie in network security, the options have been largely inflexible and static, limiting the amount of security automation that can be delivered. This has become even more apparent as DevOps environments continue to grow.MORE ON NETWORK WORLD: Understanding Software-Defined Networking Micro-segmentation as a concept has been around for several years. It has recently become more mainstream with organizations now dedicating budgets and personnel to micro-segmentation projects. Micro-segmentation itself is really an evolution in network security. While many of the concepts (i.e. private VLANs) have been around for years, the implementation and use of these has evolved with micro-segmentation.   To read this article in full or to leave a comment, please click here

IDG Contributor Network: The evolution of data center segmentation

Data center transformation has delivered better resource utilization, scalability and automation for data center environments. While software-defined networking (SDN) and automation platforms can tie in network security, the options have been largely inflexible and static, limiting the amount of security automation that can be delivered. This has become even more apparent as DevOps environments continue to grow.MORE ON NETWORK WORLD: Understanding Software-Defined Networking Micro-segmentation as a concept has been around for several years. It has recently become more mainstream with organizations now dedicating budgets and personnel to micro-segmentation projects. Micro-segmentation itself is really an evolution in network security. While many of the concepts (i.e. private VLANs) have been around for years, the implementation and use of these has evolved with micro-segmentation.   To read this article in full or to leave a comment, please click here

IDG Contributor Network: The evolution of data center segmentation

Data center transformation has delivered better resource utilization, scalability and automation for data center environments. While software-defined networking (SDN) and automation platforms can tie in network security, the options have been largely inflexible and static, limiting the amount of security automation that can be delivered. This has become even more apparent as DevOps environments continue to grow.MORE ON NETWORK WORLD: Understanding Software-Defined Networking Micro-segmentation as a concept has been around for several years. It has recently become more mainstream with organizations now dedicating budgets and personnel to micro-segmentation projects. Micro-segmentation itself is really an evolution in network security. While many of the concepts (i.e. private VLANs) have been around for years, the implementation and use of these has evolved with micro-segmentation.   To read this article in full or to leave a comment, please click here

After Congress revokes Internet privacy rules, downloads double of VPN-equipped Opera browser

Opera Software today boasted that the number of new U.S. users of its namesake browser more than doubled days after Congress voted to repeal restrictions on broadband providers eager to sell customers' surfing history.Opera debuted a VPN -- virtual private network -- a year ago, and finalized the feature in September. A VPN disguises the actual IP address of the user, effectively anonymizing the browsing, and encrypts the data transmitted to and from sites, creating a secure "tunnel" to the destination.By using a VPN, U.S. users block their Internet service providers (ISPs) from recording their online activity.To read this article in full or to leave a comment, please click here

After Congress revokes Internet privacy rules, downloads double of VPN-equipped Opera browser

Opera Software today boasted that the number of new U.S. users of its namesake browser more than doubled days after Congress voted to repeal restrictions on broadband providers eager to sell customers' surfing history.Opera debuted a VPN -- virtual private network -- a year ago, and finalized the feature in September. A VPN disguises the actual IP address of the user, effectively anonymizing the browsing, and encrypts the data transmitted to and from sites, creating a secure "tunnel" to the destination.By using a VPN, U.S. users block their Internet service providers (ISPs) from recording their online activity.To read this article in full or to leave a comment, please click here

AT&T trials open switches for better future services

A coast-to-coast network trial by AT&T last month, using open-source "white box" switches, pointed toward an imagined future of more reliable services that may come quicker than some people think.The carrier ran a trial on its core network earlier this year using switches based on chips from Intel, Broadcom and startup Barefoot Networks. The latter only started shipping in sample quantities in December, making the trial deployment a remarkably quick turnaround.Like other carriers and cloud providers, AT&T is aggressively shifting its network toward SDN (software-defined networking). As these changes are carried out across more infrastructure, they should give both service providers and subscribers more flexibility and higher performance.To read this article in full or to leave a comment, please click here

AT&T trials open switches for better future services

A coast-to-coast network trial by AT&T last month, using open-source "white box" switches, pointed toward an imagined future of more reliable services that may come quicker than some people think.The carrier ran a trial on its core network earlier this year using switches based on chips from Intel, Broadcom and startup Barefoot Networks. The latter only started shipping in sample quantities in December, making the trial deployment a remarkably quick turnaround.Like other carriers and cloud providers, AT&T is aggressively shifting its network toward SDN (software-defined networking). As these changes are carried out across more infrastructure, they should give both service providers and subscribers more flexibility and higher performance.To read this article in full or to leave a comment, please click here

Which Mac should you buy?

If you’re reading this article, chances are you’re thinking about buying a new Mac and may be in need of a little guidance. Fortunately, we’re quite familiar with Apple’s Macs, and we’re happy to help you choose the right Mac for you.Mac miniTo read this article in full or to leave a comment, please click here(Insider Story)

Review: Amazon QuickSight covers the BI basics

When I reviewed self-service exploratory business intelligence (BI) products in 2015, I covered the strengths and weaknesses of Tableau 9.0, Qlik Sense 2.0, and Microsoft Power BI. As I pointed out at the time, these three products offer a range of data access, discovery, and visualization capabilities at a range of prices, with Tableau the most capable and expensive, Qlik Sense in the middle, and Power BI the least capable but a very good value.To read this article in full or to leave a comment, please click here(Insider Story)

IBM: Tax-related spam up 6,000% since Dec.; Darkweb tactics net billions

Tis’ the season for tax villains. The notion that spam has been increasing lately has been obvious recently and for more evidence of that nasty trends you need look no further than this fact: From Dec 2016 to Feb 2017, IBM X-Force researchers saw a 6,000% increase in tax-related spam emails.And that’s just one of a number of tax season scams and frauds IBM X-Force security researchers have been tracking in a report “Cybercrime Riding Tax Season Tides: Trending Spam and Dark Web Findings” issued today.+More on Network World: IRS Dirty Dozen: Phishing, phone cons and identity theft lead scam list for 2017+To read this article in full or to leave a comment, please click here

IBM: Tax-related spam up 6,000% since Dec.; Darkweb tactics net billions

Tis’ the season for tax villains. The notion that spam has been increasing lately has been obvious recently and for more evidence of that nasty trends you need look no further than this fact: From Dec 2016 to Feb 2017, IBM X-Force researchers saw a 6,000% increase in tax-related spam emails.And that’s just one of a number of tax season scams and frauds IBM X-Force security researchers have been tracking in a report “Cybercrime Riding Tax Season Tides: Trending Spam and Dark Web Findings” issued today.+More on Network World: IRS Dirty Dozen: Phishing, phone cons and identity theft lead scam list for 2017+To read this article in full or to leave a comment, please click here

What home products are most susceptible to cyber burglars?

No matter how intelligent they claim to be, many smart home gadgets are vulnerable to hackers. Nowadays even the lock on your front door is susceptible to a cyberattack. No longer do you only have to worry about someone simply picking the lock, now a burglar could go through cyberspace to unlatch the door.Just like the lock on your front door to keep out burglars, you should protect your high-tech devices from cyber threats. Start by choosing different passwords for your internet router and each of your smart devices. It is also important to use multi-factor authentication as an added protection to prevent a hacker who guesses your password from breaking into your home. You should regularly install manufacturer updates to make sure you are running the most current security system in your home.To read this article in full or to leave a comment, please click here

What home products are most susceptible to cyber burglars?

No matter how intelligent they claim to be, many smart home gadgets are vulnerable to hackers. Nowadays even the lock on your front door is susceptible to a cyberattack. No longer do you only have to worry about someone simply picking the lock, now a burglar could go through cyberspace to unlatch the door.Just like the lock on your front door to keep out burglars, you should protect your high-tech devices from cyber threats. Start by choosing different passwords for your internet router and each of your smart devices. It is also important to use multi-factor authentication as an added protection to prevent a hacker who guesses your password from breaking into your home. You should regularly install manufacturer updates to make sure you are running the most current security system in your home.To read this article in full or to leave a comment, please click here

FAQ: What just happened to online privacy?

The internet sure seems mad about something.You’re not kidding.More than usual, that is.You’re right. President Trump just signed a bill into law that rolls back internet privacy protections enacted by the previous administration, and that has made things just a little angry around the ol’ internet.What kind of privacy rules are we talking about here?The previous iteration of the Federal Communications Commission created new rules last October for ISPs which stipulated that those ISPs would be required to seek customer permission before selling things like browser history data to advertisers for targeting purposes.To read this article in full or to leave a comment, please click here