Archive

Category Archives for "Networking"

Should police departments be able to have their own DNA databases?

DNA is supposed to be the answer for solving cold cases. For example, Wisconsin police have turned to DNA to help solve a 42-year-old cold case of “Baby Sarah.” Recently in Niagara Falls, cops found the man responsible for a smash and grab robbery committed 11 years ago, in 2006, via DNA which the man had been ordered to submit for unrelated offences. But it takes some state labs a year-and-a-half to process DNA, so some police departments are bypassing the state labs and creating their own DNA databases to track criminals.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why BPM is now taking a central role in digital transformation

Business Process Management (BPM) has always been one of those disciplines that sounded great on paper but was difficult to realize in practice. It made sense that documenting, analyzing and managing the entirety of an organization’s business processes would enable those organizations to increase operational efficiency. But for those brave organizations that gave it the "old college try"—particularly in the early days of BPM—the results were seldom spectacular.A new generation of BPM software, however, is changing this trajectory. Driven by the need for speed and agility, in addition to the traditional needs of efficiency and optimization, organizations are now turning to BPM as a key driver of digital transformation.To read this article in full or to leave a comment, please click here

IPAM and DNS with CNI

In the first post of this series we talked about some of the CNI basics.  We then followed that up with a second post showing a more real world example of how you could use CNI to network a container.  We’ve covered IPAM lightly at this point since CNI relies on it for IP allocation but we haven’t talked about what it’s doing or how it works.  In addition – DNS was discussed from a parameter perspective in the first post where we talked about the CNI spec but that’s about it.  The reason for that is that CNI doesn’t actually configure container DNS.  Confused?  I was too.  I mean why is it in the spec if I can’t configure it?

To answer these questions, and see how IPAM and DNS work with CNI, I think a deep dive into an actual CNI implementation would be helpful.  That is – let’s look at a tool that actually implements CNI to see how it uses it.  To do that we’re going to look at the container runtime from the folks at CoreOS – Rocket (rkt).  Rkt can be installed fairly easily using this set of commands…

wget https://github.com/coreos/rkt/releases/download/v1.25.0/rkt_1. Continue reading

Pardon the interruption: Here’s how your smartphone could be less of a noodge

Rutgers University researchers have examined the tolerance levels of different personality types for being interrupted by smartphone notifications in an effort that could help phone makers and app developers build offerings that are more useful and less annoying.The research, outlined in a paper titled "How Busy Are You? Predicting the Interruptibility Intensity of Mobile Users," will be presented at the ACM CHI Conference on Human Factors in Computing Systems in Denver this May.In fact, this research will have plenty of company in terms of new insights into how technology intrudes on people's lives. Other papers being presented include: "'If a person is emailing you, it just doesn't make sense': Exploring Changing Consumer Behaviors in Email" and "Reducing Interruptions at Work: A Large-Scale Field Study of FlowLight."To read this article in full or to leave a comment, please click here

Administravia 030417

Just a few notes on the blog site in general. I’ve rebuilt the sixty books pages without tables. I don’t know if this is better, but it does load a bit faster. I’ve also added links to my GoodReads and Feedly profiles just in case you’re interested in what I’m currently reading/read on a regular basis. I didn’t include all the RSS feeds I read in the shared Feedly profile, just general, culture, and technology.

The post Administravia 030417 appeared first on 'net work.

IDG Contributor Network: Digital fingerprints: The truth is out there

People lie all the time. At least I think so. It’s hard to know for sure. It can be really hard to tell if someone is lying, as few of us have Larry David’s ability to see truth by looking deeply into someone’s eyes. If only there were a machine or something that could tell us if someone is lying.Whoever dubbed the polygraph a lie detector was a liar. A polygraph when paired with questioning techniques is supposed to ascertain truths and falsehoods. Unfortunately, polygraphs lie. On the unsuspecting they can be slightly more effective than guessing, but they can be easily fooled so can’t be trusted.+ Also on Network World: Cops use pacemaker data to charge homeowner with arson, insurance fraud + Instead of relying on one device to measure a statement, the truth is increasingly found by using lots of devices that can corroborate or contradict one’s story. In other words, there’s no need to catch someone with their hand in the cookie jar if the cookie jar has biometric sensors.To read this article in full or to leave a comment, please click here

Aruba’s top execs talk new tech, IoT and the competition

In the roughly two years since Aruba Networks was acquired by HPE, it’s become the larger company’s de facto wireless arm, more or less taking over HPE’s existing networking division and changing almost not at all after the merger.Network World sat down with Senior Vice President and General Manager Keerti Melkote and CTO Partha Narasimhan at Aruba’s annual Atmosphere conference in Nashville last week to talk about future wireless technology, security, and more.+ ALSO ON NETWORK WORLD: University of Washington Wi-Fi-meister talks Aruba, managing big networks | Aruba’s top exec, customers talk about Wi-Fi’s present and future at Atmosphere 2017 +To read this article in full or to leave a comment, please click here

Aruba’s top execs talk new tech, IoT and the competition

In the roughly two years since Aruba Networks was acquired by HPE, it’s become the larger company’s de facto wireless arm, more or less taking over HPE’s existing networking division and changing almost not at all after the merger. Network World sat down with Senior Vice President and General Manager Keerti Melkote and CTO Partha Narasimhan at Aruba’s annual Atmosphere conference in Nashville last week to talk about future wireless technology, security, and more. + ALSO ON NETWORK WORLD: University of Washington Wi-Fi-meister talks Aruba, managing big networks | Aruba’s top exec, customers talk about Wi-Fi’s present and future at Atmosphere 2017 +To read this article in full or to leave a comment, please click here

Face-off: SAP vs. IBM for talent management

SAP acquired HR software company SuccessFactors for $3.4 billion in 2012. IBM acquired HR software company Kenexa for $1.3 billion the same year. Now the two are locked in a battle with Oracle, Cornerstone, Workday and many other vendors offering corporate software for talent management.To read this article in full or to leave a comment, please click here(Insider Story)

Serverless computing: Freedom for devs at last

Serverless computing provides a great opportunity for developers seeking relief from the burden of infrastructure. By abstracting away everything but a block of code, the serverless model makes it faster for developers to iterate and deploy new code, enabling smaller teams with smaller budgets to do things that only big companies could do before. Or, as Mat Ellis, founder and CEO of Cloudability, recently said in a CloudCast episode, “Serverless attempts to industrialize developer impact.”On-premises serverlessTo read this article in full or to leave a comment, please click here(Insider Story)

US DOJ drops child porn case to avoid disclosing Tor exploit

The U.S. Department of Justice is asking a federal court to dismiss its indictment in a case that involves a child porn site known as Playpen after a judge asked the government to disclose the hacking technique it used to gather evidence."The government must now choose between disclosure of classified information and dismissal of its indictment," the DOJ said in a court filing Friday. "Disclosure is not currently an option."The case involves Jay Michaud, a school administrator from Vancouver, Washington, who was arrested in July 2015 for allegedly viewing child porn images on Playpen. Michaud's case was one of at least 137 cases brought throughout the U.S. in relation to Playpen, a website that operated on the Tor anonymity network and which the FBI managed to seize in 2015.To read this article in full or to leave a comment, please click here

US DOJ drops child porn case to avoid disclosing Tor exploit

The U.S. Department of Justice is asking a federal court to dismiss its indictment in a case that involves a child porn site known as Playpen after a judge asked the government to disclose the hacking technique it used to gather evidence."The government must now choose between disclosure of classified information and dismissal of its indictment," the DOJ said in a court filing Friday. "Disclosure is not currently an option."The case involves Jay Michaud, a school administrator from Vancouver, Washington, who was arrested in July 2015 for allegedly viewing child porn images on Playpen. Michaud's case was one of at least 137 cases brought throughout the U.S. in relation to Playpen, a website that operated on the Tor anonymity network and which the FBI managed to seize in 2015.To read this article in full or to leave a comment, please click here

U.S. suspends fast-track H-1B processing, blames backlog

The White House decision to suspend premium processing for H-1B visa holders is being blamed on a visa backlog. It will affect some people seeking visas who may be in need of this fast-track system.The U.S. government is hoping that its decision to suspend premium processing, announced late Friday, leads to an improvement in overall processing times.President Donald Trump has talked about moving to a "merit-based" H-1B system instead of a lottery, but the administration has been mum on details. There is concern within the tech industry about H-1B reform, but the action on premium processing may be unrelated to that. Meanwhile, there are differing views about the value of fast-track processing.To read this article in full or to leave a comment, please click here

Lawmakers try again to stop call center offshoring

Lawmakers in the U.S. Senate and the House reintroduced legislation Thursday intended to impede the offshore outsourcing of call centers.The bills, called the U.S. Call Center and Consumer Protection Act, if approved, would create a list of firms that shift work overseas. Firms on that list would be ineligible for federal grants and loans, and call center workers will be required to disclose their locations. U.S. customers would have the right to request that their calls are transferred to a call center agent physically based in the U.S.To read this article in full or to leave a comment, please click here

IT Resume Makeover: Find focus by building a theme

Do you have trouble establishing a cohesive focus for your resume? That was the case for this IT Resume Makeover candidate, Bhairav Sampath, whose name has been changed for this article. He knew his resume needed to offer some clarity on what he brings to the table.To read this article in full or to leave a comment, please click here(Insider Story)

Why more Chief Strategy and Risk Officers need a seat at the security table

For years the evolving role of chief information security officers has increasingly required them to think more like a chief risk or strategy officer and anticipate cyber threats before they happen. Now a perfect storm is brewing that may finally push risk management and strategy roles to the forefront of cybersecurity.To read this article in full or to leave a comment, please click here(Insider Story)

How microcertifications work for IT job seekers and employers

Organizations struggling to fill high-demand tech roles -- like Linux or cybersecurity, for instance -- often look at certifications to benchmark a candidate's skills and real-world experience and gauge their potential for success on the job. But for job seekers, certifications are expensive, time-consuming and often don't accurately assess the hands-on skills needed to succeed in a role.For many IT job seekers and the organizations that would hire them, microcertifications -- or microcredentials -- are a faster, more affordable and more effective way to achieve the same result and get open jobs filled faster.[ Related story: How unfilled tech jobs impact the US economy ] To read this article in full or to leave a comment, please click here