It’s safe to say that the hyperconverged infrastructure (HCI) market has heated up in a big way. In September 2016, Nutanix went public and had a fantastic IPO. Since then, the company’s stock has slid due in part to increased competition from the likes of Dell-EMC, which recently extended its HCI products to private clouds, and HP Enterprise, which acquired SimpliVity earlier this year.To read this article in full or to leave a comment, please click here
It’s safe to say that the hyperconverged infrastructure (HCI) market has heated up in a big way. In September 2016, Nutanix went public and had a fantastic IPO. Since then, the company’s stock has slid due in part to increased competition from the likes of Dell-EMC, which recently extended its HCI products to private clouds, and HP Enterprise, which acquired SimpliVity earlier this year.To read this article in full or to leave a comment, please click here
Whether your company owns or manages property, inspections are an absolute must to keep everything running smoothly. Inspections keep residents happy and can play a critical role in avoiding unfortunate mishaps.Unfortunately, facility inspections are often held back by outdated, inefficient paper-based forms, or maybe an Excel spreadsheet on a laptop. These slow and plodding processes are not only inefficient, but they fail to leverage the business benefits a robust mobile platform provides.+ Also on Network World: Your digitization success depends on co-creating value with customers +
Facility inspections aren’t about slogging through a list of issues and hoping you don’t notice anything amiss. They’re about creating and maintaining best practices to keep facilities in such excellent repair as to minimize labor and maximize output. Instead of putting off inspections to avoid facing the music, the way someone running low on cash puts off checking their bank balance until they’re overdrawn, facility owners and managers should perform regular, diligent, thorough inspections to maximize the value of the inspection practice and maintain quality standards that prevent serious issues.To read this article in full or to leave a comment, please click here
Salesforce is getting into the computer vision business with a new tool designed to let users easily train a custom image recognition system.Einstein Vision, as it’s known, allows users to upload sets of images and classify them in a series of categories. After that, the system will create a recognizer based on machine learning technology that will identify future images fed into it.While Salesforce customers will have to wait a couple weeks before Vision is generally available, the company announced Tuesday that other Einstein features based on machine learning techniques are live.To read this article in full or to leave a comment, please click here
Perfect for parties or setting the mood while listening at home, the iBT28 from iHome is a Bluetooth-enabled alarm clock with an adjustable LED cabinet. Send digital audio wirelessly to iBT28 from your iPad, iPhone, and iPod touch, Android, Blackberry or other Bluetooth-enabled audio device, or play directly via its audio input port. The alarm clock includes two independent alarms allowing you wake to Bluetooth audio, FM radio or buzzer at separate times. The multiple color modes include a glowing sequence, a fast change sequence, a selectable color of your choice, or choose no color at all. Its specially designed Reson8 speaker chamber provides richer, more powerful sound and enhanced bass response. The iBT28 averages 4 out of 5 stars from over 145 people on Amazon, where its typical list price of $45.94 has been reduced 23% to $35.56. See the discounted iBT28 color changing Bluetooth alarm clock from iHome now on Amazon.To read this article in full or to leave a comment, please click here
WikiLeaks has released more than 8,700 documents it says come from the CIA's Center for Cyber Intelligence, with some of the leaks saying the agency had 24 "weaponized" and previously undisclosed exploits for the Android operating system as of 2016.Some of the Android exploits were developed by the CIA, while others came from the U.S. National Security Agency, U.K. intelligence agency GCHQ, and cyber arms dealers, according to the trove of documents released Tuesday. Some smartphone attacks developed by the CIA allow the agency to bypass the encryption in WhatsApp, Confide, and other apps by collecting audio and message traffic before encryption is applied, according to the WikiLeaks analysis.To read this article in full or to leave a comment, please click here
WikiLeaks has released more than 8,700 documents it says come from the CIA's Center for Cyber Intelligence, with some of the leaks saying the agency had 24 "weaponized" and previously undisclosed exploits for the Android operating system as of 2016.Some of the Android exploits were developed by the CIA, while others came from the U.S. National Security Agency, U.K. intelligence agency GCHQ, and cyber arms dealers, according to the trove of documents released Tuesday. Some smartphone attacks developed by the CIA allow the agency to bypass the encryption in WhatsApp, Confide, and other apps by collecting audio and message traffic before encryption is applied, according to the WikiLeaks analysis.To read this article in full or to leave a comment, please click here
The network industry is rarely kind to new entrants, as buyers typically have their favorite vendors and seldom give a passing look to someone new. Names like Woven Networks and Consentry come and go while the tried and true live on. One vendor that has bucked this trend—started fast and stayed fast—is Arista Networks. RELATED: Will containers kill the virtual machine?
How has Arista avoided the fate of so many before them? One reason is that it’s able to keep ahead of the innovation curve because of the flexible architecture of its operating system, EOS. The flexibility of its software has also enabled Arista to adopt new silicon faster than the competition without having to build entirely new platforms. To read this article in full or to leave a comment, please click here
It has been almost a year since Cisco jumped into the hyperconverged arena and while the HyperFlex business has done well – landing 1,100 customers -- the company is expecting a burst of upgrades to significantly speed and simplify management of its HyperFlex systems.+More on Network World: Cisco, Mitel, NEC and others are targeting Avaya’s customers as the networking company goes through Chapter 11 bankruptcy+To read this article in full or to leave a comment, please click here
It has been almost a year since Cisco jumped into the hyperconverged arena and while the HyperFlex business has done well – landing 1,100 customers -- the company is expecting a burst of upgrades to significantly speed and simplify management of its HyperFlex systems.+More on Network World: Cisco, Mitel, NEC and others are targeting Avaya’s customers as the networking company goes through Chapter 11 bankruptcy+To read this article in full or to leave a comment, please click here
A five-month-old flaw in Android's SSL cryptographic libraries is among the 35 critical vulnerabilities Google fixed in its March security patches for the mobile OS.The first set of patches, known as patch level 2017-03-01, is common to all patched phones and contains fixes for 36 vulnerabilities, 11 of which are rated critical and 15 high. Android vulnerabilities rated critical are those that can be exploited to execute malicious code in the context of a privileged process or the kernel, potentially leading to a full device compromise.One of the patched vulnerabilities is located in the OpenSSL cryptographic library and also affects Google's newer BoringSSL library, which is based on OpenSSL. What's interesting is that the flaw, identified as CVE-2016-2182, was patched in OpenSSL back in September. It can be exploited by forcing the library to process an overly large certificate or certificate revocation list from an untrusted source.To read this article in full or to leave a comment, please click here
A five-month-old flaw in Android's SSL cryptographic libraries is among the 35 critical vulnerabilities Google fixed in its March security patches for the mobile OS.The first set of patches, known as patch level 2017-03-01, is common to all patched phones and contains fixes for 36 vulnerabilities, 11 of which are rated critical and 15 high. Android vulnerabilities rated critical are those that can be exploited to execute malicious code in the context of a privileged process or the kernel, potentially leading to a full device compromise.One of the patched vulnerabilities is located in the OpenSSL cryptographic library and also affects Google's newer BoringSSL library, which is based on OpenSSL. What's interesting is that the flaw, identified as CVE-2016-2182, was patched in OpenSSL back in September. It can be exploited by forcing the library to process an overly large certificate or certificate revocation list from an untrusted source.To read this article in full or to leave a comment, please click here
Another day, another antitrust action against Google: On Monday, the Open Internet Project filed a new complaint with the European Union's top competition authority, charging the search giant with abusing its dominant position in the market for smartphone software.It was in 2014 that the OIP filed its first complaint against Google, contributing to a European Commission investigation into the company's search services that began in 2010.Since then, the OIP has gained 20 new members from ICOMP, the Initiative for a Competitive Online Marketplace. OIP is now led by the chairmen of French search engine Qwant and Hot-Maps.com, an online mapping company the main activity of which seems to be complaining about Google. Its other members include publishing companies Axel Springer, Hubert Burda Media, TV network ProSiebenSat.1, mapping companies Evermaps and Mappy, stock photo libraries Getty Images and CEPIC, and football's Premier League, among others.To read this article in full or to leave a comment, please click here
DeAndre Jordan, the Los Angeles Clippers’ enormous and uber-athletic center, is best known for his monster dunks, State Farm commercials, and last minute change of heart over which team he wanted to play for.But Jordan recently attracted attention for a digital decision: He’s been spotted wearing a WHOOP biometric monitoring device during actual NBA games. Apparently, Jordan was a trendsetter, as ESPN reported this week that Major League Baseball has approved the WHOOP device for use during MLB games! To read this article in full or to leave a comment, please click here
Hewlett Packard Enterprise plans to acquire Nimble Storage, a vendor of all-flash and hybrid flash storage products, for US$1 billion in an effort to pump up its offerings in those areas.Nimble Storage offers converged flash arrays with predictive software for provisioning to speed up storage performance. The offerings will work alongside technology that HPE acquired from 3Par, which also is centered around provisioning.THOUGHTS ON THE DEAL? Please comment on Network World's Facebook pageHPE needs to bulk up its storage offerings after cutting ties with EMC, which is now a part of Dell Technologies and dominates enterprise storage. Nimble Storage could be a step toward retaining existing storage customers and enticing new customers to switch over from EMC.To read this article in full or to leave a comment, please click here
The cybersecurity skills shortage is nothing new—I’ve been writing about it for years, as have other analysts and researchers. I’ve also done countless presentations on this topic. Here’s a video where I’m interviewed on the cybersecurity skills shortage at the RSA Conference a few years ago. I also presented on this topic at the RSA Conference that same year. RELATED: Akamai CSO takes a creative approach to finding security pros
I keep writing about the cybersecurity skills shortage for one consistent and troubling reason: It ain’t getting any better. Here’s a few data points to back up this claim: To read this article in full or to leave a comment, please click here
The cybersecurity skills shortage is nothing new – I’ve been writing about it for years as have other analysts and researchers. I’ve also done countless presentations on this topic. Here’s a video where I’m interviewed on the cybersecurity skills shortage at the RSA Conference a few years ago. I also presented on this topic at the RSA Conference that same year. I keep writing about the cybersecurity skills shortage for one consistent and troubling reason – it ain’t getting any better. Here’s a few data points to back up this claim (note: I am an ESG employee):
As part of ESG’s annual IT spending intentions research, we asked respondents (i.e. about 600 IT and cybersecurity professionals in North America, EMEA, and the Asia Pacific region) to identify the different IT areas where their organization has a “problematic shortage” of skills. Cybersecurity has been identified as the #1 “problematic shortage” area across all of IT for the past 6 years in a row.
In 2017, 45% of organizations say they have a “problematic shortage” of cybersecurity skills. This is right in line with 2016 (46%), but these last two years represented a big Continue reading
The cybersecurity skills shortage is nothing new—I’ve been writing about it for years, as have other analysts and researchers. I’ve also done countless presentations on this topic. Here’s a video where I’m interviewed on the cybersecurity skills shortage at the RSA Conference a few years ago. I also presented on this topic at the RSA Conference that same year. RELATED: Akamai CSO takes a creative approach to finding security pros
I keep writing about the cybersecurity skills shortage for one consistent and troubling reason: It ain’t getting any better. Here’s a few data points to back up this claim: To read this article in full or to leave a comment, please click here