Archive

Category Archives for "Networking"

4 things we expect from Mobile World Congress 2017

Mobile World Congress, the Davos of wireless technology, is happening next week in Barcelona, and it’s going to be a particularly important year, as the mobile landscape readies itself for a couple of fairly major shifts.Here’s our quick look ahead to next week in sunny Spain and the four main points we expect from the MWC show.5G, or at least previews of it There’s been a big school of 5G press releases floating into our inboxes here in tech media just ahead of MWC (i.e., “Verizon plans 5G wireless trial service in 11 cities this year”), and it’s no real surprise – next-generation mobile networks are going to do a lot more than just boost speeds. They’ll also connect large numbers of devices – not just phones and tablets and laptops – to each other.To read this article in full or to leave a comment, please click here

How to assess security automation tools

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  During my recent trip to Tel Aviv to attend CyberTech 2017, I had a one-on-one conversation with Barak Klinghofer, co-founder and CTO of Hexadite. He gave me a preview of an educational presentation he was to give two weeks later at the RSA Conference. His insight is worth repeating for anyone looking to add automation tools to their security toolset.As I saw at CyberTech, and I’m sure was the case at RSA, the hottest topics were security automation, automated incident response and security orchestration. These can be confusing terms, as every vendor describes them a little bit differently.To read this article in full or to leave a comment, please click here

How to assess security automation tools

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  During my recent trip to Tel Aviv to attend CyberTech 2017, I had a one-on-one conversation with Barak Klinghofer, co-founder and CTO of Hexadite. He gave me a preview of an educational presentation he was to give two weeks later at the RSA Conference. His insight is worth repeating for anyone looking to add automation tools to their security toolset.As I saw at CyberTech, and I’m sure was the case at RSA, the hottest topics were security automation, automated incident response and security orchestration. These can be confusing terms, as every vendor describes them a little bit differently.To read this article in full or to leave a comment, please click here

Telefonica-Sigfox deal is a big win for diverse IoT networks

The global partnership announced Wednesday between Telefonica and IoT specialist Sigfox could ensure the latter’s long-term success while accelerating the overall growth of LPWANs (low-power, wide-area networks).Telefonica said it will integrate Sigfox’s energy-sipping, low-data-rate radios into millions of devices used for things like smart metering and asset tracking. The Spain-based mobile carrier operates in 21 countries across Europe and Latin America, so the deal should significantly expand Sigfox’s footprint. It’s talking with customers about possible large-scale rollouts across both regions, including Spain, Germany, Colombia, Argentina, and Brazil.To read this article in full or to leave a comment, please click here

Telefonica-Sigfox deal is a big win for diverse IoT networks

The global partnership announced Wednesday between Telefonica and IoT specialist Sigfox could ensure the latter’s long-term success while accelerating the overall growth of LPWANs (low-power, wide-area networks).Telefonica said it will integrate Sigfox’s energy-sipping, low-data-rate radios into millions of devices used for things like smart metering and asset tracking. The Spain-based mobile carrier operates in 21 countries across Europe and Latin America, so the deal should significantly expand Sigfox’s footprint. It’s talking with customers about possible large-scale rollouts across both regions, including Spain, Germany, Colombia, Argentina, and Brazil.To read this article in full or to leave a comment, please click here

ONF Certified SDN Associate (OCSA) – Part 5

The OCSA exam tests your understanding of components in an SDN framework, your ability to articulate the fundamental workings of networking and the OpenFlow protocol, as well as your knowledge of vendors, solutions and projects available in the SDN landscape. This is the last part in a series of posts that review the blueprint for […]

The post ONF Certified SDN Associate (OCSA) – Part 5 appeared first on Overlaid.

New York State cybersecurity regulations: Who wins?

As you probably know by now, on February 16, the State of New York’s Department of Financial Services (DFS) finalized its new cybersecurity regulations, which take effect on March 1, 2017. These regulations are somewhat redundant with others in the financial services industry (i.e. FFIEC, GLBA, NIST CSF, OCC, etc.) but tend to go a bit further with several specific prescriptive requirements. For example, the New York State cybersecurity regulations cover nonpublic data (rather than customer data), mandate the presence of a CISO (or third-party equivalent) and require a program for secure data destruction.To read this article in full or to leave a comment, please click here

New York State cybersecurity regulations: Who wins?

As you probably know by now, on February 16, the State of New York’s Department of Financial Services (DFS) finalized its new cybersecurity regulations, which take effect on March 1, 2017. These regulations are somewhat redundant with others in the financial services industry (i.e. FFIEC, GLBA, NIST CSF, OCC, etc.) but tend to go a bit further with several specific prescriptive requirements. For example, the New York State cybersecurity regulations cover nonpublic data (rather than customer data), mandate the presence of a CISO (or third-party equivalent) and require a program for secure data destruction.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The myth of technology analyst independence

Recently passing my 15th anniversary as a technology industry analyst caused me to reflect on the evolution of our business, and I'm disappointed to share that amid some positive developments, one significant ethical shortcoming still persists.If you had asked me 15 years ago—when the world was reeling from an equities collapse aggravated in part by conflict-of-interest shenanigans on Wall Street—I would have predicted that the tech analyst community would split neatly between sell-side research and buy-side research.But that has not happened, and you the customer are the worse off for it.The financial industry analyst model In financial research, the industry makes a clear distinction between sell-side analysis and buy-side analysis. A sell-side financial analyst relies on information often spoon-fed from public companies to drive activity to trading desks (i.e., works primarily on behalf of sellers), while a buy-side specialist strives to inform better investor performance (i.e., works primarily on behalf of buyers). The same advisory or investment firm can employ both buy- and sell-side analysts, but they must isolate themselves behind "Chinese Firewalls" designed to prevent buy- and sell-side specialists from even talking to each other without a lawyer present.To read this article in Continue reading

FCC rolls back net neutrality ISP transparency rules

The U.S. Federal Communications Commission has voted to roll back some net neutrality regulations that require broadband providers to inform customers about their network management practices.The Republican-controlled FCC on Thursday suspended the net neutrality transparency requirements for broadband providers with fewer than 250,000 subscribers. Critics called the decision anticonsumer.The transparency rule, waived for five years in a 2-1 party-line vote Thursday, requires broadband providers to explain to customers their pricing models and fees as well as their network management practices and the impact on broadband service.To read this article in full or to leave a comment, please click here

Apple opposes Trump’s transgender rights rollback

The Trump administration on Wednesday announced plans to roll back Obama protections for transgender kids in schools. Apple quickly responded with a forceful statement against the move.“Apple believes everyone deserves a chance to thrive in an environment free from stigma and discrimination,” the company said in a statement it provided to Politico. “We support efforts toward greater acceptance, not less, and we strongly believe that transgender students should be treated as equals. We disagree with any effort to limit or rescind their rights and protections.”To read this article in full or to leave a comment, please click here

FCC rolls back net neutrality ISP transparency rules

The U.S. Federal Communications Commission has voted to roll back some net neutrality regulations that require broadband providers to inform customers about their network management practices.The Republican-controlled FCC on Thursday suspended the net neutrality transparency requirements for broadband providers with fewer than 250,000 subscribers. Critics called the decision anticonsumer.The transparency rule, waived for five years in a 2-1 party-line vote Thursday, requires broadband providers to explain to customers their pricing models and fees as well as their network management practices and the impact on broadband service.To read this article in full or to leave a comment, please click here