Archive

Category Archives for "Networking"

Intel works on next-generation Optane SSD, memory technologies

"Every gamer is going to want to have 3D Xpoint. Every single gamer."Those were words from Intel's CEO Brian Krzanich when updating investors on the company's Optane technology, which the chipmaker believes could ultimately replace SSDs and DRAM in PCs and servers.Intel is now shipping the first-generation Optane but is also working on next-generation technologies as looks to increase density in this new class of storage and memory.Intel says Optane is significantly denser and faster than SSDs and DRAM. It is based on a technology called 3D Xpoint, co-developed with Micron.The chipmaker looks at Optane as the Moore's Law of storage. With future generations, Intel wants to make the memory smaller, denser and cheaper, and that's driving the development of Optane.To read this article in full or to leave a comment, please click here

IT and C-level leaders point fingers at each other over cyber defense

IT managers disagree with chief executives over who is responsible for a cyber security breach, according to a survey released Thursday.The survey -- of a group of 221 chief executive officers and other C-level executives and another group of 984 IT decision makers -- found that each group largely believes the other group is responsible in the event of a breach.In the survey, 35% of C-level respondents said IT teams would be responsible in a breach, while 50% of IT leaders think that responsibility rests with their senior managers.Also, IT managers estimate a single cyber attack will cost their business nearly twice what top-level executives estimate. The IT managers put the cost of a single attack at $19 million, compared to the C-suite estimate of about $11 million.To read this article in full or to leave a comment, please click here

IT and C-level leaders point fingers at each other over cyber defense

IT managers disagree with chief executives over who is responsible for a cyber security breach, according to a survey released Thursday.The survey -- of a group of 221 chief executive officers and other C-level executives and another group of 984 IT decision makers -- found that each group largely believes the other group is responsible in the event of a breach.In the survey, 35% of C-level respondents said IT teams would be responsible in a breach, while 50% of IT leaders think that responsibility rests with their senior managers.Also, IT managers estimate a single cyber attack will cost their business nearly twice what top-level executives estimate. The IT managers put the cost of a single attack at $19 million, compared to the C-suite estimate of about $11 million.To read this article in full or to leave a comment, please click here

How DevOps, agile spurred Slack enterprise adoption

If Jennifer Manry has her way bots will automate much of the repetitive and onerous workplace activities that consume her Capital One colleagues' time and effort. But until then the bank's vice president of workforce technology is busy helping 40,000 employees get more comfortable with new software from Slack, which allows corporate workers to instant message each other and share documents, files and other content.Capital One deployed Slack in mid-2016 and it quickly become the preferred tool for the IT department, which is embracing agile software development and DevOps principles that require close collaboration between software developers and product managers.To read this article in full or to leave a comment, please click here

Intel: Cannonlake will be more than 15 percent faster than Kaby Lake

Upgrading CPU performance hasn't been a priority for Intel in many years, but that could be changing.Intel's upcoming Cannonlake chips will deliver a performance improvement of more than 15 percent compared to its Kaby Lake chips, said Venkata Renduchintala, president of the Intel Client and Internet of Things businesses and Systems Architecture Group.Intel didn't provide exact numbers at the company's annual investor day Thursday, but the projection is based on the SysMark benchmark. Detailed performance improvement numbers will emerge over time.The performance improvements from Skylake to Kaby Lake topped out at 15 percent. The CPU performance boost for Cannonlake should be at least that, Intel said.To read this article in full or to leave a comment, please click here

38% Apple USB-C Digital AV Multiport Adapter – Deal Alert

This Original OEM Apple USB Lightning Cable For iPhone connects your iPhone, iPad, or iPod with Lightning connector to your computer's USB port for syncing and charging or to the Apple USB Power Adapter for convenient charging from a wall outlet. Its typical list price of $79 has been reduced 38% to just $49. See it now on Amazon.To read this article in full or to leave a comment, please click here

Microsoft blends IaaS and PaaS with new Managed Disks

Microsoft introduced a nifty new feature to its Azure public cloud this week called Managed Disks. The idea is that developers will not have to worry about provisioning storage when spinning up virtual machines. Managed Disks automatically adds persistent disk storage for Azure virtual machines as applications demand it.+MORE AT NETWORK WORLD: HPE's Mesosphere reseller agreement heats up the container management market | Rackspace is cutting 6% of its workforce +To read this article in full or to leave a comment, please click here

Windows Trojan hacks into embedded devices to install Mirai

Attackers have started to use Windows and Android malware to hack into embedded devices, dispelling the widely held belief that if such devices are not directly exposed to the Internet they're less vulnerable.Researchers from Russian antivirus vendor Doctor Web have recently come across a Windows Trojan program that was designed to gain access to embedded devices using brute-force methods and to install the Mirai malware on them.Mirai is a malware program for Linux-based internet-of-things devices, such as routers, IP cameras, digital video recorders and others. It's used primarily to launch distributed denial-of-service (DDoS) attacks and spreads over Telnet by using factory device credentials.To read this article in full or to leave a comment, please click here

Windows Trojan hacks into embedded devices to install Mirai

Attackers have started to use Windows and Android malware to hack into embedded devices, dispelling the widely held belief that if such devices are not directly exposed to the Internet they're less vulnerable.Researchers from Russian antivirus vendor Doctor Web have recently come across a Windows Trojan program that was designed to gain access to embedded devices using brute-force methods and to install the Mirai malware on them.Mirai is a malware program for Linux-based internet-of-things devices, such as routers, IP cameras, digital video recorders and others. It's used primarily to launch distributed denial-of-service (DDoS) attacks and spreads over Telnet by using factory device credentials.To read this article in full or to leave a comment, please click here

Nokia makes bid for Comptel to boost its software business

Network equipment vendor Nokia wants to buy a software company that helps customers make do with less hardware.The Finnish networking giant competes with the likes of Ericsson, Huawei Technologies, and Cisco Systems to sell networking equipment, software, and services to telecommunications operators and large enterprises.On Thursday, it offered to buy Finnish neighbor Comptel, which develops software to help network operators manage their networks and deliver additional services.Nokia said the deal, valuing Comptel at around €347 million (US$370 million) would help it toward its goal of building a standalone software business.The bid is a logical move, said Sylvain Fabre, a research director at Gartner: "The days of proprietary infrastructure from network equipment providers are numbered. Virtualized infrastructure will increasingly be procurable from alternative vendors, so focusing on software and applications for telecommunications functions is the way forward for any large vendor that seeks longevity."To read this article in full or to leave a comment, please click here

Nokia makes bid for Comptel to boost its software business

Network equipment vendor Nokia wants to buy a software company that helps customers make do with less hardware.The Finnish networking giant competes with the likes of Ericsson, Huawei Technologies, and Cisco Systems to sell networking equipment, software, and services to telecommunications operators and large enterprises.On Thursday, it offered to buy Finnish neighbor Comptel, which develops software to help network operators manage their networks and deliver additional services.Nokia said the deal, valuing Comptel at around €347 million (US$370 million) would help it toward its goal of building a standalone software business.The bid is a logical move, said Sylvain Fabre, a research director at Gartner: "The days of proprietary infrastructure from network equipment providers are numbered. Virtualized infrastructure will increasingly be procurable from alternative vendors, so focusing on software and applications for telecommunications functions is the way forward for any large vendor that seeks longevity."To read this article in full or to leave a comment, please click here

As third RSA Conference without ‘booth babes’ nears, no one seems to miss them

In March 2015, RSA Conference organizers made news by contractually insisting that vendors pitch their security wares without the help of “booth babes,” a first such ban for the technology industry.Next week’s RSAC in San Francisco will be the third without the babes, so I checked in with event staff to see if the policy had evolved at all and how it has been accepted by various stake-holders.  Here’s how the contract language read in 2015: All Expo staff are expected to dress in business and/or business casual attire. Exhibitors should ensure that the attire of al staff they deploy at their booth (whether the exhibitor’s direct employees or their contractors) be considered appropriate in a professional environment. Attire of an overly revealing or suggestive nature is not permitted. Examples of such attire may include but are not restricted to:To read this article in full or to leave a comment, please click here

As third RSA Conference without ‘booth babes’ nears, no one seems to miss them

In March 2015, RSA Conference organizers made news by contractually insisting that vendors pitch their security wares without the help of “booth babes,” a first such ban for the technology industry.Next week’s RSAC in San Francisco will be the third without the babes, so I checked in with event staff to see if the policy had evolved at all and how it has been accepted by various stake-holders.  Here’s how the contract language read in 2015: All Expo staff are expected to dress in business and/or business casual attire. Exhibitors should ensure that the attire of al staff they deploy at their booth (whether the exhibitor’s direct employees or their contractors) be considered appropriate in a professional environment. Attire of an overly revealing or suggestive nature is not permitted. Examples of such attire may include but are not restricted to:To read this article in full or to leave a comment, please click here

Apple’s iPhone declines in China, and this year could be a struggle

Perhaps the next iPhone 8 will be Apple's next shot at achieving greatness in China.The current iPhones aren't helping Apple gain market share in China, according to Canalys. Markets like China and India are at the top of Apple's agenda to grow the iPhone business.China accounts for a third of worldwide smartphone shipments. Buyers in the market are leaning toward local brands like Huawei, Oppo, Vivo, and Xiaomi, which formed the top four smartphone vendors in China in 2016, according to Canalys.Apple was in the fifth spot, and Samsung doesn't figure in the top five.In 2016, Apple's phone shipments in China totaled 43.8 million units, a drop of 18.2 percent compared to 2015. It's not looking any better for Apple in 2017.To read this article in full or to leave a comment, please click here