Archive

Category Archives for "Networking"

What P4 programming is and why it’s such a big deal for Software Defined Networking

P4 The dawn of software defined networking (SDN) ushered in an era of disaggregation of the networking control plane from the data plane; management of the network was no longer bound to the networking hardware it ran on.This created a market of overlay control-plane software from companies like Nicira, which was sold to VMware and is now NSX; Cisco ACI and others followed suit. But at the data plane – where network packets are actually forwarded - there has been less innovation, says IDC data center network research director Brad Casemore. Until now.To read this article in full or to leave a comment, please click here

IoT network builders sign up partners for small devices

There’s a land grab happening now between networks to link small, battery-powered IoT devices.If countless forecasts are true, there will soon be a lot more tiny, low-power devices like sensors out in the world. The 2G networks that connected many of these to the cloud are gradually going away and newer, more specialized networks are emerging. Vendors are pushing different LPWANs (low-power, wide-area networks) to do the job and trying to get more users and network operators on their side. Their survival may depend on building up a big ecosystem of devices.On Monday, U.S. network operator Ingenu partnered with distributor and system builder Arrow Electronics, which will offer Ingenu’s RPMA (Random Phase Multiple Access) technology when it develops IoT systems for enterprises and smaller businesses in the U.S.To read this article in full or to leave a comment, please click here

IoT network builders sign up partners for small devices

There’s a land grab happening now between networks to link small, battery-powered IoT devices.If countless forecasts are true, there will soon be a lot more tiny, low-power devices like sensors out in the world. The 2G networks that connected many of these to the cloud are gradually going away and newer, more specialized networks are emerging. Vendors are pushing different LPWANs (low-power, wide-area networks) to do the job and trying to get more users and network operators on their side. Their survival may depend on building up a big ecosystem of devices.On Monday, U.S. network operator Ingenu partnered with distributor and system builder Arrow Electronics, which will offer Ingenu’s RPMA (Random Phase Multiple Access) technology when it develops IoT systems for enterprises and smaller businesses in the U.S.To read this article in full or to leave a comment, please click here

Slack finally launches its enterprise edition

After a long wait, Slack has announced the version of its popular work chat application that is designed for enterprises. On Tuesday in San Francisco, the company unveiled its new Enterprise Grid product, aimed at helping companies administer and connect multiple chat instances.Grid allows business administrators to set up each team inside their organization with their own centrally managed Slack instance. Those workspaces can then be linked together using shared channels, and all of the people inside an enterprise can direct- message one another, even if they’re not part of the same workspace.To read this article in full or to leave a comment, please click here

Office 365 could give Microsoft Teams an advantage over Slack

Slack's full-page ad in the New York Times welcomed Microsoft Teams to the enterprise chat market in somewhat patronizing tones. Clearly, the messaging company thought that market was its to lose. But a new Spiceworks survey of IT pros at 450 companies across EMEA and North America shows a different reality.To read this article in full or to leave a comment, please click here(Insider Story)

Easy-to-exploit authentication bypass flaw puts Netgear routers at risk

For the past half year Netgear has been working on fixing a serious and easy-to-exploit vulnerability in many of its routers. And it's still not done.While Netgear has worked to fix the issue, the list of affected router models increased to 30, of which only 20 have firmware fixes available to date. A manual workaround is available for the rest.The vulnerability was discovered by Simon Kenin, a security researcher at Trustwave, and stems from a faulty password recovery implementation in the firmware of many Netgear routers. It is a variation of an older vulnerability that has been publicly known since 2014, but this new version is actually easier to exploit.To read this article in full or to leave a comment, please click here

Easy-to-exploit authentication bypass flaw puts Netgear routers at risk

For the past half year Netgear has been working on fixing a serious and easy-to-exploit vulnerability in many of its routers. And it's still not done.While Netgear has worked to fix the issue, the list of affected router models increased to 30, of which only 20 have firmware fixes available to date. A manual workaround is available for the rest.The vulnerability was discovered by Simon Kenin, a security researcher at Trustwave, and stems from a faulty password recovery implementation in the firmware of many Netgear routers. It is a variation of an older vulnerability that has been publicly known since 2014, but this new version is actually easier to exploit.To read this article in full or to leave a comment, please click here

Easy-to-exploit authentication bypass flaw puts Netgear routers at risk

For the past half year Netgear has been working on fixing a serious and easy-to-exploit vulnerability in many of its routers. And it's still not done.While Netgear has worked to fix the issue, the list of affected router models increased to 30, of which only 20 have firmware fixes available to date. A manual workaround is available for the rest.The vulnerability was discovered by Simon Kenin, a security researcher at Trustwave, and stems from a faulty password recovery implementation in the firmware of many Netgear routers. It is a variation of an older vulnerability that has been publicly known since 2014, but this new version is actually easier to exploit.To read this article in full or to leave a comment, please click here

Application monitoring becomes table stakes in the digital age

Bill Hineline had two requirements as he was searching last year for a new tool to keep tabs on the hundreds of interconnected applications that keep United Airline's planes flying. It had to ensure critical flight operations software was working and it had to meet customers' demands for accessing information from smartphones and tablets. The airline's director of application performance management also wanted a cloud application rather than another on-premises tool to manage internally. United Airlines Bill Hineline, director of application performance management at United Airlines.To read this article in full or to leave a comment, please click here

Trump to sign cybersecurity order calling for government-wide review

President Donald Trump is due to sign an executive order Tuesday that gives each cabinet official more responsibility for the safety of data within their agency.It will be accompanied by a government-wide review of cybersecurity by the Office of Management and Budget, looking at the technology in place that guards U.S. government systems from cyberattacks, according to a White House official.The results of that review could lead to a government-wide upgrade of federal cybersecurity systems.The U.S. government has been hit by hacks in the last few years. The State Department spent months trying to get rid of intruders in its unclassified network and the Office of Personnel Management lost personal information on millions of government workers through a second hack.To read this article in full or to leave a comment, please click here

Trump to sign cybersecurity order calling for government-wide review

President Donald Trump is due to sign an executive order Tuesday that gives each cabinet official more responsibility for the safety of data within their agency.It will be accompanied by a government-wide review of cybersecurity by the Office of Management and Budget, looking at the technology in place that guards U.S. government systems from cyberattacks, according to a White House official.The results of that review could lead to a government-wide upgrade of federal cybersecurity systems.The U.S. government has been hit by hacks in the last few years. The State Department spent months trying to get rid of intruders in its unclassified network and the Office of Personnel Management lost personal information on millions of government workers through a second hack.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 3 labor market trends all IT leaders need to respond to

Scanning business media headlines on any given day shows that talent management—recruiting, hiring, rewarding and retaining people—is one of the most critical priorities for employers. Companies can grow only if they secure and maintain a satisfied and productive workforce. Nowhere is this more apparent than in IT, where leaders spend a lot of time thinking about how to put people with the right skills and experience in the right role.Drawing on a CEB database of more than 2 billion job postings worldwide, we sought to better understand the global IT labor market. Specifically we asked: What are the most difficult jobs to fill, and how do various countries compare to one another in terms of IT talent supply and demand? Three large-scale trends emerged:To read this article in full or to leave a comment, please click here

7 Reasons your cloud will fail

Although vendor-written, this contributed piece does not advocate a position that is particular to the author’s employer and has been edited and approved by Network World editors.According to Gartner, a company with a corporate “no-cloud” policy in 2020 would be as rare as a company today operating without Internet. IDG estimates that 70% of enterprises are running at least one application in the cloud today and that number is projected to reach 90% in the next 12 months. In other words, in a couple of years a company not in the cloud will be unfathomable.To read this article in full or to leave a comment, please click here

7 Reasons your cloud will fail

Although vendor-written, this contributed piece does not advocate a position that is particular to the author’s employer and has been edited and approved by Network World editors.

According to Gartner, a company with a corporate “no-cloud” policy in 2020 would be as rare as a company today operating without Internet. IDG estimates that 70% of enterprises are running at least one application in the cloud today and that number is projected to reach 90% in the next 12 months. In other words, in a couple of years a company not in the cloud will be unfathomable.

To read this article in full or to leave a comment, please click here

RSA Conference 2017: Endpoint security in the spotlight

As the calendar shifts from January to February, cybersecurity professionals are gearing up for the RSA Security Conference in a few short weeks. Remarkably, the management team is expecting more than 50,000 attendees this year. So, what can we expect from RSA 2017? Well, cybersecurity is being driven by dangerous threats, digital transformation and the need for massive scalability. This means innovation and change in just about every aspect of cybersecurity technology, so I plan to write a few posts about my expectations for the RSA Conference. I’ll start with this one about endpoint security.To be clear, endpoint security should no longer be defined as antivirus software. No disrespect to tried-and-true AV, but endpoint security now spans a continuum that includes advanced prevention technologies, endpoint security controls and advanced detection/response tools. My colleague Doug Cahill and I are currently tracking more than 50 endpoint security vendors, demonstrating just how much activity there is today.To read this article in full or to leave a comment, please click here