Archive

Category Archives for "Networking"

SDxE: Engineer Focused

As an engineer, you’ve probably asked yourself a thousand times—what does all this software defined stuff mean for me? Answers are out there, of course; it seems like everyone is writing about it. Some of the answers out there are even useful, of course, but some of them are not. Most folks writing about the software defined craze are either unrealistic, or they’re focused on the large scale network you probably aren’t working on. Which leaves the question lingering: how does software defined apply to me?

SDxE—Software Defined Enterprise—is a new show designed to answer those questions for the engineer. I’ll be there; the full schedule isn’t in place, but I am currently pulling together a panel about the end of the (appliance) router. I plan to have folks from Cumulus, 6Wind, and at least one independent expert (Jeff Tantsura), sitting down to chat with me about disaggregation and the future of the router market. Specifically, are the tools in place that will allow you, the average engineer, running the “average” “enterprise” network, to take advantage of disaggregation?

Shawn Zandi will be there discussing the LinkedIn data center, and Pete Lumbis will be there talking about network automation. Continue reading

AI should enhance, not replace, humans, say CEOs of IBM and Microsoft

Artificial intelligence should enhance human workers, not replace them, at least according to the CEOs of IBM and Microsoft.Ginny Rometty and Satya Nadella made clear their view of the role of AI in a panel discussion at the World Economic Forum in Davos, Switzerland, on Tuesday, just a few hours after Rometty circulated IBM's three guiding principles for the development of cognitive technologies to company staff.Less dramatic and snappily expressed than Isaac Asimov's three laws of robotics, IBM's three principles are nevertheless intended to limit the harm the introduction of AI technologies causes.The first thing to understand is the purpose of these technologies. For IBM, Rometty said, "it will not be man or machine: Our purpose is to augment and be in service of what humans do."To read this article in full or to leave a comment, please click here

Report: Samsung probe blames Galaxy Note7 fires on faulty batteries

After months of recalls, scares, and device-killing software updates, Samsung is finally ready to reveal the results of its investigation into the exploding Galaxy Note7s. According to a report from Reuters, the electronics giant will detail its findings on Jan. 23, and to the surprise of no one, it has concluded that the battery is the culprit.To read this article in full or to leave a comment, please click here

Public Spectrum for Public Access

An extraordinary moment has arrived in the evolution of the internet. For all the transformation that has occurred over the 20+ years since the arrival of the World Wide Web and for the billions of people whose economic, civic and social circumstances have been improved, most people remain without internet connections.

Residing in every country, these unconnected billions still wait for affordable meaningful access to this essential service. Without access to the internet, people cannot even begin to participate in the global digital economy.

Don Means

Sensitive access tokens and keys found in hundreds of Android apps

Many developers still embed sensitive access tokens and API keys into their mobile applications, putting data and other assets stored on various third-party services at risk.A new study performed by cybersecurity firm Fallible on 16,000 Android applications revealed that about 2,500 had some type of secret credential hard-coded into them. The apps were scanned with an online tool released by the company in November.Hard-coding access keys for third-party services into apps can be justified when the access they provide is limited in scope. However, in some cases, developers include keys that unlock access to sensitive data or systems that can be abused.To read this article in full or to leave a comment, please click here

Sensitive access tokens and keys found in hundreds of Android apps

Many developers still embed sensitive access tokens and API keys into their mobile applications, putting data and other assets stored on various third-party services at risk.A new study performed by cybersecurity firm Fallible on 16,000 Android applications revealed that about 2,500 had some type of secret credential hard-coded into them. The apps were scanned with an online tool released by the company in November.Hard-coding access keys for third-party services into apps can be justified when the access they provide is limited in scope. However, in some cases, developers include keys that unlock access to sensitive data or systems that can be abused.To read this article in full or to leave a comment, please click here

Microsoft’s first tethered Windows 10 VR headsets to ship in March

Microsoft will ship its first PC-attached mixed reality headsets for Windows 10 PCs to developers starting in March at the Game Developers Conference.The first Windows 10 VR headsets from Microsoft will be units for developers to write and test applications based on the Windows Holographic platform.The headsets will work with Windows 10 Creators Update, said Vlad Kolesnikov, senior program manager at Microsoft, during a webcast on Friday.GDC is being held from Feb. 27 to March 3 in San Francisco.To read this article in full or to leave a comment, please click here

Terrorists are winning the digital arms race, experts say

Terrorist groups are embracing a huge number of digital tools to recruit members and plan attacks, putting them a step ahead of governments trying to combat them, a group of counterterrorism experts said.Twitter removed about 250,000 accounts connected with ISIS in one year, but the terrorist group uses 90 other social media platforms, Rob Wainwright, the director of Europol said Tuesday. Terrorist groups have begun to live stream their attacks, and they are using the internet to launch "innovative crowdfunding" campaigns, he said at the World Economic Forum in Davos-Klosters, Switzerland."The technology is advanced," Wainwright added. "They know what to do, and they know how to use it."To read this article in full or to leave a comment, please click here

Terrorists are winning the digital arms race, experts say

Terrorist groups are embracing a huge number of digital tools to recruit members and plan attacks, putting them a step ahead of governments trying to combat them, a group of counterterrorism experts said.Twitter removed about 250,000 accounts connected with ISIS in one year, but the terrorist group uses 90 other social media platforms, Rob Wainwright, the director of Europol said Tuesday. Terrorist groups have begun to live stream their attacks, and they are using the internet to launch "innovative crowdfunding" campaigns, he said at the World Economic Forum in Davos-Klosters, Switzerland."The technology is advanced," Wainwright added. "They know what to do, and they know how to use it."To read this article in full or to leave a comment, please click here

Endpoint Security in 2017

Just a few years ago, there were about 6 to 10 well regarded AV vendors that dominated the market.  Fast forward to 2017 and my colleague Doug Cahill and I are currently tracking around 50 endpoint security vendors. Why has this market changed so much in such a short timeframe?  New types of targeted threats regularly circumvented signature-based AV software over the past few years.  This weakness led to system compromises, data breaches, and panicky CISOs in search of AV alternatives.  This in turn persuaded the fat cats on Sand Hill Rd. to throw VC dollars at anything that hinted at endpoint security innovation.Okay, I get the need for more than signature-based AV but there simply isn’t room in the market for 50 endpoint security vendors.  Thus, it’s safe to assume a lot of M&A activity and outright business failures this year. To read this article in full or to leave a comment, please click here

43% off TP-Link Smart LED Wi-Fi Light Bulb, Dimmable and Alexa Compatible – Deal Alert

TP-Link has discounted its 50W smart bulb 43% to just $19.99. Use the Kasa app to turn on/off or dim from anywhere in the world. Set up a schedule, set the mood, and even control with your voice via an Alexa-enabled device such as Echo or Dot. Reviewers rate 4 out of 5 stars (see reviews) on Amazon, where you can get yourself one (or more) for just $20, a good deal considering it typically lists north of $20 and sometimes $30 with various online retailers. See the discounted TP-Link smart LED bulb on Amazon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The sky is streaming

Internet access has gone through several generations that started with dial-up modems. I still remember my “blazing fast” upgrade from 24 kbps to 56 kbps.Dial-up modems gave way to always-on broadband solutions. Initially there were two choices: Cable (DOCSIS) and telephone (DSL). Wireless (LTE) has emerged over the past few years as a viable option for connectivity beyond smartphones.Many investors think the next generation will be wireless connectivity. It’s unfortunate that “Skynet” is associated with the villainous, fictional neural machines from the Terminator movies because each of these solutions will deliver the internet from the sky. After all, the sky is where the clouds are.To read this article in full or to leave a comment, please click here

Low-end Android phones could get VR with new Imagination GPU

The company that provides GPUs to Apple's iPhones now wants to shake up the Android landscape by bringing high-quality VR experiences to low-end phones. GPUs from Imagination Technologies are used in both iPhones and Android handsets. The company's latest PowerVR Series8XE Plus GPU will be installed in Android handsets priced between US $200 and $400. The use of virtual reality in Android devices is growing fast. But most VR-capable phones, like the ones supporting Google's DayDream platform, are expensive because of powerful GPUs and high-resolution screens. Cheap VR headsets like Google Cardboard can be used with inexpensive phones, but the experience is uneven.To read this article in full or to leave a comment, please click here

25 most common passwords in 2016 and how quickly they can be cracked

It’s nearly that time again when SplashData will release its annual list of worst passwords, but this list of passwords comes from Keeper Security. The company analyzed over 10 million passwords available on the public web before publishing a list of 25 most common passwords of 2016.Keeper pointed a finger of blame at websites for not enforcing password best practices. Even if a site won’t help you determine if a password is decent, then people could use common sense. It’s disheartening to know that 17% of people are still trying to safeguard their accounts with “123456.” And “password” is of course still on the list as well as keyboard patterns such as “qwerty” and “123456789”.To read this article in full or to leave a comment, please click here

25 most common passwords in 2016 and how quickly they can be cracked

It’s nearly that time again when SplashData will release its annual list of worst passwords, but this list of passwords comes from Keeper Security. The company analyzed over 10 million passwords available on the public web before publishing a list of 25 most common passwords of 2016.Keeper pointed a finger of blame at websites for not enforcing password best practices. Even if a site won’t help you determine if a password is decent, then people could use common sense. It’s disheartening to know that 17 percent of people still try to safeguard their accounts with “123456.” And “password” is, of course, still on the list, as well as keyboard patterns such as “qwerty” and “123456789”.To read this article in full or to leave a comment, please click here