Archive

Category Archives for "Networking"

Research chip modeled after the brain aims to bring smarts to computers

The dream of creating intelligent computers has inspired the development of exotic chips based on the structure of the brain, which operates in mysterious ways. Some researchers are making such chips from components found in today's computers.Using components pulled off store shelves, researchers at the University of Tennessee, Knoxville, have made a chip for intelligent computers that can learn. The chips are structured to discover patterns through probabilities and association, helping with decision making.The researchers are using off-the-shelf, reprogrammable circuits called FPGAs (field programmable gate arrays) to simulate the way neurons and synapses in a brain operate. The chip was made as part of the university's DANNA neuromorphic software project.To read this article in full or to leave a comment, please click here

Research chip modeled after the brain aims to bring smarts to computers

The dream of creating intelligent computers has inspired the development of exotic chips based on the structure of the brain, which operates in mysterious ways. Some researchers are making such chips from components found in today's computers.Using components pulled off store shelves, researchers at the University of Tennessee, Knoxville, have made a chip for intelligent computers that can learn. The chips are structured to discover patterns through probabilities and association, helping with decision making.The researchers are using off-the-shelf, reprogrammable circuits called FPGAs (field programmable gate arrays) to simulate the way neurons and synapses in a brain operate. The chip was made as part of the university's DANNA neuromorphic software project.To read this article in full or to leave a comment, please click here

How to integrate disruptive technologies with IT outsourcing contracts

In the era of digital disruption, the ability to successfully implement new technologies such as mobility, big data and analytics systems, cloud computing options, or robotics for competitive advantage is critical. In some cases, going to an existing IT service provider may not be the best way to do so. However, in many cases, there are advantages to working with incumbent supplier. Doing so may enable IT outsourcing customers to leverage existing contractual commitments and terms to accelerate the contracting process.Business and IT leaders may want a trusted partner to manage their entire technology environment. By expanding the scope of an existing deal, the customer can retain integrated performance standards and service levels for the entire environment and maintain streamlined governance processes. It also may be a way to minimize any transition or termination costs.To read this article in full or to leave a comment, please click here

Google, LinkedIn leaders on tech’s responsibility for lost jobs

SAN FRANCISCO — The pressing issue of modern technology's negative impact on jobs was largely ignored during the 2016 presidential election, according to California's Lt. Gov. Gavin Newsom, who spoke this week at the Code Enterprise conference. Today's society has deficiencies in education and regulation, and it lacks the collective mindset necessary to transform tech challenges into opportunities, Newsom said. The roles large technology companies play in eliminating jobs, and the responsibilities they should bear to fight this problem, are rarely discussed. However, senior executives at Google and LinkedIn addressed the issue on stage at Code Enterprise, telling the audience of business leaders that it is paramount for tech titans to minimize job losses by creating new opportunities.To read this article in full or to leave a comment, please click here

7 reasons cloud migrations fail (free online course)

Cloud migrations can fail for a variety of reasons, such as a cloud strategy that isn’t aligned with business goals, cultural resistance or lack of a viable cloud security plan. Managing these migration risks is the focus of a free online course presented by training company Logical Operations Inc., in partnership with IDG Enterprise.To read this article in full or to leave a comment, please click here(Insider Story)

Hottest Android Black Friday 2016 deals on tablets, phones & more

It’s a lot easier to find Black Friday 2016 deals for Android smartphones and tablets than it is for competing Apple products, so if you’re a fan of Google’s Linux kernel-based mobile OS or willing to give it a shot, then Best Buy, Target and others are more than happy to accommodate on Nov. 25. Here’s where to look if you want to compare Android products to those from Apple or running Windows. To read this article in full or to leave a comment, please click here

ICQ, the original instant messenger, turns 20

About 20 years ago, I started driving co-workers within listening distance crazy with constant chirps of "Uh oh!" emanating from my laptop. It was all coming from a nifty little program I'd discovered called ICQ, which let me talk to friends in real time. Created by a group of Israeli college students who eventually formed the company Mirabilis to support development of the app, ICQ stood for "I seek you" and was intended as a way for Windows users to communicate much in the same way Unix users could send real-time messages. To read this article in full or to leave a comment, please click here

Top reasons for network downtime

New research paints a somewhat bleak picture of network performance. Outages are frequent. Hours typically pass before an issue is reported and resolved. Protective measures are manual and error prone.The source of the data is a survey of 315 network pros at midsize and large enterprises. The survey was sponsored by Veriflow, a San Jose, Calif.-based startup that aims to minimize the risk of network vulnerabilities and outages. Veriflow’s software is designed to catch network problems before they happen by predicting possible network-wide behavior and continually verifying that a network model adheres to an enterprise’s security and resilience policies.To read this article in full or to leave a comment, please click here

Top reasons for network downtime

New research paints a somewhat bleak picture of network performance. Outages are frequent. Hours typically pass before an issue is reported and resolved. Protective measures are manual and error prone.The source of the data is a survey of 315 network pros at midsize and large enterprises. The survey was sponsored by Veriflow, a San Jose, Calif.-based startup that aims to minimize the risk of network vulnerabilities and outages. Veriflow’s software is designed to catch network problems before they happen by predicting possible network-wide behavior and continually verifying that a network model adheres to an enterprise’s security and resilience policies.To read this article in full or to leave a comment, please click here

Inspecting SCEP enrollment traffic

SCEP is a protocol which facilitates client enrollment with a Certificate Authorities (CA), delivery and renewal of certificates and delegation of identity verification from a CA to a trusted Registration Authoritie (RA)

A project I'm working on requires me to generate a Certificate Signing Request (CSR) on behalf client which doesn't exist yet, and deliver of those requests to the CA via an RA that I'm building. I'll then set aside the certificate and keys for installation onto the client system when it becomes available.

It seemed like ripping apart a request from a real client, as delivered by a real RA would be a good place to start, so that's what I did. I set up a CA (R1), an RA (R2) and a client (R3), performed the enrollment and captured the traffic between the R2 and R1.

There's a nice diagram detailing how a client delivers its  to a CA on this Cisco page, so have a quick peek at the breakdown listed under Client Enrollment there.

A CSR delivered by an RA (rather than the client) is similarly encapsulated, except that both of the PKCS7 functions are performed by the RA (with the RA's private key), Continue reading

US lawmakers introduce bill to delay enhanced government hacking powers

U.S. lawmakers have introduced legislation to delay the coming into force on Dec. 1 of a rule change that aims to expand the government's ability to search computers and other digital devices across many jurisdictions with a single warrant.The new Review the Rule Act aims to delay for discussion proposed amendments to rule 41 of the Federal Rules of Criminal Procedure until July 1 next year. The changes to the rule have already been approved by the Supreme Court in April, and if Congress doesn’t act to the contrary, they will go into effect on Dec. 1.To read this article in full or to leave a comment, please click here

US lawmakers introduce bill to delay enhanced government hacking powers

U.S. lawmakers have introduced legislation to delay the coming into force on Dec. 1 of a rule change that aims to expand the government's ability to search computers and other digital devices across many jurisdictions with a single warrant.The new Review the Rule Act aims to delay for discussion proposed amendments to rule 41 of the Federal Rules of Criminal Procedure until July 1 next year. The changes to the rule have already been approved by the Supreme Court in April, and if Congress doesn’t act to the contrary, they will go into effect on Dec. 1.To read this article in full or to leave a comment, please click here

Monitoring at Terabit speeds

The chart was generated from industry standard sFlow telemetry from the switches and routers comprising The International Conference for High Performance Computing, Networking, Storage and Analysis (SC16) network. The chart shows a number of conference participants pushing the network to see how much data they can transfer, peaking at a combined bandwidth of 3 Terabits/second over a minute just before noon and sustaining over 2.5 Terabits/second for over an hour. The traffic is broken out by MAC vendors code: routed traffic can be identified by router vendor (Juniper, Brocade, etc.) and layer 2 transfers (RDMA over Converged Ethernet) are identified by host adapter vendor codes (Mellanox, Hewlett-Packard Enterprise, etc.).

From the SCinet web page, "The Fastest Network Connecting the Fastest Computers: SC16 will host the most powerful and advanced networks in the world – SCinet. Created each year for the conference, SCinet brings to life a very high-capacity network that supports the revolutionary applications and experiments that are a hallmark of the SC conference."

SC16 live real-time weathermaps provides additional demonstrations of high performance network monitoring.

Without tech industry guidance, U.S. may resort to weakening encryption

Apple may have refused to help the FBI unlock an iPhone used by the San Bernardino shooter, but the tech industry is still better off working with the U.S. government on encryption issues than turning away, according to a former official with the Obama administration. “The government can get very creative,” said Daniel Rosenthal, who served as the counterterrorism director in the White House until January this year. He fears that the U.S. government will choose to “go it alone” and take extreme approaches to circumventing encryption, especially if another terrorist attack occurs.To read this article in full or to leave a comment, please click here

Without tech industry guidance, U.S. may resort to weakening encryption

Apple may have refused to help the FBI unlock an iPhone used by the San Bernardino shooter, but the tech industry is still better off working with the U.S. government on encryption issues than turning away, according to a former official with the Obama administration. “The government can get very creative,” said Daniel Rosenthal, who served as the counterterrorism director in the White House until January this year. He fears that the U.S. government will choose to “go it alone” and take extreme approaches to circumventing encryption, especially if another terrorist attack occurs.To read this article in full or to leave a comment, please click here

Apple offers to repair iPhone 6 Plus devices with ‘touch disease’

Apple is offering to repair at a reduced price iPhone 6 Plus smartphones with display flickering or multitouch issues.The problem, described in August as “touch disease” by repair guide website iFixit, is characterized by a gray, flickering bar at the top of the display and an unresponsive touchscreen. The issue affects both the iPhone 6 and the iPhone 6 Plus, according to iFixit.Apple appears to consider it a problem with the way users handled the phone rather than a defect. It said Thursday that the company has determined that the smartphones may exhibit display flickering or Multi-Touch issues “after being dropped multiple times on a hard surface and then incurring further stress on the device.”To read this article in full or to leave a comment, please click here

Freshly-funded Message.io buddies up with Microsoft on chatbots

Starting from behind the likes of Slack and HipChat with its new workplace collaboration Teams service, Microsoft can use all the help it can get. Startup Message.io is among those coming to its aid.Message.io, a bot translation tool and syndication service provider founded last year, enables developers to quickly port and scale their bots to work on numerous enterprise messaging platforms without making coding changes. It is partnering with Microsoft so that bots built for other messaging platforms will work on Teams within Office 365 (not to mention on Microsoft's Skype for Business).To read this article in full or to leave a comment, please click here