Archive

Category Archives for "Networking"

Election data models provide a lesson for cybersecurity

If you are like me, you were pretty convinced that Secretary Clinton was poised to be the President elect. Confidence in this opinion was based on reviewing numerous big data analytics models from the fivethirtyeight.com, The New York Times, Princeton, etc. The lowest percentage gave Mrs. Clinton roughly a 65 percent chance of winning on November 8. So, what happened? Every database jockey recognizes the old maxim of garbage in/garbage out. In other words, killer algorithms and all the processing power in the world are rather useless if your model is built on the back of crappy data. Obviously, all the brainiacs building these models made a critical mistake in not gathering data from disenfranchised white voters in rural areas. The result? A stunning election result and lots of eggs on Ivy League elitist faces.To read this article in full or to leave a comment, please click here

Election Data Models Lesson for Cybersecurity

If you are like me, you were pretty convinced that Secretary Clinton was poised to be the President elect.  Confidence in this opinion was based on reviewing numerous big data analytics models from the fivethirtyeight.com, the New York Times, Princeton, etc.  The lowest percentage gave Mrs. Clinton roughly a 65% chance of winning on November 8. So, what happened?  Every database jockey recognizes the old maxim of garbage in/garbage out.  In other words, killer algorithms and all the processing power in the world are rather useless if your model is built on the back of crappy data.  Obviously, all the brainiacs building these models made a critical mistake in not gathering data from disenfranchised white voters in rural areas.  The result?  A stunning election result and lots of eggs on ivy league elitist faces.To read this article in full or to leave a comment, please click here

75% off Phaiser BHS-730 Bluetooth Sweatproof Sport Earbuds, Magnetic – Deal Alert

Phaiser's BHS-730 Bluetooth Sport earbuds are both highly rated and dramatically discounted on Amazon. Averaging 4.5 out of 5 stars on Amazon from over 4,600 people (read reviews), the list price of $160 has been reduced a significant 75% to just $39.99.  The BHS-730 uses the highest quality hardware, as well as Bluetooth 4.1 and A2DP stereo transfer protocols to produce bigger bass, lighter-than-air treble, and perfect phone call clarity every time. Bullet-shaped Comply T-400 M memory foam tips provide total isolation from external noise. It's designed to withstand the toughest environments, and the earbuds are made from Aviation Grade Aluminum-Magnesium-Alloy which doesn't add weight. And a LiquipelTM Nano-Coating means it can be dropped into water and will live to see another day. The BHS-730's are magnetized, so they stick to each other and stay securely around your neck when you need to take them out of your ears. Along with the earbuds you get a generous 7 sets of ear tips, a 60-day "no questions asked" return policy, and a lifetime sweatproof warranty as well. See the discounted Phaiser BHS-730 now on Amazon. To read this article in full or to leave a comment, please click here

Surface Book i7 review: Still unique and still blazing fast

It’s always been difficult trying to find the right category for Microsoft’s hybrid tablet/laptop Surface Book. And now with the new Surface Book i7 in hand, it’s even harder to figure out just what square hole to put this round peg into.Before we get too far into the review, let me say that the Surface Book i7 is incredibly fast for a laptop in its class, offering no less than twice the performance of the original Surface Book, which itself outstripped all others in its day. Even better, it has stupidly long battery life that bests all the laptops we’ve tested.Done. Fini. Move along, right? Well, not quite. The world isn’t the same as it was a year ago and the Surface Book i7’s competitors have been hard at work too, and there are aspects of Microsoft’s hybrid device that aren’t perfect.To read this article in full or to leave a comment, please click here

Introduction to Quantum Cryptography

How Does Internet Work - We know what is networking

Quantum cryptography is a new technique of securing computer network communication channel. Existing standard crypto systems are using advanced algorithms to create key pairs which are extremely hard to inverse engineer. Quantum cryptography avoids any mathematical algorithm and uses principles of quantum physics. Quantum crypto implements a new technique of generating and exchanging crypto keys which makes it impossible for third party entities to get those keys by snooping or to create man in the middle by snooping and sending copies of original key. Keys generated in this way will automatically destroy themselves if read by third-party interferer. When generated between two sides, using quantum key distribution, secret keys will

Introduction to Quantum Cryptography

That private network on the Wi-Fi band? Won’t happen

Satellite service provider Globalstar has dropped its controversial plan to launch a wireless network in the U.S. in part of an unlicensed band that Wi-Fi and Bluetooth use.The plan had alarmed supporters of those technologies who feared the network would interfere with them and effectively privatize unlicensed spectrum. Globalstar’s TLPS (Terrestrial Low-Power Service) proposal was one of several ideas introduced in recent years to mix licensed and unlicensed uses of spectrum. While some have been ruled out, others, such as LTE-Unlicensed, are moving forward.To read this article in full or to leave a comment, please click here

Ethernet consortia trio want to unlock a more time-sensitive network

The demand from Internet of Things, automotive networking and video applications are driving changes to Ethernet technology that will make it more time-sensitive.Key to those changes are a number of developing standards but also a push this week from the University of New Hampshire InterOperability Laboratory to set up three new industry specific Ethernet Time-Sensitive Networking (TSN) consortiums – Automotive Networking, Industrial Networking, and ProAV Networking aimed at developing deterministic performance within standard Ethernet for real-time, mission critical applications.+More on Network World: IEEE sets new Ethernet standard that brings 5X the speed without disruptive cable changes+To read this article in full or to leave a comment, please click here

35% off Oster Cordless Electric Wine Bottle Opener with Foil Cutter – Deal Alert

This cordless electric wine opener from Oster removes the cork in seconds with one-button operation, and opens up to 30 bottles before needing to be recharged. It features a foil cutter for easily removing seals and a comfortable soft-grip handle. Currently averages 4 out of 5 stars from over 4,000 people (read reviews). It's discounted 35% on Amazon, so you can get it right now for just $12.99. To read this article in full or to leave a comment, please click here

Ethernet consortia trio want to unlock a more time-sensitive network

The demand from Internet of Things, automotive networking and video applications are driving changes to Ethernet technology that will make it more time-sensitive.Key to those changes are a number of developing standards but also a push this week from the University of New Hampshire InterOperability Laboratory to set up three new industry specific Ethernet Time-Sensitive Networking (TSN) consortiums – Automotive Networking, Industrial Networking, and ProAV Networking aimed at developing deterministic performance within standard Ethernet for real-time, mission critical applications.+More on Network World: IEEE sets new Ethernet standard that brings 5X the speed without disruptive cable changes+To read this article in full or to leave a comment, please click here

Ethernet consortia trio want to unlock a more time-sensitive network

The demand from Internet of Things, automotive networking and video applications are driving changes to Ethernet technology that will make it more time-sensitive.Key to those changes are a number of developing standards but also a push this week from the University of New Hampshire InterOperability Laboratory to set up three new industry specific Ethernet Time-Sensitive Networking (TSN) consortiums – Automotive Networking, Industrial Networking, and ProAV Networking aimed at developing deterministic performance within standard Ethernet for real-time, mission critical applications.+More on Network World: IEEE sets new Ethernet standard that brings 5X the speed without disruptive cable changes+To read this article in full or to leave a comment, please click here

Ethernet consortia trio want to unlock a more time-sensitive network

The demand from Internet of Things, automotive networking and video applications are driving changes to Ethernet technology that will make it more time-sensitive.Key to those changes are a number of developing standards but also a push this week from the University of New Hampshire InterOperability Laboratory to set up three new industry specific Ethernet Time-Sensitive Networking (TSN) consortiums – Automotive Networking, Industrial Networking, and ProAV Networking aimed at developing deterministic performance within standard Ethernet for real-time, mission critical applications.+More on Network World: IEEE sets new Ethernet standard that brings 5X the speed without disruptive cable changes+To read this article in full or to leave a comment, please click here

HubSpot Inbound 2016: A tech conference disguised as a sales & marketing one

I had my reservations about hitting HubSpot’s annual Inbound conference in Boston this week. Yes, it would be easy enough to swing by from our suburban Boston headquarters, but Network World caters to enterprise IT professionals, not software maker HubSpot’s sales and marketing crowd.Sure enough though, the 19,000 registered attendees at the flashy event full of funky seating arrangements and celebrity speakers (including President-elect Donald Trump, er, Alec Baldwin) were treated to a steady stream of tech talk, so I didn’t feel out of place at all. Neither did the target audience given that they are increasingly making the kinds of technology purchasing calls in this cloud-happy world of which IT staffs are well aware.To read this article in full or to leave a comment, please click here