Archive

Category Archives for "Networking"

How Apple and Google approach enterprise apps

Apple and Google both try to woo enterprise customers with unique strategies for business app development that mirror their respective visions. And as might be expected, each company elevates its strengths in enterprise and downplays points of weakness, according to IT leaders who spoke to CIO.com.Google cultivates a large group of partners to help organizations integrate Google apps with business processes, and it recently released a self-service tool, called App Maker, that's designed to speed up development. Meanwhile, Apple forged partnerships with a select group of enterprise heavyweights to build key business features into the core of iOS. It also made deals with other companies that work directly with customers to guide their businesses through the transition to mobile. Both approaches bring different enterprise appeals.To read this article in full or to leave a comment, please click here

The Trump effect on cybersecurity: Tough to tell

Donald Trump’s effect on cybersecurity after he’s sworn in as president next month will likely be toward military uses of cyber weapons and stronger tools for law enforcement to crack encryption, but the impact is hard to predict due to the vagueness of his proposals so far.The most detailed Trump cyber plan is just 175 words long and includes some initiatives that sound like what’s already in place.On the campaign trail and during debates he occasionally hit the topic, but again with little detail and perhaps little understanding of how the internet works. For example, he called for Microsoft founder Bill Gates to find a way to shut off parts of the internet to ISIS as a way to halt its recruitment efforts.To read this article in full or to leave a comment, please click here

The Trump effect on cybersecurity: Tough to tell

Donald Trump’s effect on cybersecurity after he’s sworn in as president next month will likely be toward military uses of cyber weapons and stronger tools for law enforcement to crack encryption, but the impact is hard to predict due to the vagueness of his proposals so far.The most detailed Trump cyber plan is just 175 words long and includes some initiatives that sound like what’s already in place.On the campaign trail and during debates he occasionally hit the topic, but again with little detail and perhaps little understanding of how the internet works. For example, he called for Microsoft founder Bill Gates to find a way to shut off parts of the internet to ISIS as a way to halt its recruitment efforts.To read this article in full or to leave a comment, please click here

Worth Reading: Hyper Moore’s Law

Over the last year in particular, we have documented the merger between high performance computing and deep learning and its various shared hardware and software ties. This next year promises far more on both horizons and while GPU maker Nvidia might not have seen it coming to this extent when it was outfitting its first GPUs on the former top “Titan” supercomputer, the company sensed a mesh on the horizon when the first hyperscale deep learning shops were deploying CUDA and GPUs to train neural networks. —The Next Platform

LinkedInTwitterGoogle+Facebook

The post Worth Reading: Hyper Moore’s Law appeared first on 'net work.

Ixia’s GUI faster, more accurate than Gigamon’s command line or Flowmap

The IT infrastructure that powers an organizations business strategy has become increasingly more dynamic and distributed. The introduction of new technologies to increase IT agility has made it significantly more difficult to manage and secure the infrastructure using traditional tools.That challenge has given rise to several new specialized tools that network managers have had to figure out how to integrated into their environment. The explosion of new security and management applications has something called “tool sprawl” where the number of tools has become unmanageable.Trying to connect every tool to every network device is extremely complicated and inefficient. The desire to simplify things has created strong demand for network packet brokers (NPBs). If you’re not familiar with the technology, it sits between the network infrastructure and a tool layer and performs a number of tasks to make tools more efficient and easier to deploy.To read this article in full or to leave a comment, please click here

Ixia’s GUI faster, more accurate than Gigamon’s command line or Flowmap

The IT infrastructure that powers an organization's business strategy has become increasingly more dynamic and distributed. The introduction of new technologies to increase IT agility has made it significantly more difficult to manage and secure the infrastructure using traditional tools.That challenge has given rise to several new specialized tools that network managers have had to figure out how to integrate into their environment. The explosion of new security and management applications has something called “tool sprawl” where the number of tools has become unmanageable.Trying to connect every tool to every network device is extremely complicated and inefficient. The desire to simplify things has created strong demand for network packet brokers (NPBs). If you’re not familiar with the technology, it sits between the network infrastructure and a tool layer and performs a number of tasks to make tools more efficient and easier to deploy.To read this article in full or to leave a comment, please click here

20% off Hamilton Beach Breakfast Sandwich Maker – Deal Alert

This kitchen gadget from Hamilton Beach is all about making a fresh breakfast sandwich that you can grab and go. Just choose your bread and layer on the fixings: egg, cheese, precooked meat, or other ingredients of your choice. In five minutes or less, your perfectly assembled breakfast sandwich is ready to eat. All removable parts simply go in the dishwasher for an easy cleanup. The sandwich maker averages 4.5 out of 5 stars from over 3,000 people on Amazon (read reviews). It's typical list price of $30 has been reduced to $24, saving you 20%. See it on Amazon.To read this article in full or to leave a comment, please click here

Prepare for a spike in SSD prices

SSD prices have been in a freefall for the last few years thanks to increased output by NAND flash memory makers and those vendors converting their production to 3D NAND, which offers increased density at a lower cost. That's why you are seeing so many 1TB SSDs on the market these days, but it's also why prices are going up.However, going into the busy fourth quarter, the industry has been hit with a double-whammy of lower production and increased demand, and at that point it's basic economics of supply and demand. The result could be a spike in prices in the coming months.A report in China's CTimes states that revenue is up considerably for NAND flash makers such as Samsung, SK Hynix and Toshiba because prices have risen recently. Part of the reason is the increasing demand of 3D NAND flash, which stacks the memory cells in layers to achieve greater density in a smaller space. Vendors are converting their fabrication plants to handle 3D, but it takes time and money. Lots of money. To read this article in full or to leave a comment, please click here

OpenVPN will be audited for security flaws

The next major version of OpenVPN, one of the most widely used virtual private networking technologies, will be audited by a well-known cryptography expert.The audit will be fully funded by Private Internet Access (PIA), a popular VPN service provider that uses OpenVPN for its business. The company has contracted cryptography engineering expert Matthew Green, a professor at Johns Hopkins University in Baltimore, to carry out the evaluation with the goal of identifying any vulnerabilities in the code.Green has experience in auditing encryption software, being one of the founders of the Open Crypto Audit Project, which organized a detailed analysis of TrueCrypt, a popular open-source full-disk encryption application. TrueCrypt has been abandoned by its original developers in 2014, but its code has since been forked and improved as part of other projects.To read this article in full or to leave a comment, please click here

OpenVPN will be audited for security flaws

The next major version of OpenVPN, one of the most widely used virtual private networking technologies, will be audited by a well-known cryptography expert.The audit will be fully funded by Private Internet Access (PIA), a popular VPN service provider that uses OpenVPN for its business. The company has contracted cryptography engineering expert Matthew Green, a professor at Johns Hopkins University in Baltimore, to carry out the evaluation with the goal of identifying any vulnerabilities in the code.Green has experience in auditing encryption software, being one of the founders of the Open Crypto Audit Project, which organized a detailed analysis of TrueCrypt, a popular open-source full-disk encryption application. TrueCrypt has been abandoned by its original developers in 2014, but its code has since been forked and improved as part of other projects.To read this article in full or to leave a comment, please click here

AMD strengthens gaming and VR on Linux with graphics improvements

Windows is the indisputable platform of choice for gaming and VR, but Linux is catching up fast as graphics companies ramp up driver and hardware support for the OS.AMD is showing more love for Linux than ever before. The company on Thursday announced some hardware and driver updates that will strengthen gaming and VR on the OS.The biggest news is AMD's support for FreeSync on Linux PCs. FreeSync can improve the rendition of games and high-definition video by allowing GPUs to communicate directly with displays, reducing image stutter and lag time. Images are drawn up on the screen while they are being rendered in GPUs.This is the first time AMD is bringing FreeSync support to Linux. It was earlier available only on Windows PCs.To read this article in full or to leave a comment, please click here

Moore’s Law lives on with speedy 7-nm mobile chips coming in 2018

How do mobile devices keep get faster, thinner, and more power efficient? It's thanks to the quick advances in chip manufacturing, which help churn out smaller chips packed with new features.The next round of premium smartphones early next year could feature chips like Qualcomm's Snapdragon 835, made using the latest, 10-nanometer process.Continuing with the famous Moore's Law observation, it's likely that two years after that, smartphones will get even faster and smaller chips will be made using a 7-nanometer process.On Monday, ARM, with its chip designs in most smartphones, said it is working with prominent chip manufacturer TSMC (Taiwan Semiconductor Manufacturing Co.) to make 7-nm chips. ARM shared intellectual property for its 7-nm designs, allowing chips to be designed for manufacturing in TSMC's factories.To read this article in full or to leave a comment, please click here

48% off Travel Cord Organizer – Electronics Accessories Case & Cable Organizer – Deal Alert

Designed to protect and safeguard your electronic gadgets and save time on the go by easily storing and finding everything you need. This travel organizer offers a secure storage space for cord management, laptop and computer accessories putting everything you need in one place. This organizer also gives you special space inside for credit cards, passports, also for boarding passes, smartphone, tickets and has many pockets where you can put coins, keys, USB, SIM card, earphones, and other small accessories. Give yourself or someone else the gift of stress-free travel.  The travel cord organizer's typical list price of $30.99 has been reduced 48% to $15.99. See the discounted Travel Cord Organizer now on Amazon.To read this article in full or to leave a comment, please click here

U.S. and U.K. spy agencies have been intercepting in-flight phone calls for years

U.S. and U.K. spy agencies have been monitoring in-flight mobile phone users for years, according to new revelations from the trove of documents leaked by former NSA contractor Edward Snowden.As early as 2012 the U.K. Government Communications Headquarters (GCHQ) was intercepting voice and data communications from commercial aircraft using the OnAir service to carry 2G mobile services over the Inmarsat satellite communications network. At the time, GCHQ did not have access to a rival in-flight mobile service provider, Aeromobile, French newspaper Le Monde reported Wednesday.To read this article in full or to leave a comment, please click here

U.S. and U.K. spy agencies have been intercepting in-flight phone calls for years

U.S. and U.K. spy agencies have been monitoring in-flight mobile phone users for years, according to new revelations from the trove of documents leaked by former NSA contractor Edward Snowden.As early as 2012 the U.K. Government Communications Headquarters (GCHQ) was intercepting voice and data communications from commercial aircraft using the OnAir service to carry 2G mobile services over the Inmarsat satellite communications network. At the time, GCHQ did not have access to a rival in-flight mobile service provider, Aeromobile, French newspaper Le Monde reported Wednesday.To read this article in full or to leave a comment, please click here

Apache Zeppelin open-source analytics startup reveals new name, fresh funding

The team behind the Apache Zeppelin open-source notebook for big data analytics visualization has renamed itself ZEPL and announced $4.1M in Series A funding.ZEPL, which swears a certain professional football organization had nothing to do with it ditching its former name (NFLabs), is one of numerous companies smelling blood in the water around Tableau, the $3.5 billion business intelligence and analytics software vendor that has stumbled financially in recent quarters and seen its stock price plummet accordingly.  The pitch from ZEPL entering my email inbox read: "Is Open Source project eating Tableau's lunch?"To read this article in full or to leave a comment, please click here