Archive

Category Archives for "Networking"

Nokia files even more patent lawsuits against Apple

Nokia has filed new patent infringement lawsuits against Apple on Thursday, a day after it weighed in on a licensing dispute with the company by filing claims in Germany and the U.S.On Wednesday, the Finland-based mobile network vendor filed lawsuits in three German courts and two lawsuits in a Texas court, leveling infringement claims against Apple on the widely used H.264 video codec and other technologies. Those suits cover 32 of Nokia's patents.Nokia's first round of lawsuits came after Apple filed a lawsuit Tuesday accusing Nokia of working with patent assertion firms Acacia Research and Conversant Intellectual Property Management to “extract and extort exorbitant revenues unfairly and anticompetitively” from Apple and other smartphone makers. To read this article in full or to leave a comment, please click here

Looking Back to Look Forward on Cybersecurity

By now, everyone in our industry has provided 2017 cybersecurity predictions and I’m no exception.  I participated in a 2017 infosec forecast webcast with industry guru Bruce Schneier, and ESG also published a video where I exchanged cybersecurity prophecies with my colleague Doug Cahill (note: I am an ESG employee).Yup, prognosticating about the future of cybersecurity has become a mainstream activity, but rather than simply guess at what will happen next year, I think it is useful to review what actually happened over the past few years and extrapolate from there.To read this article in full or to leave a comment, please click here

Looking Back to Look Forward on Cybersecurity

By now, everyone in our industry has provided 2017 cybersecurity predictions and I’m no exception.  I participated in a 2017 infosec forecast webcast with industry guru Bruce Schneier, and ESG also published a video where I exchanged cybersecurity prophecies with my colleague Doug Cahill (note: I am an ESG employee).Yup, prognosticating about the future of cybersecurity has become a mainstream activity, but rather than simply guess at what will happen next year, I think it is useful to review what actually happened over the past few years and extrapolate from there.To read this article in full or to leave a comment, please click here

Looking back to look forward on cybersecurity

By now, everyone in our industry has provided 2017 cybersecurity predictions, and I’m no exception. I participated in a 2017 infosec forecast webcast with industry guru Bruce Schneier, and ESG also published a video where I exchanged cybersecurity prophecies with my colleague Doug Cahill.Yup, prognosticating about the future of cybersecurity has become a mainstream activity. But rather than simply guess at what will happen next year, I think it is useful to review what actually happened over the past few years and extrapolate from there.To read this article in full or to leave a comment, please click here

Event-driven infrastructure and the move to higher worlds

At Amazon Web Services' (AWS) re:Invent conference two years ago, the company introduced AWS Lambda, a mind-blowing service that allows developers to specify and set up specific functions that would run in the event of particular events.This was a remarkable development, for it heralded the ability to move beyond servers for specific processes and move to a model where the operation was the unit of measure. Functions would run only in the event of the particular triggers and would set in a idle state for eternity in the absence of those triggers. Developers would pay only when the particular functions were running.To read this article in full or to leave a comment, please click here

Apple shortens annual iTunes Connect holiday shutdown

Apple has alerted app developers that it will not be accepting new app or app update submissions from Dec. 23-27, so the clock is ticking... Apple annual announces a holiday schedule, presumably to give some of the real people behind the app management process some time off. However, this year the break is only 5 days vs. 7 the past couple of years. While developers won't be able to submit new apps or updates during the break, they will have access to other iTunes connect features. Apple recently announced its Best of 2016 list, highlighting top apps and developers. Statista shows that about 2 million mobile apps are available for download on the Apple App Store, including the top new free app (well, it costs $10 to activate the good stuff), Super Mario Run. Nintendo says Super Mario Run was downloaded 40 million times in its first 4 days of availability, and Apple confirmed that is a record-breaker.To read this article in full or to leave a comment, please click here

Red Hat Falls 11% on Flat Q4 Forecast

Red Hat Falls 11% on Flat Q4 Forecast Shares of Red Hat fell 10.6 percent in after-hours trading today as the company’s fourth-quarter forecast disappointed investors. Red Hat’s fourth-quarter projection of $614 million to $622 million in revenues means sales will be just about flat quarter-to-quarter. Revenues for the company’s third quarter, which ended Nov. 30, were $615 million. Investors expected third-quarter revenues... Read more →

IDG Contributor Network: Surprise! Polar codes are coming in from the cold

As the festive season approaches, there is nothing better than a good surprise. If you follow my blog regularly, you’ll have read my position on Polar codes—great technology, but perhaps not quite ready for prime time.Well, I guess I was wrong, or maybe not? Recently, 3GPP selected Polar codes as the official coding method for the control channel functions in the 5G enhanced mobile broadband use case (one of the three main use cases being developed), and the LDPC method was crowned as the channel code for the data channels in the same use case. Turbo codes are not in the game yet, at least in this round. So, what happened?To read this article in full or to leave a comment, please click here

Encrypted messaging app Signal uses Google to bypass censorship

Developers of the popular Signal secure messaging app have started to use Google's domain as a front to hide traffic to their service and to sidestep blocking attempts.Bypassing online censorship in countries where internet access is controlled by the government can be very hard for users. It typically requires the use of virtual private networking (VPN) services or complex solutions like Tor, which can be banned too.Open Whisper Systems, the company that develops Signal -- a free, open-source app -- faced this problem recently when access to its service started being censored in Egypt and the United Arab Emirates. Some users reported that VPNs, Apple's FaceTime and other voice-over-IP apps were also being blocked.To read this article in full or to leave a comment, please click here

Predicting the end of cloud computing

Here’s a prediction you don’t hear very often: The cloud computing market, as we know it, will be obsolete in a matter of years.The provocateur is Peter Levine, a general partner at venture capital firm Andreessen Horowitz. He believes that the increased computing power of intelligent Internet of Things devices, combined with ever-increasingly accurate machine learning technologies, will largely replace the infrastructure as a service public cloud market.+MORE AT NETWORK WORLD: 10 IaaS trends to watch in 2017 | 5 Enterprise Tech Trends that will shake things up in 2017 +To read this article in full or to leave a comment, please click here

Encrypted messaging app Signal uses Google to bypass censorship

Developers of the popular Signal secure messaging app have started to use Google's domain as a front to hide traffic to their service and to sidestep blocking attempts.Bypassing online censorship in countries where internet access is controlled by the government can be very hard for users. It typically requires the use of virtual private networking (VPN) services or complex solutions like Tor, which can be banned too.Open Whisper Systems, the company that develops Signal -- a free, open-source app -- faced this problem recently when access to its service started being censored in Egypt and the United Arab Emirates. Some users reported that VPNs, Apple's FaceTime and other voice-over-IP apps were also being blocked.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why monitoring needs to be reinvented

Why do we monitor things (user experience, transactions, applications, virtual servers, physical servers, datastores, etc.)? Because we want them to work well all of the time.Does everything in your environment work well as you expect it to all of the time?Well, of course not. What if we reinvent monitoring so that we can help make that happen?Consider the following analogy: An airplane can fly itself from its origination to its destination and land itself without human intervention. If we flew commercial airliners the way we run enterprise IT, planes would be dropping out of the sky left and right—and only be 30 percent full (maybe this would be a good thing).To read this article in full or to leave a comment, please click here