Archive

Category Archives for "Networking"

IBM releases GA of OpenWhisk – its serverless computing platform

IBM today made its serverless computing platform named OpenWhisk – which is also an open source project – generally available in the company’s BlueMix cloud.Serverless computing is one of the most discussed emerging technologies in the IaaS public cloud market, so IBM making its flagship serverless product generally available marks a milestone for the technology.+MORE AT NETWORK WORLD: Serverless use case: How this company runs its app without provisioning any servers or virtual machines +To read this article in full or to leave a comment, please click here

Knowing the manager you really are

Nearly everyone thinks his or her performance is above average. You don’t have to be a statistician to know that nearly half of them must be wrong.Managers are no different when it comes to this distorted self-perception. The problem is that managers’ misconceptions prevent them from learning and becoming better at their jobs. Worse than that, their deficiencies impose burdens on so many others: subordinates, peers, supervisors and outside stakeholders. If you’re a manager, it’s worth investing some energy to make sure that you have an accurate picture of your strengths and weaknesses.Don’t worry about the psychological processes that can lead to such misperceptions. Although the debates about that are interesting, what is important is to know that it is overwhelmingly likely that you have unreliable beliefs about the quality of your management. I’m not saying that you are a terrible manager and don’t know it. In fact, you might be better than you perceive yourself to be. Either way, having an unrealistic self-assessment is not a weakness; it’s just part of being human.To read this article in full or to leave a comment, please click here

Microsoft rushes out Windows 10 patch to fix broken Internet connections

An odd thing happened this morning. My Windows 10 PC notified me I had another system update ready and waiting for a reboot—the second update in less than a week! Turns out, this latest update fixes a big mistake that may (or may not) have rolled out earlier this month.Several Windows 10 users recently reported difficulty connecting to the Internet, with the presumed culprit being the December 9 update KB3201845.INSIDER Review: Enterprise guide to Windows 10 That may not be the case, however. Woody Leonhard, our colleague over at InfoWorld, says the connection issue pre-dates KB32018045 by several days. Microsoft has posted a banner warning across its entire support site that Windows 10 users with connection issues should first try and restart their PCs—a shut down and later cold boot won’t do.To read this article in full or to leave a comment, please click here

Docker open-sources key tools for running containers

Docker is releasing Containerd (pronounced container-dee), a set of basic components designed to run containers, as part of an open source project.Containerd includes supervisor and executor components that work together to function as the core container runtime that underpins the company's Docker Engine software. It's designed to allow companies to build their own software for managing containers while using a consistent foundation.As the name implies, containers provide applications with a lightweight, constrained environment that makes them easy to migrate, scale up and scale down across different hardware. They've had increasing use over the past year, in part because they make it easier for developers to have a consistent environment for their software.To read this article in full or to leave a comment, please click here

10 examples of the AWS path of disruption

How AWS has disrupted companies and sectorsImage by ThinkstockWhen Amazon.com launched Amazon Web Services a decade ago no one could have imagined that the business, viewed largely as a sideshow geared to serve the ecommerce company’s e-tailing interests, would become a significant player in corporate computing. But as CIO.com noted last week, AWS’ public cloud software, now a $13 billion business, has become a serious contender in the enterprise.To read this article in full or to leave a comment, please click here

10 examples of the AWS path of disruption

How AWS has disrupted companies and sectorsImage by ThinkstockWhen Amazon.com launched Amazon Web Services a decade ago no one could have imagined that the business, viewed largely as a sideshow geared to serve the ecommerce company’s e-tailing interests, would become a significant player in corporate computing. But as CIO.com noted last week, AWS’ public cloud software, now a $13 billion business, has become a serious contender in the enterprise.To read this article in full or to leave a comment, please click here

Ashley Madison to pay $1.6M settlement related to data breach

The company behind Ashley Madison, the adultery enabling website, has agreed to pay a US$1.6 million settlement related to a major data breach last year that exposed account details of 36 million users.Ashley Madison's operator, Toronto-based Ruby, is making the settlement for failing to protect the account information and for creating fake user profiles to lure in prospective customers, the U.S. Federal Trade Commission said on Wednesday.In July 2015, a hacking group called Impact Team managed to steal the account details and then post them online a month later -- potentially damaging the reputation of the customers using the adultery website.To read this article in full or to leave a comment, please click here

Ashley Madison to pay $1.6M settlement related to data breach

The company behind Ashley Madison, the adultery enabling website, has agreed to pay a US$1.6 million settlement related to a major data breach last year that exposed account details of 36 million users.Ashley Madison's operator, Toronto-based Ruby, is making the settlement for failing to protect the account information and for creating fake user profiles to lure in prospective customers, the U.S. Federal Trade Commission said on Wednesday.In July 2015, a hacking group called Impact Team managed to steal the account details and then post them online a month later -- potentially damaging the reputation of the customers using the adultery website.To read this article in full or to leave a comment, please click here

NASA embraces IBM’s Watson for future space, aerospace technology development

IBM and NASA have had one of the longest, most successful relationships in the high-tech world and it looks like the future holds much the same.While the relationship has its roots in the very beginnings of the space program as well as large-scale computing, its current incarnation in many cases revolves around the cognitive computing specialties found in IBM’s Watson system.+More on Network World: NASA: Top 10 space junk missions+Watson uses machine learning and natural language and image recognition to develop all manner of intelligent answers to tough challenges. The system has been successfully deployed in the healthcare industry where the system has become a trusted adviser to hospitals and research centers working for people fighting cancer. The CBS news program “60 Minutes” recently devoted a large segment on Watson and the success it has had in this battle (See more here).To read this article in full or to leave a comment, please click here

NASA embraces IBM’s Watson for future space, aerospace technology development

IBM and NASA have had one of the longest, most successful relationships in the high-tech world and it looks like the future holds much the same.While the relationship has its roots in the very beginnings of the space program as well as large-scale computing, its current incarnation in many cases revolves around the cognitive computing specialties found in IBM’s Watson system. The forthcoming movie Hidden Figures in fact shows some of the earliest IBM and NASA computing interactions. Hidden Figures follows a group of African-American female mathematicians who calculated flight trajectories on IBM computers for John Glenn's first orbital flight in 1962.To read this article in full or to leave a comment, please click here

Analysis of CryptFile2 Ransomware Server

Download ASERT Threat Intelligence Report 2016-06 here This report describes several elements of a ransomware staging system using the Nemucod malware to deliver CryptFile2 (aka Hydracrypt.A and Win32/Filecoder.HydraCrypt.C) ransomware, an ongoing threat since at least mid-March of 2016. This report reveals TTP’s (tactics, techniques, procedures) of […]

Analysis of CryptFile2 Ransomware Server

Download ASERT Threat Intelligence Report 2016-06 here This report describes several elements of a ransomware staging system using the Nemucod malware to deliver CryptFile2 (aka Hydracrypt.A and Win32/Filecoder.HydraCrypt.C) ransomware, an ongoing threat since at least mid-March of 2016. This report reveals TTP’s (tactics, techniques, procedures) of threat actors, including insight derived from limited interactions via e-mail. […]

IDG Contributor Network: Stanford researchers attempt vodka-based Internet messaging

Sending Internet of Things, or IoT messages using liquids, such as vodka or glass cleaner, could replace light as the next go-to network carrier for the Internet.Pulses of liquid chemicals, replicating the ones-and-zeros of traditional electron-based data streams are better than copper wires, wireless or fiber because they’re cheaper, and aren’t susceptible to the same kind of interference, claim the inventors from Stanford University. Wireless signals, for example, can run into problems among large masses of metals.Vodka was the liquid of choice for the first of the pH-based messaging tests run by the school, but amusingly failed due to the receiving computer getting “too saturated with vodka to receive more messages,” according to fellow Nariman Farsad, who has been working on the concept.To read this article in full or to leave a comment, please click here

Is The Rise Of SD-WAN Thanks To Ethernet?

Ethernet

SD-WAN has exploded in the market. Everywhere I turn, I see companies touting their new strategy for reducing WAN complexity, encrypting data in flight, and even doing analytics on traffic to help build QoS policies and traffic shaping for critical links. The first demo I ever watched for SDN was a WAN routing demo that chose best paths based on cost and time-of-day. It was simple then, but that kind of thinking has exploded in the last 5 years. And it’s all thanks to our lovable old friend, Ethernet.

Those Old Serials

When I started in networking, my knowledge was pretty limited to switches and other layer 2 devices. I plugged in the cables, and the things all worked. As I expanded up the OSI model, I started understanding how routers worked. I knew about moving packets between different layer 3 areas and how they controlled broadcast storms. This was also around the time when layer 3 switching was becoming a big thing in the campus. How was I supposed to figure out the difference between when I should be using a big router with 2-3 interfaces versus a switch that had lots of interfaces and could route just as Continue reading