Archive

Category Archives for "Networking"

IBM, LEGO offer Macs as recruiting tool

In a job-seeker’s market, employers will do everything they can to attract and retain skilled talent. For some companies, that extends to the technology they offer to employees.At IBM, employees can now choose Apple devices, thanks to an initiative launched in June of 2015. In the first few months of the user-choice program, IBM deployed 30,000 Macs to its workforce. Today, IBM has 90,000 Macs deployed and is on pace to exceed 100,000 by year end.The Mac@IBM program is part of a larger effort to transform company culture, according to Fletcher Previn, vice president of Workplace as a Service at IBM.To read this article in full or to leave a comment, please click here

snaproute Go BGP Code Dive (13): Finding the tail of the update chain

Just in time for Hallo’ween, the lucky thirteenth post in the BGP code dive series. In this series, we’re working through the Snaproute Go implementation of BGP just to see how a production, open source BGP implementation really works. Along the way, we’re learning something about how larger, more complex projects are structured, and also something about the Go programming language. The entire series can be found on the series page.

In the last post in this series, we left off with our newly established peer just sitting there sending and receiving keepalives. But BGP peers are not designed just to exchange random traffic, they’re actually designed to exchange reachability and topology information about the network. BGP carries routing information in updated, which are actually complicated containers for a lot of different kinds of reachability information. In BGP, a reachable destination is called an NLRI, or Network Layer Reachability Information. Starting with this code dive, we’re going to look at how the snaproute BGP implementation processes updates, sorting out NLRIs, etc.

When you’re reading through code, whether looking for a better understanding of an implementation, a better understanding of a protocol, or even to figure out “what went wrong” on Continue reading

Messaging and collaboration tools are most valuable enterprise apps

Messaging and collaboration applications are the most mission-critical mobile apps in enterprise today, according to a new survey of executives commissioned by Adobe. More than half of the professionals surveyed (57 percent) said mobile apps for messaging and collaboration are critical to their organizations' success, and a similar number of respondents (59 percent) said such apps will continue to be critical in 2019. The survey, which was conducted by Edelman Intelligence, included responses from 1,500 executives in HR, sales and marketing from companies with more than 1,000 employees located in the United States, India, China, the United Kingdom and Germany. To read this article in full or to leave a comment, please click here

Internet of Things poised to transform cities

The internet of things (IoT) is set to transform municipal life, according to government officials surveyed by the nonprofit trade association Computing Industry Trade Association (CompTIA)."Cities and city leaders are thinking more holistically about different uses of technology that are integrated and bringing different aspects of the city together into a unified whole," says Tim Herbert, senior vice president, research and market intelligence, CompTIA."Improved decision-making made possible through new or better streams of data ranks as the highest perceived benefit," he adds.How to build a smarter city In June and July of this year, CompTIA surveyed 172 government personnel with some degree of technology decision-making responsibility for its Building Smarter Cities report. It found that one-half of local, state and federal government personnel believe IoT and the smart cities enabled by IoT will definitely provide value. A further 39 percent felt IoT and smart cities would probably provide value.To read this article in full or to leave a comment, please click here

How to maximize the value of your software IP

Last month, BlackBerry announced that it was quitting the phone-making business, but the BlackBerry name will live on. That's because the company has entered into a licensing agreement with an Indonesian company that will manufacture, distribute and promote BlackBerry-branded devices running BlackBerry software.To read this article in full or to leave a comment, please click here(Insider Story)

Apple design chief Jony Ive rules out touchscreen Macs

PC makers have fully embraced touchscreen laptops and desktops, but don’t expect Apple to head down that road.Last week, the company introduced two MacBook Pros that feature slim OLED displays to replace the keyboard’s function keys. Apple launched its latest products just one day after Microsoft unveiled its massive Surface Studio desktop designed for creative professionals, a demographic once solidly in Apple territory. Why didn’t Apple go fully touchscreen with its new MacBooks? Is the Touch Bar an interim step, a sign that Apple is unsure of its footing?To read this article in full or to leave a comment, please click here

Microsoft introduces mobile scheduling app for Outlook

Stating it wants Outlook for mobile to be more than just checking messages while waiting in line for coffee, Microsoft today announced a new scheduling experience for Outlook for iOS that's similar to the Outlook feature on the desktop. The scheduling assistant for Outlook for iOS is similar to the desktop version of the app, which lets you see your co-workers' schedules, so you can schedule an event at a time that works for everyone.First, you create an event in your calendar, then add co-workers to the “People” field. Times that work for everyone show in white, yellow indicates availability for one or more people in the group, and red indicates times with no availability. To read this article in full or to leave a comment, please click here

How AWS has turned into Amazon’s crutch

When Amazon announced its earnings last week, Wall Street was disappointed, with the company’s stock tumbling 5%. But if Amazon didn’t have its cloud business, Wall Street may have been even more bearish. By non-Wall Street standards, the online ecommerce giant had a nice quarter: Revenues of $32. 7 billion were up 29% from the same quarter last year and the company turned a $575 billion profit. The revenues and earnings were less than consensus estimates and Amazon gave vague guidance on future performance heading into the always-busy holiday shopping season. Amazon AWS continued its healthy growth across sales, operating income and Trailing Twelve Month (TTM) Net Sales  To read this article in full or to leave a comment, please click here

IDG Contributor Network: The real unified communications

A few weeks back, I wrote a post contending that, as traditionally defined, the term unified communications has no meaning. Since then, I have had many interesting conversations with people who have varying opinions on the subject. This post is to pass along some of what I have learned.Un-unified In alignment with my contention, most of the conversations on the subject have confirmed that when someone in a work situation needs to communicate with someone who is not within earshot, they typically use tools that are very, well, un-unified. If we need to talk to someone, we call. We still email as much as any other modality. Second to that, we text and increasingly group message. If we need to share or collaborate on information that is in a document, we webchat. Begrudgingly, we occasionally video chat. A few people do use a single tool for these functions, but more often we choose between a set of tools—applications that are specialized to the task at hand.To read this article in full or to leave a comment, please click here

Adapting the network for the rise of containers

They say necessity is the mother of invention. That statement has been true in networking for decades now, as many of the innovations in the network have been driven by changes in compute.For example, Ethernet became the de facto standard to consolidate all of the various LAN protocols that once existed. Another example is the virtual switch. That was invented to solve the hair pinning problem associated with moving traffic between two virtual machines on the same host.+ Also on Network World: Which is cheaper: Containers or virtual machines? + There’s another major compute shift going on that will drive the need for network evolution, and that’s the rise of containers. If you’re not familiar with containers, think of them as a lightweight runtime environment that includes an application and all of its dependencies, including configuration files, binaries and libraries. Containers are similar to virtual machines except they share a single operating system and kernel, so it’s much lighter weight. A VM can be a few to tens of gigabytes in size,where a container is likely to be just a few megabytes.To read this article in full or to leave a comment, please click here

Shadow Brokers leak list of NSA targets and compromised servers

The Shadow Brokers are back, releasing message 5 - trick or treat. This time, instead of releasing Equation Group exploit tools, the group dumped a list of servers allegedly compromised by the NSA-linked Equation Group.As usual, the Shadow Brokers included a slaughtered-English rambling message which primarily focused on the upcoming elections. One portion reads: TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016.To read this article in full or to leave a comment, please click here

Shadow Brokers leaks list of NSA targets and compromised servers

The Shadow Brokers hacker group is back, releasing message 5 - trick or treat. This time, instead of releasing Equation Group exploit tools, the group dumped a list of servers allegedly compromised by the NSA-linked Equation Group.As usual, the Shadow Brokers included a slaughtered-English rambling message that primarily focused on the upcoming elections. One portion reads: TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016.To read this article in full or to leave a comment, please click here

Shadow Brokers leaks list of NSA targets and compromised servers

The Shadow Brokers hacker group is back, releasing message 5 - trick or treat. This time, instead of releasing Equation Group exploit tools, the group dumped a list of servers allegedly compromised by the NSA-linked Equation Group.As usual, the Shadow Brokers included a slaughtered-English rambling message that primarily focused on the upcoming elections. One portion reads: TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016.To read this article in full or to leave a comment, please click here

Trend Micro’s Enterprise Play

I spent a few days with Trend Micro last week at its Insight event here in Boston.  While Trend is a $1 billion + global cybersecurity vendor, too many cybersecurity professionals still think of Trend as an Asian-based AV player.   This perception is completely antiquated however, as Trend now offers: A tightly-integrated next-generation endpoint security suite.  There’s a lot of industry rhetoric out there proclaiming Trend as a legacy AV vendor.  Don’t believe it!  Yes, Trend Micro’s endpoint security product has been around forever but the company has continuously enhanced it technology to keep up with the latest requirements.  Most recently, Trend added machine learning for pre- and post-execution prevention/detection of 0-day malware which puts in on par with the next-generation endpoint security crowd.  Oh, and Trend also offers its own EDR functionality as well.  Armed with its new product, Trend’s layered endpoint defense should meet the security efficacy and operational efficiency requirements of even the most demanding enterprises. A strong network security defense portfolio.  Now that the dust has settled from Trend’s acquisition of TippingPoint a year ago, the company also has robust products for network security.  After HP let Continue reading