Archive

Category Archives for "Networking"

Deep dive: The Apple Watch Series 2 delivers on last year’s promise

When Apple jumped into the wearables market last year with the first Apple Watch, it delivered a device that offered a lot of promise, while at the same confusing and confounding many early adopters.App loading times were sluggish; the UI was wholly unfamiliar to longtime Apple buyers; connectivity was sometimes an issue; and fitness tracking didn't always work as it should. That didn't stop millions of buyers from plunging ahead, making the Apple Watch a modest success in a crowded wearables market.To read this article in full or to leave a comment, please click here

DNS OARC 25

DNS OARC is the place to share research, experiences and data primarily concerned with the operation of the DNS in the Internet. Here are some highlights for me from the most recent meeting, held in October 2016 in Dallas.

IDG Contributor Network: 7 steps to proactive security

Data breaches are increasingly becoming an expensive problem for more and more companies. According to the most recent Ponemon Institute Data Breach report, insecure data cost companies an average of $221 per compromised record in 2016, an increase of 7 percent from the previous year and an all-time high.+ Also on Network World: A breach alone means liability + The key to securing against this threat lies in a common metaphor—if a ship has a hole, it is better to patch the breach than bail the water. Effective cybersecurity means being proactive, getting ahead of the problem and addressing the issue at its core rather than operating in a reactive fashion, constantly fixing the symptoms.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 7 steps to proactive security

Data breaches are increasingly becoming an expensive problem for more and more companies. According to the most recent Ponemon Institute Data Breach report, insecure data cost companies an average of $221 per compromised record in 2016, an increase of 7 percent from the previous year and an all-time high.+ Also on Network World: A breach alone means liability + The key to securing against this threat lies in a common metaphor—if a ship has a hole, it is better to patch the breach than bail the water. Effective cybersecurity means being proactive, getting ahead of the problem and addressing the issue at its core rather than operating in a reactive fashion, constantly fixing the symptoms.To read this article in full or to leave a comment, please click here

Microsoft Surface isn’t the culprit in Patriots coach’s blowup

When the New England Patriots' normally taciturn head coach Bill Belichick goes on a five-minute tirade, you know it must be a bad situation. But that's what happened during a press conference with Belichick last week's drubbing of the Cincinnati Bengals.Belichick went off on the Microsoft Surface tablets as being unreliable, and that came weeks after he was seen throwing one on the ground in frustration.To read this article in full or to leave a comment, please click here

Intel asserts its trademark rights against John McAfee

Intel does not object to John McAfee using his personal name in connection with his business, but it objects to the use by the maverick entrepreneur and security expert of the McAfee trade name and trademark in a way that could confuse or deceive consumers or dilute the brand.The issue came up when John McAfee teamed with MGT Capital Investments, which had been until recently mainly into gaming sites, and announced in May that it is in the process of acquiring a diverse portfolio of cybersecurity technologies. MGT also announced that it intended to change its corporate name to “John McAfee Global Technologies, Inc.” with John McAfee at the helm of the new company.To read this article in full or to leave a comment, please click here

Intel asserts its trademark rights against John McAfee

Intel does not object to John McAfee using his personal name in connection with his business, but it objects to the use by the maverick entrepreneur and security expert of the McAfee trade name and trademark in a way that could confuse or deceive consumers or dilute the brand.The issue came up when John McAfee teamed with MGT Capital Investments, which had been until recently mainly into gaming sites, and announced in May that it is in the process of acquiring a diverse portfolio of cybersecurity technologies. MGT also announced that it intended to change its corporate name to “John McAfee Global Technologies, Inc.” with John McAfee at the helm of the new company.To read this article in full or to leave a comment, please click here

Tech execs tackling childhood cancer

It's been a few years since I've connected with network industry veteran Chris Lynch (See "Ex-Vertica CEO pledges to build high-speed railway for Big Data"), but when we did last talk he mainly had Big Data on his mind. Since then, he's started an early stage venture capital firm called Accomplice that indeed has invested in that field. And to book, his Twitter handle is @LynchBigData.To read this article in full or to leave a comment, please click here

Ex-NSA contractor hoarded two decades’ worth of secrets

The former National Security Agency contractor suspected of stealing U.S. hacking tools allegedly was found hoarding two decades' worth of classified materials.In a Thursday court filing, federal investigators provided new details on their case against 51-year-old Harold Martin, who was arrested in late August. Investigators have seized 50 terabytes of information from Martin, in addition to thousands of pages of documents, the filing said. Among them are classified operational plans against a known enemy of the U.S that Martin had no need to know about.On Wednesday, The New York Times also reported that Martin was found in possession of NSA hacking tools that have recently been put up for sale online. An anonymous group of hackers calling themselves the Shadow Brokers have been trying to sell the tools since mid-August, but it's unclear how they obtained them.To read this article in full or to leave a comment, please click here

Ex-NSA contractor hoarded two decades’ worth of secrets

The former National Security Agency contractor suspected of stealing U.S. hacking tools allegedly was found hoarding two decades' worth of classified materials.In a Thursday court filing, federal investigators provided new details on their case against 51-year-old Harold Martin, who was arrested in late August. Investigators have seized 50 terabytes of information from Martin, in addition to thousands of pages of documents, the filing said. Among them are classified operational plans against a known enemy of the U.S that Martin had no need to know about.On Wednesday, The New York Times also reported that Martin was found in possession of NSA hacking tools that have recently been put up for sale online. An anonymous group of hackers calling themselves the Shadow Brokers have been trying to sell the tools since mid-August, but it's unclear how they obtained them.To read this article in full or to leave a comment, please click here

32% off Asus 15.6-Inch Laptop, 2.1GHz Core i3, 4GB RAM, 500GB Hard Drive, Windows 10 – Deal Alert

Housing multiple USB 3.0 ports for fast data transfer and the latest 802.11ac wireless for fast Internet connectivity, Asus promises it'll be fast and easy to get things done with their F555 laptop. It comes loaded up with Windows 10, Intel's 5th generation Core i3 processor, a 15.6-Inch Full HD (1920*1080) display, 4GB RAM, a 500GB hard drive, an HD camera, and much more. It averages 4 out of 5 stars on Amazon from over 1,600 people, and its typical list price of $499.99 has been reduced a generous 32% to $339.99. See the discounted Asus F555LA-AB31 laptop on Amazon.To read this article in full or to leave a comment, please click here

How switching to Macs is paying off for IBM

Last year, IBM made a bold decision. The company let its employees choose between a Windows PC or a Mac for their own work machines. IBM staffers prefer Macs, so the company bought up 30,000 of them. This year, IBM has 90,000 Macs in use. But Macs are expensive, as we all know, so IBM must be spending a fortune on making the switch…right? Apparently not.IBM said Wednesday at the Jamf Nation User Conference that it’s actually saving money on each Mac: $273 to $543 per Mac over four years, compared to a Windows PC over the same time period. And no, that’s not because Microsoft is charging more. Fletcher Previn, IBM’s vice president of workplace as a service (yeah, that’s a real title), said Microsoft is giving IBM its best pricing ever. But Macs are still cheaper over their lifetime, and using them results in fewer service calls.To read this article in full or to leave a comment, please click here

Gartner: By 2020, you’ll say more to a machine than to your spouse

ORLANDO, Fla. -- The message at Gartner's Symposium/ITxpo is to prepare for a fast move to augmented reality, the decline of mobile apps, and a major shift away from web browsing to voice interaction.Many users will expect businesses, universities and governments to respond to these shifts, the market research firm said at its annual conference.Here's what Gartner sees arriving soon:1. By 2020, 100 million consumers will shop in augmented reality environments.A.R. will be "overlaying data on top of environments," said Gartner analyst Daryl Plummer. For instance, when you walk into a grocery store, "all the data about the different items will be floating in the air in front of those items," he said. The bulky and boxy glasses that customers need to see the augmented reality at the store will get more fashionable and will be easier to wear. A.R. also will be used in online shopping.To read this article in full or to leave a comment, please click here

Celebrating 12 years of Ubuntu

Happy birthdayImage by Thinkstock/UbuntuFounder Mark Shuttleworth announced the first public release of Ubuntu – version 4.10, or “Warty Warthog” – on Oct. 20, 2004. The idea behind what would become the most recognizable and widely used Linux distributions ever was simple – create a Linux operating system that anybody could use. Here’s a look back at Ubuntu’s history.To read this article in full or to leave a comment, please click here