Archive

Category Archives for "Networking"

Facebook’s 100-gigabit switch design is out in the open

Facebook’s bid to open up networking is moving up into nosebleed territory for data centers. The company’s 100-gigabit switch design has been accepted by the Open Compute Project, a step that should help to foster an open ecosystem of hardware and software on high-speed networking gear.The 32-port Wedge 100 is the follow-on to Facebook’s Wedge 40, introduced about two years ago and now in use in practically all of the company’s data centers, said Omar Baldonado, director of software engineering on Facebook’s networking team. Mostly, it’s a faster version of that switch, upping the port speed to 100Gbps (bits per second) from 40Gbps. But Facebook also added some features to make service easier, like a cover that can be removed without tools and LED status lights to check the condition of a the cooling fans from a distance.To read this article in full or to leave a comment, please click here

Facebook’s 100-gigabit switch design is out in the open

Facebook’s bid to open up networking is moving up into nosebleed territory for data centers. The company’s 100-gigabit switch design has been accepted by the Open Compute Project, a step that should help to foster an open ecosystem of hardware and software on high-speed networking gear.The 32-port Wedge 100 is the follow-on to Facebook’s Wedge 40, introduced about two years ago and now in use in practically all of the company’s data centers, said Omar Baldonado, director of software engineering on Facebook’s networking team. Mostly, it’s a faster version of that switch, upping the port speed to 100Gbps (bits per second) from 40Gbps. But Facebook also added some features to make service easier, like a cover that can be removed without tools and LED status lights to check the condition of a the cooling fans from a distance.To read this article in full or to leave a comment, please click here

Gartner Top 10 technology trends you should know for 2017

Considering how much significance Gartner is placing the future influence of artificial intelligence and algorithms, it comes as little surprise that the group is saying that technology will be one of the most strategic and potentially disruptive for 2017. At its Gartner Symposium/ITxpo, David Cearley, vice president and Gartner Fellow detailed the key technology trends for 2017 as the group sees them including how data science technologies are evolving to include advanced machine learning and artificial intelligence is helping create intelligent physical and software-based systems that are programmed to learn and adapt. Other key trends include the impact of melding of the physical and digital environments and how digital technology platforms are influencing the enterprise.To read this article in full or to leave a comment, please click here

Gartner Top 10 technology trends you should know for 2017

Considering how much significance Gartner is placing the future influence of artificial intelligence and algorithms, it comes as little surprise that the group is saying that technology will be one of the most strategic and potentially disruptive for 2017. At its Gartner Symposium/ITxpo, David Cearley, vice president and Gartner Fellow detailed the key technology trends for 2017 as the group sees them including how data science technologies are evolving to include advanced machine learning and artificial intelligence is helping create intelligent physical and software-based systems that are programmed to learn and adapt. Other key trends include the impact of melding of the physical and digital environments and how digital technology platforms are influencing the enterprise.To read this article in full or to leave a comment, please click here

Gartner Top 10 technology trends you should know for 2017

Considering how much significance Gartner is placing the future influence of artificial intelligence and algorithms, it comes as little surprise that the group is saying that technology will be one of the most strategic and potentially disruptive for 2017. At its Gartner Symposium/ITxpo, David Cearley, vice president and Gartner Fellow detailed the key technology trends for 2017 as the group sees them including how data science technologies are evolving to include advanced machine learning and artificial intelligence is helping create intelligent physical and software-based systems that are programmed to learn and adapt. Other key trends include the impact of melding of the physical and digital environments and how digital technology platforms are influencing the enterprise.To read this article in full or to leave a comment, please click here

31% off Roost Smart 9V Battery for Smoke and Carbon Monoxide Alarms, 2-Pack – Deal Alert

The Roost Smart Battery mimics the form of a 9V battery, installs in minutes, and lasts for more than 5 years. Using your home's WiFi, Roost will communicate when it's running low on power, so you can take action to avoid those dreaded middle-of-the-night interruptions. The Roost Smart Battery is designed to be used with your smoke or carbon monoxide detectors/alarms, so if you're following the US Fire Administrations's advice to change your batteries every time you change your clocks, this would be a very timely deal. A 2-pack of Roost Smart Batteries is currently discounted 31% on Amazon, from $65 down to $45, so the more you buy right now, the more you'll save. See the discounted Roost Smart Battery now on Amazon.To read this article in full or to leave a comment, please click here

Hackers create more IoT botnets with Mirai source code

Malware that can build botnets out of IoT products has gone on to infect twice as many devices after its source code was publicly released.The total number of IoT devices infected with the Mirai malware has reached 493,000, up from 213,000 bots before the source code was disclosed around Oct. 1, according to internet backbone provider Level 3 Communications."The true number of actual bots may be higher," Level 3 said in a Tuesday blog post.Hackers have been taking advantage of the Mirai malware's source code, following its role in launching a massive DDOS (distributed denial-of-service) attack that took down the website of cybersecurity reporter Brian Krebs.To read this article in full or to leave a comment, please click here

Hackers create more IoT botnets with Mirai source code

Malware that can build botnets out of IoT products has gone on to infect twice as many devices after its source code was publicly released.The total number of IoT devices infected with the Mirai malware has reached 493,000, up from 213,000 bots before the source code was disclosed around Oct. 1, according to internet backbone provider Level 3 Communications."The true number of actual bots may be higher," Level 3 said in a Tuesday blog post.Hackers have been taking advantage of the Mirai malware's source code, following its role in launching a massive DDOS (distributed denial-of-service) attack that took down the website of cybersecurity reporter Brian Krebs.To read this article in full or to leave a comment, please click here

Om nom Nomulus: Google open-sources TLD registry platform

Google’s latest foray into open-source software is a cloud-based top-level-domain registrar platform called Nomulus, bringing a substantial chunk of the company’s gigantic internet infrastructure into the public eye.What Nomulus does, in essence, is manage the domain names under a top-level domain, or TLD, the largest divisions of the internet’s domain name system (.com, .org, .net, and so on). Nomulus tracks DNS and registry info, so that when domain names change hands, or someone makes a WHOIS inquiry, the system can manage this.ALSO ON NETWORK WORLD: A dozen extensions to TCP/IP that optimize internet connections | Microsoft’s Nadella takes on privacy fears about LinkedIn, CortanaTo read this article in full or to leave a comment, please click here

Microsoft’s Nadella takes on privacy fears about LinkedIn, Cortana

ORLANDO, Fla. -- Microsoft CEO Satya Nadella faced sharp questions from Gartner analysts Tuesday about the privacy-invading implications of its $26.2 billion acquisition of LinkedIn, and its all-knowing virtual assistant, Cortana.Helen Huntley, one of the Gartner analysts questioning Nadella at a conference here, was particularly pointed about the fears.Cortana, said Huntley, "knows everything about me when I'm working. She knows what files I'm looking at, she knows what I'm downloading, she knows when I'm working, when I'm not working," she said.To read this article in full or to leave a comment, please click here

Patriots coach ‘done with’ Microsoft Surface

In a five-minute rant from a man famous for five-word answers, New England Patriots head coach Bill Belichick this morning tore apart and then swore off using the Microsoft Surface tablets that are provided to teams by the National Football League.“As you probably noticed, I’m done with the tablets,” Belichick told reporters. “They’re just too undependable for me. I’m going to stick with (paper) pictures, which several of our other coaches do, as well, because there just isn’t enough consistency in the performance of the tablets. I just can’t take it anymore. …”It was only two weeks ago that Belichick threw one of the tablets in frustration on the sideline during a loss to the Buffalo Bills.To read this article in full or to leave a comment, please click here

CloudVelox eases migration of core business apps to the cloud

It’s easy to get all “cloud first” when you’re talking about new, greenfield applications. But how do you get the core business applications running in your data center – so-called brownfield apps – easily and efficiently migrated to the cloud? That’s the problem startup CloudVelox set out to solve, with the larger mission of helping CIOs build “boundaryless” hybrid data centers. IDG Chief Content Officer John Gallant spoke with CloudVelox CEO Raj Dhingra about how the company has automated the migration of complex, traditional applications to Amazon Web Services (and Microsoft Azure in the near future). Dhingra explained how companies are using CloudVelox’s One Hybrid Cloud platform to not only migrate apps, but to build cloud-based disaster recovery capabilities and simplify a variety of test/dev chores.To read this article in full or to leave a comment, please click here(Insider Story)

CloudVelox eases migration of core business apps to the cloud

It’s easy to get all “cloud first” when you’re talking about new, greenfield applications. But how do you get the core business applications running in your data center – so-called brownfield apps – easily and efficiently migrated to the cloud? That’s the problem startup CloudVelox set out to solve, with the larger mission of helping CIOs build “boundaryless” hybrid data centers. IDG Chief Content Officer John Gallant spoke with CloudVelox CEO Raj Dhingra about how the company has automated the migration of complex, traditional applications to Amazon Web Services (and Microsoft Azure in the near future). Dhingra explained how companies are using CloudVelox’s One Hybrid Cloud platform to not only migrate apps, but to build cloud-based disaster recovery capabilities and simplify a variety of test/dev chores.To read this article in full or to leave a comment, please click here(Insider Story)

Hackers hide stolen payment card data inside website product images

Attacks that compromise online shops to skim payment card details are increasing and growing in sophistication. The latest technique involves hiding malicious code and stolen data inside legitimate files.A Dutch researcher reported last week that almost 6,000 online shops, most of them built with the Magento content management system, have malicious code that intercepts and steals payment card data during online transactions. The online storefront of the U.S. National Republican Senatorial Committee (NRSC) was among those websites until earlier this month.To read this article in full or to leave a comment, please click here

Hackers hide stolen payment card data inside website product images

Attacks that compromise online shops to skim payment card details are increasing and growing in sophistication. The latest technique involves hiding malicious code and stolen data inside legitimate files.A Dutch researcher reported last week that almost 6,000 online shops, most of them built with the Magento content management system, have malicious code that intercepts and steals payment card data during online transactions. The online storefront of the U.S. National Republican Senatorial Committee (NRSC) was among those websites until earlier this month.To read this article in full or to leave a comment, please click here

WikiLeaks blames US for cutting Assange’s internet connection

WikiLeaks is accusing U.S. Secretary of State John Kerry of trying to stop the site from publishing stolen emails from Hillary Clinton's presidential campaign. Citing "multiple U.S. sources,"  the site tweeted on Tuesday that Kerry had asked the Ecuadorian government to prevent WikiLeaks' founder Julian Assange from releasing more documents.   Assange is currently residing in the Ecuadorian embassy in London, where he has been helping to run the WikiLeaks site. But on Saturday, the Ecuadorian government shut down his internet connection. WikiLeaks claimed that Kerry had private negotiations with Ecuador last month. However, the U.S. Department of State is denying any involvement with cutting Assange's internet connection.To read this article in full or to leave a comment, please click here

WikiLeaks blames US for cutting Assange’s internet connection

WikiLeaks is accusing U.S. Secretary of State John Kerry of trying to stop the site from publishing stolen emails from Hillary Clinton's presidential campaign. Citing "multiple U.S. sources,"  the site tweeted on Tuesday that Kerry had asked the Ecuadorian government to prevent WikiLeaks' founder Julian Assange from releasing more documents.   Assange is currently residing in the Ecuadorian embassy in London, where he has been helping to run the WikiLeaks site. But on Saturday, the Ecuadorian government shut down his internet connection. WikiLeaks claimed that Kerry had private negotiations with Ecuador last month. However, the U.S. Department of State is denying any involvement with cutting Assange's internet connection.To read this article in full or to leave a comment, please click here