Archive

Category Archives for "Networking"

16% off ChargeTech 27,000mAh Portable Battery Pack with AC Outlet & USB Ports – Deal Alert

Take the power of an AC Outlet with you wherever you go. This battery pack from ChargeTech is the first battery pack not to be limited by USB ports. Compact enough to fit your purse, backpack, or briefcase, it can handle laptops, lights, projectors, and even medical devices up to 85 watts -- almost anything you can think of. The included international adapter allows ChargeTech to work in any country around the globe. Take it on your travels or let your friends from other countries use it while they visit. This product averages 4 out of 5 stars from over 300 people on Amazon (read reviews). Its typical list price has been reduced 16% to $189. See the discounted ChargeTech portable battery pack now on Amazon.To read this article in full or to leave a comment, please click here

Microsoft adds SharePoint support to OneDrive

Quite a lot of news came out of the Microsoft Ignite 2016 conference, most of which we have already covered. But there's more, as Microsoft announced a big upgrade to its OneDrive cloud storage service.Microsoft wants to provide a single sync client for all of its cloud storage services, whether its OneDrive, OneDrive for Business or SharePoint, and it has been for some time. To achieve this, it has added the ability to sync SharePoint Online document libraries with OneDrive folders,and added an "activity center" to the OneDrive sync client to allow you to view synchronization and file activity at a glance.To read this article in full or to leave a comment, please click here

Cloudflare Traffic Manager: The Details

Cloudflare's investment into building a large global network protects our customers from DDoS attacks, secures them with our Web Application Firewall and Universal SSL, as well as improving performance through our CDN and the many network-level optimizations we're constantly iterating on.

Building on these products, we just introduced Cloudflare Traffic. To explain the benefits, we'll dive into the nitty-gritty details of how the monitoring and load-balancing features of Traffic Manager can be configured, and how we use it within our own website to reduce visitor latency, and improve redundancy across continents. We'll do a similar post on Traffic Control soon.

We're also kicking off the Early Access program for Traffic Manager, with details at the end of this post.

The Details

One of our primary goals when building Traffic Manager was to make it available to everyone: from those with just two servers in a single region, to those with 400 scattered across the globe (and everything in between). We also wanted to solve some of the key limitations of existing products: slow failover times (measured in minutes), and a lack of granular decision making when failing over.

  • We can failover within seconds for proxied ("orange clouded") records. Connecting clients Continue reading

White House to data scientists: We need you

It's been nearly two years since President Obama created the U.S. chief data scientist role, and the man currently in the job had an urgent message Thursday for attendees at Strata+Hadoop World: We need you."We are at the first step in making data work for every American," said DJ Patil in a keynote speech at the show. "It's only going to make a difference when people like you step up and show that it's not just feasible but scalable."As chief data scientist in the White House Office of Science and Technology Policy, Patil's mission is to "responsibly unleash the power of data to benefit all Americans," he said, with an emphasis on the word "responsibly" and the focus on inclusion.To read this article in full or to leave a comment, please click here

Microsoft puts AI front and center with research overhaul

Microsoft has announced the formation of its AI and Research Group, which it says will help the company democratize artificial intelligence use across individuals and organizations.The group unites Microsoft Research, which has been its own unit since 1991, with more than 5,000 computer scientists and engineers working on the company’s artificial intelligence products. 20-year Microsoft veteran Harry Shum will lead the group as executive vice president, and the group is hiring.MORE: Microsoft research on why Micro Datacenters really matter to mobile's futureTo read this article in full or to leave a comment, please click here

IDG Contributor Network: Passwords will be wirelessly transmitted through bodies

Low-frequency transmissions created by off-the-shelf biometric devices, such as fingerprint sensors, can be diverted through the body and can securely transmit password-like authentication.The off-the-shelf biometric sensors, such as touchpads, are “re-purposed to send out information,” says Shyam Gollakota, University of Washington assistant professor of computer science and engineering and senior author on the research paper, in a University of Washington article. The secret passphrases and such are confined to the human body, so they can’t be eavesdropped on.To read this article in full or to leave a comment, please click here

How social media is shaping the 2016 presidential election

When the leading candidates for America's next presidency traded barbs this week during the first presidential debate, political operatives and energized voters were hard at work sharing opinions (and insults) on Facebook, Twitter and other social media sites. Much of today's political discourse starts on social media, and the medium often amplifies vitriol and slants information.The 2016 presidential election isn't the first event for which social media has been used as a political tool, but today it carries tremendous weight and influence over the electorate. Hillary Clinton and Donald Trump both use social to their advantages, but it's often the surrogates, supporters and influencers who shape perceptions, according to whatever views serve their preferred candidate's interests.To read this article in full or to leave a comment, please click here

White House to bolster STEM education, close skills gap

On paper, the Obama administration has taken many steps toward advancing education and training in the STEM fields of science, technology, engineering and math -- a critical policy priority for many businesses that say they struggle to hire qualified workers.[ Related: Obama expands STEM education and training efforts ]But White House officials are quick to acknowledge that more work needs to be done, particularly in recruiting girls and minority students into computer science and other technical fields. They are hoping that a newly launched advanced placement course will help attract more interest in computer science by integrating the field with other disciplines and emphasizing real-world applications.To read this article in full or to leave a comment, please click here

IDG Contributor Network: What other Windows 10 updates can we expect this year?

Well, the short answer to this question is nothing. After the impressive and (mostly) stable Anniversary Update in 2016, your Windows 10 system should be sitting at version 1607.To answer the important question of what's next, let's review the different update approaches to Windows 10 that exist out there.The mainstream consumer release of Windows 10 that most of us have updated with the Anniversary Update is called the Current Branch (CB). Understand that the Current Branch for Business (CBB) lags behind the CB by several months. This is an excellent idea, since most businesses want there to be extra time while any issues with the CB are ironed out with bug fixes. That's right—Microsoft experiments a bit with us home users.To read this article in full or to leave a comment, please click here

Control your traffic at the edge with Cloudflare

Today, we're introducing two new Cloudflare Traffic products to give customers control over how Cloudflare’s edge network handles their traffic, allowing them to shape and direct it for their specific needs.

More than 10 trillion requests flow through Cloudflare every month. More than 4 million customers and 10% of internet requests benefit from our global network. Cloudflare's virtual backbone gives every packet improved performance, security, and reliability.

That's the macro picture.

What's more interesting is keeping each individual customer globally available. While every customer benefits from the network effect of Cloudflare, each customer is (appropriately) focused on their application uptime, security and performance.

Traffic Control

Cloudflare’s new Traffic Control allows a customer to rate limit, shape or block traffic based on the number of requests per second per IP, cookie, or authentication token. Traffic can be controlled on a per-URI (with wildcards for greater flexibility) basis giving pinpoint control over a website, application, or API.

Cloudflare Traffic Control

Customers seek reliability and availability in the face of popularity or unexpected traffic such as slow brute force attacks on a WordPress site, Denial of Service against dynamic pages, or the stampede of requests that comes with success. We are the leader at stopping significant Continue reading

IDG Contributor Network: The future of security: A combination of cyber and physical defense

Our increasingly connected world gives hackers even more ways to exploit technology for malicious purposes. We’re now entering a period when cyber attacks could cause major physical damage. To protect people from these combined cyber and physical threats, information security experts and law enforcement, which traditionally handles physical security, will have to share strategies.+ Also on Network World: The IoT is uranium +After all, the boundaries between cyber and physical attacks are already blurring. In March, the U.S. Department of Justice claimed seven Iranians hacked the control systems of a small dam in New York state in 2013. The dam was offline for repair, preventing the hackers from controlling the flow of water. However, the incident demonstrated that hackers could take over infrastructure that was controlled by computers.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The future of security: A combination of cyber and physical defense

Our increasingly connected world gives hackers even more ways to exploit technology for malicious purposes. We’re now entering a period when cyber attacks could cause major physical damage. To protect people from these combined cyber and physical threats, information security experts and law enforcement, which traditionally handles physical security, will have to share strategies.+ Also on Network World: The IoT is uranium +After all, the boundaries between cyber and physical attacks are already blurring. In March, the U.S. Department of Justice claimed seven Iranians hacked the control systems of a small dam in New York state in 2013. The dam was offline for repair, preventing the hackers from controlling the flow of water. However, the incident demonstrated that hackers could take over infrastructure that was controlled by computers.To read this article in full or to leave a comment, please click here

NFV, Skills & Mutable vs. Immutable Infrastructure

This blog article was inspired by some infuriating reads and blogs doing the rounds doing significant damage to business thinking.

I’ve heard so many conversations that confuse Software Defined Networking with Software Driven Networking, automation mixed up with abstraction and MANO (Management and Orchestration) mixed up with configuration management tools that are used for building mutable infrastructure like Puppet, Chef, Ansible and Salt. Is it possible to cross pollinate all of these technologies? Sure, but do not expect people to happy about it. Nerds will love it, process people will hate it and failures will be dominant. Don’t even go there with failing fast. That statement is out of scope as an excuse.

Mutable Infrastructure

Mutable in this sense means to mutate and change. Configuration management tools can create virtual machines, populate them with the packages required to deliver services and place domain specific configuration in order to make them live and in production.

Mutable infrastructure as we know it today is "treat your VMs like cattle, not pets" and this is achieved with well known tools.

Immutable Infrastructure

Think about containers here and unikernels. The idea is we build applications with as few dependencies as possible. Ultimately building applications Continue reading

Circle: Parental controls through a Disney-branded router add-on

As a parent of three children who have been exposed to technology since they were born (we called our second child “iBaby 2.0”), the issue of filtering and parental controls has been on my mind for several years. I’m not particularly advocating that every parent filter content or use “nanny software” to become a babysitter for Internet content. On the other hand, I’ve seen a LOT of examples where kids have been exposed to things on the Internet that they probably shouldn’t be exposed to. Call me wishy-washy, but I’m going to play this one right down the middle – my approach is a combination of talking to my kids about the dangers of the Internet, mixed in with parental controls and filters. It also helps that I can always say to them, "I work in the tech industry, I know all of the different things you can do and how to try to get around them."To read this article in full or to leave a comment, please click here