Archive

Category Archives for "Networking"

Lifesize launches new video gear for huddle rooms

In the world of videoconferencing, there’s a gap between the large conference room systems and lecture hall gear, and the individual’s webcam on their computer, tablet or smartphone. For smaller conference rooms, many of which have been renamed “huddle rooms”, neither  option seems appropriate, because of cost (using a larger system) or convenience (2-4 people shouldn’t have to crowd around a laptop screen).Videoconferencing vendors continue to address this need, with Lifesize being the latest – the company announced today its Icon 450 system, a videoconferencing camera and audio system aimed specifically at the huddle room. The system connects to the Lifesize Cloud, the company’s cloud-based videoconferencing platform.To read this article in full or to leave a comment, please click here

Tomahawk II – Performance Over Programmability

tomahawk2

Broadcom announced a new addition to their growing family of merchant silicon today. The new Broadcom Tomahawk II is a monster. It doubles the speed of it’s first-generation predecessor. It has 6.4 Tbps of aggregate throughout, divided up into 256 25Gbps ports that can be combined into 128 50Gbps or even 64 100Gbps ports. That’s fast no matter how you slice it.

Broadcom is aiming to push these switches into niches like High-Performance Computing (HPC) and massive data centers doing big data/analytics or video processing to start. The use cases for 25/50Gbps haven’t really changed. What Broadcom is delivering now is port density. I fully expect to see top-of-rack (ToR) switches running 25Gbps down to the servers with new add-in cards connected to 50Gbps uplinks that deliver them to the massive new Tomahawk II switches running in the spine or end-of-row (EoR) configuration for east-west traffic disbursement.

Another curious fact of the Tomahawk II is the complete lack of 40Gbps support. Granted, the support was only paid lip service in the Tomahawk I. The real focus was on shifting to 25/50Gbps instead of the weird 10/40/100Gbps split we had in Trident II. I talked about this a couple of Continue reading

10 highest-paying IT security jobs

Highest-paying IT security jobsImage by ThinkstockData breaches, DDOS attacks, hacks and threats continue to dominate the headlines, so it's no surprise that some of the most in-demand IT jobs are in the security area. And with a massive skills gap, companies are willing to pay handsomely for skilled security talent at all levels. "One area we're still seeing huge demand for is in cybersecurity, and hiring companies are willing to pay whatever it takes for talent that can help secure data and mitigate threats while simultaneously ensuring consistent and simplified accessibility from desktop to mobile devices. Companies are sending the message with their budgets: you can't put a price on that," says Jack Cullen, CEO of IT staffing firm Modis. Here are the top 10 highest-paying security roles, culled from career site Dice.com clients' job postings and median salary range data from cloud compensation solutions firm PayScale.com. 1. Lead Software Security EngineerImage by ThinkstockTo read this article in full or to leave a comment, please click here

10 highest-paying IT security jobs

Highest-paying IT security jobsImage by ThinkstockData breaches, DDOS attacks, hacks and threats continue to dominate the headlines, so it's no surprise that some of the most in-demand IT jobs are in the security area. And with a massive skills gap, companies are willing to pay handsomely for skilled security talent at all levels. "One area we're still seeing huge demand for is in cybersecurity, and hiring companies are willing to pay whatever it takes for talent that can help secure data and mitigate threats while simultaneously ensuring consistent and simplified accessibility from desktop to mobile devices. Companies are sending the message with their budgets: you can't put a price on that," says Jack Cullen, CEO of IT staffing firm Modis. Here are the top 10 highest-paying security roles, culled from career site Dice.com clients' job postings and median salary range data from cloud compensation solutions firm PayScale.com. 1. Lead Software Security EngineerImage by ThinkstockTo read this article in full or to leave a comment, please click here

First look: Chef’s Habitat puts automation in the app

Deploying new software to production can be hard -- really hard. If you’re among the many businesses adopting new infrastructure and deployment technology today, you’re keenly aware of how difficult it can be. Even as you adopt modern devops tools to streamline development, test, deployment, and ongoing management, and to bring development and operations teams closer together, it often seems you're only creating new silos.To read this article in full or to leave a comment, please click here(Insider Story)

First look: Chef’s Habitat puts automation in the app

Deploying new software to production can be hard -- really hard. If you’re among the many businesses adopting new infrastructure and deployment technology today, you’re keenly aware of how difficult it can be. Even as you adopt modern devops tools to streamline development, test, deployment, and ongoing management, and to bring development and operations teams closer together, it often seems you're only creating new silos.To read this article in full or to leave a comment, please click here(Insider Story)

Outsourced IT workers ask Feinstein for help, get form letter in return

A University of California IT employee whose job is being outsourced to India recently wrote Sen. Dianne Feinstein (D-Calif.) for help.Feinstein's office sent back a letter addressing manufacturing job losses, not IT, and offered the worker no assistance.The employee is part of a group of 50 IT workers and another 30 contractors facing layoffs after the university hired an offshore outsourcing firm. The firm, India-based HCL, won a contract to manage infrastructure services.That contract is worth about $50 million over five years and can be leveraged by other university campuses -- meaning they could also bring in HCL if they so choose.To read this article in full or to leave a comment, please click here

12 hardware and software vulnerabilities you should address now

It's not a stretch to say that most organizations have at least some old hardware and software still in use. An old computer that's still chugging along, running an old operating system and perhaps an application that is hard to replace, doesn't necessarily raise a red flag with IT staff. Why spend money on new equipment or software if what's already in-house is adequate and functioning?To read this article in full or to leave a comment, please click here(Insider Story)

12 hardware and software vulnerabilities you should address now

It's not a stretch to say that most organizations have at least some old hardware and software still in use. An old computer that's still chugging along, running an old operating system and perhaps an application that is hard to replace, doesn't necessarily raise a red flag with IT staff. Why spend money on new equipment or software if what's already in-house is adequate and functioning?Walker White, president of BDNA, a company that tracks and analyzes end-of-life (EOL) data for hardware, software and medical devices, says that the main problem with out-of-date software and legacy hardware is that once they pass their EOL cycle, the vendor no longer maintains or supports the products, resulting in security vulnerabilities and risk to organizations. As BDNA's State of the Enterprise Report (Q2 2016) indicates, many organizations are unaware of the potential liabilities, which can cost millions of dollars in the case of a successful attack after a vulnerability is exploited.To read this article in full or to leave a comment, please click here(Insider Story)

Leaky IoT devices help hackers attack e-commerce sites

Millions of IoT devices are misconfigured so that they can forward messages -- which, combined with default admin settings, allows them to be used to attack e-commerce and other websites, a new report says.The problem is well known and has been around for a more than a decade, said Ryan Barnett, principal security researcher at Akamai Technologies, which produced the report.The problem first came to Akamai's attention when the content delivery network noticed attacks against its customers where the attackers were checking to see whether particular user name and password combinations were valid on the site.To read this article in full or to leave a comment, please click here

Leaky IoT devices help hackers attack e-commerce sites

Millions of IoT devices are misconfigured so that they can forward messages -- which, combined with default admin settings, allows them to be used to attack e-commerce and other websites, a new report says.The problem is well known and has been around for a more than a decade, said Ryan Barnett, principal security researcher at Akamai Technologies, which produced the report.The problem first came to Akamai's attention when the content delivery network noticed attacks against its customers where the attackers were checking to see whether particular user name and password combinations were valid on the site.To read this article in full or to leave a comment, please click here

Record IoT DDoS attacks raise bar for defenders

Now that its source code has been released you can expect more attacks from Mirai, the malware behind the largest DDoS attack on record, which was powered by hijacked IoT devices.Since release of that code last week it has been responsible for smaller attacks that look like newcomers experimenting with the malware in preparation for bigger things, say security researchers at Imperva. “Likely, these are signs of things to come and we expect to deal with Mirai-powered attacks in the near future,” they say in their blog post.That concern is echoed by researchers at F5, who say, “we can definitely expect the IoT DDoSing trend to rise massively in the global threat landscape.”To read this article in full or to leave a comment, please click here

Record IoT DDoS attacks raise bar for defenders

Now that its source code has been released you can expect more attacks from Mirai, the malware behind the largest DDoS attack on record, which was powered by hijacked IoT devices.Since release of that code last week it has been responsible for smaller attacks that look like newcomers experimenting with the malware in preparation for bigger things, say security researchers at Incapsula. “Likely, these are signs of things to come and we expect to deal with Mirai-powered attacks in the near future,” they say in their blog post.That concern is echoed by researchers at F5, who say, “we can definitely expect the IoT DDoSing trend to rise massively in the global threat landscape.”To read this article in full or to leave a comment, please click here

IDG Contributor Network: Are enterprises successfully escaping Mainframe Island?

From time to time, a vendor's PR rep sends me a note about the "problem" that is caused by mainframe systems being at the hub of enterprise computing. In reality, these systems often offer more integrated processing power, larger memory capacity and more efficient database operations than a distributed, x86-based solution.The most recent pitch I received included this sentence: "How the dusty old legacy mainframe holds back cloud initiatives... and how it can be modernized."What are the real costs? Part of the reason mainframes won't die is that often they simply cost less to operate when all of the costs of ownership and workload operations are considered.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Are enterprises successfully escaping Mainframe Island?

From time to time, a vendor's PR rep sends me a note about the "problem" that is caused by mainframe systems being at the hub of enterprise computing. In reality, these systems often offer more integrated processing power, larger memory capacity and more efficient database operations than a distributed, x86-based solution.The most recent pitch I received included this sentence: "How the dusty old legacy mainframe holds back cloud initiatives... and how it can be modernized."What are the real costs? Part of the reason mainframes won't die is that often they simply cost less to operate when all of the costs of ownership and workload operations are considered.To read this article in full or to leave a comment, please click here

National Science Foundation doles out $12M for wireless growth

The U.S. National Science Foundation yesterday handed out 11 grants, totaling $12 million, to researchers working on bringing the benefits of the public airwaves to more Americans than ever before.The awards went to researchers at a diverse range of educational institutions, including the U.S. Naval Academy, Virginia Tech, Wisconsin, and Texas A&M, among others. The research itself tended to center on work that makes spectrum sharing easier, freeing up space across the increasingly crowded airwaves.Specifically the NSF said the awards were directed at four major areas, including: Innovative radio hardware and access architectures to enable spectrum sharing. Harmonious co-existence of heterogeneous wireless technologies. Development of automated detection mechanisms and compliance certification methods. Spectrum access for science services. +ALSO ON NETWORK WORLD: With help from Docker, Google's Go jumps in popularity + Wi-Fi vs. LTE could be the start of a mobile rollercoasterTo read this article in full or to leave a comment, please click here