Archive

Category Archives for "Networking"

Fujitsu considers selling its PC business to Lenovo

Lenovo may be about to grow its share of the shrinking PC business again: Japanese IT conglomerate Fujitsu is considering selling its PC manufacturing business, and Lenovo may be the buyer, Fujitsu said Thursday.As part of a strategy to focus on core activities, in February Fujitsu spun out its PC business as an independent operating unit. Such spin-outs are usually a prelude to a sale.On Wednesday, Japanese media reported that the company was in talks to sell the PC business to Lenovo."These reports are not based on any official announcement made by Fujitsu," the company said Thursday, adding that it "is currently considering various possibilities, including what is being reported, but a decision has not yet been made."To read this article in full or to leave a comment, please click here

Yahoo’s secret email scans helped the FBI probe terrorists

What Yahoo was looking for with its alleged email scanning program may have been signs of code used by a foreign terrorist group. The company was searching for a digital "signature" of a communication method used by a state-sponsored terrorist group, according to a new report from The New York Times that provided more details on Yahoo's email scanning.  The report on Wednesday report didn't identify the signature or say if it involved any cryptographic computer code. But the article said it was the U.S. Department of Justice, and not the National Security Agency, that had obtained a court order forcing Yahoo to comply. A Reuters report on Tuesday wasn't clear about what agencies were involved in the probe.To read this article in full or to leave a comment, please click here

Yahoo’s secret email scans helped the FBI probe terrorists

What Yahoo was looking for with its alleged email scanning program may have been signs of code used by a foreign terrorist group. The company was searching for a digital "signature" of a communication method used by a state-sponsored terrorist group, according to a new report from The New York Times that provided more details on Yahoo's email scanning.  The report on Wednesday report didn't identify the signature or say if it involved any cryptographic computer code. But the article said it was the U.S. Department of Justice, and not the National Security Agency, that had obtained a court order forcing Yahoo to comply. A Reuters report on Tuesday wasn't clear about what agencies were involved in the probe.To read this article in full or to leave a comment, please click here

Phishing still fools people, but at least more are cautious

While people still have a really hard time telling the difference between legit and phishing emails, at least there is enough awareness of the phishing threat that many people will err on the side of caution when it comes to clicking on links.This was one finding from Carnegie Mellon University's CyLab in a study titled "Quantifying Phishing Susceptibility for Detection and Behavior Decisions" that published recently in the journal Human Factors.MORE: New tech can help catch spearphishing attacksTo read this article in full or to leave a comment, please click here

Phishing still fools people, but at least more are cautious

While people still have a really hard time telling the difference between legit and phishing emails, at least there is enough awareness of the phishing threat that many people will err on the side of caution when it comes to clicking on links.This was one finding from Carnegie Mellon University's CyLab in a study titled "Quantifying Phishing Susceptibility for Detection and Behavior Decisions" that published recently in the journal Human Factors.MORE: New tech can help catch spearphishing attacksTo read this article in full or to leave a comment, please click here

Nokia buys small semiconductor company to land 5G tech

A small semiconductor company based in Cambridge, Mass., was acquired today by Nokia, in a move to make the Finnish giant’s base station technology more energy-efficient.Eta Devices’ technology and institutional expertise appear to be at the heart of the acquisition, for which terms and pricing were not disclosed. Eta has 20 employees, located in Cambridge and at an R&D office in Stockholm, Sweden.+ALSO ON NETWORK WORLD: Satya Nadella's comp package slips 3% to $17.7M + Happy 25th once again to Linux, 'the little OS that definitely could'To read this article in full or to leave a comment, please click here

Nokia buys small semiconductor company to land 5G tech

A small semiconductor company based in Cambridge, Mass., was acquired today by Nokia, in a move to make the Finnish giant’s base station technology more energy-efficient.Eta Devices’ technology and institutional expertise appear to be at the heart of the acquisition, for which terms and pricing were not disclosed. Eta has 20 employees, located in Cambridge and at an R&D office in Stockholm, Sweden.+ALSO ON NETWORK WORLD: Satya Nadella's comp package slips 3% to $17.7M + Happy 25th once again to Linux, 'the little OS that definitely could'To read this article in full or to leave a comment, please click here

IDG Contributor Network: Daisy-chaining APIs makes serverless sense

Enterprise and startups are moving to cloud-based infrastructure to create an API-enabled value chain for new products and workflows. With this has emerged the idea of serverless infrastructure: running functions and applications completely in cloud-based servers where the hosting provider handles all of the sysadmin requirements.This is a new frontier in how business is leveraging cloud, and it is set to explode, especially amongst system integrators and consultants, as more data from sensors and machines are incorporated and as traditional businesses move even more of their IT infrastructure to the cloud.But to take advantage of this opportunity, businesses need to have their services and data accessible via application programming interfaces (API), which for most businesses is still just an emerging trend.To read this article in full or to leave a comment, please click here

AT&T jumps into SD-WAN market; partners with IBM

AT&T today jumped headfirst into the fast-growing software-defined Wide Area Network (SD-WAN) market with a new offering it hopes to bring to market next year based on technology from SD-WAN startup VeloCloud.SD-WAN is gaining steam thanks to its ability to bring software-defined networking (SDN) controls to the wide area network. SD-WANs allow customers to integrate multiple network connection types and let software intelligently route traffic based on application profiles and available network types. Gartner has estimated that SD-WAN can save customers significant costs compared to traditional WAN architectures too. IDC predicts SD-WAN will be a $6 billion market by 2020.To read this article in full or to leave a comment, please click here

AT&T jumps into SD-WAN market; partners with IBM

AT&T today jumped headfirst into the fast-growing software-defined Wide Area Network (SD-WAN) market with a new offering it hopes to bring to market next year based on technology from SD-WAN startup VeloCloud.SD-WAN is gaining steam thanks to its ability to bring software-defined networking (SDN) controls to the wide area network. SD-WANs allow customers to integrate multiple network connection types and let software intelligently route traffic based on application profiles and available network types. Gartner has estimated that SD-WAN can save customers significant costs compared to traditional WAN architectures too. IDC predicts SD-WAN will be a $6 billion market by 2020.To read this article in full or to leave a comment, please click here

Microsoft Dynamics 365 will be unveiled later this month

Microsoft will kick off its Dynamic Communities’ Summit 16 event on Oct. 11 in Tampa Bay, Florida—hurricane notwithstanding—with the introduction of Dynamics 365, the main suite in its line-of-business applications.Scott Guthrie, executive vice president of the cloud and enterprise group at Microsoft, will lead the keynote, which will include live demos of the software and panel discussions for deep dives on what's new. The Summit is entirely devoted to Microsoft's Dynamics line-of-business apps, which includes Dynamics AX, CRM, GP and NAV.To read this article in full or to leave a comment, please click here

FBI arrests an NSA contractor suspected of stealing hacking tools

The FBI has arrested a U.S. government contractor for allegedly stealing classified documents, possibly including hacking tools.Harold Thomas Martin III, 51, has been charged with stealing government materials, including top secret information, the U.S. Department of Justice said on Wednesday.Martin, who held a top-secret national security clearance, allegedly took six classified documents produced in 2014."These documents were produced through sensitive government sources, methods, and capabilities, which are critical to a wide variety of national security issues," the DOJ said. To read this article in full or to leave a comment, please click here

FBI arrests an NSA contractor suspected of stealing hacking tools

The FBI has arrested a U.S. government contractor for allegedly stealing classified documents, possibly including hacking tools.Harold Thomas Martin III, 51, has been charged with stealing government materials, including top secret information, the U.S. Department of Justice said on Wednesday.Martin, who held a top-secret national security clearance, allegedly took six classified documents produced in 2014."These documents were produced through sensitive government sources, methods, and capabilities, which are critical to a wide variety of national security issues," the DOJ said. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Many people abandon security, risky behavior surges

People are sick and tired of being told to be more secure in their use of computers and when participating in online activities. So much so that they’re simply ignoring the blitz of annoying demands and are carrying on as imprudently as they’ve always done, according to National Institute of Standards and Technology (NIST) researchers.The U.S. Department of Commerce-operated lab recently published a report (subscription) on the subject in IEEE’s IT Professional Journal.The study’s participants “expressed a sense of resignation and loss of control” when the scientists asked them about their online activity, such as shopping and banking.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Many people abandon security, risky behavior surges

People are sick and tired of being told to be more secure in their use of computers and when participating in online activities. So much so that they’re simply ignoring the blitz of annoying demands and are carrying on as imprudently as they’ve always done, according to National Institute of Standards and Technology (NIST) researchers.The U.S. Department of Commerce-operated lab recently published a report (subscription) on the subject in IEEE’s IT Professional Journal.The study’s participants “expressed a sense of resignation and loss of control” when the scientists asked them about their online activity, such as shopping and banking.To read this article in full or to leave a comment, please click here