Archive

Category Archives for "Networking"

Cloud or on-prem? This big-data service now swings both ways

There are countless "as-a-Service" offerings on the market today, and typically they live in the cloud. Back in 2014, startup BlueData blazed a different trail by launching its EPIC Enterprise big-data-as-a-service offering on-premises instead.On Wednesday, BlueData announced that the software can now run on Amazon Web Services (AWS) and other public clouds, making it the first BDaaS platform to work both ways, the company says."The future of Big Data analytics will be neither 100 percent on-premises nor 100 percent in the cloud," said Kumar Sreekanti, CEO of BlueData. "We’re seeing more multicloud and hybrid deployments, with data both on-prem and in the cloud. BlueData provides the only solution that can meet the realities of these mixed environments in the enterprise.”To read this article in full or to leave a comment, please click here

Dropbox enhances its productivity tools across the board

Dropbox just dumped a ton of new productivity features on users of its file storage and collaboration service that are all aimed at making it easier for people to get work done within its applications. Updates to the Dropbox app for iOS allow users to scan documents directly into the cloud storage service, and get started with creating Microsoft Office files from that app as well. The company also increased the ease and security of sharing files through Dropbox, and made it easier to preview and comment on files shared through the service.These launches mean that Dropbox will be more valuable to people as a productivity service, and not just a folder to hold files. It's especially important as the company tries to capture the interest of business users, who have a wide variety of competing storage services they could subscribe to instead. To read this article in full or to leave a comment, please click here

IDG Contributor Network: New life for residential Wi-Fi

The recent launch of two residential Wi-Fi products—from eero and Luma—is very welcome. They highlight just how stale the traditional offerings had become. But their central technical improvement should be unnecessary.The new devices apply the Nest treatment to Wi-Fi routers rather than thermostats. As with most brilliant ideas, one’s first reaction is why didn’t someone do this before, it’s so obvious?+ Also on Network World: Riding the new Wi-Fi wave (part 1) +To read this article in full or to leave a comment, please click here

Think tanks mull Geneva Convention for cybercrime

A Geneva Convention on cyberwar: That's how a panel of experts proposes to deal with the growing threat to critical infrastructure posed by the possibility of cyberattack.With control systems in dams, hospitals, power grids and industrial systems increasingly exposed online, it's possible that nation states could seek to damage or disable them electronically.But building electronic defenses to prevent such attacks is expensive -- and often ineffectual, given the myriad ways in which they can fail or be breached.That's why the Global Commission on Internet Governance recommends that in any future cyberwar, governments should pledge to restrict the list of legitimate targets for cyberattacks, to not target critical infrastructure predominantly used by civilians, and to not to use cyberweapons against core Internet infrastructure.To read this article in full or to leave a comment, please click here

Think tanks mull Geneva Convention for cybercrime

A Geneva Convention on cyberwar: That's how a panel of experts proposes to deal with the growing threat to critical infrastructure posed by the possibility of cyberattack.With control systems in dams, hospitals, power grids and industrial systems increasingly exposed online, it's possible that nation states could seek to damage or disable them electronically.But building electronic defenses to prevent such attacks is expensive -- and often ineffectual, given the myriad ways in which they can fail or be breached.That's why the Global Commission on Internet Governance recommends that in any future cyberwar, governments should pledge to restrict the list of legitimate targets for cyberattacks, to not target critical infrastructure predominantly used by civilians, and to not to use cyberweapons against core Internet infrastructure.To read this article in full or to leave a comment, please click here

‘Trojan horse’ stalks security conference

The creation pictured above, dubbed “Cyber Horse,” greets attendees of the ongoing Cyber Week 2016 conference being held at Tel Aviv University. This short video shows a time-lapse of the final assemblage with a narration devoted to a history lesson. And here’s another close-up video taken by a conference attendee: “Cyber Horse” was conceived and built by No, No, No, No, No, Yes, an agency based in New York City. Gideon Amichay, founder and chief creative officer, explains in a blog post.To read this article in full or to leave a comment, please click here

‘Trojan horse’ stalks security conference

The creation pictured above, dubbed “Cyber Horse,” greets attendees of the ongoing Cyber Week 2016 conference being held at Tel Aviv University. This short video shows a time-lapse of the final assemblage with a narration devoted to a history lesson. And here’s another close-up video taken by a conference attendee: “Cyber Horse” was conceived and built by No, No, No, No, No, Yes, an agency based in New York City. Gideon Amichay, founder and chief creative officer, explains in a blog post.To read this article in full or to leave a comment, please click here

Get ready: Mobile World Congress is coming to the US

Mobile World Congress, arguably the most important tech trade show in the world, is coming to the U.S. Trade groups GSMA and CTIA are joining forces to bring a smaller version of the event to the U.S. in 2017.GSMA Mobile World Congress Americas will debut Sept. 12 to 14, 2017, in San Francisco and will replace U.S. trade group CTIA's Super Mobility conference. Super Mobility will continue this year in Las Vegas from Sept. 7 to 9.The new conference will be the "first truly global wireless event" in the Americas, CTIA President and CEO Meredith Attwell Baker said in a press release.ALSO: 9 tips for speeding up your business Wi-Fi The new trade show, however, will apparently be more focused, spotlighting the leading innovations from the North American mobile industry, John Hofman, CEO of GSMA, said in a press release.To read this article in full or to leave a comment, please click here

Why cyber hygiene isn’t enough

In numerous discussions and forums recently, the conversation about the need for a risk management approach to cybersecurity has quickly devolved into a discussion about cyber hygiene and, ultimately, a discussion about compliance (with perhaps some simple metrics thrown in).+ Also on Network World: Match security plans to your company's 'risk appetite' +This pattern of following a difficult, but business-oriented discussion of risk to a trivial oversimplification is common within government and industry circles—and even among the most sophisticated CISOs. What we really need, however, is a holistic risk framework and a solid commitment to risk-based measurements in order to accurately understand and defend against the most serious cybersecurity threats facing our country. Too often we focus solely on cyber hygiene, while important, doesn’t fully address the more severe risks organizations face with increasing frequency.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why cyber hygiene isn’t enough

In numerous discussions and forums recently, the conversation about the need for a risk management approach to cybersecurity has quickly devolved into a discussion about cyber hygiene and, ultimately, a discussion about compliance (with perhaps some simple metrics thrown in). + Also on Network World: Match security plans to your company's 'risk appetite' + This pattern of following a difficult, but business-oriented discussion of risk to a trivial oversimplification is common within government and industry circles—and even among the most sophisticated CISOs. What we really need, however, is a holistic risk framework and a solid commitment to risk-based measurements in order to accurately understand and defend against the most serious cybersecurity threats facing our country. Too often we focus solely on cyber hygiene, while important, doesn’t fully address the more severe risks organizations face with increasing frequency.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Will new technologies put us out of work? A peek into the future

Over the past year, questions about how emerging technologies will impact employment have taken on a new tenor. Will robots take over our jobs? One thing is indisputable: automation and artificial intelligence (AI) will displace workers in the IT and business process outsourcing services industry.

But this is not a new trend.

+ Also on Network World: The 6 hottest new jobs in IT +

Such tectonic shifts have occurred every few decades over the last two centuries. With each wave of new technology and each accompanying paradigm shift, jobs have disappeared. During the Industrial Revolution, people feared the loss of farm jobs. When industrial jobs went away, people flocked to the service sector. Then computers, telecom networks, ATMs and the internet made their way into the world, and people feared massive job loss in this sector. Manufacturing work moved to low-cost countries, such as China and Taiwan, and service-sector jobs soon moved to India and the Philippines.

To read this article in full or to leave a comment, please click here

IDG Contributor Network: Will new technologies put us out of work? A peek into the future

Over the past year, questions about how emerging technologies will impact employment have taken on a new tenor. Will robots take over our jobs? One thing is indisputable: automation and artificial intelligence (AI) will displace workers in the IT and business process outsourcing services industry.But this is not a new trend.+ Also on Network World: The 6 hottest new jobs in IT +Such tectonic shifts have occurred every few decades over the last two centuries. With each wave of new technology and each accompanying paradigm shift, jobs have disappeared. During the Industrial Revolution, people feared the loss of farm jobs. When industrial jobs went away, people flocked to the service sector. Then computers, telecom networks, ATMs and the internet made their way into the world, and people feared massive job loss in this sector. Manufacturing work moved to low-cost countries, such as China and Taiwan, and service-sector jobs soon moved to India and the Philippines.To read this article in full or to leave a comment, please click here

Apple surprise: iOS 10 preview’s kernel unencrypted

While new iOS 10 features like improved Maps, Siri integration and Photos were expected during Apple's Worldwide Developers Conference last week, the company stunned developers by leaving the kernel unencrypted in the preview edition of its new iPhone and iPad software.MIT Technology Review first reported on this revelation, discovered by security researchers and iOS developers, who were left wondering whether Apple did this on purpose or goofed up big time. To read this article in full or to leave a comment, please click here

Microsoft plugs Edge browser as power miser

Microsoft yesterday claimed its own tests show that Edge, the default in Windows 10, used 27% less power than the No. 1 browser, Chrome, and 35% less than the slowly-sliding-into-obscurity Firefox.The Redmond, Wash. company's Edge-eats-less campaign may have been motivated by Edge's poor performance in the marketplace, where it has been adopted by less than 30% of the Windows 10 population.In a pair of blog posts, a director of Edge's platform team and an Edge program manager touted the results of Microsoft's in-labs tests.To read this article in full or to leave a comment, please click here