Archive

Category Archives for "Networking"

IDG Contributor Network: Platform9 is the latest to ease the container deployment woes

The Docker initiative has been an amazing thing to watch.Over only a few short years, Docker has taken a pre-existing technology (the concept of Linux containers) and built a massive ecosystem around it. In the process, Docker (the company, as distinct from the open source project) has built itself an incredible valuation that it needs to try and live up to.+ Also on Network World: How Docker can transform your development teams +But that valuation, and attempt to justify it, are somewhat countered by the fact that Docker also relies on an ecosystem of vendors that all try to justify their existence. Thus the challenge remains: what should Docker (the company) do for itself, and what should it leave for third-party vendors to resolve?To read this article in full or to leave a comment, please click here

SDNSkills Plan Moving Forward

Hi to those of you subscribing and following. For those of you who have been watching of late, this is a brief note to let you know what’s going on, and what my plan is for ramping back up with writing posts here in this blogspace. Short version: I expect to be back to normal by August sometime, and I may post a few items here and there in the mean time.

Continue reading

Riding the new Wi-Fi wave (part 1)

Wireless mesh networking has been around for many years with business-level products and services, but it’s been pretty scarce in the home network space. The most famous user of a wireless mesh network (in which Wi-Fi clients talk to access nodes that can talk to other nodes, instead of a single router) is the wireless audio provider Sonos. But for the most part, improvements in Wi-Fi meant you still bought a singular router that you’d connect to a modem (or you have a combination modem/router given to you by your broadband provider). If you wanted to extend your network or improve coverage in parts of your house, you would need to buy a repeater/extender, which created an extra “hop” for network traffic (not optimal for services/apps that have a need for speed).To read this article in full or to leave a comment, please click here

IDG Contributor Network: Fictiv aims to reinvent prototyping

I have a particular interest in the manufacturing of physical goods. For close to 25 years, I have been involved with a boutique, New Zealand-based manufacturer of backpacks and workwear. Cactus Equipment has been designing and making its own products for years.As opposed to the regular model of spec'ing a product from Far Eastern design and manufacturing houses, Cactus designs in house and then manufacturers in its own New Zealand factory, as well as a number of outsourced but still New Zealand-based facilities. So, the realities of trying to get a product designed and prototyped is something I'm well aware of. The design and sourcing combined with the difficulty in accessing resources makes product engineering a difficult task.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Mobile broadband satellite breakthrough: Vehicles stay connected while on the move

Despite a slew of new broadband satellite projects up and running and in the pipeline, there’s a still a drawback to mobile satellite Internet compared to traditional wireless mobile networks. One big problem with satellite has always been that it’s hard to stay locked onto the transmission beam when you’re moving.Airlines get away with it for their cabins because the aircraft moves in a relatively stable manner, making it easier to point the antenna and grab the signal. But automobiles don’t move like that, explains the Fraunhofer Institute for Integrated Circuits in a press release.To read this article in full or to leave a comment, please click here

Where Is the Explosion of Overlay Virtual Networks

Three years ago I was speaking with one of the attendees of my overlay virtual networking workshop @ Interop Las Vegas and he asked me how soon I thought the overlay virtual networking technologies would be accepted in the enterprise networks.

My response: “you might be surprised at the speed of the uptake.” Turns out, I was wrong (again). Today I’m surprised at the lack of that speed.

Read more ...

Tech pros share advice for new computer science graduates

Computer science graduates are in demand. Last year, 76% of computer science graduates were working full time within six months of finishing school -- the highest full-time employment rate among new college graduates and well above the 58% average across all majors, according to a new report from the National Association of Colleges and Employers (NACE).But as veterans in the tech world know, earning a degree is just the beginning of a new professional’s education. To help this year’s newcomers navigate the transition from academic life to the professional world, we asked tech pros to share their best advice for computer science graduates entering the workforce. Here’s what they had to say.To read this article in full or to leave a comment, please click here

Tech pros share advice for new computer science graduates

Computer science graduates are in demand. Last year, 76% of computer science graduates were working full time within six months of finishing school -- the highest full-time employment rate among new college graduates and well above the 58% average across all majors, according to a new report from the National Association of Colleges and Employers (NACE).But as veterans in the tech world know, earning a degree is just the beginning of a new professional’s education. To help this year’s newcomers navigate the transition from academic life to the professional world, we asked tech pros to share their best advice for computer science graduates entering the workforce. Here’s what they had to say.To read this article in full or to leave a comment, please click here

New products of the week 6.20.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.BetterCloud WorkflowsKey features: BetterCloud Workflows automate user provisioning, deprovisioning and access management within Google for Work applications, giving IT greater control over data, costs and time in the modern, cloud-first workplace. More info.To read this article in full or to leave a comment, please click here

New products of the week 6.20.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.BetterCloud WorkflowsKey features: BetterCloud Workflows automate user provisioning, deprovisioning and access management within Google for Work applications, giving IT greater control over data, costs and time in the modern, cloud-first workplace. More info.To read this article in full or to leave a comment, please click here

Intel Management Engine’s security through obscurity should scare the **** out of you

For a long time there was a commonly held belief that open source products were inherently more secure because there was nothing hidden. The thought was that with the code for popular applications out in the open, there’d be scores of good guys looking at every line and bugs and flaws would be few and far between. Alas, this turned out to be a pipe dream because even the most examined code can still contain flaws so obscure and arcane, even highly skilled and incredibly talented coders can’t find them. Why? It’s usually because the good guys don’t have the time to play hacker as intensely as the real hackers do. For the bad guys, the rewards for finding exploitable flaws are tangible while for the good guys, the cost of not finding flaws far exceeds, by orders of magnitude, the value of the few flaws they do find because those flaws are the most easily found.To read this article in full or to leave a comment, please click here

Intel Management Engine’s security through obscurity should scare the **** out of you

For a long time there was a commonly held belief that open source products were inherently more secure because there was nothing hidden. The thought was that with the code for popular applications out in the open, there’d be scores of good guys looking at every line and bugs and flaws would be few and far between. Alas, this turned out to be a pipe dream because even the most examined code can still contain flaws so obscure and arcane, even highly skilled and incredibly talented coders can’t find them. Why? It’s usually because the good guys don’t have the time to play hacker as intensely as the real hackers do. For the bad guys, the rewards for finding exploitable flaws are tangible while for the good guys, the cost of not finding flaws far exceeds, by orders of magnitude, the value of the few flaws they do find because those flaws are the most easily found.To read this article in full or to leave a comment, please click here

The fight over a new Wi-Fi channel is coming to a head

Globalstar’s plan to open a new Wi-Fi channel under its control is nearing the moment of truth after years of regulatory wrangling.The U.S. Federal Communications Commission is considering Globalstar’s plan, and a vote could come at any time. News reports suggest it might be close.If Globalstar gets its way, Wi-Fi users in the U.S. will have one more channel, which could reduce congestion and improve performance. But both their mobile devices and the hotspots they use would need firmware upgrades to take advantage of the new frequency, and the channel wouldn’t necessarily be open to everyone.To read this article in full or to leave a comment, please click here