Archive

Category Archives for "Networking"

Verizon subscribers can now opt out of ‘supercookies’

Verizon customers can now opt out of having a unique identifier placed on their phones that critics have labelled a ‘supercookie’ because it’s almost impossible to remove.Verizon said in January that it would allow subscribers to opt out of the tracking mechanism, but it didn’t say when. On Tuesday, it said the identifier won’t be inserted for customers who opt out of its mobile advertising program.The move hasn’t satisfied privacy advocates, who say many customers won’t be aware that they need to opt out of the program. The identifier should be “opt in” instead, those advocates say.“This is an improvement, but it doesn’t do nearly enough,” said Jacob Hoffman-Andrews, a senior staff technologist with Electronic Frontier Foundation.To read this article in full or to leave a comment, please click here

Verizon subscribers can now opt out of ‘supercookies’

Verizon customers can now opt out of having a unique identifier placed on their phones that critics have labelled a ‘supercookie’ because it’s almost impossible to remove.Verizon said in January that it would allow subscribers to opt out of the tracking mechanism, but it didn’t say when. On Tuesday, it said the identifier won’t be inserted for customers who opt out of its mobile advertising program.The move hasn’t satisfied privacy advocates, who say many customers won’t be aware that they need to opt out of the program. The identifier should be “opt in” instead, those advocates say.“This is an improvement, but it doesn’t do nearly enough,” said Jacob Hoffman-Andrews, a senior staff technologist with Electronic Frontier Foundation.To read this article in full or to leave a comment, please click here

A New Journey Begins

Life is about moving from one journey to the next. Today marks exactly one of those changes.  Cisco announced their intent to acquire Embrane, which takes us to the next phase in our journey.

It’s been five exciting years since Marco and I founded Embrane. So many great memories come to mind – but I am even more excited about what we have in front of us. 

Joining Cisco gives us the opportunity to continue our journey and participate in one of the most significant shifts in the history of networking:  leading the industry to better serve application needs through integrated software-hardware models.  

At Embrane, we have demonstrated the ability to build products that accelerate the adoption of more agile models for virtualization and automation of networking capabilities in the data center. 

The networking DNA of Cisco and Embrane together drives our common vision for an Application Centric Infrastructure.  We both believe that innovation must be evolutionary and enable IT organizations to transition to their future state on their own terms – and with their own timelines.  It’s about coexistence of hardware with software and of new with legacy in a way that Continue reading

Thousands call on Congress to overturn net neutrality rules

Opponents of the U.S. Federal Communications Commission’s new net neutrality rules aren’t giving up, with a conservative advocacy group saying it has collected more than 540,000 signatures on a petition asking Congress to overturn the agency’s action.American Commitment, a group with connections to Republican billionaire brothers Charles and David Koch, delivered those petitions to Congress this week. Each petition went to the three members of Congress, one representative and two senators, representing the person signing the letter, American Commitment said.“The landslide 2014 elections made crystal clear that the American people reject larger, more intrusive government,” the Web form leading to the letters says in part. “But President [Barack] Obama reacted by moving even further left, ignoring the fact the Federal Communications Commission is supposed to be an independent agency, and openly demanding the FCC take the most radical action imaginable: reducing the Internet to a ‘public utility,’ imposing sweeping new taxes and destroying private investment, competition, and innovation while putting bureaucrats firmly in control.”To read this article in full or to leave a comment, please click here

Survey: A majority of Apple Pay users encounter problems

Apple Pay is coming up short for many people who attempt to use the mobile payment service at the register.A survey from research firm Phoenix Marketing International found that 68 percent of respondents who have used Apple Pay had encountered an issue when making an in-store purchase.The leading compliant made by nearly half of respondents was that retailers’ sales terminals took too long to record a transaction. Other problems: employees who didn’t know how to process sales with the mobile wallet (42 percent); errors in how the sale posted (36 percent), like a transaction appearing twice; and out of service Apple Pay terminals (27 percent). Almost half of the Apple Pay users surveyed (47 percent) found that the particular store they visited didn’t accept Apple Pay although the retailer was supposed to support the service.To read this article in full or to leave a comment, please click here

Detecting advanced threats with user behavior analytics

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Day after day, an employee uses legitimate credentials to access corporate systems, from a company office, during business hours. The system remains secure. But suddenly the same credentials are used after midnight to connect to a database server and run queries that this user has never performed before. Is the system still secure?

Maybe it is. Database administrators have to do maintenance, after all, and maintenance is generally performed after hours. It could be that certain maintenance operations require the execution of new queries. But maybe it isn’t. The user’s credentials could have been compromised and are being used to commit a data breach.

To read this article in full or to leave a comment, please click here

Amazon tries a physical button for making purchases

Amazon might be on to the killer app for restocking toilet paper from the privacy of your home.Amazon Prime members can now request an invite to get their hands on “Dash Button,” a small oval-shaped device to be placed strategically around the home like drawers, cupboards ... or the bathroom wall. Push its button, and the device will instantly purchase an item of the user’s choosing. Currently there’s more than a dozen buttons for buying Tide laundry detergent, Bounty paper towels and Gillette shaving products. Users can set up the device to send them any applicable item they want; a link on Amazon’s site refers users to more than 250 Dash button products including moisturizers, dog food, and paper towels.To read this article in full or to leave a comment, please click here

Amazon tries a physical button for making purchases

Amazon might be on to the killer app for restocking toilet paper from the privacy of your home.Amazon Prime members can now request an invite to get their hands on “Dash Button,” a small oval-shaped device to be placed strategically around the home like drawers, cupboards ... or the bathroom wall. Push its button, and the device will instantly purchase an item of the user’s choosing. Currently there’s more than a dozen buttons for buying Tide laundry detergent, Bounty paper towels and Gillette shaving products. Users can set up the device to send them any applicable item they want; a link on Amazon’s site refers users to more than 250 Dash button products including moisturizers, dog food, and paper towels.To read this article in full or to leave a comment, please click here

HP hits former Autonomy execs with $5B suit

The UK’s Serious Fraud Office may have dropped its investigation of software firm Autonomy earlier this year, but that doesn’t appear to have done much to allay HP’s ire. HP—which acquired Autonomy in 2011—has confirmed that it plans to sue Mike Lynch and Sushovan Hussain, Autonomy’s former CEO and CFO, for $5.1 billion.HP filed a Claim Form against Lynch and Hussain on Monday alleging they engaged in fraudulent activities while executives at Autonomy, an HP spokeswoman said via email. “The lawsuit seeks damages from them of approximately $5.1 billion.”To read this article in full or to leave a comment, please click here

Budgeting For Wireless With E-Rate

Wireless

After having a nice conversation with Josh Williams (@JSW_EdTech) and helping Eddie Forero (@HeyEddie) with some E-Rate issues, I’ve decided that I’m glad I don’t have to deal with it any longer. But my conversation with Josh revealed something that I wasn’t aware of with regards to the new mandate from the president that E-Rate needs to address wireless in schools.

Building On A Budget

The first exciting thing in the new rules for E-Rate modernization is that there has been an additional $1 billion injected into the Category 2 (Priority 2) items. The idea is that this additional funding can be used for purchasing wireless equipment as outlined in the above initiative. I’ve said before that E-Rate needed an overhaul to fix some of the issues with reduced funding in competition for the available funding pool. That this additional funding came through things like sunsetting VoIP funding is a bit irritating, but sometimes these things can’t be helped.

The second item that caught my attention is the new budgeting rules for Category 2 in E-Rate going forward. Now, schools are allocated $150 per student for a rolling five year period. That means the old “2 Continue reading

IT troubles plague Federal Copyright Office

The IT department at the nation’s Copyright Office needs more than a little work.A report out this week from the watchdogs at the Government Accountability Office points out a number of different technical and management woes that see to start at the top – with the CIO (a position that has a number of problems in its own right) and flows down to the technology, or lack-thereof.As the nation’s copyright center it is imperative that it operate efficiently to effectively protect all manner of written and recorded material but according to the GAO it doesn’t.+More on Network World: CIA: A world without Google Maps or satellites?+To read this article in full or to leave a comment, please click here

Seven things to know about Intel’s ‘Cherry Trail’ Atom chips

Microsoft’s Surface 3 is the first announced device to use Intel’s new Cherry Trail Atom chips, but you can expect therm to show up soon in other devices too. So what are the chips capable of and what should we expect?The Surface 3, which went on sale Tuesday, highlights some of the capabilities of Cherry Trail, officially called the Atom X5 and X7. The chips can run full Windows 8 and Windows 10 and are better at graphics than their ‘Bay Trail’ predecessors. But they also have limitations. They won’t do so well at compute intensive tasks such as video editing, which remain the domain of Intel’s faster Core processors.To read this article in full or to leave a comment, please click here

iPaaS: A new approach to cloud Integration

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Application integration has often been an exercise in frustration – long delays, high costs and over promises by vendors. How many ERP projects have you heard of that were canceled or shelved due to complex customization and integration challenges?

Integration though, is coming to a new place. Cloud technologies and open APIs are helping enterprises merge on-premise and off-premise systems without considerable coding and re-architecting. Instead of requiring specialists in SOA, enterprise service bus (ESB), extract transform and load (ETL) and data warehousing, organizations are hoping the concept of Integration Platform as a Service (iPaaS) can be used to integrate systems in half the time using technically-savvy generalists and increased involvement from lines of business.

To read this article in full or to leave a comment, please click here

New malware program used in attacks against energy sector companies

A new malware program is being used to do reconnaissance for targeted attacks against companies in the energy sector.The program, dubbed Trojan.Laziok by researchers from antivirus vendor Symantec, was used in spear-phishing attacks earlier this year against companies from the petroleum, gas and helium industries.The attacks targeted companies from many countries in the Middle East, but also from the U.S., India, the U.K., and others, according to malware researchers from Symantec.The Trojan is spread via emails with malicious documents that exploit a Microsoft Office vulnerability for which a patch has existed since April 2012.To read this article in full or to leave a comment, please click here

Tanium’s fast-acting endpoint management tool grows up

A tool for nearly real-time management of clients like desktops, laptops and Windows tablets is now set to take on massive organizations that have millions of endpoints.Tanium is software that can examine and modify all such clients across an enterprise within 15 seconds, according to the company. It’s already being used by customers with more than 500,000 endpoints, and the newly released Version 6.5 is designed to serve some of the world’s largest organizations, especially in the public sector, Tanium says.At the heart of Tanium’s software is the ability to rapidly reach all endpoints throughout an organization, which can speed up both security and IT management tasks. Tanium makes this work by organizing endpoints into linear chains in which they communicate peer to peer.To read this article in full or to leave a comment, please click here

Infinit speeds up video, photo sharing via smartphones

French company Infinit has released Android and iOS applications for free file-sharing that promise improved transmission speeds over cloud-based services.High-resolution smartphone cameras that can shoot 4K videos means that such a service is needed on mobile devices, Infinit said in a blog post on Tuesday. There are already apps for Mac OS and Windows.All the apps are free and there is no limit on file sizes or types that can be transferred. There are two ways to share files. Recipients who have the one of the apps installed get a notification they have to accept. It’s also possible to share content with users who don’t have the apps; they get a link to download it from via email.To read this article in full or to leave a comment, please click here

‘One-sentence stories’: An oxymoron from the New York Times for the Apple Watch

I figured this had to be an early April Fool’s Day joke … or the New York Times doesn’t understand that “one-sentence story” is an oxymoron.And a spokesperson for the newspaper tells me via email that it’s no joke. A press release reads: The New York Times has developed a new form of storytelling to help readers catch up in seconds on Apple Watch. One-sentence stories, crafted specially for small screens, will provide the news at a glance across many Times sections, including Business, Politics, Science, Tech and The Arts.One-sentence stories are accompanied by The Times’s award-winning photography and short, bulleted summaries. Readers can use Handoff to continue reading any story on iPhone or iPad, or tap “Save for Later” to build a personal reading list.To read this article in full or to leave a comment, please click here