Surveys show high hopes, deep concerns about IoT

Industrial IoT's big future is starting to become a reality, but many companies still don't think they're ready for it.Those are some of the findings in surveys released on Tuesday by the Business Performance Innovation Network and the Eclipse IoT Working Group. They reflect the views of hundreds of executives and developers from a range of industries.More than half of the executives think their industries are already adopting IoT through either pilots or large-scale deployments, and 57 percent are at least in the planning stages themselves, BPI Network said. About 350 executives from around the world responded to the survey by BPI Network, an organization of business leaders.To read this article in full or to leave a comment, please click here

Oracle adds attention analytics to its data cloud with Moat buy

Oracle's online advertising analytics platform will soon know even more about what you are watching, where and when: The company has agreed to buy Moat, which aims to track how much attention consumers are paying to online media.Moat's platform tracks browsing and viewing habits on desktop and mobile devices, and even connected TVs. It touts its ability to separate out non-human traffic so advertisers don't pay for clicks from bots, and to quantify the audibility and visibility of ads.Oracle plans to add Moat's information about viewing habits to Oracle Data Cloud, which provides analytics tools and data about what consumers do and buy to marketers and publishers. Moat will continue to operate as an independent platform within that division, Oracle said Wednesday.To read this article in full or to leave a comment, please click here

The Agility and Flexibility of Docker including Oracle Database and Development Tools

A company’s important applications often are subjected to random and capricious changes due to forces well beyond the control of IT or management.  Events like a corporate merger or even a top programmer on an extended vacation can have an adverse impact on the performance and reliability of critical company infrastructure.

During the second day keynote at DockerCon 2017 in Austin TX, Lily Guo and Vivek Saraswat showed a simulation of how to use Docker Enterprise Edition and its application transformation tools to respond to random events that threaten to undermine the stability of their company critical service.

The demo begins as two developers are returning to work after an extended vacation.  They discover that, during their absence, their CEO has unexpectedly hired an outside contract programmer to rapidly code and introduce an entire application service that they know nothing about.  As they try to build the new service, however, Docker Security Scan detects that a deprecated library has been incorporated by the contractor.  This library is found to have a security vulnerability which violates the company’s best practice standards.  As part of Docker Enterprise Edition Advanced, Docker Security Scan automatically keeps track of code contributions and acts as a Continue reading

Facebook beats Apple to the punch with AR announcement

Ahead of Apple’s rumored augmented reality (AR) product announcement due at the end of the summer, Facebook has turned its attention to AR with the announcement of the Camera Effects Platform at its annual F8 developer conference yesterday.The announcement included compelling demonstrations of the technology’s potential. Mark Zuckerberg described a long-term path to cross-platform AR, which contradicts the specialized proprietary hardware decisions decided by almost every other AR company including Apple if rumors are true.  To read this article in full or to leave a comment, please click here

Demystifying network analytics

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Network analytics is key to helping IT proactively deliver great user experiences, but analytics for the enterprise access network is complicated. Besides the array of connectivity options, the heterogeneous mix of client devices and the different application models to accommodate, there are volumes of relevant input data that can be used, such as:

  • Actual data packets generated by real clients
  • Synthetic data packets generated by simulated clients
  • Real-time metrics and traps from infrastructure
  • Logs/configuration from infrastructure and servers
  • Flow data from infrastructure
  • APIs from application servers
Figure 1. How network data is used today.  Is this really analytics? Nyansa

Figure 1. How network data is used today. Is this really analytics?

To read this article in full or to leave a comment, please click here

Demystifying network analytics

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Network analytics is key to helping IT proactively deliver great user experiences, but analytics for the enterprise access network is complicated. Besides the array of connectivity options, the heterogeneous mix of client devices and the different application models to accommodate, there are volumes of relevant input data that can be used, such as: Actual data packets generated by real clients Synthetic data packets generated by simulated clients Real-time metrics and traps from infrastructure Logs/configuration from infrastructure and servers Flow data from infrastructure APIs from application servers Nyansa Figure 1. How network data is used today. Is this really analytics?To read this article in full or to leave a comment, please click here

Introducing the Modernize Traditional Apps Program

Today at DockerCon, we announced the Modernize Traditional Applications (MTA) Program to help enterprises make their existing legacy apps more secure, more efficient and portable to hybrid cloud infrastructure.  Collaboratively developed and brought to market with partners Avanade, Cisco, HPE, and Microsoft, the MTA Program consists of consulting services, Docker Enterprise Edition, and hybrid cloud infrastructure from partners to modernize existing .NET Windows or Java Linux applications in five days or less.  Designed for IT operations teams, the MTA Program modernizes existing legacy applications without modifying source code or re-architecting the application.

Modernize Traditional Apps with Docker

The First Step In The Microservices Journey

In working with hundreds of our enterprise IT customers the last couple years, when we sit down with them one of the first questions they inevitably ask is, “What is the first step we should take toward microservices?”

Through experience we have found that, for the vast majority of them, the best answer is, “Start with what you have today – with your existing applications.”   Why is this the right place for them to start?  Because it recognizes two realities facing enterprise IT organizations today: existing applications consume 80% of IT budgets, and most IT organizations responsible for existing Continue reading

Bypass Microsoft’s update block for Windows 7, 8.1 PCs running Kaby Lake, Ryzen

Although Microsoft blocked Windows updates to Windows 7 and 8.1 PCs powered by new CPUs, one unhappy user found a way around the block so devices with next-generation processors can continue to get security updates for the older operating systems.Microsoft warned users several times that they needed to jump on the Windows 10 bandwagon. That didn’t go over very well, so Microsoft extended Windows 7 and 8.1 support on some Skylake-powered devices.To read this article in full or to leave a comment, please click here

Bypass Microsoft’s update block for Windows 7, 8.1 PCs running Kaby Lake, Ryzen

Although Microsoft blocked Windows updates to Windows 7 and 8.1 PCs powered by new CPUs, one unhappy user found a way around the block so devices with next-generation processors can continue to get security updates for the older operating systems.Microsoft warned users several times that they needed to jump on the Windows 10 bandwagon. That didn’t go over very well, so Microsoft extended Windows 7 and 8.1 support on some Skylake-powered devices.To read this article in full or to leave a comment, please click here

Introducing SSL for SaaS

If you’re running a SaaS company, you know how important it is that your application is performant, highly available, and hardened against attack. Your customers—and your revenue stream—depend on it. Putting your app behind a solution such as Cloudflare is an obvious move for your own infrastructure, but how do you securely (and easily) extend these benefits to your customers?

If your customers interact with your app on your domain and don’t care about branding under their custom or “vanity” domain (or aren’t paying you for the ability to do so), the solution is straightforward: onboard your domain to Cloudflare and serve the app at either https://app.yourcompany.ltd or https://yourcustomer.yourcompany.ltd. But if your customers want to host your application, portal, content management solution, etc. on their own domain for improved SEO and discoverability, e.g., https://app.yourcustomer.site the solution is not so easy.

Easily extend the benefits of Cloudflare to your customers, one hostname at a time

SSL for SaaS - Process Overview

Until today, your best bet was to ask them to CNAME over to your infrastructure, have them generate a private key and CSR, send the latter to a CA for signing, and then securely provide you with the Continue reading

IDG Contributor Network: StorageOS jumps on the ‘storage for Docker’ bandwagon

As one of the earliest backers of recently shuttered vendor ClusterHQ, I’ve seen a long and torturous journey for Docker add-on vendors. Part of this is a timing issue—ClusterHQ was pretty early, and arguably burned a bunch of its hard-earned cash too early.But some of the issues are more ecosystem related. When Docker, the commercial entity behind the eponymously named open-source project, was first founded, it received massive interest from funders. Multiple funding rounds saw Docker Inc. achieve incredible valuation levels that many predicted would be problematic in the future.+ Also on Network World: 5 reasons developers love containers + That prediction would seem to have eventuated, and the recent high-profile rise of Kubernetes certainly increased the pain Docker feels. While many will be quick to point out that Docker and Kubernetes aren’t mutually exclusive, Docker’s valuation was arguably predicated on the company’s ability to expand its footprint far further into the orchestration aspects of containers. The fact that an open-source initiative came to bear, and one that has the proven track record of being directly descended from the systems that Google uses to run its own massive business, certainly put the pressure on Docker.To read this Continue reading

New FCC web portal opens for 5G experimenters

Got a fantastic, futuristic 5G wireless application you need to try out, but you need an FCC license to start testing? It’s about to get easier to get a program experimental license, thanks to a new web portal announced days ago by the FCC, in partnership with NYU and the University of Colorado Boulder.The idea is to make it simpler for research labs, universities, manufacturers and others to obtain the necessary permission to test new devices, while also ensuring that existing services aren’t impacted by testing.+ALSO ON NETWORK WORLD: Secrets of bimodal IT success: Tiger teams, skunkworks and the camel’s nose + Galaxy S8+ review: The future of Android is nowTo read this article in full or to leave a comment, please click here

Tap the power of Google’s Go language

Google's Go is an open source programming language that makes it easy to build simple, reliable, and efficient software. It’s part of the programming language lineage that started with Tony Hoare’s Communicating Sequential Processes, and it includes Occam, Erlang, Newsqueak, and Limbo.Use canonical import paths for repositories with aliasesTo read this article in full or to leave a comment, please click here(Insider Story)

Blockchain: ‘Overhyped’ buzzword or real-deal enterprise solution?

While blockchain is among the hottest technologies in the enterprise security, data storage and file-sharing arenas, many experts question its use or even whether it's really as secure as billed.As marketplaces struggle with how best to deploy the distributed ledger technology, IT vendors are beginning to test it in their products -- in some cases, as a reaction to  customer inquiries rather than a proactive move."It's a very hot topic right now," said Zulfikar Ramzan, CTO of RSA Security, a subsidiary of the Dell EMC Infrastructure Solutions Group. "We are definitely getting a lot of inbound inquiries around blockchain and its implication within enterprise environments. I think it's driven largely by the fact that when there's a new technology out there, to some degree people want to be buzzword compliant with the latest and greatest."To read this article in full or to leave a comment, please click here

Blockchain: ‘Overhyped’ buzzword or real-deal enterprise solution?

While blockchain is among the hottest technologies in the enterprise security, data storage and file-sharing arenas, many experts question its use or even whether it's really as secure as billed.As marketplaces struggle with how best to deploy the distributed ledger technology, IT vendors are beginning to test it in their products -- in some cases, as a reaction to  customer inquiries rather than a proactive move."It's a very hot topic right now," said Zulfikar Ramzan, CTO of RSA Security, a subsidiary of the Dell EMC Infrastructure Solutions Group. "We are definitely getting a lot of inbound inquiries around blockchain and its implication within enterprise environments. I think it's driven largely by the fact that when there's a new technology out there, to some degree people want to be buzzword compliant with the latest and greatest."To read this article in full or to leave a comment, please click here

The 20 highest-paying markets for cyber security engineers

Big spendersImage by UnsplashIT security professionals are in high demand in most job markets, but some metropolitan areas are better than others when it comes to offering a top pay check. Randstat recently released its annual IT salary study, which looked at the top 45 highest paying markets in 27 states. Following are the top 20 markets for cyber security engineers, based on the medium salary reported.To read this article in full or to leave a comment, please click here

Cybersecurity companies to watch

In canvassing the security industry, CBInsights came up with a list of startups with early-to mid-stage high-momentum that have pioneering technology with the potential to transform cybersecurity. They split the companies into the following categories: Quantum Encryption, Predictive Intelligence, Deception Security, Autonomous Systems, IoT Security, Mobile Security, Automobile Security, Critical Infrastructure Security, and Cyber Insurance.CB Insights created a Company Mosaic, which uses data to track private company health, using signals including recency of financing, total raised, and investor quality. We’ve gathered this data via our machine learning technology (dubbed The Cruncher) as well as via several thousand direct submissions from firms and  individual professionals.To read this article in full or to leave a comment, please click here(Insider Story)

Cybersecurity companies to watch

In canvassing the security industry, CBInsights came up with a list of startups with early-to mid-stage high-momentum that have pioneering technology with the potential to transform cybersecurity. They split the companies into the following categories: Quantum Encryption, Predictive Intelligence, Deception Security, Autonomous Systems, IoT Security, Mobile Security, Automobile Security, Critical Infrastructure Security, and Cyber Insurance.To read this article in full or to leave a comment, please click here(Insider Story)