What is bitemporal and why should the enterprise care?

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Today, databases are the primary system of record, and organizations are required to keep an accurate picture of all the facts, as they occur. Unfortunately, traditional databases are only temporal and cannot provide a truly accurate picture of your business at different points-in-time.What organizations need today, particularly in regulated industries, is support for bitemporal data.  With a bitemporal database, you can store and query data along two timelines with timestamps for both valid times—when a fact occurred in the real world (“what you knew”), and also system time—when that fact was recorded to the database (“when you knew it”). To read this article in full or to leave a comment, please click here

10 practical privacy tips for the post-privacy internet

ISPs and providers can now sell your data and browser histories. The U.S. Congress sold you out. If you had any browsing dignity, you don’t now. Too bad you couldn’t pay the legislators as much as the data wolves.You should have been doing these things all along, but now it’s time to decide just how much dignity you have. Most of you won’t bother. This isn’t for you. Click away, and go surf.For those remaining, take these privacy tips seriously.1. Educate yourself about cookies and clean them out regularly For some of you, this means a daily cleanout. What you DO NOT clean out (will cause you hassles) are cookies associated with financial institutions. They will put you through a drill when they don’t find the cookie that they like. Scrape them. Every browser has the ability to do this, with Chrome being the most difficult. But we’re not surprised because it’s from Google—the company whose very life depends on knowing information about you.To read this article in full or to leave a comment, please click here

10 practical privacy tips for the post-privacy internet

ISPs and providers can now sell your data and browser histories. The U.S. Congress sold you out. If you had any browsing dignity, you don’t now. Too bad you couldn’t pay the legislators as much as the data wolves.You should have been doing these things all along, but now it’s time to decide just how much dignity you have. Most of you won’t bother. This isn’t for you. Click away, and go surf.For those remaining, take these privacy tips seriously.1. Educate yourself about cookies and clean them out regularly For some of you, this means a daily cleanout. What you DO NOT clean out (will cause you hassles) are cookies associated with financial institutions. They will put you through a drill when they don’t find the cookie that they like. Scrape them. Every browser has the ability to do this, with Chrome being the most difficult. But we’re not surprised because it’s from Google—the company whose very life depends on knowing information about you.To read this article in full or to leave a comment, please click here

IBM technology creates smart wingman for self-driving cars

IBM said that it has patented a machine learning technology that defines how to shift control of an autonomous vehicle between a human driver and a vehicle control processor in the event of a potential emergency.+More on Network World: IBM on the state of network security: AbysmalBasically the patented IBM system employs onboard sensors and artificial intelligence to determine potential safety concerns and control whether self-driving vehicles are operated autonomously or by surrendering control to a human driver.To read this article in full or to leave a comment, please click here

IBM technology creates smart wingman for self-driving cars

IBM said that it has patented a machine learning technology that defines how to shift control of an autonomous vehicle between a human driver and a vehicle control processor in the event of a potential emergency.+More on Network World: IBM on the state of network security: AbysmalBasically the patented IBM system employs onboard sensors and artificial intelligence to determine potential safety concerns and control whether self-driving vehicles are operated autonomously or by surrendering control to a human driver.To read this article in full or to leave a comment, please click here

Do you own your social media contacts or does your employer?

Who among us hasn't taken a contact list when they left a job? Whether you leave voluntarily or involuntarily, one of the things you pack up is your Rolodex, or the modern equivalent, to take with you to the next job. It's pretty much standard.But what if you are a public figure and have a sizable social media following? Can you keep your millions of Facebook and/or Twitter followers? That issue has not been hashed out, but it might be in Dallas.+ Also on Network World: Facebook working with fact-checkers to weed out fake news + The Blaze, a news network established by talk show host Glenn Beck, is in the midst of parting company with its highest profile on-air talent aside from Beck. The company is severing ties with Tomi Lahren, a hotheaded 24-year-old whose on-air blasts of "snowflakes" and Black Lives Matter have made her a rising star in conservative circles.To read this article in full or to leave a comment, please click here

SS8’s time machine is designed to automate the hunt for compromises  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  When it comes to enterprise security, it has long been established that prevention, though critical, is not enough. Prevention largely depends on knowing what is bad and priming security devices like firewalls and intrusion prevention systems with the rules necessary to keep bad stuff out. The problem is, something can be bad but nobody knows it yet, so there’s no rule to put in the firewall. An attacker’s damage can be done long before the rule is created.To read this article in full or to leave a comment, please click here

SS8’s time machine is designed to automate the hunt for compromises  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  When it comes to enterprise security, it has long been established that prevention, though critical, is not enough. Prevention largely depends on knowing what is bad and priming security devices like firewalls and intrusion prevention systems with the rules necessary to keep bad stuff out. The problem is, something can be bad but nobody knows it yet, so there’s no rule to put in the firewall. An attacker’s damage can be done long before the rule is created.To read this article in full or to leave a comment, please click here

What Is Network Collective?

In short, Network Collective is a bi-weekly video roundtable where data networking engineers talk about industry trends, challenging projects, and what it takes to do network engineering day-to-day.  For a more thorough description of what were up to, please take a minute to watch the video above.

If you want to know exactly who is behind Network Collective, you can find that information on our Who Is Network Collective? page.And if you’re interested in being a guest on Network Collective, please tell us a little bit about who you are by filling out the form here.

The post What Is Network Collective? appeared first on Network Collective.

Mobile networks still stink, with more workers coming

A new survey sponsored by NetMotion Software and WBR Digital shows that mobile network connectivity problems are the top reason for mobile-related trouble ticket submissions at enterprise companies. But that might not matter in terms of growth – as the same survey indicated that more than half the companies (56%) expected their mobile workforce to increase this year.Despite Wi-Fi networks and mobile WAN (3G, 4G, etc.) being available for the better part of a decade or more, as well as mobile devices that have been in the hands of workers for almost the same amount of time, frustrations still exist when it comes to mobile networks. “Intermittent network connectivity or poor application stability can leave an employee cut off from essential information they need to do their jobs, leading to a frustrated worker and an unsatisfactory customer engagement,” the executive summary notes.To read this article in full or to leave a comment, please click here

Extreme-ly Interesting Times In Networking

If you’re a fan of Extreme Networks, the last few months have been pretty exciting for you. Just yesterday, it was announced that Extreme is buying the data center networking business of Brocade for $55 million once the Broadcom acquisition happens. Combined with the $100 million acquisition of Avaya’s campus networking portfolio on March 7th and the purchase of Zebra Wireless (nee Motorola) last September, Extreme is pushing itself into the market as a major player. How is that going to impact the landscape?

Building A Better Business

Extreme has been a player in the wireless space for a while. Their acquisition of Enterasys helped vault them into the mix with other big wireless players. Now, the rounding out of the portfolio helps them complete across the board. They aren’t just limited to playing with stadium wifi and campus technologies now. The campus networking story that was brought in through Avaya was a must to help them compete with Aruba, A Hewlett Packard Enterprise Company. Aruba owns the assets of HPE’s campus networking business and has been leveraging them effectively.

The data center play was an interesting one to say the least. I’ve mused recently that Brocade’s data center business Continue reading

Millions of websites affected by unpatched flaw in Microsoft IIS 6 web server

A proof-of-concept exploit has been published for an unpatched vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that's no longer supported but still widely used.The exploit allows attackers to execute malicious code on Windows servers running IIS 6.0 with the privileges of the user running the application. Extended support for this version of IIS ended in July 2015 along with support for its parent product, Windows Server 2003.Even so, independent web server surveys suggest that IIS 6.0 still powers millions of public websites. In addition, many companies might still run web applications on Windows Server 2003 and IIS 6.0 inside their corporate networks, so this vulnerability could help attackers perform lateral movement if they access such networks through other means.To read this article in full or to leave a comment, please click here

Millions of websites affected by unpatched flaw in Microsoft IIS 6 web server

A proof-of-concept exploit has been published for an unpatched vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that's no longer supported but still widely used.The exploit allows attackers to execute malicious code on Windows servers running IIS 6.0 with the privileges of the user running the application. Extended support for this version of IIS ended in July 2015 along with support for its parent product, Windows Server 2003.Even so, independent web server surveys suggest that IIS 6.0 still powers millions of public websites. In addition, many companies might still run web applications on Windows Server 2003 and IIS 6.0 inside their corporate networks, so this vulnerability could help attackers perform lateral movement if they access such networks through other means.To read this article in full or to leave a comment, please click here