How much can a fiber carry? Facebook and Nokia are pushing it

Facebook and Nokia have found a way to push a lot more data through a submarine cable across the Atlantic, which could help the social network keep up with the growth of video and virtual reality.On a 5,500-kilometer (3,400-mile) cable between Ireland and New York, the companies tested a new technique developed at Nokia Bell Labs for increasing the efficiency of fiber-optic cables. They say it comes close to the absolute limit for sending bits over a fiber.Facebook CEO Mark Zuckerberg has said VR is the future of social media. If it is, then the networks that link consumers and data centers will have more data than ever to carry. Higher resolution video also is increasing the burden on networks. For example, Netflix recommends subscribers have at least a 5Mbps broadband connection to stream HD video and 25Mbps for Ultra HD (4K) streams.To read this article in full or to leave a comment, please click here

What it takes to become an IT security engineer

When Scott Copeland got his associate degree in network administration back in 2004, the community college he attended didn’t offer IT security courses, “but it gave me the foundation to learn more about network security,” he says. His determination and thirst for learning led him to his current job as an IT security engineer at FedEx Services in Memphis, Tenn. download What it takes to become an IT security engineer | PDF download CSO Online Getting started After being laid off in 2008 from his first IT job in tech support and systems administration, friends encouraged Copeland to use his networking talents to get a certification that would boost his career. He studied for three months and earned his Cisco Certified Network Associate (CCNA) certification in routing and switching. “CCNA was the biggest helper [for my security career path],” says Copeland. “It’s one of the hardest network certifications in the industry.” Also, he notes, “because it ties networking for firewalls and VPN, it has security components to it.” He also scoured daily posts on Reddit, the news aggregation and discussion website, to learn as much as he could about network and IT security, and to keep up with Continue reading

What it takes to become an IT security engineer

When Scott Copeland got his associate degree in network administration back in 2004, the community college he attended didn’t offer IT security courses, “but it gave me the foundation to learn more about network security,” he says. His determination and thirst for learning led him to his current job as an IT security engineer at FedEx Services in Memphis, Tenn.To read this article in full or to leave a comment, please click here(Insider Story)

Microsoft completes Windows 10 customized for China’s government

Microsoft has wrapped up work on a version of Windows 10 for China's government and state-owned businesses, and is ready to begin selling the software, a state-run newspaper said today."We have worked extensively to make it secure and controllable. We are now ready to serve the market," Alain Crozier, the CEO of Microsoft's Greater China operation, told China Daily.The modified Windows 10 was the result of a December 2015 deal with China Electronics Technology Group (CETC), a state-backed defense contractor. Microsoft and CETC formed a joint venture, C&M Information Technologies, to license the operating system to government agencies and some state-owned enterprises, including ones that control energy, telecommunications and transportation.To read this article in full or to leave a comment, please click here

Peelytics turns peeing into a way to promote products

Not many companies would want you to pee on their product, but one at Cebit positively encourages it.Peelytics of Heidelberg, Germany, has developed a Bluetooth beacon that detects when someone is urinating on it, and for how long. If that person has a hand free to wake up their smartphone, they can "claim" that micturition as their own using the Peelytics app, and perhaps win a prize if they peed for longest.It's all a game designed to encourage people to improve their aim (keeping restrooms cleaner) and to pay attention to promotional messages while in toilets in bars and clubs -- areas that marketers have already identified as prime placements for advertising.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Acoustic attack lets hackers control smartphone sensor

A newfound vulnerability in smartphones could let hackers remotely control the devices.With the acoustic injection attack, “attackers that deliver high intensity acoustic interference in close proximity” can interfere with a device accelerometer and get the sensor to send “attacker–chosen” data to the smartphone’s processor, say researchers from the University of Michigan and University of South Carolina in a paper.Accelerometers measure changes of speed in a device, and they are used industrially to sense vibration for machinery health. In a smartphone, the accelerometer sensor can be used to detect screen orientation, for example.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Acoustic attack lets hackers control smartphone sensor

A newfound vulnerability in smartphones could let hackers remotely control the devices.With the acoustic injection attack, “attackers that deliver high intensity acoustic interference in close proximity” can interfere with a device accelerometer and get the sensor to send “attacker–chosen” data to the smartphone’s processor, say researchers from the University of Michigan and University of South Carolina in a paper.Accelerometers measure changes of speed in a device, and they are used industrially to sense vibration for machinery health. In a smartphone, the accelerometer sensor can be used to detect screen orientation, for example.To read this article in full or to leave a comment, please click here

Upstart Switch Chip Maker Tears Up The Ethernet Roadmap

Ethernet switching has its own kinds of Moore’s Law barriers. The transition from 10 Gb/sec to 100 Gb/sec devices over the past decade has been anything but smooth, and a lot of compromises had to be made to even get to the interim – and unusual – 40 Gb/sec stepping stone towards the 100 Gb/sec devices that are ramping today in the datacenter.

While 10 Gb/sec Ethernet switching is fine for a certain class of enterprise applications that are not bandwidth hungry, for the hyperscalers and cloud builders, 100 Gb/sec is nowhere near enough bandwidth, and 200 Gb/sec, which is

Upstart Switch Chip Maker Tears Up The Ethernet Roadmap was written by Timothy Prickett Morgan at The Next Platform.

UK follows US ban of electronic devices in cabins on some flights

The U.K. is joining the U.S. in its ban restricting passengers from bringing some electronic devices onto flights from the Middle East.Phones, laptops, and tablets that are larger than 16 cm (6.3 inches) in length and wider than 9.3 cm will no longer be allowed in the cabin on select flights coming from several Middle Eastern countries, the U.K.'s department of transportation said on Tuesday. The U.K. said it was in "close contact" with the U.S. since the country announced its own ban on Monday.  However, the U.K. made no mention of any specific risk, only that it faces "evolving" terrorism threats. To read this article in full or to leave a comment, please click here

UK follows US ban of electronic devices in cabins on some flights

The U.K. is joining the U.S. in its ban restricting passengers from bringing some electronic devices onto flights from the Middle East.Phones, laptops, and tablets that are larger than 16 cm (6.3 inches) in length and wider than 9.3 cm will no longer be allowed in the cabin on select flights coming from several Middle Eastern countries, the U.K.'s department of transportation said on Tuesday. The U.K. said it was in "close contact" with the U.S. since the country announced its own ban on Monday.  However, the U.K. made no mention of any specific risk, only that it faces "evolving" terrorism threats. To read this article in full or to leave a comment, please click here

Samsung announces competitor to Siri, Cortana

The field of personal digital assistants is only getting more crowded, with Samsung's new entry Bixby joining the fray. The Korean electronics giant announced the new assistant ahead of the Galaxy 8 smartphone, where it will make its debut. Bixby was thought to be the product of Viv, an AI assistant created by the same team that created Siri before Apple acquired it. Samsung acquired the Viv team last year. But Bixby is a new product from Samsung and intended to be a little different from the typical digital assistant. + Also on Network World: Virtual assistant faceoff: Alexa, Cortana, Google Assistant and Siri + While Bixby will do most of the typical digital assistant functions found in Apple’s Siri and Microsoft’s Cortana, it also adds three new elements: context awareness, cognitive tolerance and completeness. To read this article in full or to leave a comment, please click here

Juniper extends data center interconnect options

Large data center interconnect users needing high-speed connectivity and bandwidth for access to massive cloud resources have a new option to handle these demands.Juniper today rolled out its Open Cloud Interconnect package which includes Dense Wavelength Division Multiplexing optical boards for its QFX10000 Layer 3 spine switch and BTI7800 optical transport switch families as well as software to manage those systems.+More Juniper coverage on Network World: Juniper battles Cisco, Huawei with new cloud infrastructure software, switches+To read this article in full or to leave a comment, please click here

Juniper extends data center interconnect options

Large data center interconnect users needing high-speed connectivity and bandwidth for access to massive cloud resources have a new option to handle these demands.Juniper today rolled out its Open Cloud Interconnect package which includes Dense Wavelength Division Multiplexing optical boards for its QFX10000 Layer 3 spine switch and BTI7800 optical transport switch families as well as software to manage those systems.+More Juniper coverage on Network World: Juniper battles Cisco, Huawei with new cloud infrastructure software, switches+To read this article in full or to leave a comment, please click here

Rough Guide to IETF 98: Scalability and Performance

In this Rough Guide to IETF 98 post I'll highlight some of the Internet Engineering Task Force (IETF) and Internet Research Task Force (IRTF) groups meeting during the IETF 98 meeting in Chicago next week. These groups are working to explore and address more sophisticated ways to use and share available bandwidth, improve Internet performance, and otherwise efficiently get Internet content to where it needs to be.

The tsvwg WG will include presentations and discussions on the L4S and DualQ approaches demonstrated at previous meetings. The WG has two meetings on Monday and Thursday afternoons.

Mat Ford

Rough Guide to IETF 98: All About IPv6

In this post for the Internet Society Rough Guide to IETF 98, I’m reviewing what’s happening related to IPv6 at IETF 98 in Chicago next week.

IPv6 global adoption rates increased by over 50% last year as pools of IPv4 addresses approached depletion at 4 of the 5 Regional Internet Registries, encouraging more network operators and content providers to actively deploy the protocol. With more large ISPs and mobile operators having announced plans to deploy IPv6 during 2017, and increasing interest in Home Networking and the Internet of Things, IPv6 is at the forefront of standardisation work at the IETF.

Mr. Kevin Meynell

Why your cloud strategy should include multiple vendors

For decades, enterprise computing environments have been composed of servers, storage and networking equipment developed by different vendors. Those choices often hinged on the best products to power applications and data -- as well as the enticing volume discounts tossed into enterprise agreements. A similar scenario is playing out in cloud computing infrastructure, where CIOs are grappling with how to best architect systems for multi-vendor, hybrid cloud strategies.A telling exchange on cloud vendors occurred during the Wall Street Journal’s CIO Network event last month when an audience member shared his perspective on the challenges of choosing between different cloud vendors with Adrian Cockcroft, vice president of cloud architecture strategy for Amazon Web Services (AWS), who was speaking on stage.To read this article in full or to leave a comment, please click here

8 tech support best practices

No product or service – or end user – is perfect. This is especially true when it comes to hardware and software. That is why companies, if they want to stay in and grow their business, need to provide help to customers when things go wrong. And while no two products or problems are exactly alike, the best tech support departments share the following eight traits.[ Related: 11 tips for improving your company's customer support ]1. Offer multi-channel tech support, including live chat. “The ubiquity of instant communication channels has meant that people want to get the support they want, whenever they want and through whatever method is most convenient,” says Amir Farhi, vice president, strategic alliances & business development, WalkMe. “Rather than relying [just] on email and phone communications, businesses should provide [tech support via] social media channels, [live chat] and messaging apps such as WhatsApp.” They should also “make sure [tech support representatives] are readily available and trained to use all channels.”To read this article in full or to leave a comment, please click here