SnapLogic’s AI simplifies enterprise software connections

SnapLogic wants to make it easier for users of its enterprise software integration platform to connect components of their business systems. The company has unveiled a new feature that uses machine learning to suggest what users may want to do.The idea behind the new feature, announced this week, is to make it easier to connect and move data between enterprise software systems. SnapLogic's service lets companies take a data source like a Concur instance, and synchronize that with information an ERP system like Microsoft Dynamics. To read this article in full or to leave a comment, please click here

ICSA Labs Certifies NSX Micro-segmentation Capabilities

ICSA_Cert_Firewall-Corp_2C_300DPI_975x563

VMware NSX  has achieved ICSA labs Corporate Firewall Certification.

With the release of NSX for vSphere® 6.3, VMware has not only introduced several key security features such as Application Rule Manager and Endpoint Monitoring, which provide deep visibility into the application, and enable a rapid zero-trust deployment, but has also achieved Corporate Firewall Certification in independent testing performed by ICSA labs, a leading third-party testing and certification body and independent division of Verizon.

VMware NSX for vSphere 6.3 has been tested against an industry-accepted standard to which a consortium of firewall vendors, end users and ICSA labs contributed, and met all the requirements in the Baseline and Corporate module of the ICSA Module Firewall Certification Criteria version 4.2.
NSX is the only true micro-segmentation platform to achieve ICSA Firewall certification — with the NSX Distributed Firewall providing kernel-based, distributed stateful firewalling, and the Edge Services Gateway providing services such as North-South firewalling, NAT, DHCP, VPN, load balancing and high availability. VMware NSX provides security controls aligned to the application and enables a Zero-Trust model, independent of network topology.

The ICSA Firewall Certification criteria focus on several key firewall aspects, including stateful services, logging and persistence. ICSA also validates Continue reading

Docker wants to help put old enterprise apps into containers

Docker is offering enterprises an easier on-ramp to using containers with a new consulting program aimed at taking a legacy application and migrating it to a container in five days.The idea behind the program is to show companies the concrete benefits of moving older applications over to containers, without asking them to undergo a massive transformation effort. Docker is working with Cisco, Avanade, Microsoft, and Hewlett Packard Enterprise on the Modernize Traditional Applications program, which will focus on migrating an application to modern infrastructure and getting it set up inside a containerized environment.To read this article in full or to leave a comment, please click here

DHS warns on immigration spoofing scam

You could probably see this one and others like it coming, given the current immigration quagmire that is the United States immigration environment. Today the U.S. Department of Homeland Security issued a fraud alert saying criminals have been using the agency’s Hotline as part of a spoofing scam to steal personal information.+More on Network World: DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification+The DHS Office of Inspector General (OIG) said perpetrators of the scam represent themselves as employees with “U.S. Immigration” and can alter caller ID systems to make it appear that the call is coming from the DHS OIG Hotline telephone number (1-800-323-8603).To read this article in full or to leave a comment, please click here

DHS warns on immigration spoofing scam

You could probably see this one and others like it coming, given the current immigration quagmire that is the United States immigration environment. Today the U.S. Department of Homeland Security issued a fraud alert saying criminals have been using the agency’s Hotline as part of a spoofing scam to steal personal information.+More on Network World: DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification+The DHS Office of Inspector General (OIG) said perpetrators of the scam represent themselves as employees with “U.S. Immigration” and can alter caller ID systems to make it appear that the call is coming from the DHS OIG Hotline telephone number (1-800-323-8603).To read this article in full or to leave a comment, please click here

Riverbed absorbs WIFi vendor Xirrus, reaches for the edge of the network

Network management company Riverbed Technology today announced its intent to acquire enterprise Wi-Fi equipment vendor Xirrus for an undisclosed fee.Riverbed touted that the acquisition, which it expects to close by the end of the month, will expand its software-defined WAN solution, and integrate Xirrus’ robust Wi-Fi products into the broader Riverbed ecosystem.+ALSO ON NETWORK WORLD: New FCC web portal opens for 5G experimenters + Trump's cybersecurity mystery: 90 days in, where's the plan?To read this article in full or to leave a comment, please click here

39% off Exploring Raspberry Pi: Interfacing to the Real World with Embedded Linux, Paperback – Deal Alert

The Raspberry Pi's most famous feature is its adaptability. It can be used for thousands of electronic applications (See: "How to build a Raspberry Pi retrogaming emulation console"). This book, Exploring Raspberry Pi, is the innovators guide to bringing Raspberry Pi to life. The book favors engineering principles over a 'recipe' approach to give you the skills you need to design and build your own projects. You'll understand the fundamental principles in a way that transfers to any type of electronics, electronic modules, or external peripherals, using a "learning by doing" approach that caters to both beginners and experts. The book begins with basic Linux and programming skills, and helps you stock your inventory with common parts and supplies. Next, you'll learn how to make parts work together to achieve the goals of your project, no matter what type of components you use. The companion website provides a full repository that structures all of the code and scripts, along with links to video tutorials and supplementary content that takes you deeper into your project. The list price has been reduced 39% on Amazon, from $35 to $21.40. See this deal now on Amazon. A complete Raspberry Pi Continue reading

IPv6 Extensions Are Already Dead

In this wiki entry disguised as a RFC 7872, “Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World” highlights IPv6 Extension Headers are effectively unusable since internet providers are dropping IPv6 fragment and failing to support Extension Headers.  In IPv6, an extension header is any header that follows the initial 40 […]

The post IPv6 Extensions Are Already Dead appeared first on EtherealMind.

Twitter’s porn problem is ‘trending’

News this morning that former New England Patriots player Aaron Hernandez reportedly had committed suicide sent the murderer’s name to the top of Twitter’s “trending” list. Clicking on it brought back a string of tweets that was positively littered with graphic pornography. Twitter How much porn? I reported and blocked at least a half-dozen tweets and my rough estimate would be that about 1 in 50 were obscene (the flow has since receded to a trickle). I have been a daily, heavy user of Twitter since 2008 and this is by no means the first time I have encountered porn there. And, yes, it has previously been noticeable in instances where fast-breaking news makes the trending list. However, today’s deluge was by far the most concentrated and, well, offensive.   To read this article in full or to leave a comment, please click here

Twitter’s porn problem is ‘trending’

News this morning that former New England Patriots player Aaron Hernandez reportedly had committed suicide sent the murderer’s name to the top of Twitter’s “trending” list. Clicking on it brought back a string of tweets that was positively littered with graphic pornography. Twitter How much porn? I reported and blocked at least a half-dozen tweets and my rough estimate would be that about 1 in 50 were obscene (the flow has since receded to a trickle). I have been a daily, heavy user of Twitter since 2008 and this is by no means the first time I have encountered porn there. And, yes, it has previously been noticeable in instances where fast-breaking news makes the trending list. However, today’s deluge was by far the most concentrated and, well, offensive.   To read this article in full or to leave a comment, please click here

Surveys show high hopes, deep concerns about IoT

Industrial IoT's big future is starting to become a reality, but many companies still don't think they're ready for it.Those are some of the findings in surveys released on Tuesday by the Business Performance Innovation Network and the Eclipse IoT Working Group. They reflect the views of hundreds of executives and developers from a range of industries.More than half of the executives think their industries are already adopting IoT through either pilots or large-scale deployments, and 57 percent are at least in the planning stages themselves, BPI Network said. About 350 executives from around the world responded to the survey by BPI Network, an organization of business leaders.To read this article in full or to leave a comment, please click here

Surveys show high hopes, deep concerns about IoT

Industrial IoT's big future is starting to become a reality, but many companies still don't think they're ready for it.Those are some of the findings in surveys released on Tuesday by the Business Performance Innovation Network and the Eclipse IoT Working Group. They reflect the views of hundreds of executives and developers from a range of industries.More than half of the executives think their industries are already adopting IoT through either pilots or large-scale deployments, and 57 percent are at least in the planning stages themselves, BPI Network said. About 350 executives from around the world responded to the survey by BPI Network, an organization of business leaders.To read this article in full or to leave a comment, please click here

Oracle adds attention analytics to its data cloud with Moat buy

Oracle's online advertising analytics platform will soon know even more about what you are watching, where and when: The company has agreed to buy Moat, which aims to track how much attention consumers are paying to online media.Moat's platform tracks browsing and viewing habits on desktop and mobile devices, and even connected TVs. It touts its ability to separate out non-human traffic so advertisers don't pay for clicks from bots, and to quantify the audibility and visibility of ads.Oracle plans to add Moat's information about viewing habits to Oracle Data Cloud, which provides analytics tools and data about what consumers do and buy to marketers and publishers. Moat will continue to operate as an independent platform within that division, Oracle said Wednesday.To read this article in full or to leave a comment, please click here

The Agility and Flexibility of Docker including Oracle Database and Development Tools

A company’s important applications often are subjected to random and capricious changes due to forces well beyond the control of IT or management.  Events like a corporate merger or even a top programmer on an extended vacation can have an adverse impact on the performance and reliability of critical company infrastructure.

During the second day keynote at DockerCon 2017 in Austin TX, Lily Guo and Vivek Saraswat showed a simulation of how to use Docker Enterprise Edition and its application transformation tools to respond to random events that threaten to undermine the stability of their company critical service.

The demo begins as two developers are returning to work after an extended vacation.  They discover that, during their absence, their CEO has unexpectedly hired an outside contract programmer to rapidly code and introduce an entire application service that they know nothing about.  As they try to build the new service, however, Docker Security Scan detects that a deprecated library has been incorporated by the contractor.  This library is found to have a security vulnerability which violates the company’s best practice standards.  As part of Docker Enterprise Edition Advanced, Docker Security Scan automatically keeps track of code contributions and acts as a Continue reading

Facebook beats Apple to the punch with AR announcement

Ahead of Apple’s rumored augmented reality (AR) product announcement due at the end of the summer, Facebook has turned its attention to AR with the announcement of the Camera Effects Platform at its annual F8 developer conference yesterday.The announcement included compelling demonstrations of the technology’s potential. Mark Zuckerberg described a long-term path to cross-platform AR, which contradicts the specialized proprietary hardware decisions decided by almost every other AR company including Apple if rumors are true.  To read this article in full or to leave a comment, please click here

Demystifying network analytics

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Network analytics is key to helping IT proactively deliver great user experiences, but analytics for the enterprise access network is complicated. Besides the array of connectivity options, the heterogeneous mix of client devices and the different application models to accommodate, there are volumes of relevant input data that can be used, such as:

  • Actual data packets generated by real clients
  • Synthetic data packets generated by simulated clients
  • Real-time metrics and traps from infrastructure
  • Logs/configuration from infrastructure and servers
  • Flow data from infrastructure
  • APIs from application servers
Figure 1. How network data is used today.  Is this really analytics? Nyansa

Figure 1. How network data is used today. Is this really analytics?

To read this article in full or to leave a comment, please click here

Demystifying network analytics

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Network analytics is key to helping IT proactively deliver great user experiences, but analytics for the enterprise access network is complicated. Besides the array of connectivity options, the heterogeneous mix of client devices and the different application models to accommodate, there are volumes of relevant input data that can be used, such as: Actual data packets generated by real clients Synthetic data packets generated by simulated clients Real-time metrics and traps from infrastructure Logs/configuration from infrastructure and servers Flow data from infrastructure APIs from application servers Nyansa Figure 1. How network data is used today. Is this really analytics?To read this article in full or to leave a comment, please click here