Microsoft’s new software tool helps enterprises evaluate cloud move

IT professionals who want help getting a handle on a potential cloud migration have a new tool from Microsoft. The company is offering a Cloud Migration Assessment service that walks customers through an evaluation of the resources they currently use, in order to determine what a move to the cloud would cost.Microsoft’s cost calculation is driven in part by the Azure Hybrid Use Benefit , which lets customers apply their existing Windows Server licenses with Software Assurance to virtual machines running in Microsoft’s cloud. That means customers only have to pay the base price for the compute resources they use.To read this article in full or to leave a comment, please click here

17% off UBTECH Jimu Robot DIY Buzzbot/Muttbot Robotics Kit – Deal Alert

Build and program your own robot. The Jimu Robot BuzzBot & MuttBot Kit is a do it yourself, robotics building kit with Bluetooth. The BuzzBot & MuttBot Kit includes a central control unit, six digital servo motors that allow movement, wiring, a rechargeable lithium battery and power adapter, 249 interlocking parts with easy snap-in design and quick links to the Jimu App that shows you how to build and program easily. The Jimu App gives you step-by-step building instructions with 360 degree pan, tilt, and zoom capability. The models provided in the App will help you learn how to build all the robots, from beginner to advanced robots. There are pre-programmed actions for you to choose from, manipulate, and make uniquely your own. The App works with both iOS and Android devices. The digital servo motors allow the robot to perform amazing movements from the menu of pre-programmed actions or new actions you create and save with the action capture function in the app. The kit's typical list price of $149.99 has been reduced 17% to $124.99. See the deal now on Amazon.To read this article in full or to leave a comment, please click here

Changing Internet Standards to Build A Secure Internet

We’ve been working with registrars and registries in the IETF on making DNSSEC easier for domain owners, and over the next two weeks we’ll be starting out by enabling DNSSEC automatically for .dk domains.

DNSSEC: A Primer

Before we get into the details of how we've improved the DNSSEC experience, we should explain why DNSSEC is important and the function it plays in keeping the web safe.

DNSSEC’s role is to verify the integrity of DNS answers. When DNS was written in the early 1980’s, it was only a few researchers and academics on the internet. They all knew and trusted each other, and couldn’t imagine a world in which someone malicious would try to operate online. As a result, DNS relies on trust to operate. When a client asks for the address of a hostname like www.cloudflare.com, without DNSSEC it will trust basically any server that returns the response, even if it wasn’t the same server it originally asked. With DNSSEC, every DNS answer is signed so clients can verify answers haven’t been manipulated over transit.

The Trouble With DNSSEC

If DNSSEC is so important, why do so few domains support it? First, for a domain to Continue reading

WEBINAR Q&A: Modernize Traditional Applications with Docker Enterprise Edition

This week at DockerCon, we announced the Modernize Traditional Applications (MTA) Program to help enterprises make their existing legacy apps more secure, more efficient and portable to hybrid cloud infrastructure. This webinar covers the importance of “WHY NOW and HOW” to start modernizing traditional applications with Docker Enterprise Edition. Legacy applications often serve critical business needs and have to be maintained for a long time. The maintenance of these applications can become expensive and very time consuming. Some applications may have been written decades ago, grown to millions of lines of code  and the team that built and deployed the app may no longer be at your company. That can pose a challenge for app maintenance, security and support. Docker Enterprise Edition and the Image2Docker Tool presents a unique opportunity to modernize these apps into containers to make them portable, more secure and cost efficient to operate.

View the recorded session below and read through some of the most popular questions

.

Modernizing Legacy Applications with Docker Enterprise Edition

Q: Do I need to follow all the steps in the exact sequential manner or do all of them to qualify as modernizing traditional applications?

A:  Outside of the first step of taking the existing app and converting it to a Continue reading

Cisco Services aims to take the risk out of the jump to digital

About a year ago, Cisco embarked on a new branding campaign, telling its customers there’s “Never Been A Better Time” to become a digital organization and create new experiences for employees and customers. However, the path to becoming digital may not be that obvious, as we are connecting more things to our network, costs are escalating, the skills gap is widening, and IT is becoming more dynamic and distributed. + Also on Network World: Cisco targets digital business transformation with new certifications + Put this all together, and CIOs face a difficult situation. Digital transformation requires businesses to use technology to move fast, but IT complexity is clearly on the rise. Technology leaders are now in a situation that seems to be untenable: Accelerate business transformation while trying to completely revamp the way IT is run within the organization. I’ve heard the analogy that it’s like changing the wings on a plane while it’s flying, but it’s more like changing the entire plane and the people flying it while flying. So, where can businesses turn for help?To read this article in full or to leave a comment, please click here

There’s never been a better time for Cisco Services

About a year ago, Cisco embarked on a new branding campaign, telling its customers there’s “Never Been A Better Time” to become a digital organization and create new experiences for employees and customers. However, the path to becoming digital may not be that obvious, as we are connecting more things to our network, costs are escalating, the skills gap is widening, and IT is becoming more dynamic and distributed. + Also on Network World: Cisco targets digital business transformation with new certifications + Put this all together, and CIOs face a difficult situation. Digital transformation requires businesses to use technology to move fast, but IT complexity is clearly on the rise. Technology leaders are now in a situation that seems to be untenable: Accelerate business transformation while trying to completely revamp the way IT is run within the organization. I’ve heard the analogy that it’s like changing the wings on a plane while it’s flying, but it’s more like changing the entire plane and the people flying it while flying. So, where can businesses turn for help?To read this article in full or to leave a comment, please click here

There’s never been a better time for Cisco Services

About a year ago, Cisco embarked on a new branding campaign, telling its customers there’s “Never Been A Better Time” to become a digital organization and create new experiences for employees and customers. However, the path to becoming digital may not be that obvious, as we are connecting more things to our network, costs are escalating, the skills gap is widening, and IT is becoming more dynamic and distributed. + Also on Network World: Cisco targets digital business transformation with new certifications + Put this all together, and CIOs face a difficult situation. Digital transformation requires businesses to use technology to move fast, but IT complexity is clearly on the rise. Technology leaders are now in a situation that seems to be untenable: Accelerate business transformation while trying to completely revamp the way IT is run within the organization. I’ve heard the analogy that it’s like changing the wings on a plane while it’s flying, but it’s more like changing the entire plane and the people flying it while flying. So, where can businesses turn for help?To read this article in full or to leave a comment, please click here

Face-off: Cisco vs. Fortinet for enterprise firewalls

Firewalls have been on the front lines of network security for 25 years. Over time they’ve evolved beyond simple packet filtering to take on a wider and deeper variety of tasks to block modern threats. Today, two of the top enterprise firewalls are Cisco’s Adaptive Security Appliance (ASA) and Fortinet’s Fortigate, according to reviews by users in the IT Central Station community.To read this article in full or to leave a comment, please click here(Insider Story)

Face-off: Cisco vs. Fortinet for enterprise firewalls

Firewalls have been on the front lines of network security for 25 years. Over time they’ve evolved beyond simple packet filtering to take on a wider and deeper variety of tasks to block modern threats. Today, two of the top enterprise firewalls are Cisco’s Adaptive Security Appliance (ASA) and Fortinet’s Fortigate, according to reviews by users in the IT Central Station community.One reviewer, a manager of engineering at a retailer, says Cisco’s ASA is “a solid, stable and consistent firewall platform,” but there’s room for improvement when the enterprise needs to manage multiple firewalls from a central point. “Cisco’s answer is Cisco Security Manager (CSM). Unfortunately, this is a suite of applications that is in much need of an overhaul. It is riddled with bugs and lacks the intuitive experience found in competing vendor offerings.”To read this article in full or to leave a comment, please click here(Insider Story)

A Look at Facebook’s Interactive Neural Network Visualization System

There has been much discussion about the “black box” problem of neural networks. Sophisticated models can perform well on predictive workloads, but when it comes to backtracking how the system came to its end result, there is no clear way to understand what went right or wrong—or how the model turned on itself to arrive a conclusion.

For old-school machine learning models, this was not quite the problem it is now with non-linear, hidden data structures and countless parameters. For researchers deploying neural networks for scientific applications, this lack of reproducibility from the black box presents validation hurdles, but for

A Look at Facebook’s Interactive Neural Network Visualization System was written by Nicole Hemsoth at The Next Platform.

Microsoft fixes 45 flaws, including three actively exploited vulnerabilities

Microsoft released its monthly security-patch bundle Tuesday, fixing 45 unique vulnerabilities, three of which are publicly known and targeted by hackers.The top priority this month should be given to the Microsoft Office security update because one of the fixed flaws has been actively exploited by attackers since January to infect computers with malware. Over the past few days this vulnerability, tracked as CVE-2017-0199, has seen widespread exploitation.To read this article in full or to leave a comment, please click here

Microsoft fixes 45 flaws, including three actively exploited vulnerabilities

Microsoft released its monthly security-patch bundle Tuesday, fixing 45 unique vulnerabilities, three of which are publicly known and targeted by hackers.The top priority this month should be given to the Microsoft Office security update because one of the fixed flaws has been actively exploited by attackers since January to infect computers with malware. Over the past few days this vulnerability, tracked as CVE-2017-0199, has seen widespread exploitation.To read this article in full or to leave a comment, please click here

Hacked Dallas sirens get extra encryption to fend off future attacks

Dallas city officials have added extra encryption and other security measures to the outdoor warning sirens hacked early Saturday.The hack also prompted the city to evaluate critical systems for potential vulnerabilities, City Manager T.C. Broadnax said in a statement late Monday. City officials are reviewing security for financial systems, a flood warning system, police-fire dispatch and the 911/311 system.To read this article in full or to leave a comment, please click here

Hacked Dallas sirens get extra encryption to fend off future attacks

Dallas city officials have added extra encryption and other security measures to the outdoor warning sirens hacked early Saturday.The hack also prompted the city to evaluate critical systems for potential vulnerabilities, City Manager T.C. Broadnax said in a statement late Monday. City officials are reviewing security for financial systems, a flood warning system, police-fire dispatch and the 911/311 system.To read this article in full or to leave a comment, please click here