Harbinger of The Great Internet Wall arrives

By Presidential proclamation, non-U.S. citizens' data is in jeopardy. An executive order by President Trump could hurt a data transfer framework that allows EU citizens’ personal information to be transmitted to the U.S. for processing with the promise that the data would have the same privacy protection in the U.S. as it has in the EU. That’s because a section of the order says, “Agencies shall, to the extent consistent with applicable law, ensure that their privacy policies exclude persons who are not United States citizens or lawful permanent residents from the protections of the Privacy Act regarding personally identifiable information.” To read this article in full or to leave a comment, please click here

Facebook tries to revamp password recovery by supplanting email

Forgot your password? Well, Facebook wants to help you recover your internet account.The company is releasing an open source protocol that will let third-party sites recover user accounts through Facebook.Typically, when people forget their password to a site, they’re forced to answer a security question or send a password reset request to their email. But these methods of account recovery can be vulnerable to hacking, said Facebook security engineer Brad Hill.He recalled a time when he was granted permission to break into an online bank account. To do so, he took advantage of the password reset questions.“It asked me what my favorite color was, and it let me guess as many times as I wanted,” he said Monday, during a presentation at the USENIX Enigma 2017 security conference.To read this article in full or to leave a comment, please click here

Facebook tries to revamp password recovery by supplanting email

Forgot your password? Well, Facebook wants to help you recover your internet account.The company is releasing an open source protocol that will let third-party sites recover user accounts through Facebook.Typically, when people forget their password to a site, they’re forced to answer a security question or send a password reset request to their email. But these methods of account recovery can be vulnerable to hacking, said Facebook security engineer Brad Hill.He recalled a time when he was granted permission to break into an online bank account. To do so, he took advantage of the password reset questions.“It asked me what my favorite color was, and it let me guess as many times as I wanted,” he said Monday, during a presentation at the USENIX Enigma 2017 security conference.To read this article in full or to leave a comment, please click here

DARPA picks 30 contenders to battle in wireless spectrum competition

DARPA says there are now 30 contenders for its $3.75 million Spectrum Collaboration Challenge (SC2) whose goal is to get mobile devices more intelligent access to the ever-tightening wireless spectrum.+More on Network World: Intelligence agency opens $325,000 advanced, automated fingerprint gathering competition+ The defense research agency last March announced Spectrum Collaboration Challenge and said the primary goal of the contest was to infuse radios with “advanced machine-learning capabilities so they can collectively develop strategies that optimize use of the wireless spectrum in ways not possible with today’s intrinsically inefficient approach of pre-allocating exclusive access to designated frequencies.”To read this article in full or to leave a comment, please click here

DARPA picks 30 contenders to battle in wireless spectrum competition

DARPA says there are now 30 contenders for its $3.75 million Spectrum Collaboration Challenge (SC2) whose goal is to get mobile devices more intelligent access to the ever-tightening wireless spectrum.+More on Network World: Intelligence agency opens $325,000 advanced, automated fingerprint gathering competition+ The defense research agency last March announced Spectrum Collaboration Challenge and said the primary goal of the contest was to infuse radios with “advanced machine-learning capabilities so they can collectively develop strategies that optimize use of the wireless spectrum in ways not possible with today’s intrinsically inefficient approach of pre-allocating exclusive access to designated frequencies.”To read this article in full or to leave a comment, please click here

DARPA picks 30 contenders to battle in wireless spectrum competition

DARPA says there are now 30 contenders for its $3.75 million Spectrum Collaboration Challenge (SC2) whose goal is to get mobile devices more intelligent access to the ever-tightening wireless spectrum.+More on Network World: Intelligence agency opens $325,000 advanced, automated fingerprint gathering competition+ The defense research agency last March announced Spectrum Collaboration Challenge and said the primary goal of the contest was to infuse radios with “advanced machine-learning capabilities so they can collectively develop strategies that optimize use of the wireless spectrum in ways not possible with today’s intrinsically inefficient approach of pre-allocating exclusive access to designated frequencies.”To read this article in full or to leave a comment, please click here

Hyperscalers Ready To Run Barefoot In The Datacenter

Breaking into the switch market is not an easy task, whether you are talking about providing whole switches or just the chips that drive them. But there is always room for innovation, which is why some of the upstarts have a pretty credible chance to shake up networking, which is the last bastion of proprietary within the datacenter.

Barefoot Networks is one of the up-and-coming switch chip makers, with its “Tofino” family of ASICs that, among other things, has circuits and software that allow for the data plane – that part of the device that controls how data moves

Hyperscalers Ready To Run Barefoot In The Datacenter was written by Timothy Prickett Morgan at The Next Platform.

Firebolt: the fastest, safest ads on the web

Firebolt: the fastest, safest ads on the web

Cloudflare’s mission is to help build a better Internet. That means a faster, more secure, open Internet world-wide. We have millions of customers using our services like free SSL, an advanced WAF, the latest compression and the most up to date security to ensure that their web sites, mobile apps and APIs are secure and fast.

One vital area of web technology has lagged behind in terms of speed and security: online ads. And consumers have been turning to ad blocking technology to secure and speed up their own web browsing.

Firebolt: the fastest, safest ads on the web

Today, Cloudflare is introducing a new product to make web ads secure, fast and safe. That product is Firebolt.

Firebolt

With Firebolt, ad networks can instantly speed up and secure their ads, resulting in happy consumers and better conversion rates.

Firebolt delivers:

Lightning fast ad delivery

Cloudflare's global network of 102 data centers in 50 countries, combined with routing and performance technologies, makes the delivery of online ads to any device up to five times faster.

Free, simple SSL

Adding SSL to ad serving has been challenging for some ad networks. Cloudflare has years of experience providing free, one click SSL for our customers. Firebolt ads are Continue reading

After AppDynamics sale, is anyone going to snap up the rest of the APM market?

Cisco’s purchase last week of application performance management vendor AppDynamics for $3.7 billion in cash and assumed equity awards could signal that the APM sector in general is a potential M&A target, according to industry analysts.The APM market, which Gartner last summer said grew to $2.7B billion in 2015, is fragmented, and has been for some time. That means that consolidation may be overdue, with Cisco’s AppDynamics buy marking the start of the race.+ALSO ON NETWORK WORLD: Cisco’s AppDynamics purchase: A big price tag that could have big dividends + New Office 365 subscriptions for consumers plunged 62% in 2016To read this article in full or to leave a comment, please click here

Toxic Cultures and Reality

I have lived through multiple toxic cultures in my life. It’s easy to say, “just quit,” or “just go to HR,” but—for various reasons—these are not always a good solution. For instance, if you are in the military, “just quit” is not, precisely, an option. So how should you deal with these sorts of bad situations?

Start here: you are not going to change the culture. Just like I tell my daughters not to date guys so they can “fix” them, I have never seen anyone “fix” a culture through any sort of “mass action.” You are not going to “win” by going to the boss, or by getting someone from the outside to force everyone to change. You are not going to change the culture by griping about it. Believe me, I’ve tried all these things. They don’t (really) work.

Given these points, what can you do?

Start with a large dose of humility. First, you are probably a part of a number of toxic cultures yourself, and you probably even contribute at least some amount of the poison. Second, you are almost always limited in your power to change things; your influence, no matter how right you Continue reading

IDG Contributor Network: How to practice cybersecurity (and why it’s different from IT security)

Keeping companies safe from attackers is no longer just a technical issue of having the right defensive technologies in place. To me, this is practicing IT security, which is still needed but doesn’t address what happens after the attackers infiltrate your organization (and they will, despite your best efforts to keep them out).I’m trying to draw attention to this topic to get security teams, businesses executives and corporate boards to realize that IT security will not help them once attackers infiltrate a target. Once this happens, cybersecurity is required.  + Also on Network World: Recruiting and retaining cybersecurity talent + In cybersecurity, the defenders acknowledge that highly motivated and creative adversaries are launching sophisticated attacks. There’s also the realization that when software is used as a weapon, building a stronger or taller wall may not necessarily keep out the bad guys. To them, more defensive measures provide them with additional opportunities to find weak spots and gain access to a network.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How to practice cybersecurity (and why it’s different from IT security)

Keeping companies safe from attackers is no longer just a technical issue of having the right defensive technologies in place. To me, this is practicing IT security, which is still needed but doesn’t address what happens after the attackers infiltrate your organization (and they will, despite your best efforts to keep them out).I’m trying to draw attention to this topic to get security teams, businesses executives and corporate boards to realize that IT security will not help them once attackers infiltrate a target. Once this happens, cybersecurity is required.  + Also on Network World: Recruiting and retaining cybersecurity talent + In cybersecurity, the defenders acknowledge that highly motivated and creative adversaries are launching sophisticated attacks. There’s also the realization that when software is used as a weapon, building a stronger or taller wall may not necessarily keep out the bad guys. To them, more defensive measures provide them with additional opportunities to find weak spots and gain access to a network.To read this article in full or to leave a comment, please click here

How to stay relevant as a CIO

“All technology positions are migrating towards having to be hands-on,” Christopher Barron, CIO at Zander Rose LLC, told the audience at the December 2016 CIO Perspectives event in Houston. “That classic perception of a strategic CIO as being someone who always sits away, who tells other people what to do [is going away] …. All the leadership positions in IT, even if you are strategic, you’re going to have to be hands-on. Your customers will demand that.To read this article in full or to leave a comment, please click here(Insider Story)

10 principles of a successful IoT strategy

The internet of things (IoT) presents an opportunity for enterprises to rewrite the rules of their industry. The potential upside is massive: According to research firm Gartner, there will be nearly 20 billion devices on the IoT by 2020, and IoT product and service suppliers will generate $300 billion+ in revenue.By bringing together sensors, connectivity, cloud storage, processing, analytics and machine learning, IoT may well transform countless industries, from healthcare to manufacturing to utilities, transit, government and more. But IoT is still in its early days. Creating and executing an IoT strategy for your organization is no mean feat, says John Rossman, author of The Amazon Way on IoT: 10 Principles for Every Leader from the World's Leading Internet of Things Strategies.To read this article in full or to leave a comment, please click here

Tim Cook: ‘Apple would not exist without immigration’

Apple has championed the causes of marriage equality and environmental sustainability in recent years, so its employees looked to the company’s leadership in the wake of President Donald Trump’s executive order on immigration from predominantly Muslim countries. The order, which restricts immigration from seven countries and outright bans refugees from Syria, was handed down late Friday and led to protests in several U.S. cities and at airports where refugees were being detained.“Apple would not exist without immigration, let alone thrive and innovate the way we do,” Apple CEO Tim Cook wrote in an email to the company’s employees, later published by Re/code. “I’ve heard from many of you who are deeply concerned about the executive order issued yesterday restricting immigration from seven Muslim-majority countries. I share your concerns. It is not a policy we support.”To read this article in full or to leave a comment, please click here