Microsoft wants OEMs to build these kinds of PCs

Microsoft held the Windows Hardware Engineering Conference (WinHEC) in China last December, but it has just released a very interesting video that highlights where it would like to see the PC market head in the coming years. The video, from the session "Next Generation of Windows Devices," isn't all that surprising, as Microsoft has already been advocating for things such as Ink and Hello. Its description of the Modern PC falls into three categories: Cool Designs, Better Performance and New Experiences. + Also on Network World: Battle lines drawn as Chromebooks, Windows PCs renew rivalry + Microsoft had an interesting factoid. It said that there are over 600 million Windows devices in use that are more than 4 years old. Those are pretty much all Windows 7 and perhaps Windows 8 machines, since Windows 10 is only a year old. That's 600 million people Microsoft wants to upgrade. To read this article in full or to leave a comment, please click here

Internet Hall of Fame making a comeback in 2017

The Internet Hall of Fame, a virtual museum celebrating the living history of the Internet, is back seeking a new class of inductees after going quiet for the past couple of years.A spokeswoman for the Internet Society, which fights the good fight for an open and secure Internet, says "we wanted to take some time to get the inductees more involved in the program and get their insights to make sure it was positioned and well-structured for the long-term. We now have an Advisory Board of inductees who provide leadership on the program’s direction and are responsible for the selection of the next class of inductees. With 2017 as the Internet Society’s 25th anniversary, we felt it was the ideal time to host the next induction ceremony."To read this article in full or to leave a comment, please click here

Cisco goes public with Clock Signal Component Issue

A couple months ago many engineers started hearing rumors regarding an ISR 4331 recall, and problems surrounding the device. Until this week, none of us had very good information, but it seems that today Cisco has officially released some information regarding the problem. Many of us have received phone calls at this time from our account managers… while some of us, myself included, have been left in the dark. This is troubling considering how many products are out in the field.

Recently, Cisco became aware of an issue related to a component manufactured by one supplier that affects some Cisco products. In some units, we have seen the clock signal component degrade over time. Although the Cisco products with this component are currently performing normally, we expect product failures to increase over the years, beginning after the unit has been in operation for approximately 18 months. Once the component has failed, the system will stop functioning, will not boot, and is not recoverable.



Cisco has identified the products that are affected by this issue and published an FAQ along with the Field Notices on their site. The list of products varies across the line and includes the following products that Continue reading

IDG Contributor Network: A patchwork quilt of IoT security

The Internet of Things (IoT) presents a security threat. A key point of my last article is that manufacturers do not have the right incentives. But all is not lost. With a little ingenuity, we can make a quilt of independent pieces that can nevertheless turn out to offer good security coverage.The term “patchwork quilt” is often used pejoratively to describe something that is made up of an assortment of other parts. Yet it is worth remembering that a well-made quilt is still functional, durable and beautiful. And quilts are often made collaboratively in quilting bees. We need this sort of approach to network security.To read this article in full or to leave a comment, please click here

IDG Contributor Network: A patchwork quilt of IoT security

The Internet of Things (IoT) presents a security threat. A key point of my last article is that manufacturers do not have the right incentives. But all is not lost. With a little ingenuity, we can make a quilt of independent pieces that can nevertheless turn out to offer good security coverage.The term “patchwork quilt” is often used pejoratively to describe something that is made up of an assortment of other parts. Yet it is worth remembering that a well-made quilt is still functional, durable and beautiful. And quilts are often made collaboratively in quilting bees. We need this sort of approach to network security.To read this article in full or to leave a comment, please click here

LSA issue @ February 2, 2017 at 10:28PM

It is remarkable how quickly technology giants like Facebook, Google, Amazon and others became newsmakers No1 in the networking area. Seriously, for 5 breaking news from these guys its only 1 serious announcement from vendor-camp. Keeping the ratio in favor of tech giants meet the roundup of the recent Facebook' even called Disaggregate: Networking. [1]

Q&A: 15 Questions AWS Users Ask About DDC For AWS

Docker is deployed across all major cloud service providers, including AWS. So when we announced Docker Datacenter for AWS (which makes it even easier to deploy DDC on AWS) and showed live demos of the solution at AWS re:Invent 2016 it was no surprise that we received a ton of interest about the solution. Docker Datacenter for AWS, as you can guess from its name, is now the easiest way to install and stand up the Docker Datacenter (DDC)  stack on an AWS EC2 cluster. If you are an AWS user and you are looking for an enterprise container management platform, then this blog will help answer questions you have about using DDC on AWS.

In last week’s webinar,  Harish Jayakumar,  Solutions Engineer at Docker, provided a solution overview and demo to showcase how the tool works, and some of the cool features within it. You can watch the recording of the webinar below:

We also hosted a live Q&A session at the end where we opened up the floor to the audience and did our best to get through as many questions as we could. Below, are fifteen of the questions that we received from the audience. We selected Continue reading

Chip Makers and the China Challenge

China represents a big and growing market opportunity for IT vendors around the world. It’s huge population and market upside compared with the more mature regions across the globe is hugely attractive to system and component makers, and the Chinese government’s willingness to spend money to help build up the country’s compute capabilities only adds to the allure. In addition, it is home to such hyperscale players as Baidu, Alibaba and Tencent, which like US counterparts Google, Facebook and eBay are building out massive datacenters that are housing tens of thousands of servers.

However, those same Chinese government officials aren’t

Chip Makers and the China Challenge was written by Nicole Hemsoth at The Next Platform.

Cisco patches critical flaw in Prime Home device management server

Cisco Systems has fixed a critical vulnerability that could allow hackers to take over servers used by telecommunications providers to remotely manage customer equipment such as routers.The vulnerability affects Cisco Prime Home, an automated configuration server (ACS) that communicates with subscriber devices using the TR-069 protocol. In addition to remotely managing customer equipment, it can also "automatically activate and configure subscribers and deliver advanced services via service packages" over mobile, fiber, cable, and other ISP networks."A vulnerability in the web-based GUI of Cisco Prime Home could allow an unauthenticated, remote attacker to bypass authentication and execute actions with administrator privileges," Cisco said in its advisory.To read this article in full or to leave a comment, please click here

Cisco patches critical flaw in Prime Home device management server

Cisco Systems has fixed a critical vulnerability that could allow hackers to take over servers used by telecommunications providers to remotely manage customer equipment such as routers.The vulnerability affects Cisco Prime Home, an automated configuration server (ACS) that communicates with subscriber devices using the TR-069 protocol. In addition to remotely managing customer equipment, it can also "automatically activate and configure subscribers and deliver advanced services via service packages" over mobile, fiber, cable, and other ISP networks."A vulnerability in the web-based GUI of Cisco Prime Home could allow an unauthenticated, remote attacker to bypass authentication and execute actions with administrator privileges," Cisco said in its advisory.To read this article in full or to leave a comment, please click here

Cisco patches critical flaw in Prime Home device management server

Cisco Systems has fixed a critical vulnerability that could allow hackers to take over servers used by telecommunications providers to remotely manage customer equipment such as routers.The vulnerability affects Cisco Prime Home, an automated configuration server (ACS) that communicates with subscriber devices using the TR-069 protocol. In addition to remotely managing customer equipment, it can also "automatically activate and configure subscribers and deliver advanced services via service packages" over mobile, fiber, cable, and other ISP networks."A vulnerability in the web-based GUI of Cisco Prime Home could allow an unauthenticated, remote attacker to bypass authentication and execute actions with administrator privileges," Cisco said in its advisory.To read this article in full or to leave a comment, please click here

Cisco: Faulty clock part could cause failure in some Nexus switches, ISR routers, ASA security appliances

Cisco this week issued a notice that faulty clock timing chips in some of its switches, routers and security appliances could fail after about 18 months of service – causing those devices to crash and not recover. The notice includes some of the company’s most widely deployed products, from certain models of its Series 4000 Integrated Services Routers, Nexus 9000 Series switches, ASA security devices to Meraki Cloud Managed Switches. Clock components are critical to the synchronization of multiple levels of a given device. +More on Network World: Cisco amps-up Tetration platform with better security, reduced footprint, AWS cloud option+To read this article in full or to leave a comment, please click here

Cisco: Faulty clock part could cause failure in some Nexus switches, ISR routers, ASA security appliances

Cisco this week issued a notice that faulty clock timing chips in some of its switches, routers and security appliances could fail after about 18 months of service – causing those devices to crash and not recover.The notice includes some of the company’s most widely deployed products, from certain models of its Series 4000 Integrated Services Routers, Nexus 9000 Series switches, ASA security devices to Meraki Cloud Managed Switches. Clock components are critical to the synchronization of multiple levels of a given device.+More on Network World: Cisco amps-up Tetration platform with better security, reduced footprint, AWS cloud option+To read this article in full or to leave a comment, please click here

More DockerCon Speakers Announced

Today, we are announcing the next group of awesome DockerCon speakers and we can’t wait for the lessons, stories, tips, tricks and insights they will share.

  • Need tips on how to create effective images, even when you have to include a bunch of image processing libraries?
  • What about learning how other organizations are taking Docker into production and adopting DevOps?
  • Want to deep dive into the Docker internals from Docker’s technical staff?

Join us at the largest container conference in the world to hear these stories and many more DockerCon speakers from the community. 

Docker Security Deep Dive

Journey to Docker Production: Evolving Your Infrastructure and Processes

Creating Effective Docker Images

Plug-ins: Building, Shipping, Storing and Running

Docker for Ops

Docker Networking

 

 

 

 

 

 

 

Modern Storage Platform for Containerized Environments

Do you really want to attend sessions from these DockerCon speakers, but are having a hard time convincing your manager on pulling the trigger to send you? Have you already explained that sessions, training and hands-on exercises are definitely worth the financial investment and time away from your desk?

Well, fear not! We’ve put together a few more resources and reasons to help Continue reading

IDG Contributor Network: Service insertion—Why it’s so important

One of the major challenges that’s long faced enterprise network is the ability to spin up new network services. SD-WANs make this a lot easier through service insertion and service chaining.Suppose for a moment you want to construct a secure perimeter around your compute resources in your data center and Amazon Web Services (AWS) implementation. Normally, you’d introduce a firewall and an Intrusion Detection System (IDS) into each location. That way, should a security incident happen in one location, such as a malware outbreak or a denial of service attack, you would be able to mitigate that event without any reengineering work. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Service insertion—Why it’s so important

One of the major challenges that’s long faced enterprise network is the ability to spin up new network services. SD-WANs make this a lot easier through service insertion and service chaining.Suppose for a moment you want to construct a secure perimeter around your compute resources in your data center and Amazon Web Services (AWS) implementation. Normally, you’d introduce a firewall and an Intrusion Detection System (IDS) into each location. That way, should a security incident happen in one location, such as a malware outbreak or a denial of service attack, you would be able to mitigate that event without any reengineering work. To read this article in full or to leave a comment, please click here