4 things we expect from Mobile World Congress 2017

Mobile World Congress, the Davos of wireless technology, is happening next week in Barcelona, and it’s going to be a particularly important year, as the mobile landscape readies itself for a couple of fairly major shifts.Here’s our quick look ahead to next week in sunny Spain and the four main points we expect from the MWC show.5G, or at least previews of it There’s been a big school of 5G press releases floating into our inboxes here in tech media just ahead of MWC (i.e., “Verizon plans 5G wireless trial service in 11 cities this year”), and it’s no real surprise – next-generation mobile networks are going to do a lot more than just boost speeds. They’ll also connect large numbers of devices – not just phones and tablets and laptops – to each other.To read this article in full or to leave a comment, please click here

4 things we expect from Mobile World Congress 2017

Mobile World Congress, the Davos of wireless technology, is happening next week in Barcelona, and it’s going to be a particularly important year, as the mobile landscape readies itself for a couple of fairly major shifts.Here’s our quick look ahead to next week in sunny Spain and the four main points we expect from the MWC show.5G, or at least previews of it There’s been a big school of 5G press releases floating into our inboxes here in tech media just ahead of MWC (i.e., “Verizon plans 5G wireless trial service in 11 cities this year”), and it’s no real surprise – next-generation mobile networks are going to do a lot more than just boost speeds. They’ll also connect large numbers of devices – not just phones and tablets and laptops – to each other.To read this article in full or to leave a comment, please click here

How to assess security automation tools

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  During my recent trip to Tel Aviv to attend CyberTech 2017, I had a one-on-one conversation with Barak Klinghofer, co-founder and CTO of Hexadite. He gave me a preview of an educational presentation he was to give two weeks later at the RSA Conference. His insight is worth repeating for anyone looking to add automation tools to their security toolset.As I saw at CyberTech, and I’m sure was the case at RSA, the hottest topics were security automation, automated incident response and security orchestration. These can be confusing terms, as every vendor describes them a little bit differently.To read this article in full or to leave a comment, please click here

How to assess security automation tools

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  During my recent trip to Tel Aviv to attend CyberTech 2017, I had a one-on-one conversation with Barak Klinghofer, co-founder and CTO of Hexadite. He gave me a preview of an educational presentation he was to give two weeks later at the RSA Conference. His insight is worth repeating for anyone looking to add automation tools to their security toolset.As I saw at CyberTech, and I’m sure was the case at RSA, the hottest topics were security automation, automated incident response and security orchestration. These can be confusing terms, as every vendor describes them a little bit differently.To read this article in full or to leave a comment, please click here

Telefonica-Sigfox deal is a big win for diverse IoT networks

The global partnership announced Wednesday between Telefonica and IoT specialist Sigfox could ensure the latter’s long-term success while accelerating the overall growth of LPWANs (low-power, wide-area networks).Telefonica said it will integrate Sigfox’s energy-sipping, low-data-rate radios into millions of devices used for things like smart metering and asset tracking. The Spain-based mobile carrier operates in 21 countries across Europe and Latin America, so the deal should significantly expand Sigfox’s footprint. It’s talking with customers about possible large-scale rollouts across both regions, including Spain, Germany, Colombia, Argentina, and Brazil.To read this article in full or to leave a comment, please click here

Telefonica-Sigfox deal is a big win for diverse IoT networks

The global partnership announced Wednesday between Telefonica and IoT specialist Sigfox could ensure the latter’s long-term success while accelerating the overall growth of LPWANs (low-power, wide-area networks).Telefonica said it will integrate Sigfox’s energy-sipping, low-data-rate radios into millions of devices used for things like smart metering and asset tracking. The Spain-based mobile carrier operates in 21 countries across Europe and Latin America, so the deal should significantly expand Sigfox’s footprint. It’s talking with customers about possible large-scale rollouts across both regions, including Spain, Germany, Colombia, Argentina, and Brazil.To read this article in full or to leave a comment, please click here

Promises, Challenges Ahead for Near-Memory, In-Memory Processing

The idea of bringing compute and memory functions in computers closer together physically within the systems to accelerate the processing of data is not a new one.

Some two decades ago, vendors and researchers began to explore the idea of processing-in-memory (PIM), the concept of placing compute units like CPUs and GPUs closer together to help reduce to the latency and cost inherent in transferring data, and building prototypes with names like EXECUBE, IRAM, DIVA and FlexRAM. For HPC environments that relied on data-intensive applications, the idea made a lot of sense. Reduce the distance between where data was

Promises, Challenges Ahead for Near-Memory, In-Memory Processing was written by Jeffrey Burt at The Next Platform.

ONF Certified SDN Associate (OCSA) – Part 5

The OCSA exam tests your understanding of components in an SDN framework, your ability to articulate the fundamental workings of networking and the OpenFlow protocol, as well as your knowledge of vendors, solutions and projects available in the SDN landscape. This is the last part in a series of posts that review the blueprint for […]

The post ONF Certified SDN Associate (OCSA) – Part 5 appeared first on Overlaid.

How about family spring break in Austin?

Are you looking for Spring Break plans with the family? Look no further than DockerCon 2017!  Located in sunny Austin, Texas April 17-20, DockerCon provides learning and entertainment for all members of the family.

DockerCon

Childcare

baby-moby-body-4.jpgAs part of our efforts to make DockerCon’s doors open to all, we are excited to announce that we will be partnering again this year with Big Time Kid to provide childcare at DockerCon! Gone are the days of “Mom / Dad has to stay home with the kids…” – you can now bring the whole family to DockerCon!

Childcare will be offered:

  • Monday, April 17  1:00pm – 7:30pm
  • Tuesday, April 18  8:00am – 6:30pm
  • Wednesday, April 19 8:00am – 5:30pm
  • Thursday, April 20 8:00am – 12:00pm

Following in the success of last year, we  have chosen Big Time Kid Care as our childcare provider. All caregivers and staff are certified, fully insured and experienced in child education and care with police background checks. Big Time Kid Care will be well equipped and excited to take good care of your little ones at a kid-friendly play room close to the DockerCon activities at Austin Convention Center. Games, activities, breakfast and lunch will be provided.

Spousetivities

Continue reading

New York State cybersecurity regulations: Who wins?

As you probably know by now, on February 16, the State of New York’s Department of Financial Services (DFS) finalized its new cybersecurity regulations, which take effect on March 1, 2017. These regulations are somewhat redundant with others in the financial services industry (i.e. FFIEC, GLBA, NIST CSF, OCC, etc.) but tend to go a bit further with several specific prescriptive requirements. For example, the New York State cybersecurity regulations cover nonpublic data (rather than customer data), mandate the presence of a CISO (or third-party equivalent) and require a program for secure data destruction.To read this article in full or to leave a comment, please click here

New York State cybersecurity regulations: Who wins?

As you probably know by now, on February 16, the State of New York’s Department of Financial Services (DFS) finalized its new cybersecurity regulations, which take effect on March 1, 2017. These regulations are somewhat redundant with others in the financial services industry (i.e. FFIEC, GLBA, NIST CSF, OCC, etc.) but tend to go a bit further with several specific prescriptive requirements. For example, the New York State cybersecurity regulations cover nonpublic data (rather than customer data), mandate the presence of a CISO (or third-party equivalent) and require a program for secure data destruction.To read this article in full or to leave a comment, please click here

Exascale Leaders on Next Horizons in Supercomputing

One way to characterize the challenges of achieving exascale, is to look at how advancing compute, memory/storage, software, and fabric will lead to a future-generation balanced system. Recently Al Gara of Intel, Jean-Philippe Nominé of the French Alternative Energies and Atomic Energy Commission (CEA), and Katherine Riley of Argonne National Lab were on a panel that weighed in on these and a host of other interrelated challenges.

Exascale will represent a watershed achievement in computer science. More than just a nice, round number (“exa-” denotes a billion billion), exascale computing is also supposed1 by the Human Brain Project and

Exascale Leaders on Next Horizons in Supercomputing was written by Nicole Hemsoth at The Next Platform.