Is Fate Sharing bad thing in network design ?

Is fate sharing bad thing in network design? Someone asked this question recently on my youtube channel and I want to share a post for the website followers as well. First of all, what is fate sharing ? Below is the Wikipedia definition of fate sharing. ” Fate-sharing is an engineering design philosophy where related parts of a […]

The post Is Fate Sharing bad thing in network design ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Apple to release MacBook Pro models with 32GB of RAM this year

When Apple released its line of revamped MacBook Pros late last year, the response was surprisingly lukewarm. Even though Apple's new flagship notebook introduced us to the TouchBar, even the most die-hard Apple enthusiasts couldn't help but notice that Apple's new notebooks were a little underpowered and incredibly pricey.One of the more common complaints, at least from power users, was that Apple's new MacBook Pro maxed out at 16GB of RAM. While 16GB of RAM is more than enough for most users, folks who work with complex video and photography workflows will glady take all the memory they can get their hands on. And while Apple can arguably get away with a 16GB RAM limit on its MacBook and MacBook Air line, some pondered why Apple's Pro level notebook was subject to what was presumably an arbitrary ceiling.To read this article in full or to leave a comment, please click here

Response: Saving you bandwidth on Google+ through machine learning

Image compression reduces network requirements in a major way.

  1. Smaller files means less bandwidth
  2. Less round trips for faster page rendering
  3. reduces load on network function like proxies, IDS, etc.

And its already in production for Android devices using Google services.

To help everyone be able to see the beautiful photos that photographers share to Google+ in their full glory, we’ve turned to machine learning and a new technology called RAISR. RAISR, which was introduced in November, uses machine learning to produce great quality versions of low-resolution images, allowing you to see beautiful photos as the photographers intended them to be seen. By using RAISR to display some of the large images on Google+, we’ve been able to use up to 75 percent less bandwidth per image we’ve applied it to.

Saving you bandwidth on Google+ through machine learning

The post Response: Saving you bandwidth on Google+ through machine learning appeared first on EtherealMind.

Intel thinks IoT will have a firm place in the stores of the future

Intel wants to level the playing field between online retailers and brick and mortar shops by introducing IoT technologies into physical stores. Currently, online retailers have access to information on what sorts of merchandise consumers look at, what they purchase, and what they don't. And Intel argues physical stores should have the same information.  In a Monday editorial on the company's site, Intel CEO, Brian Krzanich wrote:To read this article in full or to leave a comment, please click here

China tightens control over app stores

China is requiring that all app stores operating in the country register with its Cyberspace Administration in an effort to battle malware but also to tighten control over uncensored content.The rules took effect Monday, in a country where domestic third-party app stores -- not from Apple or Google -- are serving billions of downloads to Android smartphones. Chinese internet companies such as Baidu, Tencent and a host of smaller, shadier local app stores have been feeding the demand, at a time when Google has largely pulled out of the market.To read this article in full or to leave a comment, please click here

China tightens control over app stores

China is requiring that all app stores operating in the country register with its Cyberspace Administration in an effort to battle malware but also to tighten control over uncensored content.The rules took effect Monday, in a country where domestic third-party app stores -- not from Apple or Google -- are serving billions of downloads to Android smartphones. Chinese internet companies such as Baidu, Tencent and a host of smaller, shadier local app stores have been feeding the demand, at a time when Google has largely pulled out of the market.To read this article in full or to leave a comment, please click here

What will the Internet look like in 10 years? Help us answer that question

What will the Internet look like in the next seven to 10 years? How will things like marketplace consolidation, changes to regulation, increases in cybercrime or the widespread deployment of the Internet of Things impact the Internet, its users and society?

At the Internet Society, we are always thinking about what’s next for the Internet. And now we want your help!

The Internet is an incredibly dynamic medium, shaped by a multitude of pressures – be they social, political, technological, or cultural. From the rise of mobile to the emergence of widespread cyber threats, the Internet of today is different than the Internet of 10 years ago. 

Sally Shipman Wentworth

NDSS 2017 Deadlines Approaching

NDSS 2017 is almost here! The Network and Distributed System Security Symposium (NDSS) symposium fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. NDSS 2017 takes place February 26 through March 1, 2017, at Catamaran Resort Hotel & Spa in San Diego, California.

Here are some upcoming deadlines you should know about:

Megan Kruse

End User Involvement, Governance, and Expert Help Drive Success in the 10 Best Intranets of 2017

January doesn’t just mean the start of a new year for me – it also means an opportunity to review the Nielsen Norman Group’s Intranet Design Annual. The 10 Best Intranets of 2017 were officially announced on January 7, 2017. Even though it’s a little weird to call these the best intranets of 2017 – especially because the submissions were completed in June of 2016 – the report has a lot of interesting and helpful information and design trends that intranet design teams should consider. A word of caution as you review the full report, just because a feature was used in an “award winning” intranet doesn’t mean it needs to show up on your intranet! Megamenus continue to be a popular method for intranet navigation – and about half of the award winners use megamenus for global navigation. But that doesn’t mean your intranet must have a megamenu! You do, on the other hand, need to make sure that your users can find what they need easily. But, that doesn’t mean you must choose a megamenu as your navigational approach. On the other hand, if you don’t have a plan for ongoing governance, you can pretty much be Continue reading

Blogging Workflow

A lot of folks start out to blog, and then quit soon after. Since I started blogging mainly as a way to build some discipline in my writing, I was determined not to let my blog become a cob web, a page that was not updated on a regular basis, I started blogging determined to build a process, or a blogging workflow. I should emphasize at this point that blogging, as all writing, is a habit and a discipline. It’s not just “something that happens on its own.” If you are going to blog, start with the same mindset—focus on the habits and discipline first, the blog second.

I (mostly) build all the content for ‘net Work on Saturday mornings. Sometimes it slips to Sunday or Monday, depending on what is going on, but I normally spend no more than about 2 to 3 hours a week on keeping this blog up and running, including normal maintenance. There are times when I spend much more—for instance, if I’m switching platforms, or switching themes. There are other times when I need to spend time in code, or researching something specific, for a blog post (or a set of posts), but Continue reading

Critical flaw lets hackers take control of Samsung SmartCam cameras

The popular Samsung SmartCam security cameras contain a critical remote code execution vulnerability that could allow hackers to gain root access and take full control of them.The vulnerability was discovered by researchers from the hacking collective the Exploiteers (formerly GTVHacker), who have found vulnerabilities in the Samsung SmartCam devices in the past.The flaw allows for command injection through a web script, even though the vendor has disabled the local web-based management interface in these devices.The Samsung SmartCam is a series of cloud-enabled network security cameras that were originally developed by Samsung Techwin. Samsung sold this division to South Korean business conglomerate Hanwha Group in 2015 and the company was renamed Hanwha Techwin.To read this article in full or to leave a comment, please click here

Critical flaw lets hackers take control of Samsung SmartCam cameras

The popular Samsung SmartCam security cameras contain a critical remote code execution vulnerability that could allow hackers to gain root access and take full control of them. The vulnerability was discovered by researchers from the hacking collective the Exploiteers (formerly GTVHacker), who have found vulnerabilities in the Samsung SmartCam devices in the past. The flaw allows for command injection through a web script, even though the vendor has disabled the local web-based management interface in these devices. The Samsung SmartCam is a series of cloud-enabled network security cameras that were originally developed by Samsung Techwin. Samsung sold this division to South Korean business conglomerate Hanwha Group in 2015 and the company was renamed Hanwha Techwin.To read this article in full or to leave a comment, please click here

FPGA Frontiers: New Applications in Reconfigurable Computing

There is little doubt that this is a new era for FPGAs.

While it is not news that FPGAs have been deployed in many different environments, particularly on the storage and networking side, there are fresh use cases emerging in part due to much larger datacenter trends. Energy efficiency, scalability, and the ability to handle vast volumes of streaming data are more important now than ever before. At a time when traditional CPUs are facing a future where Moore’s Law is less certain and other accelerators and custom ASICs are potential solutions with their own sets of expenses and hurdles,

FPGA Frontiers: New Applications in Reconfigurable Computing was written by Nicole Hemsoth at The Next Platform.