IDG Contributor Network: Everything is built to connect to the internet, so why can’t I?

It’s a great time to be in networking. Anytime we connect an object or an experience to the network, we change its nature and increase its value. The network effect of connecting more and more things in more ways is driving exponential benefit to the pioneers who are imagining the many new possibilities. The voice-controlled home assistant, connected car, connected spare bedroom and other innovations are early examples that we already take for granted.The age of the network is here. This means the network gets built into every product and service, and that requires the network to be everywhere and you can connect to it all the time. Mobile has gotten pretty darn good in recent years. Unless, of course, you’re on a certain floor or in a certain area of a large building. Dead zones still occur regularly behind commercial-grade walls and energy-efficient windows.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Everything is built to connect to the internet, so why can’t I?

It’s a great time to be in networking. Anytime we connect an object or an experience to the network, we change its nature and increase its value. The network effect of connecting more and more things in more ways is driving exponential benefit to the pioneers who are imagining the many new possibilities. The voice-controlled home assistant, connected car, connected spare bedroom and other innovations are early examples that we already take for granted.The age of the network is here. This means the network gets built into every product and service, and that requires the network to be everywhere and you can connect to it all the time. Mobile has gotten pretty darn good in recent years. Unless, of course, you’re on a certain floor or in a certain area of a large building. Dead zones still occur regularly behind commercial-grade walls and energy-efficient windows.To read this article in full or to leave a comment, please click here

Analysts peer into Microsoft’s rumored Windows 10 Cloud

Talk of a new version of Windows 10, dubbed "Cloud," surfaced last week as eagle-eyed bloggers uncovered clues in a recent beta and preliminary code leaked to the Internet.It was unclear what purpose another edition would serve, but because it will apparently run only Universal Windows Platform (UWP) apps obtained from Microsoft's store, many assumed that Windows 10 Cloud would play rival to Google's Chrome OS, the browser-based operating system for Chromebook personal computers.[ Related: Fix Windows 10 problems with these free Microsoft tools ] Chromebooks have gained ground in education, where their low cost -- both in device price and in managing those devices -- has been irresistible to many schools. In response, Microsoft joined forces with chip maker Qualcomm to announce that the former's partners would market Windows PCs powered by ARM-based silicon later this year. For its part, Microsoft will craft a version of Windows 10 for ARM chips.To read this article in full or to leave a comment, please click here

Top 10 U.S. cities for employee happiness

It's common knowledge that where you work -- meaning who employs you -- impacts your happiness. But according to new data from employee review site Kununu, your workplace happiness is also affected by location, location, location.To read this article in full or to leave a comment, please click here(Insider Story)

Smartphone CPUs put desktops to shame

Fighting severe size and power constraints, the makers of smartphones have achieved levels of ingenuity not seen on the desktop. This results in mobile devices that not only have multiple cores, but multiple sizes and types of cores.To read this article in full or to leave a comment, please click here(Insider Story)

Rise of as-a-service lowers bar for cybercriminals

As-a-service offerings for things such as DDoS and malware -- including ransomware -- via exploit kits has seriously lowered the bar for entry into the criminal market. Hackers no longer need to have sophisticated skills in order to gain entry into the world of cybercrime.According to Geoff Webb, vice president of strategy at Micro Focus, the industrialization of the processes and the availability of the tools has created this expanded forum that allows non-technical people, anyone really, to enter into the digital crime market. To read this article in full or to leave a comment, please click here

Rise of as-a-service lowers bar for cybercriminals

As-a-service offerings for things such as DDoS and malware -- including ransomware -- via exploit kits has seriously lowered the bar for entry into the criminal market. Hackers no longer need to have sophisticated skills in order to gain entry into the world of cybercrime.According to Geoff Webb, vice president of strategy at Micro Focus, the industrialization of the processes and the availability of the tools has created this expanded forum that allows non-technical people, anyone really, to enter into the digital crime market. To read this article in full or to leave a comment, please click here

Heartbreaking hacks

It warms a hacker's heartImage by ThinkstockValentine’s Day is historically about love, flowers and chocolate. Unless you're a hacker, then it’s about worms, vulnerabilities, data theft and more. Preying on our need for love and affection, hackers have historically unleashed some hard-hitting attacks around Valentine’s Day, or in relation to the topic of love. So, before you open that Valentine’s Day email or click through to that online dating site, WatchGuard’s Marc Laliberte runs you through some of the most nefarious love-related cyber-attacks.To read this article in full or to leave a comment, please click here

Heartbreaking hacks

It warms a hacker's heartImage by ThinkstockValentine’s Day is historically about love, flowers and chocolate. Unless you're a hacker, then it’s about worms, vulnerabilities, data theft and more. Preying on our need for love and affection, hackers have historically unleashed some hard-hitting attacks around Valentine’s Day, or in relation to the topic of love. So, before you open that Valentine’s Day email or click through to that online dating site, WatchGuard’s Marc Laliberte runs you through some of the most nefarious love-related cyber-attacks.To read this article in full or to leave a comment, please click here

The 12 worst Android phone gimmicks once hailed as ‘innovations’

Sometimes innovation is best left on the drawing boardImage by Ryan WhitwamIt's hard for a phone to get noticed by consumers when it looks like all the other flat black slabs out there. That has led some OEMs to try some particularly wacky things—gimmicks to set them apart. Just because a gimmick is new doesn't mean it's good. In fact, there are a lot of gimmicks that look cool at a tradeshow, but in real life they're terrible ideas. Here are some of the worst to make it to market.To read this article in full or to leave a comment, please click here

Response: AT&T, Microsoft Ventures back networking startup SnapRoute in $25 million round

How does a BGP/OSPF routing app on a network device cost more than Microsoft Office ? One is really complex with thousands of features, complex interface and must support a huge range of hardware. The other one is an BGP or OSPF app. 

“His” refers to Jason Forrester, formerly global data center network manager at Apple and now the founder and chief executive of SnapRoute. The startup now has roughly 32 employees, Forrester told VentureBeat in an interview. Forrester figures that the startup has around 35-50 customers, and its software is being used on 12,000-13,000 switches. He declined to name any of SnapRoute’s customers, but Facebook employees have repeatedly mentioned the company’s software by name in recent months.

  1. Snaproute is clearly gaining momentum with their networking apps with comapneis
  2. The software is simpler, focussed and more reliable: “Sure enough, Forrester said, while Cisco’s code runs to 30 million lines of code or more, SnapRoute’s takes up perhaps 100,000.”
  3. A modern startup can compete with established vendors on features and get substantial sales in markets that they cannot reach

AT&T, Microsoft Ventures back networking startup SnapRoute in $25 million round | VentureBeat | Entrepreneur | by Jordan Novet : http://venturebeat. Continue reading

Research: Router Optics Evolution and Market Trends

Timely information on the future of optics and SFP modules. The current situation of price overloading by vendors is seriously grim (markups of 1000% are common) and this could help to increase your knowledge in the area.

  • Router Optics vs. Transport Optics
  • Router Optics Evolution
  • 100G Optics Status and Challenges
  • Higher 100G Density Considerations
  • Router Optics Market Trends
Router Optics Evolution and Market Trends 2_Liu_Optics_Evolution_And_v1.pdf
https://www.nanog.org/sites/default/files/2_Liu_Optics_Evolution_And_v1.pdf

NB: From a NANOG meeting but haven’t been able to track down the exact link.

The post Research: Router Optics Evolution and Market Trends appeared first on EtherealMind.

IDG Contributor Network: Stop creating merely viable products; develop products people love

I recently served as master of ceremonies for a digital B2B conference in Europe. Of the many great presentations, one that caught my attention described how one scopes, develops and delivers minimum viable product (MVP). MVP is a product state that is purposely designed to do the basic job. It is viable, but also minimal in its extra features, functions and overall look and feel. Regardless of whether a website, mobile app or kiosk is used to promote a brand or sell a physical product and collect payment, delivered as a MVP, each would be initially launched with minimum capabilities and provide a simplistic look and feel.Why MVP? The concept of minimum viable products was introduced as a way to get a product into a market fast and with low risk. The product is quickly designed and launched, followed by refining and improving the product based on feedback garnered from the customers using the product. This quite formulaic approach allows companies to churn out products as quickly as possible. More important, if they were to fail, the process would be faster and cheaper.To read this article in full or to leave a comment, please click here

Hot products at RSA 2017

RSA Conference underwayImage by Web SummitRSA, the world’s largest security conference, is underway this week in San Francisco with attendees from around the world gathering to hear the latest strategies for fighting cyberattacks. They’ll also be able to view the latest hardware and software to protect their most valuable corporate assets. Here is a brief description of some new security products being announced at the conference.To read this article in full or to leave a comment, please click here

Hot products at RSA 2017

RSA Conference underwayImage by Web SummitRSA, the world’s largest security conference, is underway this week in San Francisco with attendees from around the world gathering to hear the latest strategies for fighting cyberattacks. They’ll also be able to view the latest hardware and software to protect their most valuable corporate assets. Here is a brief description of some new security products being announced at the conference.To read this article in full or to leave a comment, please click here

36 – New White Paper that describes OTV to interconnect Multiple VXLAN EVPN Fabrics

Good day,

In the meantime that this long series of sub-posts becomes a white paper, there is a new document available on CCO written by Lukas Krattiger that covers the Layer 2 and Layer 3 interconnection of multiple VXLAN fabrics. I feel this document is complementary to this series of Post 36, describing from a different angle (using a human language approach) how to achieve VXLAN EVPN Multi-Fabric design in conjunction with OTV.

Optimizing Layer 2 DCI with OTV between Multiple VXLAN EVPN Fabrics (Multifabric) White Paper

Good reading, yves

Cybersecurity alliance promoting intel-sharing seeks to expand

Hackers have probably had a harder time slipping past your security software, thanks to an alliance between some of the top vendors in the industry.The Cyber Threat Alliance, a group of security firms that often compete, says its efforts to share intelligence on the latest hacking threats have been paying off. Rivals including Fortinet, Intel Security, Palo Alto Networks and Symantec originally entered into the alliance over two years ago, even as doubts arose over whether it’d last.To read this article in full or to leave a comment, please click here

Cybersecurity alliance promoting intel-sharing seeks to expand

Hackers have probably had a harder time slipping past your security software, thanks to an alliance between some of the top vendors in the industry.The Cyber Threat Alliance, a group of security firms that often compete, says its efforts to share intelligence on the latest hacking threats have been paying off. Rivals including Fortinet, Intel Security, Palo Alto Networks and Symantec originally entered into the alliance over two years ago, even as doubts arose over whether it’d last.To read this article in full or to leave a comment, please click here