Intel works on next-generation Optane SSD, memory technologies

"Every gamer is going to want to have 3D Xpoint. Every single gamer."Those were words from Intel's CEO Brian Krzanich when updating investors on the company's Optane technology, which the chipmaker believes could ultimately replace SSDs and DRAM in PCs and servers.Intel is now shipping the first-generation Optane but is also working on next-generation technologies as looks to increase density in this new class of storage and memory.Intel says Optane is significantly denser and faster than SSDs and DRAM. It is based on a technology called 3D Xpoint, co-developed with Micron.The chipmaker looks at Optane as the Moore's Law of storage. With future generations, Intel wants to make the memory smaller, denser and cheaper, and that's driving the development of Optane.To read this article in full or to leave a comment, please click here

IT and C-level leaders point fingers at each other over cyber defense

IT managers disagree with chief executives over who is responsible for a cyber security breach, according to a survey released Thursday.The survey -- of a group of 221 chief executive officers and other C-level executives and another group of 984 IT decision makers -- found that each group largely believes the other group is responsible in the event of a breach.In the survey, 35% of C-level respondents said IT teams would be responsible in a breach, while 50% of IT leaders think that responsibility rests with their senior managers.Also, IT managers estimate a single cyber attack will cost their business nearly twice what top-level executives estimate. The IT managers put the cost of a single attack at $19 million, compared to the C-suite estimate of about $11 million.To read this article in full or to leave a comment, please click here

IT and C-level leaders point fingers at each other over cyber defense

IT managers disagree with chief executives over who is responsible for a cyber security breach, according to a survey released Thursday.The survey -- of a group of 221 chief executive officers and other C-level executives and another group of 984 IT decision makers -- found that each group largely believes the other group is responsible in the event of a breach.In the survey, 35% of C-level respondents said IT teams would be responsible in a breach, while 50% of IT leaders think that responsibility rests with their senior managers.Also, IT managers estimate a single cyber attack will cost their business nearly twice what top-level executives estimate. The IT managers put the cost of a single attack at $19 million, compared to the C-suite estimate of about $11 million.To read this article in full or to leave a comment, please click here

How DevOps, agile spurred Slack enterprise adoption

If Jennifer Manry has her way bots will automate much of the repetitive and onerous workplace activities that consume her Capital One colleagues' time and effort. But until then the bank's vice president of workforce technology is busy helping 40,000 employees get more comfortable with new software from Slack, which allows corporate workers to instant message each other and share documents, files and other content.Capital One deployed Slack in mid-2016 and it quickly become the preferred tool for the IT department, which is embracing agile software development and DevOps principles that require close collaboration between software developers and product managers.To read this article in full or to leave a comment, please click here

Intel: Cannonlake will be more than 15 percent faster than Kaby Lake

Upgrading CPU performance hasn't been a priority for Intel in many years, but that could be changing.Intel's upcoming Cannonlake chips will deliver a performance improvement of more than 15 percent compared to its Kaby Lake chips, said Venkata Renduchintala, president of the Intel Client and Internet of Things businesses and Systems Architecture Group.Intel didn't provide exact numbers at the company's annual investor day Thursday, but the projection is based on the SysMark benchmark. Detailed performance improvement numbers will emerge over time.The performance improvements from Skylake to Kaby Lake topped out at 15 percent. The CPU performance boost for Cannonlake should be at least that, Intel said.To read this article in full or to leave a comment, please click here

Cray Outpaces HPC Market, Books Historic Quarter

It is hard to tell which part of the systems market is lumpier – that for traditional HPC systems like supercomputers or that for massive cluster deployments for the hyperscalers that run public clouds and public facing applications on a massive scale. But what we do know for sure is that the HPC market is slowing down, and that the bellwether for that market, Cray, is doing better than that market according to its latest financial results.

Despite the softness in the traditional HPC market for clusters to run simulations and models (partly driven by the political climates around the

Cray Outpaces HPC Market, Books Historic Quarter was written by Timothy Prickett Morgan at The Next Platform.

38% Apple USB-C Digital AV Multiport Adapter – Deal Alert

This Original OEM Apple USB Lightning Cable For iPhone connects your iPhone, iPad, or iPod with Lightning connector to your computer's USB port for syncing and charging or to the Apple USB Power Adapter for convenient charging from a wall outlet. Its typical list price of $79 has been reduced 38% to just $49. See it now on Amazon.To read this article in full or to leave a comment, please click here

Microsoft blends IaaS and PaaS with new Managed Disks

Microsoft introduced a nifty new feature to its Azure public cloud this week called Managed Disks. The idea is that developers will not have to worry about provisioning storage when spinning up virtual machines. Managed Disks automatically adds persistent disk storage for Azure virtual machines as applications demand it.+MORE AT NETWORK WORLD: HPE's Mesosphere reseller agreement heats up the container management market | Rackspace is cutting 6% of its workforce +To read this article in full or to leave a comment, please click here

Windows Trojan hacks into embedded devices to install Mirai

Attackers have started to use Windows and Android malware to hack into embedded devices, dispelling the widely held belief that if such devices are not directly exposed to the Internet they're less vulnerable.Researchers from Russian antivirus vendor Doctor Web have recently come across a Windows Trojan program that was designed to gain access to embedded devices using brute-force methods and to install the Mirai malware on them.Mirai is a malware program for Linux-based internet-of-things devices, such as routers, IP cameras, digital video recorders and others. It's used primarily to launch distributed denial-of-service (DDoS) attacks and spreads over Telnet by using factory device credentials.To read this article in full or to leave a comment, please click here

Windows Trojan hacks into embedded devices to install Mirai

Attackers have started to use Windows and Android malware to hack into embedded devices, dispelling the widely held belief that if such devices are not directly exposed to the Internet they're less vulnerable.Researchers from Russian antivirus vendor Doctor Web have recently come across a Windows Trojan program that was designed to gain access to embedded devices using brute-force methods and to install the Mirai malware on them.Mirai is a malware program for Linux-based internet-of-things devices, such as routers, IP cameras, digital video recorders and others. It's used primarily to launch distributed denial-of-service (DDoS) attacks and spreads over Telnet by using factory device credentials.To read this article in full or to leave a comment, please click here

Nokia makes bid for Comptel to boost its software business

Network equipment vendor Nokia wants to buy a software company that helps customers make do with less hardware.The Finnish networking giant competes with the likes of Ericsson, Huawei Technologies, and Cisco Systems to sell networking equipment, software, and services to telecommunications operators and large enterprises.On Thursday, it offered to buy Finnish neighbor Comptel, which develops software to help network operators manage their networks and deliver additional services.Nokia said the deal, valuing Comptel at around €347 million (US$370 million) would help it toward its goal of building a standalone software business.The bid is a logical move, said Sylvain Fabre, a research director at Gartner: "The days of proprietary infrastructure from network equipment providers are numbered. Virtualized infrastructure will increasingly be procurable from alternative vendors, so focusing on software and applications for telecommunications functions is the way forward for any large vendor that seeks longevity."To read this article in full or to leave a comment, please click here

Nokia makes bid for Comptel to boost its software business

Network equipment vendor Nokia wants to buy a software company that helps customers make do with less hardware.The Finnish networking giant competes with the likes of Ericsson, Huawei Technologies, and Cisco Systems to sell networking equipment, software, and services to telecommunications operators and large enterprises.On Thursday, it offered to buy Finnish neighbor Comptel, which develops software to help network operators manage their networks and deliver additional services.Nokia said the deal, valuing Comptel at around €347 million (US$370 million) would help it toward its goal of building a standalone software business.The bid is a logical move, said Sylvain Fabre, a research director at Gartner: "The days of proprietary infrastructure from network equipment providers are numbered. Virtualized infrastructure will increasingly be procurable from alternative vendors, so focusing on software and applications for telecommunications functions is the way forward for any large vendor that seeks longevity."To read this article in full or to leave a comment, please click here

As third RSA Conference without ‘booth babes’ nears, no one seems to miss them

In March 2015, RSA Conference organizers made news by contractually insisting that vendors pitch their security wares without the help of “booth babes,” a first such ban for the technology industry.Next week’s RSAC in San Francisco will be the third without the babes, so I checked in with event staff to see if the policy had evolved at all and how it has been accepted by various stake-holders.  Here’s how the contract language read in 2015: All Expo staff are expected to dress in business and/or business casual attire. Exhibitors should ensure that the attire of al staff they deploy at their booth (whether the exhibitor’s direct employees or their contractors) be considered appropriate in a professional environment. Attire of an overly revealing or suggestive nature is not permitted. Examples of such attire may include but are not restricted to:To read this article in full or to leave a comment, please click here

As third RSA Conference without ‘booth babes’ nears, no one seems to miss them

In March 2015, RSA Conference organizers made news by contractually insisting that vendors pitch their security wares without the help of “booth babes,” a first such ban for the technology industry.Next week’s RSAC in San Francisco will be the third without the babes, so I checked in with event staff to see if the policy had evolved at all and how it has been accepted by various stake-holders.  Here’s how the contract language read in 2015: All Expo staff are expected to dress in business and/or business casual attire. Exhibitors should ensure that the attire of al staff they deploy at their booth (whether the exhibitor’s direct employees or their contractors) be considered appropriate in a professional environment. Attire of an overly revealing or suggestive nature is not permitted. Examples of such attire may include but are not restricted to:To read this article in full or to leave a comment, please click here

Making the Connections in Disparate Data

Enterprises are awash in data, and the number of sources of that data is only increasing. For some of the larger companies, data sources can rise into the thousands – from databases, files and tables to ERP and CRM programs – and the data itself can come in different formats, making it difficult to bring together and integrate into a unified pool. This can create a variety of challenges for businesses in everything from securing the data they have to analyzing it.

The problem isn’t going to go away. The rise of mobile and cloud computing and the Internet of

Making the Connections in Disparate Data was written by Nicole Hemsoth at The Next Platform.