The products Apple discontinued in 2016

Looking back, moving forwardThe modern-day Apple isn't afraid to stop making a product. The company has its reasons to do so: outdated technology, what it contributes to the bottom line, resource allocation, whatever. And as far as Apple history goes, 2016 may be remembered more for the products Apple discontinued than what the company released.To read this article in full or to leave a comment, please click here

The products Apple discontinued in 2016

Looking back, moving forwardThe modern-day Apple isn't afraid to stop making a product. The company has its reasons to do so: outdated technology, what it contributes to the bottom line, resource allocation, whatever. And as far as Apple history goes, 2016 may be remembered more for the products Apple discontinued than what the company released.To read this article in full or to leave a comment, please click here

Thwarting cybersecurity threats with behavioral analytics in 2017

Companies are investing more money in emerging technologies that can help anticipate and detect a variety of threats, including phishing scams and advanced persistent threats, both of which are weighing heavily on the minds’ of corporate board members. For 2017 CIOs are eyeing tools that use anomaly-detecting analytics and machine learning algorithms to protect their companies’ data.“Our level of investments is increasing because of the increasing capabilities of the threat actors,” says Bob Worrall, CIO of Juniper Networks, who spent 12 percent more on cybersecurity tools in 2016 that he spent in 2015. His budget will increase more in 2017 as he purchases tools to shield Juniper’s corporate data and intellectual property. “As the bad guys get smarter we have to as well.”To read this article in full or to leave a comment, please click here

Thwarting cybersecurity threats with behavioral analytics in 2017

Companies are investing more money in emerging technologies that can help anticipate and detect a variety of threats, including phishing scams and advanced persistent threats, both of which are weighing heavily on the minds’ of corporate board members. For 2017 CIOs are eyeing tools that use anomaly-detecting analytics and machine learning algorithms to protect their companies’ data.“Our level of investments is increasing because of the increasing capabilities of the threat actors,” says Bob Worrall, CIO of Juniper Networks, who spent 12 percent more on cybersecurity tools in 2016 that he spent in 2015. His budget will increase more in 2017 as he purchases tools to shield Juniper’s corporate data and intellectual property. “As the bad guys get smarter we have to as well.”To read this article in full or to leave a comment, please click here

9 technologies that IT needed but didn’t get in 2016

Despite some significant arrivals, 2016 also failed to deliver some long-awaited technologies. And some of what we eagerly ripped the wrapping paper off proved to be a letdown.Here’s a rundown of the gifts IT didn’t get in 2016.Professional-grade 3D printing If you want to print out a stand for your phone or a model for a new product, you can easily find a 3D printer for the office that can do that — as long as you want to print them out in plastic. You can spend more and get a 3D printer that can UV cure resin and make small objects like custom-fit earplugs in about 10 minutes (I watched my ACS Custom in-ear monitor headphones get printed from digital scans of my ear canals earlier this year). Even HP’s $140,000 Multi Jet Fusion printers — promised for this year and offering multi-color printing — only just went on sale, and they still only print nylon. You can prototype a (plastic) circuit board with conductive ink circuits with the Voxel8 Developer Kit, as long as you pause the printing and add the chips by hand.To read this article in full or to leave a comment, please Continue reading

9 technologies that IT needed but didn’t get in 2016

Despite some significant arrivals, 2016 also failed to deliver some long-awaited technologies. And some of what we eagerly ripped the wrapping paper off proved to be a letdown.Here’s a rundown of the gifts IT didn’t get in 2016.Professional-grade 3D printing If you want to print out a stand for your phone or a model for a new product, you can easily find a 3D printer for the office that can do that — as long as you want to print them out in plastic. You can spend more and get a 3D printer that can UV cure resin and make small objects like custom-fit earplugs in about 10 minutes (I watched my ACS Custom in-ear monitor headphones get printed from digital scans of my ear canals earlier this year). Even HP’s $140,000 Multi Jet Fusion printers — promised for this year and offering multi-color printing — only just went on sale, and they still only print nylon. You can prototype a (plastic) circuit board with conductive ink circuits with the Voxel8 Developer Kit, as long as you pause the printing and add the chips by hand.To read this article in full or to leave a comment, please Continue reading

7 IT recruiting predictions for 2017

In 2016, recruiters grappled with an evolving job market, an incredibly competitive hiring landscape, a shortage of IT talent and sky-high salaries for in-demand roles. Those trends are likely to continue into 2017 as recruiters continue to adapt to the this high-demand, low supply hiring landscape, says Dave Morgan, president of IT and engineering for professional recruiting and staffing services firm Addison Group.To read this article in full or to leave a comment, please click here(Insider Story)

Encryption in 2016: Small victories add up

Technology development seems to gallop a little faster each year. But there's always one laggard: encryption. Why the deliberate pace? Because a single, small mistake can cut off communications or shut down businesses.Yet there are times when you take stock—only to discover the encryption landscape seems to have transformed overnight. Now is that time. Although the changes have been incremental over several years, the net effect is dramatic.[ Give yourself a technology career advantage with InfoWorld's Deep Dive technology reports and Computerworld's career trends reports. GET A 15% DISCOUNT through Jan.15, 2017: Use code 8TIISZ4Z. ] Some of those changes began shortly after Edward Snowden's disclosures of the U.S. government’s extensive surveillance apparatus. Others are the natural result of cryptographic ideas reaching the marketplace, says Brent Waters, an associate professor at the University of Texas at Austin and the recipient of the Association for Computing Machinery’s 2015 Grace Murray Hopper Award.To read this article in full or to leave a comment, please click here

Encryption in 2016: Small victories add up

Technology development seems to gallop a little faster each year. But there's always one laggard: encryption. Why the deliberate pace? Because a single, small mistake can cut off communications or shut down businesses.Yet there are times when you take stock—only to discover the encryption landscape seems to have transformed overnight. Now is that time. Although the changes have been incremental over several years, the net effect is dramatic.[ Give yourself a technology career advantage with InfoWorld's Deep Dive technology reports and Computerworld's career trends reports. GET A 15% DISCOUNT through Jan.15, 2017: Use code 8TIISZ4Z. ] Some of those changes began shortly after Edward Snowden's disclosures of the U.S. government’s extensive surveillance apparatus. Others are the natural result of cryptographic ideas reaching the marketplace, says Brent Waters, an associate professor at the University of Texas at Austin and the recipient of the Association for Computing Machinery’s 2015 Grace Murray Hopper Award.To read this article in full or to leave a comment, please click here

SoftBank invests $1.2 billion in the OneWeb satellite network

We now know at least one recipient of Masayoshi Son's massive $50 billion investment for the U.S. He ponied up $1.2 billion for OneWeb, the global satellite project for worldwide internet coverage. OneWeb is a project from English entrepreneur Richard Branson. The goal is to put as many as 2,400 small satellites in low orbit to provide complete global coverage for broadband internet access in many places where it's not available. According to SpaceNews, that number has been reduced to 900. To read this article in full or to leave a comment, please click here

5 reasons to automate your network

AutomationImage by ThinkstockThere’s no doubt about it, networks are becoming increasingly complex, and between connecting to high-powered data centers, spinning up cloud deployments and ensuring constant connectivity – all while keeping costs down – IT teams are feeling the pressure. So, how can they do it all, do it well and keep within a tight budget? Automation.To read this article in full or to leave a comment, please click here

How I Started Hating Automatic Context Switching in Cisco IOS

Here’s a trick question:

To implement this request you use the following configuration commands (plenty of other commands removed because they don’t impact the results):

router bgp 64500
 address-family ipv4
  maximum-paths ibgp 32
  maximum-paths 32
  neighbor 192.168.0.4 next-hop-self
  neighbor 192.168.0.1 next-hop-self
 address-family vpnv4
  maximum-paths ibgp 32
  maximum-paths 32
  no neighbor 192.168.0.4 next-hop-self
  no neighbor 192.168.0.1 next-hop-self

Try to figure out what the end-result will be without connecting to a router or reading the rest of this blog post.

Ok, here’s what totally threw me off (and wasted an hour of my life): next-hop-self is removed from neighbors in the IPv4 address family. Here’s why:

  • There is no maximum-paths ibgp command in VPNv4 address family;
  • The moment you enter maximum-paths ibgp command the configuration parser exits the address-family vpnv4 context and enters router bgp context;
  • Because the ipv4 address family is the default context within router bgp (for legacy reasons) all the subsequent commands are executed within the address-family ipv4 context removing next-hop self from neighbors in IPv4 address family.

No wonder David Barroso named his library NAPALM (you’ll find the full story in this or this podcast).

Lenovo’s popular ThinkPads speed up with Intel’s Kaby Lake chips

Lenovo is starting its CES party a bit early, announcing new and upgraded ThinkPad laptops and a 2-in-1 with Intel's new Kaby Lake chips and a slew of new features. The new ThinkPads are getting better screens, faster DDR4 memory and more storage capacity. Features like USB-C ports, optional LTE connectivity, precision touchpads and optional infrared cameras for Windows Hello are being offered across the ThinkPad X, L and T series. Lenovo also introduced the ThinkPad Yoga 370 2-in-1, which is the first model in the brand with a 13.3-inch HD screen and a Thunderbolt 3 port. The upgraded products are mainly workhorse ThinkPads, but Lenovo is also expected to separately announce flashier laptops and 2-in-1s at CES.To read this article in full or to leave a comment, please click here

Lenovo’s ThinkPad T570 will have Intel’s superfast Optane storage

Lenovo's ThinkPad T570 is a loaded laptop that boasts a range of whiz-bang technologies, but the ability to run Intel's secretive Optane memory stands out.When it ships in March, the T570 will be ready to run Intel's Optane, a new class of memory and storage that promises to be significantly faster than today's SSDs and DRAM.The T570 is the first laptop announced with support for Optane. Intel has not said when it will ship Optane memory, but the T570 has the hooks to support the technology.The T570 also can be configured with a 4K touch display, Nvidia's GeForce 940MX discrete graphics and up to 32GB of DRAM. The laptop is targeted at business users, but it could be a dream machine for enthusiasts.To read this article in full or to leave a comment, please click here

ACL Trace in APIC EM

I wanted to take just a moment to share the output of an APIC-EM ACL Trace (option in Path Trace). For this example, I have built out the topology below.

pathtracetopology

The applicable configuration for CSR1000v-2 is as follows–

ip access-list extended TESTING
 permit ospf any any
 permit icmp any any
 permit tcp any any eq telnet
 deny   tcp any any eq 22
 permit ip any any
!
interface GigabitEthernet2
 description to csr1000v-1
 ip address 10.0.0.6 255.255.255.252
 ip access-group TESTING in
 ip ospf cost 1
 negotiation auto
 cdp enable

For testing it is possible to run a path trace from 10.1.1.1 (LAN interface on CSR1000v-1) to 10.1.2.1 (LAN interface on CSR1000v-2) with TCP Ports. To expose the layer 4 options, it is necessary to choose more options. The check mark in the “ACL Trace” instructs APIC-EM to evaluate ACLs.

pathtraceoptions

The output indicates a successful trace AND an allowed match through the ACL.

successfulacl

Adjusting the path trace to target TCP port 22 demonstrates how a blocked flow is represented in APIC-EM.

failedacltrace

The one caveat I have found is that this is only ‘semi’ real time. APIC-EM downloads the configuration from its Continue reading

IDG Contributor Network: On that ‘death to VDI’ thing

Anyone who works within a large organization will be well aware of what Virtual Desktop Infrastructure (VDI) is. For those unaccustomed, essentially VDI is a technology whereby on any device, anywhere, a user can log in and access a virtual representation of a desktop computer. It’s a way to use the applications, user setup and security of a fixed physical device without needing to use a fixed physical device.That’s the good part. But alas VDI has a negative side: poor user experience, often laggy processing and a “one size fits all” approach that doesn't really cover the multitude of form factors that end users actually need.So, when I heard awhile ago that a new player in the VDI space picked up some funding, I wrote a post that articulated my incredulity that an investor would actually see the space as attractive. A friend of mine, a particularly studious chap who, given a science background, has a preference to empirical data and research-based findings, called me out and sent me an email critiquing my commentary about VDI.To read this article in full or to leave a comment, please click here

The future of web-scale networking is here

A guest post by David Iles of Mellanox . This is the 4th blog in a 4-part series highlighting many of the features in our Cumulus Linux 3.2 release that are designed to help our customers move towards web-scale networking.

Must be this tall to play in this data center

If you’ve ever been to an amusement park, you’ve seen those “must be this tall to ride” signs. With data centers, instead of goofy signs mocking the vertically challenged, network architectures plant strict feature requirements into RFPs to weed out the less mature offerings. In many cases, they even place features they don’t really need – sometimes as a way to measure the breadth of the offerings that get submitted.

Just as an archaeologist can determine the historical date of excavation sites based on the artifacts found there, I can usually identify the age of network RFPs by the features embedded in them:

  •  TRILL –  the RFP is at least 2 years old
  • RIP –  the RFP is at probably 4 years old
  • Stacking (in the datacenter) –  RFP is probably 6 years old
  • Token Ring or FDDI – RFP must be 20 years old
  • MLAG (VPC) – no more Continue reading

27% off Seagate Expansion 4TB Desktop External Hard Drive USB 3.0

The Seagate expansion desktop drive provides extra storage for your ever-growing collection of files. Instantly add space for more files, consolidate all of your files to a single location, or free up space on your computer's internal drive to help improve performance. Setup is straightforward; simply plug in the included power supply and USB cable, and you are ready to go. It is automatically recognized by the Windows operating system, so there is no software to install and nothing to configure. Saving files is easy too-just drag-and-drop. Take advantage of the fast data transfer speeds with the USB 3.0 interface by connecting to a SuperSpeed USB 3.0 port.  This drive receives 4.5 out of 5 stars on Amazon, where its typical list price of $149.99 has been reduced 27% to $109.56. See it now on Amazon.To read this article in full or to leave a comment, please click here

See this year’s top 5 underrated Microsoft announcements

This was a big year for Microsoft. The HoloLens began shipping to developers, Windows 10 made it through its first year intact (though not without controversy), and the company got into the desktop computer market with a stunning mega-touchscreen. But there were a few key announcements that flew under the radar this year. While they may not have the splash factor of a Surface Studio or HoloLens, these developments have the potential to alter Microsoft and the world for years to come. Here’s the rundown on what you probably missed.Microsoft’s new bot tools help build conversation partners At its Build developer conference, Microsoft outlined a vision for a conversational computing platform. The idea is pretty simple: Traditional user interfaces are hard to understand right off the bat, so we should let people just talk with computers.To read this article in full or to leave a comment, please click here

11% off Star Wars: Battlefront & SteelBook (Amazon Exclusive) – PlayStation 4 – Deal Alert

Fight for the Rebellion or Empire in a wide variety of multiplayer matches for up to 40 players, or in exciting challenges inspired by the films available solo, split-screen or through online co-op. Star Wars Battlefront combines this epic action on a galactic scale with stunning visual recreations of some of the most iconic planets, weapons, characters, and vehicles in the Star Wars universe and the original sound effects from the films, to give Star Wars fans the ultimate, authentic and immersive interactive experience they’ve been looking for.  This discounted deal Includes Star Wars Battlefront standard video game for PS4 and an official SteelBook, an Amazon Exclusive. A SteelBook is a limited, high quality, premium metal case.  Check it out on Amazon now.To read this article in full or to leave a comment, please click here