DARPA wants to simulate how social media spreads info like wildfire

When it comes to understanding which, what and how popular information travels the Internet, we have a lot to learn.That seems to be the idea behind a new program that the researchers at The Defense Advanced Research Projects Agency will unravel next month that aims to simulate the spread and evolution of online information.+More on Network World: DARPA: Show us how to weaponize benign technologies+To read this article in full or to leave a comment, please click here

DARPA wants to simulate how social media spreads info like wildfire

When it comes to understanding which, what and how popular information travels the Internet, we have a lot to learn.That seems to be the idea behind a new program that the researchers at The Defense Advanced Research Projects Agency will unravel next month that aims to simulate the spread and evolution of online information.+More on Network World: DARPA: Show us how to weaponize benign technologies+To read this article in full or to leave a comment, please click here

Review: Linksys Velop a solid choice in wireless mesh space

It’s been interesting to see how longtime home wireless vendors have been approaching the new wireless mesh market, in which startup products like Eero, Luma, AmpliFi and Almond have hit the scene – in addition to Google, which doesn’t qualify as a startup, but is new to the Wi-Fi market.To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT security principles from Homeland Security

Power grids were bombed in World War II to cripple industrial output. Today, attacks against Internet of Things (IoT) infrastructure causes even broader disruptions—without bombs.The danger is real. The U.S. Department of Homeland Security (DHS) recently published guidelines to “provide a strategic focus on security and enhance the trust framework that underpins the IoT ecosystem.” The report explains why security has to be a combined effort.To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT security principles from Homeland Security

Power grids were bombed in World War II to cripple industrial output. Today, attacks against Internet of Things (IoT) infrastructure causes even broader disruptions—without bombs.The danger is real. The U.S. Department of Homeland Security (DHS) recently published guidelines to “provide a strategic focus on security and enhance the trust framework that underpins the IoT ecosystem.” The report explains why security has to be a combined effort.To read this article in full or to leave a comment, please click here

Oracle patches raft of vulnerabilities in business applications

Oracle released its first batch of security patches this year, fixing 270 vulnerabilities, mostly in business-critical applications. Many of the flaws can be exploited remotely without authentication.The majority of the fixes are for flaws in business products such as Oracle E-Business Suite, Oracle Fusion Middleware, Oracle PeopleSoft, Oracle Retail Applications, Oracle JD Edwards, Oracle Supply Chain Products and Oracle Database Server.E-Business Suite, which is used by companies to store key data and manage a wide range of business processes, accounts for more than 40 percent of the patched vulnerabilities -- 121. Out of these, 118 are remotely exploitable and the highest rated one has a score of 9.2 (critical) in the Common Vulnerability Scoring System.To read this article in full or to leave a comment, please click here

Oracle patches raft of vulnerabilities in business applications

Oracle released its first batch of security patches this year, fixing 270 vulnerabilities, mostly in business-critical applications. Many of the flaws can be exploited remotely without authentication.The majority of the fixes are for flaws in business products such as Oracle E-Business Suite, Oracle Fusion Middleware, Oracle PeopleSoft, Oracle Retail Applications, Oracle JD Edwards, Oracle Supply Chain Products and Oracle Database Server.E-Business Suite, which is used by companies to store key data and manage a wide range of business processes, accounts for more than 40 percent of the patched vulnerabilities -- 121. Out of these, 118 are remotely exploitable and the highest rated one has a score of 9.2 (critical) in the Common Vulnerability Scoring System.To read this article in full or to leave a comment, please click here

Big Switch brings agility, scale to network packet brokers

Complexity in data centers has grown exponentially with the introduction of new technologies to scale IT infrastructure to keep pace with business demands. This dynamic has caused IT departments to seek out new tools to help manage and secure complex IT environments in modern data centers. The broad adoption of these tools has created new, arduous challenges, including the difficulty of managing various network connections and monitoring specific traffic flows at scale. Leading-edge IT organizations have started adopting software-based network packet broker (NPB) solutions to solve these complex IT challenges with increased agility and flexibility. To read this article in full or to leave a comment, please click here

Big Switch brings agility, scale to network packet brokers

Complexity in data centers has grown exponentially with the introduction of new technologies to scale IT infrastructure to keep pace with business demands. This dynamic has caused IT departments to seek out new tools to help manage and secure complex IT environments in modern data centers. The broad adoption of these tools has created new, arduous challenges, including the difficulty of managing various network connections and monitoring specific traffic flows at scale. Leading-edge IT organizations have started adopting software-based network packet broker (NPB) solutions to solve these complex IT challenges with increased agility and flexibility. To read this article in full or to leave a comment, please click here

5 ways to recruit more women in 2017

Companies, especially in technology, are pulling out all the stops to recruit and retain women: fertility benefits, shipping breast milk home from work trips, in-office massages and manicures, on-site OB/GYNs, the ability to travel with children and a care-giver and feminine products in the restrooms are just a few of the ways companies are getting creative with trying to appeal to women.But while these perks might be appreciated, they're not the fundamental drivers of women's decisions to come on board with your company -- or to stick around, says Ursula Mead, co-founder and CEO of InHerSight, an employee ratings and review site for women.To read this article in full or to leave a comment, please click here

Trump administration threatens net neutrality, cloud and IoT

Businesses could lose their choice of cloud services and applications if the incoming administration or the new congress rolls back net neutrality rules, Tom Wheeler, the outgoing chair of the Federal Communications Commission, warned in his final planned speech before stepping down.Identifying the 2015 open Internet order as one of his signature policy achievements, Wheeler positioned the FCC's net neutrality regulation, which bars ISPs from blocking or slowing transmissions on their networks, as a needed protection for consumers and businesses alike."As everything goes into the cloud, the ability to access the cloud free of gatekeepers is essential. If ISPs get to choose which applications and clouds work better than others in terms of access, speed and latency, they will control the cloud future," Wheeler said.To read this article in full or to leave a comment, please click here

Trump administration threatens net neutrality, cloud and IoT

Businesses could lose their choice of cloud services and applications if the incoming administration or the new congress rolls back net neutrality rules, Tom Wheeler, the outgoing chair of the Federal Communications Commission, warned in his final planned speech before stepping down.Identifying the 2015 open Internet order as one of his signature policy achievements, Wheeler positioned the FCC's net neutrality regulation, which bars ISPs from blocking or slowing transmissions on their networks, as a needed protection for consumers and businesses alike."As everything goes into the cloud, the ability to access the cloud free of gatekeepers is essential. If ISPs get to choose which applications and clouds work better than others in terms of access, speed and latency, they will control the cloud future," Wheeler said.To read this article in full or to leave a comment, please click here

Tech world has changed dramatically since the White House last changed hands

Eight years is but a blink in the grand scheme, yet so much will have changed on the technology and social-media landscape between when Barack Obama took the oath on Jan. 20, 2009 and Donald Trump does so Friday.Before he got started, Obama needed to plead and perhaps pull rank to keep his beloved BlackBerry, a gadget preference which at the time did not seem all that odd. Obama would remain loyal to the device, too, even as its popularity diminished, only relinquishing it last year in exchange for a customized smartphone that he mocked as more suitable for a toddler than a commander in chief.To read this article in full or to leave a comment, please click here

Tech world has changed dramatically since the White House last changed hands

Eight years is but a blink in the grand scheme, yet so much will have changed on the technology and social-media landscape between when Barack Obama took the oath on Jan. 20, 2009 and Donald Trump does so Friday.Before he got started, Obama needed to plead and perhaps pull rank to keep his beloved BlackBerry, a gadget preference which at the time did not seem all that odd. Obama would remain loyal to the device, too, even as its popularity diminished, only relinquishing it last year in exchange for a customized smartphone that he mocked as more suitable for a toddler than a commander in chief.To read this article in full or to leave a comment, please click here

How to overcome 5 common resume mistakes

Our resume writers have seen it all. IT resumes come in all shapes and sizes - they can be as long as novels, as hard to decode as a Shakespeare play or boring enough to put even the biggest tech-junkie to sleep. And that's because writing a resume is not an easy task, no matter how long you've been in the game or how confident you are in your skills and experience.To read this article in full or to leave a comment, please click here(Insider Story)