Lenovo’s ThinkPad T570 will have Intel’s superfast Optane storage

Lenovo's ThinkPad T570 is a loaded laptop that boasts a range of whiz-bang technologies, but the ability to run Intel's secretive Optane memory stands out.When it ships in March, the T570 will be ready to run Intel's Optane, a new class of memory and storage that promises to be significantly faster than today's SSDs and DRAM.The T570 is the first laptop announced with support for Optane. Intel has not said when it will ship Optane memory, but the T570 has the hooks to support the technology.The T570 also can be configured with a 4K touch display, Nvidia's GeForce 940MX discrete graphics and up to 32GB of DRAM. The laptop is targeted at business users, but it could be a dream machine for enthusiasts.To read this article in full or to leave a comment, please click here

ACL Trace in APIC EM

I wanted to take just a moment to share the output of an APIC-EM ACL Trace (option in Path Trace). For this example, I have built out the topology below.

pathtracetopology

The applicable configuration for CSR1000v-2 is as follows–

ip access-list extended TESTING
 permit ospf any any
 permit icmp any any
 permit tcp any any eq telnet
 deny   tcp any any eq 22
 permit ip any any
!
interface GigabitEthernet2
 description to csr1000v-1
 ip address 10.0.0.6 255.255.255.252
 ip access-group TESTING in
 ip ospf cost 1
 negotiation auto
 cdp enable

For testing it is possible to run a path trace from 10.1.1.1 (LAN interface on CSR1000v-1) to 10.1.2.1 (LAN interface on CSR1000v-2) with TCP Ports. To expose the layer 4 options, it is necessary to choose more options. The check mark in the “ACL Trace” instructs APIC-EM to evaluate ACLs.

pathtraceoptions

The output indicates a successful trace AND an allowed match through the ACL.

successfulacl

Adjusting the path trace to target TCP port 22 demonstrates how a blocked flow is represented in APIC-EM.

failedacltrace

The one caveat I have found is that this is only ‘semi’ real time. APIC-EM downloads the configuration from its Continue reading

IDG Contributor Network: On that ‘death to VDI’ thing

Anyone who works within a large organization will be well aware of what Virtual Desktop Infrastructure (VDI) is. For those unaccustomed, essentially VDI is a technology whereby on any device, anywhere, a user can log in and access a virtual representation of a desktop computer. It’s a way to use the applications, user setup and security of a fixed physical device without needing to use a fixed physical device.That’s the good part. But alas VDI has a negative side: poor user experience, often laggy processing and a “one size fits all” approach that doesn't really cover the multitude of form factors that end users actually need.So, when I heard awhile ago that a new player in the VDI space picked up some funding, I wrote a post that articulated my incredulity that an investor would actually see the space as attractive. A friend of mine, a particularly studious chap who, given a science background, has a preference to empirical data and research-based findings, called me out and sent me an email critiquing my commentary about VDI.To read this article in full or to leave a comment, please click here

The future of web-scale networking is here

A guest post by David Iles of Mellanox . This is the 4th blog in a 4-part series highlighting many of the features in our Cumulus Linux 3.2 release that are designed to help our customers move towards web-scale networking.

Must be this tall to play in this data center

If you’ve ever been to an amusement park, you’ve seen those “must be this tall to ride” signs. With data centers, instead of goofy signs mocking the vertically challenged, network architectures plant strict feature requirements into RFPs to weed out the less mature offerings. In many cases, they even place features they don’t really need – sometimes as a way to measure the breadth of the offerings that get submitted.

Just as an archaeologist can determine the historical date of excavation sites based on the artifacts found there, I can usually identify the age of network RFPs by the features embedded in them:

  •  TRILL –  the RFP is at least 2 years old
  • RIP –  the RFP is at probably 4 years old
  • Stacking (in the datacenter) –  RFP is probably 6 years old
  • Token Ring or FDDI – RFP must be 20 years old
  • MLAG (VPC) – no more Continue reading

27% off Seagate Expansion 4TB Desktop External Hard Drive USB 3.0

The Seagate expansion desktop drive provides extra storage for your ever-growing collection of files. Instantly add space for more files, consolidate all of your files to a single location, or free up space on your computer's internal drive to help improve performance. Setup is straightforward; simply plug in the included power supply and USB cable, and you are ready to go. It is automatically recognized by the Windows operating system, so there is no software to install and nothing to configure. Saving files is easy too-just drag-and-drop. Take advantage of the fast data transfer speeds with the USB 3.0 interface by connecting to a SuperSpeed USB 3.0 port.  This drive receives 4.5 out of 5 stars on Amazon, where its typical list price of $149.99 has been reduced 27% to $109.56. See it now on Amazon.To read this article in full or to leave a comment, please click here

See this year’s top 5 underrated Microsoft announcements

This was a big year for Microsoft. The HoloLens began shipping to developers, Windows 10 made it through its first year intact (though not without controversy), and the company got into the desktop computer market with a stunning mega-touchscreen. But there were a few key announcements that flew under the radar this year. While they may not have the splash factor of a Surface Studio or HoloLens, these developments have the potential to alter Microsoft and the world for years to come. Here’s the rundown on what you probably missed.Microsoft’s new bot tools help build conversation partners At its Build developer conference, Microsoft outlined a vision for a conversational computing platform. The idea is pretty simple: Traditional user interfaces are hard to understand right off the bat, so we should let people just talk with computers.To read this article in full or to leave a comment, please click here

11% off Star Wars: Battlefront & SteelBook (Amazon Exclusive) – PlayStation 4 – Deal Alert

Fight for the Rebellion or Empire in a wide variety of multiplayer matches for up to 40 players, or in exciting challenges inspired by the films available solo, split-screen or through online co-op. Star Wars Battlefront combines this epic action on a galactic scale with stunning visual recreations of some of the most iconic planets, weapons, characters, and vehicles in the Star Wars universe and the original sound effects from the films, to give Star Wars fans the ultimate, authentic and immersive interactive experience they’ve been looking for.  This discounted deal Includes Star Wars Battlefront standard video game for PS4 and an official SteelBook, an Amazon Exclusive. A SteelBook is a limited, high quality, premium metal case.  Check it out on Amazon now.To read this article in full or to leave a comment, please click here

40% off iDevices iGrill2 Bluetooth Grill Thermometer – Deal Alert

The iGrill2, a Bluetooth Smart meat thermometer, aims to make grilling and smoking easier, more convenient, and smarter. The unit comes packaged with two probes, and can support up to four, making it possible to measure multiple areas at once with a min and max temp setting of -22 to 572-degrees fahrenheit. With a 150-foot range, the iGrill2 gives you the freedom to walk away and entertain your guests or watch the game while your grill or smoker cooks to perfection. It's compatible with iOS devices and most Bluetooth Smart Ready Android devices. The iDevices Connected app, powered by Bluetooth Smart technology, is the central hub for managing your iGrill. Monitor your temperature progression and get a more detailed view for each probe with customizable views that can be exported (because why not). The iGrill2 averages 4 out of 5 stars from over 770 customers (see reviews), and with this 40% off deal it's list price of $99.99 has been reduced to $59.99, just in time for Father's Day. See the discounted iGrill2 from iDevices on Amazon.To read this article in full or to leave a comment, please click here

Tips on shooting great video with your drone

With a drone, you can take videos that were never possible before -- at least not if you didn't have the budget for a crane or a helicopter. But having an unmanned aerial vehicle doesn't necessarily mean you'll end up with compelling video. You don't want all your shots to be free and erratic. Viewers are used to seeing certain types of shots, and these help tell a story.To read this article in full or to leave a comment, please click here(Insider Story)

Ransomworm: the next level of cybersecurity nastiness

As if holding your data hostage and seeking cash payment weren’t harsh enough, security experts foresee the next stage of ransomware to be even worse.Scott Millis, CTO at mobile security company Cyber adAPT, expects ransomware to spin out of control in the year ahead. That is an astounding statement when you consider that there were more than 4,000 ransomware attacks daily in 2016, according to Symantec’s Security Response group (Report).Corey Nachreiner, CTO at WatchGuard Technologies, predicts that 2017 will see the first ever ransomworm, causing ransomware to spread even faster.To read this article in full or to leave a comment, please click here

Ransomworm: the next level of cybersecurity nastiness

As if holding your data hostage and seeking cash payment weren’t harsh enough, security experts foresee the next stage of ransomware to be even worse.Scott Millis, CTO at mobile security company Cyber adAPT, expects ransomware to spin out of control in the year ahead. That is an astounding statement when you consider that there were more than 4,000 ransomware attacks daily in 2016, according to Symantec’s Security Response group (Report).Corey Nachreiner, CTO at WatchGuard Technologies, predicts that 2017 will see the first ever ransomworm, causing ransomware to spread even faster.To read this article in full or to leave a comment, please click here

Got a new Android phone? Here’s how to properly get rid of your old one

Whether you got a smartphone under the tree or just plan to gift yourself a handset soon, we hope the joy of the holidays extends to your relationship with your new phone. But don’t forget about the old one! Sure, you might not need it in your pocket, but if you’re not planning to repurpose the device or keep it as a backup, then you shouldn’t just toss it in a drawer or shove it in a closet somewhere. That dated device might still have cash value, or you could donate it to a good cause (possibly for a tax writeoff). At the very least, if you don’t plan on using the phone again, then you should recycle it and ensure that the harmful materials within don’t end up in the dump. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Will networks and security converge in 2017?

Bold predictions are in order at this time of year. Zeus Kerravala looked into his crystal bowl for the networking space, and Taylor Armeriding did the same for security. We went rummaging through our fortune cookies and came up with this Yoda-like one for 2017:Security shall networking become.What did that really mean? Our Yoda translator was of no help. Could networking replace security (or vice versa) in 2017? Should CIOs and CISOs prepare themselves for the inevitable assimilation (head nod to you aging Trekies)? How should, then, security and networking personnel prepare themselves for the inevitable onslaught?To read this article in full or to leave a comment, please click here

IDG Contributor Network: Will networks and security converge in 2017?

Bold predictions are in order at this time of year. Zeus Kerravala looked into his crystal bowl for the networking space, and Taylor Armeriding did the same for security. We went rummaging through our fortune cookies and came up with this Yoda-like one for 2017:Security shall networking become.What did that really mean? Our Yoda translator was of no help. Could networking replace security (or vice versa) in 2017? Should CIOs and CISOs prepare themselves for the inevitable assimilation (head nod to you aging Trekies)? How should, then, security and networking personnel prepare themselves for the inevitable onslaught?To read this article in full or to leave a comment, please click here

IDG Contributor Network: Will networks and security converge in 2017?

Bold predictions are in order at this time of year. Zeus Kerravala looked into his crystal bowl for the networking space, and Taylor Armeriding did the same for security. We went rummaging through our fortune cookies and came up with this Yoda-like one for 2017:Security shall networking become.What did that really mean? Our Yoda translator was of no help. Could networking replace security (or vice versa) in 2017? Should CIOs and CISOs prepare themselves for the inevitable assimilation (head nod to you aging Trekies)? How should, then, security and networking personnel prepare themselves for the inevitable onslaught?To read this article in full or to leave a comment, please click here

Why are browsers so bad after 26 years?

We all live in a browser if we use the internet. You're in one right now if you're reading this. And it's not a new piece of software. Sir Tim Berners-Lee first introduced us to the Mosaic browser in 1990. And despite 26 years of development, the browser remains the worst piece of software we use on a daily basis.Broke. Buggy. Bloated. Hogging memory. Crash-prone. Susceptible to malware. Lousy HTML rendering. I could go on and on with a litany of poorly constructed sentences describing the current state of browsers, but you get the idea. + Also on Network World: Windows 10 browser beatdown: Who’s got the edge? + Browsers aren't just for watching YouTube videos or visiting news sites, either. With the on-demand world of SaaS, browsers are the portal into important line-of-business software, even if the high priest of SaaS, Marc Benioff, hates that word. To read this article in full or to leave a comment, please click here

REVIEW: Early Wave 2 Wi-Fi access points show promise

There’s a lot to like about Wave 2 802.11ac products, including theoretically faster speeds than Wave 1 products and cool new features, such as multi-user MIMO (MU-MIMO.) In this review, we look at five Wave 2 wireless access points, comparing prices and features, looking at usability and doing some performance testing.To read this article in full or to leave a comment, please click here(Insider Story)

First Look: Wave 2 Wi-Fi access points show promise

Wave 2 Wi-Fi access pointsImage by ThinkstockThere’s a lot to like about Wave 2 802.11ac products, including theoretically faster speeds than Wave 1 products and cool new features, such as multi-user MIMO (MU-MIMO.) In this review, we look at five Wave 2 wireless access points, comparing prices and features, looking at usability and doing some performance testing. The products in this review are: Amped Wireless AC1300, ASUS EA-AC87, Cisco Aironet 1852i, Extreme Networks AP3935 and the Linksys LAPAC2600. Read the full review.To read this article in full or to leave a comment, please click here