BrandPost: Converging all communications over IP

With the changing rules of business and the competitive environment, businesses need a high performance network today – and for tomorrow. Many, though, are still operating separate voice and data networks that limit flexibility and inhibit agility.Carriers such as AT&T have long digitized voice traffic over their long-haul networks. On the AT&T network, the volume of data traffic exceeded voice traffic in 2000 as the Internet transformation took hold and businesses increasingly looked to data networks to handle voice, video, telepresence and other sophisticated applications such as virtual white boards.To read this article in full or to leave a comment, please click here

Microsoft Research Pens Quill for Data Intensive Analysis

Collecting data is only useful to the extent that the data is analyzed. These days, human Internet usage is generating more data (particularly for advertising purposes) and Internet of Things devices are providing data about our homes, our cars, and our bodies.

Analyzing that data can become a challenge at scale. Streaming platforms work well with incoming data but aren’t designed for post hoc analysis. Traditional database management systems can perform complex queries against stored data, but cannot be put to real-time usage.

One proposal to address these challenges, called Quill, was developed by Badrish Chandramouli and colleagues at Microsoft

Microsoft Research Pens Quill for Data Intensive Analysis was written by Nicole Hemsoth at The Next Platform.

Microsoft fixes Windows flaw that Google divulged

Microsoft today patched a Windows vulnerability that was disclosed just over a week ago by researchers from Alphabet Inc.'s Google.In one of several security updates -- 14 to be exact -- Microsoft fixed the bug in the Windows kernel drivers that Google security engineers had revealed on Oct. 31, 10 days after notifying Microsoft of the vulnerability.Microsoft credited Neel Mehta and Billy Leonard of Google's Threat Analysis Group for reporting the flaw. Last week, the two said that because the vulnerability was being actively exploited, a disclose-within-seven-days policy applied.To read this article in full or to leave a comment, please click here

Microsoft fixes Windows flaw that Google divulged

Microsoft today patched a Windows vulnerability that was disclosed just over a week ago by researchers from Alphabet Inc.'s Google.In one of several security updates -- 14 to be exact -- Microsoft fixed the bug in the Windows kernel drivers that Google security engineers had revealed on Oct. 31, 10 days after notifying Microsoft of the vulnerability.Microsoft credited Neel Mehta and Billy Leonard of Google's Threat Analysis Group for reporting the flaw. Last week, the two said that because the vulnerability was being actively exploited, a disclose-within-seven-days policy applied.To read this article in full or to leave a comment, please click here

Competing hackers dampen the power of Mirai botnets

The malware behind last month's massive distributed denial-of-service attack in the U.S. appears to be losing its potency. Ironically, hackers are to blame for diluting its power.  The malware known as Mirai -- which is now available on the internet -- has become a bit too popular in the hacking community, according to security firm Flashpoint.Competing hackers have all been trying to take advantage of Mirai to launch new DDoS attacks. To do so, that means infecting the poorly secured internet-connected devices, such as surveillance cameras, baby monitors, and DVRs, that the malware was designed to exploit.To read this article in full or to leave a comment, please click here

Competing hackers dampen the power of Mirai botnets

The malware behind last month's massive distributed denial-of-service attack in the U.S. appears to be losing its potency. Ironically, hackers are to blame for diluting its power.  The malware known as Mirai -- which is now available on the internet -- has become a bit too popular in the hacking community, according to security firm Flashpoint.Competing hackers have all been trying to take advantage of Mirai to launch new DDoS attacks. To do so, that means infecting the poorly secured internet-connected devices, such as surveillance cameras, baby monitors, and DVRs, that the malware was designed to exploit.To read this article in full or to leave a comment, please click here

Google: Cloud won’t require customers to worry about infrastructure

Google infrastructure czar Urs Hölzle is focused on a cloud future where customers don't think about the infrastructure underlying all of the workloads they're running.In his view, one of the key advantages of the cloud is that customers can get the benefits of new hardware without having to completely rework their software."So that means you can have a million customers who move to that new hardware platform, not knowing they did," he said Tuesday at the Structure Conference in San Francisco. "Which means that you can really insert this new technology in a much faster cycle than you could if you did the same thing on-premises."That means companies can get quick, seamless improvements to performance, as opposed to an on-premises deployment. When operating their own data centers, companies must take the time to evaluate new hardware, and take the time to roll it out.To read this article in full or to leave a comment, please click here

26% off Western Digital 2TB My Passport Ultra Portable External Hard Drive – Deal Alert

If you're looking for a ton of portable storage at a rock bottom price, you may want to consider this deal currently available on Amazon. Rated 4.5 out of 5 stars from nearly 6,200 people (read reviews), this Western Digital external hard drive features fast USB 3.0 connectivity, is compatible with both PC and Mac, has optional 256-bit AES hardware encryption, automatic cloud backup, and comes with a 3-year warranty. List price is $119.99 but with the current 26% discount you can buy it now for $89 (See it on Amazon). To read this article in full or to leave a comment, please click here

Nvidia’s Pascal GPUs reach the cloud via IBM and Nimbix

Google, Amazon, and Facebook can magically recognize images and voices, thanks to superfast servers equipped with GPUs in their mega data centers.But not all companies can afford that level of resources for deep learning, so they turn to cloud services, where servers in remote data centers do the heavy lifting.Microsoft has made such cloud services trendy with Azure and is one of the few companies offering remote servers with GPUs, which excel in machine-learning tasks. But Azure uses older Nvidia GPUs, and it now has competition from Nimbix, which offers a cloud service with faster GPUs based on the Nvidia's latest Pascal architecture.To read this article in full or to leave a comment, please click here

Samsung embroiled in South Korean political scandal

South Korean investigators on Tuesday raided the offices of Samsung Electronics, as part of a probe into alleged political corruption at the highest levels of that country’s government.The administration of President Park Guen-hye – who is South Korea’s first female president, and the daughter of former President Park Chung-hee – has been rocked by allegations of influence peddling centered on a mysterious figure said to have influenced policy decisions in exchange for cash.+ ALSO ON NETWORK WORLD: Samsung apologizes for the exploding Note7 with a full-page ad | Phenomenal Note7 Phablet Flame-out Timeline +To read this article in full or to leave a comment, please click here

Nov 2016 Patch Tuesday: Microsoft released 14 security updates, 6 rated critical

In addition to releasing 14 security updates on Election Day Patch Tuesday, six of which are rated critical, the Microsoft Security Response Center responded to requests for better access to security update information; Microsoft’s solution was to release a preview of its new Security Update Guide, “a single destination for security vulnerability information.”MSRC added, “Instead of publishing bulletins to describe related vulnerabilities, the new portal lets our customers view and search security vulnerability information in a single online database.”To read this article in full or to leave a comment, please click here

Nov 2016 Patch Tuesday: Microsoft released 14 security updates, 6 rated critical

In addition to releasing 14 security updates on Election Day Patch Tuesday, six of which are rated critical, the Microsoft Security Response Center responded to requests for better access to security update information; Microsoft’s solution was to release a preview of its new Security Update Guide, “a single destination for security vulnerability information.”MSRC added, “Instead of publishing bulletins to describe related vulnerabilities, the new portal lets our customers view and search security vulnerability information in a single online database.”To read this article in full or to leave a comment, please click here

The Internet is Hostile: Building a More Resilient Network

In a recent post we discussed how we have been adding resilience to our network.

The strength of the Internet is its ability to interconnect all sorts of networks — big data centers, e-commerce websites at small hosting companies, Internet Service Providers (ISP), and Content Delivery Networks (CDN) — just to name a few. These networks are either interconnected with each other directly using a dedicated physical fiber cable, through a common interconnection platform called an Internet Exchange (IXP), or they can even talk to each other by simply being on the Internet connected through intermediaries called transit providers.

The Internet is like the network of roads across a country and navigating roads means answering questions like “How do I get from Atlanta to Boise?” The Internet equivalent of that question is asking how to reach one network from another. For example, as you are reading this on the Cloudflare blog, your web browser is connected to your ISP and packets from your computer found their way across the Internet to Cloudflare’s blog server.

Figuring out the route between networks is accomplished through a protocol designed 25 years ago (on two napkins) called BGP.

BGP allows interconnections between Continue reading