Citrix is a bit like the pachyderm in the proverb about the blind men and the elephant. How customers describe the company depends a lot on which of Citrix’s diverse products they touch. It’s a desktop and app virtualization company. It’s a networking company. A secure file sharing company, a mobility management firm.Mobility and networkingTo read this article in full or to leave a comment, please click here(Insider Story)
Internet giant Yahoo announced a massive data breach Wednesday that affected over one billion accounts, making it by far the largest data breach in history. This follows the disclosure in September of a different breach that affected more than 500 million of the company's customers.What stands out with this new security compromise is that it occurred over three years ago, in August 2013, and that hackers walked away with password hashes that can be easily cracked.To read this article in full or to leave a comment, please click here
Internet giant Yahoo announced a massive data breach Wednesday that affected over one billion accounts, making it by far the largest data breach in history. This follows the disclosure in September of a different breach that affected more than 500 million of the company's customers.What stands out with this new security compromise is that it occurred over three years ago, in August 2013, and that hackers walked away with password hashes that can be easily cracked.To read this article in full or to leave a comment, please click here
Cisco Systems suffered a major defeat in its long legal fight against rival Arista Networks on Wednesday when a federal court jury rejected its demand for damages.The jury in the Northern California district court in San Jose also ruled Arista didn’t infringe a Cisco patent, nor Cisco’s copyright on its user manuals, Arista said in a statement. Other patents had been removed from the case earlier.Cisco sued Arista, an upstart maker of enterprise network gear, for patent and copyright infringement in 2014. It alleged the company had copied Cisco’s products and the CLI (command-line interface) that engineers have long used to configure and manage Cisco switches and routers. Arista was founded by former Cisco executives in 2004.To read this article in full or to leave a comment, please click here
Cisco Systems suffered a major defeat in its long legal fight against rival Arista Networks on Wednesday when a federal court jury rejected its demand for damages.The jury in the Northern California district court in San Jose also ruled Arista didn’t infringe a Cisco patent, nor Cisco’s copyright on its user manuals, Arista said in a statement. Other patents had been removed from the case earlier.Cisco sued Arista, an upstart maker of enterprise network gear, for patent and copyright infringement in 2014. It alleged the company had copied Cisco’s products and the CLI (command-line interface) that engineers have long used to configure and manage Cisco switches and routers. Arista was founded by former Cisco executives in 2004.To read this article in full or to leave a comment, please click here
TEKsystems 2017 IT forecast shows IT budgets rebounding from a slump in 2016, and IT leaders' confidence high going into the new year. But challenges around talent acquisition and organizational alignment will persist.The research, which polled 700 CIOs, IT hiring managers, directors and vice presidents in October 2016, found that almost half, 49 percent, expect their IT budgets to increase in 2017. Only 12 percent of respondents say their IT budgets will decrease, and 39 percent say their budgets will stay the same.To read this article in full or to leave a comment, please click here
A Wednesday summit between some of the most powerful people in technology and U.S. president-elect Donald Trump covered a wide ground but avoided discussion on two of the biggest issues facing the industry: the use of encryption and government surveillance.Trump's team called the meeting the start of "a conversation and partnership in order to spark innovation and create more jobs in the U.S." and said it could be repeated as often as once a quarter once he assumes the presidency.Many in Silicon Valley had been vocal opponents of Trump prior to the election, but in meeting executives of the region's biggest companies on Wednesday, Trump sought to gain their support. In particular, he asked them for "specific innovative solutions that have been blocked by narrow thinking in Washington," his team said in a statement.To read this article in full or to leave a comment, please click here
A Wednesday summit between some of the most powerful people in technology and U.S. president-elect Donald Trump covered a wide ground but avoided discussion on two of the biggest issues facing the industry: the use of encryption and government surveillance.Trump's team called the meeting the start of "a conversation and partnership in order to spark innovation and create more jobs in the U.S." and said it could be repeated as often as once a quarter once he assumes the presidency.Many in Silicon Valley had been vocal opponents of Trump prior to the election, but in meeting executives of the region's biggest companies on Wednesday, Trump sought to gain their support. In particular, he asked them for "specific innovative solutions that have been blocked by narrow thinking in Washington," his team said in a statement.To read this article in full or to leave a comment, please click here
Cloud providers and large enterprises don't know enough about what's going on in their networks, according to Nokia.The networking equipment vendor wants to remedy that by enhancing its products with technologies from U.S. IP network analytics vendor Deepfield, which it has just announced plans to acquire. Deepfield provides real-time information about application demand and data flows that Nokia intends to use to help its SDN (software-defined networks) steer traffic.Nokia sees Deepfield's analytics tools as a way to help its customers -- including ISPs and telcos, hosting companies and others operating cloud services at scale -- to better control and protect their networks.To read this article in full or to leave a comment, please click here
Cloud providers and large enterprises don't know enough about what's going on in their networks, according to Nokia.The networking equipment vendor wants to remedy that by enhancing its products with technologies from U.S. IP network analytics vendor Deepfield, which it has just announced plans to acquire. Deepfield provides real-time information about application demand and data flows that Nokia intends to use to help its SDN (software-defined networks) steer traffic.Nokia sees Deepfield's analytics tools as a way to help its customers -- including ISPs and telcos, hosting companies and others operating cloud services at scale -- to better control and protect their networks.To read this article in full or to leave a comment, please click here
No matter where you rank on the totem pole in your company, it's important to resign from your job gracefully. However, for executives, the resignation process looks slightly different. There is a lot to consider before leaving an executive position and going about it the wrong way can quickly become career-damaging down the road.To read this article in full or to leave a comment, please click here(Insider Story)
Google may know more about me than I know about myself.I'm not just saying that, either: I recently started poking around in Google's personal data repositories and realized that, between my wide-reaching use of the company's services and my own brain's inability to remember anything for more than seven seconds, Google may actually have the upper hand when it comes to knowledge about my life.From face-tagged photos of my past adventures (what year did I go to Nashville, again -- and who went with me to that Eddie Vedder show?) to the minute-by-minute play-by-play of my not-so-adventuresome days (wait, you mean I really only left the house once last Wednesday -- and just to get a freakin' sandwich?!), Google's got all sorts of goods on me. Heck, even my hopes and dreams (which may or may not involve sandwiches) are probably catalogued somewhere in its systems.To read this article in full or to leave a comment, please click here
Google may know more about me than I know about myself.I'm not just saying that, either: I recently started poking around in Google's personal data repositories and realized that, between my wide-reaching use of the company's services and my own brain's inability to remember anything for more than seven seconds, Google may actually have the upper hand when it comes to knowledge about my life.From face-tagged photos of my past adventures (what year did I go to Nashville, again -- and who went with me to that Eddie Vedder show?) to the minute-by-minute play-by-play of my not-so-adventuresome days (wait, you mean I really only left the house once last Wednesday -- and just to get a freakin' sandwich?!), Google's got all sorts of goods on me. Heck, even my hopes and dreams (which may or may not involve sandwiches) are probably catalogued somewhere in its systems.To read this article in full or to leave a comment, please click here
Ho-ho, whoaImage by ThinkstockThe downtime created by the holiday season is a fan favorite for enterprise employees and hackers alike. As workers are enjoying time away from the office for vacations or working remotely, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday’s victim, security professionals provide tips for IT managers to protect corporate data, as well as share recommendations for using the slower cycles to test security systems. To read this article in full or to leave a comment, please click here
Ho-ho, whoaImage by ThinkstockThe downtime created by the holiday season is a fan favorite for enterprise employees and hackers alike. As workers are enjoying time away from the office for vacations or working remotely, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday’s victim, security professionals provide tips for IT managers to protect corporate data, as well as share recommendations for using the slower cycles to test security systems. To read this article in full or to leave a comment, please click here
Larger enterprises have the resources to not only afford the technology needed to grow in the digital age, but they also have the budget and manpower to build security into their overall ecosystems.Does the K-12 education sector have the means to do the same? As the use of technology becomes more prevalent in public schools, will collecting more data potentially increase the cybersecurity risks for the K-12 sector?Earlier this fall, the Center for Data Innovation released a report, Building a Data-Driven Education System in the United States, in which they said 93 percent of teachers are regularly using digital tools to assist classroom instruction in some capacity.To read this article in full or to leave a comment, please click here
Larger enterprises have the resources to not only afford the technology needed to grow in the digital age, but they also have the budget and manpower to build security into their overall ecosystems.Does the K-12 education sector have the means to do the same? As the use of technology becomes more prevalent in public schools, will collecting more data potentially increase the cybersecurity risks for the K-12 sector?Earlier this fall, the Center for Data Innovation released a report, Building a Data-Driven Education System in the United States, in which they said 93 percent of teachers are regularly using digital tools to assist classroom instruction in some capacity.To read this article in full or to leave a comment, please click here
The rapidly expanding wearable device market raises serious privacy concerns, as some device makers collect a massive amount of personal data and share it with other companies, according to a new study.Existing health privacy laws don't generally apply to wearable makers, the study says. While consumers are embracing fitness trackers, smart watches, and smart clothing, a "weak and fragmented" health privacy regulatory system in the U.S. fails to give consumers the privacy protections they may expect, said the study, released Thursday by the Center for Digital Democracy and the School of Communication at American University.To read this article in full or to leave a comment, please click here
The rapidly expanding wearable device market raises serious privacy concerns, as some device makers collect a massive amount of personal data and share it with other companies, according to a new study.Existing health privacy laws don't generally apply to wearable makers, the study says. While consumers are embracing fitness trackers, smart watches, and smart clothing, a "weak and fragmented" health privacy regulatory system in the U.S. fails to give consumers the privacy protections they may expect, said the study, released Thursday by the Center for Digital Democracy and the School of Communication at American University.To read this article in full or to leave a comment, please click here