Microsoft points to a transition of Windows 10 Mobile to 64-bit

There's a lot to like in Microsoft's Windows 10 Mobile for smartphones, but it has one glaring weakness: It still is a 32-bit OS.But a transition to 64-bit for the OS was inevitable as memory capacity in smartphones goes up, Microsoft said during a presentation at the Ignite conference last week. Windows 10 Mobile lags behind Apple's iOS and Google's Android, which transitioned to 64 bits a few years ago. Many new Windows phones already have 64-bit ARM-based Qualcomm processors, but the OS still runs as 32 bit.Thirty-two bits is "not really a limitation for us since the devices are all 4GB [of RAM] or less. But that will change over the next couple of years," said Jason Whitehorn, partner software engineer manager of the Windows and Devices Group at Microsoft.To read this article in full or to leave a comment, please click here

Elephant Flows, Fabrics, and I2RS

The last post in this series on I2RS argues that this interface is designed to augment, rather than replace, the normal, distributed routing protocol. What sort of use case could we construct that would use I2RS in this way? What about elephant flows in data center fabrics? An earlier post considers how to solve the elephant flow using segment routing (SR); can elephant flows also be guided using I2RS? The network below will be used to consider this question.

benes-segment

Assume that A hashes a long lived elephant flow representing some 50% of the total bandwidth available on any single link in the fabric towards F. At the same time, A will hash other flows, represented by the red flow lines, onto each of the three links towards the core of the fabric in pretty much equal proportion. Smaller flows that are hashed onto the A->F link will likely suffer, while flows hashed onto the other two links will not.

This is a particularly bad problem in applications that have been decomposed into microservices, as the various components of the application tend to rely on fairly fixed delay and jitter budgets over the network to keep everything synchronized and running quickly. Continue reading

Your Docker agenda for the month of October

From webinars to workshops, meetups to conference talks, check out our list of events that are coming up in October!

Cs9pXS-WYAQsZTJ.jpg

Online

Oct 13: Docker for Windows Server 2016 by Michael Friis

Oct 18: Docker Datacenter Demo by Moni Sallama and Chris Hines.

 

Official Docker Training Course

View the full schedule of instructor led training courses here!

Introduction to Docker: This is a two-day, on-site or classroom-based training course which introduces you to the Docker platform and takes you through installing, integrating, and running it in your working environment.

Oct 11-12: Introduction to Docker with Xebia – Paris, France

Oct 19-20: Introduction to Docker with Contino – London, United Kingdom

Oct 24-25: Introduction to Docker with AKRA – Krakow, Germany

 

Docker Administration and Operations: The Docker Administration and Operations course consists of both the Introduction to Docker course, followed by the Advanced Docker Topics course, held over four consecutive days.

Oct 3-6: Docker Administration and Operations with Azca – Madrid, Spain

Oct 11-15: Docker Administration and Operations with TREEPTIK – Paris, France

Oct 18-21: Docker Administration and Operations with Vizuri – Raleigh, NC

Oct 18-22: Docker Administration and Operations with TREEPTIK – Aix en Provence, France

Oct 24-27: Continue reading

The craziest stories of the tech sector

Network World started its Wider Net stories in 2003 in an effort to lighten up our news pages, acknowledging that there is a lot more to the world of enterprise networking and IT other than speeds and feeds of switches and routers and WAN links. The story approach was modeled somewhat after the Wall Street Journal's famed and quirky front page A-Hed articles (i.e., the middle column), but tended more to networking topics, from "When animals attack…networks" to the story of networking's most famous couple, Alice and Bob of security lesson fame. While Network World did away with its formal weekly Wider Net articles when the publication switched over to publishing twice a month, we've tried to continue mixing in lighthearted pieces through our blogs and in other places on our website and print magazine. Here are some of our favorites:To read this article in full or to leave a comment, please click here

The craziest stories of the tech sector

Network World started its Wider Net stories in 2003 in an effort to lighten up our news pages, acknowledging that there is a lot more to the world of enterprise networking and IT other than speeds and feeds of switches and routers and WAN links. The story approach was modeled somewhat after the Wall Street Journal's famed and quirky front page A-Hed articles (i.e., the middle column), but tended more to networking topics, from "When animals attack…networks" to the story of networking's most famous couple, Alice and Bob of security lesson fame. While Network World did away with its formal weekly Wider Net articles when the publication switched over to publishing twice a month, we've tried to continue mixing in lighthearted pieces through our blogs and in other places on our website and print magazine. Here are some of our favorites:To read this article in full or to leave a comment, please click here

The craziest stories of the tech sector

Network World started its Wider Net stories in 2003 in an effort to lighten up our news pages, acknowledging that there is a lot more to the world of enterprise networking and IT other than speeds and feeds of switches and routers and WAN links. The story approach was modeled somewhat after the Wall Street Journal's famed and quirky front page A-Hed articles (i.e., the middle column), but tended more to networking topics, from "When animals attack…networks" to the story of networking's most famous couple, Alice and Bob of security lesson fame. While Network World did away with its formal weekly Wider Net articles when the publication switched over to publishing twice a month, we've tried to continue mixing in lighthearted pieces through our blogs and in other places on our website and print magazine. Here are some of our favorites:To read this article in full or to leave a comment, please click here

Microsoft follows AWS into France with plan for new Azure data center

Microsoft is adding to its European cloud infrastructure, with plans to open new data centers in France next year, CEO Satya Nadella said Monday.The company has already spent US$3 billion growing its European cloud capabilities. These include data centers in the U.K. hosting Azure and Office 365 services, and in Germany hosting Azure.The French data centers will host Dynamics 365, Microsoft's new ERP and CRM offering, in addition to Azure and Office 365.The company has already won over the the U.K.'s Ministry of Defence and German auto parts manufacturer ZF to its cloud services. Ireland's Health Service Executive and the Franco-Japanese car-making partnership Renault-Nissan Alliance are also customers, it said.To read this article in full or to leave a comment, please click here

37% off Elite Tactical Waterproof Flashlight 1200 Lumen Cree LED with Zoom For Self Defense – Deal Alert

The Elite Tactical Pro 300 Series Tactical Flashlight is constructed from heavy-duty, military grade material, and claims to be the best and brightest flashlight on the market with a powerful 1200 lumen intensity. It's built with Cree LED technology and is complete with a zoomable feature that allows you to concentrate light into specific areas, something they've indicated could be useful in situations requiring self-defense. The design is waterproof and shockproof making it ideal for rainy nights, emergency use during a flood or storm, or while camping, hunting, or hiking. Keep it in your kitchen cupboard, your car or an emergency kit. The Pro 300 comes with rechargeable batteries for extra convenience. The Elite Pro 300 averages 5 out of 5 stars on Amazon and its typical list price of $30 has been discounted 37% to $19. Tired of your flashlight breaking whenever it's run over by an airplane? Check out the discounted Elite Pro 300 on Amazon.To read this article in full or to leave a comment, please click here

U.S. cellular carriers charge too much, and here’s proof

If you think your mobile phone bill is too damn high, you’re absolutely right. Like many people, I’ve always felt I was overpaying for mobile service. (Talk to IT departments at companies large and small, and many will tell you that despite significant corporate discounts, they also feel they pay too much. )And there’s no doubt we’re all paying a lot. According to a J.D. Power report, the average U.S. monthly cell phone bill was a whopping $73 in 2014. Those are the most recent averages I could find, but if you look at data plans from the big four U.S. carriers, data plans start at around $50 a month, depending on how much data you’re buying, and head straight up from there. To read this article in full or to leave a comment, please click here

Trump calls for US to use offensive cyberweapons

The U.S. government needs to be ready to use its offensive cyberweapons in response to attacks from other nations, Republican presidential candidate Donald Trump said Monday.The U.S. has significant offensive cybercapabilities, but it has been shy about deploying them, Trump said during a speech in Herdon, Virginia. "This is the warfare of the future," he said. The U.S. should also increase its use of cyberweapons to attack terrorists, Trump said. President Barack Obama has failed to protect the nation's cybersecurity and a new focus is needed, added Trump, who has largely avoided technology issues in his campaign. Trump said he will create an international cybersecurity task force to battle hackers, and he will ask U.S. military leaders for suggestions on how to improve the nation's cyberdefenses. To read this article in full or to leave a comment, please click here

Trump calls for US to use offensive cyberweapons

The U.S. government needs to be ready to use its offensive cyberweapons in response to attacks from other nations, Republican presidential candidate Donald Trump said Monday.The U.S. has significant offensive cybercapabilities, but it has been shy about deploying them, Trump said during a speech in Herdon, Virginia. "This is the warfare of the future," he said. The U.S. should also increase its use of cyberweapons to attack terrorists, Trump said. President Barack Obama has failed to protect the nation's cybersecurity and a new focus is needed, added Trump, who has largely avoided technology issues in his campaign. Trump said he will create an international cybersecurity task force to battle hackers, and he will ask U.S. military leaders for suggestions on how to improve the nation's cyberdefenses. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Rise of the SPI: Atlassian spin or a better variation of the API?

I’ve long been a proponent of organizations that have an API-driven strategy. API (Application Programming Interface) is a term used to describe the technical integration points between applications, between devices and between services. It is, for want of a better analogy, the small piece of code that acts as the universal socket into which other tools, products or devices can plug. In a time where legendary venture capitalist and entrepreneur Marc Andreessen famously quipped that software is eating the world, APIs are the technology pieces that give software teeth.So, given my bullishness about the API space, I was interested to hear from Atlassian about a new concept, Service Provider Interfaces (SPIs), and how they can do more, be more and achieve more.To read this article in full or to leave a comment, please click here

Can credit cards with CVVs that automatically change every hour kill off card fraud?

When shopping online and paying with a credit card or debit card, you have to enter the three-digit CVV (card verification value) from the back. These are card-not-present transactions, and entering the security code is supposed to help verify that you physically have the card. But cyber thugs have plenty of ways to get hold of your CVV and burn through your money until you happen to notice the purchases and cancel your card. In fact, card-not-present transactions made up 65 percent of all card fraud.A French digital payment security company called Oberthur Technologies (OT) thinks it can do away such fraud by changing static CVVs to dynamic CVVs, which change every hour. If a crook gets hold of your card number, his or her shopping spree could last no more than an hour; after the security code changes, the card number would be useless.To read this article in full or to leave a comment, please click here

Can credit cards with CVVs that automatically change every hour kill off card fraud?

When shopping online and paying with a credit or debit card, you have to enter the three-digit CVV (card verification value) from the back. These are card-not-present transactions and entering the security code is supposed to help verify that you physically have the card. But cyber thugs have plenty of ways to get hold of your CVV and burn through your money until you happen to notice the purchases and cancel your card. In fact, card-not-present transactions made up 65 percent of all card fraud.A French digital payment security company called Oberthur Technologies (OT) thinks it can do away such fraud by changing static CVVs to dynamic CVVs which change every hour. If a crook gets hold of your card number, his or her shopping spree could last no more than an hour; after the security code changes, the card number would be useless.To read this article in full or to leave a comment, please click here

Data leaks evolving into weapons of business destruction

Most of the recent data breaches involve customer information such as user names and passwords, credit card numbers, and medical histories. The companies hacked are hurt -- they have to contact victims, pay for credit monitoring services and fines, and may lose customers, brand reputation, and market value -- but that is collateral damage.Or it has been.Increasingly, attackers are using data leaks to target the companies themselves, going after proprietary or embarrassing information and releasing it in such a way as to do the most harm.That's a change that companies need to be aware of, said Andrew Serwin, co-chair of the global privacy and data security group at San Francisco-based law firm Morrison & Foerster.To read this article in full or to leave a comment, please click here

ICANN transition moves forward, despite last-minute attempt to block it

The Internet Corporation for Assigned Names and Numbers, the long-time coordinator of the internet's Domain Name System, is independent of U.S. government oversight, at least for now.The U.S. National Telecommunications and Information Administration's planned turnover of ICANN oversight to the wider internet community happened early Saturday morning, despite a last-ditch lawsuit filed by four state attorneys general attempting to block the move.Late Friday, a judge in Texas refused to issue an injunction that would have forced the NTIA to retain its oversight of ICANN's coordination of the Domain Name System root and IP addressing functions.To read this article in full or to leave a comment, please click here

ICANN transition moves forward, despite last-minute attempt to block it

The Internet Corporation for Assigned Names and Numbers, the long-time coordinator of the internet's Domain Name System, is independent of U.S. government oversight, at least for now.The U.S. National Telecommunications and Information Administration's planned turnover of ICANN oversight to the wider internet community happened early Saturday morning, despite a last-ditch lawsuit filed by four state attorneys general attempting to block the move.Late Friday, a judge in Texas refused to issue an injunction that would have forced the NTIA to retain its oversight of ICANN's coordination of the Domain Name System root and IP addressing functions.To read this article in full or to leave a comment, please click here