Arista plans its own take on all-seeing network software

It’s been a good year for IT administrators who want more information, more often, about what’s happening on their networks.In April, startups Veriflow and Nyansa introduced new ways to determine whether a network is doing what it should. In June, Cisco Systems unveiled its Tetration Analytics appliance to collect and analyze information about all parts of a data center in real time.To read this article in full or to leave a comment, please click here

Arista plans its own take on all-seeing network software

It’s been a good year for IT administrators who want more information, more often, about what’s happening on their networks.In April, startups Veriflow and Nyansa introduced new ways to determine whether a network is doing what it should. In June, Cisco Systems unveiled its Tetration Analytics appliance to collect and analyze information about all parts of a data center in real time.To read this article in full or to leave a comment, please click here

Arista plans its own take on all-seeing network software

It’s been a good year for IT administrators who want more information, more often, about what’s happening on their networks.In April, startups Veriflow and Nyansa introduced new ways to determine whether a network is doing what it should. In June, Cisco Systems unveiled its Tetration Analytics appliance to collect and analyze information about all parts of a data center in real time.To read this article in full or to leave a comment, please click here

The hidden cause of slow Internet and how to fix it

In 2010, Jim Gettys, a veteran computer programmer who currently works at Google, was at home uploading a large file to his work server. His kids came into his study and said, “Daddy, the Internet is slow today.” Wondering how his upload activity could be affecting downloads by his kids, he began to investigate.To read this article in full or to leave a comment, please click here(Insider Story)

The hidden cause of slow Internet and how to fix it

In 2010, Jim Gettys, a veteran computer programmer who currently works at Google, was at home uploading a large file to his work server. His kids came into his study and said, “Daddy, the Internet is slow today.” Wondering how his upload activity could be affecting downloads by his kids, he began to investigate.To read this article in full or to leave a comment, please click here(Insider Story)

Groups oppose US plan to collect social media info from visitors

Civil liberties and tech advocacy groups have opposed a move by the Department of Homeland Security to collect social media information from certain categories of visitors to the U.S.“This program would invade individual privacy and imperil freedom of expression while being ineffective and prohibitively expensive to implement and maintain,” wrote organizations like the American Civil Liberties Union, Center for Democracy & Technology and Electronic Frontier Foundation in comments to the Department of Homeland Security on Monday.The provision allows for collection of information on their online presence from certain categories of visitors in their visa-waiver arrival/departure records (Form I-94W) and their online application for an Electronic System for Travel Authorization (ESTA).To read this article in full or to leave a comment, please click here

Groups oppose US plan to collect social media info from visitors

Civil liberties and tech advocacy groups have opposed a move by the Department of Homeland Security to collect social media information from certain categories of visitors to the U.S.“This program would invade individual privacy and imperil freedom of expression while being ineffective and prohibitively expensive to implement and maintain,” wrote organizations like the American Civil Liberties Union, Center for Democracy & Technology and Electronic Frontier Foundation in comments to the Department of Homeland Security on Monday.The provision allows for collection of information on their online presence from certain categories of visitors in their visa-waiver arrival/departure records (Form I-94W) and their online application for an Electronic System for Travel Authorization (ESTA).To read this article in full or to leave a comment, please click here

IBM’s blazing Power9 chip is coming, and here’s what you need to know

IBM's Power processors have a storied history; they were notably used in the Watson supercomputer that outsmarted humans in the game of Jeopardy in 2011. The latest chip in the family, called the Power9, is coming next year, and it stands out for its blazing speed and for technologies never seen in chips before.IBM is spilling Power9 details at the Hot Chips conference in Cupertino, California, this week. Here's some important information about the chip.Power9 servers will be smarter than the Jeopardy winner The sheer computing power in Power9 will make supercomputers virtually unbeatable in Jeopardy, unless a superhuman demonstrating exceptional intelligence comes along. The Power9 architecture has up to 24 cores and provides blazing throughput to speed up complex calculations.To read this article in full or to leave a comment, please click here

Nvidia’s NVLink 2.0 will first appear in Power9 servers next year

Graphics processors with Nvidia's NVLink throughput technology have just started coming out, but a successor to the groundbreaking interconnect is already on its way.IBM's upcoming Power9 chip will include NVLink 2.0 technology, and servers using the chip will be available next year.Nvidia hasn't yet announced when GPUs with NVLink 2.0 would come out, but they could be available around the same time as the new Power9 servers come out.IBM is projecting Power9 servers to be out by the middle of next year, but the company hasn't nailed down a specific date.A presentation on Nvidia's website says NVLink 2.0 will be in GPUs code-named Volta, which also will come out next year.To read this article in full or to leave a comment, please click here

Alleged NSA hackers probably gave away a small fortune by leaking exploits

Anonymous hackers probably gave away hundreds of thousands of dollars in potential sales in the black market when they leaked valuable cyberweapons allegedly stolen from the U.S. National Security Agency.The hackers, known as the Shadow Brokers, posted a sample file of the cyberweapons earlier this month and at least some of them appear to be zero-day exploits, or attacks that rely on software defects that practically no one knew about.Before they were publicly leaked, each of these zero-day exploits could have sold for a great deal of money, according to security researchers. They’re designed to affect firewall and router products from Cisco, Juniper Networks and Fortinet, in addition to those from Chinese vendors.To read this article in full or to leave a comment, please click here

Alleged NSA hackers probably gave away a small fortune by leaking exploits

Anonymous hackers probably gave away hundreds of thousands of dollars in potential sales in the black market when they leaked valuable cyberweapons allegedly stolen from the U.S. National Security Agency.The hackers, known as the Shadow Brokers, posted a sample file of the cyberweapons earlier this month and at least some of them appear to be zero-day exploits, or attacks that rely on software defects that practically no one knew about.Before they were publicly leaked, each of these zero-day exploits could have sold for a great deal of money, according to security researchers. They’re designed to affect firewall and router products from Cisco, Juniper Networks and Fortinet, in addition to those from Chinese vendors.To read this article in full or to leave a comment, please click here

Republicans subpoena three tech companies over Clinton emails

Republicans in Congress have subpoenaed three technology companies that declined to hand over documents about former U.S. Secretary of State Hillary Clinton’s private email server.On Monday, Datto, SECNAP Network Security and Platte River Networks received subpoenas from U.S. Rep. Lamar Smith, a Texas Republican.Smith is demanding documents from the companies as two congressional committees from the House and Senate investigate the Democratic presidential nominee’s use of a private email server while she was secretary of state.All three companies either sold products used in Clinton’s email server or were hired to maintain it, Smith said in the subpoenas. For example, Datto provided an online backup system that eventually began storing Clinton’s emails off site.To read this article in full or to leave a comment, please click here

Republicans subpoena three tech companies over Clinton emails

Republicans in Congress have subpoenaed three technology companies that declined to hand over documents about former U.S. Secretary of State Hillary Clinton’s private email server.On Monday, Datto, SECNAP Network Security and Platte River Networks received subpoenas from U.S. Rep. Lamar Smith, a Texas Republican.Smith is demanding documents from the companies as two congressional committees from the House and Senate investigate the Democratic presidential nominee’s use of a private email server while she was secretary of state.All three companies either sold products used in Clinton’s email server or were hired to maintain it, Smith said in the subpoenas. For example, Datto provided an online backup system that eventually began storing Clinton’s emails off site.To read this article in full or to leave a comment, please click here

Tableau turns to AWS for a cloud-savvy CEO

Data visualization specialist Tableau Software is bringing in seasoned talent to help it compete in an increasingly cloud-based world. The company has hired longtime Amazon Web Services executive Adam Selipsky as its CEO, replacing cofounder Christian Chabot.Chabot, who has been CEO for 14 years, will continue to serve as chairman of Tableau’s board of directors. Selipsky, who currently is vice president of marketing, sales and support for AWS, will join Tableau on Sept. 16.“Adam is going to take Tableau to the next level,” Chabot said in a press release, citing Selipsky's cloud experience. “He is the right person to lead Tableau to the next stage of growth.”To read this article in full or to leave a comment, please click here

EFF condemns Windows 10 data collection

The Electronic Frontier Foundation (EFF) is lambasting Microsoft over Windows 10's telemetry technology, urging it to "come clean" with customers.In a piece posted last week to the EFF's blog, Amul Kalia, the San Francisco-based advocacy organization's intake coordinator, criticized Microsoft's practice of collecting large amounts of data from Windows 10 users."Windows 10 sends an unprecedented amount of usage data back to Microsoft, particularly if users opt in to 'personalize' the software using the OS assistant called Cortana," wrote Kalia, referring to the voice-controlled digital aide. "Microsoft should come clean with its user community. The company needs to acknowledge its missteps and offer real, meaningful opt-outs to the users who want them, preferably in a single unified screen."To read this article in full or to leave a comment, please click here

25% off NETGEAR N300 Wi-Fi Range Extender, Essentials Edition – Deal Alert

Convenient, discreet and easy to install, extended Wi-Fi coverage is just an outlet away with the NETGEAR N300 Wi-Fi Extender. Boost your Wi-Fi for mobile devices and connect a wired device such as Smart TVs or game consoles. Boost your existing network range & speed, delivering Wi-Fi up to 300Mbps. External antennas provide better Wi-Fi coverage and higher speed, while the convenient wall-plug design saves space. It works with any standard Wi-Fi router & is ideal for keeping your mobile devices connected as you move throughout your home.  With nearly 12,000 reviews on Amazon, it averages 4 out of 5 stars (read reviews). Its typical list price of $39.99 has been reduced by 25% to $29.99.  See the discounted NETGEAR N300 Wi-Fi Extender. now on Amazon.To read this article in full or to leave a comment, please click here

Despite billions spent on cybersecurity, companies aren’t truly safe from hacks

Last year, private sector companies globally spent more than $75 billion on security software to safeguard their systems and data.That number is expected to grow about 7% annually, according to Gartner and other analyst firms. It doesn’t include all the massive amounts spent on fraud prevention by banks, a number that is widely underreported and expected to reach into the billions annually.Has all that spending made private sector data and systems any safer? Is customer personal data any safer?MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords The general answer is no, according to many analysts, but that’s not necessarily because the latest software is considered ineffective.To read this article in full or to leave a comment, please click here

25% off NETGEAR N300 Wi-Fi Range Extender, Essentials Edition – Deal Alert

Convenient, discreet and easy to install, extended Wi-Fi coverage is just an outlet away with the NETGEAR N300 Wi-Fi Extender. Boost your Wi-Fi for mobile devices and connect a wired device such as Smart TVs or game consoles. Boost your existing network range & speed, delivering Wi-Fi up to 300Mbps. External antennas provide better Wi-Fi coverage and higher speed, while the convenient wall-plug design saves space. It works with any standard Wi-Fi router & is ideal for keeping your mobile devices connected as you move throughout your home.  With nearly 12,000 reviews on Amazon, it averages 4 out of 5 stars (read reviews). Its typical list price of $39.99 has been reduced by 25% to $29.99.  See the discounted NETGEAR N300 Wi-Fi Extender. now on Amazon.To read this article in full or to leave a comment, please click here

Despite billions spent on cybersecurity, companies aren’t truly safe from hacks

Last year, private sector companies globally spent more than $75 billion on security software to safeguard their systems and data.That number is expected to grow about 7% annually, according to Gartner and other analyst firms. It doesn’t include all the massive amounts spent on fraud prevention by banks, a number that is widely underreported and expected to reach into the billions annually.Has all that spending made private sector data and systems any safer? Is customer personal data any safer?MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords The general answer is no, according to many analysts, but that’s not necessarily because the latest software is considered ineffective.To read this article in full or to leave a comment, please click here