Survey reveals desire and constraints of enterprise network modernization

There’s broad recognition among enterprises of the need for network modernization, but many decision-makers are constrained by the prospect of capital equipment outlays, proving a solid return on investment, or fear of being locked into a proprietary solution. Those are key findings in a soon to be published survey conducted by IDG Research Services. One third of IT decision-makers think it’s highly likely their organizations will modernize their network connectivity strategies over the next year and another 46 percent indicate there’s some likelihood. Today, virtually every enterprise places a premium on flexibility and agility, and few are willing to commit to long-term, costly outlays for network technology that can’t adapt to their future needs.To read this article in full or to leave a comment, please click here

Survey reveals desire and constraints of enterprise network modernization

There’s broad recognition among enterprises of the need for network modernization, but many decision-makers are constrained by the prospect of capital equipment outlays, proving a solid return on investment, or fear of being locked into a proprietary solution. Those are key findings in a soon to be published survey conducted by IDG Research Services. One third of IT decision-makers think it’s highly likely their organizations will modernize their network connectivity strategies over the next year and another 46 percent indicate there’s some likelihood. Today, virtually every enterprise places a premium on flexibility and agility, and few are willing to commit to long-term, costly outlays for network technology that can’t adapt to their future needs.To read this article in full or to leave a comment, please click here

“Guccifer” gets 52 months in prison for hacking crimes

The U.S. Department of Justice today said Marcel Lazar, aka hacker “Guccifer,” was sentenced today to 52 months in prison for unauthorized access to a protected computer and aggravated identity theft.+More on Network World: FBI: Bank robbery? There’s an app for that+Lazar, originally from Romania, was extradited to the U.S. earlier this year and was awaiting this sentencing for breaking into the email and social media accounts of various U.S. officials including former U.S. Secretary of State Colin Powell as well as a the daughter of former President George H.W. Bush.To read this article in full or to leave a comment, please click here

“Guccifer” gets 52 months in prison for hacking crimes

The U.S. Department of Justice today said Marcel Lazar, aka hacker “Guccifer,” was sentenced today to 52 months in prison for unauthorized access to a protected computer and aggravated identity theft.+More on Network World: FBI: Bank robbery? There’s an app for that+Lazar, originally from Romania, was extradited to the U.S. earlier this year and was awaiting this sentencing for breaking into the email and social media accounts of various U.S. officials including former U.S. Secretary of State Colin Powell as well as a the daughter of former President George H.W. Bush.To read this article in full or to leave a comment, please click here

BrandPost: Bringing Flexibility to the WAN

By Joe Faranetta MPLS (multi-protocol label switching) VPNs have long been recognized as a preferred option for dedicated, high performance connectivity over a wide area network (WAN), such as linking data centers or branch offices that require high volume and reliability. But smaller groups and individual workers typically were offloaded to the public internet, primarily utilizing the IPsec suite of protocols to create a VPN link. The MPLS VPN is a high-speed, single-carrier-operated network. An enterprise can directly link any of its MPLS VPN sites directly and at high speeds, without going through the public internet routing process where data packets can travel circuitous routes and often require retransmission of lost packets.To read this article in full or to leave a comment, please click here

Iris scans as ID grow in use

Iris scanner technology is emerging in smartphones, including the new Samsung Note 7, but is expected to come soon to cars and ATM machines to verify a user’s identity.Experts say an iris scan can be more reliable than a fingerprint scan, which is a big reason it is expected to be used in more devices in coming years. Each iris, the colorful part of the eye that forms a ring around the pupil, is unique and therefore a good biometric indicator.Samsung’s Android 6-based Note 7, which shipped on Aug. 19, takes advantage of the technology as well as the Windows 10 Mobile-based HP Elite X3.To read this article in full or to leave a comment, please click here

DJI’s handheld gimbal promises cinematic images from smartphones

DJI says smartphone users will be able to shoot smoother, more cinematic video with a new handheld gadget that packs video stabilization technology used on the company's drones.The Osmo Mobile, which was announced at the IFA trade show in Berlin on Thursday, combines a three-axis camera gimbal with a larger handle and smartphone mount.In a demonstration, the device indeed produced much smoother shots than when shooting smartphone video handheld. And I could tell it was working to keep the smartphone steady because I could feel a low-level vibration in the handle while using it. It was the gimbal continuously readjusting to compensate for shakes and small movements of my hand.To read this article in full or to leave a comment, please click here

Keezel’s wireless device protects hotel Wi-Fi , home IoT connections

In cryptography, the "man in the middle" is usually an attacker -- but when Keezel wants to get between you and the Wi-Fi connection in your hotel or your home, it's for your own good.After a long crowdfunding campaign, the company is getting ready to ship its Wi-Fi security device, also called Keezel, in October. Any orders it picks up at the IFA trade show in Berlin this week will be fulfilled from a second production run in November, said Keezel CEO Aike Muller.One problem Keezel aims to solve is that hotel and other public Wi-Fi services are often unencrypted, leaving your data wide open to eavesdropping by others in the area. If there is authentication, it's often only for billing purposes, and performed by a captive portal after the traffic has gone over the air in the clear.To read this article in full or to leave a comment, please click here

Keezel’s wireless device protects hotel Wi-Fi , home IoT connections

In cryptography, the "man in the middle" is usually an attacker -- but when Keezel wants to get between you and the Wi-Fi connection in your hotel or your home, it's for your own good.After a long crowdfunding campaign, the company is getting ready to ship its Wi-Fi security device, also called Keezel, in October. Any orders it picks up at the IFA trade show in Berlin this week will be fulfilled from a second production run in November, said Keezel CEO Aike Muller.One problem Keezel aims to solve is that hotel and other public Wi-Fi services are often unencrypted, leaving your data wide open to eavesdropping by others in the area. If there is authentication, it's often only for billing purposes, and performed by a captive portal after the traffic has gone over the air in the clear.To read this article in full or to leave a comment, please click here

Docker Online Meetup #42: Docker Captains Share Tips & Tricks for Using Docker 1.12

For this week’s Docker Online Meetup, Docker Captains Ajeet Singh Raina, Viktor Farcic and Bret Fisher shared their tips and tricks for built In Docker orchestration.

Ajeet talked about the best ways to use Docker 1.12 Service Discovery and shared key takeaways. Viktor talked about best practices for setting a Swarm cluster and integrating it with HAProxy. Bret concluded the meetup with a presentation on Docker 1.12 command options and aliases including cli aliases for quick container management; the shortest path to secure production-ready swarm; how to use cli filters for easier management of larger swarms; and docker remote cli security setup.

 

 

Want to learn more about Docker 1.12 and orchestration? Check out these resources:

Researchers sport system to pull rare earth materials from used hard drives

Open and easy access to rare earth materials -- which are critical parts of electronics in everything from cars to computers -- is still more a dream than reality.One of the ways to address that anxiety is to harvest and reuse such material from used electronic components – in particular computer hard drives.+More on Network World: Quick look: World’s largest e-waste dump+To read this article in full or to leave a comment, please click here

22% off JBL Flip 3 Splash Proof Portable Bluetooth Speaker – Deal Alert

The all-purpose, all-weather companion JBL Flip 3 is the next generation wireless speaker in the award-winning Flip series. It is a comprehensive portable Bluetooth speaker that delivers surprisingly powerful, room-filling stereo sound everywhere. This ultra-compact speaker is powered by a 3000mAh rechargeable Li-ion battery that offers up to 10 hours of continuous playtime. Sporting a durable, splashproof fabric and available in 8 vibrant colors, Flip 3 is the all-purpose, all-weather companion that integrates music into every aspect of your life - from tabletop to poolside, from sunny mornings to rainy nights. Flip 3 also features a built-in noise and echo cancelling speakerphone for crystal clear conference calls, and JBL Connect technology that can wirelessly link multiple JBL Connect-enabled speakers together to amplify the listening experience.  The JBL Flip 3 Speaker averages 4.5 out of 5 stars from 1,600+ people on Amazon (read reviews) and its typical list price of $104.95 is currently reduced to just $81.95.To read this article in full or to leave a comment, please click here

Knowing what to showcase on your resume

Resumes aren't easy for anyone. And James Park was no different. Park works with the Information Systems and Control Association (ISACA) and recently earned his master's degree. While his career his distinguished, his resume needed some work. After speaking with the candidate, Laura Smith-Proulx, award winning resume writer and author of three books (How to Get Hired Faster, Solve Your Toughest Resume Challenges and Finding Your Next Job with LinkedIn), knew there was far more to Park's career history than his resume suggested.To read this article in full or to leave a comment, please click here(Insider Story)