25% off NETGEAR N300 Wi-Fi Range Extender, Essentials Edition – Deal Alert

Convenient, discreet and easy to install, extended Wi-Fi coverage is just an outlet away with the NETGEAR N300 Wi-Fi Extender. Boost your Wi-Fi for mobile devices and connect a wired device such as Smart TVs or game consoles. Boost your existing network range & speed, delivering Wi-Fi up to 300Mbps. External antennas provide better Wi-Fi coverage and higher speed, while the convenient wall-plug design saves space. It works with any standard Wi-Fi router & is ideal for keeping your mobile devices connected as you move throughout your home.  With nearly 12,000 reviews on Amazon, it averages 4 out of 5 stars (read reviews). Its typical list price of $39.99 has been reduced by 25% to $29.99.  See the discounted NETGEAR N300 Wi-Fi Extender. now on Amazon.To read this article in full or to leave a comment, please click here

Despite billions spent on cybersecurity, companies aren’t truly safe from hacks

Last year, private sector companies globally spent more than $75 billion on security software to safeguard their systems and data.That number is expected to grow about 7% annually, according to Gartner and other analyst firms. It doesn’t include all the massive amounts spent on fraud prevention by banks, a number that is widely underreported and expected to reach into the billions annually.Has all that spending made private sector data and systems any safer? Is customer personal data any safer?MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords The general answer is no, according to many analysts, but that’s not necessarily because the latest software is considered ineffective.To read this article in full or to leave a comment, please click here

25% off NETGEAR N300 Wi-Fi Range Extender, Essentials Edition – Deal Alert

Convenient, discreet and easy to install, extended Wi-Fi coverage is just an outlet away with the NETGEAR N300 Wi-Fi Extender. Boost your Wi-Fi for mobile devices and connect a wired device such as Smart TVs or game consoles. Boost your existing network range & speed, delivering Wi-Fi up to 300Mbps. External antennas provide better Wi-Fi coverage and higher speed, while the convenient wall-plug design saves space. It works with any standard Wi-Fi router & is ideal for keeping your mobile devices connected as you move throughout your home.  With nearly 12,000 reviews on Amazon, it averages 4 out of 5 stars (read reviews). Its typical list price of $39.99 has been reduced by 25% to $29.99.  See the discounted NETGEAR N300 Wi-Fi Extender. now on Amazon.To read this article in full or to leave a comment, please click here

Despite billions spent on cybersecurity, companies aren’t truly safe from hacks

Last year, private sector companies globally spent more than $75 billion on security software to safeguard their systems and data.That number is expected to grow about 7% annually, according to Gartner and other analyst firms. It doesn’t include all the massive amounts spent on fraud prevention by banks, a number that is widely underreported and expected to reach into the billions annually.Has all that spending made private sector data and systems any safer? Is customer personal data any safer?MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords The general answer is no, according to many analysts, but that’s not necessarily because the latest software is considered ineffective.To read this article in full or to leave a comment, please click here

Microsoft acquires intelligent scheduling startup Genee

Microsoft has acquired Genee, a startup that provided a virtual assistant for scheduling appointments. The deal, announced Tuesday, will bring the Genee team into the Microsoft fold and put them to work on bringing intelligence into Office 365. Genee's service let users loop in an artificial intelligence assistant that could interpret sentences like "set up lunch at some point this week" and turn them into calendar appointments. Acquiring Genee is part of Microsoft's ongoing crusade to build intelligent productivity software and services using AI. The company has focused on that area under the tenure of CEO Satya Nadella, with features like Office Delve, which finds documents shared within an organization that are relevant to a user, and Focused Inbox in Outlook, which filters unimportant email into a separate tab so it's not cluttering a user's experience. To read this article in full or to leave a comment, please click here

DC Fabric Segment Routing Use Case (4)

In the last post in this series, I discussed using SR labels to direct traffic from one flow onto, and from other flows off of, a particular path through a DC fabric. Throughout this series, though, I’ve been using node (or prefix) SIDs to direct the traffic. There is another kind of SID in SR that needs to be considered—the adj-sid. Let’s consider the same fabric used throughout this series—

benes-segment-03

So far, I’ve been describing the green marked path using the node or (loopback) prefix-sids: [A,F,G,D,E]. What’s interesting is I could describe the same path using adj-sids: [a->f,f->g,g->d,d->e], where the vector in each hop is described by a single entry on the SR stack. There is, in fact, no difference between the two ways of describing this path, as there is only one link between each pair of routers in the path. This means everything discussed in this series so far could be accomplished with either a set of adj SIDs ore a set of node (prefix) SIDs.

Given this, why are both types of SIDs defined? Assume we zoom in a little on the border leaf node in this topology, and find—

border-leaf

Assume—

Another day, another 4,600 lines of Linux kernel code

The Linux kernel is improving faster than ever, gaining 7.8 patches per hour and 4,600 lines of new code every day.That's according to a new report published Monday by the Linux Foundation and focusing on the state of kernel development. Entitled “Linux kernel development -- how fast it is going, who is doing it, what they are doing, and who is sponsoring it,” the report is the seventh the nonprofit has published on the topic in roughly as many years.This year’s paper covers work completed through Linux kernel 4.7, with an emphasis on releases 3.19 to 4.7. The last report was released March 2015 and focused on versions 3.11 to 3.18.To read this article in full or to leave a comment, please click here

LinuxCon: With open-source’s great power comes great responsibility

One of the biggest Linux events of the year opened with a look at the social role of the largest open-source project in history, as well as Linux’s potential place in the history books.LinuxCon North America 2016 kicked off today in Toronto with keynotes from Linux Foundation director Jim Zemlin and Ainissa Ramirez, an author and former Bell Labs researcher who works to make technology accessible to the mainstream.+ALSO ON NETWORK WORLD: 10 sci-fi technologies we are close to having + ARM has a new weapon in race to build world's fastest computersTo read this article in full or to leave a comment, please click here

44% off Cable Matters USB-C to HDMI / VGA / Ethernet / USB Multiport 4K UHD Adapter (Thunderbolt 3 Port Compatible) – Deal Alert

The Cable Matters USB-C HDMI / VGA Multiport Adapter is an essential companion for a computer or tablet with USB-C. Connect to a Gigabit network, install a USB peripheral device, and connect a display with VGA or HDMI input. Plug & Play with a single USB-C port and no external drivers required.  Whether your device has a USB-C or Thunderbolt 3 port, you can use this adapter.To read this article in full or to leave a comment, please click here

Cisco well positioned to dominate cybersecurity market

The IT security market is certainly an interesting one, as it’s so big and so fragmented. Forbes posted a story at the end of last year stating the market is at $75 billion, with it expected to reach $170 billion by 2020. Every business and technology leader I talk to tells me how important security is, so I have no reason to doubt that $170 billion number.In addition to the overall massive size of the security market, another interesting fact is the huge number of vendors that play in it. I believe the 2016 RSA conference had something like over 600 sponsors, with at least 100 being first-time sponsors. No other IT market has that many vendors with start-ups consistently popping up.To read this article in full or to leave a comment, please click here

Cisco well positioned to dominate cybersecurity market

The IT security market is certainly an interesting one, as it’s so big and so fragmented. Forbes posted a story at the end of last year stating the market is at $75 billion, with it expected to reach $170 billion by 2020. Every business and technology leader I talk to tells me how important security is, so I have no reason to doubt that $170 billion number.In addition to the overall massive size of the security market, another interesting fact is the huge number of vendors that play in it. I believe the 2016 RSA conference had something like over 600 sponsors, with at least 100 being first-time sponsors. No other IT market has that many vendors with start-ups consistently popping up.To read this article in full or to leave a comment, please click here

New products of the week 8.22.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Fortscale 2.7Key features: Detecting insider credentials compromised on the Dark Web and remote lateral movement. Plus, new user experience that makes it easier for security professionals to identify and stop insider threats automatically. More info.To read this article in full or to leave a comment, please click here

New products of the week 8.22.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Fortscale 2.7Key features: Detecting insider credentials compromised on the Dark Web and remote lateral movement. Plus, new user experience that makes it easier for security professionals to identify and stop insider threats automatically. More info.To read this article in full or to leave a comment, please click here