Linux at 25: Containers and unikernels prove less is more

If there’s been one constant through Linux’s 25 years in the wild, it’s change. The kernel itself has been through dozens of revisions; Linux distributions for most every use case have emerged; and the culture of Linux has evolved from weekend hobby project to an underpinning of worldwide IT infrastructure.Now we’re seeing the first versions of the next wave of Linux change. Containerization, unikernels, and other experiments with form are reshaping Linux from the inside out, opening up unheralded avenues for how the open source operating system that could (and did!) can do it all over again.To read this article in full or to leave a comment, please click here

5 missing features we wish were in Android 7.0 Nougat

Android 7.0 Nougat is beginning its slow rollout to Android devices around the world. Most phones will take time to update, but Nexus owners can already play with Google’s latest and greatest OS. Nougat brings some cool new features like split-screen multitasking, bundled notifications, and Daydream VR. Even with all the improvements, there are still some nagging deficiencies in the Android feature set. Here are the five most glaring omissions from Android 7.0.Restart option Come on, Google. You’re just being stubborn.To read this article in full or to leave a comment, please click here

The best educational apps and games to jumpstart the school year

Learning is fun!Image by Derek WalterParents everywhere grapple with the question of how much “screen time” to allow for their children—and part of the challenge to this question stems from how many apps and games are mindless diversions.So to help you out, we’ve pulled together a group of higher-quality choices that are both educational and fun. Any guilt you have about screen time will be vastly diminished when your kid is learning about the solar system, practicing multiplication, or using logic to solve a puzzle. Check out some of our top choices for making learning something that can happen anytime.To read this article in full or to leave a comment, please click here

Imperva: Application layer DDoS attacks are on the rise.

Application layer DDoS attacks are becoming more common, perhaps because they cost less for malicious actors to execute and can more effectively evade defenses than network layer attacks, Imperva says.One such attack generated 8.7Gbps at its peak, “unheard of in relation to application layer assaults,” in an effort to thread its way through the DDoS mitigations that had been set up to defend against such attacks, according to Imperva’s “DDoS Threat Landscape Report 2015-2016” released today.Application layer attacks can be measured in responses per second required from the application targeted, and they generally require less volume than network layer attacks to succeed, the report says. That means they require fewer botnet resources, if botnets are the platform from which the attack is launched.To read this article in full or to leave a comment, please click here

Imperva: Application layer DDoS attacks are on the rise.

Application layer DDoS attacks are becoming more common, perhaps because they cost less for malicious actors to execute and can more effectively evade defenses than network layer attacks, Imperva says.One such attack generated 8.7Gbps at its peak, “unheard of in relation to application layer assaults,” in an effort to thread its way through the DDoS mitigations that had been set up to defend against such attacks, according to Imperva’s “DDoS Threat Landscape Report 2015-2016” released today.Application layer attacks can be measured in responses per second required from the application targeted, and they generally require less volume than network layer attacks to succeed, the report says. That means they require fewer botnet resources, if botnets are the platform from which the attack is launched.To read this article in full or to leave a comment, please click here

IDG Contributor Network: World Economic Forum goes for blockchain

Distributed Ledger Technology (DLT), more commonly known as blockchain, has the potential to revolutionize financial, investment and insurance technology infrastructure and networks. It will form one of the foundations of “next-generation financial services infrastructure,” the World Economic Forum (WEF) says in a new report.The WEF pulls together political and business leaders to focus on global issues such as technology changes.+ Also on Network World: Blockchain: You’ve got questions; we’ve got answers +To read this article in full or to leave a comment, please click here

IDG Contributor Network: World Economic Forum goes for blockchain

Distributed Ledger Technology (DLT), more commonly known as blockchain, has the potential to revolutionize financial, investment and insurance technology infrastructure and networks. It will form one of the foundations of “next-generation financial services infrastructure,” the World Economic Forum (WEF) says in a new report.The WEF pulls together political and business leaders to focus on global issues such as technology changes.+ Also on Network World: Blockchain: You’ve got questions; we’ve got answers +To read this article in full or to leave a comment, please click here

Why Google Slows Fibre Rollout

Laying fiber is, it turns out, pretty expensive. That’s one reason why expansion of Google Fiber’s ambitious project to bring ultrafast internet to U.S. cities around has been placed on hold. The company has spent spent hundreds of millions of dollars laying fiber-optic cablesto bring Internet service as much as 100 times faster than average high-speed wireless […]

The post Why Google Slows Fibre Rollout appeared first on EtherealMind.

The State of Telemetry in Cloud Networking

The hype of Software Defined Networking (SDN) and its associated analytics is alive and well. Many are advocating changing the way monitoring is done.  Are we ready for re-invention? How should one react? Or should we plan better? What happens to decades of network management that are habitual? Legacy vendors understandably feel defensive, declaring new marketing visions and paradigms, while new and innovative vendors are delivering real functionality that meets customer needs! At Arista, we saw the emergence of a need for better visibility and monitoring in 2010, with exponential growth of workloads in the cloud to bring together many forms of telemetry. We have been deploying Arista Tracers with EOS ®  for over five years, and now we are entering the next generation of real-time telemetry.

Arista plans its own take on all-seeing network software

It’s been a good year for IT administrators who want more information, more often, about what’s happening on their networks.In April, startups Veriflow and Nyansa introduced new ways to determine whether a network is doing what it should. In June, Cisco Systems unveiled its Tetration Analytics appliance to collect and analyze information about all parts of a data center in real time.To read this article in full or to leave a comment, please click here

Arista plans its own take on all-seeing network software

It’s been a good year for IT administrators who want more information, more often, about what’s happening on their networks.In April, startups Veriflow and Nyansa introduced new ways to determine whether a network is doing what it should. In June, Cisco Systems unveiled its Tetration Analytics appliance to collect and analyze information about all parts of a data center in real time.To read this article in full or to leave a comment, please click here

Arista plans its own take on all-seeing network software

It’s been a good year for IT administrators who want more information, more often, about what’s happening on their networks.In April, startups Veriflow and Nyansa introduced new ways to determine whether a network is doing what it should. In June, Cisco Systems unveiled its Tetration Analytics appliance to collect and analyze information about all parts of a data center in real time.To read this article in full or to leave a comment, please click here

The hidden cause of slow Internet and how to fix it

In 2010, Jim Gettys, a veteran computer programmer who currently works at Google, was at home uploading a large file to his work server. His kids came into his study and said, “Daddy, the Internet is slow today.” Wondering how his upload activity could be affecting downloads by his kids, he began to investigate.To read this article in full or to leave a comment, please click here(Insider Story)

The hidden cause of slow Internet and how to fix it

In 2010, Jim Gettys, a veteran computer programmer who currently works at Google, was at home uploading a large file to his work server. His kids came into his study and said, “Daddy, the Internet is slow today.” Wondering how his upload activity could be affecting downloads by his kids, he began to investigate.To read this article in full or to leave a comment, please click here(Insider Story)

Groups oppose US plan to collect social media info from visitors

Civil liberties and tech advocacy groups have opposed a move by the Department of Homeland Security to collect social media information from certain categories of visitors to the U.S.“This program would invade individual privacy and imperil freedom of expression while being ineffective and prohibitively expensive to implement and maintain,” wrote organizations like the American Civil Liberties Union, Center for Democracy & Technology and Electronic Frontier Foundation in comments to the Department of Homeland Security on Monday.The provision allows for collection of information on their online presence from certain categories of visitors in their visa-waiver arrival/departure records (Form I-94W) and their online application for an Electronic System for Travel Authorization (ESTA).To read this article in full or to leave a comment, please click here

Groups oppose US plan to collect social media info from visitors

Civil liberties and tech advocacy groups have opposed a move by the Department of Homeland Security to collect social media information from certain categories of visitors to the U.S.“This program would invade individual privacy and imperil freedom of expression while being ineffective and prohibitively expensive to implement and maintain,” wrote organizations like the American Civil Liberties Union, Center for Democracy & Technology and Electronic Frontier Foundation in comments to the Department of Homeland Security on Monday.The provision allows for collection of information on their online presence from certain categories of visitors in their visa-waiver arrival/departure records (Form I-94W) and their online application for an Electronic System for Travel Authorization (ESTA).To read this article in full or to leave a comment, please click here