Why liberal arts degrees are valuable in tech

In a technology-driven, increasingly digital world, you might think you need a computer science, engineering, technology, mathematics or other degree to succeed. Turns out that's far from the truth.Arijit Sengupta, CEO of advanced analytics firm BeyondCore, holds a bachelor of science in computer science and a bachelor of arts in economics and fell one class short of having a minor in dance. He brings elements of all three to his daily work with BeyondCore, and some of the most valuable lessons he's learned have come from his liberal arts education and his dance training, he says.To read this article in full or to leave a comment, please click here

How to get your network and security teams working together

It's not surprising that network and security teams aren't always on the same page. After all, networks need to be fast and efficient, while security is about slowing things down and implementing extra steps to help meet security measures. While both teams are a part of the IT department, and need to work together in the event of a breach, each group has its own objectives and expectations. But when a data breach or security threat strikes, businesses need both teams working together to help get it fixed as soon as possible, especially as networks become more intricate."It's more important to get these two teams on the same page than it has ever been in the past. Enterprise networks are becoming more complex, and at the same time security issues are more common," says David Vigna, Cisco practice director at Softchoice.To read this article in full or to leave a comment, please click here

How to get your network and security teams working together

It's not surprising that network and security teams aren't always on the same page. After all, networks need to be fast and efficient, while security is about slowing things down and implementing extra steps to help meet security measures. While both teams are a part of the IT department, and need to work together in the event of a breach, each group has its own objectives and expectations. But when a data breach or security threat strikes, businesses need both teams working together to help get it fixed as soon as possible, especially as networks become more intricate."It's more important to get these two teams on the same page than it has ever been in the past. Enterprise networks are becoming more complex, and at the same time security issues are more common," says David Vigna, Cisco practice director at Softchoice.To read this article in full or to leave a comment, please click here

Automate, integrate, collaborate: Devops lessons for security

Enterprise security pros are often seen as heavy-handed gatekeepers obsessed with reducing risk. They'd rather be viewed as enablers who help the organization complete tasks and gain access to needed data.To make that transformation, security teams must become faster, more efficient, and more adaptable to change. That sounds a lot like devops.[ Also on InfoWorld: 19 open source GitHub projects for security pros. | Discover how to secure your systems with InfoWorld's Security newsletter. ] Indeed, security can derive inspiration from devops, says Haiyan Song, VP of security markets at Splunk. Devops encourages automation and better integration among tools, two trends security professionals are increasingly exploring to make security more transparent throughout the enterprise.To read this article in full or to leave a comment, please click here

6 tools for producing a great mobile app experience

Mobile app performance management (APM) software provides visibility into mobile app performance and helps pinpoint and resolve issues that affect end-user experience. It typically provides crash reporting, network monitoring and user interaction monitoring to keep users active and satisfied with the app.To read this article in full or to leave a comment, please click here(Insider Story)

Why Google plans to stop supporting your Chromebook after five years

One of the best things about Chromebooks is that they’re built to last. Thanks to automatic security and feature updates from Google, along with a lightweight browser-based operating system, longtime users may find that their laptops run as well, if not better, than they did on day one.But despite Chromebooks’ theoretical longevity, it’s possible for Google to cut their lives short. Per the company’s End of Life policy, Chromebooks and other Chrome OS devices are only entitled to five years of feature and security updates. After that, Google doesn’t guarantee that these systems will run safely or properly.To read this article in full or to leave a comment, please click here

8 tips for keeping your data safe with Identity and Access Management

Safe and soundImage by ThinkstockNew web applications are making their way into the workplace at an unprecedented rate. By 2017, enterprises are projected to rely on an average of 52 cloud applications at work, leaving employees with a pool of credentials to keep track of. If you don’t take the necessary precautions to keep your credentials secure, your accounts and data are at risk of being compromised. With these tips for good password hygiene and deploying an identity and access management (IAM) solution, you can keep your data safe from the rapidly evolving threat landscape. Richard Walters, senior vice president of security products at Intermedia, offers these tips.To read this article in full or to leave a comment, please click here

Why Intel Is Tweaking Xeon Phi For Deep Learning

If there is anything that chip giant Intel has learned over the past two decades as it has gradually climbed to dominance in processing in the datacenter, it is ironically that one size most definitely does not fit all. Quite the opposite, and increasingly so.

As the tight co-design of hardware and software continues in all parts of the IT industry, we can expect fine-grained customization for very precise – and lucrative – workloads, like data analytics and machine learning, just to name two of the hottest areas today.

Software will run most efficiently on hardware that is tuned for

Why Intel Is Tweaking Xeon Phi For Deep Learning was written by Timothy Prickett Morgan at The Next Platform.

My two cents about my two cents

Before we start the work week, here’s a tiny personal tale from the weekend that has me puzzled.I’m at the local liquor store buying wine and my tab is $21.98. I hand the clerk $22 cash and patiently wait for my two pennies change, as I always do, because I like putting them in the “leave a penny, take a penny” (LAPTAP) container that you’ll see at all of your finer  booze stores.That’s what I did, left my two pennies.There had been zero pennies in the container before I donated my two. As I was walking out, my back to the check-out, I distinctly heard the clerk slide the two pennies out of the LAPTAP container, open the cash register, and drop them in.To read this article in full or to leave a comment, please click here

Context, Visibility and Containment – NSX Securing “Anywhere” Part V

window-1231894_1280Welcome to part 5 of the Micro-Segmentation Defined– NSX Securing “Anywhere”  blog series. Previous topics covered in this series includes

In this post we describe how NSX micro-segmentation enables fundamental changes to security architectures which in turn facilitate the identification of breaches:

  • By increasing visibility throughout the SDDC, eliminating all blind spots
  • By making it feasible and simple to migrate to a whitelisting / least privileges / zero-trust security model
  • By providing rich contextual events and eliminating false positives to SIEMs
  • By providing inherent containment even for Zero Day attacks

Threat analysis is the new trend of the security landscape and established vendors as well as startups are proposing many tools to complement the current perimeter logging approach.  The attraction for these tools is based on the assumption that by correlating flows from different sources within a perimeter, threat contexts will emerge and compromised systems will be uncovered.  Currently, these systems go unnoticed for long periods of times because the suspicious traffic moves laterally inside the perimeter and does not traverse a security device: you can’t Continue reading

Evenly Distributed Future

Traveling back and forth between the UK and US I often find myself answering the question “What does CloudFlare do?”. That question gets posed by USCIS on arrival and I’ve honed a short and accurate answer: “CloudFlare protects web sites from hackers, makes web sites faster and ensures they work on your computer, phone or tablet.

CC BY 2.0 image by d26b73

If anyone, border agents or others, wants more detail I usually say: “If you run a web site or API for an app and you are Amazon.com, Google, Yahoo or one of a handful of major Internet sites you have the expertise to stay on top of the latest technologies and attacks; you have the staff to accelerate your web site and keep it fully patched. Anyone else, and that’s almost every web site on the Internet, simply will not have the money, people, or knowledge to ‘be a Google’. That’s where CloudFlare comes in: we make sure to stay on top of the latest trends in the Internet so that every web site can ‘be Google’."

The author William Gibson has said many times: “The future is already here Continue reading

Growing Hyperconverged Platforms Takes Patience, Time, And Money

In this day and age when the X86 server has pretty much taken over compute in the datacenter, enterprise customers still have their preferences and prejudices when it comes to the make and model of X86 machine that they deploy to run their applications. So a company that is trying to get its software into the datacenter, as server-storage hybrid Nutanix is, needs to befriend the big incumbent server makers and get its software onto their boxes.

This is not always an easy task, given that some of these companies have their own hyperconverged storage products or they have a

Growing Hyperconverged Platforms Takes Patience, Time, And Money was written by Timothy Prickett Morgan at The Next Platform.

10 sci-fi technologies we are close to having

10 of the coolest sci-fi tech that are almost a realityScience fiction TV shows and movies are filled with cool technology. From Star Trek and its transporter and food replicator—to name just a couple of things—to The Minority Report and its air touch displays and jet packs.Some of that futuristic technology has arrived. For examples, “push to talk” mobile devices are very close to Star Trek like communicators. And the video conferencing depicted in The Jetsons is now available on nearly every home computer.To read this article in full or to leave a comment, please click here

Networking Is Infrastructure – Get Used to It

Jeff Sicuranza left a great comment to one of my blog posts:

Still basically the same old debate from 25 years ago that experienced Network Architects and Engineers understood during technology changes; "Do you architect your network around an application(s) or do you architect your application(s) around your network"

I would change that to “the same meaningless debate”. Networking is infrastructure; it’s time we grow up and get used to it.

Read more ...

Windows 10 browser beatdown: Who’s got the edge?

Not all web browsers are created equal. In fact, it might startle you a little to realize how diverse the range of top-end browser software has become, if you came of age in the era of “Internet Explorer or go home.” With about a third of all Windows traffic on the web coming from Windows 10 installs, according to figures from U.K.-based analytics firm GoSquared, and with Microsoft distancing itself from Internet Explorer in favor of the Edge just as fast as it can, it seems like as good a time as any to survey a few of the best browsing options for Windows 10 users. A word on methodology – I ran each contestant here through three benchmarks (higher scores are better in all of them – see graphic below) to give a broad sense of overall performance, and put each of them through their paces by using them for both work and play. With the exception of the benchmarks, what follows are the subjective opinions of a working reporter who nevertheless does a great deal of web browsing. The five browsers – note that Apple Safari isn't a real option on Win10 -- are Continue reading

ARM has a new weapon in race to build world’s fastest computers

ARM conquered the mobile market starting with Apple's iPhone, and now wants to be in the world's fastest computers.A new ARM chip design being announced on Monday is targeted at supercomputers, a lucrative market in which the company has no presence. ARM's new chip design, which has mobile origins, has extensions and tweaks to boost computing power.The announcement comes a few weeks after Japanese company Softbank said it would buy ARM for a mammoth US$32 billion. With the cash, ARM is expected to sharpen its focus on servers and the internet of things.To read this article in full or to leave a comment, please click here