IDG Contributor Network: The future of BPO services: Embrace automation or perish

The outsourcing of business processes—save call centers and payroll processing—began in earnest in the mid-1990s. Business process outsourcing (BPO) walked pretty nicely in the footsteps of the IT services industry, garnering attention as a potential growth engine for both pure-play BPO providers and IT providers offering BPO services.

But despite early predictions, this service segment did not grow as fast as expected and in recent years has slowed. What happened to this shiny new toy?

+ Also on Network World: Top 5 factors driving domestic IT outsourcing growth +

To read this article in full or to leave a comment, please click here

IDG Contributor Network: The future of BPO services: Embrace automation or perish

The outsourcing of business processes—save call centers and payroll processing—began in earnest in the mid-1990s. Business process outsourcing (BPO) walked pretty nicely in the footsteps of the IT services industry, garnering attention as a potential growth engine for both pure-play BPO providers and IT providers offering BPO services.But despite early predictions, this service segment did not grow as fast as expected and in recent years has slowed. What happened to this shiny new toy?+ Also on Network World: Top 5 factors driving domestic IT outsourcing growth +To read this article in full or to leave a comment, please click here

Toshiba raises SSD storage capacity to 7.68TB

Toshiba's been lagging in the race to raise storage capacity in solid-state drives, but has taken a step forward with its new 7.68TB ZD6000 SSD. The new drive is the highest-capacity SSD announced by Toshiba to date, up from its prior high of 4TB. But it's still way behind Samsung, which started shipping a 15.36TB SSD earlier this year. The ZD6000 is exactly half the size of Samsung's highest capacity drive, but Toshiba could exceed 8TB soon. It's a matter of cramming more chips in a drive, and Toshiba has the manufacturing technology to make that possible.To read this article in full or to leave a comment, please click here

Toshiba raises SSD storage capacity to 7.68TB

Toshiba's been lagging in the race to raise storage capacity in solid-state drives, but has taken a step forward with its new 7.68TB ZD6000 SSD. The new drive is the highest-capacity SSD announced by Toshiba to date, up from its prior high of 4TB. But it's still way behind Samsung, which started shipping a 15.36TB SSD earlier this year. The ZD6000 is exactly half the size of Samsung's highest capacity drive, but Toshiba could exceed 8TB soon. It's a matter of cramming more chips in a drive, and Toshiba has the manufacturing technology to make that possible.To read this article in full or to leave a comment, please click here

Black Hat: Kaspersky is seeking white hats

Kaspersky Lab is using Black Hat’s hacker-rich environment as the launch pad for its first bug-bounty program that seeks talent to hack the company’s anti-malware software.It’s dipping its toe into the program by staking an initial $50,000 kitty for a six-month effort to find flaws in its two most popular products, Kaspersky Internet Security and Kaspersky Endpoint Security.+More on Network World: Hot products at Black Hat 2016 | Follow all the stories from Black Hat +To read this article in full or to leave a comment, please click here

Black Hat: Kaspersky is seeking white hats

Kaspersky Lab is using Black Hat’s hacker-rich environment as the launch pad for its first bug-bounty program that seeks talent to hack the company’s anti-malware software.It’s dipping its toe into the program by staking an initial $50,000 kitty for a six-month effort to find flaws in its two most popular products, Kaspersky Internet Security and Kaspersky Endpoint Security.+More on Network World: Hot products at Black Hat 2016 | Follow all the stories from Black Hat +To read this article in full or to leave a comment, please click here

Another huge bitcoin heist: Bitcoin worth $72 million stolen from Bitfinex

The Hong Kong-based bitcoin exchange Bitfinex suspended trading on Tuesday after discovering a security breach. A hacker or hackers pulled off a massive heist of nearly 120,000 bitcoins. At the time of the theft, 119,756 bitcoins would have been worth about $72 million. After the breach announcement, the price of bitcoin crashed; current exchange rates place the value at around $65 million.“Some of our users have had their bitcoins stolen,” Zane Tackett, Bitfinex’s director of community and product development, said on Reddit. “The bitcoin was stolen from users’ segregated wallets,” he told Reuters.To read this article in full or to leave a comment, please click here

Another huge bitcoin heist: Bitcoin worth $72 million stolen from Bitfinex

The Hong Kong-based bitcoin exchange Bitfinex suspended trading on Tuesday after discovering a security breach. A hacker or hackers pulled off a massive heist of nearly 120,000 bitcoins. At the time of the theft, 119,756 bitcoins would have been worth about $72 million. After the breach announcement, the price of bitcoin crashed; current exchange rates place the value at around $65 million.“Some of our users have had their bitcoins stolen,” Zane Tackett, Bitfinex’s director of community and product development, said on Reddit. “The bitcoin was stolen from users’ segregated wallets,” he told Reuters.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Congress presented with shocking E911 MLTS report by GSA

After ignoring a Congressional directive for more than three years, as well as an FCC commissioner’s direct request, the General Services Administration (GSA) finally produced a report on the status of 911 dialing in federal buildings. Despite the long delay, the content and quality of the report were disappointing at best.On Feb. 22, 2012, the Middle-Class Tax Relief and Job Creation Act of 2012 was passed as Public Law 112-96. As with many bills, the law covered a broad array of topics, one of them being the establishment of a national public safety broadband network expanding high-speed wireless broadband and improving communications interoperability among first responders. Within this section, the law also required that the GSA audit and produce a report on the 911 capabilities of multi-line telephone systems (MLTS) used in the almost 10,000 federal buildings and facilities under their control.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Congress presented with shocking E911 MLTS report by GSA

After ignoring a Congressional directive for more than three years, as well as an FCC commissioner’s direct request, the General Services Administration (GSA) finally produced a report on the status of 911 dialing in federal buildings. Despite the long delay, the content and quality of the report were disappointing at best.On Feb. 22, 2012, the Middle-Class Tax Relief and Job Creation Act of 2012 was passed as Public Law 112-96. As with many bills, the law covered a broad array of topics, one of them being the establishment of a national public safety broadband network expanding high-speed wireless broadband and improving communications interoperability among first responders. Within this section, the law also required that the GSA audit and produce a report on the 911 capabilities of multi-line telephone systems (MLTS) used in the almost 10,000 federal buildings and facilities under their control.To read this article in full or to leave a comment, please click here

Iranian hacker group knows who is on Telegram

Hackers obtained the mobile phone numbers of 15 million Iranian users of the Telegram encrypted messaging app, and hacked the accounts of more than a dozen of them, security researchers say.The accounts were hacked through interception of SMS confirmation codes sent to the associated phone numbers, security researchers Claudio Guarnieri and Collin Anderson told Reuters.The revelations show once again how use of encryption can pit technology companies against governments. Telegram founder Pavel Durov has in the past sided with Apple CEO Tim Cook against the FBI on the question of whether governments should have access to the contents of smartphones.To read this article in full or to leave a comment, please click here

Iranian hacker group knows who is on Telegram

Hackers obtained the mobile phone numbers of 15 million Iranian users of the Telegram encrypted messaging app, and hacked the accounts of more than a dozen of them, security researchers say.The accounts were hacked through interception of SMS confirmation codes sent to the associated phone numbers, security researchers Claudio Guarnieri and Collin Anderson told Reuters.The revelations show once again how use of encryption can pit technology companies against governments. Telegram founder Pavel Durov has in the past sided with Apple CEO Tim Cook against the FBI on the question of whether governments should have access to the contents of smartphones.To read this article in full or to leave a comment, please click here

Juniper vMX Multicast Configuration

How does Internet work - We know what is networking

I’m fairly new to Juniper CLI. For one of my first tries, I decided to make my life difficult by starting with multicast configuration on virtual vMX routers running as VMs on VMware ESXi. It took a lot of investigation about some part of this configuration specially the tunnel interface which you will see below. I decided to put it here all in one place with the explanation of every step because Juniper documentation tends to assume that you know more than me. If that is not the case, this short description is for you. Here’s how the topology looks like. I have

Juniper vMX Multicast Configuration

IBM creates artificial neurons from phase change memory for cognitive computing

IBM scientists have created artificial neurons and synapses using phase change memory (PCM) that mimics the brain's cognitive learning capability. It is the first time the researchers were able to create what they described as "randomly spiking neurons" using phase-change materials to store and process data. The discovery is a milestone in developing energy-sipping and highly dense neuro networks that could be used for cognitive computing applications. In short, the technology can be used to improve today's processors in order to perform computations in applications such as data-correlation detection for the Internet of Things (IoT), stock market trades and social media posts at a staggeringly fast rate.To read this article in full or to leave a comment, please click here

IBM creates artificial neurons from phase change memory for cognitive computing

IBM scientists have created artificial neurons and synapses using phase change memory (PCM) that mimics the brain's cognitive learning capability. It is the first time the researchers were able to create what they described as "randomly spiking neurons" using phase-change materials to store and process data. The discovery is a milestone in developing energy-sipping and highly dense neuro networks that could be used for cognitive computing applications. In short, the technology can be used to improve today's processors in order to perform computations in applications such as data-correlation detection for the Internet of Things (IoT), stock market trades and social media posts at a staggeringly fast rate.To read this article in full or to leave a comment, please click here

15 low-code tools for building mobile apps fast

More no-code and low-code development toolsThe debates over mobile web, native code, and hybrid mobile apps may never end, but one thing everyone can agree on is that we can’t build mobile apps fast enough. Low-code development platforms take a visual, drag-and-drop approach to building apps, allowing developers to deliver applications faster at lower costs. So-called no-code tools even promise to put app building within reach of nondevelopers.To read this article in full or to leave a comment, please click here

Politics blamed for feds’ reliance on old IT

The U.S. government is spending more than $81 billion on information technology. But only about 24% is spent overall on new systems, with the rest being used to maintain old systems.The Social Security Administration, for instance, has more than 60 million lines of Cobol, the agency’s Office of Inspector General reported last month.And the U.S. Defense Department is running some nuclear weapons support systems on an IBM Series/1 Computer, circa 1970s, the U.S. Government Accountability Office recently reported.MORE ON NETWORK WORLD: 26 crazy and scary things the TSA has found on travelers “Legacy IT investments across the federal government are becoming increasingly obsolete,” wrote the GAO in its report released in May. “Specifically, many use outdated languages and old parts.”To read this article in full or to leave a comment, please click here

Politics blamed for feds’ reliance on old IT

The U.S. government is spending more than $81 billion on information technology. But only about 24% is spent overall on new systems, with the rest being used to maintain old systems.The Social Security Administration, for instance, has more than 60 million lines of Cobol, the agency’s Office of Inspector General reported last month.And the U.S. Defense Department is running some nuclear weapons support systems on an IBM Series/1 Computer, circa 1970s, the U.S. Government Accountability Office recently reported.MORE ON NETWORK WORLD: 26 crazy and scary things the TSA has found on travelers “Legacy IT investments across the federal government are becoming increasingly obsolete,” wrote the GAO in its report released in May. “Specifically, many use outdated languages and old parts.”To read this article in full or to leave a comment, please click here