SD-WAN takes advantage of the 100x MPLS/Internet price gap

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Everyone is generally aware that MPLS is expensive compared to Internet connectivity (check out “Why MPLS is so expensive”), but are you aware exactly how enormous the difference is? Even with MPLS prices coming down, the precipitous drop in Internet prices has made the gap larger. A few years ago MPLS typically cost $300-$600 per Mbps per month for the copper connectivity (i.e. n x T1/E1) typically deployed at all but the largest enterprise locations, while today in most of North America and much of Europe a more typical range is $100 - $300 per Mbps per month.To read this article in full or to leave a comment, please click here

SD-WAN takes advantage of the 100x MPLS/Internet price gap

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Everyone is generally aware that MPLS is expensive compared to Internet connectivity (check out “Why MPLS is so expensive”), but are you aware exactly how enormous the difference is? Even with MPLS prices coming down, the precipitous drop in Internet prices has made the gap larger. 

A few years ago MPLS typically cost $300-$600 per Mbps per month for the copper connectivity (i.e. n x T1/E1) typically deployed at all but the largest enterprise locations, while today in most of North America and much of Europe a more typical range is $100 - $300 per Mbps per month.

To read this article in full or to leave a comment, please click here

Sounds from your hard disk drive can even be used to steal a PC’s data

Researchers have found a way to steal a PC’s data by using the mechanical noise coming from the hard disk drives inside.It’s not a very practical hack, but the scheme has been designed for “air-gapped” systems, or computers that have been sectioned off from the Internet.The researchers at Ben-Gurion University of the Negev in Israel have been studying how to use sound to extract information from air-gapped computers. In June, they showed that even a PC’s cooling fans can be controlled to secretly transmit data, including passwords and encryption keys.To read this article in full or to leave a comment, please click here

Sounds from your hard disk drive can even be used to steal a PC’s data

Researchers have found a way to steal a PC’s data by using the mechanical noise coming from the hard disk drives inside.It’s not a very practical hack, but the scheme has been designed for “air-gapped” systems, or computers that have been sectioned off from the Internet.The researchers at Ben-Gurion University of the Negev in Israel have been studying how to use sound to extract information from air-gapped computers. In June, they showed that even a PC’s cooling fans can be controlled to secretly transmit data, including passwords and encryption keys.To read this article in full or to leave a comment, please click here

Sounds from your hard disk drive can be used to steal a PC’s data

Researchers have found a way to steal a PC’s data by using the mechanical noise coming from the hard disk drives inside. It’s not a very practical hack, but the scheme has been designed for “air-gapped” systems, or computers that have been sectioned off from the Internet. The researchers at Ben-Gurion University of the Negev in Israel have been studying how to use sound to extract information from air-gapped computers. In June, they showed that even a PC’s cooling fans can be controlled to secretly transmit data, including passwords and encryption keys.To read this article in full or to leave a comment, please click here

HP turns to Windows 10 for mobile devices, cutting reliance on Android

HP has dabbled in many operating systems over the last few years, but the company always seems to come back to Windows.The company is building a mobile device strategy around Windows 10 Mobile and is slowly cutting its reliance on Android, once high on the company's list for tablets and PCs.HP has discontinued low-cost Android tablets, and two remaining enterprise tablets feature aging hardware and an old version of the OS. Company executives have said future mobile devices will be built around Windows 10 unless there's significant new demand for Android.HP is following the lead of Dell, which has cut Android devices to focus on Windows. Lenovo, meanwhile, still sells Android tablets and smartphones but is cutting its number of Android tablets and increasing its number of Windows 2-in-1s.To read this article in full or to leave a comment, please click here

Is a bidding war brewing for Raspberry Pi manufacturer Premier Farnell?

Swiss conglomerate Datwyler today said that it was still considering its options after its $795 million bid for Raspberry Pi manufacturer Premier Farnell was trumped by a $900 million offer from Avnet Inc late last month.In an earnings release issued today, Datwyler emphasized that the process isn’t over, and that the prospect of acquiring the U.K.-based electronics supply company is still a highly attractive one.+ALSO ON NETWORK WORLD: How well does social engineering work? One test returned 150% + 'Golden keys' that unlock Windows' Secure Boot protection discovered+To read this article in full or to leave a comment, please click here

The tide may be turning against encryption in Europe

In the wake of increased terror incidents Europe is starting to look seriously at ways to read encrypted messages that officials there say are instrumental to carrying out attacks.France and Germany apparently are teaming up to formulate a plan for enabling law enforcement there to read encrypted communications, according to a report in Le Monde. But it’s unclear exactly what the two countries will discuss.France’s interior minister Bernard Cazeneuve says an international effort is needed to deal with the issue and he plans to meet with his German counterpart later this month to discuss it.To read this article in full or to leave a comment, please click here

The tide may be turning against encryption in Europe

In the wake of increased terror incidents Europe is starting to look seriously at ways to read encrypted messages that officials there say are instrumental to carrying out attacks.France and Germany apparently are teaming up to formulate a plan for enabling law enforcement there to read encrypted communications, according to a report in Le Monde. But it’s unclear exactly what the two countries will discuss.France’s interior minister Bernard Cazeneuve says an international effort is needed to deal with the issue and he plans to meet with his German counterpart later this month to discuss it.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How the Affordable Care Act contributed the rise of the blended workforce

Work “works” differently than it used to. More and more people are working as freelancers in the gig economy, and today 40 percent of the workforce does freelancing, contract work and part-time work. That means many more organizations have blended workforces with a variety of employees, including full-time, permanent employees, contractors and freelancers.Multiple factors are enabling the disruption of the traditional employer-employee model and the rise of the blended workforce. Technology enables people to work from wherever they are, societal attitudes towards work have changed, and competitive demands place more pressure on organizations to be agile. More than 30 percent of workers for nearly 40 percent of top-performing firms are already contract or freelance workers. In fact, these firms intend to hire even more freelancers in the future.To read this article in full or to leave a comment, please click here

Best Deals of the Week, August 8-12 – Deal Alert

Best Deals of the Week, August 8-12 - Deal AlertCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of August 18th. All items are highly rated, and dramatically discounted!23% off HDMI Cloner Box for Gaming or HD Video Stream Capture, No PC neededHere's a device any gamer or video enthusiast may want to have on hand. Connect a game console, DVD, or any video source to this gadget via its HDMI input, and with the push of a button it captures and saves the video stream to any attached USB flash drive, with no PC required. Advanced hardware H.264 encoding captures your live gameplay or video playback in 1080p Full HD, while keeping the file size low and capturing speeds high. Averaging 4 out of 5 stars on Amazon from over 170 customers (read reviews), the gadget's $129.99 list price has been reduced23% to $99.99. With the unit you'll get a free 16gb USB stick to get you started (enough for several hours of video). See the discounted cloner box now on Amazon.To read this article in full or to leave a comment, please click here

Illusive Networks uses deception to detect an attacker in your network

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  The term "advanced persistent threat" is tossed around so frequently that some people might think that every cyberattack results from an APT. This is far from the case. In fact, APTs represent a very dangerous category of cyber threats that use sophisticated resources and techniques to evade detection and that are tenacious in their mission, whether it's to steal information or disrupt normal operations.NIST defines advanced persistent threat by describing three characteristics. The APT:1.         Pursues its objectives repeatedly over an extended period of timeTo read this article in full or to leave a comment, please click here