IDG Contributor Network: Data-driven farming: How IoT delivers hyperlocal weather information affordably

The World Food Program warns that droughts, fires and storms could endanger food security for billions of people. To adapt, farmers need current, local and reliable information to help them choose the seeds and planting schedules best suited to local weather conditions.Traditional weather sensors, however, are often too expensive and difficult to operate in large parts of the developing world. This results in scarce farming and weather data for much of the globe.Farmers need hyperlocal information—both timely and local. With IoT and new connectivity options, affordable sensors that are easy to operate can collect the vital information farmers require.To read this article in full or to leave a comment, please click here

SWIFT brings in external support as it fights wave of bank hacks

SWIFT is bringing in additional security support after a series of high-profile bank heists and attempted bank heists conducted via its financial transaction network.The company has hired two security firms, UK-based BAE Systems and Fox-IT Security of the Netherlands, to help its customers strengthen their security, it said Monday.SWIFT's network itself has not been breached in the recent attacks, but bank systems connected to it have been hacked in a number of high-profile incidents over the last year, the most spectacular of which almost led to the loss of US$1 billion from Bangladesh Bank.To read this article in full or to leave a comment, please click here

SWIFT brings in external support as it fights wave of bank hacks

SWIFT is bringing in additional security support after a series of high-profile bank heists and attempted bank heists conducted via its financial transaction network.The company has hired two security firms, UK-based BAE Systems and Fox-IT Security of the Netherlands, to help its customers strengthen their security, it said Monday.SWIFT's network itself has not been breached in the recent attacks, but bank systems connected to it have been hacked in a number of high-profile incidents over the last year, the most spectacular of which almost led to the loss of US$1 billion from Bangladesh Bank.To read this article in full or to leave a comment, please click here

Armed crooks use Pokemon Go to lure and rob victims

It’s not only cyber thugs interested in the Pokemon Go app, but crooks in real life as well. Armed robbers were reportedly using the app’s geolocation feature to lure victims to secluded locations.The “robbery part made sense” to the cops, but not the augmented reality game in which players walk around in the real world searching for Pokemon. Players can drop a Lure model in a real world location which last for 30 minutes to attract players to that location. O’Fallon Missouri Police Sgt. Phil Hardin told the St. Louis Post-Dispatch “that ‘younger, geeky officers’ had to fill in their colleagues about some of what the victim was describing.”To read this article in full or to leave a comment, please click here

Armed crooks use Pokemon Go to lure and rob victims

It’s not only cyber thugs interested in the Pokemon Go app, but crooks in real life as well. Armed robbers were reportedly using the app’s geolocation feature to lure victims to secluded locations.The “robbery part made sense” to the cops, but not the augmented reality game in which players walk around in the real world searching for Pokemon. Players can drop a Lure model in a real world location which last for 30 minutes to attract players to that location. O’Fallon Missouri Police Sgt. Phil Hardin told the St. Louis Post-Dispatch “that ‘younger, geeky officers’ had to fill in their colleagues about some of what the victim was describing.”To read this article in full or to leave a comment, please click here

SDN providers nibbling away at slow-moving MPLS carriers

Switching networking providers is no small task but it wasn't really an option for Pattonair CIO Brian Long. Growing 16 percent year-over-year, the provider of nuts and bolts for airline engines was regularly adding new offices worldwide to serve its customers. It needed to have these new sites up and running quickly but its MPLS network provider Verizon was not willing to move at the speed Pattonair required, Long says. Pattonair CIO Brian Long. "It was a really good service once [the network circuit] was in," Long says of Verizon's MPLS service. "But if you wanted to be a dynamic business and quickly open up new locations and change capacities it was just a nightmare." Long says he soon got the sense that "we were an account number in their database and we just couldn't get the support that we needed."To read this article in full or to leave a comment, please click here

SDN providers nibbling away at slow-moving MPLS carriers

Switching networking providers is no small task but it wasn't really an option for Pattonair CIO Brian Long. Growing 16 percent year-over-year, the provider of nuts and bolts for airline engines was regularly adding new offices worldwide to serve its customers. It needed to have these new sites up and running quickly but its MPLS network provider Verizon was not willing to move at the speed Pattonair required, Long says. Pattonair CIO Brian Long. "It was a really good service once [the network circuit] was in," Long says of Verizon's MPLS service. "But if you wanted to be a dynamic business and quickly open up new locations and change capacities it was just a nightmare." Long says he soon got the sense that "we were an account number in their database and we just couldn't get the support that we needed."To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cloud computing gives businesses the freedom to innovate

Although I’ve refused to get into the “what is cloud computing” argument over the years, it doesn’t mean I don’t have a very specific definition. I believe down at the very core of cloud computing sits an airtight, inviolable principle: A cloud enables the buyer to forgo asset ownership. + Also on Network World: Banking on the cloud +Through my years of consulting I have come to the conclusion that technology asset ownership is an addiction and one that must be overcome through willpower, a support network and a change in habit. I’ve had to commiserate too often with CIOs despondent over the failure of private clouds that don’t meet their goals to remain silent. The best way to illustrate my point is to consider the approaches of my fictional, but all too real, clients: Accumulation, Inc. and Leverage Enterprises.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cloud computing gives businesses the freedom to innovate

Although I’ve refused to get into the “what is cloud computing” argument over the years, it doesn’t mean I don’t have a very specific definition. I believe down at the very core of cloud computing sits an airtight, inviolable principle: A cloud enables the buyer to forgo asset ownership. + Also on Network World: Banking on the cloud +Through my years of consulting I have come to the conclusion that technology asset ownership is an addiction and one that must be overcome through willpower, a support network and a change in habit. I’ve had to commiserate too often with CIOs despondent over the failure of private clouds that don’t meet their goals to remain silent. The best way to illustrate my point is to consider the approaches of my fictional, but all too real, clients: Accumulation, Inc. and Leverage Enterprises.To read this article in full or to leave a comment, please click here

Enterprise software developers continue to use flawed code in apps

Companies that develop enterprise applications download over 200,000 open-source components on average every year and one in every 16 of those components has security vulnerabilities.This is indicative of the poor state of the software supply chain, a problem that's only getting worse with the increased reliance on third-party code combined with bad software inventory practices.According to software development lifecycle firm Sonatype, third-party components account for 80 percent to 90 percent of the code found in a typical enterprise application today.The number of downloads from the largest largest public repository of open-source Java components reached 31 billion last year, a 82 percent increase over 2014, the company found.To read this article in full or to leave a comment, please click here

Enterprise software developers continue to use flawed code in apps

Companies that develop enterprise applications download over 200,000 open-source components on average every year and one in every 16 of those components has security vulnerabilities.This is indicative of the poor state of the software supply chain, a problem that's only getting worse with the increased reliance on third-party code combined with bad software inventory practices.According to software development lifecycle firm Sonatype, third-party components account for 80 percent to 90 percent of the code found in a typical enterprise application today.The number of downloads from the largest largest public repository of open-source Java components reached 31 billion last year, a 82 percent increase over 2014, the company found.To read this article in full or to leave a comment, please click here

OpenStack + VMware Light Board Series

Still confused on how VMware software works with OpenStack?  This lightboard series on VMware + OpenStack is just what you need.  From basic 101 level content to deeper dives discussing NSX integration, these videos will help you understand how VMware technologies can enhance and stabilize an OpenStack deployment.

If you are fairly new to the OpenStack and not new to VMware, I would suggest starting with these first three videos to help level set on OpenStack as a technology decision

If you want to get a more in-depth understanding of how vSphere, NSX, and vSphere datastores work in the context of OpenStack, here is the playlist

We’re working on quite a few more videos so if you have ideas for concepts you want to learn, please reach out to your VMware account team and they can forward on the request!

Also here are some more helpful resources to get you started on the path to deploying a VMware-based OpenStack Software-Defined Data Center:

Muggers used Pokemon Go to lure victims, police say

With the launch of Pokemon Go last week, it's not just players but police that "gotta catch 'em all."Police in O'Fallon, Missouri, believe muggers may have tracked or lured victims through the Pokemon Go mobile game, in which players follow their phones' directions to real-world places to "catch" Pokemon characters."The way we believe it was used is you can add a beacon to a Pokestop to lure more players. Apparently they were using the app to locate people standing around in the middle of a parking lot or whatever other location they were in," O'Fallon Police Department explained on its official Facebook page.To read this article in full or to leave a comment, please click here

Muggers used Pokemon Go to lure victims, police say

With the launch of Pokemon Go last week, it's not just players but police that "gotta catch 'em all."Police in O'Fallon, Missouri, believe muggers may have tracked or lured victims through the Pokemon Go mobile game, in which players follow their phones' directions to real-world places to "catch" Pokemon characters."The way we believe it was used is you can add a beacon to a Pokestop to lure more players. Apparently they were using the app to locate people standing around in the middle of a parking lot or whatever other location they were in," O'Fallon Police Department explained on its official Facebook page.To read this article in full or to leave a comment, please click here

With Minnesota shooting, power of live streaming takes center stage

Live streaming, a technology that has been around for years, became white hot this week after it was used to capture the aftermath of the fatal shooting of a black man by a police officer in Minnesota.Diamond Reynolds opened her Facebook Live app and live-streamed what happened after the shooting that left her boyfriend Philando Castile dead and a country in turmoil."Live streaming is quite different ... than what we've seen before," said Dan Olds, an analyst at Gabriel Consulting Group. "Skype and Facetime are most often used as one-to-one communication vehicles. But live-casting is different in that it gives users a one-to-many live broadcasting capability -- something that had only been available to broadcasting companies up until now."To read this article in full or to leave a comment, please click here