Why Microsoft bought LinkedIn for $26 billion, in one word: Cortana

The image above says it all: Microsoft spent $26.1 billion to ensure that you’ll never walk into a meeting “cold” again.Picture a typical business trip: meetings all day, drinks at night. A good salesperson knows his or her contacts before he or she steps foot in the door. But that goes for coworkers as well: How you you make them feel comfortable? How do you make them part of a team? How do you let them know who to approach, both inside and outside the company?All of this usually takes some effort on your part, or at least a competent assistant. And that’s the role that Microsoft hopes to play, especially with its digital assistant, Cortana, and Office 365.To read this article in full or to leave a comment, please click here

AT&T and Samsung detail security gaps

Cybersecurity would seem to be a top priority for enterprises, but there are still breaches and apparent gaps in their defenses and the way that companies respond to attacks.In separate announcements on Monday, both AT&T and Samsung drew attention to the dilemma. They recommended new enterprise security assessments that build on the services already offered by both companies.Samsung announced a new partnership with Booz Allen Hamilton to help enterprises find and address gaps in their mobile security. This approach includes a two-day, on-site mobile security assessment for each client, using a model based on security standards from the bodies like the National Institutes of Standards and Technology, among others.To read this article in full or to leave a comment, please click here

AT&T and Samsung detail security gaps

Cybersecurity would seem to be a top priority for enterprises, but there are still breaches and apparent gaps in their defenses and the way that companies respond to attacks.In separate announcements on Monday, both AT&T and Samsung drew attention to the dilemma. They recommended new enterprise security assessments that build on the services already offered by both companies.Samsung announced a new partnership with Booz Allen Hamilton to help enterprises find and address gaps in their mobile security. This approach includes a two-day, on-site mobile security assessment for each client, using a model based on security standards from the bodies like the National Institutes of Standards and Technology, among others.To read this article in full or to leave a comment, please click here

AT&T and Samsung detail security gaps

Cybersecurity would seem to be a top priority for enterprises, but there are still breaches and apparent gaps in their defenses and the way that companies respond to attacks.In separate announcements on Monday, both AT&T and Samsung drew attention to the dilemma. They recommended new enterprise security assessments that build on the services already offered by both companies.Samsung announced a new partnership with Booz Allen Hamilton to help enterprises find and address gaps in their mobile security. This approach includes a two-day, on-site mobile security assessment for each client, using a model based on security standards from the bodies like the National Institutes of Standards and Technology, among others.To read this article in full or to leave a comment, please click here

NERSC Preps for Next Generation “Cori” Supercomputer

The powerful Cori supercomputer, now being readied for deployment at NERSC (The National Energy Research Scientific Computing Center), has been named in honor of Gerty Cori. Cori was a Czech-American biochemist (August 15, 1896 – October 26, 1957) who became the first American woman to be awarded the Nobel Prize.

Cori (a.k.a. NERSC-8) is the Center’s newest supercomputer. Phase 1 of the system is currently installed with Phase 2 slated to be up and running this year.  Phase 1 is a Cray XC40 supercomputer based on the Intel Haswell multi-core processor with a theoretical peak performance of 1.92 petaflops/sec. It

NERSC Preps for Next Generation “Cori” Supercomputer was written by Nicole Hemsoth at The Next Platform.

When prepend fails, what next? (3)

We began this short series with a simple problem—what do you do if your inbound traffic across two Internet facing links is imbalanced? In other words, how do you do BGP load balancing? The first post looked at problems with AS Path prepend, while the second looked at de-aggregating and using communities to modify the local preference within the upstream provider’s network.

There is one specific solution I want to discuss a bit more before I end this little series: de-aggregation. Advertising longer prefixes is the “big hammer” of routing; you should always be careful when advertising more specifics. The Default Free Zone (DFZ) is much like the “commons” of an old village. No-one actually “owns” the routing table in the global Internet, but everyone benefits from it. De-aggregating don’t really cost you anything, but it does cost everyone else something. It’s easy enough to inject another route into the routing table, but remember the longer prefix you inject shows up everywhere in the world. You’re fixing your problem by taking up some small amount of memory in every router that’s connected to the DFZ in the world. If everyone de-aggregates, everyone has to buy larger routers and more Continue reading

IDG Contributor Network: Flash flood alerts: How sonar IoT systems help protect communities in Honduras

Rivers in Honduras flood frequently and suddenly, wreaking havoc, washing away houses, ruining crops and displacing families. Could IoT help provide early warning of floods?Robert Ryan-Silva took on this challenge with the Hidrosónico project. As director of the DAI maker lab, he’s an expert in applying technology for humanitarian projects around the world.Many villages and farms in Honduras are prone to flooding because they are on river banks. Designing a solution was challenging. It had to detect rising flood waters and alert families to evacuate in time. The solution had to be affordable, rugged and easy to install. Making things harder was the fact that mobile phones had only 20 percent penetration in Honduras.To read this article in full or to leave a comment, please click here

App makers should take responsibility for the effects of their creations

Imagine you’re a parent, living with your family in a quiet suburban subdivision. With very little traffic, your kids happily play in the street in front of your house. And then one day, construction begins on a distant thoroughfare, and suddenly hundreds of cars are racing down your formerly sleepy side street seeking to avoid the backup. And those cars didn’t arrive there randomly, they were sent there by traffic and navigation apps like Google’s Waze.For increasing numbers of people around the country, there’s no need to imagine this scenario, they’re already living it. And it brings up a couple of important questions: Who’s fault is this problem, and what can—and should—be done about it? The answers, unfortunately, aren’t simple.To read this article in full or to leave a comment, please click here

The Challenge Of Coding Across HPC Architectures

With the International Supercomputing 2016 conference fast approaching, the HPC community is champing at the bit to share insights on the latest technologies and techniques to make simulation and modeling applications scale further and run faster.

The hot topic of conversation is often hardware at such conferences, but hardware is easy. Software is the hard part, and techniques for exploiting the compute throughput of an increasingly diverse collection of engines – from multicore CPUs to GPUs to DSPs and to FPGAs – evolve more slowly than hardware. And they do so by necessity.

The OpenACC group is getting out ahead

The Challenge Of Coding Across HPC Architectures was written by Timothy Prickett Morgan at The Next Platform.

App stores and Linux repositories: Maybe the worst ideas ever

Eight years ago, Nokia released a Linux-powered tablet dubbed the N810. It’s a very cool little device, with a rather pleasant-to-use slide-out keyboard, running a Debian-based distribution known as Maemo.That little tablet went everywhere with me. At one point I—no joke— owned two of them. I could do some pretty remarkable things with that little beauty—from making Skype calls (back when I still used Skype) to running a full-blown version of Gimp. It was a complete, powerful desktop computer in my pocket.Recently, I decide to dust off my trusty old N810 to use it again. It’s a Linux-based computer, so why not. Right?To read this article in full or to leave a comment, please click here

A popular cloud privacy bill stalls in the Senate

A bill to give email and other documents stored in the cloud new protections from government searches may be dead in the U.S. Senate over a proposed amendment to expand the FBI's surveillance powers.The Electronic Communications Privacy Act Amendments Act would require law enforcement agencies to get court-ordered warrants to search email and other data stored with third parties for longer than six months.Under U.S. law, police need warrants to get their hands on paper files in a suspect's home or office and on electronic files stored on his computer or in the cloud for less than 180 days. But under the 30-year-old ECPA, police agencies need only a subpoena, not reviewed by a judge, to demand files stored in the cloud or with other third-party providers for longer than 180 days.To read this article in full or to leave a comment, please click here

A popular cloud privacy bill stalls in the Senate

A bill to give email and other documents stored in the cloud new protections from government searches may be dead in the U.S. Senate over a proposed amendment to expand the FBI's surveillance powers.The Electronic Communications Privacy Act Amendments Act would require law enforcement agencies to get court-ordered warrants to search email and other data stored with third parties for longer than six months.Under U.S. law, police need warrants to get their hands on paper files in a suspect's home or office and on electronic files stored on his computer or in the cloud for less than 180 days. But under the 30-year-old ECPA, police agencies need only a subpoena, not reviewed by a judge, to demand files stored in the cloud or with other third-party providers for longer than 180 days.To read this article in full or to leave a comment, please click here

VMware buys Arkin to help increase virtual networking adoption

VMware Monday announced plans to acquire Arkin, a specialist in helping customers manage physical and virtual networks, for an undisclosed sum.Arkin says its tools provide “cross-domain visibility,” which means that it can aggregate operational data from both virtual and physical infrastructures. Correlating this data can help organizations root out the cause of problems and fix them faster.+MORE M&A: Microsoft buys LinkedIn for $26.2 billion | Symantec scoops up Blue Coat for $4.65 billion +To read this article in full or to leave a comment, please click here