How to embrace the benefits of shadow IT

The terms shadow IT conjures up negative images in the minds of most IT organizations. Yet non-IT enterprise functions and lines of business are buying more of their own IT systems than ever before, particularly product, operations and external customer-facing groups and highly dynamic services areas. “As business functions seek to realize the benefits from these non-traditional channels of IT enablement, the shadow IT organizations are growing aggressively in order to help orchestrate and aggregate services into business consumable offerings,” says Craig Wright, managing director of outsourcing and technology consultancy Pace Harmon.[ Related: 4 ways to apply SLAs to shadow IT ]To read this article in full or to leave a comment, please click here

How to embrace the benefits of shadow IT

The terms shadow IT conjures up negative images in the minds of most IT organizations. Yet non-IT enterprise functions and lines of business are buying more of their own IT systems than ever before, particularly product, operations and external customer-facing groups and highly dynamic services areas. “As business functions seek to realize the benefits from these non-traditional channels of IT enablement, the shadow IT organizations are growing aggressively in order to help orchestrate and aggregate services into business consumable offerings,” says Craig Wright, managing director of outsourcing and technology consultancy Pace Harmon.[ Related: 4 ways to apply SLAs to shadow IT ]To read this article in full or to leave a comment, please click here

Data visualization firm Qlik sells for $3 billion

Qlik, a vendor of data visualization tools, has agreed to be acquired by private equity investment firm Thoma Bravo for US$3 billion.The sale will give Qlik "additional flexibility" to operate, Lars Björk, the company's CEO, said in a statement.Qlik is touted as a software package for business intelligence needs, with some customers saying it has strong data modeling features. Qlik offers what it calls "self-service" data visualization and discovery, with customer able to build custom charts based on their data needs.To read this article in full or to leave a comment, please click here

How millennial tech grads should tailor their resumes

You’ve recently graduated and now it’s time to start applying to jobs -- but what skills and experience should you highlight on your resume? To help you decide, CompTIA released the results of its 2016 IT Industry Outlook report, which surveyed 673 IT industry companies in the U.S., Canada and the U.K., and found that millennials have certain skills businesses are clamoring for in the coming year.“Recent grads have grown up in an age of evolving technologies, particularly the Internet Age. They’ve not only developed a unique way of problem solving and critical thinking, but they are also acutely aware of new technologies that may increase operational efficiency in a business,” says Gene Richardson, COO of Experts Exchanges.To read this article in full or to leave a comment, please click here

How millennial tech grads should tailor their resumes

You’ve recently graduated and now it’s time to start applying to jobs -- but what skills and experience should you highlight on your resume? To help you decide, CompTIA released the results of its 2016 IT Industry Outlook report, which surveyed 673 IT industry companies in the U.S., Canada and the U.K., and found that millennials have certain skills businesses are clamoring for in the coming year.“Recent grads have grown up in an age of evolving technologies, particularly the Internet Age. They’ve not only developed a unique way of problem solving and critical thinking, but they are also acutely aware of new technologies that may increase operational efficiency in a business,” says Gene Richardson, COO of Experts Exchanges.To read this article in full or to leave a comment, please click here

SS8 makes enterprise version of traffic-analysis platform designed for intelligence agencies

SS8 built its network traffic-inspection and analysis platform as a tool for intelligence agencies to discover communications among criminals and terrorists but now has scaled it back for enterprises to stop data breaches.Called BreachDetect, the business-sized software gathers highly detailed network traffic data that discovers application flows and the activity of individual machines and analyzes them to find anomalies that indicate foul play.The platform also stores the information it collects so it can be analyzed over and over as new threat indicators are identified. That way corporate security pros can discover threats that may have been lurking undetected for months and figure out when and how they got there, SS8 says.To read this article in full or to leave a comment, please click here

SS8 makes enterprise version of traffic-analysis platform designed for intelligence agencies

SS8 built its network traffic-inspection and analysis platform as a tool for intelligence agencies to discover communications among criminals and terrorists but now has scaled it back for enterprises to stop data breaches.Called BreachDetect, the business-sized software gathers highly detailed network traffic data that discovers application flows and the activity of individual machines and analyzes them to find anomalies that indicate foul play.The platform also stores the information it collects so it can be analyzed over and over as new threat indicators are identified. That way corporate security pros can discover threats that may have been lurking undetected for months and figure out when and how they got there, SS8 says.To read this article in full or to leave a comment, please click here

[minipost]Quick LAB/config example for IPv6 BGP between HP Networking Comware v5 andCisco

A small lab showing basic configuration of BGP between Cisco and HP (Comware v5). This is just something small we deploying recently, there is nothing grand here, only a minor configuration example to follow later when needed.

NOTE on HP Comware v5  vs newer Comware v7, I understand I am using older version of the operating system on HP devices, the point is that this article is using one of my real work projects where Comware v5 was used without possibility to upgrade. However ALL Ipv6 functions that we needed were provided already on this older Comware, and when I checked, Comware v7 variant of this LAB is only changing commands syntax (actually quite easy to convert from v5 to v7 only following the “?”), therefore this article will remain in Comware v5 and I believe many readers will take the principles and will have no problem to upgrade to Comware v7 on their own.

Lab Topology:

This is a simple topology that is trying to simulate a typical L3 Edge / Distribution / Access with several HP 5800 layer3 switches and Cisco 3750 is simulating a typical WAN provider with dual-homing access. Of course all with limits Continue reading

Texas goes big with 18-petaflop supercomputer

The Texas Advanced Computer Center (TACC) has received $30 million in U.S. funding for a new supercomputer that will roughly double the performance of its existing 9-petaflop supercomputer.The new system, named Stampede 2 after its predecessor, is being funded by the National Science Foundation. It will be available for scientific research by June 1, 2017.The Texas supercomputing center occupies a unique niche. The U.S. government owns the nation's largest and most powerful supercomputers. The national leader is Titan, a Cray XK7 Opteron-based system at Oak Ridge National Laboratory, running at a peak performance of about 27 petaflops.To read this article in full or to leave a comment, please click here

Texas goes big with 18-petaflop supercomputer

The Texas Advanced Computer Center (TACC) has received $30 million in U.S. funding for a new supercomputer that will roughly double the performance of its existing 9-petaflop supercomputer.The new system, named Stampede 2 after its predecessor, is being funded by the National Science Foundation. It will be available for scientific research by June 1, 2017.The Texas supercomputing center occupies a unique niche. The U.S. government owns the nation's largest and most powerful supercomputers. The national leader is Titan, a Cray XK7 Opteron-based system at Oak Ridge National Laboratory, running at a peak performance of about 27 petaflops.To read this article in full or to leave a comment, please click here

75% off Opolar LC06 Laptop Fan Cooler with Temperature Display – Deal Alert

The LC06 laptop fan from Opolar averages 4.5 out of 5 stars on Amazon from nearly 900 customers (read reviews), and currently lists for just $29.99. It's designed for laptops with vents on the sides or rear, quietly and rapidly reducing the internal and surface temperatures by 18-50 degrees in minutes, far outperforming most cooling pads. Temp can be monitored on the built-in display. The motor is built to last through many years of heavy use, and is backed by a one year warranty for product defects and a 30 day no hassle return for incompatibility. See the discounted LC06 laptop fan now on Amazon.To read this article in full or to leave a comment, please click here

Mysterious malware targets industrial control systems, borrows Stuxnet techniques

Researchers have found a malware program that was designed to manipulate supervisory control and data acquisition (SCADA) systems in order to hide the real readings from industrial processes.The same technique was used by the Stuxnet sabotage malware allegedly created by the U.S. and Israel to disrupt Iran's nuclear program and credited with destroying a large number of the country's uranium enrichment centrifuges.The new malware was discovered in the second half of last year by researchers from security firm FireEye, not in an active attack, but in the VirusTotal database. VirusTotal is a Google-owned website where users can submit suspicious files to be scanned by antivirus engines.To read this article in full or to leave a comment, please click here

Mysterious malware targets industrial control systems, borrows Stuxnet techniques

Researchers have found a malware program that was designed to manipulate supervisory control and data acquisition (SCADA) systems in order to hide the real readings from industrial processes.The same technique was used by the Stuxnet sabotage malware allegedly created by the U.S. and Israel to disrupt Iran's nuclear program and credited with destroying a large number of the country's uranium enrichment centrifuges.The new malware was discovered in the second half of last year by researchers from security firm FireEye, not in an active attack, but in the VirusTotal database. VirusTotal is a Google-owned website where users can submit suspicious files to be scanned by antivirus engines.To read this article in full or to leave a comment, please click here

Microsoft’s drastic upgrade tactic pays off with boost to Windows 10 share

Windows 10 in May recorded its largest increase in user share since August 2015, the first full month after its launch last summer, data published Wednesday showed.The impressive increase came after Microsoft began what will likely be its last big push to put the free Windows 10 on customers' PCs, a campaign that started mid-May and featured a much-derided trick to get users to approve the upgrade from Windows 7 and Windows 8.1.According to U.S.-based analytics vendor Net Applications, Windows 10 powered 19.4% of all Windows PCs in May, a 2.1-point increase from the month before. Net Applications measures user share -- an estimate of the percentage of the global PC population that runs a particular operating system -- by tallying unique visitors to clients' websites.To read this article in full or to leave a comment, please click here

Handling Criticism of Your Product

Members of the IT community at large sometimes find babies ugly, and express those opinions in public. That's how community works. We share knowledge, experience, and opinions. We agree. We disagree. We discuss. We speak through our microphones and keyboards, and it's all intended to be for the greater good. How should a vendor react?

OpenSwitch finds critical home at Linux Foundation

The OpenSwitch Project took a significant development step this week when it became the first full feature network operating system project of the Linux Foundation.+More on Network World: Feeling jammed? Not like this I bet+The move gives OpenSwitch a neutral home where it can receive all the necessary support for long-term growth and sustainability – including back-office, technical infrastructure and ecosystem development services, said Michael Dolan, VP of Strategic Programs at The Linux Foundation.While the Linux Foundation hosts other projects in the networking space, the addition of OpenSwitch makes available a complete NOS solution, from the ASIC drivers to the APIs,’ that will run on reference hardware and in hypervisors, he stated.To read this article in full or to leave a comment, please click here

OpenSwitch finds critical home at Linux Foundation

The OpenSwitch Project took a significant development step this week when it became the first full feature network operating system project of the Linux Foundation.+More on Network World: Feeling jammed? Not like this I bet+The move gives OpenSwitch a neutral home where it can receive all the necessary support for long-term growth and sustainability – including back-office, technical infrastructure and ecosystem development services, said Michael Dolan, VP of Strategic Programs at The Linux Foundation.While the Linux Foundation hosts other projects in the networking space, the addition of OpenSwitch makes available a complete NOS solution, from the ASIC drivers to the APIs,’ that will run on reference hardware and in hypervisors, he stated.To read this article in full or to leave a comment, please click here

OpenSwitch finds critical home at Linux Foundation

The OpenSwitch Project took a significant development step this week when it became the first full feature network operating system project of the Linux Foundation.+More on Network World: Feeling jammed? Not like this I bet+The move gives OpenSwitch a neutral home where it can receive all the necessary support for long-term growth and sustainability – including back-office, technical infrastructure and ecosystem development services, said Michael Dolan, VP of Strategic Programs at The Linux Foundation.While the Linux Foundation hosts other projects in the networking space, the addition of OpenSwitch makes available a complete NOS solution, from the ASIC drivers to the APIs,’ that will run on reference hardware and in hypervisors, he stated.To read this article in full or to leave a comment, please click here