HPE invites open-source developers to pitch in on ‘The Machine’

Hewlett Packard Enterprise on Tuesday stepped up its efforts to develop a brand-new computer architecture by inviting open-source developers to collaborate on the futuristic device it calls "The Machine."Originally announced in 2014, The Machine promises a number of radical innovations, including a core design focus on memory rather than processors. It will also use light instead of electricity to connect memory and processing power efficiently, HPE says.A finished product won't be ready for years still, but HPE wants to get open-source developers involved early in making software for it. Toward that end, it has released four developer tools.To read this article in full or to leave a comment, please click here

Cisco: IP traffic will surpass the zettabyte level in 2016

IP traffic will grow in a massive way as 10 billion new devices come online over the next five years. Those are just a couple of the amazing facts found in Cisco’s 11th annual Visual Networking Index look at all things in the communications world. +More on Network World: The most momentous tech events of the past 30 years+To read this article in full or to leave a comment, please click here

Cisco: IP traffic will surpass the zettabyte level in 2016

IP traffic will grow in a massive way as 10 billion new devices come online over the next five years. Those are just a couple of the amazing facts found in Cisco’s 11th annual Visual Networking Index look at all things in the communications world. +More on Network World: The most momentous tech events of the past 30 years+To read this article in full or to leave a comment, please click here

Cisco: IP traffic will surpass the zettabyte level in 2016

IP traffic will grow in a massive way as 10 billion new devices come online over the next five years. Those are just a couple of the amazing facts found in Cisco’s 11th annual Visual Networking Index look at all things in the communications world. +More on Network World: The most momentous tech events of the past 30 years+To read this article in full or to leave a comment, please click here

Hot security startups to watch

While there’s talk that investment dollars for security startups are getting harder to find, entrepreneurs still manage to deliver a range of hardware, software and services that protect data, networks and corporate reputations.This roundup of 13 such companies that we’re keeping an eye on runs the gamut from cloud security services to fraud prevention to protecting supervisory control and data acquisition (SCADA) and Internet of Things devices.+ SEE LAST YEAR'S LIST of Security startups to watch +To read this article in full or to leave a comment, please click here

Cisco: IP traffic will surpass the zettabyte level in 2016

IP traffic will grow in a massive way as 10 billion new devices come online over the next five years.Those are just a couple of the amazing facts found in Cisco’s 11th annual Visual Networking Index look at all things in the communications world.+More on Network World: The most momentous tech events of the past 30 years+To read this article in full or to leave a comment, please click here

Hot security startups to watch

While there’s talk that investment dollars for security startups are getting harder to find, entrepreneurs still manage to deliver a range of hardware, software and services that protect data, networks and corporate reputations.This roundup of 13 such companies that we’re keeping an eye on runs the gamut from cloud security services to fraud prevention to protecting supervisory control and data acquisition (SCADA) and Internet of Things devices.+ SEE LAST YEAR'S LIST of Security startups to watch +To read this article in full or to leave a comment, please click here

Check your BITS, because deleting malware might not be enough

Attackers are abusing the Windows Background Intelligent Transfer Service (BITS) to re-infect computers with malware after they've been already cleaned by antivirus products.The technique was observed in the wild last month by researchers from SecureWorks while responding to a malware incident for a customer. The antivirus software installed on a compromised computer detected and removed a malware program, but the computer was still showing signs of malicious activity at the network level.Upon further investigation, the researchers found two rogue jobs registered in BITS, a Windows service that's used by the OS and other apps to download updates or transfer files. The two malicious jobs periodically downloaded and attempted to reinstall the deleted malware.To read this article in full or to leave a comment, please click here

Check your BITS, because deleting malware might not be enough

Attackers are abusing the Windows Background Intelligent Transfer Service (BITS) to re-infect computers with malware after they've been already cleaned by antivirus products.The technique was observed in the wild last month by researchers from SecureWorks while responding to a malware incident for a customer. The antivirus software installed on a compromised computer detected and removed a malware program, but the computer was still showing signs of malicious activity at the network level.Upon further investigation, the researchers found two rogue jobs registered in BITS, a Windows service that's used by the OS and other apps to download updates or transfer files. The two malicious jobs periodically downloaded and attempted to reinstall the deleted malware.To read this article in full or to leave a comment, please click here

Verizon to bid $3B for Yahoo’s core Internet business

Verizon Communications will be bidding about US$3 billion for the Internet assets of ailing Yahoo, according to a newspaper report.The communications company will try to beat other potential bidders  such as private-equity firm TPG with a deal that would likely aim to combine Yahoo Web properties, with over 1 billion users a month, with Verizon’s growing business in online ads, the Wall Street Journal reported late Monday.The bidding is far from final and Yahoo is expected to hold at least one more cycle of bidding, WSJ said quoting people familiar with the matter. But the price offered by Verizon could be an indicator of which way the fight for the acquisition of the Internet company is going.To read this article in full or to leave a comment, please click here

U.S. Cyber Command struggles to retain top cybersecurity talent

At U.S. Cyber Command, the top brass has made recruiting top talent a leading priority, but those efforts have been slowed by challenges in attracting and retaining the next generation of cyber warriors.Maj. Gen. Paul Nakasone, commander of Cyber Command's Cyber National Mission Force, spoke to those struggles in a recent online event hosted by Federal News Radio.[ Related: 'HACKERS WANTED' Report: NSA Not Having Trouble Filing Cybersecurity Jobs ]To read this article in full or to leave a comment, please click here

U.S. Cyber Command struggles to retain top cybersecurity talent

At U.S. Cyber Command, the top brass has made recruiting top talent a leading priority, but those efforts have been slowed by challenges in attracting and retaining the next generation of cyber warriors.Maj. Gen. Paul Nakasone, commander of Cyber Command's Cyber National Mission Force, spoke to those struggles in a recent online event hosted by Federal News Radio.[ Related: 'HACKERS WANTED' Report: NSA Not Having Trouble Filing Cybersecurity Jobs ]To read this article in full or to leave a comment, please click here

Security blindspots: websites, network architects, and third-party code

It is no easy task to secure today's digital enterprise. With all of the irons in the fire of the digital ecosystem, there is a lot that can compromise the corporate website. Both website visitors and Internet users are vulnerable to web-based malware, and it is increasingly more difficult for security practitioners to thwart web-based attacks.Even with the daily occurrence of breaches, some organizations are not thinking about security, especially those enterprises for whom a large percentage of their revenue comes directly through the website. Many companies that do worry about security, think of it in terms of restricting internal users from accessing what might be potentially risky sites.To read this article in full or to leave a comment, please click here

Polycom RealConnect makes multi-vendor videoconferencing easy

Videoconferencing and the enterprise have had a good old love-hate relationship over the past few decades. It’s kind of like what’s happening with Tom Brady and the NFL. Both know they’re better off with each other, but there’s so much historical pain that it’s hard to move on and give each other another shot.Enterprise video has come a long way over the past five years, but there are so many painful memories of how things were that many IT and business leaders don’t want to give video another chance. However, it’s worth taking another look. Complicated user interfaces have been replaced with easy-to-use touchscreens. IT no longer has to roll around carts and spend half the meeting time trying to dial the other side’s ISDN SPID. Quality issues have all but been resolved, and modern systems work fine now even over low bandwidth connections.To read this article in full or to leave a comment, please click here

Four top innovators are leaving Cisco

Four Cisco Systems executives who led “spin-in” ventures that became important parts of the company have resigned.The longtime leaders decided to leave the company on June 17 because of “a disconnect regarding roles, responsibilities and charter” after a new Cisco business unit was announced, according to an internal memo posted Monday by CEO Chuck Robbins and seen by IDG News Service. The move was first reported by the Wall Street Journal.Engineers Mario Mazzola, Prem Jain and Luca Cafiero, and marketer Soni Jiandani, nicknamed “MPLS” after their first initials, started several companies with Cisco’s backing that later were absorbed back into the networking giant. The companies included Andiamo Networks in storage, Nuova Systems in data-center switching and Insieme Networks in SDN (software-defined networking).To read this article in full or to leave a comment, please click here