Cisco patches high severity flaws in its Web Security Appliance

Cisco Systems has fixed four denial-of-service vulnerabilities that attackers could exploit to cause Web Security Appliance devices to stop processing traffic correctly.The Cisco Web Security Appliance (WSA) is a line of security devices that inspect Web traffic going in and out of an organization in order to detect malware, prevent data leaks, and enforce Internet access policies for users and applications. The devices run an operating system called Cisco AsyncOS.One of the four DoS vulnerabilities fixed Wednesday by Cisco stems from how the OS handles a specific HTTP response code. An attacker could send a specifically crafted HTTP request in order to consume the entire memory of an affected device.To read this article in full or to leave a comment, please click here

IBM Extends GPU Cloud Capabilities, Targets Machine Learning

As we have noted over the last year in particular, GPUs are set for another tsunami of use cases for server workloads in high performance computing and most recently, machine learning.

As GPU maker Nvidia’s CEO stressed at this year’s GPU Technology Conference, deep learning is a target market, fed in part by a new range of their GPUs for training and executing deep neural networks, including the Tesla M40, M4, the existing supercomputing-focused K80, and now, the P100 (Nvidia’s latest Pascal processor, which is at the heart of a new appliance specifically designed for deep learning workloads).

While

IBM Extends GPU Cloud Capabilities, Targets Machine Learning was written by Nicole Hemsoth at The Next Platform.

Advancing Enterprise Networking & Security With SDN

In this video interview from Interop las Vegas, Dom Delfino, Vice President of Worldwide Sales and Systems Engineering at VMworld, discusses the value proposition for software-defined networking.

Learn why enteprises are seeking out SDN to help keep pace with the dynamic, distributed nature of today's enterprise networks and how SDN can align security policies and help fill the gap that currently exists between information security and infrastructure security.

How to select ERP for the services industries

Most ERP software was built first for manufacturers. But the services industries (including architecture, engineering, legal and advertising) have a different set of ERP needs, according to a buyer's guide prepared by Technology Evaluation Centers (TEC).To read this article in full or to leave a comment, please click here(Insider Story)

Google I/O 2016: In pictures

Welcome to Google summer camp!Google’s annual I/O developer conference and general “give us this news cycle” event usually takes place in downtown San Francisco, but the company has opted for its own back yard this time around. Enjoy this collection of the woodsy sights of Google I/O 2016.RELATED: Follow all the stories coming out of Google I/O 2016To read this article in full or to leave a comment, please click here

Google I/O 2016: Google’s biggest announcements

The biggest announcements from Google I/O 2016Wednesday marked the beginning of Google I/O, the search giant’s annual developer’s conference where we get a sneak peek at everything the company has been working on over the past few months.Per usual, a number wide-ranging and intriguing announcements were made during the Google I/O keynote, an event that included both compelling hardware and software developments.To read this article in full or to leave a comment, please click here

Cloud security: A mismatch for existing security processes and technology

To use a long-forgotten metaphor, cloud deployment is moving forward at internet speed at many enterprise organizations. According to ESG research, 57 percent of enterprise organizations use public and private cloud infrastructure to support product applications/workloads today, and an overwhelming majority of organizations will move an increasing number of applications/workloads to cloud infrastructure over the next 24 months (note: I am an ESG employee).Now, no one would argue the fact that cloud computing represents a different compute model, but it is really based upon the use of server virtualization for the most part. And since a VM is meant to emulate a physical server, many organizations approach cloud security by pointing traditional security processes and technologies at cloud-based workloads.To read this article in full or to leave a comment, please click here

Cloud security: A mismatch for existing security processes and technology

To use a long-forgotten metaphor, cloud deployment is moving forward at internet speed at many enterprise organizations. According to ESG research, 57 percent of enterprise organizations use public and private cloud infrastructure to support product applications/workloads today, and an overwhelming majority of organizations will move an increasing number of applications/workloads to cloud infrastructure over the next 24 months (note: I am an ESG employee).Now, no one would argue the fact that cloud computing represents a different compute model, but it is really based upon the use of server virtualization for the most part. And since a VM is meant to emulate a physical server, many organizations approach cloud security by pointing traditional security processes and technologies at cloud-based workloads.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Information-centric networking could fix these internet problems

Information-centric networking (ICN) ticks many of the requirements boxes for 5G, driven by the proliferation of software-defined networking (SDN) and network function virtualization (NFV). But what are those issues that ICN improves over the current internet? And how does it do it?Today’s internet has seen significant changes. With forecasts for 2020 predicting 50 billion IoT devices, the scale of connectivity is ever increasing with nearly every computing device today providing some form of connectivity option.This will have a tremendous impact on the size of IP routing tables. This is not a problem in your typical home router on the edge of the internet. But as you move up to the core (into the so called Default Free Zone), the nodes in this part of the network literally need to store the whole internet in their routing tables. This is driving up memory costs in each IP router, as well as increasing processing complexity and power consumption. Even in SDN-enabled environments, this trend can be observed through increasing flow matching tables (growing similarly as the IP routing tables in the traditional internet), leading to an arms’ race between vendors for ever larger and costly table memory.To read this Continue reading

Cisco says network spending still hampered by economic jitters

Economic uncertainty is still putting a damper on some network spending, and that won't change in the next few months, Cisco Systems said Wednesday.The dominant networking vendor reported slightly higher sales for the three months ended April 30 but said enterprises remained cautious about replacing LANs that still work. That continues a trend the company identified in February, the last time it posted financial results.MORE ON NETWORK WORLD: 15 more useful Cisco sites At that time, Cisco cited January's stock-market fluctuations. Stocks have regained ground since then, but orders for campus network gear haven’t rebounded, CEO Chuck Robbins said Wednesday. Overall switching revenue was down 3 percent in the quarter.To read this article in full or to leave a comment, please click here

Cisco says network spending still hampered by economic jitters

Economic uncertainty is still putting a damper on some network spending, and that won't change in the next few months, Cisco Systems said Wednesday.The dominant networking vendor reported slightly higher sales for the three months ended April 30 but said enterprises remained cautious about replacing LANs that still work. That continues a trend the company identified in February, the last time it posted financial results.MORE ON NETWORK WORLD: 15 more useful Cisco sites At that time, Cisco cited January's stock-market fluctuations. Stocks have regained ground since then, but orders for campus network gear haven’t rebounded, CEO Chuck Robbins said Wednesday. Overall switching revenue was down 3 percent in the quarter.To read this article in full or to leave a comment, please click here

Beyond Jenkins: 7 devops tools

The need for speed in the software development cycle has given rise to a number of valuable automation tools for developers. Chief among these tools are those aimed at facilitating the continuous integration and continuous delivery of software projects. Through these CI/CD tools, development teams can keep software up-to-date and quickly put it into production.Jenkins is among the best-known CI/CD systems, and it is fast becoming the engine for devops, managing the dev side. A key benefit of Jenkins is the wealth of plug-ins developed for it, providing capabilities that range from extending the number of version control systems Jenkins supports to accommodations for IBM mainframes. Spun out of the Hudson project first launched by Sun Microsystems, Jenkins recently hit Version 2, with improvements to its usability and security.To read this article in full or to leave a comment, please click here

How to monitor, measure, and manage your broadband consumption

Forget that bass; in the digital world, it’s all about that bandwidth. You’re paying your ISP for a given amount of bandwidth, but it’s up to you to manage how it’s consumed. Whether or not you have a data cap—and even if your data cap is high enough that you never bang into it—simply letting all the devices on your network engage in a battle for supremacy is a recipe for problems.You could experience poor video streaming, choppy VoIP calls, or debilitating lag in your online gaming sessions. And if you do have a data cap (and yes, they are evil), blowing through it can hit you in the pocketbook, expose you to throttling (where your ISP drastically, if temporarily, reduces your connection speed), or both.To read this article in full or to leave a comment, please click here

How to monitor, measure, and manage your broadband consumption

Forget that bass; in the digital world, it’s all about that bandwidth. You’re paying your ISP for a given amount of bandwidth, but it’s up to you to manage how it’s consumed. Whether or not you have a data cap—and even if your data cap is high enough that you never bang into it—simply letting all the devices on your network engage in a battle for supremacy is a recipe for problems.You could experience poor video streaming, choppy VoIP calls, or debilitating lag in your online gaming sessions. And if you do have a data cap (and yes, they are evil), blowing through it can hit you in the pocketbook, expose you to throttling (where your ISP drastically, if temporarily, reduces your connection speed), or both.To read this article in full or to leave a comment, please click here

Google dives into the future with a focus on A.I.

MOUNTAIN VIEW, Calif. -- With much of what Google announced during the first day of its I/O developer conference focused on helping users answer questions before they even think of them, artificial intelligence is proving critical for the company's strategy. "Google is betting the farm on artificial intelligence (A.I.) and they need to because Microsoft and Facebook aren't too far behind," said Patrick Moorhead, an analyst with Moor Insights & Strategy. "A.I. will determine the next-generation experience with all electronics. It essentially predicts what users want before they know they do. A.I. is the next big frontier, and Google has always been a pioneer in A.I."To read this article in full or to leave a comment, please click here