Intel declares independence from the PC

The message has trickled down in speeches, earnings calls, and analyst presentations, but on Tuesday, Intel chief executive Brian Krzanich drew a line in the sand: Intel is not a PC company any more. In what only can be called a manifesto of Intel’s new values, Krzanich described how Intel is transforming itself “from a PC company to a company that powers the cloud and billions of smart, connected computing devices.” To drive the point home, Krzanich noted that the PC is just one among many connected devices.What might be called the “new” Intel will be built upon five pillars, Krzanich said:To read this article in full or to leave a comment, please click here

FBI isn’t code savvy enough to explain iPhone hack to Apple

The FBI claims that being forced to share its iPhone-hacking tool with Apple wouldn’t be worth it–because the government agency doesn’t actually know how it works. This week, the FBI will notify the White House that it doesn’t actually know the underlying code that facilitated hacking into the iPhone belonging to one of the San Bernardino shooters. Because of this, the FBI claims that it doesn’t make sense to launch an internal government investigation to decide whether to share the information with Apple.To read this article in full or to leave a comment, please click here

FBI isn’t code savvy enough to explain iPhone hack to Apple

The FBI claims that being forced to share its iPhone-hacking tool with Apple wouldn’t be worth it–because the government agency doesn’t actually know how it works.This week, the FBI will notify the White House that it doesn’t actually know the underlying code that facilitated hacking into the iPhone belonging to one of the San Bernardino shooters. Because of this, the FBI claims that it doesn’t make sense to launch an internal government investigation to decide whether to share the information with Apple.To read this article in full or to leave a comment, please click here

4 password managers that make online security effortless

There’s a reason “123456” remains the most popular password. We tend to use passwords we can easily recall. And that means they’re easy to hack.A good password manager is the best way to relieve the burden of memorizing complex logins and keep your data secure. These tools encrypt your login info in a virtual vault—either locally or in the cloud—and lock it with a single master password.Considering that the security of sensitive data is at stake, you shouldn’t take choosing a password manager lightly. This guide will tell you what features to look for in a password manager and compare four of the best.To read this article in full or to leave a comment, please click here

4 password managers that make online security effortless

There’s a reason “123456” remains the most popular password. We tend to use passwords we can easily recall. And that means they’re easy to hack.A good password manager is the best way to relieve the burden of memorizing complex logins and keep your data secure. These tools encrypt your login info in a virtual vault—either locally or in the cloud—and lock it with a single master password.Considering that the security of sensitive data is at stake, you shouldn’t take choosing a password manager lightly. This guide will tell you what features to look for in a password manager and compare four of the best.To read this article in full or to leave a comment, please click here

Ubuntu 16.04: A desktop for Linux diehards

Every two years a release of Ubuntu is designated Long-Term Support (LTS). Ubuntu 16.04, code-named Xenial Xerus, is the latest in that line. LTS releases are supported for five years instead of the usual nine months, but they also have less obvious implications. LTS releases are usually geared toward the enterprise, which means they generally include fewer new features and more testing. Both qualities are attractive to risk-averse companies running production software on Ubuntu servers, but provide comparatively little to the desktop user.Installation and setupTo read this article in full or to leave a comment, please click here(Insider Story)

10 essential pen-friendly Windows apps

Get your pen readyForget about limiting yourself to typing and touchpads alone. Microsoft’s Surface Pro 4 and Surface Book, as well as the legion of touch-enabled Windows laptops now available, are built to do far more than your standard run-of-the-mill notebooks. Whether it’s sketching out illustrations, signing documents on the fly, or jotting down quick notes, embracing the Surface Pen and Windows 10’s deep-rooted inking features truly opens another door to enhanced productivity. To read this article in full or to leave a comment, please click here

First look: Microsoft’s Windows 10 Anniversary Update preview

The first big update to Windows 10 will come this summer, a year after the operating system's initial launch, with the release of what Microsoft is calling the Windows 10 Anniversary Update.The update's exact release date hasn't been set yet. Windows 10 was officially released on July 29, 2015 -- but that doesn't mean that the Anniversary Update will hit on the exact date.To read this article in full or to leave a comment, please click here

How to keep your small business safe from data breaches and hacks

Cybersecurity – and security breaches – continues to be a hot topic. And small ecommerce businesses, especially ones using an open source platform, are particularly susceptible to hacks and breaches. So what can small ecommerce shops do to protect their sites as well as any sensitive (customer) data? Following are 10 suggestions from ecommerce security experts. [Related: 5 tips for defending against advanced persistent threats ] 1. Educate employees. “Cyberattacks are becoming more and more sophisticated and it's easy to be fooled by emails, links and attachments that look like everyday business requests,” says Norman Guadagno, chief evangelist, Carbonite. “It only takes one click for malware, viruses and ransomware to in infiltrate your system, compromising important business data.”To read this article in full or to leave a comment, please click here

How to keep your small business safe from data breaches and hacks

Cybersecurity – and security breaches – continues to be a hot topic. And small ecommerce businesses, especially ones using an open source platform, are particularly susceptible to hacks and breaches. So what can small ecommerce shops do to protect their sites as well as any sensitive (customer) data? Following are 10 suggestions from ecommerce security experts.[Related: 5 tips for defending against advanced persistent threats ]1. Educate employees. “Cyberattacks are becoming more and more sophisticated and it's easy to be fooled by emails, links and attachments that look like everyday business requests,” says Norman Guadagno, chief evangelist, Carbonite. “It only takes one click for malware, viruses and ransomware to in infiltrate your system, compromising important business data.”To read this article in full or to leave a comment, please click here

Why Tim Cook is still optimistic after Apple’s growth stalled

So, that was quite a quarter Apple had–and not in a good way. But just after the raw financial results, Apple gets a chance to tell its story, to add “more color” to the proceedings, in an hourlong conference call with financial analysts. Here are the highlights from this quarter’s party line with Apple CEO Tim Cook and CFO Luca Maestri.Tim Cook: Cockeyed optimist If I had to describe Tim Cook’s attitude during the call, it would be “optimistic.” But only because he referred to his optimism eight different times over the span of an hour. (Maestri added another three on his own.) Then again, when your company just broke a 13-year streak of year-over-year revenue growth, expressing your optimism about the future is probably a smart move.To read this article in full or to leave a comment, please click here

Has public Wi-Fi outlived its usefulness?

Over the last few years, public restaurants, coffee shops and other places people gather have added the luxury feature of free Wi-Fi. This has turned many a Starbucks into an unofficial office for workers and college students alike who might otherwise not have Internet access. These days, though, that luxury is becoming more and more useless. Many access points installed in a Starbucks, Subway, McDonald's or perhaps public library haven't been updated and are still offering 802.11g performance. Put a dozen users on them and you're back in the days of a 1200 baud modem, if you get anything at all. To read this article in full or to leave a comment, please click here

IDG Contributor Network: One to watch: GE and Pivotal invest in SnappyData

Investments happen all the time. And usually a modest(!) sub $4 million series A round wouldn't raise much attention. After all, Silicon Valley is built on a high cadence of startup founding, investments and eventual exit out the other end (be it successful or otherwise).But this one is interesting in part because of those investing in the company, and also because of who is involved in the founding of this particular startup.SnappyData is building an in-memory transactional analytics database that is built on top of the Apache Spark open-source initiative. Nothing too exciting there, right? Well, an added twist is that the SnappyData leadership team—Richard Lamb, Jags Ramnarayanan and Sudhir Menon—previously built GemFire into one of most widely adopted in-memory data grid products in the market. Oh, and that little company, GemFire, was eventually acquired by VMware. And for those unaccustomed to the slight incestuousness that occurs in the technology industry, VMware went on to create, and eventually spin out, the Pivotal organization, headline investors today in SnappyData.To read this article in full or to leave a comment, please click here

Telcos Dial Up OpenStack And Mainstream It

OpenStack was born at the nexus of high performance computing at NASA and the cloud at Rackspace Hosting, but it might be the phone companies of the world that help it go mainstream.

It is safe to say that most of us probably think that our data plans and voice services for our mobile phones are way too expensive, and as it turns out, that is exactly how our mobile phone operators feel about the racks and rows and datacenters that they have full of essentially proprietary network equipment that comprises their wired and wireless networks. And so, all of

Telcos Dial Up OpenStack And Mainstream It was written by Timothy Prickett Morgan at The Next Platform.

MPLS Design Question

MPLS Design Question – MPLS is one of the most commonly used encapsulation method today. Especially on Wide Area Networks of the Service Providers, Large Enterprises and some datacenters. Service Providers sell MPLS services to customers for decades. When customers want to have Service Provider redundancy so two MPLS circuit from different Service Providers, Inter AS […]

The post MPLS Design Question appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

OpenStack users talk benefits, challenges of open source clouds

A couple of years ago tech executives at FICO wanted to update their infrastructure. “OpenStack seems to be the wave of the future, so we gave it a run,” says Donald Talton, senior manager of platform operations and cloud engineering at the credit rating agency. SolidFire Donald Talton FICO considered using VMware, but felt that the “momentum” of OpenStack was stronger, Talton says. And so began FICO’s use of OpenStack’s IaaS open source private cloud software. Talton says it’s been great, though that doesn’t mean it’s been easy.To read this article in full or to leave a comment, please click here

IBM lines up all-flash storage to help power cognitive computing

IBM is expanding its flash storage lineup to power cloud data centers that carry out so-called cognitive computing.The company’s newest FlashSystem arrays, introduced Wednesday, combine its fast and relatively affordable FlashCore technology with a scale-out architecture designed to be easy to expand.Cognitive computing, which IBM defines as real-time data analysis for immediate, automated decision-making, is at the heart of much of IBM’s current technology push for enterprises and service providers. Its Watson technology is the star of the show but only the most visible part of what the company is doing in this space. An example of cognitive computing is a mobile operator analyzing information about phone call quality to make decisions on the fly about changes in the network, said Andy Walls, an IBM Fellow and CTO for flash systems.To read this article in full or to leave a comment, please click here

Apple stumbles in the world’s biggest smartphone market

Last year, Apple was on a gravy train in China. Sales of the iPhone were booming, and the country looked poised to overtake the U.S. in its contribution to Apple’s business. Suddenly, things don't look so rosy.Apple reported Tuesday that its first quarter revenue from Greater China declined 26 percent from the same period in 2015, a turnaround that contributed to Apple's first year-over-year revenue decline in more than a decade.To read this article in full or to leave a comment, please click here