SDN AppFest headed to New Hampshire in May

ONF The non-profit Open Networking Foundation has announced that its annual software-defined networking (SDN) interoperability event, dubbed AppFest 2016, will be held in May in New Hampshire and will feature a Community Day intended to expand ONF's reach beyond members.The ONF, whose more than 130 members include big names like Brocade, Google and Microsoft, will put the focus on applications working together at AppFest 2016, which will be held at University of New Hampshire InterOperability Lab May 16-19. The UNH-IOL is an authorized testing lab for OpenFlow, the SDN standard that the ONF is best known for having introduced.To read this article in full or to leave a comment, please click here

SDN AppFest headed to New Hampshire in May

ONF The non-profit Open Networking Foundation has announced that its annual software-defined networking (SDN) interoperability event, dubbed AppFest 2016, will be held in May in New Hampshire and will feature a Community Day intended to expand ONF's reach beyond members.The ONF, whose more than 130 members include big names like Brocade, Google and Microsoft, will put the focus on applications working together at AppFest 2016, which will be held at University of New Hampshire InterOperability Lab May 16-19. The UNH-IOL is an authorized testing lab for OpenFlow, the SDN standard that the ONF is best known for having introduced.To read this article in full or to leave a comment, please click here

SDN AppFest headed to New Hampshire in May

ONF The non-profit Open Networking Foundation has announced that its annual software-defined networking (SDN) interoperability event, dubbed AppFest 2016, will be held in May in New Hampshire and will feature a Community Day intended to expand ONF's reach beyond members.The ONF, whose more than 130 members include big names like Brocade, Google and Microsoft, will put the focus on applications working together at AppFest 2016, which will be held at University of New Hampshire InterOperability Lab May 16-19. The UNH-IOL is an authorized testing lab for OpenFlow, the SDN standard that the ONF is best known for having introduced.To read this article in full or to leave a comment, please click here

The birth of IT: The IBM System/360 turns 52

IT can trace its roots back to arguably the most important computer introduction made 52 years ago today. April 7, 1964 was the day IBM introduced its System/360, the first true mainframe for the masses, or at least that’s what it hoped on that day.IBM said on that day that it announced the S/360 to over 100,000 people gathered in cities across the country.+More on Network World: The (mostly) cool history of the IBM mainframe+It told them: "System/360 represents a sharp departure from concepts of the past in designing and building computers. It is the product of an international effort in IBM's laboratories and plants and is the first time IBM has redesigned the basic internal architecture of its computers in a decade. The result will be more computer productivity at lower cost than ever before. This is the beginning of a new generation - - not only of computers - - but of their application in business, science and government."To read this article in full or to leave a comment, please click here

The birth of IT: The IBM System/360 turns 52

IT can trace its roots back to arguably the most important computer introduction made 52 years ago today. April 7, 1964 was the day IBM introduced its System/360, the first true mainframe for the masses, or at least that’s what it hoped on that day.IBM said on that day that it announced the S/360 to over 100,000 people gathered in cities across the country.+More on Network World: The (mostly) cool history of the IBM mainframe+It told them: "System/360 represents a sharp departure from concepts of the past in designing and building computers. It is the product of an international effort in IBM's laboratories and plants and is the first time IBM has redesigned the basic internal architecture of its computers in a decade. The result will be more computer productivity at lower cost than ever before. This is the beginning of a new generation - - not only of computers - - but of their application in business, science and government."To read this article in full or to leave a comment, please click here

The birth of IT: The IBM System/360 turns 52

IT can trace its roots back to arguably the most important computer introduction made 52 years ago today. April 7, 1964 was the day IBM introduced its System/360, the first true mainframe for the masses, or at least that’s what it hoped on that day.IBM said on that day that it announced the S/360 to over 100,000 people gathered in cities across the country.+More on Network World: The (mostly) cool history of the IBM mainframe+It told them: "System/360 represents a sharp departure from concepts of the past in designing and building computers. It is the product of an international effort in IBM's laboratories and plants and is the first time IBM has redesigned the basic internal architecture of its computers in a decade. The result will be more computer productivity at lower cost than ever before. This is the beginning of a new generation - - not only of computers - - but of their application in business, science and government."To read this article in full or to leave a comment, please click here

IBM Unfolds Power Chip Roadmap Out Past 2020

There are two things that underdogs have to do to take a big bite out of a market. First, they have to tell prospective customers precisely what the plan is to develop future products, and then they have to deliver on that roadmap. The OpenPower collective behind the Power chip developed did the first thing at its eponymous summit in San Jose this week, and now it is up to the OpenPower partners to do the hard work of finishing the second.

Getting a chip as complex as a server processor into the field, along with its chipsets and memory

IBM Unfolds Power Chip Roadmap Out Past 2020 was written by Timothy Prickett Morgan at The Next Platform.

CI/CD with Docker Cloud

So you want to innovate faster, right? Continuous integration and continuous deployment (CI/CD) are some of the most common, but impactful use cases for teams who are looking to Dockerize their environment. The key to CI/CD is being able to … Continued

Tesla Model 3 reservations tops 325,000

Even the most optimistic of Tesla enthusiasts couldn't have predicted how high demand for the Tesla Model 3 would turn out to be. In what would clearly be a sign of things to come, Elon Musk, when unveiling the Model 3 last week, said that more than 115,000 people had already plunked down $1,000 to reserve a car they hadn't yet even seen.In the days that followed, Musk would periodically take to Twitter to provide reservation updates. First the reservation tally hit 200,000, then 276,000, all with no signs of a slow down. Yesterday, Musk said he would provide an up-to-date reservation count sometime today. That said, Tesla earlier today put out a blog post boasting that reservations for the Model 3 have already topped 325,000.To read this article in full or to leave a comment, please click here

Up to 84% off Dragon NaturallySpeaking Today Only – Deal Alert

Today only, Amazon is offering Dragon NaturallySpeaking software at discounts of up to 84%.  Dragon NaturallySpeaking is the world's best-selling speech recognition software. Dictate and edit documents, send email, search the Web and use social media with unparalleled speed, ease and comfort. Dragon literally gets smarter as you use it, picking up on the words, names and phrases you use the most to convert your voice into text and commands with up to 99% accuracy.To read this article in full or to leave a comment, please click here

White House won’t support encryption unlocking legislation

President Barack Obama's administration won't support legislation to force device makers to help law enforcement agencies defeat encryption, according to a news report. Two senior members of the Senate Intelligence Committee have been floating draft legislation to require device makers and other tech companies to provide workarounds for encryption and other security features, but the White House won't offer public support for the proposal, according to a report from Reuters. FBI Director James Comey has long pushed for encryption workarounds, and just last month, Obama called for tech companies and the government to work together to allow police access to suspects' smartphones protected by encryption.To read this article in full or to leave a comment, please click here

Cloud Security Challenges

Large organizations are embracing public and private cloud computing at a rapid pace. According to ESG research, one-third of organizations have been using public and private cloud infrastructure for more than three years, and more than half of organizations (57%) have production workloads running on cloud computing infrastructure (note: I am an ESG employee).Of course, cloud computing is very different than physical or virtual servers, which translates into a different cybersecurity model as well. And these differences lead to a variety of security challenges. ESG recently surveyed 303 cybersecurity and IT professionals working at enterprise organizations (i.e. more than 1,000 employees) and posed a series of questions about cloud computing and cloud security. When asked to identify their top challenges with cloud security:To read this article in full or to leave a comment, please click here

Cloud Security Challenges

Large organizations are embracing public and private cloud computing at a rapid pace.  According to ESG research, one-third of organizations have been using public and private cloud infrastructure for more than 3 years and more than half of organizations (57%) have production workloads running on cloud computing infrastructure (note: I am an ESG employee).Of course, cloud computing is very different than physical or virtual servers which translates into a different cybersecurity model as well.  And these differences lead to a variety of security challenges. ESG recently surveyed 303 cybersecurity and IT professionals working at enterprise organizations (i.e. more than 1,000 employees) and posed a series of questions about cloud computing and cloud security.  When asked to identify their top challenges with cloud security:To read this article in full or to leave a comment, please click here

White House won’t support encryption unlocking legislation

President Barack Obama's administration won't support legislation to force device makers to help law enforcement agencies defeat encryption, according to a news report. Two senior members of the Senate Intelligence Committee have been floating draft legislation to require device makers and other tech companies to provide workarounds for encryption and other security features, but the White House won't offer public support for the proposal, according to a report from Reuters. FBI Director James Comey has long pushed for encryption workarounds, and just last month, Obama called for tech companies and the government to work together to allow police access to suspects' smartphones protected by encryption.To read this article in full or to leave a comment, please click here

IBM Watson CTO on What’s Ahead for Cognitive Computing

After close to twenty years at IBM, where he began as an IBM Fellow and Chief Architect for the SOA Foundation, Rob High has developed a number of core technologies that back Big Blue’s enterprise systems, including the suite of tools behind IBM WebSphere, and more recently, those that support the wide-ranging ambitions of the Watson cognitive computing platform.

Although High gave the second day keynote this afternoon at the GPU Technology Conference, there was no mention of accelerated computing. Interestingly, while the talk was about software, specifically the machine learning behind Watson, there was also very little about the

IBM Watson CTO on What’s Ahead for Cognitive Computing was written by Nicole Hemsoth at The Next Platform.

UPDATE: UL responds to blogger’s criticism

UPDATE: Underwriters Laboratory has requested comments, which are appended at the bottom.Today, Underwriters Laboratory announced the UL CyberSecurity Assurance Program. I won’t call it an oxymoron, but I’m deeply worried about it. While I have faith in UL, I’m not sure if they realize the breadth and depth of what they’re getting into.UL is the reason there are only small holes in appliances and CE gear. Why? So an average toddler can’t stick something inside and become electrocuted. UL helps product vendors have liability insurance within sane ranges. They promulgate standards that vendors are responsible to adhere to for insurance sake. Test labs do the rest, ensuring that First Article Samples (and then, perhaps subsequent production samples) of products adhere to a bevy of standards—all designed to make products safer but at least insurable.To read this article in full or to leave a comment, please click here

Your car’s computers might soon get malware protection

Modern cars contain tens of specialized computers that control everything from infotainment functions to steering and brakes. The pressing need to protect these computers from hackers will likely open up a new market for car-related software security products.Karamba Security, a start-up based in Ann Arbor, Michigan, is one of the companies that has stepped up to answer this demand. The company's anti-malware technology, unveiled Thursday, is designed to protect externally accessible electronic control units (ECUs) found in connected cars.These controllers, like those that handle handle telematics, infotainment and on-board diagnostics, can be accessed via Wi-Fi, Bluetooth or even the Internet, so they can serve as entry points for hackers into a car's network.To read this article in full or to leave a comment, please click here

Your car’s computers might soon get malware protection

Modern cars contain tens of specialized computers that control everything from infotainment functions to steering and brakes. The pressing need to protect these computers from hackers will likely open up a new market for car-related software security products.Karamba Security, a start-up based in Ann Arbor, Michigan, is one of the companies that has stepped up to answer this demand. The company's anti-malware technology, unveiled Thursday, is designed to protect externally accessible electronic control units (ECUs) found in connected cars.These controllers, like those that handle handle telematics, infotainment and on-board diagnostics, can be accessed via Wi-Fi, Bluetooth or even the Internet, so they can serve as entry points for hackers into a car's network.To read this article in full or to leave a comment, please click here