IoT and data privacy

This week on January 28 we will celebrate Data Privacy Day, which has a theme of "Respecting Privacy, Safeguarding Data and Enabling Trust." We'll get back to that... First Response Qualcomm reportedly partnered with First Response to develop "the world's first smart pregnancy test, which connects through a mobile device to alert clinicians a patient is pregnant." It's just the first such home test to "capture electronically" and "then transmit that data to the clinicians," Chief Medical Officer Dr. James Mault told CRNtv. He added that for IoT to do well in medical verticals, it will "require connectivity infrastructure that can enable the data capture from a variety of devices and diagnostics and therapeutic instruments and allow that data to flow into the hands of clinicians of any type."To read this article in full or to leave a comment, please click here

Arista Countersues Cisco, Claiming Antitrust Violations

Two days before a ruling in a patent infringement case between the companies, Arista Networks is suing Cisco Systems for what it alleges are antitrust violations. Arista today filed a counterclaim to Cisco’s 13-month-old copyright infringement suit in the U.S. District Court, Northern District of California, for antitrust and unfair competition. Arista alleges Cisco conducts a “bait and switch” with its command line interface in which it claims it is an industry standard and then attempts to penalize competitors for emulating it.To read this article in full or to leave a comment, please click here

Arista Countersues Cisco, Claiming Antitrust Violations

Two days before a ruling in a patent infringement case between the companies, Arista Networks is suing Cisco Systems for what it alleges are antitrust violations. Arista today filed a counterclaim to Cisco’s 13-month-old copyright infringement suit in the U.S. District Court, Northern District of California, for antitrust and unfair competition. Arista alleges Cisco conducts a “bait and switch” with its command line interface in which it claims it is an industry standard and then attempts to penalize competitors for emulating it.To read this article in full or to leave a comment, please click here

Arista countersues Cisco for Antitrust

Two days before a ruling in a patent infringement case between the companies, Arista Networks is suing Cisco Systems for what it alleges are antitrust violations.Arista today filed a counterclaim to Cisco’s 13-month-old copyright infringement suit in the U.S. District Court, Northern District of California, for antitrust and unfair competition. Arista alleges Cisco conducts a “bait and switch” with its command line interface in which it claims it is an industry standard and then attempts to penalize competitors for emulating it.To read this article in full or to leave a comment, please click here

Arista countersues Cisco for Antitrust

Two days before a ruling in a patent infringement case between the companies, Arista Networks is suing Cisco Systems for what it alleges are antitrust violations.Arista today filed a counterclaim to Cisco’s 13-month-old copyright infringement suit in the U.S. District Court, Northern District of California, for antitrust and unfair competition. Arista alleges Cisco conducts a “bait and switch” with its command line interface in which it claims it is an industry standard and then attempts to penalize competitors for emulating it.To read this article in full or to leave a comment, please click here

Ta-ta to passwords and PINs; faces and fingerprints to rule the future

Facial and fingerprint recognition technologies are expected to see accelerated growth over the next five years as security applications emerge in the government, enterprise, finance, consumer and other markets.The market value of facial recognition technologies is expected to nearly double from $230 million in 2015 to $450 million in 2019; that represents a compound annual growth rate (CAGR) of about 18%, according to market research firm TrendForce.Led by Apple's iPhone juggernaut, unit shipments of fingerprint sensors have grown from 316 million in 2014 to 499 million last year and will continue to increase each year to peak at 1.6 billion in 2020. Revenue growth for fingerprint sensors will increase from about $1.86 billion in 2015 to $2.6 billion in in 2020, according to the latest research from IHS Technology.To read this article in full or to leave a comment, please click here

How to determine if big data security analytics will produce useful outcomes

Although vendor-written, this contributed piece does not advocate a position that is particular to the author’s employer and has been edited and approved by Network World editors.

Big data is the hot buzzword in security analytics today, but buyers are skeptical because many companies have spent years building “data lakes” only to discover it was impossible to “drain the lake” to get something useful.

And unfortunately, today’s solutions often include expensive clusters coupled with static business intelligence reports and “sexy” dashboards that look good but add little to useful and productive security analytics. Focusing on the analytics and how to use the data (very valuable data) in order to make real time decisions, discover critical patterns, determine on-going and changing security policies and dramatically improve security – ah – that’s useful.

To read this article in full or to leave a comment, please click here

Samsung sued for not updating Android on older phones

The Dutch Consumers' Association (DCA), or Consumentenbond as it is known in its native land, is suing Samsung for not providing timely software updates to older models of its Android smartphones. The move was driven in part because Samsung has such a strong presence in Holland, and because Samsung is pretty bad about supporting old phones, as I've learned through personal experience.According to DCA's own research (PDF file), at least 82% of Samsung smartphones available in the Dutch market examined had not received any software updates to the latest version of Android in two years.To read this article in full or to leave a comment, please click here

Network Break 71: Network Startups Get Millions; Medical Device Insecurity

Network Break 71 covers new funding rounds for Big Switch Networks, Cumulus, and Plexxi, as well as Cisco's investment in SD-WAN startup VeloCloud. We also check in on product announcements from Dell and Arista Networks, and discuss potential security issues with medical devices.

The post Network Break 71: Network Startups Get Millions; Medical Device Insecurity appeared first on Packet Pushers.

Network Break 71: Network Startups Get Millions; Medical Device Insecurity

Network Break 71 covers new funding rounds for Big Switch Networks, Cumulus, and Plexxi, as well as Cisco's investment in SD-WAN startup VeloCloud. We also check in on product announcements from Dell and Arista Networks, and discuss potential security issues with medical devices.

The post Network Break 71: Network Startups Get Millions; Medical Device Insecurity appeared first on Packet Pushers.

Despite rhetoric, DoJ, NSA still seek backdoors

The U.S. took its encryption argument international last week, with Attorney General Loretta Lynch telling the World Economic forum that it doesn’t want to put security backdoors into encrypted communications, it just wants to vendors and service providers to decrypt when ordered to by a court.That ignores that facts that vendors and providers can’t decrypt unless there is a backdoor of some sort, and that any backdoor undermines the security and therefore the value of encryption.It’s a case of the Department of Justice – via Lynch and FBI Director James Comey – trying to steer clear, at least technically, of demanding backdoors, but it’s all a semantic game. Earlier, Comey stopped using the term backdoor and asked for front-door access to decryption instead. Backdoor had become too much of a flashpoint, even though a front-door is exactly the same as a backdoor from a technology standpoint.To read this article in full or to leave a comment, please click here

Talking NVMe, 3DXpoint and Networking

The IT Storage market is going through a lot of change. New silicon designs from Intel & Micron branded 3D Xpoint are impacting the short term future of the “all flash array” market. Intel has developed NVMe so that that speed of accessing this fancy new storage can be realised because the 30-year old SCSI/NFS/Fibrechannel protocols […]

The post Talking NVMe, 3DXpoint and Networking appeared first on EtherealMind.

Response: Doing No Harm

Ivan posted here: I’ll take ownership of the statement because at least it sounds like something I have discussed on the podcast and, sadly, because there aren’t that many networking podcasts. The comment is in relation to the purpose of a stateful firewall when compared to a stateless firewall aka access lists. I do think that […]

The post Response: Doing No Harm appeared first on EtherealMind.

Design of a Modern Cache

This is a guest post by Benjamin Manes, who did engineery things for Google and is now doing engineery things for a new load documentation startup, LoadDocs.

Caching is a common approach for improving performance, yet most implementations use strictly classical techniques. In this article we will explore the modern methods used by Caffeine, an open-source Java caching library, that yield high hit rates and excellent concurrency. These ideas can be translated to your favorite language and hopefully some readers will be inspired to do just that.

Eviction Policy

A cache’s eviction policy tries to predict which entries are most likely to be used again in the near future, thereby maximizing the hit ratio. The Least Recently Used (LRU) policy is perhaps the most popular due to its simplicity, good runtime performance, and a decent hit rate in common workloads. Its ability to predict the future is limited to the history of the entries residing in the cache, preferring to give the last access the highest priority by guessing that it is the most likely to be reused again soon...

6 analytics trends that will shape business in 2016

In its recently released Analytics Trends 2016 report, consulting firm Deloitte predicts six major trends will significantly shape business in 2016."Business leaders continue to face many varying challenges and opportunities, and staying ahead of these trends will have a lasting impact on how their organizations will operate in the future," says John Lucker, principal, Deloitte Consulting. "By going on the offensive with issues such as cybersecurity, organizations are making a strategic shift in the way they operate. Concurrently, the widening data scientist talent gap could be a business growth barrier. One thing is certain: effectively using analytics is essential in delivering insights that help achieve new levels of innovation and value."To read this article in full or to leave a comment, please click here

Planning for security breaches: What CIOs need to know to stay out of the hot seat

Foley & Lardner LLP Matthew Karlyn, Partner, Technology Transactions & Outsourcing Practice, Foley & Lardner LLP “I’ve been in meeting after meeting after meeting where companies like all of yours absolutely underestimate the impact of security breaches on the company,” Matthew Karlyn, Partner, Technology Transactions & Outsourcing Practice, Foley & Lardner LLP told attendees at the CIO Perspectives event in Houston in November 2015.To read this article in full or to leave a comment, please click here(Insider Story)

Why VCE customers should embrace, not fear, Dell’s merger with EMC

2015 was filled with many big technology acquisitions, the most notable of which was Dell dropping a whopping $67 billon for EMC. One of the most interesting questions that has been raised regarding the acquisition is what happens to the EMC Federation companies, most notably, VCE (disclosure: VMware is a client of ZK Research).VCE was founded as a joint venture between three market-leading vendors – VMware, Cisco, and EMC – to deliver a converged solution comprised of products from the three companies. In October of 2014, VCE announced it was acquiring controlling interest in the JV from Cisco (VMware was a minority shareholder).To read this article in full or to leave a comment, please click here