Cisco’s IoE keeps abreast of cancer

The Internet of Things/Everything can serve as a potentially lifesaving tool. Sensor-based wearable technology can monitor bodily vitals to determine if any health risks are imminent.Cisco and customer Cyrcadia Health are involved in the development of what it calls an iTBra to monitor a woman’s body temperature to determine if she is at risk for breast cancer. The iTBra is a personal screening tool intended as an intelligent monthly breast health monitor.The iTBra is made up of patches placed under a normal bra that collect up to 12 hours of normal and abnormal cellular activity associated with breast cancer. The iTBra bra is designed to take tissue density, a gating factor in the accuracy of mammography screening, out of the detection equation.To read this article in full or to leave a comment, please click here

Tutorial for creating first external SDN application for HP SDN VAN controller – Part 1/3: LAB creation and REST API introduction

For best article visual quality, open Tutorial for creating first external SDN application for HP SDN VAN controller – Part 1/3: LAB creation and REST API introduction directly at NetworkGeekStuff.

In this tutorial series, I will show you by example, how to build your first external REST API based SDN application for HP SDN VAN controller, with web interface for the user control. Target will be to learn how to use REST API, curl and perl scripting to generate some basic and useful code to view and also manipulate network traffic.

This article is part of “Tutorial for creating first external SDN application for HP SDN VAN controller” series consisting these articles:

In this Part 1/3, we will discuss creation of a quick development lab with HP SDN VAN controller and Mininet network and explore the REST API interface quickly.

Internal vs External SDN applications

The difference is this, external applications do not need to run inside the SDN controller itself and can rely on REST API commands transferred over network from Continue reading

IDG Contributor Network: Connected cars will overload mobile networks, report says

If you think stop-and-go city traffic can be bad around rush hour, just wait until connected cars get in on the act and start bringing mobile networks to a standstill too. There isn't enough capacity, a new report says.Market intelligence strategist Machina Research paints a gloomy connectivity picture of excessive growth from M2M, which includes connected cars.Growth in that area threatens to disrupt all mobile data traffic.Parking lot UK-based Machina Research analyzes Internet of Things (IoT), M2M and Big Data. Its report says that mobile data will double in certain cells at rush hour. The report predicts a 97% increase over 10 years. The big driver will be cars.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Connected cars will overload mobile networks, report says

If you think stop-and-go city traffic can be bad around rush hour, just wait until connected cars get in on the act and start bringing mobile networks to a standstill too. There isn't enough capacity, a new report says.Market intelligence strategist Machina Research paints a gloomy connectivity picture of excessive growth from M2M, which includes connected cars.Growth in that area threatens to disrupt all mobile data traffic.Parking lot UK-based Machina Research analyzes Internet of Things (IoT), M2M and Big Data. Its report says that mobile data will double in certain cells at rush hour. The report predicts a 97% increase over 10 years. The big driver will be cars.To read this article in full or to leave a comment, please click here

Adblock browsers for Android and iOS to keep mobile ads, tracking at bay

By building browsers with integrated ad blocking, German company Eyeo hopes to attract more users. A beta version of the Android browser is now available for download from the Play store.There are several reasons people choose to block ads: They can cause pages to load slower, consume data plans, and shorten battery life, according to Eyeo. The company also contends users are safer since malware often hides behind ads.The Adblock Browser for Android is based on Firefox and Adblock Plus. The functionality is the same as when using the existing Adblock Plus add-on.The reason for developing browsers with ad blocking baked in is that the add-on hasn’t attracted many users. By integrating the functionality, it becomes easier for non-tech savvy users to benefit from it, according to Ben Williams, communications and operations manager at Eyeo.To read this article in full or to leave a comment, please click here

iPexpert’s Newest “CCIE Wall of Fame” Additions 5/22/2015

Please join us in congratulating the following iPexpert students who have passed their CCIE lab!

This Week’s CCIE Success Stories

  • Alan Arruda, CCIE #48677 (Data Center)
  • Matthew Nowlin, CCIE #48875 (Routing and Switching)
  • Daniel Cleary, CCIE #47503 (Routing and Switching)
  • Nik Kale, CCIE #46112 (Security)

We Want to Hear From You!

Have you passed your CCIE lab exam and used any of iPexpert’s self-study products, or attended a CCIE Bootcamp? If so, we’d like to add you to our CCIE Wall of Fame!

Torque G02 smartphone doesn’t mind a saltwater dunk

Many smartphones can stand up to a splash or a dip in fresh water, but they don’t go too well in seawater due to the corrosive salt.Now electronics maker Kyocera has launched an Android smartphone in Japan that’s at home in shallow seas, allowing users to surf, selfie and text at the same time.The Torque G02 is a ruggedized outdoor phone that can be dunked in seawater to a depth of 1.5 meters for 30 minutes. In Kyocera’s tests, it also withstood the weight of a 100 kilogram load spread evenly across its surface.To read this article in full or to leave a comment, please click here

Worth Reading — 0522

It’s Friday, which means it’s time to talk about some stuff around the ‘web that’s worth reading.

If you’ve not been asleep this week (most people seem to be, given the rate at which my emails are being answered!), then you’ve probably heard about logjam — a man in the middle attack against IKE and other DHE cypher suites. If you haven’t this is a really short (and cryptic) explanation of the attack, and how to mitigate it.

Bufferbloat has been in the news recently, with speedtest and other tools building in the ability to measure bufferbloat in DSL and cable connections. Buffers have always been a topic of hot discussion in the networking world — in fact, buffer size came up just this last week while in discussions in building an Ericsson reference design for data center fabric underlays. The point always comes down to this — can’t you just do better QoS and larger buffers, and skip all the 1:1 subscription rates? The answer I always give is a resounding NO!, but it’s hard to explain why without getting into an explanation of buffer bloat, and it’s effects on jitter (the often ignored step child of Continue reading

6 things almost every viral Kickstarter has in common

For many entrepreneurs, crowdfunding is a mystery. Celebrity music videos can flop, while simple, silly ideas can go viral overnight. Some campaigns are all about grassroots fundraising, while others can succeed on the strength of one or two wealthy backers.MORE ON NETWORK WORLD: The most magnificent high-tech flying machines On closer inspection, however, there are a few signals in the noise. We looked at the thousand most successful Kickstarter projects ever based on percent funded—campaigns that raised more than 15 times as much money as they asked for—then compared those numbers to every Kickstarter campaign in history, over 220,000 in all.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Friday, May 22

Connected cars will add to mobile traffic jamsExpect mobile networks to struggle as they are called on to handle a rapidly increasing number of connected cars. Traffic growth from M2M (machine to machine) connections, particularly from cars, will cause headaches for mobile operators, says Machina Research. Car connections are expected to surpass 500 million in 2019 and then 1 billion in 2023, when they will account for more than half of all M2M connections over cellular networks. And they’ll use lots of data, thanks to connected entertainment and navigation systems.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Friday, May 22

Connected cars will add to mobile traffic jamsExpect mobile networks to struggle as they are called on to handle a rapidly increasing number of connected cars. Traffic growth from M2M (machine to machine) connections, particularly from cars, will cause headaches for mobile operators, says Machina Research. Car connections are expected to surpass 500 million in 2019 and then 1 billion in 2023, when they will account for more than half of all M2M connections over cellular networks. And they’ll use lots of data, thanks to connected entertainment and navigation systems.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Friday, May 22

Connected cars will add to mobile traffic jamsExpect mobile networks to struggle as they are called on to handle a rapidly increasing number of connected cars. Traffic growth from M2M (machine to machine) connections, particularly from cars, will cause headaches for mobile operators, says Machina Research. Car connections are expected to surpass 500 million in 2019 and then 1 billion in 2023, when they will account for more than half of all M2M connections over cellular networks. And they’ll use lots of data, thanks to connected entertainment and navigation systems.To read this article in full or to leave a comment, please click here

Factory reset in Android phones leaves sensitive user data behind

It’s common sense to reset an Android phone to its factory state before selling or disposing of it. But beware, researchers recently found that this often fails to properly wipe all sensitive user data from the device.A test on 21 second-hand smartphones running Android versions between 2.3.x (Gingerbread) and 4.3 (Jelly Bean) revealed that it’s possible to recover emails, text messages, Google access tokens and other sensitive data after the factory reset function had been used.The study was done by researchers Laurent Simon and Ross Anderson from the University of Cambridge in the U.K. on used devices bought from eBay between January and May 2014. The devices included models from Samsung Electronics, HTC, LG Electronics, Motorola and three from Google’s Nexus line of phones.To read this article in full or to leave a comment, please click here

Secom security drone follows, photographs intruders

If you think drones are more than slightly creepy, wait until you meet one that will autonomously follow you and record video.Japanese security company Secom is launching a drone that will automatically launch when an intruder is detected and follow him or her while sending video to human supervisors.The sleek silver quadcopter was shown off this week at the inaugural International Drone Expo held in Makuhari outside Tokyo, where about 50 companies gathered to exhibit drones and related technologies.The UAV will be offered to businesses in Japan operating on relatively large parcels of land—big enough to warrant a flying security camera—such as shopping malls and supermarkets with large parking lots.To read this article in full or to leave a comment, please click here

Freelance hacking site vows to clean up dodgy listings

Charles Tendell is trying to repair a reputation problem for his website, Hacker’s List.The site debuted in November and quickly drew high-profile attention, including a front-page story in the New York Times. It’s an online marketplace where people can list computer-security related jobs for bidding and match them with the right “hacker.”It has been criticized as amateurish since forums where such deals are made are password-protected and generally hard to find for regular Internet users. It has also raised concern since many projects up for bidding appear illegal.To read this article in full or to leave a comment, please click here

Leaked database of Adult Friend Finder still online

Adult Friend Finder, one of the largest online dating sites, may have been breached more than two months ago, and the sensitive files—include names, ages, email addresses, zip codes and more—are apparently still online.British broadcaster Channel 4 reported Thursday that the website had been breached, although information regarding the breach had been trickling out in a low-key way for some time.FriendFinder Networks, a California-based company that owns Adult Friend Finder and other dating websites, said in an advisory that it has contacted law enforcement and is investigating.To read this article in full or to leave a comment, please click here

ICANN chief to leave office early, may miss key transition

The ICANN leader who kicked off the Internet organization’s move away from U.S. government control will leave his post early, possibly before the transition is finished.Fadi Chehadé, who became president and CEO of the Internet Corporation for Assigned Names and Numbers in September 2012, will step down in March 2016, ICANN announced on Thursday. He is leaving for a new career in the private sector, outside of the domain name industry, the group said. Chehadé’s term was to have lasted until June 2017.Chehadé’s biggest job at the helm of ICANN, which coordinates the Internet’s DNS (Domain Name System) and Internet Protocol addresses, has been to shepherd its transition away from U.S. control. ICANN operates under a contract from the U.S. National Telecommunications and Information Administration (NTIA), which is scheduled to expire in September.To read this article in full or to leave a comment, please click here