Tech News

NYC current conditions
light rain
humidity: 100%
wind: 2m/s NNW
H 24 • L 21
Weather from OpenWeatherMap

MakeTechEasier: Hostnames are an important piece of the Linux networking puzzle.

Posted: July 17, 2018, 9:00 pm

EnterprisersProject: 7 clues DevOps job candidates are more hype than substance

Posted: July 17, 2018, 8:00 pm

Apparently, Google's Chrome OS team is working on redesigning the Files app of the Linux-based Chrome OS operating system for Chromebooks with a new "My Files" section

Posted: July 17, 2018, 7:00 pm

Librapay, a donation-platform aiming to fund open source software and free culture, is in trouble.

Posted: July 17, 2018, 6:00 pm Clear Linux was designed specifically for the cloud while best leveraging Intel hardware;

Posted: July 17, 2018, 5:00 pm

OMGUbuntu: Memory boost will also help the machine run games better

Posted: July 17, 2018, 4:00 pm

LinuxInsider: Ascensio System SIA recently released its free office suite upgrade -- OnlyOffice Desktop Editors -- with a ribbon and tab interface plus numerous updated features.

Posted: July 17, 2018, 3:00 pm

LinuxJournal: The question of the earliest GCC compiler version to support for building the Linux kernel comes up periodically.

Posted: July 17, 2018, 2:00 pm

EnterpriseNetworkingPlanet: Startup emerges from stealth mode, with a network hardware agnostic OS and $15M in funding.

Posted: July 17, 2018, 1:00 pm

eWEEK - RSS Feed

eWeek - RSS Feed

Walmart plans to use Microsoft's intelligent cloud offerings to modernize its operations and migrate hundreds of applications to Azure.
Posted: July 17, 2018, 7:30 pm
Development of the chips beyond the second generation of 3D XPoint chips will be pursued independently by the two companies in order to optimize them for their respective product and business needs, Micron said.
Posted: July 17, 2018, 5:41 pm
McAfee is launching a new cloud-based platform to help organizations control and protect both endpoints and mobile devices.
Posted: July 17, 2018, 4:45 pm
DAILY VIDEO: Broadcom surprises the industry with a $19 billion bid for CA Technologies, and Apple unveils new MacBook Pro models but remains mum on new Mac desktops.
Posted: July 17, 2018, 3:45 pm
Symantec continues to build out product offerings that benefit from isolation technology which reduces an organization's attack surface.
Posted: July 17, 2018, 2:33 pm
At its AWS Summit 2018 in New York, Amazon Web Services announced it was adding new artificial intelligence machine learning and compute services on the AWS cloud.
Posted: July 17, 2018, 8:35 am
Optiv Security is now providing a service that manages an organization's new or existing CyberArk privileged access account deployments.
Posted: July 16, 2018, 7:27 pm
DAILY VIDEO: Intel adds structured ASICs to its product lineup with its eASIC acquisition, and Microsoft challenges Slack with a free version of Teams.
Posted: July 16, 2018, 5:20 pm
To maximize power savings, the 10nm-class LPDDR5 has been engineered to lower its voltage in accordance with the operating speed of the corresponding application processor, when in active mode.
Posted: July 16, 2018, 3:03 pm
The FBI has revised its figure for the total amount of financial losses from business email compromise attacks, as real estate-related scams grow.
Posted: July 16, 2018, 2:33 pm
eWEEK HOW-TO FEATURE PART 4: Retrofitting your old professional workstation with faster processors may seem like a no-brainer, but in reality it requires some thought, and some cost analysis.
Posted: July 16, 2018, 2:30 pm
SOLUTION ANALYSIS: Workspot’s cloud-native VDI broker deploys cloud desktops, apps and GPU workstations on Microsoft Azure in aone day and simplifies VDI management with its single pane-of- glass approach.
Posted: July 16, 2018, 12:39 pm
Oracle claims its blockchain cloud service is the only one on the market that provides users with a development platform to build their own networks.
Posted: July 16, 2018, 11:35 am
Azure SQL Data Warehouse customers can expect twice the query performance and fewer problems accommodating multiple users.
Posted: July 16, 2018, 10:53 am
Quest On Demand Migration provides Microsoft Office 365 tenant-to-tenant migration of accounts, email and OneDrive; helps IT teams with merging and consolidating of Office 365 tenants; and accelerates Office 365 consolidation projects.
Posted: July 16, 2018, 9:49 am
With executive leaders struggling to keep up with digital transformation requirements, customer experiences remain "stuck in time" and employees go without critical skills training.
Posted: July 16, 2018, 9:29 am
Blockchain is hands down the technology buzzword of 2018. But the distributed digital ledger can lead to better supply chains, more secure IoT networks, and more reliable DNS.
Posted: July 16, 2018, 9:22 am
The companies are working on industrial internet of things solutions based on GE's Predix platform and Microsoft's cloud.
Posted: July 16, 2018, 8:05 am
Microsoft is adding an addition three years of support for SQL Server 2008 customers that migrate to the Azure Cloud.
Posted: July 13, 2018, 7:30 pm
DAILY VIDEO: Google introduces Cost Forecast feature for Cloud Billing, and ransomware attacks spiked in the first half of 2018, SonicWall reports.
Posted: July 13, 2018, 2:45 pm
Open-source technologies have been used to transform and innovate across multiple industries, and now the Linux Foundation is bringing that power to the energy industry in an effort that could have wide-ranging benefits.
Posted: July 13, 2018, 2:32 pm
The world’s top five PC vendors all saw system shipments grow in the second quarter as Windows 10 upgrades fuel commercial sales, IDC and Gartner said.
Posted: July 13, 2018, 1:05 pm
eWEEK HOW-TO FEATURE PART 3: You’ll probably notice the most immediate improvement in speeding up your old workstation when you replace your old hard drives with SSDs, but what to do about the RAID system?
Posted: July 13, 2018, 12:15 pm
The Site Isolation security feature is designed to mitigate impact of attacks that exploit Spectre CPU vulnerabilities, Google says.
Posted: July 13, 2018, 12:05 pm
Windows 10 business users soon will be able to log into their remote desktop sessions using Microsoft's Windows Hello biometric technology.
Posted: July 13, 2018, 10:45 am
OpsRamp is a cloud-based IT operations management platform that brings together on-premises and cloud infrastructure through discovery, monitoring, escalation management and automation.
Posted: July 13, 2018, 10:40 am
Tech industry analysts debate the merits of the proposed acquisition, which Broadcom officials said will make the company a larger IT infrastructure player.
Posted: July 13, 2018, 9:45 am
The latest 13-inch and 15-inch MacBook Pro laptops get more power and features, including available 6-core processors for the 15-inch model.
Posted: July 13, 2018, 9:05 am
VIDEO: Justin Cappos, assistant professor at New York University and founder of The Update Framework (TUF) open-source project, provides insight into the process of securing software updates.
Posted: July 13, 2018, 8:38 am
Addition of Azure deployments to AWS gives enterprises another cloud choice to use open source, scale-out SQL databases, data warehouse and machine learning platforms in one package.
Posted: July 13, 2018, 8:15 am

Network World Networking

The EU General Data Protection Regulation, or GDPR, came into force on May 25. With every organization with customers and suppliers in the European Union now accountable for the way in which they handle or process personal data, much work has been done to ensure compliance by the deadline. As a result, all levels of a business are now concentrated on meeting the requirements of the new regulation, throwing the issue of data protection into focus like never before.

When you consider how big and complex IT networks have become in recent times, however, it has become almost impossible to detect just when and how a security breach or network failure might occur. Unsurprisingly, network security and information assurance are crucial to GDPR compliance, with the regulation stating that measures must be put in place to mitigate the risk associated with assuring information integrity and availability in the face of threats such as malicious code or distributed denial of service (DDoS) attacks.

To read this article in full, please click here

Posted: July 17, 2018, 5:34 pm

It’s hard to remember a time when people thought Amazon was nuts for going into the cloud computing business, since it was so far removed from the company’s core ecommerce business. No one is laughing now.

It seems history could repeat itself. According to an article in The Information, Amazon is rumored to be targeting a new industry, albeit one dominated by a giant player and multiple healthy competitors — the network switching business. The move would put it in direct competition with Cisco, HPE, Juniper Networks, and Arista.

To read this article in full, please click here

Posted: July 17, 2018, 12:48 pm

Tunnels for networking are not good. We see a real-life example taking place with the twelve Thai boys that were stuck at the end of a tunnel with a very narrow section under water preventing passage. The tunnel offered them only one way out, and the particular path was not passable. This is what happens in networks. We’re thankful for the heroic rescue of these brave boys, but networks don’t always fare as well.

You will hear others speak about how a tunnel-based virtual network is the next amazing trend in networking. In fact, an analyst recently told me tunnels are great. And they are, when used for the purpose they were intended. But, using tunnels to get aggregates of packets to go where they wouldn’t go otherwise is dangerous, and will lead to the accumulation of technical debts.

To read this article in full, please click here

Posted: July 16, 2018, 7:15 pm

An infrastructure design consideration that arguably frustrates users, and creates a never-ending headache for network administrators, is the quality of Wi-Fi service in a building. Typically, a poor user experience is one where users have either no signal on their wireless device or see “full bars” but cannot connect to the network.

In an office environment poor Wi-Fi performance is undoubtedly an annoyance, but in a hospital, it could prevent medical staff from delivering care in a timely manner. Waiting for a mobile terminal to retrieve the medical history of a seriously ill patient can literally be a matter of life and death.

Proper cabling is the foundation of Wi-Fi performance

Configuring a wireless access point system (AP) is a complex project and is not the subject of this post, although Aps or AP systems of course plays an important role in Wi-Fi network best practice. To provide network integrators with the best chances of success, the cabling infrastructure must be available to support optimal installation and placement of AP.

To read this article in full, please click here

Posted: July 16, 2018, 6:00 pm

Extreme Networks is contending for greater influence from the data center to the network edge, but it has some obstacles to overcome.

The company is still grappling with how to best integrate, use and effectively sell the technologies it has acquired from Avaya and Brocade in the past year, as well as incorporate and develop its own products to do battle in the cloud, mobile and edge computing environments of the future. Remember, too, that Extreme bought wireless player Zebra Technologies in 2016 for $55 million.

In terms of results that Wall Street watches, Extreme Networks grew revenue 76% to $262 million in its recent fiscal third quarter. According to Extreme, those gains were fueled mostly by growth from its acquisitions and around an 8% growth in its own products. 

To read this article in full, please click here

Posted: July 16, 2018, 10:00 am

As networks become more software-driven, they generate vastly greater amounts of data, which provides some challenges: adhering to compliance and customer privacy guidelines, while harvesting the massive amounts of data—it is physically impossible for humans to tackle the sheer volume that is created. But the vast amounts of data also provide an opportunity for businesses: leveraging analytics and machine learning to gather insights that can help network management move from reactive to proactive to assurance. This doesn’t just mean a massive shift in technology because the human element won’t simply go away. Instead, by combining human intellect and creativity with the computing power AI offers, innovative design and management techniques will be developed to build self-improving intelligent algorithms. The algorithms allow networks to operate in a way that far outweighs networks of the past.

To read this article in full, please click here

Posted: July 13, 2018, 2:30 pm

A 75-mile, quantum-secured, high-speed fiber link has been built in the United Kingdom, the largest internet supplier there has said.

Particles of light, known as photons, carry encryption keys over the same connection as data. Hijacking those photons within the link immediately notifies the system that the keys have become bad — the thief interfering with those keys alters them and then they can’t be used by the interceptor — and the traffic becomes garbled instantly.

It’s “virtually un-hackable,” said Gavin Patterson, outgoing BT chief executive, announcing the link at Internet of Things World Europe that I attended in London last month.

To read this article in full, please click here

Posted: July 12, 2018, 5:12 pm

A key component of SD-WAN is its ability to secure unreliable Internet links and identify anomalous traffic flows.

To read this article in full, please click here

(Insider Story)
Posted: July 12, 2018, 10:00 am

What keeps me awake at night is the thought of artificial intelligence lying in wait in the hands of bad actors. Artificial intelligence combined with the powers of IoT-based attacks will create an environment tapped for mayhem. It is easy to write about, but it is hard for security professionals to combat. AI has more force, severity, and fatality which can change the face of a network and application in seconds.

When I think of the capabilities artificial intelligence has in the world of cybersecurity I know that unless we prepare well we will be like Bambi walking in the woods. The time is now to prepare for the unknown. Security professionals must examine the classical defense mechanisms in place to determine if they can withstand an attack based on artificial intelligence.

To read this article in full, please click here

Posted: July 11, 2018, 4:17 pm

Today’s threat landscape has led organizations to defend their networks with numerous point solutions, most of which are complex and require significant attention to operations and ongoing maintenance. While large enterprises often have sufficient skilled resources to support the security infrastructure, small- to medium-sized businesses sometimes struggle in this area.

For the SMB market in particular, Network Security-as-a-Service is an attractive offering. It allows companies to get the very best security technology at an affordable price point while having someone else maintain the complex infrastructure.

This has given rise to a genre of service provider that builds its own network backbone in the cloud and embeds network security as an integral service. More and more players are starting to offer this kind of service. They generally start with a global network backbone and software-defined wide-area networking (SD-WAN), add a full security stack, and connect to various cloud services from Amazon, Google, Microsoft, etc. Customers connect their data centers, branches, end users, and cloud apps to this network, and away they go. It’s networking, plus network security, all in one place, and all managed as a service.

To read this article in full, please click here

Posted: July 10, 2018, 5:46 pm

The enterprise wide area networks are mission-critical resources for most enterprises. And when it came to managing and running the WAN, enterprises could choose between two distinct models: Do it Yourself (DIY) or managed WAN services. But with the evolution of SD-WANs, we’re seeing a new type of telco solution that merges elements of both capabilities.

Traditional WAN management models

With DIY, enterprise IT procures last-mile access at a location and deploys routers, WAN optimization, and network security appliances from several vendors. Continuous monitoring and management is done in house or via a managed service provider. In short, enterprise IT owns the complex task of maintaining, configuring and monitoring the WAN for availability and optimal performance.

To read this article in full, please click here

Posted: July 9, 2018, 5:26 pm

Function-as-a-service (FaaS) technologies, including AWS Lambda, Azure Functions and IBM/Apache OpenWhisk, are experiencing mass adoption, even in private clouds, and it’s easy to see why. The promise of serverless is simple: developers and IT teams can stop worrying about their infrastructure, system software and network configuration altogether. There’s no need to load-balance, adjust resources for scale, monitor for network latency or CPU performance. Serverless computing can save you a lot of time, money and operational overhead, if you play your cards right.

Say goodbye to the idle instance

There’s also less waste with serverless computing. You only pay for infrastructure in the moment that code gets executed (or, each time a user processes a request). It’s the end of the server that just sits there. But with all these advantages, IT practitioners are also faced with an avalanche of complexity and new challenges.  

To read this article in full, please click here

Posted: July 9, 2018, 1:53 pm

You have probably heard all sorts of claims by various vendors and solutions that they are providing or supporting Intent-Based Networking (IBN), yet there is a wide range of capabilities that are all very confusing.

One way to make sense of this is to apply a "maturity model" like the one used to classify the maturity level of RESTful web services implementations. The Richardson Maturity Model divides capabilities of RESTful web services into levels, starting from 0 and going up as the maturity of the implementation increases. Just like IBN, REST had received its fair share of hype. While the REST principles were clearly defined in Roy Fielding’s dissertation, in practice the REST label was attached to implementations with wildly varying levels of conformance to the original principles, starting from anything that had the words “HTTP” and “JSON” in it to full blown “hypermedia as the engine of application state.”

To read this article in full, please click here

Posted: July 9, 2018, 1:16 pm

Once the data center was home only to separate compute, storage and networking infrastructures. Sure, they communicated, but the disparate systems required dedicated management and hardware to care and feed for these heterogenous platforms.

To read this article in full, please click here

(Insider Story)
Posted: July 9, 2018, 12:05 pm

We live in an exciting era for IT. Countless new technologies are changing how networks are built, how access is provided, how data is transmitted and stored, and much more. Cloud, IoT, edge computing and machine learning all offer unique opportunities for organizations to digitally transform the way they conduct business. Different as these technologies are, they are unified by their dependence on a properly functioning network, on what might be called “network continuity.” The key component for achieving network continuity is visibility.

It’s no secret that new and emerging technologies have always driven networking best practices. With such a wide range of business objectives and activities relying on IT, network performance really is a life or death issue for most companies. So, it’s critical that we maintain a firm grasp on the latest industry trends in order to make informed, strategic network management decisions.

To read this article in full, please click here

Posted: July 2, 2018, 3:31 pm

Looking to seriously amplify the use of fog computing, the IEEE has defined a standard that will lay the official groundwork to ensure that devices, sensors, monitors, and services are interoperable and will work together to process the seemingly boundless data streams that will come from IoT, 5G and artificial intelligence (AI) systems.

The standard, known as IEEE 1934, was largely developed over the past two years by the OpenFog Consortium, which includes ARM, Cisco, Dell, Intel, Microsoft, and Princeton University. 

To read this article in full, please click here

Posted: July 2, 2018, 1:39 pm

If you think you know the problems facing the Internet of Things (IoT), a new Deloitte report, Five vectors of progress in the Internet of Things, offers a great chance to check your assumptions against the IoT experts.

Despite the fancy-pants “vectors of progress” language, the report’s authors — David Schatsky, Jonathan Camhi, and Sourabh Bumb — basically lay out the IoT’s chief technical challenges and then look at what’s being done to address them. Some of the five are relatively well-known, but others may surprise you.

To read this article in full, please click here

Posted: July 2, 2018, 9:30 am

Frankly (no pun intended), I have to admit that I’m growing increasingly frustrated with certain trends in networking.

For example, it’s not that I don’t like the dream or idea of software-defined networking (SDN) — it’s not that I don’t think it’s superior to the older way of setting up or monitoring a network. It’s just that I’m becoming increasingly concerned that small- to medium-size enterprises (SMEs) won’t be able to keep up. And the media that follows this trend isn’t really brining to light the extreme cost of some of these systems.

Pricewise, many of the product lines are intended for large networks. There's no way that a smaller company could even begin to afford them. For example, one trainer told me that a certain SDN product was scaled to start at 500 site deployments!!

To read this article in full, please click here

Posted: June 29, 2018, 10:00 am

Like any industry, networking has a proprietary slew of acronyms and jargon that only insiders understand. Look no further than Network World’s searchable glossary of wireless terms.

Turns out, multiplexing has nothing to do with going to the movies at a place with more than one theater.

I also like to think that each networker has their own favorite list of terms, ready to share at a moment’s notice during family dinners, holidays and networking events … or maybe that’s just me?

To read this article in full, please click here

Posted: June 28, 2018, 11:04 am

The data-center network is a critical component of enterprise IT’s strategy to create private and hybrid-cloud architectures. It is software that must deliver improved automation, agility, security and analytics to the data center network. It should allow for the seamless integration of enterprise-owned applications with public cloud services. Over time, leading edge software will enable the migration to intent-based data-center networks with full automation and rapid remediation of application-performance issues.

To read this article in full, please click here

(Insider Story)
Posted: June 28, 2018, 10:00 am

Gear Latest

Already own an Echo Dot and an Instant Pot? We have a few fascinatingly strange Amazon Prime Deals for you.
Author: Jeffrey Van Camp
Posted: July 17, 2018, 6:00 pm
Pull your shattered life back together with our favorite home and outdoor deals this Prime Day.
Author: Wired Staff
Posted: July 17, 2018, 5:00 pm
Some fantastic gear for gamers is on sale for Amazon Prime Day, including consoles, headsets, PCs, accessories, and games.
Author: Wired Staff
Posted: July 17, 2018, 1:00 pm
Prime Day is finally here! We have the deals you're looking for.
Author: Wired Staff
Posted: July 17, 2018, 12:55 pm
Amazon may have Prime Day, but rivals like Google and Walmart are holding huge sales too.
Author: Wired Staff
Posted: July 17, 2018, 12:00 pm
Fire HD Tablets, Fire TVs, Kindles, Cloud Cams, Echo speakers, and more are as cheap as they'll get for Prime Day.
Author: Wired Staff
Posted: July 16, 2018, 2:55 pm
Roku's new $199 wireless speakers are matched with an optional wireless button you place in another room and use as a voice remote.
Author: Lauren Goode
Posted: July 16, 2018, 1:00 pm
Brave long lines and massive crowds like a superhero with these essential items.
Author: Pia Ceres
Posted: July 15, 2018, 11:00 am
Amazon's big Prime Day sale is almost here, and we'll help you get something out of the madness.
Author: Wired Staff
Posted: July 15, 2018, 11:00 am
This small, bashful botvac that will win over your heart, if not your wallet.
Author: Adrienne So
Posted: July 14, 2018, 11:00 am
Microsoft's chief product officer, Panos Panay, tells us why the company made the Surface Go.
Author: Wired Staff
Posted: July 14, 2018, 12:37 am
A budget gaming laptop with a few flaws, but gobs of brawn.
Author: Christopher Null
Posted: July 13, 2018, 1:00 pm
Apple leans in on the high end of the laptop market, rather than going light and cheap.
Author: Lauren Goode
Posted: July 12, 2018, 12:30 pm
This keyboard-packing smartphone is the best kind of throwback. Our full review.
Author: Jeffrey Van Camp
Posted: July 12, 2018, 11:00 am
A company from Austin, Texas is building 800-square-foot houses from concrete pumped out of a giant 3-D printer.
Author: Andrea Powell
Posted: July 11, 2018, 1:00 pm
Looking for a pair of sturdy, sweatproof, wireless buds to help you rock your inner jock? We have you covered.
Author: Adrienne So
Posted: July 11, 2018, 12:00 pm
Is Brava’s idea of the oven of the future just right or overdone?
Author: Lauren Goode
Posted: July 10, 2018, 2:00 pm
The latest Surface is Microsoft's smallest—and least expensive.
Author: Lauren Goode
Posted: July 10, 2018, 1:00 am
Tread gently on the planet with a versatile pack made mostly from recycled materials.
Author: Michael Calore
Posted: July 9, 2018, 1:00 pm
Groceries, toddlers, and tools all fit in the cargo box of the Riese & Müller Load.
Author: Adrienne So
Posted: July 9, 2018, 12:00 pm