High-tech

High-tech
Light

Saturday, June 21, 2014

Does the data center need an OS?

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jun 13, 2014 9:07 AM
Subject: Does the data center need an OS?
To: <aquarianm@gmail.com>
Cc:

13 geeky ways to celebrate Friday the 13th

Ex-Microsoft employee who leaked Windows secrets to be deported to Russia

Network World Daily News AM
June 13, 2014
Share this email

Does the data center need an OS?

One of latest companies to get a cash infusion from famed Silicon Valley venture capital firm Andreessen Horowitz is Mesosphere, a startup that is essentially attempting to build an operating system for data centers ( about that news here). But it begs the question: Do data centers need an OS? The idea behind Mesos, which is the open source software the startup is commercializing, is that it can sit above all of the hardware and applications in a data center to dynamically provision and manage workloads and infrastructure. The alternative is having silos in a data center for various applications that are manually deployed. Instead, Mesos is intelligent software that finds the best place for workloads to run, monitors how resources are used and looks to consolidate workloads to run a more efficient data center.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. 13 geeky ways to celebrate Friday the 13th

2. Ex-Microsoft employee who leaked Windows secrets to be deported to Russia

3. Dell executive says HP's new Machine architecture is 'laughable'

4. INSIDER IT grads get to know GE

5. Firefox risks user backlash by adding search box to new tab page

6. FCC will push network providers on cybersecurity, Wheeler says

7. The 12 biggest gaffes by high-tech execs

8. Fujitsu 56 Gbps circuit doubles communication speeds between CPUs

9. P.F. Chang's turns to manual card processing after confirming breach

10. HP CIO Ramon Baez sees your future in the cloud

WEBCAST: HP

Meg Whitman presents Unlocking IT with Big Data

Today, the industry is at an inflection point - driven by a triple storm of Big Data, cloud, and mobility; and in this new environment, security is paramount. The New Style of IT is about how businesses and IT leverage this rapid change for enterprise growth. Learn More

13 geeky ways to celebrate Friday the 13th

You're in luck: We've cobbled together a slew of things for the geeky among you to do on Friday the 13th. And if you don't get around to all of them this time around, there's always Friday, June 13 to look forward to. READ MORE

Ex-Microsoft employee who leaked Windows secrets to be deported to Russia

A former Microsoft employee charged in March with leaking Windows updates and software that validates product key codes was sentenced to a three-month prison term on Tuesday.After he serves his sentence, Alex Kibkalo, 34, will be deported to Russia.Kibkalo was arrested March 19 in Bellevue, Wash. for allegedly leaking pre-release software updates for Windows RT, the tablet-specific operating system, to a French blogger in July and August 2012 -- months before its release. The FBI, which was brought onto the case after a Microsoft investigation, also said Kibkalo provided the same blogger with the Activation Server SDK (software development kit), internal-only code to create the activation systems which validate product keys, Microsoft's primary anti-piracy technology.To read this article in full or to leave a comment, please click here READ MORE

Dell executive says HP's new Machine architecture is 'laughable'

John Swainson says HP just wants 'bragging rights' READ MORE

WHITE PAPER: OutSystems

Kick Start Your Mobile Strategy

It's time to kick start your mobile application strategy. • Why go mobile? • What are the three primary mobile application types? • What type of app should you build first? • How to get started, really fast! Read Now

INSIDER

IT grads get to know GE

At GE, a global IT recruiting program helps bring new computer science graduates into the company and expose them to different facets of the business.Computer science graduates rotate through four different IT assignments during a two-year program at General Electric. READ MORE

Firefox risks user backlash by adding search box to new tab page

Mozilla has pulled a "Chrome" by adding a search box to the new tab page in Firefox 31, which reached beta status yesterday and is slated to ship in final form on July 22.Along with the nine thumbnails representing the user's most-frequently-visited websites, the new tab page in Firefox 31's beta sports a search field near the top of the window. Typing a search string in the box initiates a search on Google, unless the user has changed the default search engine. If the Firefox user has changed the search engine -- say, to Yahoo or Microsoft's Bing -- that choice is also used in the new tab page's search box.+ ALSO ON NETWORK WORLD First look: Firefox 29 +To read this article in full or to leave a comment, please click here READ MORE

FCC will push network providers on cybersecurity, Wheeler says

The U.S. Federal Communications Commission is threatening to step in with regulations if network providers don't improve cybersecurity.The FCC will take steps to encourage cybersecurity in the coming months, acting first as a promotor of company-led initiatives instead of a regulator, in keeping with its congressionally defined mission to promote the national defense and public safety, FCC Chairman Tom Wheeler said. But if that doesn't lead to improvements, the agency is prepared to act."The challenge is that this private sector-led effort must be more dynamic than traditional regulation and more measurably effective than blindly trusting the market or voluntary best practices to defend our country," Wheeler said during a speech at the American Enterprise Institute for Public Policy Research. "We believe there is a new regulatory paradigm where the commission relies on industry and the market first while preserving other options if that approach is unsuccessful."To read this article in full or to leave a comment, please click here READ MORE

WEBCAST: Dell SecureWorks

What Can Security Leaders Do to Combat Cyber Threats?

Training employees to understand the risk they create for your organization when they don't consider security in their day-to-day activities is a challenge for most IT and IT security organizations. Changing behavior is always difficult, especially when security awareness programs lack a well-defined approach and dedicated resources. Learn more

The 12 biggest gaffes by high-tech execs

The 'oops!' heard 'round the worldLate last week, Apple CEO Tim Cook tweeted a photo of himself touring a Texas factory that produces Mac Pros. Nothing special, right? Until you looked behind him and spied a pair of iMacs running Windows. Oops.To read this article in full or to leave a comment, please click here READ MORE

Fujitsu 56 Gbps circuit doubles communication speeds between CPUs

Fujitsu says its 56 Gbps chips could rival 4X FDR InfiniBand and should be ready for servers within three years READ MORE

P.F. Chang's turns to manual card processing after confirming breach

P.F. Chang's China Bistro confirmed on Thursday credit and debit card data was stolen from its restaurants, saying it is switching in the meantime to a manual imprinting system to process cards safety.The restaurant chain said in a statement it was alerted on Tuesday by the U.S. Secret Service, which is investigating the cause along with a team of third-party forensic experts.P.F. Chang's said it did not know what cards were affected but that it is working with credit card companies to identify those at risk. It advised customers to monitor their statements for fraudulent activity.Card details believed to have come from P.F. Chang's have appeared on so-called "carding" forums, which are password-protected websites where cybercriminals sell data. The details are being offered for as little as US$18 up to $139 per set, according to Hold Security, a company that specializes in tracking where stolen data is sold.To read this article in full or to leave a comment, please click here READ MORE

HP CIO Ramon Baez sees your future in the cloud

In this Q&A, Baez explains how CIOs can make the most from the cloud and big data. READ MORE

WEBCAST: VMware | IBM

Enhance Your Virtualization Infrastructure

Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage aspects as well. Learn More

SLIDESHOWS

Network World's 2014 State of the Network survey

Exclusive research from Network World shows that cloud and mobility are gaining in importance.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Behind the Great Firewall: What it's really like to log on from China

2. Docker 101: What it is and why it's important

3. A visual history of OS desktop environments

4. What's the best approach to building next-generation data center networks?

5. How to Clean Up Your IT Resume

6. This IT worker had to train an H-1B replacement

7. 10 countries that pay you what you're worth

8. HP unveils Cisco-like SDN switch

9. Microsoft withholds monster IE update from Windows 8.1 dawdlers

10. Microsoft Azure service lets IT control identity and access management to select applications

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment