Network World Daily News AM | | Google beats spring cleaning rush, nixes apps and services | | Issue highlights 1. Gartner to IT security pros: Get ready for 'digital business' 2. INSIDER Hadoop's success drives efforts to make it more secure 3. DARPA demos lightweight, 94GHz silicon system on a chip 4. Turning network resource management on its head through software-defined WANs 5. Tools catch security holes in open source code 6. Google gets into the weeds of Android Work 7. Comparing the top Hadoop distributions 8. 7 days, 7 futuristic technologies: Insanely fast chips, mood-sensing computers, and more | RESOURCE COMPLIMENTS OF: ConnectIT Get the latest research on collaboration, mobile and document management technologies. Meet solution providers to advance your collaboration strategy. Network with social-, mobile and document management-oriented IT professionals. Register today at: http://www.cwconnectit.com/atlanta | National Harbor, Md. -- There's a "digital business" revolution coming and IT security professionals need to grasp the significance early on to be prepared to address whatever security needs arise. That was the message from Gartner analyst Jorge Lopez in the closing keynote at the Gartner Security and Risk Management Summit today. Digital business isn't simply represented by what will be a growth in the so-called "Internet of Things." IoT connectivity will be part of cars, trash cans, road sensors, medical devices, clothing, toys, parking meters, LED lighting and much more. Beyond this, the digital business revolution means what will happen with the information that can be gleaned from IoT and shared for business purposes.To read this article in full or to leave a comment, please click here READ MORE | Talk about big data and it won't take long for Hadoop to appear in the conversation. The Apache open source software is used to orchestrate clusters of commodity computers to crunch information from mountains of data.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | WHITE PAPER: Infortrend Did you know that Infortrend's EonStor DS systems are ideal solutions for storage infrastructure consolidation, high-availability clusters, server virtualization and green datacenters? And now, they're 16Gb Fibre Channel-ready. Learn more >> | Looking to bring lighter, more powerful and less expensive systems for various applications such as communications, radar or guidance systems, DARPA said this week it had recently demonstrated an all-silicon, microchip-sized system on a chip that runs at 94 GHz.DARPA claims that this chip is the first time a silicon-only package has achieved such a high frequency, which falls in the millimeter-wave range.+More on Network World: Quick look: NASA tests supersonic Mars flying saucer+"What normally would require multiple circuit boards, separate metal shielded assemblies and numerous I/O cables we can now miniaturize onto one silicon chip about half the size of an adult's thumbnail," said Dev Palmer, DARPA program manager in a statement. "This accomplishment opens the door for co-designing digital CMOS [complementary metal oxide semiconductors] and millimeter-wave capabilities as an integrated system on an all-silicon chip, which should also make possible new design architectures for future military [wireless] systems."To read this article in full or to leave a comment, please click here READ MORE | Exactly how can a high-end SDW solution help? READ MORE | WHITE PAPER: Netscout Systems Inc. Today's IT organizations manage diverse business services comprising a host of applications running on many server farms within the data center. NetScout provides a highly scalable, unified approach to service delivery management that enables efficient, topdown performance management across complex application, server and network tiers. Learn More | This year has been the best of times and the worst of times for open source code and security.On the one hand, the latest survey by Black Duck Software and North Bridge Venture Partners shows that 72 percent of industry professionals prefer open source software because it's more secure than proprietary solutions.[Are open-source projects the pathway to better security?]On the other hand, Heartbleed exposed a security flaw in the widely-used, open source OpenSSL encryption tool that affected more than half a million websites. Also this spring, TrueCrypt unexpectedly shut down, citing "unfixed security issues" on its SourceForge page, and a critical bug in Linux, GnuTLS, was finally exposed after having been undiscovered for more than 10 years.To read this article in full or to leave a comment, please click here READ MORE | Approach offers a hierarchy of management controls for BYOD or company-owned devices (see video below) READ MORE | Hadoop introduced a new way to simplify the analysis of large data sets, and in a very short time reshaped the big data market. In fact, today Hadoop is often synonymous with the term big data.Since Hadoop is an open source project, a number of vendors have developed their own distributions, adding new functionality or improving the code base. This article by Altoros, a big data specialist, provides an overview of the major distributions, describing how they differ from the standard edition.A standard open source Hadoop distribution (Apache Hadoop) includes: The Hadoop MapReduce framework for running computations in parallel The Hadoop Distributed File System (HDFS) Hadoop Common, a set of libraries and utilities used by other Hadoop modules This is only a basic set of Hadoop components; there are other solutions -- such as Apache Hive, Apache Pig, and Apache Zookeeper, etc. -- that are widely used to solve specific tasks, speed up computations, optimize routine tasks, etc.To read this article in full or to leave a comment, please click here READ MORE | Amazing advances in computing technology revealed themselves at small events around the globe this week. Catch up on Hybrid Memory Cubes, super-speedy processors, and more. READ MORE | WEBCAST: Fortinet Next Generation Firewall (NGFW). It seems every IT Security expert is talking about them, but what are people really doing? This webcast covers 5 real-world customer deployments and explores business drivers, key requirements, solutions considered and the final deployment. Learn more >> | | | | | | | |
No comments:
Post a Comment