Network World Daily News AM | | Details of what exactly DARPA is looking add under the new program, known as EDICWT or Edge-Directed Cyber Technologies for Reliable Mission Communication, but the agency provided the following description: "The objective of the EDICT program is to bolster the resilience of communication over IP networks solely by instantiating new capabilities in computing devices within user enclaves at the WAN edge. It is envisioned that systems developed within this program will combine real- time network analytics, holistic decision systems, and dynamically configurable protocol stacks to mitigate WAN failures and attacks on the fly, in a mission-aware fashion. Protocols in scope for this program include those at the network, transport, and application layers of the five-layer protocol reference model." | | Issue highlights 1. Top 10 tech conspiracy theories of all time 2. Amazon CTO: Come build apps on our cloud! 3. U.S. government issues alert about Apple iOS "Masque Attack" threat 4. 8 free online courses to grow your tech skills 5. Cisco winning SDN battle: Chambers 6. Cortana Could Appear on iOS, Android 7. Facebook's new Iowa data center goes modular to grow forever 8. BlackBerry bolsters its enterprise pitch 9. Google quadruples Nobel Prize in Computing to $1M 10. Inside look: How to land on a comet 11. US weather agency confirms cyberattack 12. Juniper needs to get it right this time 13. INSIDER How-to: Get started with MariaDB | WHITE PAPER: Binary Tree Corporate email and related applications are often overlooked during an impending integration of dissimilar environments, or a separation into multiple ones. Several key factors enable an organization to collaborate as one team, quickly and robustly, while maintaining user productivity. Learn More | Top 10 tech conspiracy theories of all timeImage by ShutterstockEverybody likes a good conspiracy theory: Roswell. JFK. The moon landings.The appeal of the conspiracy theory is rooted in its own essential slipperiness. In terms of technical definition, a conspiracy refers to multiple persons or groups working together toward some kind of shady result. But in popular culture, conspiracy theories can be plausible or impossible, true or discredited -- and everything in between.To read this article in full or to leave a comment, please click here READ MORE | Amazon Web Services released some pretty nifty new features to its cloud this week including a new event-driven computing platform named Lambda and Auora, a MySQL-style relational database with mind-boggling scale.And if Amazon.com CTO Werner Vogels had one message for the 13,500 attendees of AWS re:Invent, it is that there is no reason that they can't build apps just like those themselves. A major theme of AWS re:lnvent 2014 is about making it easier to build and manage applications on the company's cloud platform. @AWSreInvent On Day 1 of the company's keynotes, SVP Andy Jassy announced AWS Config, AWS CodePipeline and AWS Code Deploy, a set of tools for managing code that new applications are built out of. On Day 2 Vogels announced the EC2 Container Service, which makes it much easier to launch and manage Docker containers, which are increasingly becoming a building block of new apps.To read this article in full or to leave a comment, please click here READ MORE | Security threats to iPhones have emerged Three days after security company FireEye warned of an iPhone/iPad threat dubbed "Masque Attack", the U.S. government has issued a warning of its own about this new risk by malicious third-party apps to Apple iOS devices.The United States Computer Emergency Readiness Team (US-CERT) issued the alert regarding Masque Attack posted in full at the bottom of this article. But in summary, US-CERT warned that:To read this article in full or to leave a comment, please click here READ MORE | Free Online Tech CoursesAt one time, universities and colleges were institutes of higher learning for those who were passionate about acquiring knowledge. Today, education discussions tend to to center around how much individuals can make with their degree. Thanks to the Internet there are still places that offer open learning initiatives designed to help a new generation of technologists succeed. READ MORE | WHITE PAPER: CommVault Application Owners need to know that they'll be able to recover their data at the application level when disaster strikes, and yesterday's solutions are simply not up to this job. It's time for modern, application-aware data protection - and here's how to get there. Learn more about how to create application-aware protection. Learn More>> | Cisco CEO John Chambers is claiming victory in the company's battle with SDN. If you read or listened to his somewhat chilling comments during Cisco's Q1, FY 2015 quarterly conference call this week, it's "game over": We're winning big-time on Application-Centric Infrastructure (ACI) and pulling away from the start-up competitors … we are not only pulling away from, I think, while they have news left on the table, I think, it's game over, I think we have got them.To read this article in full or to leave a comment, please click here READ MORE | Could Microsoft's Cortana have coffee with Apple's Siri? Track down a curry with Google Now? The short answer is: Yeah. Supposedly, that last sentence was the exact quote Julie Larson-Green, Microsoft's chief experience officer, gave to reporters who met with her at the company's Redmond, Wash. headquarters, about the possibility that Cortana could move to other platforms. When asked to comment about Cortana's moving to Android and iOS, a Microsoft spokesperson responded: "We are not disclosing details about future releases, but we continue to explore ways to provide the great functionality of Cortana to more Windows users." Android's not exactly Windows, but whatever.To read this article in full or to leave a comment, please click here READ MORE | The traffic inside Facebook's data centers is growing so fast that the company is changing the basic architecture of its networks in order to keep up.The new design, which Facebook calls a data center fabric, doesn't use a new link speed to make the network run faster. Instead, it turns the whole system into a set of modules that are less expensive and more widely available than what the company's using now. It's also easier to deploy and manage, according to Facebook's networking chief.Unlike older hierarchical networks, the modular design can provide consistently fast links across the data center for any two servers to talk to each other. The new architecture was used in a 476,000-square-foot (44,000-square-meter) data center that goes online today in Altoona, Iowa. Facebook plans to use it in all newly built centers and retrofit older facilities as part of its regular upgrade cycle.To read this article in full or to leave a comment, please click here READ MORE | BlackBerry announced a renewed enterprise focus on Thursday, including a partnership with Samsung that provides secure mobile software for certain Samsung Android smartphones and tablets.The software, to be available early next year, will bring together BlackBerry's new BES12 Enterprise Mobility Management (EMM) software with Samsung smartphones and tablets that are embedded with Samsung's Knox security software. Models include the Galaxy S5 and Galaxy Note 4.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: BMC Software Monthly license charges (MLC) are rising by 7% or more each year, and account for 30% of total mainframe costs. Yet managing MLC costs is an inexact science. This best practice guide provides a step-by-step process to reduce mainframe MLC costs up to 20% without compromising business critical services. Learn More | ACM The Association for Computing Machinery (ACM) has announced that its annual A.M. Turing Award, sometimes called the Nobel Prize in Computing, will now come with a $1M award courtesy of Google. Previously, the award came with a $250K prize funded by Google and Intel. The award, which goes to "an individual selected for contributions of a technical nature made to the computing community," is generally doled out in February or March. This past March, the winner was Microsoft Research principal Leslie Lambert, a distributed computing wrangler.To read this article in full or to leave a comment, please click here READ MORE | Amazing stuffImage by Reuters/NASAThe European Space Agency launched the Rosetta mission in 2004 and this week it completed its primary mission: Land on a comet. In its travels the spacecraft has zipped by Mars, snapped a few shots of the asteroids Steins and Lutetia, mostly hibernated for three years awaiting a rendezvous with the comet 67P/Churyumov-Gerasimenko. Rosetta includes a main mother ship and Philae, the craft that actually landed on the comet. Rosetta will be the first spacecraft to land on and escort a comet as it enters our inner solar system, observing at close range how the comet changes as it hurtles towards the Sun.To read this article in full or to leave a comment, please click here READ MORE | Four websites run by the U.S. National Oceanic and Atmospheric Administration have been compromised in recent weeks, the agency said on Wednesday.NOAA, the part of the U.S. Department of Commerce that includes the National Weather Service, "deflected" the attacks, the agency said in a statement. Some services were down for unscheduled maintenance but were restored as of Wednesday afternoon, the agency said."These effects did not prevent us from delivering forecasts to the public," NOAA said in the statement. The agency's investigation of the breach is not finished, the agency said.Chinese hackers were suspected in the attack, according to a Washington Post story, but a NOAA spokesman declined to talk about the source of the attack.To read this article in full or to leave a comment, please click here READ MORE | Retaining and maintaining customer trust, confidence and respect will be key for Juniper Networks going forward now after two misfires in the CEO's office. Shaygan Kheradpir resigned suddenly this week after the Juniper board questioned his leadership and conduct with a particular customer, whom they did not name.It was obviously an important customer, perhaps a 10% revenue customer. Juniper hasn't disclosed a 10% customer since Q1, 2013, and at that time there were two: Verizon – Kheradpir's former employer – and AT&T, which recently added Juniper to its preferred list of Domain 2.0 SDN/NFV vendors.To read this article in full or to leave a comment, please click here READ MORE | MariaDB is a fork of the wildly popular open source database MySQL. Although MariaDB is very similar to MySQL, it is not necessarily the same. One of the primary goals behind the MariaDB project is to serve as a drop-in replacement for MySQL, but MariaDB also offers features beyond those available in MySQL.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | WEBCAST: Enterprise Management Associates Join Enterprise Management Associates (EMA) managing research director for business intelligence and data warehousing, John Myers, to hear how data warehousing in the cloud creates opportunities for organizations of all sizes. Learn More | | | | | | | |
No comments:
Post a Comment