High-tech

High-tech
Light

Sunday, November 16, 2014

DARPA wants to toughen-up WAN edge networking, security

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Nov 16, 2014 7:12 AM
Subject: DARPA wants to toughen-up WAN edge networking, security
To: <aquarianm@gmail.com>
Cc:

Top 10 tech conspiracy theories of all time

Amazon CTO: Come build apps on our cloud!

Network World Daily News AM
November 16, 2014

DARPA wants to toughen-up WAN edge networking, security

Details of what exactly DARPA is looking add under the new program, known as EDICWT or Edge-Directed Cyber Technologies for Reliable Mission Communication, but the agency provided the following description: "The objective of the EDICT program is to bolster the resilience of communication over IP networks solely by instantiating new capabilities in computing devices within user enclaves at the WAN edge. It is envisioned that systems developed within this program will combine real- time network analytics, holistic decision systems, and dynamically configurable protocol stacks to mitigate WAN failures and attacks on the fly, in a mission-aware fashion. Protocols in scope for this program include those at the network, transport, and application layers of the five-layer protocol reference model."

READ MORE
 

Issue highlights

1. Top 10 tech conspiracy theories of all time

2. Amazon CTO: Come build apps on our cloud!

3. U.S. government issues alert about Apple iOS "Masque Attack" threat

4. 8 free online courses to grow your tech skills

5. Cisco winning SDN battle: Chambers

6. Cortana Could Appear on iOS, Android

7. Facebook's new Iowa data center goes modular to grow forever

8. BlackBerry bolsters its enterprise pitch

9. Google quadruples Nobel Prize in Computing to $1M

10. Inside look: How to land on a comet

11. US weather agency confirms cyberattack

12. Juniper needs to get it right this time

13. INSIDER How-to: Get started with MariaDB

WHITE PAPER: Binary Tree

Merger Integration: Diverse Organizations Collaborate as One

Corporate email and related applications are often overlooked during an impending integration of dissimilar environments, or a separation into multiple ones. Several key factors enable an organization to collaborate as one team, quickly and robustly, while maintaining user productivity. Learn More

Top 10 tech conspiracy theories of all time

Top 10 tech conspiracy theories of all timeImage by ShutterstockEverybody likes a good conspiracy theory: Roswell. JFK. The moon landings.The appeal of the conspiracy theory is rooted in its own essential slipperiness. In terms of technical definition, a conspiracy refers to multiple persons or groups working together toward some kind of shady result. But in popular culture, conspiracy theories can be plausible or impossible, true or discredited -- and everything in between.To read this article in full or to leave a comment, please click here READ MORE

Amazon CTO: Come build apps on our cloud!

Amazon Web Services released some pretty nifty new features to its cloud this week including a new event-driven computing platform named Lambda and Auora, a MySQL-style relational database with mind-boggling scale.And if Amazon.com CTO Werner Vogels had one message for the 13,500 attendees of AWS re:Invent, it is that there is no reason that they can't build apps just like those themselves. A major theme of AWS re:lnvent 2014 is about making it easier to build and manage applications on the company's cloud platform. @AWSreInvent On Day 1 of the company's keynotes, SVP Andy Jassy announced AWS Config, AWS CodePipeline and AWS Code Deploy, a set of tools for managing code that new applications are built out of. On Day 2 Vogels announced the EC2 Container Service, which makes it much easier to launch and manage Docker containers, which are increasingly becoming a building block of new apps.To read this article in full or to leave a comment, please click here READ MORE

U.S. government issues alert about Apple iOS "Masque Attack" threat

Security threats to iPhones have emerged Three days after security company FireEye warned of an iPhone/iPad threat dubbed "Masque Attack", the U.S. government has issued a warning of its own about this new risk by malicious third-party apps to Apple iOS devices.The United States Computer Emergency Readiness Team (US-CERT) issued the alert regarding Masque Attack posted in full at the bottom of this article. But in summary, US-CERT warned that:To read this article in full or to leave a comment, please click here READ MORE

8 free online courses to grow your tech skills

Free Online Tech CoursesAt one time, universities and colleges were institutes of higher learning for those who were passionate about acquiring knowledge. Today, education discussions tend to to center around how much individuals can make with their degree. Thanks to the Internet there are still places that offer open learning initiatives designed to help a new generation of technologists succeed.   READ MORE

WHITE PAPER: CommVault

5 Steps to Application-Aware Data Protection

Application Owners need to know that they'll be able to recover their data at the application level when disaster strikes, and yesterday's solutions are simply not up to this job. It's time for modern, application-aware data protection - and here's how to get there. Learn more about how to create application-aware protection. Learn More>>

Cisco winning SDN battle: Chambers

Cisco CEO John Chambers is claiming victory in the company's battle with SDN. If you read or listened to his somewhat chilling comments during Cisco's Q1, FY 2015 quarterly conference call this week, it's "game over": We're winning big-time on Application-Centric Infrastructure (ACI) and pulling away from the start-up competitors … we are not only pulling away from, I think, while they have news left on the table, I think, it's game over, I think we have got them.To read this article in full or to leave a comment, please click here READ MORE

Cortana Could Appear on iOS, Android

Could Microsoft's Cortana have coffee with Apple's Siri? Track down a curry with Google Now? The short answer is: Yeah. Supposedly, that last sentence was the exact quote Julie Larson-Green, Microsoft's chief experience officer, gave to reporters who met with her at the company's Redmond, Wash. headquarters, about the possibility that Cortana could move to other platforms. When asked to comment about Cortana's moving to Android and iOS, a Microsoft spokesperson responded: "We are not disclosing details about future releases, but we continue to explore ways to provide the great functionality of Cortana to more Windows users." Android's not exactly Windows, but whatever.To read this article in full or to leave a comment, please click here READ MORE

Facebook's new Iowa data center goes modular to grow forever

The traffic inside Facebook's data centers is growing so fast that the company is changing the basic architecture of its networks in order to keep up.The new design, which Facebook calls a data center fabric, doesn't use a new link speed to make the network run faster. Instead, it turns the whole system into a set of modules that are less expensive and more widely available than what the company's using now. It's also easier to deploy and manage, according to Facebook's networking chief.Unlike older hierarchical networks, the modular design can provide consistently fast links across the data center for any two servers to talk to each other. The new architecture was used in a 476,000-square-foot (44,000-square-meter) data center that goes online today in Altoona, Iowa. Facebook plans to use it in all newly built centers and retrofit older facilities as part of its regular upgrade cycle.To read this article in full or to leave a comment, please click here READ MORE

BlackBerry bolsters its enterprise pitch

BlackBerry announced a renewed enterprise focus on Thursday, including a partnership with Samsung that provides secure mobile software for certain Samsung Android smartphones and tablets.The software, to be available early next year, will bring together BlackBerry's new BES12 Enterprise Mobility Management (EMM) software with Samsung smartphones and tablets that are embedded with Samsung's Knox security software. Models include the Galaxy S5 and Galaxy Note 4.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BMC Software

Guide to Managing and Lowering Mainframe Software Charges

Monthly license charges (MLC) are rising by 7% or more each year, and account for 30% of total mainframe costs. Yet managing MLC costs is an inexact science. This best practice guide provides a step-by-step process to reduce mainframe MLC costs up to 20% without compromising business critical services. Learn More

Google quadruples Nobel Prize in Computing to $1M

ACM The Association for Computing Machinery (ACM) has announced that its annual A.M. Turing Award, sometimes called the Nobel Prize in Computing, will now come with a $1M award courtesy of Google. Previously, the award came with a $250K prize funded by Google and Intel. The award, which goes to "an individual selected for contributions of a technical nature made to the computing community," is generally doled out in February or March. This past March, the winner was Microsoft Research principal Leslie Lambert, a distributed computing wrangler.To read this article in full or to leave a comment, please click here READ MORE

Inside look: How to land on a comet

Amazing stuffImage by Reuters/NASAThe European Space Agency launched the Rosetta mission in 2004 and this week it completed its primary mission: Land on a comet. In its travels the spacecraft has zipped by Mars, snapped a few shots of the asteroids Steins and Lutetia, mostly hibernated for three years awaiting a rendezvous with the comet 67P/Churyumov-Gerasimenko. Rosetta includes a main mother ship and Philae, the craft that actually landed on the comet. Rosetta will be the first spacecraft to land on and escort a comet as it enters our inner solar system, observing at close range how the comet changes as it hurtles towards the Sun.To read this article in full or to leave a comment, please click here READ MORE

US weather agency confirms cyberattack

Four websites run by the U.S. National Oceanic and Atmospheric Administration have been compromised in recent weeks, the agency said on Wednesday.NOAA, the part of the U.S. Department of Commerce that includes the National Weather Service, "deflected" the attacks, the agency said in a statement. Some services were down for unscheduled maintenance but were restored as of Wednesday afternoon, the agency said."These effects did not prevent us from delivering forecasts to the public," NOAA said in the statement. The agency's investigation of the breach is not finished, the agency said.Chinese hackers were suspected in the attack, according to a Washington Post story, but a NOAA spokesman declined to talk about the source of the attack.To read this article in full or to leave a comment, please click here READ MORE

Juniper needs to get it right this time

Retaining and maintaining customer trust, confidence and respect will be key for Juniper Networks going forward now after two misfires in the CEO's office. Shaygan Kheradpir resigned suddenly this week after the Juniper board questioned his leadership and conduct with a particular customer, whom they did not name.It was obviously an important customer, perhaps a 10% revenue customer. Juniper hasn't disclosed a 10% customer since Q1, 2013, and at that time there were two: Verizon – Kheradpir's former employer – and AT&T, which recently added Juniper to its preferred list of Domain 2.0 SDN/NFV vendors.To read this article in full or to leave a comment, please click here READ MORE

INSIDER

How-to: Get started with MariaDB

MariaDB is a fork of the wildly popular open source database MySQL. Although MariaDB is very similar to MySQL, it is not necessarily the same. One of the primary goals behind the MariaDB project is to serve as a drop-in replacement for MySQL, but MariaDB also offers features beyond those available in MySQL.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

WEBCAST: Enterprise Management Associates

Redefining the Data Warehouse for Analytics in the Cloud

Join Enterprise Management Associates (EMA) managing research director for business intelligence and data warehousing, John Myers, to hear how data warehousing in the cloud creates opportunities for organizations of all sizes. Learn More

SLIDESHOWS

Ten operating systems for the Raspberry Pi

The OSes the Raspberry Pi can run will amaze you!

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Black Friday iPhone 6, iPad Air deals spill forth from Walmart

2. Peeping into 73,000 unsecured security cameras thanks to default passwords

3. U.S. government issues alert about Apple iOS "Masque Attack" threat

4. Black Friday iPad fire sale at Staples

5. Ten operating systems for the Raspberry Pi

6. Black Friday deals from Target, Best Buy on iPhones, iPads

7. Cisco winning SDN battle: Chambers

8. 8 free online courses to grow your tech skills

9. Black Friday sales promise iPhone 6 deals

10. Google quadruples Nobel Prize in Computing to $1M

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment