SD-WANs improve UC performance; Cloud + Mobility = more effective UC

Today, we highlight two reader resources. In the first paper, Dr. Jim Metzler explains in a technical advisory why a software-defined wide area network (SD-WAN) can overcome performance issues associated with unified communications (UC) that uses traditional WAN connectivity. In the second piece, Troy Trenchard, VP and General Manager for UC at Avaya explains why mobility and cloud services are so important to effective UC.Metzler notes in his advisory that, based on responses from his 2015 SD-WAN State of the Market Report, the single most influential factor driving change in the WAN is the support needed for real time voice and video communications.To read this article in full or to leave a comment, please click here

Posted by on 3 August 2015 | 9:46 am

BrandPost: What’s in your performance monitoring strategy?

When an organization is looking to improve application and service delivery, consolidate existing performance monitoring tools and responsibilities or justify the impact of a new technology deployment, there are a few key components that serve as fundamental building blocks for an effective performance monitoring strategy.Breaking your strategy into these components improves comprehension while articulating and reaching consensus on the performance monitoring requirements for your business, especially in an environment where cloud, Internet of Things and software-defined everything are gaining significant momentum.This first component is collection. Any performance monitoring strategy starts with data collection. If you can’t monitor it, you can’t manage it. To prevent visibility gaps, your performance-monitoring platform should be data agnostic, with high frequency polling down to the second. Of course, granular data collection is only useful when you can maintain that data
for a sufficient timeframe, so be sure you can maintain as polled data for accurate capacity forecasts. Applications, systems and network devices produce massive volumes of machine data with cloud and virtualization only adding to the issue. If your monitoring platform can’t scale with your data collection and reporting needs, you’ll end up with significant visibility gaps over your infrastructure performance.To read this article in full or to leave a comment, please click here

Posted by on 3 August 2015 | 9:30 am

Windows 10's first update is already in the works

Windows 10 is just hitting desktops and Microsoft is already working on its first update to the OS, which may be released as early as August. This may be out of character with its past, but it fits into Microsoft's new strategy of faster releases and updates to the OS.The Verge reports that the first such update is referred to internally as "Service Release 1" (SR1). It will be a maintenance update, focused on fixing the current release rather than adding new features. There are some features promised for Windows 10, such as support for Chrome extensions in the new Edge browser, that did not ship with the final code. To read this article in full or to leave a comment, please click here

Posted by on 3 August 2015 | 9:10 am

Windows 10 commandeers users' upload bandwidth

Microsoft will use its customers' upload bandwidth to deliver Windows 10's updates and apps with a peer-to-peer technology resembling BitTorrent, a fact that has caught some by surprise.Baked into Windows 10 is a new technology Microsoft dubbed "Windows Update Delivery Optimization" (WUDO) that is turned on by default for all editions of Windows 10. However, only some SKUs (stock-keeping units) -- notably Windows 10 Home and Windows 10 Pro -- are set to provide updates and apps to other devices when connected to the public Internet.ALSO ON NETWORK WORLD: What if Windows went open source tomorrow? Windows 10 Enterprise and Windows 10 Education, volume-licensed SKUs for large companies and organizations, also have WUDO enabled, but default to sharing updates and apps only within a local network.To read this article in full or to leave a comment, please click here

Posted by on 3 August 2015 | 7:31 am

Review: 2 tri-band routers push wireless network speeds

Do you need real Wi-Fi speed in your office? As 802.11ac-equipped laptops and PCs become common (and your 802.11n gear grows older), it's time to consider upgrading your Wi-Fi network infrastructure.To read this article in full or to leave a comment, please click here(Insider Story)

Posted by on 3 August 2015 | 7:20 am

Samsung devices caught between Apple and Chinese smartphones

Samsung faces competition from Apple iPhones on the high end and Chinese smartphones on the low end.The solution to the company's dilemma is complex. It isn't at all clear whether Samsung's next product announcement on Aug. 13 is going to help very much.On that day, Samsung is expected to announce a new Galaxy Note 5 phablet and a larger Galaxy S6 Plus smartphone, according to reports and analysts. Also expected is a Tizen-based Gear A smartwatch with a round face, instead of the square or rectangular faces of its previous models.+ ALSO ON NETWORK WORLD The 14 most influential smartphones ever +To read this article in full or to leave a comment, please click here

Posted by on 3 August 2015 | 7:17 am

The Upload: Your tech news briefing for Monday, Aug. 3

Attacked then abandoned in Philadelphia, Hitchbot’s attempt to thumb a lift across the U.S. ends in disasterA robot that counted on the kindness of strangers to help it travel around the world has met a cruel fate in Philadelphia, barely three weeks into an attempt to hitch-hike across the U.S. Hitchbot, developed by robotics researchers at McMaster University in Hamilton, Ontario, had already hitch-hiked successfully across Canada and Germany, but U.S. residents turned out to be less welcoming, AP reports.To read this article in full or to leave a comment, please click here

Posted by on 3 August 2015 | 7:15 am

A secure employee departure checklist

Employee exitImage by ThinkstockA certain amount of employee turnover is a natural part of any organization’s life cycle. With each departure, whether the employee was entry-level or an executive, every organization should have a comprehensive process in place to facilitate the employee’s exit, while protecting the company’s information and securing the network and computer system accounts. Laura Iwan, Senior Vice President of Programs at the Center for Internet Security, has compiled these tips to help avoid any issues when an employee leaves the company.To read this article in full or to leave a comment, please click here

Posted by on 3 August 2015 | 7:06 am

T-Mobile caught in crossfire of injected ad war with Flash Networks

LAS VEGAS - An ongoing conflict between website owners and ad injectors who place unwanted ads on those websites has just flared up into full-blown war, with advertisers and carriers caught in the crossfire.Take, for example, T-Mobile, which is proudly named as a customer by Flash Networks, a company that brags about creating "new monetization opportunities" for mobile operators when it "inserts the most relevant engagement display into the selected webpages."This seems to have been a surprise to T-Mobile. Cynthia Lee, the company's senior digital media manager, adamantly denied that T-Mobile was using Flash Networks to inject ads into webpages it was serving up to mobile customers.To read this article in full or to leave a comment, please click here

Posted by on 3 August 2015 | 7:05 am

China clamps down on exports of drones and supercomputers

China plans to limit exports of advanced drones and supercomputers for national security reasons.The new export controls on certain drone and high-performance computing technologies will come into effect Aug. 15, Chinese government regulators said Friday. Affected vendors will have to apply for a government permit to ship their technology outside China.The regulations target more advanced drones that can be flown for at least an hour, “beyond the natural sight of the operator” and function more as an unmanned aerial vehicles.Shenzhen-based DJI, a major Chinese builder of drones, seems confident the new export controls won’t disrupt its business.To read this article in full or to leave a comment, please click here

Posted by on 3 August 2015 | 5:20 am

Container wars: Rocket vs. Odin vs. Docker

Containers have taken the networking world by storm, offering a lightweight, more flexible alternative to the traditional virtual machine. The major difference between a container and a VM is that a container may share common files, while VM processes are discrete and atomic, even if storage and networking is virtualized and shared. VMs are more like islands; containers can be islands or communes.To read this article in full or to leave a comment, please click here(Insider Story)

Posted by on 3 August 2015 | 5:06 am

Sorriest technology companies of 2015

Sorry situationImage by ThinkstockDespite all the technology advances that have rolled out this year, it’s also been a sorry state of affairs among leading network and computing vendors, along with businesses that rely heavily on technology. Apple, Google, airlines and more have issued tech-related mea culpas in 2015…To read this article in full or to leave a comment, please click here

Posted by on 3 August 2015 | 5:00 am

Enterprise guide to Windows 10

Windows 10 is now available for consumers, but for IT executives thinking about enterprise deployments, here’s what the upgrade path from Window 7 or Windows 8/8.1 looks like.The first step is to launch pilot projects this summer. For power users or bleeding edge companies that don’t want to wait for the full complement of Windows 10 enterprise features, there will be a fall release of Windows 10 Enterprise and Professional Editions.If you’re waiting for the full-featured version, we’re talking fourth quarter of this year. And if you’re like many enterprises and typically wait until after the first patches and updates, then you’re looking at the first quarter of next year.To read this article in full or to leave a comment, please click here

Posted by on 3 August 2015 | 5:00 am

New products of the week 08.03.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Out-of-Band Dry Contact Management SwitchKey features: Remotely manage four dry DC contacts plus one AC outlet. Includes monitoring, alarm and logging functions to track temperatures, power outages and other conditions and events at remote equipment sites. More info.To read this article in full or to leave a comment, please click here

Posted by on 3 August 2015 | 4:43 am

Airbnb guest suspected of stealing $35k from San Francisco home

San Francisco police suspect a woman got much more than a bed for the night when she booked a stay in the city through Airbnb earlier this year.Police say Jana Dominquez, a 27-year old from the nearby city of Richmond, is suspected of stealing over $35,000 in valuables from a house she rented though the site.Dominquez had full access to the house on 27th Avenue in the city’s Outer Sunset district in April this year when the theft is thought to have taken place.The victim, who rents the house though the site, kept valuables in a locked closet and office. Closed circuit TV images from the residence time-stamped April 30 clearly show Dominquez entering the locked upstairs apartment and a commercial establishment directly below it.To read this article in full or to leave a comment, please click here

Posted by on 3 August 2015 | 2:35 am

Nokia reaches deal to sell Here business to Audi, BMW Group and Daimler

Nokia has reached an agreement to sell its Here mapping and location services business to an automotive industry consortium consisting of Audi, BMW Group and Daimler, in a deal that gives the business an enterprise value of €2.8 billion (US$3.1 billion).The deal fits with the plans of the automakers to progressively introduce more Internet-based services and automation to assist drivers. Here is developing a location cloud that uses the data generated by vehicles, devices and infrastructure to deliver real-time, predictive and personalized location services, Nokia said in a statement Monday.The three automotive companies said they will each hold an equal stake in Here, but will take a hands-off approach to the business which will be run independently to serve the entire industry.To read this article in full or to leave a comment, please click here

Posted by on 3 August 2015 | 1:45 am

Indian government orders ISPs to block 857 porn websites

The Indian government has ordered a large number of porn websites to be blocked, creating an uproar among users and civil rights groups in the country.The Department of Telecommunications has issued orders for the blocking of 857 websites serving pornography, said two persons familiar with the matter, who declined to be named.Section 69 (A) of India’s Information Technology Act allows the government to order blocking of public access to websites and other information through computer resources, though this section appears to be designed to be invoked when a threat is perceived to the sovereignty and integrity of India, security of the state, friendly relations with foreign states or public order.To read this article in full or to leave a comment, please click here

Posted by on 2 August 2015 | 11:45 pm

DNS server attacks begin using BIND software flaw

Attackers have started exploiting a flaw in the most widely used software for the DNS (Domain Name System), which translates domain names into IP addresses.Last week, a patch was issued for the denial-of-service flaw, which affects all versions of BIND 9, open-source software originally developed by the University of California at Berkeley in the 1980s.The flaw can be exploited with a single packet, crashing both authoritative and recursive DNS servers. Security analysts predicted that attackers would quickly figure out how to exploit the flaw, which has now happened.“We can confirm that the attacks have begun,” wrote Daniel Cid, CTO and founder of the security company Sucuri. “DNS is one of the most critical parts of the Internet infrastructure, so having your DNS go down, it also means your email, HTTP and all other services will be unavailable.”To read this article in full or to leave a comment, please click here

Posted by on 2 August 2015 | 8:05 pm

Fake Apple iOS crash reports prove tricky to remove

Some Apple mobile users have been encountering a pop-up message that is particularly difficult to close.The message appears after a user has been redirected to a different domain, usually caused by viewing a malicious advertisement, wrote Jerome Segura, a senior security researcher with Malwarebytes.The message warns that a third-party application on the phone has caused the device to crash and includes a phone number where users can allegedly get their device fixed.Warnings such as this one are employed by technical support schemes, which convince people to call their support lines by falsely warning that their computers or devices have security or performance problems.To read this article in full or to leave a comment, please click here

Posted by on 2 August 2015 | 7:55 pm

Genetic programming meets regular expressions

 If you’ve ever done any serious programming you’ll have run into something called regular expressions:  ... (abbreviated regex or regexp and sometimes called a rational expression) is a sequence of characters that define a search pattern, mainly for use in pattern matching with strings, or string matching, i.e. "find and replace"-like operations. … Regular expressions are so useful in computing that the various systems to specify regular expressions have evolved to provide both a basic and extended standard for the grammar and syntax; modern regular expressions heavily augment the standard.To read this article in full or to leave a comment, please click here

Posted by on 2 August 2015 | 7:16 pm

Microsoft will NOT email you Windows 10, it's ransomware

A few days ago, over 14 million machines had been upgraded to Windows 10, but millions of other people who used the “Get Windows 10” app are impatiently waiting for Microsoft to notify them that it is their turn to download Windows 10. The app says Microsoft is rolling out the free upgrade in waves: “Watch for your notification so that you can start your upgrade. Your notification to upgrade could come as soon as a few days or weeks.”That notification has become an exploitation opportunity for bad guys who are sending out fake Windows 10 upgrade emails along with supposedly zipped Windows 10 download attachments that ultimately install ransomware on victims’ PCs.To read this article in full or to leave a comment, please click here

Posted by on 2 August 2015 | 11:58 am

The Verizon Network Extender: Still crappy after all these years.

I’ve written about the Verizon Network Extender several times (the first was just over three years ago here on Network World) and it’s a topic that just keeps on giving. Since that first article I have received over one hundred messages from seriously unhappy readers who found the device to be, shall we say, “subpar”. Verizon The Verizon Network Extender (which is made by Samsung, SCS-2U01)To read this article in full or to leave a comment, please click here

Posted by on 1 August 2015 | 4:20 pm

Yahoo picks up fashion commerce site Polyvore

Marissa Mayer knows fashion, and she’s bringing more of it to Yahoo with her latest acquisition announced Friday.Yahoo has reached a deal to acquire Polyvore, an e-commerce site that lets you shop for “what’s trending in the style community,” Yahoo announced Friday. It hopes the deal will give it a place to sell more ads for retailers.The site lets users shop for clothing and accessories, but it also has a social networking component that lets users post collections of desired items, like they might on Pinterest. The majority of Polyvore’s users are women between the ages of 18 and 34, the company says.In its announcement, Yahoo cited advertising as a key driver of the deal. Yahoo will integrate Polyvore’s ads into Gemini, its native ads platform. Polyvore has more than 350 advertisers who are retailers, Yahoo said.To read this article in full or to leave a comment, please click here

Posted by on 31 July 2015 | 7:20 pm

IBM to buy upwards of 200,000 Macs annually

While iPad sales continue to plummet, the same can't be said for Apple's venerable Mac. During the last quarter alone, Apple sold 4.7 million Macs, representing a 9% increase from the same quarter a year-ago.And now comes word that Apple's Mac sales may get a small little boost in the form of a commitment from IBM to purchase upwards of 200,000 Macs annually. While the notion of IBM purchasing computers from Apple is somewhat surreal in a historic sense, the agreement shouldn't come as much of a surprise given IBM and Apple's recent collaboration on all things iPad.Word of IBM's new Mac-friendly initiative comes in the form of an internal video in which we see IBM CIO Jeff Smith talking about a conversation he had with Apple CIO Niall O'Connor.To read this article in full or to leave a comment, please click here

Posted by on 31 July 2015 | 6:27 pm

Mt. Gox CEO Karpeles arrested by Japanese police

The CEO of failed Bitcoin exchange Mt.Gox was arrested in Japan early Saturday by police, according to several media reports.Mark Karpeles faces charges related to the loss of 650,000 bitcoins worth hundreds of millions of U.S. dollars when the Tokyo-based trading exchange collapsed in February 2014.Karpeles, a French citizen, is suspected of accessing the company’s computer systems and falsifying financial data, according Japan’s Kyodo News.Japanese broadcaster NHK showed video of a man that appeared to be Karpeles being led to a car by police in a residential district of Tokyo. The TV station said the footage was recorded around 6:40am Saturday, or Friday afternoon U.S. time.To read this article in full or to leave a comment, please click here

Posted by on 31 July 2015 | 6:25 pm