Monday, July 27, 2015

John Chambers' 10 most memorable quotes as Cisco CEO

Watch hackers immobilize a car while it's traveling on a highway | 3 cloud industry groups announced this week. How do they affect each other?

Network World Voices of Networking

John Chambers' 10 most memorable quotes as Cisco CEO
As we reach the end of the John Chambers era at Cisco, here's a look back at some of the most memorable "Chambers-isms" over the years. Read More

WHITE PAPER: Riverbed Technology

How Today's Hybrid Enterprises Thrive in Disruptive Times
While hybrid architectures and SaaS applications bring significant cost and flexibility benefits to enterprise users, they're creating unprecedented challenges for IT. In order to prioritize according to business needs, and to deliver an optimal and consistent end-user experience. View Now>>

In this Issue


Solving Storage Sprawl in a Cloud Centric World
The new IT conundrum is to decide to rent infrastructure or build out your data center. The data explosion of the past decade has left many enterprises awash in a mixed and disjointed storage environment. View Now

Watch hackers immobilize a car while it's traveling on a highway
One brave Wired journalist agreed to drive a Jeep on a St. Louis highway while two hackers hacked it remotely, taking control of everything from the air conditioning to the transmission.The entire ordeal was captured on video, which you can view with the article at Wired. The hackers, Charlie Miller and Chris Valasek, had just two years earlier performed a similar hack while the same journalist drove a car slowly in a parking lot. The bigger difference that time was that the hack was performed through a laptop that was hardwired to the car's onboard diagnostic port, and which the hackers controlled from the backseat. In that case, they limited their exploits to toying with the seatbelt and honking the horn.To read this article in full or to leave a comment, please click here Read More

3 cloud industry groups announced this week. How do they affect each other?
Yesterday Rackspace and Intel jointly announced the "OpenStack Innovation Center." OpenStack is, of course, the open source cloud operating system launched five or so years ago by Rackspace and NASA. Since then it has grown up and now has its own foundation, massive industry buy-in and robust, stable code. So what are these two vendors doing that will change anything? According to the companies, the innovation center will provide two 1,000-node clusters to test out new features geared for large, enterprise deployments.Bear in mind that in the past week we have had a number of initiatives announced or expanded. We had the Cloud Native computing Forum, a Google-initiated program which itself has pretty broad industry buy-in. It is, at face value, focused on increasing the consistency of management platforms for cloud-native applications. It wants to make it easier for organizations to build, deploy, and manage cloud-scale apps. The subtext (and, yes, there generally is a subtext) is that Google knows full well that Amazon Web Services (AWS) is the king of the crowd in the public cloud and it sees the Kubernetes open source container management system as a sort of Trojan Horse that will help it gain some momentum in the field. It was noticeable that AWS wasn't a part of the CNCF announcement. If anyone needed proof of AWS' dominance, and Google's motivation for doing this, here's some: in Amazon's second quarter, AWS net sales were up 81.4% to $1.824 billion from $1.005 billion for the corresponding year-ago quarter.To read this article in full or to leave a comment, please click here Read More

New Apple Watch, iMac, and iPad models predicted later this year
Come this fall, it's no secret that all eyes will be focused on Apple refreshing its iPhone lineup. And though the iPhone continues to account for the vast majority of Apple's revenue, the company is hardly ignoring other products in its lineup.Analyst Ming-Chi Kuo, who has a rather impeccable track record with respect to Apple rumors, recently issued a research report relaying that Apple this coming fall has plans to introduce a bevy of new products.First off, we have the Apple Watch. Though Apple still hasn't disclosed official sales figures, Tim Cook during the company's earnings conference call yesterday indicated that sales thus far have exceeded expectations. Sales aside, Kuo writes that Apple is planning to introduce new Apple Watch Sport color options this fall, with yellow and rose gold reportedly being considered. Note, though, that the new color options aren't in relation to the band, but rather to the anodized aluminum casing.To read this article in full or to leave a comment, please click here Read More

Linux Foundation gathers heavy hitters for containerization orchestration body
We all know that cloud-native applications are different from legacy ones. Cloud apps have a tendency to use discrete application building blocks, to use distributed hardware, to have different scaling attributes, and to be iterative in nature. Of course, those are all generalizations, but they're fairly safe generalizations. The reason that containers, in general, and Docker in particular, have gotten such traction is because containerization totally lends itself to a cloud-native way of working. Like peanut butter and jelly. Or something.We've already seen some announcements around a movement to regularize the way container technologies work, and the one-time tension between container players Docker and CoreOS resolved for the common good with the announcement of the Open Container Initiative.To read this article in full or to leave a comment, please click here Read More

Proposal to split up Qualcomm is patently absurd
The proposed breakup of Qualcomm by activist investment firm Jana Partners, as reported by the Wall Street Journal this week, would be a blunder of biblical proportions. The equivalent of Delilah cutting off Samson's hair while he slept, dividing Qualcomm into separately traded semiconductor and technology licensing businesses would produce two companies of lesser value than the former whole.Qualcomm builds semiconductors because of the company's history in licensing the intellectual property from mobile telecom and radio research and design. In turn, the patents from this research and design create a synergy that accelerates the design and fabrication of new semiconductors without infringing on other companies' patents. For instance, the Qualcomm Snapdragon system on a chip (SoC) that powers the majority of smartphones is the product of Qualcomm's understanding of the needs of smartphone designers and skill in integrating radio technologies with digital processors. The Samson-like strength of its engineering team brought about the integration of 32- and 64-bit microprocessors and high-speed LTE radios on a single chip, reducing the cost of SoCs and shortening smartphone makers' time to market. Hyper-smart, hyper-aggressive, and wealthy Intel has yet to meld communications chips from its Infinion acquisition and Atom microprocessors into one chip, though this has been on its roadmap for at least three years.To read this article in full or to leave a comment, please click here Read More

WEBCAST: Accenture

Shaping the "We Economy"
The Accenture Technology Vision 2015 maps out a three-year set of technology trends that businesses should not ignore. Digitizing everything is giving birth to a new era of "digital ecosystems." View Now.

Car hackers urge you to patch your Chrysler, Ram, Durango, or Jeep
A hacker duo pretty much just made the case for going old school and steering clear of “smart” and “connected” vehicles as they remotely attacked one. Charlie Miller and Chris Valasek revealed 20 of the “most hackable” vehicles last year, but this year at Black Hat they will blow people’s mind when they present “Remote Exploitation of an Unaltered Passenger Vehicle.”It’s not the first remote hack; when DARPA’s Dan Kaufman remotely hacked a car for 60 Minutes, he triggered the windshield wipers, blasted the car’s horn and then disabled the brakes. That and a report (pdf) claiming that nearly all new cars can be hacked led to a lawsuit against GM, Ford and Toyota for "dangerous defects in their hackable cars."To read this article in full or to leave a comment, please click here Read More

4 steps to make DevOps safe, secure, and reliable
DevOps is one of the hottest trends in software development. It's all about helping businesses achieve agile service delivery – that is, moving applications from development to test to deployment as quickly as possible.Fast application deployment may seem at odds with robust security practices, which often take a go-slow approach to new or changed applications in order to verify that the applications are safe before letting them touch live data or business networks — or be exposed to the Internet or customers.Fortunately, there's nothing inherently risky or dangerous about DevOps and agile service delivery, as long as the right security policies are created and followed, and if automation eliminates unnecessary delay in ensuring compliance.To read this article in full or to leave a comment, please click here Read More

How the hospitality industry is embracing the Internet of Things
There's no question that the Internet of Things can make an enterprise more efficient. The harmonizing of sensors, devices, and data harmonized into one system gives rise to context-aware computation and enables the environment to respond instantly to change, be it in temperature, light, movement or other factors. This not only brings numerous new opportunities, but also significant cost savings, music to the ears of today's business leaders.But there's another side to the IoT coin. Recently, I've written about digital transformation and the impact it is having on traditional businesses. The IoT can enhance the personal experience of customers, who are mobile, connected, and eager to have more access and intelligence surrounding them.To read this article in full or to leave a comment, please click here Read More

Microsoft will remove reported revenge porn links from Bing, OneDrive and Xbox Live
Better late than never, Microsoft is cracking down on the “gross violations of privacy” that is revenge porn. Microsoft’s promise to remove links to revenge porn follows similar promises from Google, Facebook, Twitter and Reddit.To read this article in full or to leave a comment, please click here Read More

How Amazon Web Services can prevent repeating its recent outage
The recent AWS outage exposed the dependence of countless enterprise applications on a few cloud components. Nick Kephart published a very good analysis here that explains how a route leak from data center provider Axcelx was responsible for this incident. This is not a new problem. Route leaks caused by incorrect BGP advertisement have resulted in much larger outages.For example, YouTube was taken offline in 2008 when a relatively small carrier, Pakistan Telecommunication Company (PTCL), started sourcing the YouTube prefix. In response, direct peers started preferring the PTCL-originated prefix to the original YouTube advertisement. This problem also caused the Amazon outage, when an outsider started advertising address space belonging to Amazon, black holing traffic as a consequence.To read this article in full or to leave a comment, please click here Read More


Scaling Okta to 10 Billion Users
Cloud-based applications need to be secure and Okta is an identity network and platform that allows you to safely scale these tools overtime. Read this white paper to learn how you can prepare for growth and cloud identity management. View now

Gigamon launches security delivery platform for visibility into malicious network traffic
If you're familiar with Gigamon, you likely know them as the market-leading vendor in the emerging "visibility fabric" space. The company's products provide businesses with pervasive and intelligent network data across physical and virtual environments. The GigaVUE portfolio delivers the appropriate network traffic to management tools and platforms. I've often said that "you can't manage what you can't see," and Gigamon provides the necessary visibility data so organizations can improve the management of their IT infrastructure.However, Gigamon's information can also be used to help businesses improve their security posture. If you can't manage what you can't see, then it stands to reason that you can't secure what you can't see. One of the challenges with traditional security approaches is that it primarily focuses on preventing breaches, but once the perimeter has been penetrated, there's no way to detect it or remediate against it.To read this article in full or to leave a comment, please click here Read More

Apple already owns 75% of the smartwatch market
The Apple Watch has only been out for about three months now, but Apple's newfangled wearable already owns a commanding 75% of the growing smartwatch market.The news comes courtesy of Strategy Analytics which estimates that Apple has already shipped 4 million Apple Watch devices, a figure far higher than the 400,000 smartwatches Samsung is estimated to have sold during the second quarter of 2015."Global smartwatch shipments grew an impressive 457 percent annually from 1.0 million units in Q2 2014 to hit a record 5.3 million in Q2 2015," the report notes.To read this article in full or to leave a comment, please click here Read More

Internet of Things APIs aim to speed development
We're beginning to see tools that promise to ease the enterprise into the Internet of Things, a la 'shovels in a gold rush.' Remember the adage? Who got rich during the California Gold Rush? It wasn't the miners in many cases, it was the shovel vendors.I recently wrote about Samsung's all-in, production-ready IoT platform ARTIK that is geared towards developers in "Samsung launches Internet of Things boards," for example.Well, some of these IoT tools might help. Just like the shovels did.You can add Jilia to the list. Jilia is a cloud-based platform and toolkit for coming up with and building IoT projects. It consist of an Application Program Interface (API) framework with hardware.To read this article in full or to leave a comment, please click here Read More

Boeing subsidiary wants to use drones to infect PCs with Hacking Team spyware
After attending IDEX 2015 (International Defense Exhibition), Boeing subsidiary Insitu become interested in using its surveillance drones to deliver Hacking Team malware for even more surveillance.In April, an Insitu mechanical engineer intern sent an email to the Hacking Team which stated: We see potential in integrating your Wi-Fi hacking capability into an airborne system and would be interested in starting a conversation with one of your engineers to go over, in more depth, the payload capabilities including the detailed size, weight, and power specs of your Galileo System.To read this article in full or to leave a comment, please click here Read More

DDoS attack size is getting bigger, security firm says
DDoS attacks aren't going away anytime soon. In fact, they're getting bigger, according to network security company Arbor Networks. But there's good news for potential attacks in the Internet of Things arena—some heat is off there.DDoS, or Distributed Denial-of-Service, attacks are where numerous compromised computers are used to target a single system. In simple terms, the sheer size of the blast of traffic overwhelms the system.Large attacks Arbor Networks says that "while very large attacks are what makes headlines, average attacks are approaching one gigabit per second, and are rapidly becoming a real problem for more and more enterprises."To read this article in full or to leave a comment, please click here Read More


Best handheld Wi-Fi test tools

Here, we review four hardware-based products that you can throw in a laptop bag and carry around with you.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. CuBox-i4Pro: A whole lotta Linux or Android for not a whole lotta cash

2. Peeping into 73,000 unsecured security cameras thanks to default passwords

3. Thieves using a $17 power amplifier to break into cars with remote keyless systems

4. 9 Common Spanning Tree Mistakes

5. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac

6. 20 cool things you can do with a Raspberry Pi

7. How to solve Windows 7 crashes in minutes

8. 6 free network vulnerability scanners

9. How to solve Windows 8 crashes in less than a minute

10. 9 Linux distros to watch in 2015

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: