The technology that promises to be 100 times faster than current routers

Terahertz breakthrough, reining in the Hillary Clintons in your office and Microsoft turns to Linux to run its cloud


Speeding up wireless communication with THz

The need for speed it seems will never be sated. So it should come as good news to many that Japanese and US researchers working together believe they now have the key components necessary for ultrafast wireless communication that is 100 times faster than what is achievable using current routers.

The researchers say that using Terahertz (THz) frequencies will ease communication bottlenecks and vastly improve wireless communication speeds.

THz waves exist between the infrared and the microwave bands of the electromagnetic spectrum. THz oscillates at around 1 trillion times per second.

Previous tests have already shown that is possible to use to THz to facilitate local data transmission of up to 100Gbit/s. However, high-bandwidth communication technologies need to have the ability to combine multiple signals together and transmit them over one medium (multiplexing) and separate multiple data stream for further processing (de-multiplexing).

Real-world applications of THz have been hindered by difficulties in addressing this multiplexing and de-multiplexing requirement. However, the Japanese and US researchers have come up with a device they call the “leaky wave antenna” to address this problem.

A tool to help CIOs battle shadow IT

Employees logging onto the corporate network with their unauthorized devices and applications now have U.S. Secretary of State Hillary Clinton to look up to as shadow IT’s new poster child.

However, IBM is coming to the rescue of beleaguered CIOs and CSOs with a cloud-based tool scans a corporate network to smoke out unauthorized apps and provide users a more secure way to access them.

The Cloud Security Enforcer in hosted on the IBM cloud. Once the Cloud Security Enforcer has identified an unauthorized application, the tool securely configures the app so that it can view and direct its use. The tool also analyzes real-time threat data from IBM’s X-Force Exchange threat network which tracks more than 20 billion security events around the world.

Administrators can also use the tool to determine which data owned by an organization can and cannot be shared by employees.

To prevent breaches caused by human error, Cloud Security Enforcer uses security-focused connectors that can automatically assign sophisticated passwords to employees when they access third- party apps.

How to cut scope creep when buying enterprise software

Keeping user focused on their key requirements is essential to prevent scope creep in your organization’s software purchasing process.

When people keep adding requirements as a project progresses, there is a danger that the project will become too large and eventually fail, says Chris Doig, CEO of consulting firm Wayferry.

He warns that “unreasonable requirements” tend to crop up when users believe this is their one and only chance to get particular issues solved. Another issue is that most users typically focus mainly on their current pain points.

Doig suggests that project managers build better rapport with users to accurately determine their needs and rate requirements according to importance to come up with a requirements profile by which all products will be evaluated with.

 Microsoft cloud uses Linux

Microsoft traditionally frowned upon the open source community. However, recently the technology giant has admitted to it had to turn to Linux when it had to build its own switch software to run networking gear for its cloud services.

The new software system is called Azure Cloud Switch (ACS). Kamala Subramaniam, the principal architect for Microsoft Azure, describes it as Microsoft’s foray into building its own software for running devices such as switches.

“It is a cross-platform modular operating system for data centre networking built on Linux,” she says in her recent blog. “ACS allows us to debug, fix and test software bugs much faster.”

By running on Linux, ACS is able to use Microsoft, third-party and open source applications, according to Subramaniam.

Best of expertIP

How employers can alleviate their IT talent woes

Location, location, location. It’s a mantra that can work for the IT industry just as well as it does for real estate.

According to a recent study by job search engine Indeed, companies looking to hire IT professionals need to take location into account when mapping out their hiring strategy.

The study found that tech employees prefer to live and work in large cities with a robust technology community. In Canada, that typically means Toronto, Vancouver, Montreal, Calgary, and Ottawa.

This is something that companies based outside major urban tech hubs need to take into account when looking to attract IT talent, says Tara Sinclair, chief economist for Indeed.

Another hurdle is the existence of an employer-job seeker mismatch. She says the area of greatest interest from a job seeker point of view “aren’t always the areas of greatest need from the employer perspective.

Why the travel industry needs to up its mobile game

Travel apps that don’t work properly, a boarding pass that failed to load on your mobile device, ridiculously expensive hotel Wi-Fi that required users to log back in every 10 minutes.

We are now awash with applications designed to improve the way we travel, but may providers have still not fully integrated technology into the overall customer experience, and this could be mean bad news for such companies.

“While travel technology successes abound, some developments have left consumers underwhelmed,” according to a new report from Cision Global Insights. “For example, while many hotel- or airline-specific apps for booking travel exist, those apps are not widely accepted. … Even when users can compare multiple flights or hotels in one app, confusing layouts or search lag times may lead users to turn to other providers.”

Travel and hospitality providers that fail to deliver leading-edge technology risk lower occupancy rates and load levels, warns Joyce Gioia, business futurist and president of The Herman Group.

The most overlooked endpoint security weak spot

When it comes to evaluating endpoint security vulnerabilities, many organizations fail to focus their attention on one critical element – the user.

The majority of technology users continue to get duped into clicking on phishing links, opening malware-infested attachments and giving away their passwords, according to Social-Engineering.org, a non-profit group that provides social engineering education, training and consulting service.

During client audits and training exercises, Social-Engineering.org carried out over a five-year period, the group found that:

– 90 per cent of people provided their email addresses and the spelling of their names without confirming the identity of the researchers

– 67 per cent gave out their birthdates, social security numbers or employee numbers without verifying the team’s authenticity

Where does your firm rank on this 5-stage UCaaS maturity model?

IT departments that are mulling over how long their unified communications-as-a-service (UCaaS) journey would be might find it useful to look into The Enterprise Cloud Maturity Model.

The model examines overall business transformation, DevOps, and other areas, but it also has a section that deals with UCaaS which includes a scale by which organizations can judge their UCaaS maturity.

  1. ExtremeTech.com
  2. ITWorld.com
  3. CIO.com
  4. Wired.com
Comments are closed.