The World of Data More Infographics on Good The Slow Death of Cash Paper currency: Writer David Wolman at a book signing near Harvard University. The End of Money reads like a late-night walk through the seedier corners of the global economy. There’s the small-town Baptist minister who calls electronic commerce the “Mark of the Beast,” the North Korean printing presses turning out counterfeit $100 supernotes, and the strange German ATM that spits out gold coins. End times are a-coming. For author David Wolman, it’s paper money that is due for a rethink and possibly a decommissioning. In his book, he assembles some convincing arguments that good old cash is much more expensive to society than anyone realizes. The alternative is electronic money. Wolman stops just short of advocating against paper money. TR: What’s the big picture? Wolman: When it comes to U.S. dollars in circulation, the estimate finally broke the $1 trillion mark a year ago. In your book, you write, “we may very well be on the brink of a monetary revolution.”
Presidential Proclamation--National Cybersecurity Awareness Month The White House Office of the Press Secretary For Immediate Release October 03, 2011 Americans, along with people around the world, depend on the Internet and digital tools for all aspects of our lives -- from mobile devices to online commerce and social networking. Early in my Administration, we began updating our Nation's cybersecurity programs and policies. Every American has a stake in securing our networks and personal information, and we are working across the public and private sectors to ensure coordinated and planned responses to cyber incidents, as we do with natural disasters. Cybersecurity is a necessity for both businesses and consumers, and that is why we released the National Strategy for Trusted Identities in Cyberspace. The same American ingenuity that put a man on the moon also created the Internet, launching an information revolution.
You Suck at Infographics An infographic, or information graphic, is designed to convey a huge set of data in a fraction of the time that it takes to wade through a dense, numbers-heavy paragraph. The best ones are also entertaining. According to Stew Langille, the CEO of data visualization start-up Visual.ly, the average pageview for a newspaper infographic is about 30 times that of a text-based article. But creating an effective infographic is much more difficult than just arranging a few charts around a cartoon character. It requires graphic designers to tap into their inner data analyst and journalist — to crunch numbers and craft a convincing narrative. Knowing that, Visual.ly recently relaunched its site with a social component that makes it easier for writers and number-crunchers to connect with the over 20,000 designers who’ve created a profile on the site. Click to Open Overlay Gallery 1. An infographic starts with a great data set. 2. 3. 4. Go Back to Top.
Boeing Buys Sunnyvale's Narus - SVDaily.com POSTED July 8, 2010 ST. LOUIS -- Boeing announced an agreement to acquire Narus, a leading provider of real-time network traffic and analytics software used to protect against cyber attacks and persistent threats aimed at large Internet Protocol networks. Narus employs approximately 150 people globally; its headquarters are in Sunnyvale, CA. “This acquisition is another step forward in our strategy to develop integrated solutions for better network visibility, threat detection, and cybersecurity,†said Roger Krone, president of Boeing Network & Space Systems, a business within the Boeing Defense, Space & Security (BDS) operating unit. “Narus’ innovative employees and unique capabilities to secure complex networks will be a significant benefit to Boeing and our customers.†Narus is privately held and the terms of the transaction were not disclosed. Return to SVDaily Home Page © Copyright SVDaily.com
Networks and Communication Systems Branch The Common Open Research Emulator (CORE) is a tool for emulating networks on one or more machines. You can connect these emulated networks to live networks. CORE consists of a GUI for drawing topologies of lightweight virtual machines, and Python modules for scripting network emulation. CORE has been developed by a Network Technology research group that is part of the Boeing Research and Technology division. Key Features Network lab in a box Efficient and scalable Easy-to-use GUI canvas Centralized configuration and control Runs applications and protocols without modifying them Real-time connection to live networks Hardware-in-the-loop Distributed with multiple COREs Highly customizable CORE Demonstrations Click on a topic below for a short demonstration. CORE Documentation The CORE Manual (PDF, HTML) covers installation, usage, and more. CORE Downloads CORE downloads are available at Comments and Questions Additional Links Citations
Deep Packet Inspection (DPI): U.S. Government Market Forecast 2010-2015 | Market Research Media Updated: February 2013 – The U.S. government-related IP traffic will increase tenfold from 2013 to 2018. US-China cyber confrontation is nothing new but Chinese hacking attacks and the U.S. Administration’s new hardball policy shift with China (US arms sale to Taiwan and US-China currency spat) will likely add fuel to the fire of cyber war. Deep Packet Inspection is the only currently available technology capable to provide security of IP traffic at ever growing rates that has inherent traffic management capabilities. In 2011, we’ve seen a palpable shift from reactive approach to cyber security to proactive (Einstein – US-CERT programs) and attitude change of federal CIO’s with regard to Deep Packet Inspection (DPI). Given the severity of recent Chinese hacking attacks and the potential catastrophic consequences of critical networks disruption, DPI technology is in a favorable position to emerge as a major line of cyber defense for years to come. Deep Packet Inspection (DPI): U.S. 1.
IP & Convergence - SBC, DPI on Genband's Hit List NEW YORK -- Genband Inc. has made its mark by biting off Nortel Networks Ltd. 's Carrier VoIP and Application Solutions (CVAS) business about 18 months ago and, generally, by helping carriers make the jump to VoIP, but the company continues to pursue other growth paths that tie into the ongoing "network transformation." (See Genband Wins Nortel's Carrier VoIP Biz.) Speaking here at the company's analyst's day, Genband CEO Charlie Vogt paid some special attention to the company's interest in penetrating the session border control (SBC) and deep packet inspection (DPI) markets. It's got its own SBC product, and is working with Procera Networks Inc. (Nasdaq: PKT) to tack on DPI. While everyone is chasing Acme Packet Inc. Acme Packet commands more than half of the SBC market and Genband is fourth, with just 5 percent, according to Infonetics Research Inc. data. "We have to get to that 10 to 12 percent range to make it interesting for us," Vogt said. And others probably have the same idea.
PricewaterhouseCoopers Media Centre - PwC engages with global cyber community to highlight rapidly growing threat Ahead of day one of the London Conference on Cyberspace, hosted by the Foreign & Commonwealth Office, PwC calls on business and government leaders to take ultimate responsibility for cyber security and collaborate together more closely to address the pressing cyber threat. William Beer, a director in PwC’s cyber and information security practice, said: “The cyber security industry is in freefall. “Cyber security is no longer only in the realm of the CISO or the head of IT, it is up to senior leaders to put this at the top of their agenda and collaborate more closely with other organisations. Ed Gibson, a director in PwC's U.S. forensics practice and a former FBI Special Agent and chief cyber security advisor for Microsoft–UK, said: “We have seen a shift in the last couple of years. “The axiom ‘information is power’ has gained even deeper resonance. 1. The CEO needs to come to grips with the threats from the Internet—which is why PwC has introduced the concept of the ‘cyber savvy CEO’. 2.