We are going to look at Dell from just before the deal went down and up until its second quarter of fiscal 2019, which ended in early August, and using the characterizations it currently has when it talks to Wall Street. —Timothy Prickett Morgan @The Next Platform
Token Ring, in its original form, was clearly a superior technology. For instance, because of the token passing capabilities, it could make use of more than 90% of the available bandwidth. In contrast, Ethernet systems, particularly early Ethernet systems used a true “single wire” broadcast domain. The Fiber Distributed Data Interface (FDDI), is like Token Ring in many ways.
The new Verizon service will apparently be offered at a 300 Mbps baseline speed, with higher speeds possible where customer location relative to the 5G/FTTN hybrid sites is favorable. You could, they say, get up to a gig, which for those prices would be a revolutionary bargain in itself. —Tom Nolle @CIMI
Network automation of complex configurations is much, much harder than automation of simple configurations. What makes a configuration complex and what is required in an automation system to handle complex configurations? — Terry Slattery @Netcarftsmen
Carpenters always remember one simple piece of advice when they are working on a job: Measure twice, cut once. It’s a little different in networking, though. In our industry, my advice is the following: Measure many times, but never cut. @Search Networking
You install a new app on your phone, and it asks for access to your email accounts. Should you, or shouldn’t you? TL;DR? You shouldn’t. When an app asks for access to your email, they are probably reading your email, performing analytics across it, and selling that information. Something to think about: how do they train their analytics models? By giving humans the job of reading it.
When you shut your computer down, the contents of memory are not wiped. This means an attacker can sometimes grab your data while the computer is booting, before any password is entered. Since 2008, computers have included a subsystem that wipes system memory before starting any O/S launch—but researchers have found a way around this memory wipe.
You know when your annoying friend talks about the dangers of IoT when you bragging about your latest install of that great new electronic doorlock that works off your phone? You know the one I’m talking about. Maybe that annoying friend has some things right, and we should really be paying more attention to the problems inherent in large scale IoT deployments. For instance, what would happen if you could get the electrical grid in Continue reading
This is leading an increasing number of companies to outsource part or, in some cases most, of the day-to-day maintenance of their IT operations to third-party providers. Fueled by the growth of cloud computing, IT managed service providers (MSPs) can host and manage customers’ IT infrastructure more flexibly and more efficiently than ever. —Christine Horton @Tom’s Hardware
According to preliminary results of the latest OpenStack user survey – the results of which will be published at the OpenStack Summit in Berlin in November – somewhere around 20 percent to 25 percent of customers are using the Ironic bare metal plug-in for OpenStack in production. —Timothy Prickett Morgan @The Next Platform
When you think of a Distributed Denial of Service (DDoS) attack, you probably think about an attack which overflows the bandwidth available on a single link; or overflowing the number of half open TCP sessions a device can have open at once, preventing the device from accepting more sessions. In all cases, a DoS or DDoS attack will involve a lot of traffic being pushed at a single device, or across a single link.
But if you look at an entire system, there are a lot of places where resources are scarce, and hence are places where resources could be consumed in a way that prevents services from operating correctly. Such attacks would not need to be distributed, because they could take much less traffic than is traditionally required to deny a service. These kinds of attacks are called tail attacks, because they attack the long tail of resource pools, where these pools are much Continue reading
While the Information Technology and Communications industry has been drumming the importance of the digital transformation trend for several years now, the progress to date has been lackluster. However, with the awareness of digital transformation hitting the mainstream, it is now beginning to seem like things are about to change. —Juha Holkkola @CircleID
Kubernetes is emerging as one of the best resource schedulers of our times. The powerful scheduler, which is also simple and extensible enables us to solve many problems that existed in traditional distributed systems. —Janakiram MSV @The New Stack