Archive

Category Archives for "EtherealMind"

Can Network Startups Stay Small and Survive ?

A client recently asked me about startups in the networking space and how to pick the one whose products be around for five years. After some research and reflection, I am beginning to realise that size doesn’t matter like it used to. While big companies selling hardware have big costs, small companies selling software can […]


The post Can Network Startups Stay Small and Survive ? appeared first on EtherealMind.

Basics: The Difference Between Bandwidth and Speed

A link in a network is determined by two factors, bandwidth and speed. These are usually the same but not always. Speed is bit rate of the circuit while bandwidth is the amount of “speed” available for use. As an example, a 500 Megabit Ethernet MPLS service which uses a 1 Gigabit Ethernet connection to site […]


The post Basics: The Difference Between Bandwidth and Speed appeared first on EtherealMind.

Blessay: Enterprise IT Comes Last In Technology Innovation

There was a time when Enterprise IT defined the future of computing. Laptops were designed for corporate consumption first and the best software was sold to enterprise for business use. The other markets for computers was “home users” who were offered cheap, low quality and low performance versions of corporate computers. IT was critical to the […]


The post Blessay: Enterprise IT Comes Last In Technology Innovation appeared first on EtherealMind.

Response: Whats New in systemd, 2015 Edition

Summary of a presentation at FOSDEM about systemd is very interesting. Lots of improvements and practical changes from what I can see that would Linux more usable and viable. But this caught my eye about replacing syslog with HTTP: journald-remoting: the binary logger now has remote support (aka: remoting) via HTTP (instead of the syslog […]


The post Response: Whats New in systemd, 2015 Edition appeared first on EtherealMind.

Vendor Marketing as a Security Risk – Badge Scans and Sign-up Attack Vectors

Many old-style marketing people believe that capturing your contact information is the first step in making a sale. But any capture of your personal information is also leaking critical security information about your organisation, technology and personnel that are perfect for reconnaisance.


The post Vendor Marketing as a Security Risk – Badge Scans and Sign-up Attack Vectors appeared first on EtherealMind.

1 38 39 40 41 42 46