Archive

Category Archives for "Networking"

Shredding files on Linux

The rm command easily makes files disappear from our file listings, but what does it actually do and how can we ensure that files are unlikely to be recoverable?A little background To understand what happens when you remove a file from a Linux system with rm, first think about inodes -- those intriguing data structures that keep track of all of a file's attributes -- often called "metadata" -- that describe the file. This includes its name, its owner and group, what permissions have been established and where the file's contents can be found on the disk.Next, think about Linux directories. While they take the appearance and character of folders (i.e., merely containers for holding files) they are actually files themselves -- files that include no more than the names and inode numbers of the files they "contain". So, what we get is a convenient way to think about directories and files in the same way you might think about the folders and paperwork in your file cabinets (if any of you still have one of those).To read this article in full, please click here

Automation for Success

Businesses with high growth, complex tasks and repetition, tend to rely on or require automation to fulfill business challenges. Introducing automation is not without challenges and sometimes they can be quite significant. Identifying success is one of the early crucial activities that creates a business alignment. The identification exercise highlights justification for one more decisions and the removal of friction. Some of the decisions are not easy to make and friction is not easy to experience without applying pressure to various parts of an organization.

What follows is a number of scenarios with some reasoning around the kind of challenges that you’re already facing or likely to face.

If the absolute reasons are known, accepted and aligned against, you have just laid one of the foundational layers for success.

Challenge: High Growth

Great news and bad news. You’re in a business under stress from high growth! Lots of great challenges to solve and high pressure from not having them currently solved.

With high growth businesses, engineers or administrators are not under threat of being “automated out of their job”. If you identify as one of these people, you have an opportunity to learn new skills, be rewarded for finishing projects Continue reading

IDG Contributor Network: A technology horror story: The day the marketing guy joined the hackathon

The fifth floor of the cafeteria at Cato’s Israeli office transformed last Thursday morning into a celebration of innovation, coding, and food. Our 2018 Hackathon was kicking off with a sumptuous breakfast buffet decorating the tables, and flags of the 10 project teams dotting the floor-to-ceiling windows that looked out onto southern Tel Aviv.Hackathons are usually meant for folks who know something about, well, hacking code. But the dynamic duo who conceived and ran the event – Eyal, our director of product management, and Jordana, Cato’s human resources manager – poked, prodded, and dare I say implored, every employee to join the festivities – and I do mean everyone. The call to sign up for Cato’s Hackathon wasn’t just limited those who could program in C but even employees who could spell with a C – all were encouraged to sign up.  Thankfully singing in C wasn't a requirement.To read this article in full, please click here

IDG Contributor Network: A technology horror story: The day the marketing guy joined the hackathon

The fifth floor of the cafeteria at Cato’s Israeli office transformed last Thursday morning into a celebration of innovation, coding, and food. Our 2018 Hackathon was kicking off with a sumptuous breakfast buffet decorating the tables, and flags of the 10 project teams dotting the floor-to-ceiling windows that looked out onto southern Tel Aviv.Hackathons are usually meant for folks who know something about, well, hacking code. But the dynamic duo who conceived and ran the event – Eyal, our director of product management, and Jordana, Cato’s human resources manager – poked, prodded, and dare I say implored, every employee to join the festivities – and I do mean everyone. The call to sign up for Cato’s Hackathon wasn’t just limited those who could program in C but even employees who could spell with a C – all were encouraged to sign up.  Thankfully singing in C wasn't a requirement.To read this article in full, please click here

Rackspace, HPE expand on-premises cloud with pay-as-you-go Kubernetes

HPE and Rackspace are building on their alliance from last November, when they first introduced an OpenStack-based pay-per-use system designed to compete with public cloud providers.The two now offer pay as you go to Rackspace’s VMware and Kubernetes private cloud services. Rackspace launched its Kubernetes private cloud managed service just last month. The initial pay-as-you-go system was for standard server-side apps. This new feature adds Kubernetes container management as an option.Rackspace has deployed HPE’s new GreenLake Flex Capacity service to provide the pay-as-you-go pricing model. GreenLake is one of many programs by enterprise hardware vendors to provide on-demand pricing to companies looking to rein in data center costs.To read this article in full, please click here

Rackspace, HPE expand on-premises cloud with pay-as-you-go Kubernetes

HPE and Rackspace are building on their alliance from last November, when they first introduced an OpenStack-based pay-per-use system designed to compete with public cloud providers.The two now offer pay as you go to Rackspace’s VMware and Kubernetes private cloud services. Rackspace launched its Kubernetes private cloud managed service just last month. The initial pay-as-you-go system was for standard server-side apps. This new feature adds Kubernetes container management as an option.Rackspace has deployed HPE’s new GreenLake Flex Capacity service to provide the pay-as-you-go pricing model. GreenLake is one of many programs by enterprise hardware vendors to provide on-demand pricing to companies looking to rein in data center costs.To read this article in full, please click here

5 reasons the IoT needs its own networks

Last week, AT&T said it would launch a Narrow Band-IoT (NB-IoT) network in the United States and Mexico. And this isn’t the first network dedicated to the Internet of Things that AT&T is working on. The carrier had previously announced an IoT network using the LTE-M standard to cover some 400 million people in the U.S. and Mexico by the end of last year.Just as important, many other U.S. carriers also have various flavors of low-power IoT networks in the works, including Verizon, T-Mobile, Sprint, and even Dish Network.To read this article in full, please click here

5 reasons the IoT needs its own networks

Last week, AT&T said it would launch a Narrow Band-IoT (NB-IoT) network in the United States and Mexico. And this isn’t the first network dedicated to the Internet of Things that AT&T is working on. The carrier had previously announced an IoT network using the LTE-M standard to cover some 400 million people in the U.S. and Mexico by the end of last year.Just as important, many other U.S. carriers also have various flavors of low-power IoT networks in the works, including Verizon, T-Mobile, Sprint, and even Dish Network.To read this article in full, please click here

NIC.BR and the Internet Society Work Together to Increase Routing Security in Brazil

This week on Tuesday, 26 June, the Internet Society and NIC.BR signed a Memorandum of Understanding (MoU) to work together to increase routing security in Brazil, including the MANRS initiative. Mutually Agreed Norms for Routing Security is a global initiative that provides crucial fixes to reduce the most common routing threats.

We are excited to strengthen our efforts to work together with NIC.br, and in fact this MoU only formalizes an existing long-term relationship between the two organizations. Our goal is to help increase the number of Brazilian Internet Service Providers and Internet Exchange Points joining efforts for a more secure and resilient Internet.

Not a single day goes by without dozens of incidents affecting the Internet’s routing system. Route hijacking, route leaks, IP address spoofing, and other harmful activities can lead to Denial of Service (DoS) attacks, traffic inspection and surveillance, lost revenue, reputational damage, and more. As one of the biggest countries with high access rates, Brazil is also facing these incidents on a daily basis.

NIC.BR is responsible for the coordination and integration of all Internet service initiatives in Brazil, including long-standing activities related to Internet security. They are also responsible for many projects that Continue reading