Archive

Category Archives for "Networking"

3 real-world examples of IoT rolled out in the enterprise

Buying into IoT comes with a wealth of benefits, but adopting heavy use of the internet of things means more than plugging in devices and waiting for the data to pour in; it means modifying network infrastructure to accommodate them.This is not a trivial consideration. If the network doesn’t adequately support all aspects of IoT, a company may be unable to take advantage of all that data and will fail to realize the return on investment it was hoping for.+Related: Feds consider tougher requirements for IoT security;  IoT Security for Health Care is in critical condition; What is IoT?+To read this article in full or to leave a comment, please click here

IDG Contributor Network: WANs, tunnels and tags are things of the past

It is probably safe to assume that private networking has been an afterthought. In fact, the Internet Engineering Task Force (IETF) document (RFC 1918) that created private network addresses that are “un-routable” was released years after BGP-4 and IPV6 were codified into standards.In order to join private networks to each other, wide area networks (WANs) emerged. Initially, the benefits obtained by WANs were just pure connectivity. Subsequent benefits accrued, including the belief that private networks were secure because addresses of servers and clients in the private address could not be reached from the public network unless a “translation” or rule was established. This, however, may no longer be the case.To read this article in full or to leave a comment, please click here

IDG Contributor Network: WANs, tunnels and tags are things of the past

It is probably safe to assume that private networking has been an afterthought. In fact, the Internet Engineering Task Force (IETF) document (RFC 1918) that created private network addresses that are “un-routable” was released years after BGP-4 and IPV6 were codified into standards.In order to join private networks to each other, wide area networks (WANs) emerged. Initially, the benefits obtained by WANs were just pure connectivity. Subsequent benefits accrued, including the belief that private networks were secure because addresses of servers and clients in the private address could not be reached from the public network unless a “translation” or rule was established. This, however, may no longer be the case.To read this article in full or to leave a comment, please click here

IDG Contributor Network: WANs, tunnels and tags are things of the past

It is probably safe to assume that private networking has been an afterthought. In fact, the Internet Engineering Task Force (IETF) document (RFC 1918) that created private network addresses that are “un-routable” was released years after BGP-4 and IPV6 were codified into standards.In order to join private networks to each other, wide area networks (WANs) emerged. Initially, the benefits obtained by WANs were just pure connectivity. Subsequent benefits accrued, including the belief that private networks were secure because addresses of servers and clients in the private address could not be reached from the public network unless a “translation” or rule was established. This, however, may no longer be the case.To read this article in full or to leave a comment, please click here

Brazil needs to involve all stakeholders in Internet governance

Last week the Brazilian government, through the Ministry of Science, Technology, Innovation and Communication, launched an open consultation as part of a process for reviewing the current structure and mission of the Brazilian Internet Steering Committee, the CGI.Br. 

[Note: Portuguese version of this post included below.]

An evaluation and review of a Governance mechanism is natural and something that should not call the attention of anybody.  The particularity here is that the announcement was unexpected, showing that the criteria to be used, the objectives of the review, and the process itself were not done in a multistakeholder manner.

Mr. Raúl Echeberría

All you need to know about Unix environment variables

Simply put, environment variables are variables that are set up in your shell when you log in. They are called “environment variables” because most of them affect the way your Unix shell works for you. One points to your home directory and another to your history file. One identifies your mail file while another controls the colors that you see when you ask for a file listing. Still another sets up your default search path.If you haven’t examined your environment variables in a while, you might be surprised by how many of them are configured. An easy way to see how many have been established in your account is to run this command: $ env | wc -l 25 The env command (or printenv) will list all of the enviroment variables and their values. Here’s a sampling:To read this article in full or to leave a comment, please click here

4 tips for managing big data from IoT in your network

Big Data and the Internet of Things. The two seem to go hand in hand, even if there are some important differences between them. As IoT becomes a greater reality, it’s important that your network devops team is ready for its huge impact on your systems and networks. In this post, we’ll cover the basics, like the difference between big data and the Internet of Things, and then we’ll go into more detail about how to ensure your network is managing big data from IoT effectively.

The Internet of Things: a hot topic

The Internet of Things has been a hot topic in recent years. Little wonder, since its potential is increasing daily. From Bluetooth accessible devices such as smart appliances and smart homes, to wearable technology, to smart cars, to energy plants and wind turbines, smart technology is growing fast. Along with this technology is the need to support these devices both in network and storage. By 2025 McKinsey expects IoT will generate $11.1 Trillion annually. Companies are rushing to find ways to capitalize on IoT and the big data it will generate.

Differences between the Internet of Things and big data

Big Data is an interesting concept Continue reading