Archive

Category Archives for "Networking"

Controlling Vagrant Box Management IP

One of the quirks of Vagrants Virtualbox provider is you cannot configure the IP address of the management interface. It's a core design principal of the project that the management interface IP of a box is configured via DHCP. The Virtualbox provider uses port forwarding with a NAT network...

Top 10 reasons why moving to private cloud isn’t as scary as you think

It’s late October now, which means Halloween (and our upcoming themed webinar, which you can register for here) is right around the corner. This time of year reminds people of lots of scary things such as goblins, zombies, witches and other monsters that go bump in the night. While these creatures aren’t real (at least not for the other 364 days of the year), one very real thing that often gives IT and business leaders nightmares is moving to a private cloud. Today, businesses are moving to the cloud faster than a ring wraith in pursuit of Frodo Baggins. Move too slow and the business will fall behind and perhaps never catch up.

The private versus public cloud debate has raged on for well over a decade and CIOs want to ensure that they’re making the best decision. However, deploying a private cloud only seems scary to some because they’re not aware of the benefits of private clouds. A private cloud delivers the same scale and self-service benefits as a public cloud but does so with a modernized architecture designed for a single enterprise. If that’s not enough to convince you, then check out these 10 reasons why the Continue reading

Increase your network security: Deploy a honeypot

Have you ever wondered how a hacker breaks into a live system? Would you like to keep any potential attacker occupied so you can gather information about him without the use of a production system? Would you like to immediately detect when an attacker attempts to log into your system or retrieve data? One way to see and do those things is to deploy a honeypot. It’s a system on your network that acts as a decoy and lures potential hackers like bears get lured to honey. Honeypots do not contain any live data or information, but they can contain false information. Also, a honeypot should prevent the intruder from accessing protected areas of your network.To read this article in full or to leave a comment, please click here

Increase your network security: Deploy a honeypot

Have you ever wondered how a hacker breaks into a live system? Would you like to keep any potential attacker occupied so you can gather information about him without the use of a production system? Would you like to immediately detect when an attacker attempts to log into your system or retrieve data? One way to see and do those things is to deploy a honeypot. It’s a system on your network that acts as a decoy and lures potential hackers like bears get lured to honey. Honeypots do not contain any live data or information, but they can contain false information. Also, a honeypot should prevent the intruder from accessing protected areas of your network.To read this article in full or to leave a comment, please click here

Increase your network security: Deploy a honeypot

Have you ever wondered how a hacker breaks into a live system? Would you like to keep any potential attacker occupied so you can gather information about him without the use of a production system? Would you like to immediately detect when an attacker attempts to log into your system or retrieve data? One way to see and do those things is to deploy a honeypot. It’s a system on your network that acts as a decoy and lures potential hackers like bears get lured to honey. Honeypots do not contain any live data or information, but they can contain false information. Also, a honeypot should prevent the intruder from accessing protected areas of your network.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Technology helps first responders fight California fires

Fires have laid to waste huge swaths of Northern California. The deadly blazes have burned through more than nearly 400 square miles forcing 100,000 people to evacuate, and destroying over 8,400 structures.How do firefighters respond to such a disaster? Where are they dispatched? When and where are evacuations ordered? How can a fire being propelled by 78mph gusts of wind be contained? How do planes know where and when to deploy fire retardant?Sensors, drones, fire-cams, crowdsourcing and geographical information systems all help minimize damage and deaths.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 7 ways IoT is reshaping the internet

Two decades ago, the Internet was the shiny new object in the room. The Worldwide Web was just emerging as a new paradigm for communication and commerce, and the world brimmed with possibilities. Today, not only has the Internet fulfilled those nascent dreams, it has become the undisputed foundation of the digital age.But now there’s a new paradigm in town—the Internet of Things (IoT).For years, IoT has been growing up inside factories and oil platforms, in ships, trucks, and trains—quietly changing long-standing industrial processes. It has made its way into virtually every industry—agriculture, aviation, mining, healthcare, energy, transportation, smart cities, and on and on. IoT is no longer just the next phase of the Internet—it’s fundamentally reshaping the Internet as we know it.To read this article in full or to leave a comment, please click here