Archive

Category Archives for "Networking"

BrandPost: Integrating SD-WAN into the Enterprise

Software-Defined Wide Area Network (SD-WAN) is a hot technology offering today, as enterprises look for faster, more flexible WAN capabilities. When it comes to new remote locations, SD-WAN is a timely, effective option. But when it comes to existing infrastructure, what are the factors that go into determining whether an SD-WAN replacement makes sense, or when to leave well-enough alone?“Enterprises have been using WANs for decades, primarily to connect their remote offices or branches with their headquarters by leasing secure networking capabilities from telco carriers and running private networks over them,” industry analyst and Intellyx President Jason Bloomberg writes in a Forbes.com article. “The underlying WAN protocols have evolved over the years, and the current one is Multiprotocol Label Switching (MPLS).”To read this article in full or to leave a comment, please click here

3 Ways to Fail at Logging with Flask

For the benefit of readers who haven't worked with Flask or don't know what Flask is, it's a so-called microframework for writing web-based applications in Python. Basically, the framework takes care of all the obvious tasks that are needed to run a web app. Things like talking HTTP to clients, routing incoming requests to the appropriate handler in the app, and formatting output to send back to the client in response to their request. When you use a framework like this, you as the developer can concentrate a lot more on the application logic and worry a lot less about hooking the app into the web.

As you may have guessed from the title of this post, one of the other tasks that Flask manages is logging within the application. For example, if you want to emit a log message when a user logs in or when they upload a new photo, Flask provides a simple interface to generate those log messages.

Flask has a large community of active users built around it and as a result, there's tons of best practice information out there on scaling, talking to a database, and even whole tutorials on how to Continue reading

Controlling Vagrant Box Management IP

One of the quirks of Vagrants Virtualbox provider is you cannot configure the IP address of the management interface. It's a core design principal of the project that the management interface IP of a box is configured via DHCP. The Virtualbox provider uses port forwarding with a NAT network...

Top 10 reasons why moving to private cloud isn’t as scary as you think

It’s late October now, which means Halloween (and our upcoming themed webinar, which you can register for here) is right around the corner. This time of year reminds people of lots of scary things such as goblins, zombies, witches and other monsters that go bump in the night. While these creatures aren’t real (at least not for the other 364 days of the year), one very real thing that often gives IT and business leaders nightmares is moving to a private cloud. Today, businesses are moving to the cloud faster than a ring wraith in pursuit of Frodo Baggins. Move too slow and the business will fall behind and perhaps never catch up.

The private versus public cloud debate has raged on for well over a decade and CIOs want to ensure that they’re making the best decision. However, deploying a private cloud only seems scary to some because they’re not aware of the benefits of private clouds. A private cloud delivers the same scale and self-service benefits as a public cloud but does so with a modernized architecture designed for a single enterprise. If that’s not enough to convince you, then check out these 10 reasons why the Continue reading

Increase your network security: Deploy a honeypot

Have you ever wondered how a hacker breaks into a live system? Would you like to keep any potential attacker occupied so you can gather information about him without the use of a production system? Would you like to immediately detect when an attacker attempts to log into your system or retrieve data? One way to see and do those things is to deploy a honeypot. It’s a system on your network that acts as a decoy and lures potential hackers like bears get lured to honey. Honeypots do not contain any live data or information, but they can contain false information. Also, a honeypot should prevent the intruder from accessing protected areas of your network.To read this article in full or to leave a comment, please click here

Increase your network security: Deploy a honeypot

Have you ever wondered how a hacker breaks into a live system? Would you like to keep any potential attacker occupied so you can gather information about him without the use of a production system? Would you like to immediately detect when an attacker attempts to log into your system or retrieve data? One way to see and do those things is to deploy a honeypot. It’s a system on your network that acts as a decoy and lures potential hackers like bears get lured to honey. Honeypots do not contain any live data or information, but they can contain false information. Also, a honeypot should prevent the intruder from accessing protected areas of your network.To read this article in full or to leave a comment, please click here

Increase your network security: Deploy a honeypot

Have you ever wondered how a hacker breaks into a live system? Would you like to keep any potential attacker occupied so you can gather information about him without the use of a production system? Would you like to immediately detect when an attacker attempts to log into your system or retrieve data? One way to see and do those things is to deploy a honeypot. It’s a system on your network that acts as a decoy and lures potential hackers like bears get lured to honey. Honeypots do not contain any live data or information, but they can contain false information. Also, a honeypot should prevent the intruder from accessing protected areas of your network.To read this article in full or to leave a comment, please click here