Archive

Category Archives for "Networking"

IDG Contributor Network: How to solve the IoT data distribution dilemma

While the Internet of Things has enjoyed dizzying success when it comes to generating capital and public awareness for its furthered proliferation, several hurdles remain in its way. IoT-enthusiast familiar with its staggeringly quick development already know that the data distribution dilemma currently facing the IoT is perhaps its greatest obstacle towards future growth, yet few of them have solutions on how to go about solving this crisis.So, what exactly is the data distribution dilemma facing the IoT today, and what should governments, businesses, and private actors be doing to overcome this challenge? Solving the IoT’s data distribution nightmare will take serious investments and require new and better standards, but the cost of ignoring this growing predicament are too high to ignore.To read this article in full or to leave a comment, please click here

67% off ThermoPro TP03A Digital Food Cooking Thermometer Instant Read Meat Thermometer – Deal Alert

The ThermoPro TP03A is an effective solution to achieve the most accurate temperature in a matter of seconds. With a simplistic yet practical design, and at the push of the button, the foldaway probe will pop open for quick an easy temperature reading, and when you're done taking the temperature measurement you can fold the probe back into the holding to ensure the probe is kept safe and clean. Stop overcooking or under-cooking your meat and perfect meat temperatures like a professional, ensuring the perfect temp every time you're grilling or cooking. It typically lists for $29.99 and is being discounted 65%, down to $10.49. Learn more or purchase the discounted ThermoPro TP03A Thermometer at Amazon.To read this article in full or to leave a comment, please click here

Announcing Four NDSS 2018 Workshops on Binary Analysis, IoT, DNS Privacy, and Security

The Internet Society is excited to announce that four workshops will be held in conjunction with the upcoming Network and Distributed System Security (NDSS) Symposium on 18 February 2018 in San Diego, CA. The workshop topics this year are:

A quick overview of each of the workshops is provided below. Submissions are currently being accepted for emerging research in each of these areas. Watch for the final program details in early January!

The first workshop is a new one this year on Binary Analysis Research (BAR). It is exploring the reinvigorated field of binary code analysis in light of the proliferation of interconnected embedded devices. In recent years there has been a rush to develop binary analysis frameworks. This has occurred in a mostly uncoordinated manner with researchers meeting on an ad-hoc basis or working in obscurity and isolation. As a result, there is little sharing or results and solution reuse among tools. The importance of formalized and properly vetted methods and tools for binary code analysis in order to deal with the scale of growth in these interconnected embedded devices cannot be overstated. Continue reading

Rough Guide to IETF 100: Internet Infrastructure Resilience

As we approach IETF 100 in Singapore next week, this post in the Rough Guide to IETF 100 has much progress to report in the world of Internet Infrastructure Resilience. After several years of hard work, the last major deliverable of the Secure Inter-Domain Routing (SIDR) WG is done – RFC 8205, the BGPSec Protocol Specification, was published in September 2017 as standard. BGPsec is an extension to the Border Gateway Protocol (BGP) that provides security for the path of autonomous systems (ASes) through which a BGP update message propagates.

There are seven RFCs in the suite of BGPsec specifications:

  • RFC 8205 (was draft-ietf-sidr-bgpsec-protocol) – BGPsec Protocol Specification
  • RFC 8206 (was draft-ietf-sidr-as-migration) – BGPsec Considerations for Autonomous System (AS) Migration
  • RFC 8207 (was draft-ietf-sidr-bgpsec-ops) – BGPsec Operational Considerations
  • RFC 8208 (was draft-ietf-sidr-bgpsec-algs) – BGPsec Algorithms, Key Formats, and Signature Formats
  • RFC 8209 (was draft-ietf-sidr-bgpsec-pki-profiles) – A Profile for BGPsec Router Certificates, Certificate Revocation Lists, and Certification Requests
  • RFC 8210 (was draft-ietf-sidr-rpki-rtr-rfc6810-bis) – The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1
  • RFC 8211 (was draft-ietf-sidr-adverse-actions) – Adverse Actions by a Certification Authority (CA) or Repository Manager in the Resource Public Key Infrastructure (RPKI)

You can read more Continue reading

Dell EMC Strengthens and Expands All-Flash Midrange Storage, Backing it with Industry-Leading Satisfaction Guarantee

all-flash midrange storage News summary Dell EMC expands its No. 1 market-leading midrange storage portfolio with new SC All-Flash appliances offering premium performance and data services to help accelerate data center modernization Free software upgrades for Dell EMC Unity customers; includes inline data deduplication, synchronous file replication and ability to perform online “data-in-place” storage controller upgrades New Future-Proof... Read more →

Lunduke’s Theory of Computer Mockery — no technology is sacred

“Any sufficiently popular, or important, computer technology will be mercilessly mocked 20 years later.” I call that Lunduke’s Theory of Computer Mockery. (Yes, I named it after myself. Because… why not?)The more important the technology, the more ruthlessly and brutally it will be mocked. It helps if the technology was, itself, a bit flawed when new. But even when a piece of tech is well received initially, 20 years later it will be fully brutalized. Let’s take a look at some examples: Windows 95  Would you use Windows 95 in 2017? Of course not. Would you make fun of it without regard for its feelings? Of course you would. To read this article in full or to leave a comment, please click here

Fujitsu, NetApp partner for hyperconverged systems

Smaller players in the IT hardware space can often be overlooked because dominant players cast such a long shadow. So as someone who roots for the underdog, I do enjoy shining a little light on an overlooked bit of news.Fujitsu is not the first name in data center hardware here in the U.S. Its primary place of business is its native Japan. For example, it built the RIKEN supercomputer, one of the 10 fastest in the world. But it has some good hardware offerings, such as its Primergy and Primequest server line. Well, now the company has partnered with NetApp to offer them converged and hyperconverged systems.Also on Network World: Hyperconvergence: What’s all the hype about? Converged and hyperconverged infrastructure (CI/HCI) is a fancy way of saying tightly integrated systems that combine compute, networking and storage into pre-tested and pre-configured stacks for a single turnkey solution rather than buying and assembling one.To read this article in full or to leave a comment, please click here

Fujitsu, NetApp partner for hyperconverged systems

Smaller players in the IT hardware space can often be overlooked because dominant players cast such a long shadow. So as someone who roots for the underdog, I do enjoy shining a little light on an overlooked bit of news.Fujitsu is not the first name in data center hardware here in the U.S. Its primary place of business is its native Japan. For example, it built the RIKEN supercomputer, one of the 10 fastest in the world. But it has some good hardware offerings, such as its Primergy and Primequest server line. Well, now the company has partnered with NetApp to offer them converged and hyperconverged systems.Also on Network World: Hyperconvergence: What’s all the hype about? Converged and hyperconverged infrastructure (CI/HCI) is a fancy way of saying tightly integrated systems that combine compute, networking and storage into pre-tested and pre-configured stacks for a single turnkey solution rather than buying and assembling one.To read this article in full or to leave a comment, please click here