Archive

Category Archives for "Networking"

Unix: Dealing with signals

On Unix systems, there are several ways to send signals to processes—with a kill command, with a keyboard sequence (like control-C), or through your own program (e.g., using a kill command in C). Signals are also generated by hardware exceptions such as segmentation faults and illegal instructions, timers and child process termination.But how do you know what signals a process will react to? After all, what a process is programmed to do and able to ignore is another issue.Fortunately, the /proc file system makes information about how processes handle signals (and which they block or ignore) accessible with commands like the one shown below. In this command, we’re looking at information related to the login shell for the current user, the "$$" representing the current process.To read this article in full or to leave a comment, please click here

Monitor cloud services for compliance, security from a single view

Moving to the cloud is supposed to reduce the headaches for IT administrators, but often it has the opposite effect of increasing their workload, especially around security and visibility. Not only do they have to make sure on-premises systems adhere to regulatory compliance, but that their cloud services do as well.Security specialist Qualys addresses these issues of security and visibility with its new app framework, CloudView, which complements existing Qualys services for security, compliance and threat intelligence with real-time monitoring of all enterprise cloud services from a single dashboard.+ Also on Network World: 18 free cloud storage options + "Accelerated cloud adoption requires new adaptive security solutions that support fast-moving digital transformation efforts," said Philippe Courtot, Qualys CEO, in a statement. "Our new CloudView and its apps add unparalleled visibility and continuous security of all cloud workloads to provide customers complete cloud security in a single, integrated platform and drastically reduce their spend."To read this article in full or to leave a comment, please click here

Monitor cloud services for compliance, security from a single view

Moving to the cloud is supposed to reduce the headaches for IT administrators, but often it has the opposite effect of increasing their workload, especially around security and visibility. Not only do they have to make sure on-premises systems adhere to regulatory compliance, but that their cloud services do as well.Security specialist Qualys addresses these issues of security and visibility with its new app framework, CloudView, which complements existing Qualys services for security, compliance and threat intelligence with real-time monitoring of all enterprise cloud services from a single dashboard.+ Also on Network World: 18 free cloud storage options + "Accelerated cloud adoption requires new adaptive security solutions that support fast-moving digital transformation efforts," said Philippe Courtot, Qualys CEO, in a statement. "Our new CloudView and its apps add unparalleled visibility and continuous security of all cloud workloads to provide customers complete cloud security in a single, integrated platform and drastically reduce their spend."To read this article in full or to leave a comment, please click here

Top network monitoring software and visibility tools

Networking performance monitoring and diagnostics (NPMD) software, whether running as an independent appliance or embedded in networking equipment, can help stave off productivity issues for internal corporate users as well as those interacting with the network from the outside.But with ever-increasing traffic on corporate networks, users attempting to optimize connections to the cloud and new Internet of Things devices bombarding the network, enterprises and network performance monitoring vendors face growing challenges.+ ALSO ON NETWORK WORLD: 7 must-have network tools +To read this article in full or to leave a comment, please click here

Top network monitoring software and visibility tools

Networking performance monitoring and diagnostics (NPMD) software, whether running as an independent appliance or embedded in networking equipment, can help stave off productivity issues for internal corporate users as well as those interacting with the network from the outside.But with ever-increasing traffic on corporate networks, users attempting to optimize connections to the cloud and new Internet of Things devices bombarding the network, enterprises and network performance monitoring vendors face growing challenges.+ ALSO ON NETWORK WORLD: 7 must-have network tools +To read this article in full or to leave a comment, please click here

A New Hippocratic Oath: “First, do no harm… to me or my healthcare data”

I was recently invited to contribute a paper on personal data in the healthcare context to a journal on the Privacy and Security of Medical Information published by Springer-Nature. The paper, “Trust and ethical data handling in the healthcare context” examines the issues associated with healthcare data in terms of ethics, privacy, and trust, and makes recommendations about what we, as individuals, should ask for and expect from the organisations we entrust with our most sensitive personal data.

It's a topical subject, from an Internet Society perspective, because the Internet appears to offer some attractive solutions to pressing problems that confront people and governments, around the globe.

Robin Wilton