Archive

Category Archives for "Networking"

Cisco: Secure IoT networks, not the devices

With networking pros unable to trust the security of Internet of Things devices, Cisco says they should focus on implementing network-based security protections that limit the blast radius of IoT security breaches.This week Cisco unveiled a new package named IoT Threat Defense at the company’s IoT World Forum in London. IoT Threat Defense combines seven separate offerings, including network-segmentation rule creator TrustSec, network behavior analytics platform Stealthwatch and device-visibility offering named Cisco Identity Service Engine. +MORE AT NETWORK WORLD: 8 Tips to secure IoT devices | IoT security guidance emerges +To read this article in full or to leave a comment, please click here

Cisco: Secure IoT networks, not the devices

With networking pros unable to trust the security of Internet of Things devices, Cisco says they should focus on implementing network-based security protections that limit the blast radius of IoT security breaches.This week Cisco unveiled a new package named IoT Threat Defense at the company’s IoT World Forum in London. IoT Threat Defense combines seven separate offerings, including network-segmentation rule creator TrustSec, network behavior analytics platform Stealthwatch and device-visibility offering named Cisco Identity Service Engine. +MORE AT NETWORK WORLD: 8 Tips to secure IoT devices | IoT security guidance emerges +To read this article in full or to leave a comment, please click here

38% off Inateck USB 3.0 to IDE/SATA Hard Drive Adapter – Deal Alert

This USB 3.0 adapter from Inateck can interface with up to three drives simultaneously. It is compatible with 2.5"/3.5" IDE/SATA hard drives and 5.25" IDE/SATA CD/DVD drives, and features a one-touch backup function. Use it to read an old internal drive from a crashed computer, or to use an internal drive similar to an external backup drive. You might find a lot of uses for this one. The typical list price of $47.99 has been reduced on Amazon 38% right now to $29.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Forget the plus-sized screen, the regular iPhone is the best fit

Like a lot of people, I found myself getting a sore neck and eyes from squinting at a smartphone screen for too long. It’s not that the iPhone 6 has a small screen relative to the market, it’s just that prolonged staring at the screen really isn’t a good idea to anyone but a chiropractor looking to boost his business. I had fiddled with the iPhone 6s Plus in the local Best Buy, and I liked what I saw. Also, it didn’t feel too cumbersome in my hand, so I decided to go for it. The iPhone 7 was out. The removal of the headphone jack was a deal-breaker for me. + Also on Network World: One-third of iPhones are the Plus model + I purchased a used iPhone 6 Plus through Glyde, which acts as an intermediary between buyers and sellers of devices like smartphones, tablets and laptops. Swapping phones was easy in my situation. I am with AT&T, which uses a SIM chip. All I had to do was pop the chip out of the old phone and insert it in the new one, and I had service. I restored the app and settings backup from Continue reading

IDG Contributor Network: SD-WANs lost my voice

If there’s one application that brings chills to the hearts of SD-WAN implementers it’s providing a predictable real-time voice service. So let’s talk about how SD-WANs might help.The problem with voice We need to separate from the theory of voice and the reality of voice. The theory goes something like this. The Internet is fine for email and web browsing. It’s even pretty good for personal voice. But if I want to deliver a voice service, day-in-day out without a hiccup, then I run into a problem. Voice is a real-time protocol with strict tolerances around latency, loss and jitter. Exceed those tolerances and symptoms common to a poor voice service set in. Increased delays from traffic routing or lost packets disrupt voice calls. Outages and brownouts can cause calls to drop.To read this article in full or to leave a comment, please click here

IDG Contributor Network: SD-WANs lost my voice

If there’s one application that brings chills to the hearts of SD-WAN implementers it’s providing a predictable real-time voice service. So let’s talk about how SD-WANs might help.The problem with voice We need to separate from the theory of voice and the reality of voice. The theory goes something like this. The Internet is fine for email and web browsing. It’s even pretty good for personal voice. But if I want to deliver a voice service, day-in-day out without a hiccup, then I run into a problem. Voice is a real-time protocol with strict tolerances around latency, loss and jitter. Exceed those tolerances and symptoms common to a poor voice service set in. Increased delays from traffic routing or lost packets disrupt voice calls. Outages and brownouts can cause calls to drop.To read this article in full or to leave a comment, please click here

58% off RAVPower Portable Multi-Functional Power Bank with 9000mAh Built-in Apple Lightning Connector and AC Plug – Deal Alert

The RAVPower Savior 9000mAh portable charger has both a built built-in Apple Lightning Connector and a foldable two prong wall plug so you don't need to bring an extra cable to charge your Apple Device.  The additional USB output is 1A & Lightning output is 2.4A - this means you can have incredible charging speeds up to 3.4A To read this article in full or to leave a comment, please click here

IDG Contributor Network: Do you know where your data is?

Modern businesses must be agile, flexible and innovative. Business leaders are always looking for the next opportunity and speed is of the essence. Whether they’re looking to scale up quickly for a new project, or seeking to harness the benefits of the latest and greatest technology, it’s often necessary to go beyond company walls and sign up with a vendor for new software or services.You may have spent considerable resources to ensure that your security is strong, but what about your third-party vendors? We’ve discussed how cybersecurity is only as strong the weakest link before, but sometimes that weak link is a partner.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Do you know where your data is?

Modern businesses must be agile, flexible and innovative. Business leaders are always looking for the next opportunity and speed is of the essence. Whether they’re looking to scale up quickly for a new project, or seeking to harness the benefits of the latest and greatest technology, it’s often necessary to go beyond company walls and sign up with a vendor for new software or services.You may have spent considerable resources to ensure that your security is strong, but what about your third-party vendors? We’ve discussed how cybersecurity is only as strong the weakest link before, but sometimes that weak link is a partner.To read this article in full or to leave a comment, please click here

35% off Anker Phone Camera Lens Kit With Fisheye, 0.65x Wide Angle, 10x Macro – Deal Alert

This multi-functional camera lens kit works on most standard sized smartphones including the iPhone 7 (excluding Plus), and brings even more life to your photos with 180-degree fisheye, 0.65x wide angle and 10x macro lenses. It currently averages 4 out of 5 stars on Amazon, and its list price of $20 has been reduced 35% to just $13. See the lens kit now on Amazon.To read this article in full or to leave a comment, please click here

Network Slices

There has been a lot of chatter recently in the 5G wireless world about network slices. A draft was recently published in the IETF on network slices—draft-gdmb-netslices-intro-and-ps-02. But what, precisely, is a network slice?

Perhaps it is better to begin with a concept most network engineers already know (and love)—a virtual topology. A virtual topology is a set of links, with some subset of connected devices (either virtual or real), that act as a subset of the network. Isn’t such a subset of the network a “slice” if you look at it from a different angle? To ask the question in a different way: how are network slices different from virtual network overlays?

To begin, consider the control plane. In the world of virtual topologies, there is generally one control plane that provides reachability, as well as sorting reachability into each virtual topology. For instance, BGP carries a route target and a route discriminator to indicate which virtual topology any particular destination belongs to. A network slice, by contrast, actually has multiple control planes—one for each slice. There will still be one “supervisor control plane,” of course, much like there is a hypervisor that manages the resources of each Continue reading

IDG Contributor Network: 6 ways to manage your data – and team

Decision making comes with its challenges as it’s part of a process of nurturing a variety of perspectives, usually by encouraging discussion and debate. However, when competing points of view are left unmanaged, it can easily – and without warning – digress into an unhealthy conflict. Proponents are often passionate about their views and become blind to certain, inconvenient, facts.Today, data has become a reliable arbiter for such debates. This is why business intelligence (BI) has emerged as crucial to the decision making process. BI provides actionable insights that are based on numbers. A growing number of organizations are recognizing its value. In 2016, 73 percent of businesses increased their analytics capabilities.To read this article in full or to leave a comment, please click here