Archive

Category Archives for "Networking"

IDG Contributor Network: BackupAssist takes a step back in time with a SME backup tool

I live my life in two worlds. The most visible world, at least to this audience, involves spending lots of time in Silicon Valley and the U.S. generally and conversing with the technology illuminati—those who “get” technology, the cloud and what it can offer the world.In my other life, I live in a small (like, tiny) rural village in deepest, darkest New Zealand. I’m surrounded by fine folk, the so-called “salt of the earth” who make a living from the land, sheep, grapes and the rural sector generally. To these folks, technology is simply another tool to add to the arsenal of tools they have at their disposal.+ Also on Network World: Deep dive on AWS vs. Azure vs. Google cloud storage options + For these people, cloud isn’t always an already-adopted opportunity. Rather they use a variety of technology products and services. I have a friend who runs an agricultural service business whose operational software is a DOS-based solution. While this may have friends in the technology world rolling their eyes and shaking their heads, it is the reality of the “real world.” As an aside, I’ve said for the longest time that technology companies Continue reading

It’s Up To Each Of Us: Why I WannaCry For Collaboration

WannaCry, or WannaCrypt, is one of the many names of the piece of ransomware that impacted the Internet last week, and will likely continue to make the rounds this week.

There are a number of takeaways and lessons to learn from the far-reaching attack that we witnessed. Let me tie those to voluntary cooperation and collaboration which together represent the foundation for the Internet’s development. The reason for making this connection is because they provide the way to get the global cyber threat under control. Not just to keep ourselves and our vital systems and services protected, but to reverse the erosion of trust in the Internet.

Mr. Olaf Kolkman

Will Windows 10-on-ARM PCs support Mixed Reality headsets?

A Windows-on-ARM PC is getting closer to reality. Microsoft showed off a prototype mini-desktop with an ARM processor running Windows 10 at last week's Build conference, with the PC running applications like Office.The PC was shown in a video posted on the Channel 9 website. The presenters reinforced Microsoft's previous message saying that all x86 applications will work on Windows-on-ARM PCs.Microsoft has maintained that the experience on Windows 10-on-ARM PCs will be similar to x86 laptops, but many questions remain. One revolves around whether Windows 10-on-ARM PCs will support Windows Mixed Reality headsets.To read this article in full or to leave a comment, please click here

Dell-EMC updates HCI line to address changing market requirements

Last week Dell and EMC held its first joint customer event since the two tech giants merged. The not-so-originally named Dell-EMC World was a forum for the newly formed company to showcase how it can help its customers navigate the complex world of digital transformation.The final keynote of the event was by the always-entertaining and equally brilliant Chad Sakac, head of the Converged Platform group. He entertained the crowd by flying onto the stage dressed as Captain Canada, a superhero from the 1970s.To read this article in full or to leave a comment, please click here

Dell-EMC updates HCI line to address changing market requirements

Last week Dell and EMC held its first joint customer event since the two tech giants merged. The not-so-originally named Dell-EMC World was a forum for the newly formed company to showcase how it can help its customers navigate the complex world of digital transformation.The final keynote of the event was by the always-entertaining and equally brilliant Chad Sakac, head of the Converged Platform group. He entertained the crowd by flying onto the stage dressed as Captain Canada, a superhero from the 1970s.To read this article in full or to leave a comment, please click here

Reporters dox WannaCry ransomware kill switch guy

It is sickening when people prove “no good deed goes unpunished” to be true. I’m looking at you, British tabloids, because it was mean, stupid and very irresponsible to dox the guy who discovered the first WannaCry ransomware kill switch and thereby stopped thousands of old Windows machines from becoming infected.He goes by MalwareTech on Twitter and has an avatar of a cat wearing sunglasses. If he wanted to use his real name and picture, then he would have. Clearly, he values privacy and tries to maintain at least some degree of anonymity.Yet after being hailed as a hero for discovering a kill switch as WannaCry ransomware swept across globe, shady journalists doxed him. They dug into everything they could find online about MalwareTech, including trying to pry information from his friends.To read this article in full or to leave a comment, please click here

Reporters dox WannaCry ransomware kill switch guy

It is sickening when people prove “no good deed goes unpunished” to be true. I’m looking at you, British tabloids, because it was mean, stupid and very irresponsible to dox the guy who discovered the first WannaCry ransomware kill switch and thereby stopped thousands of old Windows machines from becoming infected.He goes by MalwareTech on Twitter and has an avatar of a cat wearing sunglasses. If he wanted to use his real name and picture, then he would have. Clearly, he values privacy and tries to maintain at least some degree of anonymity.Yet after being hailed as a hero for discovering a kill switch as WannaCry ransomware swept across globe, shady journalists doxed him. They dug into everything they could find online about MalwareTech, including trying to pry information from his friends.To read this article in full or to leave a comment, please click here

The Itanic finally sinks

Intel has released the final versions of its Itanium RISC processor, the Itanium 9700 series, which are virtually unchanged from the last generation and uses a 5-year-old architecture. There are no new features or capabilities, just the most minor of clock speed bumps. In a reflection of how old the designs are, they come in four- and eight-core design with hyperthreading for twice the number of threads. Xeons are now coming with up to 22 cores. Clock speeds are 1.7Ghz to 2.66Ghz and the thermal package is 170 watts. A 3.4Ghz Xeon E7 with 22 cores runs at 165 watts. These things aren’t even remotely competitive, and Intel didn’t really try to address it. The quad core Itanium CPUs get a 133MHz speed bump, while the dual cores get no speed changes. To read this article in full or to leave a comment, please click here

Few Secrets of Successful Learning: Focus, Small Chunks, and Sleep

One of my readers sent me a few questions about the leaf-and-spine fabric architectures webinar because (in his own words)

We have some projects 100% matching these contents and it would be really useful this extra feedback, not just from consultants and manufacturer.

When I explained the details he followed up with:

Now, I expect in one or two weeks to find some days to be able to follow this webinar in a profitable way, not just between phone calls and emails.

That’s not how it works.

Read more ...

U.S. law allows low H-1B wages; just look at Apple

If you work at Apple's One Infinite Loop headquarters in Cupertino as a computer programmer on an H-1B visa, you can can be paid as little as $52,229. That's peanuts in Silicon Valley. Average wages for a programmer in Santa Clara County are more than $93,000 a year, according to the U.S. Bureau of Labor Statistics.However, the U.S. government will approve visa applications for Silicon Valley programmers at $52,229 -- and, in fact, did so for hundreds of potential visa holders at Apple alone.To be clear, this doesn't mean there are hundreds of programmers at Apple working for that paltry sum. Apple submitted a form to the U.S. saying it was planning on hiring 150 computer programmers beginning June 14 at this wage. But it's not doing that.To read this article in full or to leave a comment, please click here

Incident response is like tracking down a perpetrator

What is incident response?Image by ThinkstockIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any holes. Discover any cuts in your chain link fence. Take a few steps back for more perspective. Find the intruder’s targets. What assets are near the compromised fence? Investigate in both directions to find the intruder's target and getaway car. Fix the fence. Resolve any issues and patch vulnerabilities.To read this article in full or to leave a comment, please click here

Incident response is like tracking down a perpetrator

What is incident response?Image by ThinkstockIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any holes. Discover any cuts in your chain link fence. Take a few steps back for more perspective. Find the intruder’s targets. What assets are near the compromised fence? Investigate in both directions to find the intruder's target and getaway car. Fix the fence. Resolve any issues and patch vulnerabilities.To read this article in full or to leave a comment, please click here

Incident response is like tracking down a perpetrator

What is incident response?Image by ThinkstockIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any holes. Discover any cuts in your chain link fence. Take a few steps back for more perspective. Find the intruder’s targets. What assets are near the compromised fence? Investigate in both directions to find the intruder's target and getaway car. Fix the fence. Resolve any issues and patch vulnerabilities.To read this article in full or to leave a comment, please click here

How CISOs can answer difficult questions from CEOs

The CEO puts all the trust in the chief security officer to keep the company off the front page and out of danger. But as the number of attacks across the internet skyrockets, that trust has slowly eroded or at the very least is increasingly questioned.CEOs don’t want to be caught off-guard, so they are asking pointed questions to ensure they know what security precautions are being taken. Here is a hypothetical Q&A between a CEO or board member and the CISO. Lucas Moody, vice president and CISO at Palo Alto Networks, and Dottie Schindlinger, Governance Technology Evangelist at Diligent, provided insight with these interactions.CEO: Why are we getting more phishing attacks? And what are we doing about all these phishing attacks?To read this article in full or to leave a comment, please click here