Archive

Category Archives for "Networking"

IT work gets The Onion treatment

Is it possible that a writer at The Onion has previously toiled as a network engineer … or systems administrator? He or she at least did their homework to produce a “story” headlined: “Network Engineer Would Be Systems Manager If He Could Do It All Over Again.”From the “story.” Reflecting wistfully on what he might have made of himself had he chosen a different profession, Dynatrend Solutions network engineer Alan Miller said Wednesday that he would be a systems manager if he had the chance to go back and do it all over again.To read this article in full or to leave a comment, please click here

IT work gets The Onion treatment

Is it possible that a writer at The Onion has previously toiled as a network engineer … or systems administrator? He or she at least did their homework to produce a “story” headlined: “Network Engineer Would Be Systems Manager If He Could Do It All Over Again.”From the “story.” Reflecting wistfully on what he might have made of himself had he chosen a different profession, Dynatrend Solutions network engineer Alan Miller said Wednesday that he would be a systems manager if he had the chance to go back and do it all over again.To read this article in full or to leave a comment, please click here

IT work gets The Onion treatment

Is it possible that a writer at The Onion has previously toiled as a network engineer … or systems administrator? He or she at least did their homework to produce a “story” headlined: “Network Engineer Would Be Systems Manager If He Could Do It All Over Again.”From the “story.” Reflecting wistfully on what he might have made of himself had he chosen a different profession, Dynatrend Solutions network engineer Alan Miller said Wednesday that he would be a systems manager if he had the chance to go back and do it all over again.To read this article in full or to leave a comment, please click here

SIEM: Remains an Enterprise Security Architecture Requirement

Earlier this week, I posted a blog about changes cybersecurity technology procurement changes at enterprise organizations.   According to ESG research, enterprises are consolidating the number of cybersecurity vendors they do business with and purchasing security products designed for integration (note: I am an ESG employee). Eventually, CISOs will buy more products from fewer vendors, leading to the rise of a few enterprise-class cybersecurity technology vendors that dominate the space.  These vendors will offer tightly integrated cybersecurity technology architectures that span across applications, host systems, networks, and cloud-based assets, offering capabilities for threat analysis/investigations as well as prevention, detection, and response.To read this article in full or to leave a comment, please click here

SIEM remains an enterprise security architecture requirement

Enterprises are changing their cybersecurity technology procurement habits and consolidating the number of cybersecurity vendors they do business with and purchasing security products designed for integration, according to ESG research. Eventually, CISOs will buy more products from fewer vendors, leading to the rise of a few enterprise-class cybersecurity technology vendors that dominate the space.  These vendors will offer tightly integrated cybersecurity technology architectures that span across applications, host systems, networks and cloud-based assets, offering capabilities for threat analysis/investigations, as well as prevention, detection and response.To read this article in full or to leave a comment, please click here

SIEM remains an enterprise security architecture requirement

Enterprises are changing their cybersecurity technology procurement habits and consolidating the number of cybersecurity vendors they do business with and purchasing security products designed for integration, according to ESG research. Eventually, CISOs will buy more products from fewer vendors, leading to the rise of a few enterprise-class cybersecurity technology vendors that dominate the space.  These vendors will offer tightly integrated cybersecurity technology architectures that span across applications, host systems, networks and cloud-based assets, offering capabilities for threat analysis/investigations, as well as prevention, detection and response.To read this article in full or to leave a comment, please click here

Cisco taps into AI, collaboration with $125M MindMeld buy

Cisco said it would target collaboration applications first with artificial intelligence technology it will get from buying MindMeld for $125 million.The deal, announced today, is Cisco’s third in two weeks and nets the company MindMeld’s AI platform which lets customers to build intelligent, conversational interfaces for any application or device with its proprietary machine learning (ML) technology. Specifically, MindMeld develops what it calls Deep-Domain Conversational AI which essentially allows customers to embed voice commands in any applications and services.+More Cisco news On Network World: Cisco patches critical IOS security fault found after CIA WikiLeaks dump+To read this article in full or to leave a comment, please click here

Intel’s Itanium, once destined to replace x86 in PCs, hits end of line

It's the end of the line for Intel's Itanium chip, a troubled processor family that spawned many product delays and bad blood between HP and Oracle.Intel on Thursday started shipping its latest Itanium 9700 chip, code-named Kittson, in volume. It's the last of the Itanium chips, which first appeared in early 2001.Beyond Kittson, there will be no more chips coming from the Itanium family, an Intel spokesman said in an email. That ends a tumultuous, 16-year journey for Itanium, which Intel once envisioned as a replacement for x86 chips in 64-bit PCs and servers.Support for Itanium has dwindled over the past decade, which has led to its gradual death. Server makers stopped offering hardware, software development stalled, and Intel has been openly asking customers to switch to x86-based Xeon chips.To read this article in full or to leave a comment, please click here

Intel’s Itanium, once destined to replace x86 in PCs, hits end of line

It's the end of the line for Intel's Itanium chip, a troubled processor family that spawned many product delays and bad blood between HP and Oracle.Intel on Thursday started shipping its latest Itanium 9700 chip, code-named Kittson, in volume. It's the last of the Itanium chips, which first appeared in early 2001.Beyond Kittson, there will be no more chips coming from the Itanium family, an Intel spokesman said in an email. That ends a tumultuous, 16-year journey for Itanium, which Intel once envisioned as a replacement for x86 chips in 64-bit PCs and servers.Support for Itanium has dwindled over the past decade, which has led to its gradual death. Server makers stopped offering hardware, software development stalled, and Intel has been openly asking customers to switch to x86-based Xeon chips.To read this article in full or to leave a comment, please click here

Conservative group takes credit for anti-net neutrality comments

A conservative group took credit for a barrage of anti-net neutrality comments posted on the U.S. Federal Communications Commission's website this week, but it denied generating fake activism.The Center for Individual Freedom said it did not use a bot to generate comments after news reports raised questions about the legitimacy of the posts. Between Monday and early Wednesday afternoon, the FCC had received more than 128,000 comments duplicating the language provided by CFIF.To read this article in full or to leave a comment, please click here

Conservative group takes credit for anti-net neutrality comments

A conservative group took credit for a barrage of anti-net neutrality comments posted on the U.S. Federal Communications Commission's website this week, but it denied generating fake activism.The Center for Individual Freedom said it did not use a bot to generate comments after news reports raised questions about the legitimacy of the posts. Between Monday and early Wednesday afternoon, the FCC had received more than 128,000 comments duplicating the language provided by CFIF.To read this article in full or to leave a comment, please click here

Ad network takes steps to reduce fraud

The fraud rates for online ads are scary, with advertisers losing billions of dollars each year.Last week, Pixalate released a report showing that 35 percent of U.S. desktop ad impressions sold through programmatic advertising networks are fraudulent. Programmatic ads are those purchased through online networks, often through automatic bidding systems, instead of directly from individual publishers.U.S. advertisers spent more $25 billion on programmatic online ads last year, meaning that about $8 billion is lost to fraud.To read this article in full or to leave a comment, please click here

Ad network takes steps to reduce fraud

The fraud rates for online ads are scary, with advertisers losing billions of dollars each year.Last week, Pixalate released a report showing that 35 percent of U.S. desktop ad impressions sold through programmatic advertising networks are fraudulent. Programmatic ads are those purchased through online networks, often through automatic bidding systems, instead of directly from individual publishers.U.S. advertisers spent more $25 billion on programmatic online ads last year, meaning that about $8 billion is lost to fraud.To read this article in full or to leave a comment, please click here

Intel concerned about name of John McAfee’s privacy phone

Intel has told a court that MGT Capital Investments has gone ahead with the announcement of the “John McAfee Privacy Phone,” even though the company that proposes to change its name to “John McAfee Global Technologies” has previously said that it did not plan to launch products and services under the McAfee mark.The chipmaker claims it acquired the mark when it bought McAfee Inc. in 2011, and has used and promoted it for security products, services, and publications for consumers and businesses. Security expert John McAfee has stated that he did not sign away rights to his personal name.Intel spun off last month its security business as a separate company, called McAfee, in which it now owns 49 percent of the equity, with the balance owned by investment firm TPG. The federal court had earlier refused John McAfee and MGT Capital a preliminary injunction until the resolution of the dispute on Intel’s transfer of marks and related assets containing the word McAfee as part of the spin-out.To read this article in full or to leave a comment, please click here

Intel concerned about name of John McAfee’s privacy phone

Intel has told a court that MGT Capital Investments has gone ahead with the announcement of the “John McAfee Privacy Phone,” even though the company that proposes to change its name to “John McAfee Global Technologies” has previously said that it did not plan to launch products and services under the McAfee mark.The chipmaker claims it acquired the mark when it bought McAfee Inc. in 2011, and has used and promoted it for security products, services, and publications for consumers and businesses. Security expert John McAfee has stated that he did not sign away rights to his personal name.Intel spun off last month its security business as a separate company, called McAfee, in which it now owns 49 percent of the equity, with the balance owned by investment firm TPG. The federal court had earlier refused John McAfee and MGT Capital a preliminary injunction until the resolution of the dispute on Intel’s transfer of marks and related assets containing the word McAfee as part of the spin-out.To read this article in full or to leave a comment, please click here

Cape Town (South Africa): Cloudflare Data Center #113

Cape Town (South Africa): Cloudflare Data Center #113

Cape Town (South Africa): Cloudflare Data Center #113

Five fun facts:

  • Cape Town is where the Atlantic Ocean and the Indian Ocean meet deep in the Southern Hemisphere.
  • The city is the start of the Garden Route, a 185 mile (300 km) glorious coastal drive brimming with native flowers and stunning vistas.
  • Cape Town is the gateway into the Stellenbosch and Franschhoek wine districts that make for very popular weekend excursions.
  • The imposing Table Mountain can be seen from most of Cape Town. When you take the cable car to the top of the mountain, the view from up there is even more stunning.
  • Cape Town is where Cloudflare has placed its 113th data center.

Second data center in South Africa

Back in December 2014, Cloudflare opened our first data center in Africa and our 30th datacenter globally. That was in Johannesburg, which has since seen over 10x growth in traffic delivered to South Africa and surrounding countries.

Now, we are expanding into our second city in South Africa — Cape Town, bringing us 870 miles (1,400km) closer to millions of Internet users. Only 15% smaller than Johannesburg by population, Cape Town commands a majority of the tourism business for the country.

For Cloudflare, our newest Continue reading

Watch Live On May 11 – How does the Internet Affect Society?

Is the Internet bringing us together? Or is it further dividing us? Will the Internet of the future be a force for social cohesion? Or will it lead to greater fragmentation?

Please join us on Thursday, May 11, from 12:30 - 14:00 BST (UTC+1) for a live video stream out of the Royal Institute of International Affairs at Chatham House in London, UK. In the session a panel of experts will address these and many related questions (view the longer description):

Dan York

Another IoT botnet with pieces of Mirai embedded can do DDoS from 100k devices

Bot-herding software called Persirai, which incorporates pieces of the Mirai botnet code, can commandeer significant chunks of a known 150,000 IP cameras that are vulnerable to Mirai and use them to fire off distributed denial-of-service attacks.The Persirai botnet has attacked at least four targets, starting in a predictable pattern, according to researchers at Trend Micro.Persirai takes advantage of a known vulnerability in the cameras to infect them, has them download malware from a command and control server, and then puts them to work either infecting other vulnerable cameras or launching DDoS attacks. “Based on the researchers’ observation, once the victim’s IP Camera received C&C commands, which occurs every 24 hours at 12:00 p.m. UTC, the DDoS attacks start,” the researchers say.To read this article in full or to leave a comment, please click here