Archive

Category Archives for "Networking"

F5’s new CEO shares his early impressions, his vision for the app delivery powerhouse

 F5’s new President and CEO, Francois Locoh-Donou, took over the reins of the application delivery networking company April 3, replacing longtime leader John McAdam who retired in 2015 but stepped back into the position when his replacement resigned in December of that year for “personal conduct matters.”  Locoh-Donou was mostly recently COO of Ciena, a telecom equipment supplier.  Network World Editor in Chief John Dix talked with Locoh-Donou yesterday about his plans and ambitions for F5 after Locoh-Donou hosted his first F5 quarterly earnings call (Q2 revenue up 7% year-over-year to $518 million).  Given your history in the technology business, are there any experiences in particular that will guide you in this new role?To read this article in full or to leave a comment, please click here

F5’s new CEO shares his early impressions, his vision for the app delivery powerhouse

 F5’s new President and CEO, Francois Locoh-Donou, took over the reins of the application delivery networking company April 3, replacing longtime leader John McAdam who retired in 2015 but stepped back into the position when his replacement resigned in December of that year for “personal conduct matters.”  Locoh-Donou was mostly recently COO of Ciena, a telecom equipment supplier.  Network World Editor in Chief John Dix talked with Locoh-Donou yesterday about his plans and ambitions for F5 after Locoh-Donou hosted his first F5 quarterly earnings call (Q2 revenue up 7% year-over-year to $518 million).  Given your history in the technology business, are there any experiences in particular that will guide you in this new role?To read this article in full or to leave a comment, please click here

Hands on the Acer’s Swift 5, a competitor to Microsoft’s Surface Pro

Microsoft has set the gold standard for tablet-style 2-in-1 devices with its Surface Pro, and other PC vendors have followed suit with their own designs. Acer's latest Surface-style device, the Switch 5, offers a couple of advantages but lacks in other areas.I had a chance to play with the Switch 5 at an Acer event in New York City, where new PCs and tablets were announced. The Switch 5 is a tablet first, but a keyboard attachment can be hooked up to make it a laptop.As a tablet, the Switch 5 is quite light, about the equivalent of the Surface Pro 4. The device doesn't look as polished as the Surface Pro, nor does it have the premium finish. But it does have solid technologies, like the latest Intel processor and liquid cooling, that set it apart from rival devices.To read this article in full or to leave a comment, please click here

Hands on Acer’s Switch 5, a competitor to Microsoft’s Surface Pro

Microsoft has set the gold standard for tablet-style 2-in-1 devices with its Surface Pro, and other PC vendors have followed suit with their own designs. Acer's latest Surface-style device, the Switch 5, offers a couple of advantages but lacks in other areas.I had a chance to play with the Switch 5 at an Acer event in New York City, where new PCs and tablets were announced. The Switch 5 is a tablet first, but a keyboard attachment can be hooked up to make it a laptop.As a tablet, the Switch 5 is quite light, about the equivalent of the Surface Pro 4. The device doesn't look as polished as the Surface Pro, nor does it have the premium finish. But it does have solid technologies, like the latest Intel processor and liquid cooling, that set it apart from rival devices.To read this article in full or to leave a comment, please click here

Book Review: Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

The overall equation is pretty simple: If you want to understand network traffic, you really should install Wireshark. And, if you really want to use Wireshark effectively, you should consider this book. Already in its third edition, Practical Packet Analysis both explains how Wireshark works and provides expert guidance on how you can use the tool to solve real-world network problems.Yes, there are other packet analyzers, but Wireshark is one of the best, works on Windows, Mac, and Linux, and is free and open source. And, yes, there are other books, but this one focuses both on understanding the tool and using it to address the kind of problems that you're likely to encounter.To read this article in full or to leave a comment, please click here

Book Review: Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

The overall equation is pretty simple: If you want to understand network traffic, you really should install Wireshark. And, if you really want to use Wireshark effectively, you should consider this book. Already in its third edition, Practical Packet Analysis both explains how Wireshark works and provides expert guidance on how you can use the tool to solve real-world network problems.Yes, there are other packet analyzers, but Wireshark is one of the best, works on Windows, Mac, and Linux, and is free and open source. And, yes, there are other books, but this one focuses both on understanding the tool and using it to address the kind of problems that you're likely to encounter.To read this article in full or to leave a comment, please click here

Book Review: Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

The overall equation is pretty simple: If you want to understand network traffic, you really should install Wireshark. And, if you really want to use Wireshark effectively, you should consider this book. Already in its third edition, Practical Packet Analysis both explains how Wireshark works and provides expert guidance on how you can use the tool to solve real-world network problems.Yes, there are other packet analyzers, but Wireshark is one of the best, works on Windows, Mac, and Linux, and is free and open source. And, yes, there are other books, but this one focuses both on understanding the tool and using it to address the kind of problems that you're likely to encounter.To read this article in full, please click here

Acer’s new Holo 360 is a 360-degree camera in a smartphone

The effort to grow in the virtual reality market has Acer chasing weird, but rather interesting, devices.The company introduced the Holo 360 camera, which is first and foremost a 360-degree camera. It can capture 3D content, much like other 360-degree cameras, and could be used to capture, view, and create content for VR headsets.But, seemingly as an afterthought, the device also has WiFi and LTE connectivity. The device itself looks like a bulky smartphone and can be used to make phone calls. It has a small screen, much like those on candy-bar phones.It's clearly not designed to be a full-fledged smartphone. No information about the chipset was provided. Different countries have different types of networks, and not all modems support all networks, especially in countries like China.To read this article in full or to leave a comment, please click here

How Google and Amazon think about multi-cloud workloads

It was not a big announcement from Google this week, but in a way it could be seen as a symbolic one.In a blog post, Google announced new functionality that will allow its Cloud Endpoints API (Application Programming Interface) management platform to integrate with Amazon Web Service’s Lambda functions-as-a-service product. The idea is you can build an application in Lambda and use Google Cloud’s Endpoints to manage API calls associated with it.+MORE AT NETWORK WORLD: Serverless explainer: The next generation of cloud infrastructure +To read this article in full or to leave a comment, please click here

Cloudflare wants to secure IoT connections to the internet

Many people are worried about putting smart internet-connected devices in their homes or offices because of flaws that could allow attackers into their private networks.Web optimization and security firm Cloudflare is trying to alleviate those fears with a new service that could allow internet-of-things manufacturers to protect devices from attacks and deploy patches much quicker.Cloudflare's content delivery network is used by millions of people and companies to increase the performance of their websites and to protect them from malicious traffic. The company's servers work as invisible proxies between websites and visitors, providing on-the-fly encryption and firewall protection.To read this article in full or to leave a comment, please click here

Cloudflare wants to secure IoT connections to the internet

Many people are worried about putting smart internet-connected devices in their homes or offices because of flaws that could allow attackers into their private networks.Web optimization and security firm Cloudflare is trying to alleviate those fears with a new service that could allow internet-of-things manufacturers to protect devices from attacks and deploy patches much quicker.Cloudflare's content delivery network is used by millions of people and companies to increase the performance of their websites and to protect them from malicious traffic. The company's servers work as invisible proxies between websites and visitors, providing on-the-fly encryption and firewall protection.To read this article in full or to leave a comment, please click here

2.4GHz is a headache for Wi-Fi users, and it’s here to stay

Current-generation Wi-Fi technology lives in the 5GHz band. Almost all of the major innovation in wireless standards takes place in the relatively untroubled frequencies around 5GHz (and well above), where there’s little radio competition and the living is easy.But wireless LAN users can’t just stay comfortable in the 5GHz realm – the older 2.4GHz frequency bands are a necessary part of most wireless implementations, and they’re rarely a favorite of the people who have to build and operate Wi-Fi networks.+ ALSO ON NETWORK WORLD: Toward a bigger, faster, denser Wi-Fi WorldTo read this article in full or to leave a comment, please click here

2.4GHz is a headache for Wi-Fi users, and it’s here to stay

Current-generation Wi-Fi technology lives in the 5GHz band. Almost all of the major innovation in wireless standards takes place in the relatively untroubled frequencies around 5GHz (and well above), where there’s little radio competition and the living is easy.But wireless LAN users can’t just stay comfortable in the 5GHz realm – the older 2.4GHz frequency bands are a necessary part of most wireless implementations, and they’re rarely a favorite of the people who have to build and operate Wi-Fi networks.+ ALSO ON NETWORK WORLD: Toward a bigger, faster, denser Wi-Fi WorldTo read this article in full or to leave a comment, please click here

Advances in multifactor authentication (MFA) technologies

Enterprises authenticate users based on their knowledge, possession, or inherence of some evidence that they are the party with the given right of access. Some experts see the context of the user’s authentication such as the time, their network IP and device, and their location as the fourth factor of authentication.Stephen Cobb, senior security researcher at ESET says you can assure greater security with each additional factor of authentication that you add.MFA is more important than ever as attackers are increasingly breaking into accounts that use single-factor authentication and sometimes even those with two factors. In one example, attackers tried to get the second factor by using phishing texts that asked users to send over their tokens.To read this article in full or to leave a comment, please click here

Advances in multifactor authentication (MFA) technologies

Enterprises authenticate users based on their knowledge, possession, or inherence of some evidence that they are the party with the given right of access. Some experts see the context of the user’s authentication such as the time, their network IP and device, and their location as the fourth factor of authentication.Stephen Cobb, senior security researcher at ESET says you can assure greater security with each additional factor of authentication that you add.MFA is more important than ever as attackers are increasingly breaking into accounts that use single-factor authentication and sometimes even those with two factors. In one example, attackers tried to get the second factor by using phishing texts that asked users to send over their tokens.To read this article in full or to leave a comment, please click here

9 essential tools for the security-conscious mobile worker

Have security gadgets, will travelImage by Kensington, Anonabox, Yubikey The highly digitized and hyper-connected world that we live in today has heightened the security stakes for us all. But if work frequently takes you away from the home office, you have some particular security and privacy concerns.To read this article in full or to leave a comment, please click here