Archive

Category Archives for "Networking"

Defining Cybersecurity

Cybersecurity, as defined by Merriam-Webster, is “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack.”

The true importance of cybersecurity can only be understood if our dependence on “computer systems” is understood. It is difficult to imagine a day using nothing that is actively dependent on technology. We depend on connected systems to purchase groceries, perform medical procedures, manage the delivery of utilities and facilitate communications. These systems facilitate safe travel and alert us of impending dangers. It is conceivable that a cyberattack could take the power grid offline making it difficult or impossible to fill a car with fuel, purchase groceries, receive healthcare and even gain access to the typical procedures to restore the grid itself.

In our world today, unless we are primitive camping, we are using products of computer systems continually. To state it differently, our lives would change drastically if these systems became under widespread compromise. Considering Maslow’s hierarchy of needs, most individuals in a civilized society depend on computer systems for most of the elements defined in the critical first two layers. Since we have built this dependence, we must also protect these systems Continue reading

Top 5 skills needed for the industrial IoT

Over the next five years, the demand for IT workers will get a big boost from an unlikely source: manufacturers looking for networking pros who can help them run the industrial internet of things (IIoT). Manufacturers in the US, Germany, Japan and China are on the cutting edge of something called Industry 4.0, which is digital transformation applied to manufacturing – bringing with it all the change, opportunities and challenges that represents. And it includes IoT devices that contribute to the manufacturing process.+Related: What is Industry 4.0?To read this article in full or to leave a comment, please click here

HPE highlights innovation in software-defined IT, security at Discover

At its Discover conference this week, HPE is pulling back the curtains on firmware security and advances in software-defined IT aimed to reduce costs and increase system flexibility for its users and help it stay ahead of competitors in next-generation infrastructure.There is plenty of competition in the market for converged and hyperconverged data center systems, but at the moment HPE has the lead in composable infrastructure, a term gaining currency in the system management world.Composable infrastructure allows data center managers to deploy infrastructure resources using software commands, notes Patrick Moorhead, founder of Moor Insights and Strategy.To read this article in full or to leave a comment, please click here

HPE highlights innovation in software-defined IT, security at Discover

At its Discover conference this week, HPE is pulling back the curtains on firmware security and advances in software-defined IT aimed to reduce costs and increase system flexibility for its users and help it stay ahead of competitors in next-generation infrastructure.There is plenty of competition in the market for converged and hyperconverged data center systems, but at the moment HPE has the lead in composable infrastructure, a term gaining currency in the system management world.Composable infrastructure allows data center managers to deploy infrastructure resources using software commands, notes Patrick Moorhead, founder of Moor Insights and Strategy.To read this article in full or to leave a comment, please click here

HPE highlights innovation in software-defined IT, security at Discover

At its Discover conference this week, HPE is pulling back the curtains on firmware security and advances in software-defined IT aimed to reduce costs and increase system flexibility for its users and help it stay ahead of competitors in next-generation infrastructure.There is plenty of competition in the market for converged and hyperconverged data center systems, but at the moment HPE has the lead in composable infrastructure, a term gaining currency in the system management world.Composable infrastructure allows data center managers to deploy infrastructure resources using software commands, notes Patrick Moorhead, founder of Moor Insights and Strategy.To read this article in full or to leave a comment, please click here

37% off DYMO LabelWriter 450 Turbo Thermal Label Printer – Deal Alert

The LabelWriter 450 Turbo rapidly handles all of your labelling and filing needs and nimbly prints postage. Printing 4-line address labels at an impressive 71 labels per minute, the LabelWriter 450 Turbo label printer saves you a lot of time. It connects directly to your PC or Mac, making it easy to print customized graphics, barcodes, address labels and more. You can even print directly from popular programs including Microsoft Word and the Mac Address Book. Plus, thermal printing technology eliminates the cost of ink and toner while the label printer’s sleek, compact design makes it a great addition to every workplace. It averages 4.5 out of 5 stars from over 1,350 people on Amazon (read reviews) where its typical list price of $69.95 has been reduced 37% to $44.15. See this deal on Amazon.To read this article in full or to leave a comment, please click here

What is Industry 4.0?

At its heart, Industry 4.0 is digital transformation applied to manufacturing – bringing with it all the change, opportunities and challenges that represents.Industry 4.0 connects the supply chain and the ERP system directly to the production line to form an integrated, automated and, potentially, autonomous manufacturing processes that make better use of capital, raw materials, and human resources.At the moment, Industry 4.0 is a bit of a fuzzy concept because it goes well beyond just connecting machines to other machines or automating another step in a production line with a robot, said Ned Hill, an economist at The Ohio State University who focuses on manufacturing and economic development.To read this article in full or to leave a comment, please click here

Internet Shutdowns Are Not a Solution to Africa’s Challenges

Africa has made considerable gains with regards to the Internet in the last decades. It’s Internet penetration grew by more than 400%; its international bandwidth has been multiplied by 20 just in just 5 years between 2009 and 2014; during the same period Africa’s terrestrial backbone has doubled (Internet Society, Internet Development and Internet Governance in Africa, 2015). This achievement required considerable private and public investment and brought hope for Africans, particularly its youth.

Dawit Bekele

IDG Contributor Network: Bank battle for innovation and market share needs huge live data crunching

When there isn’t much else to choose between brands, customer service becomes an important differentiation, and in financial services the situation has become acute. As regulators continue to make it easier for customers to switch providers, financial institutions must spend as much time keeping existing account holders happy as they do wooing new ones. Issuing apps and making it easier for customers to bank and source products online is a good start, but account holders will soon notice and defect if such moves are really a thinly disguised attempt to reduce costs and close branches.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Bank battle for innovation and market share needs huge live data crunching

When there isn’t much else to choose between brands, customer service becomes an important differentiation, and in financial services the situation has become acute. As regulators continue to make it easier for customers to switch providers, financial institutions must spend as much time keeping existing account holders happy as they do wooing new ones. Issuing apps and making it easier for customers to bank and source products online is a good start, but account holders will soon notice and defect if such moves are really a thinly disguised attempt to reduce costs and close branches.To read this article in full or to leave a comment, please click here

Cumulus co-founder featured on Packet Pushers!

A couple weeks ago, our co-founder, JR Rivers, sat down with the guys at Packet Pushers, in order to discuss how to build a better network with web-scale networking. We were so excited to be featured, that we decided to use this opportunity to launch a giveaway!

The podcast goes into detail covering the benefits of web-scale networking, but we want to hear your thoughts on it. We’ve put together a quick survey to hear what you think of web-scale principles and how you may have incorporated them into your organization. Simply fill out the survey to enter for a chance to win a free Apple Watch!

The podcast covers:

  • The emergence of web-scale IT
  • The traditional way of doing things and how it compares
  • Free Range Routing
  • Open networking and Linux
  • How organizations can get to SDN
  • The role of NetDevOps
  • The how and why of automation

Sound interesting? Grab your headphones and take a listen! You can hear the podcast now by visiting PacketPushers.com

And don’t forget to enter to win an Apple Watch!

 

 

 

The post Cumulus co-founder featured on Packet Pushers! appeared first on Cumulus Networks Blog.

Dealing with NIST’s about-face on password complexity

In the last few years, we've been seeing some significant changes in the suggestions that security experts are making for password security. While previous guidance increasingly pushed complexity in terms of password length, the mix of characters used, controls over password reuse, and forced periodic changes, specialists have been questioning whether making passwords complex wasn't actually working against security concerns rather than promoting them.Security specialists have also argued that forcing complexity down users' throats has led to them writing passwords down or forgetting them and having to get them reset. They argued that replacing a password character with a digit or an uppercase character might make a password look complicated, but does not actually make it any less vulnerable to compromise. In fact, when users are forced to include a variety of characters in their passwords, they generally do so in very predictable ways. Instead of “password”, they might use “Passw0rd” or even “P4ssw0rd!”, but the variations don't make the passwords significantly less guessable. People are just not very good at generating anything that's truly random.To read this article in full or to leave a comment, please click here

AT&T’s purchase of Vyatta Software bolsters its virtualization push

Last week, AT&T agreed to buy Vyatta Software’s network operating system, distributed services platform, software still under development, existing software licenses, and related intellectual property and other assets—including the vRouter product line. It will also acqui-hire some Brocade workers, mostly in California and the U.K.All about virtualization The point, it seems, is to further boost AT&T’s industry-leading virtualization efforts, particularly in the and areas of software-defined networking (SDN) and network function virtualization (NFV). To read this article in full or to leave a comment, please click here

Ethereum: The “Next New Internet?”

According to this article, we now have a new Internet being developed: Ethereum (thanks to Chase Mitchell, one of my regular readers, for pointing this new development out). In fact, it’s called “web 3.0,” in a bid to become “The Next New Internet.” Given I tend to be a little concerned about the future of the Internet, I thought I’d look into this new one a bit to discover what it’s all about… Pardon the length of the ensuing investigation.

To begin to understand Ethereum, you have to understand block chainsbecause Ethereum is a type of block chain. To understand block chains, you must begin with the hash. A has is a simple concept that is actually quite difficult to implement in a useful way: a hash takes any a string of numbers of any size and returns a fixed length number, or hash, that (more or less) uniquely represents the original string. The simple to implement part is this—one rather naive hash is it simply add the numbers in a set of numbers until you reach a single digit, calling the result the hash. For instance…

23523
2 + 3 + 5 + 2 + 3 ==  Continue reading