Archive

Category Archives for "Networking"

60% off SanDisk Extreme PRO 128GB USB 3.0 Flash Drive, Speeds Up To 260MB/s – Deal Alert

The SanDisk Extreme PRO USB 3.0 Flash Drive features a sizable 128GB of storage, and read speeds of up to 260MB/s lets you easily transfer a full-length movie in seconds. The sophisticated design and durable aluminum metal casing help to protect against every day wear and tear on the outside, while the included SanDisk SecureAccess software provides 128-bit AES file encryption and password protection on the inside for your private files. The SanDisk Extreme PRO USB 3.0 Flash Drive is backed with a lifetime limited warranty. It currently averages 4.6 out of 5 stars on Amazon from over 530 people (80% rate the full 5 stars: see reviews here), and its typical list price has been reduced generously to just $52.10. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Don’t Be My Guest

I’m interrupting my regularly scheduled musing about technology and networking to talk today about something that I’m increasingly seeing come across my communications channels. The growing market for people to “guest post” on blogs. Rather than continually point folks to my policies on this, I thought it might be good to break down why I choose to do what I do.

The Archive Of Tom

First and foremost, let me reiterate for the record: I do not accept guest posts on my site.

Note that this has nothing to do with your skills as a writer, your ability to create “compelling, fresh, and exciting content”, or your particular celebrity status as the CTO/CIO/COMGWTFBBQO of some hot, fresh, exciting new company. I’m sure if Kurt Vonnegut’s ghost or J.K. Rowling wanted to make a guest post on my blog, the answer would still be the same.

Why? Because this site is the archive of my thoughts. Because I want this to be an archive of my viewpoints on technology. I want people to know how I’ve grown and changed and come to love things like SDN over the years. What I don’t want is for people to need to Continue reading

IDG Contributor Network: Folks are fantasizing about Amazon’s Alexa

Humans are developing extreme emotional connections with their virtual assistants—so much so that about a quarter of regular users say they have sexual fantasies about those digital voice assistants.That’s according to new research by J. Walter Thompson and Mindshare (pdf).The virtual assistants include devices such as Amazon’s Alexa and Echo brands and Apple’s Siri smartphone virtual assistant. They’re used for giving verbal instructions to and consequently operating residential Internet of Things applications, playing music and reading the news out loud, among other things.To read this article in full or to leave a comment, please click here

PQ Show 113: All About DNS At IETF 98

Todays Priority Queue is all about DNS, including scale, security, privacy, and DDoS protection. Well also get into mechanisms for DNS authentication and operational issues. This episode was recorded live at IETF 98 with guest Tim Wicinski. The post PQ Show 113: All About DNS At IETF 98 appeared first on Packet Pushers.

Enterprise security technology consolidation

Look around the cybersecurity infrastructure at any enterprise organization, and here’s what you’ll see—dozens and dozens of cybersecurity tools from just as many vendors. Now this situation wasn’t planned; it just happened. Over the past 15 years, bad guys developed new cyber weapons to exploit IT vulnerabilities. And large organizations reacted to these new threats by purchasing and deploying new security controls and monitoring systems. This pattern continued over time, leading to today’s patchwork of security point tools. + Also on Network World: Is your company spending on the right security technologies? + So, what’s the problem? Point tools aren’t really designed to talk with one another, leaving human beings to bridge the communications, intelligence and technology gaps between them. Furthermore, each individual tool requires training, deployment, configuration and ongoing operational support. More tools, more needs.To read this article in full or to leave a comment, please click here

Enterprise security technology consolidation

Look around the cybersecurity infrastructure at any enterprise organization, and here’s what you’ll see—dozens and dozens of cybersecurity tools from just as many vendors. Now this situation wasn’t planned; it just happened. Over the past 15 years, bad guys developed new cyber weapons to exploit IT vulnerabilities. And large organizations reacted to these new threats by purchasing and deploying new security controls and monitoring systems. This pattern continued over time, leading to today’s patchwork of security point tools. + Also on Network World: Is your company spending on the right security technologies? + So, what’s the problem? Point tools aren’t really designed to talk with one another, leaving human beings to bridge the communications, intelligence and technology gaps between them. Furthermore, each individual tool requires training, deployment, configuration and ongoing operational support. More tools, more needs.To read this article in full or to leave a comment, please click here

IBM: Financial services industry bombarded by malware, security threats

The financial services industry is the target of a whopping 65% more targeted cyber-attacks than the average business, according to security watchers at IBM’s X Force.The number of financial services records breached skyrocketed 937% in 2016 to more than 200 million. Financial institutions were forced to defend against a 29 percent increase in the number of attacks from 2015, IBM stated.+More on Network World:  IBM: Tax-related spam up 6,000% since Dec.; Darkweb tactics net billions+To read this article in full or to leave a comment, please click here

IBM: Financial services industry bombarded by malware, security threats

The financial services industry is the target of a whopping 65% more targeted cyber-attacks than the average business, according to security watchers at IBM’s X Force.The number of financial services records breached skyrocketed 937% in 2016 to more than 200 million. Financial institutions were forced to defend against a 29 percent increase in the number of attacks from 2015, IBM stated.+More on Network World:  IBM: Tax-related spam up 6,000% since Dec.; Darkweb tactics net billions+To read this article in full or to leave a comment, please click here

5 ways to get a better price on your next RFP

It’s an all-too-familiar story: Naïve but well-intentioned people get taken advantage of by an OEM that over-engineers and/or over-charges for equipment during a Request for Proposal (RFP).Remember the cautionary tale about the West Virginia officials accused of wasting $5 million of federal money on enterprise-class Cisco routers that weren’t needed? While that story is 4 years old now, the significance isn’t lost because it remains top of mind when IT staffers kibitz about how the RFP process can go wrong—awfully wrong.To read this article in full or to leave a comment, please click here

5 ways to get a better price on your next RFP

It’s an all-too-familiar story: Naïve but well-intentioned people get taken advantage of by an OEM that over-engineers and/or over-charges for equipment during a Request for Proposal (RFP).Remember the cautionary tale about the West Virginia officials accused of wasting $5 million of federal money on enterprise-class Cisco routers that weren’t needed? While that story is 4 years old now, the significance isn’t lost because it remains top of mind when IT staffers kibitz about how the RFP process can go wrong—awfully wrong.To read this article in full or to leave a comment, please click here

5 ways to get a better price on your next RFP

It’s an all-too-familiar story: Naïve but well-intentioned people get taken advantage of by an OEM that over-engineers and/or over-charges for equipment during a Request for Proposal (RFP).Remember the cautionary tale about the West Virginia officials accused of wasting $5 million of federal money on enterprise-class Cisco routers that weren’t needed? While that story is 4 years old now, the significance isn’t lost because it remains top of mind when IT staffers kibitz about how the RFP process can go wrong—awfully wrong.To read this article in full or to leave a comment, please click here

Next-gen IoT botnet Hajime nearly 300K strong

The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the notorious Mirai botnet that devastated high-profile websites last fall, leading some to think the internet had been broken.Researchers at Kaspersky Lab lured devices infected with the Hajime worm to announce themselves to a Kaspersky honeypot, checked out whether they were actually infected and added them up. They came up with the number 297,499, says Igor Soumenkov, principal researcher at Kaspersky Lab.An earlier estimate by Symantec put the size at tens of thousands. Estimates of the number of infected devices in Mirai botnets have put it about 400,000, but the number of devices that might be infected with the Hajime worm is 1.5 million, says Dale Drew, the CSO of Level 3, which has been building a profile of behavioral classifiers to identify it so it can be blocked.To read this article in full or to leave a comment, please click here

Next-gen IoT botnet Hajime nearly 300K strong

The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the notorious Mirai botnet that devastated high-profile websites last fall, leading some to think the internet had been broken.Researchers at Kaspersky Lab lured devices infected with the Hajime worm to announce themselves to a Kaspersky honeypot, checked out whether they were actually infected and added them up. They came up with the number 297,499, says Igor Soumenkov, principal researcher at Kaspersky Lab.An earlier estimate by Symantec put the size at tens of thousands. Estimates of the number of infected devices in Mirai botnets have put it about 400,000, but the number of devices that might be infected with the Hajime worm is 1.5 million, says Dale Drew, the CSO of Level 3, which has been building a profile of behavioral classifiers to identify it so it can be blocked.To read this article in full or to leave a comment, please click here