Archive

Category Archives for "Networking"

NoSQL grudge match: MongoDB vs. Couchbase Server

Choosing the right database for the job can be a daunting task, particularly if you’re entertaining the full space of SQL and NoSQL options. If you’re looking for a flexible, general-purpose option that allows for fluid schemas and complex nested data structures, a document database might be right for you. MongoDB and Couchbase Server are two popular choices. How should you choose?To read this article in full or to leave a comment, please click here(Insider Story)

NoSQL grudge match: MongoDB vs. Couchbase Server

Choosing the right database for the job can be a daunting task, particularly if you’re entertaining the full space of SQL and NoSQL options. If you’re looking for a flexible, general-purpose option that allows for fluid schemas and complex nested data structures, a document database might be right for you. MongoDB and Couchbase Server are two popular choices. How should you choose?To read this article in full or to leave a comment, please click here(Insider Story)

12 tips to curb data usage in Android

At a time when a great deal of business is conducted on the go using smartphones, it's become even more important to be conscious of how much data you're using. Whether you're using your own phone or one issued by your company, mobile data is money -- and if you don't optimize your phone to handle it intelligently, you're throwing dollars down the drain.After all, whether you have a plan with a monthly data cap or a setup where you're billed for the data you use, you're essentially paying for all the virtual info you transmit over your carrier's network. In the former case, reducing your data usage could let you move to a cheaper level of service. In the latter, every megabyte you save will directly lower your monthly bill.To read this article in full or to leave a comment, please click here

Are we ready to bid the SIEM farewell?

At this year's Infiltrate Security Conference in Miami, John Grigg walked the audience through a common target network where a known and commonly used SIEM had been integrated in order to show participants how to exploit onto the SIEM, find intel, and cover their tracks.Though SIEM technologies are supposed to help secure the networks, Grigg said that they are often misconfigured, which creates more vulnerabilities.Even though some of the legacy tools are pretty cool, Grigg said the problem is that no one really knows the platform that well. "The vendor who built it knows it from a design standpoint. Then there's the re-selllers, the guys who install it, the internal IT guys who inherit the systems, but they tend to never really focus on it." To read this article in full or to leave a comment, please click here

Are we ready to bid the SIEM farewell?

At this year's Infiltrate Security Conference in Miami, John Grigg walked the audience through a common target network where a known and commonly used SIEM had been integrated in order to show participants how to exploit onto the SIEM, find intel, and cover their tracks.Though SIEM technologies are supposed to help secure the networks, Grigg said that they are often misconfigured, which creates more vulnerabilities.Even though some of the legacy tools are pretty cool, Grigg said the problem is that no one really knows the platform that well. "The vendor who built it knows it from a design standpoint. Then there's the re-selllers, the guys who install it, the internal IT guys who inherit the systems, but they tend to never really focus on it." To read this article in full or to leave a comment, please click here

How startups recruit, hire and retain software developers

Coding Sans, a software development company, released its State of Software Development at Startups survey looking at 126 tech workers at startup companies. Of those polled, 35 percent cited hiring talent as one of the "biggest challenges in software development," and 90 percent expect the demand for software developers will only grow in the next five years.The survey also uncovered some interesting tactics startups use to compete with bigger, more established tech companies. Here are seven realities they've uncovered about hiring software developers at startup companies.To read this article in full or to leave a comment, please click here

Onto the next one…

Yesterday I passed the CCNA-W exam. Now onto the next partner certification I need to do before summer.

Its called 500-452 ENCWE – Enterprise Networks Core and WAN Essentials and a large part of it involves iWAN, which im not too familiar with.

To that effect I have ordered the official Cisco Press iWAN book and downloaded all the presentations I could find on iWAN from CiscoLive365. That should keep me busy for the foreseeable future ?

I will hopefully be doing some labs on iWAN and will post any findings I have here. It should be fun!

Im still debating whether or not I will goto CLUS this year. Whats really pulling me over there is the people I rarely get to meet. I need to make up my mind soon though.

Take care!

/Kim

Raspberry Pi Roundup: Pi-se of the Machines, keeping the ball up, and GOOOOOOOOOOOOLLLLLLL

The Raspberry Pi is a computer of relatively modest raw capability, but it’s limited much more by our own creativity than it is by its hardware. We’ve seen Pis be everything from video game emulators to fantastic wedding proposal aides to fruit sniffers. Sure, it’s not a powerhouse, but that’s missing the point.To read this article in full or to leave a comment, please click here

DockerCon 2017: Moby’s Cool Hack sessions

Every year at DockerCon, we expand the bounds of what Docker can do with new features and products. And every day, we see great new apps that are built on top of Docker. And yet, there’s always a few that stand out not just for being cool apps, but for pushing the bounds of what you can do with Docker.

This year we had two great apps that we featured in the Docker Cool Hacks closing keynote. Both hacks came from members of our Docker Captains program, a group of people from the Docker community who are recognized by Docker as very knowledgeable about Docker, and contribute quite a bit to the community.

Play with Docker

The first Cool Hack was Play with Docker by Marcos Nils and Jonathan Leibiusky. Marcos and Jonathan actually were featured in the Cool Hacks session at DockerCon EU in 2015 for their work on a Container Migration Tool.

Play with Docker is a Docker playground that you can run in your browser.

Play with Docker

Play with Docker’s architecture is a Swarm of Swarms, running Docker in Docker instances.

Play with Docker

Running on pretty beefy hosts r3.4xlarge on AWS – Play with Docker is able to run Continue reading

Cisco issues 7 “high priority” security advisories; Firepower, IOS and ASA issues among them

Cisco had a pretty large dump of security advisories today – seven “high priority” and one “critical” – impacting a variety of products many with the threat allowing a remote attacker to cause a denial of service.First up this week Cisco said a vulnerability in the Session Initiation Protocol (SIP) UDP throttling process of Cisco Unified Communications Manager (Cisco Unified CM) software could let an unauthenticated, remote attacker cause a denial of service (DoS) attack.+More on Network World: Cisco certifications target business professionals eyeing software roles+To read this article in full or to leave a comment, please click here

Humans are (still) the weakest cybersecurity link

Humans remain the weak link in corporate data protection, but you might be surprised hat it isn't only rank-and-file employees duped by phishing scams who pose risks. Some companies are lulled into a false sense of cybersecurity by vendors. You read that right:Some enterprises believe the shiny new technologies they've acquired will protect them from anything.Just ask Theodore Kobus, leader of BakerHostetler’s Privacy and Data Protection team. BakerHostetler Theodore Kobus, BakerHostetler’s Privacy and Data Protection team.To read this article in full or to leave a comment, please click here

Cisco certifications target business professionals eyeing software roles

Trying to keep business professionals ahead of the rapidly changing technology environment, Cisco this week rolled out new business certificate and training packages.The package includes a certification-level offering for what’s known as a client advocate or a Customer Success Manager. The other certification has to do with helping business professionals learn how to build and transform corporations into the digital environment.+More on Network World: DHS warns on immigration spoofing scam+To read this article in full or to leave a comment, please click here

A vigilante hacker may have built a computer worm to protect the IoT

Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so. The worm, known as Hajime, has infected tens of thousands of easy-to-hack products such as DVRs, internet cameras, and routers. However, the program so far hasn't done anything malicious.Instead, the worm has been preventing a notorious malware known as Mirai from infecting the same devices. It's also been carrying a message written from its developer.To read this article in full or to leave a comment, please click here