Archive

Category Archives for "Networking"

RESPONSE: 3 Hidden Lessons Behind Top Podcasts to Help Yours Stand Out

Thoughts from the Content Marketing Institute for budding podcasters were shared here. Here’s my response to the points that stood out to me.

CMI’s big idea #1.

“At first, format trumps talent.” And then later…“Avoid the race to the bottom of simply booking the biggest guests in your niche and meandering through an unplanned episode. Instead, find your format.”

Response. To record an effective show people will listen to, you need a plan, agreed. However, the article cites an example of a 15 minute long episode carved into blocks of minutes and seconds.

Perhaps that’s what you need when working against an ultra-tight timeline. However, an outline that provides structure should be adequate. Overly structuring a podcast is burdensome and can serve to stifle interesting conversation. Freedom is one of the benefits of podcasting.

Podcasting is NOT a digital regurgitation of radio, although many try to shoehorn podcasts into a radio format, because the radio business is what they understand. However, podcast content is different. Distribution is different. Listener consumption is different. Monetization is different.

And perhaps most importantly, timelines are fluid. 15 minute long podcasts are being created under an artificial time constraint that begs the question…why?

On the other hand, Continue reading

IDG Contributor Network: Unite and conquer your storage silos

If you’re a storage admin, it might seem like there’s a new flash storage system being pitched at your inbox every week. Maybe a few times a week, in fact. Perhaps you’re also investigating the cloud, and whether your enterprise would want to go with a hybrid, private or public cloud implementation. Chances are you already have a lot of storage in your infrastructure from past purchases, and when you add it all up, you could be sitting on quite a diverse collection of resources—and those resources may be significantly underutilized today.The diversity of storage types presents many options, which creates a real challenge for admins—but only because all those different resources could not be seamlessly connected until now. With storage solutions that deliver ultra-fast performance, such as all-flash arrays, some that save with low cost, cloud capacity for cold (inactive) data, and numerous other shared storage resources, most enterprise IT teams have the right resources to serve a wide variety of different data demands. The challenge is knowing what data needs which resource, then continually aligning data to the right resource as its needs change over time.To read this article in full or to leave a comment, Continue reading

5 ways to keep virtual assistants from sharing your company’s secrets

Virtual assistants like Apple’s Siri, Microsoft’s Cortana and Google Now have the potential to make enterprise workers more productive. But do “always listening” assistants pose a serious threat to security and privacy, too?Nineteen percent of organizations are already using intelligent digital assistants, such as Siri and Cortana, for work-related tasks, according to Spiceworks’ October 2016 survey of 566 IT professionals in North America, Europe, the Middle East and Africa. The survey also found that 46 percent of organizations plan to adopt intelligent assistants within five years.To read this article in full or to leave a comment, please click here

5 ways to keep virtual assistants from sharing your company’s secrets

Virtual assistants like Apple’s Siri, Microsoft’s Cortana and Google Now have the potential to make enterprise workers more productive. But do “always listening” assistants pose a serious threat to security and privacy, too?Nineteen percent of organizations are already using intelligent digital assistants, such as Siri and Cortana, for work-related tasks, according to Spiceworks’ October 2016 survey of 566 IT professionals in North America, Europe, the Middle East and Africa. The survey also found that 46 percent of organizations plan to adopt intelligent assistants within five years.To read this article in full or to leave a comment, please click here

SnapLogic’s AI simplifies enterprise software connections

SnapLogic wants to make it easier for users of its enterprise software integration platform to connect components of their business systems. The company has unveiled a new feature that uses machine learning to suggest what users may want to do.The idea behind the new feature, announced this week, is to make it easier to connect and move data between enterprise software systems. SnapLogic's service lets companies take a data source like a Concur instance, and synchronize that with information an ERP system like Microsoft Dynamics. To read this article in full or to leave a comment, please click here

ICSA Labs Certifies NSX Micro-segmentation Capabilities

ICSA_Cert_Firewall-Corp_2C_300DPI_975x563

VMware NSX  has achieved ICSA labs Corporate Firewall Certification.

With the release of NSX for vSphere® 6.3, VMware has not only introduced several key security features such as Application Rule Manager and Endpoint Monitoring, which provide deep visibility into the application, and enable a rapid zero-trust deployment, but has also achieved Corporate Firewall Certification in independent testing performed by ICSA labs, a leading third-party testing and certification body and independent division of Verizon.

VMware NSX for vSphere 6.3 has been tested against an industry-accepted standard to which a consortium of firewall vendors, end users and ICSA labs contributed, and met all the requirements in the Baseline and Corporate module of the ICSA Module Firewall Certification Criteria version 4.2.
NSX is the only true micro-segmentation platform to achieve ICSA Firewall certification — with the NSX Distributed Firewall providing kernel-based, distributed stateful firewalling, and the Edge Services Gateway providing services such as North-South firewalling, NAT, DHCP, VPN, load balancing and high availability. VMware NSX provides security controls aligned to the application and enables a Zero-Trust model, independent of network topology.

The ICSA Firewall Certification criteria focus on several key firewall aspects, including stateful services, logging and persistence. ICSA also validates Continue reading

Docker wants to help put old enterprise apps into containers

Docker is offering enterprises an easier on-ramp to using containers with a new consulting program aimed at taking a legacy application and migrating it to a container in five days.The idea behind the program is to show companies the concrete benefits of moving older applications over to containers, without asking them to undergo a massive transformation effort. Docker is working with Cisco, Avanade, Microsoft, and Hewlett Packard Enterprise on the Modernize Traditional Applications program, which will focus on migrating an application to modern infrastructure and getting it set up inside a containerized environment.To read this article in full or to leave a comment, please click here

DHS warns on immigration spoofing scam

You could probably see this one and others like it coming, given the current immigration quagmire that is the United States immigration environment. Today the U.S. Department of Homeland Security issued a fraud alert saying criminals have been using the agency’s Hotline as part of a spoofing scam to steal personal information.+More on Network World: DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification+The DHS Office of Inspector General (OIG) said perpetrators of the scam represent themselves as employees with “U.S. Immigration” and can alter caller ID systems to make it appear that the call is coming from the DHS OIG Hotline telephone number (1-800-323-8603).To read this article in full or to leave a comment, please click here

DHS warns on immigration spoofing scam

You could probably see this one and others like it coming, given the current immigration quagmire that is the United States immigration environment. Today the U.S. Department of Homeland Security issued a fraud alert saying criminals have been using the agency’s Hotline as part of a spoofing scam to steal personal information.+More on Network World: DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification+The DHS Office of Inspector General (OIG) said perpetrators of the scam represent themselves as employees with “U.S. Immigration” and can alter caller ID systems to make it appear that the call is coming from the DHS OIG Hotline telephone number (1-800-323-8603).To read this article in full or to leave a comment, please click here

Riverbed absorbs WIFi vendor Xirrus, reaches for the edge of the network

Network management company Riverbed Technology today announced its intent to acquire enterprise Wi-Fi equipment vendor Xirrus for an undisclosed fee.Riverbed touted that the acquisition, which it expects to close by the end of the month, will expand its software-defined WAN solution, and integrate Xirrus’ robust Wi-Fi products into the broader Riverbed ecosystem.+ALSO ON NETWORK WORLD: New FCC web portal opens for 5G experimenters + Trump's cybersecurity mystery: 90 days in, where's the plan?To read this article in full or to leave a comment, please click here

39% off Exploring Raspberry Pi: Interfacing to the Real World with Embedded Linux, Paperback – Deal Alert

The Raspberry Pi's most famous feature is its adaptability. It can be used for thousands of electronic applications (See: "How to build a Raspberry Pi retrogaming emulation console"). This book, Exploring Raspberry Pi, is the innovators guide to bringing Raspberry Pi to life. The book favors engineering principles over a 'recipe' approach to give you the skills you need to design and build your own projects. You'll understand the fundamental principles in a way that transfers to any type of electronics, electronic modules, or external peripherals, using a "learning by doing" approach that caters to both beginners and experts. The book begins with basic Linux and programming skills, and helps you stock your inventory with common parts and supplies. Next, you'll learn how to make parts work together to achieve the goals of your project, no matter what type of components you use. The companion website provides a full repository that structures all of the code and scripts, along with links to video tutorials and supplementary content that takes you deeper into your project. The list price has been reduced 39% on Amazon, from $35 to $21.40. See this deal now on Amazon. A complete Raspberry Pi Continue reading

IPv6 Extensions Are Already Dead

In this wiki entry disguised as a RFC 7872, “Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World” highlights IPv6 Extension Headers are effectively unusable since internet providers are dropping IPv6 fragment and failing to support Extension Headers.  In IPv6, an extension header is any header that follows the initial 40 […]

The post IPv6 Extensions Are Already Dead appeared first on EtherealMind.

Twitter’s porn problem is ‘trending’

News this morning that former New England Patriots player Aaron Hernandez reportedly had committed suicide sent the murderer’s name to the top of Twitter’s “trending” list. Clicking on it brought back a string of tweets that was positively littered with graphic pornography. Twitter How much porn? I reported and blocked at least a half-dozen tweets and my rough estimate would be that about 1 in 50 were obscene (the flow has since receded to a trickle). I have been a daily, heavy user of Twitter since 2008 and this is by no means the first time I have encountered porn there. And, yes, it has previously been noticeable in instances where fast-breaking news makes the trending list. However, today’s deluge was by far the most concentrated and, well, offensive.   To read this article in full or to leave a comment, please click here

Twitter’s porn problem is ‘trending’

News this morning that former New England Patriots player Aaron Hernandez reportedly had committed suicide sent the murderer’s name to the top of Twitter’s “trending” list. Clicking on it brought back a string of tweets that was positively littered with graphic pornography. Twitter How much porn? I reported and blocked at least a half-dozen tweets and my rough estimate would be that about 1 in 50 were obscene (the flow has since receded to a trickle). I have been a daily, heavy user of Twitter since 2008 and this is by no means the first time I have encountered porn there. And, yes, it has previously been noticeable in instances where fast-breaking news makes the trending list. However, today’s deluge was by far the most concentrated and, well, offensive.   To read this article in full or to leave a comment, please click here