Archive

Category Archives for "Networking"

Dell-EMC updates HCI line to address changing market requirements

Last week Dell and EMC held its first joint customer event since the two tech giants merged. The not-so-originally named Dell-EMC World was a forum for the newly formed company to showcase how it can help its customers navigate the complex world of digital transformation.The final keynote of the event was by the always-entertaining and equally brilliant Chad Sakac, head of the Converged Platform group. He entertained the crowd by flying onto the stage dressed as Captain Canada, a superhero from the 1970s.To read this article in full or to leave a comment, please click here

Dell-EMC updates HCI line to address changing market requirements

Last week Dell and EMC held its first joint customer event since the two tech giants merged. The not-so-originally named Dell-EMC World was a forum for the newly formed company to showcase how it can help its customers navigate the complex world of digital transformation.The final keynote of the event was by the always-entertaining and equally brilliant Chad Sakac, head of the Converged Platform group. He entertained the crowd by flying onto the stage dressed as Captain Canada, a superhero from the 1970s.To read this article in full or to leave a comment, please click here

Reporters dox WannaCry ransomware kill switch guy

It is sickening when people prove “no good deed goes unpunished” to be true. I’m looking at you, British tabloids, because it was mean, stupid and very irresponsible to dox the guy who discovered the first WannaCry ransomware kill switch and thereby stopped thousands of old Windows machines from becoming infected.He goes by MalwareTech on Twitter and has an avatar of a cat wearing sunglasses. If he wanted to use his real name and picture, then he would have. Clearly, he values privacy and tries to maintain at least some degree of anonymity.Yet after being hailed as a hero for discovering a kill switch as WannaCry ransomware swept across globe, shady journalists doxed him. They dug into everything they could find online about MalwareTech, including trying to pry information from his friends.To read this article in full or to leave a comment, please click here

Reporters dox WannaCry ransomware kill switch guy

It is sickening when people prove “no good deed goes unpunished” to be true. I’m looking at you, British tabloids, because it was mean, stupid and very irresponsible to dox the guy who discovered the first WannaCry ransomware kill switch and thereby stopped thousands of old Windows machines from becoming infected.He goes by MalwareTech on Twitter and has an avatar of a cat wearing sunglasses. If he wanted to use his real name and picture, then he would have. Clearly, he values privacy and tries to maintain at least some degree of anonymity.Yet after being hailed as a hero for discovering a kill switch as WannaCry ransomware swept across globe, shady journalists doxed him. They dug into everything they could find online about MalwareTech, including trying to pry information from his friends.To read this article in full or to leave a comment, please click here

The Itanic finally sinks

Intel has released the final versions of its Itanium RISC processor, the Itanium 9700 series, which are virtually unchanged from the last generation and uses a 5-year-old architecture. There are no new features or capabilities, just the most minor of clock speed bumps. In a reflection of how old the designs are, they come in four- and eight-core design with hyperthreading for twice the number of threads. Xeons are now coming with up to 22 cores. Clock speeds are 1.7Ghz to 2.66Ghz and the thermal package is 170 watts. A 3.4Ghz Xeon E7 with 22 cores runs at 165 watts. These things aren’t even remotely competitive, and Intel didn’t really try to address it. The quad core Itanium CPUs get a 133MHz speed bump, while the dual cores get no speed changes. To read this article in full or to leave a comment, please click here

Few Secrets of Successful Learning: Focus, Small Chunks, and Sleep

One of my readers sent me a few questions about the leaf-and-spine fabric architectures webinar because (in his own words)

We have some projects 100% matching these contents and it would be really useful this extra feedback, not just from consultants and manufacturer.

When I explained the details he followed up with:

Now, I expect in one or two weeks to find some days to be able to follow this webinar in a profitable way, not just between phone calls and emails.

That’s not how it works.

Read more ...

U.S. law allows low H-1B wages; just look at Apple

If you work at Apple's One Infinite Loop headquarters in Cupertino as a computer programmer on an H-1B visa, you can can be paid as little as $52,229. That's peanuts in Silicon Valley. Average wages for a programmer in Santa Clara County are more than $93,000 a year, according to the U.S. Bureau of Labor Statistics.However, the U.S. government will approve visa applications for Silicon Valley programmers at $52,229 -- and, in fact, did so for hundreds of potential visa holders at Apple alone.To be clear, this doesn't mean there are hundreds of programmers at Apple working for that paltry sum. Apple submitted a form to the U.S. saying it was planning on hiring 150 computer programmers beginning June 14 at this wage. But it's not doing that.To read this article in full or to leave a comment, please click here

Incident response is like tracking down a perpetrator

What is incident response?Image by ThinkstockIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any holes. Discover any cuts in your chain link fence. Take a few steps back for more perspective. Find the intruder’s targets. What assets are near the compromised fence? Investigate in both directions to find the intruder's target and getaway car. Fix the fence. Resolve any issues and patch vulnerabilities.To read this article in full or to leave a comment, please click here

Incident response is like tracking down a perpetrator

What is incident response?Image by ThinkstockIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any holes. Discover any cuts in your chain link fence. Take a few steps back for more perspective. Find the intruder’s targets. What assets are near the compromised fence? Investigate in both directions to find the intruder's target and getaway car. Fix the fence. Resolve any issues and patch vulnerabilities.To read this article in full or to leave a comment, please click here

Incident response is like tracking down a perpetrator

What is incident response?Image by ThinkstockIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any holes. Discover any cuts in your chain link fence. Take a few steps back for more perspective. Find the intruder’s targets. What assets are near the compromised fence? Investigate in both directions to find the intruder's target and getaway car. Fix the fence. Resolve any issues and patch vulnerabilities.To read this article in full or to leave a comment, please click here

How CISOs can answer difficult questions from CEOs

The CEO puts all the trust in the chief security officer to keep the company off the front page and out of danger. But as the number of attacks across the internet skyrockets, that trust has slowly eroded or at the very least is increasingly questioned.CEOs don’t want to be caught off-guard, so they are asking pointed questions to ensure they know what security precautions are being taken. Here is a hypothetical Q&A between a CEO or board member and the CISO. Lucas Moody, vice president and CISO at Palo Alto Networks, and Dottie Schindlinger, Governance Technology Evangelist at Diligent, provided insight with these interactions.CEO: Why are we getting more phishing attacks? And what are we doing about all these phishing attacks?To read this article in full or to leave a comment, please click here

How CISOs can answer difficult questions from CEOs

The CEO puts all the trust in the chief security officer to keep the company off the front page and out of danger. But as the number of attacks across the internet skyrockets, that trust has slowly eroded or at the very least is increasingly questioned.CEOs don’t want to be caught off-guard, so they are asking pointed questions to ensure they know what security precautions are being taken. Here is a hypothetical Q&A between a CEO or board member and the CISO. Lucas Moody, vice president and CISO at Palo Alto Networks, and Dottie Schindlinger, Governance Technology Evangelist at Diligent, provided insight with these interactions.CEO: Why are we getting more phishing attacks? And what are we doing about all these phishing attacks?To read this article in full or to leave a comment, please click here

Google I/O 2017: What to expect from this year’s developer’s conference

In just a few days, Google will kick off its annual I/O conference and the year of Android will finally begin in earnest. The company has been busy, but until Sundar Pichai takes the stage at the Shoreline Amphitheater, we won’t know for sure what Google has in store for the rest of 2017.Last year we met a new Google Assistant, Daydream, Home, Allo, Duo, and, of course, Android N, and we can’t wait to see what Google rolls out this year. Google usually keeps a pretty tight lid on its biggest announcements, but it seems like it’s doubled-down on security leaks this year. The rumor mill has been oddly quiet with the show mere days away from starting, and we’re on pins and needles waiting to see what Google has to show us. So here’s what we think and hope we’re going to see:To read this article in full or to leave a comment, please click here

Digital transformation: How inline photo systems drive business value

When it comes to rock-solid proof of responsibility or fault, few pieces of evidence are as useful—or indisputable—as a photograph. That’s why restaurants, auto insurers, apartment management companies and health inspectors take millions of  photographs every year. In case of a dispute or lawsuit they want to mitigate their risk by being able to prove they were in compliance with all relevant laws and codes.Despite the value of photographs, however, most companies haven’t integrated image management into their IT systems. This not only makes it difficult, if not impossible, to provide potentially exculpatory evidence, but it is also a significant barrier to establishing formal protocols for using photographs in existing inspection workflows.To read this article in full or to leave a comment, please click here