Archive

Category Archives for "Networking"

IDG Contributor Network: Finding and protecting the crown jewels

Visibility and security controls for internet-based applications such as social media, file sharing and email have been widely adopted at the perimeter. As we transition from the legacy perimeter security model to a cloud security model, there is a need to ensure we don’t forget the principles we have established. Virtualization has changed how applications are built, deployed and used. It has also created challenges to how security is applied and deployed for these environments. That isn’t necessarily a bad thing; the result of these challenges has driven new innovation in the cloud security space.+ Also on Network World: The tricky, personal politics of cloud security + Discovering and mapping application communications and dependencies is one of the first steps in defining and creating security policies for east-west data center traffic. Unfortunately, there is often a lack of understanding about these relationships, making east-west security policies difficult to implement and often prone to misconfiguration. As a result, we still see an abundance of successful attacks and the loss of critical data, even with traditional perimeter security models in place.To read this article in full or to leave a comment, please click here

Toward a bigger, faster, denser Wi-Fi world

Some 350 Wi-Fi true believers have gathered in Tysons Corner, Va., this week to sing the wireless networking technology’s praises, peek into its future and warn of its challenges.The Wi-Fi Now event featured sessions and exhibitors focused on consumer, enterprise and service provider technologies, though I mainly concentrated on the enterprise technology in the sweet spot for Network World’s target readers. This included the latest alphabet soup of new and emerging IEEE 802.11 standards, including 11ad, ah, ax and ay. Bob Brown/IDG/NetworkWorld Wi-Fi Now exhibitors' floorTo read this article in full or to leave a comment, please click here

Toward a bigger, faster, denser Wi-Fi world

Some 350 Wi-Fi true believers have gathered in Tysons Corner, Va., this week to sing the wireless networking technology’s praises, peek into its future and warn of its challenges.The Wi-Fi Now event featured sessions and exhibitors focused on consumer, enterprise and service provider technologies, though I mainly concentrated on the enterprise technology in the sweet spot for Network World’s target readers. This included the latest alphabet soup of new and emerging IEEE 802.11 standards, including 11ad, ah, ax and ay. Bob Brown/IDG/NetworkWorld Wi-Fi Now exhibitors' floorTo read this article in full or to leave a comment, please click here

ARDA 1.0: A pulse meter for Africa’s peering and interconnection landscape

Do you want to understand more about how the Internet is connected in Africa?  Today we are pleased to announce the African Route-collectors Data Analyzer (ARDA) system. This new systems aims to present data collected at African IXPs in ways that can be easily extrapolated into practical business, policy, developmental, technical, or research opportunities for everyone involved in the peering and interconnection ecosystem.

Michuki Mwangi
Roderick Fanou

Administravia 20170420

A couple of minor items for this week. First, I’ve removed the series page, and started adding subcategories. I think the subcategories will be more helpful in finding the material you’re looking for among the 700’ish posts on this site. I need to work through the rest of the posts here to build more subcategoies, but what is there is a start. Second, I’ve changed the primary domain from rule11.us to rule11.tech, and started using the rule 11 reader name more than the ‘net Work name. rule11.us will still work to reach this site, eventually ntwrk.guru will time out and die. Finally, I’ve put it on my todo list to get a chronological post page up at some point.

Happy Reading!

The post Administravia 20170420 appeared first on rule 11 reader.

Don’t get bit by zombie cloud data

The internet never forgets, which means data that should have been deleted doesn't always stay deleted. Call it "zombie data," and unless your organization has a complete understanding of how your cloud providers handle file deletion requests, it can come back to haunt you.Ever since the PC revolution, the concept of data deletion has been a bit misunderstood. After all, dragging a file to the Recycle Bin simply removed the pointer to the file, freeing up disk space to write new data. Until then, the original data remained on the disk, rediscoverable using readily accessible data recovery tools. Even when new data was written to that disk space, parts of the file often lingered, and the original file could be reconstructed from the fragments.To read this article in full or to leave a comment, please click here

Don’t get bit by zombie cloud data

The internet never forgets, which means data that should have been deleted doesn't always stay deleted. Call it "zombie data," and unless your organization has a complete understanding of how your cloud providers handle file deletion requests, it can come back to haunt you.Ever since the PC revolution, the concept of data deletion has been a bit misunderstood. After all, dragging a file to the Recycle Bin simply removed the pointer to the file, freeing up disk space to write new data. Until then, the original data remained on the disk, rediscoverable using readily accessible data recovery tools. Even when new data was written to that disk space, parts of the file often lingered, and the original file could be reconstructed from the fragments.To read this article in full or to leave a comment, please click here

Don’t get bit by zombie cloud data

The internet never forgets, which means data that should have been deleted doesn't always stay deleted. Call it "zombie data," and unless your organization has a complete understanding of how your cloud providers handle file deletion requests, it can come back to haunt you.Ever since the PC revolution, the concept of data deletion has been a bit misunderstood. After all, dragging a file to the Recycle Bin simply removed the pointer to the file, freeing up disk space to write new data. Until then, the original data remained on the disk, rediscoverable using readily accessible data recovery tools. Even when new data was written to that disk space, parts of the file often lingered, and the original file could be reconstructed from the fragments.To read this article in full or to leave a comment, please click here

NoSQL grudge match: MongoDB vs. Couchbase Server

Choosing the right database for the job can be a daunting task, particularly if you’re entertaining the full space of SQL and NoSQL options. If you’re looking for a flexible, general-purpose option that allows for fluid schemas and complex nested data structures, a document database might be right for you. MongoDB and Couchbase Server are two popular choices. How should you choose?To read this article in full or to leave a comment, please click here(Insider Story)

NoSQL grudge match: MongoDB vs. Couchbase Server

Choosing the right database for the job can be a daunting task, particularly if you’re entertaining the full space of SQL and NoSQL options. If you’re looking for a flexible, general-purpose option that allows for fluid schemas and complex nested data structures, a document database might be right for you. MongoDB and Couchbase Server are two popular choices. How should you choose?To read this article in full or to leave a comment, please click here(Insider Story)

12 tips to curb data usage in Android

At a time when a great deal of business is conducted on the go using smartphones, it's become even more important to be conscious of how much data you're using. Whether you're using your own phone or one issued by your company, mobile data is money -- and if you don't optimize your phone to handle it intelligently, you're throwing dollars down the drain.After all, whether you have a plan with a monthly data cap or a setup where you're billed for the data you use, you're essentially paying for all the virtual info you transmit over your carrier's network. In the former case, reducing your data usage could let you move to a cheaper level of service. In the latter, every megabyte you save will directly lower your monthly bill.To read this article in full or to leave a comment, please click here

Are we ready to bid the SIEM farewell?

At this year's Infiltrate Security Conference in Miami, John Grigg walked the audience through a common target network where a known and commonly used SIEM had been integrated in order to show participants how to exploit onto the SIEM, find intel, and cover their tracks.Though SIEM technologies are supposed to help secure the networks, Grigg said that they are often misconfigured, which creates more vulnerabilities.Even though some of the legacy tools are pretty cool, Grigg said the problem is that no one really knows the platform that well. "The vendor who built it knows it from a design standpoint. Then there's the re-selllers, the guys who install it, the internal IT guys who inherit the systems, but they tend to never really focus on it." To read this article in full or to leave a comment, please click here

Are we ready to bid the SIEM farewell?

At this year's Infiltrate Security Conference in Miami, John Grigg walked the audience through a common target network where a known and commonly used SIEM had been integrated in order to show participants how to exploit onto the SIEM, find intel, and cover their tracks.Though SIEM technologies are supposed to help secure the networks, Grigg said that they are often misconfigured, which creates more vulnerabilities.Even though some of the legacy tools are pretty cool, Grigg said the problem is that no one really knows the platform that well. "The vendor who built it knows it from a design standpoint. Then there's the re-selllers, the guys who install it, the internal IT guys who inherit the systems, but they tend to never really focus on it." To read this article in full or to leave a comment, please click here

How startups recruit, hire and retain software developers

Coding Sans, a software development company, released its State of Software Development at Startups survey looking at 126 tech workers at startup companies. Of those polled, 35 percent cited hiring talent as one of the "biggest challenges in software development," and 90 percent expect the demand for software developers will only grow in the next five years.The survey also uncovered some interesting tactics startups use to compete with bigger, more established tech companies. Here are seven realities they've uncovered about hiring software developers at startup companies.To read this article in full or to leave a comment, please click here

Onto the next one…

Yesterday I passed the CCNA-W exam. Now onto the next partner certification I need to do before summer.

Its called 500-452 ENCWE – Enterprise Networks Core and WAN Essentials and a large part of it involves iWAN, which im not too familiar with.

To that effect I have ordered the official Cisco Press iWAN book and downloaded all the presentations I could find on iWAN from CiscoLive365. That should keep me busy for the foreseeable future ?

I will hopefully be doing some labs on iWAN and will post any findings I have here. It should be fun!

Im still debating whether or not I will goto CLUS this year. Whats really pulling me over there is the people I rarely get to meet. I need to make up my mind soon though.

Take care!

/Kim

Raspberry Pi Roundup: Pi-se of the Machines, keeping the ball up, and GOOOOOOOOOOOOLLLLLLL

The Raspberry Pi is a computer of relatively modest raw capability, but it’s limited much more by our own creativity than it is by its hardware. We’ve seen Pis be everything from video game emulators to fantastic wedding proposal aides to fruit sniffers. Sure, it’s not a powerhouse, but that’s missing the point.To read this article in full or to leave a comment, please click here

DockerCon 2017: Moby’s Cool Hack sessions

Every year at DockerCon, we expand the bounds of what Docker can do with new features and products. And every day, we see great new apps that are built on top of Docker. And yet, there’s always a few that stand out not just for being cool apps, but for pushing the bounds of what you can do with Docker.

This year we had two great apps that we featured in the Docker Cool Hacks closing keynote. Both hacks came from members of our Docker Captains program, a group of people from the Docker community who are recognized by Docker as very knowledgeable about Docker, and contribute quite a bit to the community.

Play with Docker

The first Cool Hack was Play with Docker by Marcos Nils and Jonathan Leibiusky. Marcos and Jonathan actually were featured in the Cool Hacks session at DockerCon EU in 2015 for their work on a Container Migration Tool.

Play with Docker is a Docker playground that you can run in your browser.

Play with Docker

Play with Docker’s architecture is a Swarm of Swarms, running Docker in Docker instances.

Play with Docker

Running on pretty beefy hosts r3.4xlarge on AWS – Play with Docker is able to run Continue reading