Archive

Category Archives for "Networking"

The Itanic finally sinks

Intel has released the final versions of its Itanium RISC processor, the Itanium 9700 series, which are virtually unchanged from the last generation and uses a 5-year-old architecture. There are no new features or capabilities, just the most minor of clock speed bumps. In a reflection of how old the designs are, they come in four- and eight-core design with hyperthreading for twice the number of threads. Xeons are now coming with up to 22 cores. Clock speeds are 1.7Ghz to 2.66Ghz and the thermal package is 170 watts. A 3.4Ghz Xeon E7 with 22 cores runs at 165 watts. These things aren’t even remotely competitive, and Intel didn’t really try to address it. The quad core Itanium CPUs get a 133MHz speed bump, while the dual cores get no speed changes. To read this article in full or to leave a comment, please click here

Few Secrets of Successful Learning: Focus, Small Chunks, and Sleep

One of my readers sent me a few questions about the leaf-and-spine fabric architectures webinar because (in his own words)

We have some projects 100% matching these contents and it would be really useful this extra feedback, not just from consultants and manufacturer.

When I explained the details he followed up with:

Now, I expect in one or two weeks to find some days to be able to follow this webinar in a profitable way, not just between phone calls and emails.

That’s not how it works.

Read more ...

U.S. law allows low H-1B wages; just look at Apple

If you work at Apple's One Infinite Loop headquarters in Cupertino as a computer programmer on an H-1B visa, you can can be paid as little as $52,229. That's peanuts in Silicon Valley. Average wages for a programmer in Santa Clara County are more than $93,000 a year, according to the U.S. Bureau of Labor Statistics.However, the U.S. government will approve visa applications for Silicon Valley programmers at $52,229 -- and, in fact, did so for hundreds of potential visa holders at Apple alone.To be clear, this doesn't mean there are hundreds of programmers at Apple working for that paltry sum. Apple submitted a form to the U.S. saying it was planning on hiring 150 computer programmers beginning June 14 at this wage. But it's not doing that.To read this article in full or to leave a comment, please click here

Incident response is like tracking down a perpetrator

What is incident response?Image by ThinkstockIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any holes. Discover any cuts in your chain link fence. Take a few steps back for more perspective. Find the intruder’s targets. What assets are near the compromised fence? Investigate in both directions to find the intruder's target and getaway car. Fix the fence. Resolve any issues and patch vulnerabilities.To read this article in full or to leave a comment, please click here

Incident response is like tracking down a perpetrator

What is incident response?Image by ThinkstockIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any holes. Discover any cuts in your chain link fence. Take a few steps back for more perspective. Find the intruder’s targets. What assets are near the compromised fence? Investigate in both directions to find the intruder's target and getaway car. Fix the fence. Resolve any issues and patch vulnerabilities.To read this article in full or to leave a comment, please click here

Incident response is like tracking down a perpetrator

What is incident response?Image by ThinkstockIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any holes. Discover any cuts in your chain link fence. Take a few steps back for more perspective. Find the intruder’s targets. What assets are near the compromised fence? Investigate in both directions to find the intruder's target and getaway car. Fix the fence. Resolve any issues and patch vulnerabilities.To read this article in full or to leave a comment, please click here

How CISOs can answer difficult questions from CEOs

The CEO puts all the trust in the chief security officer to keep the company off the front page and out of danger. But as the number of attacks across the internet skyrockets, that trust has slowly eroded or at the very least is increasingly questioned.CEOs don’t want to be caught off-guard, so they are asking pointed questions to ensure they know what security precautions are being taken. Here is a hypothetical Q&A between a CEO or board member and the CISO. Lucas Moody, vice president and CISO at Palo Alto Networks, and Dottie Schindlinger, Governance Technology Evangelist at Diligent, provided insight with these interactions.CEO: Why are we getting more phishing attacks? And what are we doing about all these phishing attacks?To read this article in full or to leave a comment, please click here

How CISOs can answer difficult questions from CEOs

The CEO puts all the trust in the chief security officer to keep the company off the front page and out of danger. But as the number of attacks across the internet skyrockets, that trust has slowly eroded or at the very least is increasingly questioned.CEOs don’t want to be caught off-guard, so they are asking pointed questions to ensure they know what security precautions are being taken. Here is a hypothetical Q&A between a CEO or board member and the CISO. Lucas Moody, vice president and CISO at Palo Alto Networks, and Dottie Schindlinger, Governance Technology Evangelist at Diligent, provided insight with these interactions.CEO: Why are we getting more phishing attacks? And what are we doing about all these phishing attacks?To read this article in full or to leave a comment, please click here

Google I/O 2017: What to expect from this year’s developer’s conference

In just a few days, Google will kick off its annual I/O conference and the year of Android will finally begin in earnest. The company has been busy, but until Sundar Pichai takes the stage at the Shoreline Amphitheater, we won’t know for sure what Google has in store for the rest of 2017.Last year we met a new Google Assistant, Daydream, Home, Allo, Duo, and, of course, Android N, and we can’t wait to see what Google rolls out this year. Google usually keeps a pretty tight lid on its biggest announcements, but it seems like it’s doubled-down on security leaks this year. The rumor mill has been oddly quiet with the show mere days away from starting, and we’re on pins and needles waiting to see what Google has to show us. So here’s what we think and hope we’re going to see:To read this article in full or to leave a comment, please click here

Digital transformation: How inline photo systems drive business value

When it comes to rock-solid proof of responsibility or fault, few pieces of evidence are as useful—or indisputable—as a photograph. That’s why restaurants, auto insurers, apartment management companies and health inspectors take millions of  photographs every year. In case of a dispute or lawsuit they want to mitigate their risk by being able to prove they were in compliance with all relevant laws and codes.Despite the value of photographs, however, most companies haven’t integrated image management into their IT systems. This not only makes it difficult, if not impossible, to provide potentially exculpatory evidence, but it is also a significant barrier to establishing formal protocols for using photographs in existing inspection workflows.To read this article in full or to leave a comment, please click here

New products of the week 5.15.17

New products of the weekImage by ArrayOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.FastCollect for Archives Commvault EditionImage by archive360To read this article in full or to leave a comment, please click here

New products of the week 5.15.17

New products of the weekImage by ArrayOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.FastCollect for Archives Commvault EditionImage by archive360To read this article in full or to leave a comment, please click here

Microsoft blames US stockpiled vulnerability for ransomware attack

Microsoft on Sunday said a software vulnerability stolen from the U.S. National Security Agency has affected customers around the world, and described the spread of the WannaCrypt ransomware on Friday in many countries as yet another example of the problems caused by the stockpiling of vulnerabilities by governments.Referring to the attack as a “wake-up call,” Microsoft’s President and Chief Legal Officer, Brad Smith wrote in a blog post that governments have "to consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits."The ransomware, also called WannaCry or Wana Decryptor, works by exploiting a vulnerability in some older versions of Windows. It has been suspected for some time now that the malware came from a cache of hacking tools reportedly stolen by hacking group Shadow Brokers from the NSA and leaked on the internet. WannaCry is said to take advantage of a NSA hacking tool, called EternalBlue, that can make it easy to hijack unpatched older Windows machines.To read this article in full or to leave a comment, please click here

Microsoft blames US stockpiled vulnerability for ransomware attack

Microsoft on Sunday said a software vulnerability stolen from the U.S. National Security Agency has affected customers around the world, and described the spread of the WannaCrypt ransomware on Friday in many countries as yet another example of the problems caused by the stockpiling of vulnerabilities by governments.Referring to the attack as a “wake-up call,” Microsoft’s President and Chief Legal Officer, Brad Smith wrote in a blog post that governments have "to consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits."The ransomware, also called WannaCry or Wana Decryptor, works by exploiting a vulnerability in some older versions of Windows. It has been suspected for some time now that the malware came from a cache of hacking tools reportedly stolen by hacking group Shadow Brokers from the NSA and leaked on the internet. WannaCry is said to take advantage of a NSA hacking tool, called EternalBlue, that can make it easy to hijack unpatched older Windows machines.To read this article in full or to leave a comment, please click here