Archive

Category Archives for "Networking"

Fragmented, disorganized IT systems thwart feds ability to track visas

The technology issues involved in supporting about 27 distinct DHS information systems and databases hinder the effort by U.S. Immigration and Customs Enforcement (ICE) to track people who overstay their visas.That was the chief conclusion of a scathing Department of Homeland Security (DHS) Office of Inspector General (OIG) report on the status of ICE’s ability to track visa overstays.+More on Network World: DHS warns on immigration spoofing scam+To read this article in full or to leave a comment, please click here

Fragmented, disorganized IT systems thwart feds ability to track visas

The technology issues involved in supporting about 27 distinct DHS information systems and databases hinder the effort by U.S. Immigration and Customs Enforcement (ICE) to track people who overstay their visas.That was the chief conclusion of a scathing Department of Homeland Security (DHS) Office of Inspector General (OIG) report on the status of ICE’s ability to track visa overstays.+More on Network World: DHS warns on immigration spoofing scam+To read this article in full or to leave a comment, please click here

Fragmented, disorganized IT systems thwart feds ability to track visas

The technology issues involved in supporting about 27 distinct DHS information systems and databases hinder the effort by U.S. Immigration and Customs Enforcement (ICE) to track people who overstay their visas.That was the chief conclusion of a scathing Department of Homeland Security (DHS) Office of Inspector General (OIG) report on the status of ICE’s ability to track visa overstays.+More on Network World: DHS warns on immigration spoofing scam+To read this article in full or to leave a comment, please click here

Boring old enterprise vendors pay interns well

Snagging an internship at Amazon, Apple, Facebook or Google is certainly reason for celebration, but interns can also fare pretty darn well at enterprise-oriented vendors such as Juniper Networks, VMware and Salesforce.com.The latest report from online jobs site Glassdoor on highest paying internships features at least 15 tech companies in the top 25, depending upon how you define a tech company.Facebook is No. 1 on the list with median monthly pay of $8K, not to mention lots of perks, from free food to housing accommodations in some cases.Amazon and Apple both have median intern pay of $6,400 per month, and Google follows close behind with $6K per month.To read this article in full or to leave a comment, please click here

Boring old enterprise vendors pay interns well

Snagging an internship at Amazon, Apple, Facebook or Google is certainly reason for celebration, but interns can also fare pretty darn well at enterprise-oriented vendors such as Juniper Networks, VMware and Salesforce.com.The latest report from online jobs site Glassdoor on highest paying internships features at least 15 tech companies in the top 25, depending upon how you define a tech company.Facebook is No. 1 on the list with median monthly pay of $8K, not to mention lots of perks, from free food to housing accommodations in some cases.Amazon and Apple both have median intern pay of $6,400 per month, and Google follows close behind with $6K per month.To read this article in full or to leave a comment, please click here

New Windows build adds two significant features

Microsoft has released a new build for Windows Insiders as part of testing for the upcoming Redstone 3 update due in September, and it adds two major new pieces of functionality users have been waiting for. The two new features in Windows 10 Insider Preview Build 16184 are centered around social experiences, which may or may not be part of a theme. The first is the My People feature, which Microsoft first considered for a Creators Update release but pulled it because it was not ready in time. My People is all about the people you care about, according to Microsoft. It’s meant to be a central place for all your communication and interaction with contacts. To use it, make sure you have the latest versions of Skype, Mail and People apps. In its current form, My People has three basic features:To read this article in full or to leave a comment, please click here

Financial cybercrime group abuses Windows app compatibility feature

When Microsoft made it possible for enterprises to quickly resolve incompatibilities between their applications and new Windows versions, it didn't intend to help malware authors as well. Yet, this feature is now abused by cybercriminals for stealthy and persistent malware infections.The Windows Application Compatibility Infrastructure allows companies and application developers to create patches, known as shims. These consist of libraries that sit between applications and the OS and rewrite API calls and other attributes so that those programs can run well on newer versions of Windows.Shims are temporary fixes that can make older programs work even if Microsoft changes how Windows does certain things under the hood. They can be deployed to computers through Group Policy and are loaded when the target applications start.To read this article in full or to leave a comment, please click here

Financial cybercrime group abuses Windows app compatibility feature

When Microsoft made it possible for enterprises to quickly resolve incompatibilities between their applications and new Windows versions, it didn't intend to help malware authors as well. Yet, this feature is now abused by cybercriminals for stealthy and persistent malware infections.The Windows Application Compatibility Infrastructure allows companies and application developers to create patches, known as shims. These consist of libraries that sit between applications and the OS and rewrite API calls and other attributes so that those programs can run well on newer versions of Windows.Shims are temporary fixes that can make older programs work even if Microsoft changes how Windows does certain things under the hood. They can be deployed to computers through Group Policy and are loaded when the target applications start.To read this article in full or to leave a comment, please click here

Design Resource: Shared Workspace Infrastructure

This white paper outlines solutions that can provide secure connectivity for Public Sector agencies over shared wired and wireless network infrastructures. This guide is targeted at network professionals and other personnel who assist in the design of Public Sector office networks and compliments the design patterns and principles issued by GDS Common Technology Services (CTS).

This design guide includes—

  • DMVPN
  • MPLS over DMVPN
  • Wireless and wired access control
  • 802.1x
  • Federated RADIUS

note to readers: From time to time I like to highlight solid case studies and design guides in the network engineering space; you can find past highlighted resources under design/resources in the menu.

The post Design Resource: Shared Workspace Infrastructure appeared first on rule 11 reader.

BlackBerry returns with a surprisingly decent business phone: The KEYone (with video)

Here are some words I never thought I'd be writing again: There's a new phone from BlackBerry that you might be interested in. This time, it's called the KEYone.It's not that I'm biased against BlackBerry. I strapped the first one to my hip when it came out in the early 2000s, before smartphones were invented and the only other way to get your email when you were away from your computer was on a two-way pager. (Kids, gather 'round. Gramps is telling his stories again...)To read this article in full or to leave a comment, please click here

Jakarta Declaration Calls on Governments to Support Encryption to Protect Free Press

Media leaders, including ISOC's Senior Director for Global Internet Policy, Constance Bommelaer, gathered at the World Press Freedom Day 2017 event in Indonesia to approve the Jakarta Declaration, which calls on governments to support encryption and on all journalists to use encryption to protect their research, their communications, their sources, and themselves. This is an important and positive signal to the international community.

April Froncek

Extreme offers glimpse of integrated Avaya, Brocade technology future

In detailing its third quarter 2017 financial discussion Extreme CEO Ed Meyercord said the company was “locked and loaded” as it worked toward combining and integrating the two companies – Avaya and Brocade it is in the process of purchasing.Extreme a lot of work ahead as it combines Brocade's data center business and the network technology of Avaya Holdings– which is in Chapter 11 bankruptcy – both of which it said it would acquire in March. Extreme added that it has now integrated another buy it made, Zebra wireless with great success. Extreme said that in the third quarter alone four of its top 10 deals came from the Zebra side.To read this article in full or to leave a comment, please click here

Extreme offers glimpse of integrated Avaya, Brocade technology future

In detailing its third quarter 2017 financial discussion Extreme CEO Ed Meyercord said the company was “locked and loaded” as it worked toward combining and integrating the two companies – Avaya and Brocade it is in the process of purchasing.Extreme a lot of work ahead as it combines Brocade's data center business and the network technology of Avaya Holdings– which is in Chapter 11 bankruptcy – both of which it said it would acquire in March. Extreme added that it has now integrated another buy it made, Zebra wireless with great success. Extreme said that in the third quarter alone four of its top 10 deals came from the Zebra side.To read this article in full or to leave a comment, please click here

Extreme offers glimpse of integrated Avaya, Brocade technology future

In detailing its third quarter 2017 financial discussion Extreme CEO Ed Meyercord said the company was “locked and loaded” as it worked toward combining and integrating the two companies – Avaya and Brocade it is in the process of purchasing.Extreme a lot of work ahead as it combines Brocade's data center business and the network technology of Avaya Holdings– which is in Chapter 11 bankruptcy – both of which it said it would acquire in March. Extreme added that it has now integrated another buy it made, Zebra wireless with great success. Extreme said that in the third quarter alone four of its top 10 deals came from the Zebra side.To read this article in full or to leave a comment, please click here

Who should be on the Tech Mount Rushmore?

Tim Bajarin asked his friends to name the top contributors to the tech industry—people who should be on a Tech Mount Rushmore if one were to be built. Who is Bajarin? He is the president of Creative Strategies, an analyst, and a futurist located in Silicon Valley where he has followed technology for almost four decades.People such as financial analyst Mark Stahlman, long-time tech editor Joel Dreyfuss, and investor Roger McNamee—all with almost the same four decades of experience covering the tech industry in their separate fields—cast their votes. The 30 or 40 individuals that contributed the nominations are all experienced people in the tech sector, though fairly heavily weighted towards digital technology.To read this article in full or to leave a comment, please click here