Archive

Category Archives for "Networking"

JNCIE-DC : The Awesome story of Joao

Hello, I'm very proud to post the story of Joao. He passed recently JNCIE-DC and became one of the firsts JNCIE x4. Joao is a "Juniper Fan" like me. I'm currently preparing JNCIE-DC as well, so I was so happy to read his experience. Enjoy Reading. David...

JNCIE-DC : The Awesome story of Joao

Hello, I'm very proud to post the story of Joao. He passed recently JNCIE-DC and became one of the firsts JNCIE x4. Joao is a "Juniper Fan" like me. I'm currently preparing JNCIE-DC as well, so I was so happy to read his experience. Enjoy Reading. David...

Troubleshooting: Models

How well can you know each of these four systems? Can you actually know them in fine detail, down to the last packet transmitted and the last bit in each packet? Can you know the flow of every packet through the network, and every piece of information any particular application pushes into a packet, or the complete set of ever changing business requirements?

Obviously the answer to these questions is no. As these four components of the network combine, they create a system that suffers from combinatorial explosion. There are far too many combinations, and far too many possible states, for any one person to actually know all of them.

How can you reduce the amount of information to some amount a reasonable human can keep in their minds? The answer—as it is with most problems related to having too much information—is abstraction. In turn, what does abstraction really mean? It really means you build a model of the system, interacting with the system through the model, rather than trying to keep all the information about every subsystem, and how the subsystems interact, in your head. So for each subsystem of the entire system, you have a model you are Continue reading

Get $100 Back If You Order Two Newly Announced Amazon Echo Show Devices Right Now – Deal Alert

The newly-announced Echo Show is available for pre-order in black or white and will start shipping on Wednesday, June 28. Right now if you buy two of them and enter the code SHOW2PACK at checkout, you'll activate a special $100 discount. So you'll get two new Echo Shows for the price of two standard Echos. Go in on this deal with a friend, or buy a few for yourself (they work very well in multiple rooms). Echo Show brings you everything you love about Alexa, and now she can show you things. Watch video flash briefings and YouTube, talk with family and friends (if they have Echos as well), see music lyrics, security cameras, photos, weather forecasts, to-do and shopping lists, and more. All hands-free—just ask. Select two-day shipping when you check out, and Amazon says you'll have it the very day it's released. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

What it takes to be a security architect

Security architects are the people responsible for maintaining the security of their organizations’ computer systems, and as such they must be able to think as hackers do in order to anticipate the tactics attackers can use to gain unauthorized access to those systems, according to the InfoSec Institute.To read this article in full or to leave a comment, please click here(Insider Story)

What it takes to be a security architect

Security architects are the people responsible for maintaining the security of their organizations’ computer systems, and as such they must be able to think as hackers do in order to anticipate the tactics attackers can use to gain unauthorized access to those systems, according to the InfoSec Institute.Anyone in this position can expect to have to work odd hours on occasion, and needs to be constantly up to date on the latest security threats and available tools.Sometimes people who ultimately take on the role of security architect, like Jerod Brennen, could not have predicted such a career direction when they were younger. When Brennen began attending Capital University, a small liberal arts college in Ohio, in the 1990s, he intended to pursue a career in the film industry as a composer.To read this article in full or to leave a comment, please click here(Insider Story)

Mobile is the new desktop, and that’s good for enterprise apps

Android surpassed Microsoft's Windows in March to become the most popular operating system on the internet, according to figures compiled by GlobalStats, the research arm of web analytics company StatCounter.GlobalStats found that, worldwide, Android had a 37.93 percent internet usage market share, just ahead of Windows at 37.91 percent. "This is a milestone in technology history and the end of an era," said Aodhan Cullen, StatCounter's CEO.  "It marks the end of Microsoft’s leadership worldwide of the OS market which it has held since the 1980s. It also represents a breakthrough for Android, which held just 2.4 percent of global internet usage share only five years ago."To read this article in full or to leave a comment, please click here

Why smart contracts can’t be fully automated

Blockchain technology has been generating excitement in the public and private sectors for the past several years for many reasons — a prominent one being support for self-executing contracts commonly referred to as smart contracts. But while smart contracts have the potential to streamline many business processes, full automation isn't likely anytime in the foreseeable future."Smart contracts are a combination of some certain binary actions that can be translated into code and some reference to plain language like we have today that is open to litigation if you mess up," says Antonis Papatsaras, CTO of enterprise content management company SpringCM, which specializes in contract workflow automation. "I think it's going to take forever."To read this article in full or to leave a comment, please click here

Why smart contracts can’t be fully automated

Blockchain technology has been generating excitement in the public and private sectors for the past several years for many reasons — a prominent one being support for self-executing contracts commonly referred to as smart contracts. But while smart contracts have the potential to streamline many business processes, full automation isn't likely anytime in the foreseeable future."Smart contracts are a combination of some certain binary actions that can be translated into code and some reference to plain language like we have today that is open to litigation if you mess up," says Antonis Papatsaras, CTO of enterprise content management company SpringCM, which specializes in contract workflow automation. "I think it's going to take forever."To read this article in full or to leave a comment, please click here

Vendors approve of NIST password draft

A recently released draft of the National Institute of Standards and Technology’s (NIST's) digital identity guidelines has met with approval by vendors. The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies.The new framework recommends, among other things: Remove periodic password change requirements There have been multiple studies that have shown requiring frequent password changes to actually be counterproductive to good password security, said Mike Wilson, founder of PasswordPing. NIST said this guideline was suggested because passwords should be changed when a user wants to change it or if there is indication of breach.To read this article in full or to leave a comment, please click here

Vendors approve of NIST password draft

A recently released draft of the National Institute of Standards and Technology’s (NIST's) digital identity guidelines has met with approval by vendors. The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies.The new framework recommends, among other things: Remove periodic password change requirements There have been multiple studies that have shown requiring frequent password changes to actually be counterproductive to good password security, said Mike Wilson, founder of PasswordPing. NIST said this guideline was suggested because passwords should be changed when a user wants to change it or if there is indication of breach.To read this article in full or to leave a comment, please click here

Video analytics: Coming soon to a smart city near you

Earlier this week at its GPU Technology Conference, Nvidia announced a new video analytics platform, Metropolis, that promises to make cities safer and smarter and should eventually bring game-changing capabilities to other industries.The heart of Metropolis is deep learning enabled by Nvidia’s range of GPUs that provide the necessary horsepower for artificial intelligence to be performed on every video stream.+ Also on Network World: Smart city tech growing in the U.S. + The GPU Technology Conference is the right place to show off advancements in something like video analytics, as it has become the flagship event to showcase how GPUs can literally change the world by enabling AI to do some things smarter and faster than people.To read this article in full or to leave a comment, please click here

Video analytics: Coming soon to a smart city near you

Earlier this week at its GPU Technology Conference, Nvidia announced a new video analytics platform, Metropolis, that promises to make cities safer and smarter and should eventually bring game-changing capabilities to other industries.The heart of Metropolis is deep learning enabled by Nvidia’s range of GPUs that provide the necessary horsepower for artificial intelligence to be performed on every video stream.+ Also on Network World: Smart city tech growing in the U.S. + The GPU Technology Conference is the right place to show off advancements in something like video analytics, as it has become the flagship event to showcase how GPUs can literally change the world by enabling AI to do some things smarter and faster than people.To read this article in full or to leave a comment, please click here

FCC should produce logs to prove ‘multiple DDoS attacks’ stopped net neutrality comments

After John Oliver urged viewers of HBO’s Last Week Tonight to fight for net neutrality (again), even simplified the process for leaving comments by having a new URL, gofccyourself.com, redirect to the point where a person needs only to click “Express” to leave a comment, people were not able to submit comments because the site turned to molasses.The FCC blamed (pdf) the problem on “multiple” DDoS attacks. “These were deliberate attempts by external actors to bombard the FCC’s comment system with a high amount of traffic to our commercial cloud host. These actors were not attempting to file comments themselves; rather they made it difficult for legitimate commenters to access and file with the FCC.”To read this article in full or to leave a comment, please click here

FCC should produce logs to prove ‘multiple DDoS attacks’ stopped net neutrality comments

After John Oliver urged viewers of HBO’s Last Week Tonight to fight for net neutrality (again) and post comments on the FCC's site, people were not able to submit comments because the site turned to molasses.The FCC blamed the problem on “multiple” DDoS attacks: “These were deliberate attempts by external actors to bombard the FCC’s comment system with a high amount of traffic to our commercial cloud host. These actors were not attempting to file comments themselves; rather they made it difficult for legitimate commenters to access and file with the FCC.”To read this article in full or to leave a comment, please click here

IDG Contributor Network: Settling scores with risk scoring

Risk scores seem all the rage right now. Executives want to know what their risk is. The constant stream over the past few years of high profile breaches and the resulting class action lawsuits, negative PR, loss in share price, cybersecurity insurance pay-out refusals, and even termination of liable executives has made this an urgent priority. The problem is we haven’t really developed a good way to measure risk.Most risk score approaches are restricted by a very simple limitation: They are not vendor agnostic or universal. The solution used to calculate risk is limited by the data it collects, which can vary widely.  What is the risk score composed of? More important, what doesn’t it capture? One vendor will include only network and system vulnerabilities, another bundles application vulnerabilities into the mix, and yet another adds user behaviour. Agreeing on the “right” mix still eludes us with no real authoritative standards that define what should be included. Every scoring methodology is subjective, which is surely a sign of how inherently unscientific the entire approach is.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Settling scores with risk scoring

Risk scores seem all the rage right now. Executives want to know what their risk is. The constant stream over the past few years of high profile breaches and the resulting class action lawsuits, negative PR, loss in share price, cybersecurity insurance pay-out refusals, and even termination of liable executives has made this an urgent priority. The problem is we haven’t really developed a good way to measure risk.Most risk score approaches are restricted by a very simple limitation: They are not vendor agnostic or universal. The solution used to calculate risk is limited by the data it collects, which can vary widely.  What is the risk score composed of? More important, what doesn’t it capture? One vendor will include only network and system vulnerabilities, another bundles application vulnerabilities into the mix, and yet another adds user behaviour. Agreeing on the “right” mix still eludes us with no real authoritative standards that define what should be included. Every scoring methodology is subjective, which is surely a sign of how inherently unscientific the entire approach is.To read this article in full or to leave a comment, please click here