Archive

Category Archives for "Networking"

New products of the week 5.1.17

New products of the weekImage by HPEOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Bluescape visual collaboration softwareImage by bluescapeTo read this article in full or to leave a comment, please click here

New products of the week 5.1.17

New products of the weekImage by HPEOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Bluescape visual collaboration softwareImage by bluescapeTo read this article in full or to leave a comment, please click here

iPhone 8 Rumor Rollup: long live the battery, here come the cases, plus a new concept design

Perhaps new research that found more iPhone buyers opting for legacy models over the iPhone 7 and 7 Plus will give Apple a little nudge to make sure there's really incentive to buy the forthcoming iPhone 8 (or iPhone X) instead of going with the 7 or 7 Plus later this year.Not that Apple necessarily is going to take any cues from research outfits like Consumer Intelligence Research Partners, but anything to ensure that the next flagship iPhones aren't dull is worth at least pointing out...IPHONE 8 BATTERY LIFE Battery life is far from a glamorous topic, but really, what's more important in terms of an iPhone upgrade for most users? As Apple Insider reports, citing the relentless KGI Securities analyst Ming-Chi Kuo, Apple could be planning to use a logic board format that will allow for more space in the iPhone 8 chassis, and that could mean room for a more powerful and longer lasting battery. To read this article in full or to leave a comment, please click here

iPhone 8 Rumor Rollup: long live the battery, here come the cases, plus a new concept design

Perhaps new research that found more iPhone buyers opting for legacy models over the iPhone 7 and 7 Plus will give Apple a little nudge to make sure there's really incentive to buy the forthcoming iPhone 8 (or iPhone X) instead of going with the 7 or 7 Plus later this year.Not that Apple necessarily is going to take any cues from research outfits like Consumer Intelligence Research Partners, but anything to ensure that the next flagship iPhones aren't dull is worth at least pointing out...IPHONE 8 BATTERY LIFE Battery life is far from a glamorous topic, but really, what's more important in terms of an iPhone upgrade for most users? As Apple Insider reports, citing the relentless KGI Securities analyst Ming-Chi Kuo, Apple could be planning to use a logic board format that will allow for more space in the iPhone 8 chassis, and that could mean room for a more powerful and longer lasting battery. To read this article in full or to leave a comment, please click here

Apple fans are described as ‘Sheeple’ by Merriam-Webster dictionary

In an effort to keep up with the times, Merriam-Webster every year adds hundreds of new words to its dictionary. After all, the language we use on a day-to-day basis is always evolving. Just this past February, for example, Merriam-Webster announced that it added more than 1,000 new words to the dictionary, including some newbies from the tech world such as net neutrality, abandonware, binge-watch and photobomb.And just a few days ago, Merriam-Webster added the word Sheeple to its online dictionary, defining it as "people who are docile, compliant, or easily influenced." Or in other words, "people likened to sheep." Wake up!'Sheeple' is in the dictionary now. https://t.co/pbXVADEoBmTo read this article in full or to leave a comment, please click here

Hackers leak 10 new Orange Is the New Black episodes after Netflix failed to pay ransom

On Saturday, the hacking group The Dark Overlord followed through with threats to release 10 of 13 new Orange Is the New Black episodes that it had in its possession after Netflix failed to pay a ransom. The Dark Overlord, or TDO, allegedly has tried to extort money from other big networks as well and used the leak to threaten those networks.TDO tweeted: “Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we’re all going to have. We’re not playing games anymore.” Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we're all going to have. We're not playing any games anymore.To read this article in full or to leave a comment, please click here

Hackers leak 10 new Orange Is the New Black episodes after Netflix fails to pay ransom

On Saturday, the hacking group The Dark Overlord followed through with threats to release 10 of 13 new Orange Is the New Black episodes that it had in its possession after Netflix failed to pay a ransom. The Dark Overlord, or TDO, allegedly has tried to extort money from other big networks as well and used the leak to threaten those networks.TDO tweeted: “Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we’re all going to have. We’re not playing games anymore.” Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we're all going to have. We're not playing any games anymore.To read this article in full or to leave a comment, please click here

Hackers leak 10 new Orange Is the New Black episodes after Netflix failed to pay ransom

On Saturday, the hacking group The Dark Overlord followed through with threats to release 10 of 13 new Orange Is the New Black episodes that it had in its possession after Netflix failed to pay a ransom. The Dark Overlord, or TDO, allegedly has tried to extort money from other big networks as well and used the leak to threaten those networks.TDO tweeted: “Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we’re all going to have. We’re not playing games anymore.” Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we're all going to have. We're not playing any games anymore.To read this article in full or to leave a comment, please click here

Hackers leak 10 new Orange Is the New Black episodes after Netflix fails to pay ransom

On Saturday, the hacking group The Dark Overlord followed through with threats to release 10 of 13 new Orange Is the New Black episodes that it had in its possession after Netflix failed to pay a ransom. The Dark Overlord, or TDO, allegedly has tried to extort money from other big networks as well and used the leak to threaten those networks.TDO tweeted: “Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we’re all going to have. We’re not playing games anymore.” Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we're all going to have. We're not playing any games anymore.To read this article in full or to leave a comment, please click here

Learning Python: Week2 (Printing, Numbers, and Lists) -Part 1

As discussed in last post,  ( https://crazyrouters.wordpress.com/2017/02/25/learning-python-kirk-byers-python-course/  ) , i will be sharing the my learning on weekly basis as course continues. This will not only motivate me but also help others who are in phase of learning python 3. Kirk discussed about the printing ,raw_input,numbers,List and Tuple . Few of my friends asks to […]

Data center network monitoring best practices part 2: Network alerting, a deeper dive

Network monitoring without alerting is like having a clock without any hands. In the previous post, Eric discussed setting up a monitoring strategy, and in it we scraped the surface of network alerting. In this post we dive into alerting more deeply.

Network alerting on relevant data

Alerting comes in many forms. In the previous post, we discussed how metrics can be set with thresholds to create alerts. This is the most basic level of alerting. CPU alerts are set at 90% of utilization. Disk usage alerts are set to 95% of utilization. There are at least two drawbacks with this level of alerting.

First, by alerting on metric thresholds, we limit ourselves to the granularity of the metrics. Consider a scenario where interface statistics are gathered every five minutes. That limits the ability to capture anomalous traffic patterns to a five minute interval, and at the fast pace of modern datacenters, that level of granularity isn’t acceptable. Limiting the alerting ability based on the thresholds.

Secondly, there are many times when alerts from certain metrics don’t create any actionable activities. For example, an alert on CPU utilization may not directly have an impact on traffic. Since switch CPUs should Continue reading

NSA ends surveillance tactic that pulled in citizens’ emails, texts

The U.S. National Security Agency will no longer sift through emails, texts and other internet communications that mention targets of surveillance.The change, which the NSA announced on Friday, stops a controversial tactic that critics said violated U.S. citizens' privacy rights.The practice involved flagging communications where a foreign surveillance target was mentioned, even if that target wasn't involved in the conversation. Friday’s announcement means the NSA will stop collecting this data.“Instead, this surveillance will now be limited to only those communications that are directly ‘to’ or ‘from’ a foreign intelligence target,” the NSA said in a statement.To read this article in full or to leave a comment, please click here

NSA ends surveillance tactic that pulled in citizens’ emails, texts

The U.S. National Security Agency will no longer sift through emails, texts and other internet communications that mention targets of surveillance.The change, which the NSA announced on Friday, stops a controversial tactic that critics said violated U.S. citizens' privacy rights.The practice involved flagging communications where a foreign surveillance target was mentioned, even if that target wasn't involved in the conversation. Friday’s announcement means the NSA will stop collecting this data.“Instead, this surveillance will now be limited to only those communications that are directly ‘to’ or ‘from’ a foreign intelligence target,” the NSA said in a statement.To read this article in full or to leave a comment, please click here

Stealthy Mac malware spies on encrypted browser traffic

A new malware program that targets macOS users is capable of spying on encrypted browser traffic to steal sensitive information.The new program, dubbed OSX/Dok by researchers from Check Point Software Technologies, was distributed via email phishing campaigns to users in Europe.One of the rogue emails was crafted to look as if it was sent by a Swiss government agency warning recipients about apparent errors in their tax returns. The malware was attached to the email as a file called Dokument.zip.What makes OSX/Dok interesting is that it was digitally signed with a valid Apple developer certificate. These certificates are issued by Apple to members of its developer program and are needed to publish applications in the official Mac App Store.To read this article in full or to leave a comment, please click here

Stealthy Mac malware spies on encrypted browser traffic

A new malware program that targets macOS users is capable of spying on encrypted browser traffic to steal sensitive information.The new program, dubbed OSX/Dok by researchers from Check Point Software Technologies, was distributed via email phishing campaigns to users in Europe.One of the rogue emails was crafted to look as if it was sent by a Swiss government agency warning recipients about apparent errors in their tax returns. The malware was attached to the email as a file called Dokument.zip.What makes OSX/Dok interesting is that it was digitally signed with a valid Apple developer certificate. These certificates are issued by Apple to members of its developer program and are needed to publish applications in the official Mac App Store.To read this article in full or to leave a comment, please click here

Google’s Chrome will soon start warning you more about HTTP pages

A Google effort to push websites to implement encryption is expanding. Starting in October, the company will roll out new warnings to flag HTTP connections as insecure in its Chrome browser.For users, it means Chrome will display the words “not secure” in the browser’s address bar whenever they type any data into web pages that connect over HTTP.However, for users who like to browse through Chrome’s privacy-enhancing Incognito mode, the warnings will appear by default on all HTTP pages visited, not only when the user enters information onto the page.To read this article in full or to leave a comment, please click here