Archive

Category Archives for "Networking"

42% off Tom Clancy’s Ghost Recon Wildlands – (XBOX ONE, PS4) – Deal Alert

Today you'll see the price drop an extra 42% on Tom Clancy’s Ghost Recon Wildlands. Experience total freedom of choice in Tom Clancy's Ghost Recon Wildlands, the ultimate military shooter set in a massive open world setting.  The Santa Blanca drug cartel has transformed the beautiful South American country of Bolivia into a perilous narco-state, leading to lawlessness, fear, and rampant violence. With their corrosive influence growing, the cartel plagues the citizens of Bolivia but all hope is not lost. The Ghosts, an elite US Special Forces team, are tasked to combat the cartel and save the country from collapse.  See the discounted Ghost Recon Wildlands on Amazon.To read this article in full or to leave a comment, please click here

Oracle plans ‘startup organization’ focused on cloud computing, AI and VR

Oracle is hiring people for a "new startup organization" inside its North America operation that will focus on key technology trends, including cloud computing, internet of things, artificial Intelligence, and augmented and virtual reality.The Solution Engineering organization the company is setting up will consist of Solution Engineering Centers in Reston, Virginia and Denver, Colorado.The database and enterprise software company has previously indicated its interest in investing in some of these technology areas like machine learning and analytics.It announced in September last year that it was investing in intelligent cloud applications, called Adaptive Intelligent Applications, “that automatically offer individualized recommended actions and streamline the tasks of business users such as human resource or finance professionals.”To read this article in full or to leave a comment, please click here

Juniper takes a swipe at Extreme’s network buying spree, plans

It’s not at all uncommon for competitors to snipe at one another but it still makes for good reading and it provides an interesting look into a company’s strategy – and perhaps a signal to a competitor they are in for a fight.Today’s round comes from Juniper which has a piece of marketing out there that says: “In March 2017, Extreme Networks announced it will acquire Brocade's data center networking business. This acquisition has hindered Brocade/Extreme's ability to meet your long-term goals. They can no longer deliver networking solutions that will help you embark on your digital transformation journey. Juniper Networks can.”To read this article in full or to leave a comment, please click here

Juniper takes a swipe at Extreme’s network buying spree, plans

It’s not at all uncommon for competitors to snipe at one another but it still makes for good reading and it provides an interesting look into a company’s strategy – and perhaps a signal to a competitor they are in for a fight.Today’s round comes from Juniper which has a piece of marketing out there that says: “In March 2017, Extreme Networks announced it will acquire Brocade's data center networking business. This acquisition has hindered Brocade/Extreme's ability to meet your long-term goals. They can no longer deliver networking solutions that will help you embark on your digital transformation journey. Juniper Networks can.”To read this article in full or to leave a comment, please click here

Juniper takes a swipe at Extreme’s network buying spree, plans

It’s not at all uncommon for competitors to snipe at one another but it still makes for good reading and it provides an interesting look into a company’s strategy – and perhaps a signal to a competitor they are in for a fight.Today’s round comes from Juniper which has a piece of marketing out there that says: “In March 2017, Extreme Networks announced it will acquire Brocade's data center networking business. This acquisition has hindered Brocade/Extreme's ability to meet your long-term goals. They can no longer deliver networking solutions that will help you embark on your digital transformation journey. Juniper Networks can.”To read this article in full or to leave a comment, please click here

Hipchat resets user passwords after possible breach

HipChat has reset all its users' passwords after what it called a security incident that may have exposed their names, email addresses and hashed password information.In some cases, attackers may have accessed messages and content in chat rooms, HipChat said in a Monday blog post. But this happened in no more than 0.05 percent of the cases, each of which involved a domain URL, such as company.hipchat.com.HipChat didn't say how many users may have been affected by the incident. The passwords that may have been exposed would also be difficult to crack, the company said. The data is hashed, or obscured, with the bcrypt algorithm, which transforms the passwords into a set of random-looking characters. For added security, HipChat "salted" each password with a random value before hashing it.To read this article in full or to leave a comment, please click here

Hipchat resets user passwords after possible breach

HipChat has reset all its users' passwords after what it called a security incident that may have exposed their names, email addresses and hashed password information.In some cases, attackers may have accessed messages and content in chat rooms, HipChat said in a Monday blog post. But this happened in no more than 0.05 percent of the cases, each of which involved a domain URL, such as company.hipchat.com.HipChat didn't say how many users may have been affected by the incident. The passwords that may have been exposed would also be difficult to crack, the company said. The data is hashed, or obscured, with the bcrypt algorithm, which transforms the passwords into a set of random-looking characters. For added security, HipChat "salted" each password with a random value before hashing it.To read this article in full or to leave a comment, please click here

Microsoft finds another use for LinkedIn with CRM integration

The moment Salesforce CEO Marc Benioff was dreading has arrived: Microsoft is wielding LinkedIn against Salesforce in the battle for the CRM market. Starting Tuesday, salespeople will get LinkedIn Sales Navigator data alongside other information in the Dynamics 365 Sales dashboard.Users who have both systems will see information from LinkedIn profiles inside the lead, contact, account and opportunity pages of Dynamics 365 Sales. Dynamics and LinkedIn Sales Navigator will sync their information every day so that LinkedIn’s system is up to date on activity from Microsoft’s CRM and vice versa.To read this article in full or to leave a comment, please click here

Customers roast Microsoft over security bulletins’ demise

When Microsoft asked customers last week for feedback on the portal that just replaced the decades-long practice of delivering detailed security bulletins, it got an earful from unhappy users."Hate hate hate the new security bulletin format. HATE," emphasized Janelle 322 in a support forum where Microsoft urged customers to post thoughts on the change. "I now have to manually transcribe this information to my spreadsheet to disseminate to my customers. You have just added 8 hours to my workload. Thanks for nothing."To read this article in full or to leave a comment, please click here

Customers roast Microsoft over security bulletins’ demise

When Microsoft asked customers last week for feedback on the portal that just replaced the decades-long practice of delivering detailed security bulletins, it got an earful from unhappy users."Hate hate hate the new security bulletin format. HATE," emphasized Janelle 322 in a support forum where Microsoft urged customers to post thoughts on the change. "I now have to manually transcribe this information to my spreadsheet to disseminate to my customers. You have just added 8 hours to my workload. Thanks for nothing."To read this article in full or to leave a comment, please click here

7 patch management practices guaranteed to help protect your data

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.We’re in an era in which pre-packaged exploit services make it possible for the average Joe, with no technological experience or prowess, to launch intricate attacks on our environments. So, what can be done? Patching operating systems and applications is a surefire way to block some attacks.  But you need to do more than blast out auto updates.Here are seven patch management best practices that take your organization’s cybersecurity to the next level:#1 Use a proper discovery service You can’t secure what you don’t know about. The only way to know if a breach or vulnerability exists is to employ broad discovery capabilities. A proper discovery service entails a combination of active and passive discovery features and the ability to identify physical, virtual and on and off premise systems that access your network. Developing this current inventory of production systems, including everything from IP addresses, OS types and versions and physical locations, helps keep your patch management efforts up to date, and it’s important to inventory your network on a regular basis. If one computer Continue reading

7 patch management practices guaranteed to help protect your data

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.We’re in an era in which pre-packaged exploit services make it possible for the average Joe, with no technological experience or prowess, to launch intricate attacks on our environments. So, what can be done? Patching operating systems and applications is a surefire way to block some attacks.  But you need to do more than blast out auto updates.Here are seven patch management best practices that take your organization’s cybersecurity to the next level:#1 Use a proper discovery service You can’t secure what you don’t know about. The only way to know if a breach or vulnerability exists is to employ broad discovery capabilities. A proper discovery service entails a combination of active and passive discovery features and the ability to identify physical, virtual and on and off premise systems that access your network. Developing this current inventory of production systems, including everything from IP addresses, OS types and versions and physical locations, helps keep your patch management efforts up to date, and it’s important to inventory your network on a regular basis. If one computer Continue reading

7 patch management practices guaranteed to help protect your data

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

We’re in an era in which pre-packaged exploit services make it possible for the average Joe, with no technological experience or prowess, to launch intricate attacks on our environments. So, what can be done? Patching operating systems and applications is a surefire way to block some attacks.  But you need to do more than blast out auto updates.

Here are seven patch management best practices that take your organization’s cybersecurity to the next level:

#1 Use a proper discovery service

You can’t secure what you don’t know about. The only way to know if a breach or vulnerability exists is to employ broad discovery capabilities. A proper discovery service entails a combination of active and passive discovery features and the ability to identify physical, virtual and on and off premise systems that access your network. Developing this current inventory of production systems, including everything from IP addresses, OS types and versions and physical locations, helps keep your patch management efforts up to date, and it’s important to inventory your network on a regular basis. If one computer Continue reading

BrandPost: Automating Business Intent with an SD-WAN

I love to drink a latte (or three) in the morning. To get it, I rely on a “super-automatic” espresso machine.Just a single button press, and all the grinding, dosing, tamping, pre-brewing, etc. are done for me, the way I like it, every morning.Automation in the WAN is a much more powerful tool for an enterprise. It is one of the revolutionary ideas embodied in SD-WAN. Today I’ll outline the relationship between automation and business intent.In my last blog, I discussed the complexity inherent in the legacy WAN today, and how the move to cloud applications is forcing businesses to rethink their WANs. For instance, an assumption embedded firmly in the legacy WAN is that configuration happens at the device level—and that networking professionals must focus their skills and time on learning and applying complicated CLI commands, device by device.To read this article in full or to leave a comment, please click here

How to track and secure open source in your enterprise

Recently, SAS issued a rather plaintive call for enterprises to limit the number of open source projects they use to a somewhat arbitrary percentage. That seems a rather obvious attempt to protest the rise of the open source R programming language for data science and analysis in a market where SAS has been dominant. But there is a good point hidden in the bluster: Using open source responsibly means knowing what you’re using so you can track and maintain it.To read this article in full or to leave a comment, please click here(Insider Story)

Deep dive on AWS vs. Azure vs. Google cloud storage options

One of the most common use cases for public IaaS cloud computing is storage and that’s for good reason: Instead of buying hardware and managing it, users simply upload data to the cloud and pay for how much they put there.+MORE AT NETWORK WORLD: Battle of the clouds: AWS vs. Azure vs. Google Cloud Platform | Interactive map of public cloud regions around the world +To read this article in full or to leave a comment, please click here

AMD shows off Vega’s ability to handle 8K graphics at NAB

AMD is giving a demonstration of the brute force of its upcoming Vega GPU, showing its ability to handle 4K and 8K graphics.The company is showing off its next-generation Radeon Pro professional graphics card based on the Vega GPU at the NAB show in the Las Vegas this week.One demonstration has the Vega GPU handling 8K video processing in Adobe Premiere Pro CC 2017. The other focuses on 4K post-processing with Radeon ProRender, which renders high-end graphics.The NAB show is targeted at the TV and film industry, in which 8K is a growing trend. AMD has been wooing the industry to adopt its GPUs.To read this article in full or to leave a comment, please click here