Archive

Category Archives for "Networking"

5 tips to help you find the right hybrid tablet

Hybrid tablets, 2-in-1 devices or detachable notebooks -- whatever you want to call them -- come in all shapes and sizes. In fact, the options are so expansive, it can be overwhelming to find the device that will best suit you.Whether you prefer a more traditional notebook experience or you're looking for a tablet that can perform like a notebook, it's more than likely the perfect option exists for you. But there's a lot to consider before you purchase a hybrid device, and these five tips will help you find your best option.[ Related story: 6 new 2-in-1 devices to watch for in 2017 ] To read this article in full or to leave a comment, please click here

6 tips to avoid job search depression

Searching for a new job can be a full-time job, It's a thankless, tiring -- and, yes, depressing task. Searching for roles, filling out applications, networking, tailoring endless versions of your resume to each potential job, interviewing, handling rejections -- the entire process can be so overwhelming and can leave you feeling unwanted, dejected and sad.To read this article in full or to leave a comment, please click here(Insider Story)

Coders and librarians team up to save scientific data

On a windy, snowy night in Dover, N.H., about 15 people gathered in an old converted mill, staring at computer screens and furiously tapping at their keyboards.The group – some students, some programmers, and at least one part-time dishwasher and data entry clerk – were braving the snowstorm and volunteering their time to try to keep scientific data from being lost.It was one of dozens of data rescue events spread out in cities from Toronto to Los Angeles, and Houston to Chicago. These events, many on university campuses, have been going on since December, bringing together software programmers, librarians and other volunteers who are trying to safely archive scientific data from government websites.To read this article in full or to leave a comment, please click here

How much is a bug worth?

1Password recently raised its top bug bounty reward from $25,000 to $100,000. They increased the amount to further incentivize researchers, according to its blog. Separately Google paid out $3 million last year for its vulnerability reward program.But how are these figures determined?David Baker, vice president of operations at Bugcrowd, believes these big bounties demonstrate that organizations are really starting to think about the market and where the market is pricing vulnerabilities.To read this article in full or to leave a comment, please click here

How much is a bug worth?

1Password recently raised its top bug bounty reward from $25,000 to $100,000. They increased the amount to further incentivize researchers, according to its blog. Separately Google paid out $3 million last year for its vulnerability reward program.But how are these figures determined?David Baker, vice president of operations at Bugcrowd, believes these big bounties demonstrate that organizations are really starting to think about the market and where the market is pricing vulnerabilities.To read this article in full or to leave a comment, please click here

6 of the most effective social engineering techniques

Social engineering is the strongest method of attack against the enterprise’s weakest vulnerability, its people. Criminal hackers recognize this fact. In 2015, social engineering became the No. 1 method of attack, according to Proofpoint’s 2016 Human Factor Report.These successful social engineering methods often use phishing and malware. But deceptive information assailants have more tools and approaches to draw on than these.That’s why CSO covers six of the most effective social engineering techniques that attackers use both on and off the internet, providing insights into how each one works, what it accomplishes, and the technologies, methods, and policies for detecting and responding to social saboteurs and keeping them at bay.To read this article in full or to leave a comment, please click here(Insider Story)

6 of the most effective social engineering techniques

Social engineering is the strongest method of attack against the enterprise’s weakest vulnerability, its people. Criminal hackers recognize this fact. In 2015, social engineering became the No. 1 method of attack, according to Proofpoint’s 2016 Human Factor Report.To read this article in full or to leave a comment, please click here(Insider Story)

How Google research can make the internet faster

Raise your hand if you think webpage load times are great -- not too slow at all.No one? Well, Google may have just made big strides to increase load time for websites, while not compromising anything in the process. So how did the tech giant do that?In IT Blogwatch, we hit refresh. So what is going on? DL Cabe gives us some background:Google...released a brand new, open-source JPEG encoder called Guetzli that can do two...neat things...it can decrease JPEG file size by 35% without a noticeable decrease in quality, and...it can increase the quality of an image without increasing file size at all. But what does that mean, exactly? Rafael Fariñas explains:To read this article in full or to leave a comment, please click here

How Google research can make the internet faster

Raise your hand if you think webpage load times are great -- not too slow at all.No one? Well, Google may have just made big strides to increase load time for websites, while not compromising anything in the process. So how did the tech giant do that?In IT Blogwatch, we hit refresh. So what is going on? DL Cabe gives us some background:Google...released a brand new, open-source JPEG encoder called Guetzli that can do two...neat things...it can decrease JPEG file size by 35% without a noticeable decrease in quality, and...it can increase the quality of an image without increasing file size at all. But what does that mean, exactly? Rafael Fariñas explains:To read this article in full or to leave a comment, please click here

NFS For Network Engineers

Without beating the ‘old drum’ without reason, sometimes you have to ask does the drum still need beating. Quick 5 minute articles like this one are always worth asking that question. As system administrators make the journey to SREs or ‘Site Reliability Engineers’, network engineers are also on the same trajectory. We might start from an expected Liam Neeson story point (I have some very specific skills etc), but it’s time to become a better Dad and just stop letting them take your daughter. Sometimes we just need to understand why it’s good to understand certain technology and in this case dream boat (I watched ‘The Accountant’ night, what an excellent film), NFS provides us with the ability to write and test code on remote machines for automation use cases. Sure, it’s just a network based file share, but the power of what it allows us to do is far more interesting.

Needless to say, on the same theme as the last blog post, this is another one that is anchored around StackStorm. With our trusty platform, when we create components for a pack like a actions and sensors, it’s important to have access to an IDE or set of Continue reading

The future of networking: It’s in a white box

Whether it’s food, beverages or automobiles, I want options and don’t want to be told what to do. I feel the same way about networking equipment. I’ve resented the fact that select vendors have had too much control in dictating choices over the years. I don’t think users should be told what, when and how they should buy, deploy and upgrade their network equipment. Luckily, those days are numbered thanks in part to the good work of the Open Compute Project, whose mission is to design and enable the delivery of the most efficient server, storage and data center hardware designs for scalable computing. To read this article in full or to leave a comment, please click here

The future of networking: It’s in a white box

Whether it’s food, beverages or automobiles, I want options and don’t want to be told what to do. I feel the same way about networking equipment. I’ve resented the fact that select vendors have had too much control in dictating choices over the years. I don’t think users should be told what, when and how they should buy, deploy and upgrade their network equipment. Luckily, those days are numbered thanks in part to the good work of the Open Compute Project, whose mission is to design and enable the delivery of the most efficient server, storage and data center hardware designs for scalable computing. To read this article in full or to leave a comment, please click here

Data the key ingredient for restaurant chain success

Businesses have more data than ever about their operations, supply chains and customers. The problem is often they can’t see it, don’t know where it is, and don’t have an easy want to pull it all together and analyze it. So, they are unable to make smart decisions and can lose thousands of dollars a year. It’s a challenge restaurant franchisors such as CraftWorks Restaurants and Breweries Inc. face. CraftWorks has found a solution, though—OnDemand software from ArrowStream. + Also on Network World: 8 big data predictions for 2017 + OnDemand does the “dirty work” of collecting data from food distributors, cleaning the data, analyzing it and putting the information front and center for supply chain restaurant managers, said Jeff Dorr, chief customer officer of ArrowStream. To read this article in full or to leave a comment, please click here

Ultimate guide to strategic tech partners

The IT vendor landscape is constantly in flux, with mergers, acquisitions, new technology developments and the growth of the cloud having a huge impact on which companies might be the most strategic partners for organizations looking to enhance their technology infrastructure.To read this article in full or to leave a comment, please click here(Insider Story)

Ultimate guide to strategic tech partners

The IT vendor landscape is constantly in flux, with mergers, acquisitions, new technology developments and the growth of the cloud having a huge impact on which companies might be the most strategic partners for organizations looking to enhance their technology infrastructure.To read this article in full or to leave a comment, please click here(Insider Story)

Ultimate guide to strategic tech partners

The IT vendor landscape is constantly in flux, with mergers, acquisitions, new technology developments and the growth of the cloud having a huge impact on which companies might be the most strategic partners for organizations looking to enhance their technology infrastructure. Consider some of the major technology merger and acquisition activities just over the past year: Microsoft acquired LinkedIn, Oracle acquired NetSuite, Broadcom acquired Brocade, HPE is buying Nimble Storage, and Dell acquired EMC.To read this article in full or to leave a comment, please click here(Insider Story)

Review: Manage desktops remotely with these 5 tools

Remote monitoring and management (RMM) can be a great way to keep tabs on workstations, servers, and other IT infrastructure and also automate some maintenance and remediation tasks. This can help save time and resources in the IT department.To read this article in full or to leave a comment, please click here(Insider Story)

New products of the week 3.20.17

New products of the weekImage by SolarWindsOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Asavie Industrial IoT Accelerator KitImage by asavieTo read this article in full or to leave a comment, please click here