Archive

Category Archives for "Networking"

Nuclear physics, plastic surgery & more: 802.11ac wave 2 users sound off

The second wave of 802.11ac Wi-Fi technology, primarily distinguished by new MIMO capabilities, bigger channels and the general ability to handle larger and denser groups of connections, is starting to make its way into enterprises.MU-MIMO is the piece that’s got everyone excited for wave 2 – it stands for multi-user, multiple-input, multiple-output, meaning that access points use larger numbers of antennae that can be managed algorithmically to provide a more flexible distribution of wireless resources. In essence, these are smarter access points that are better able to handle large numbers of users at any given time, and feature more advanced ways to manage different kinds of wireless links.To read this article in full or to leave a comment, please click here

Nuclear physics, plastic surgery & more: 802.11ac wave 2 users sound off

The second wave of 802.11ac Wi-Fi technology, primarily distinguished by new MIMO capabilities, bigger channels and the general ability to handle larger and denser groups of connections, is starting to make its way into enterprises.MU-MIMO is the piece that’s got everyone excited for wave 2 – it stands for multi-user, multiple-input, multiple-output, meaning that access points use larger numbers of antennae that can be managed algorithmically to provide a more flexible distribution of wireless resources. In essence, these are smarter access points that are better able to handle large numbers of users at any given time, and feature more advanced ways to manage different kinds of wireless links.To read this article in full or to leave a comment, please click here

‘Don’t be this guy’

No wonder people from Massachusetts get called that name we all find kind of amusing but I still shouldn’t print on this website for networking professionals. The Massachusetts State Police posted the above photo to Facebook a few hours ago, along with this admonishment: Soooo..... this just happened. Trooper Paul Copponi just stopped this vehicle on the Massachusetts Turnpike in Weston. How little regard do you have to have for the lives and safety of your fellow citizens, not to mention your own life and safety, to do this?To read this article in full or to leave a comment, please click here

‘Don’t be this guy’

No wonder people from Massachusetts get called that name we all find kind of amusing but I still shouldn’t print on this website for networking professionals. The Massachusetts State Police posted the above photo to Facebook a few hours ago, along with this admonishment: Soooo..... this just happened. Trooper Paul Copponi just stopped this vehicle on the Massachusetts Turnpike in Weston. How little regard do you have to have for the lives and safety of your fellow citizens, not to mention your own life and safety, to do this?To read this article in full or to leave a comment, please click here

‘Don’t be this guy’

No wonder people from Massachusetts get called that name we all find kind of amusing but I still shouldn’t print on this website for networking professionals. The Massachusetts State Police posted the above photo to Facebook a few hours ago, along with this admonishment: Soooo..... this just happened. Trooper Paul Copponi just stopped this vehicle on the Massachusetts Turnpike in Weston. How little regard do you have to have for the lives and safety of your fellow citizens, not to mention your own life and safety, to do this?To read this article in full or to leave a comment, please click here

Microsoft fixes record number of flaws, some publicly known

Microsoft's batch of security patches for March is one of the largest ever and includes fixes for several vulnerabilities that are publicly known and actively exploited.The company published 17 security bulletins covering 135 vulnerabilities in its own products and one separate bulletin for Flash Player, which has its security patches distributed through Windows Update. Nine bulletins are rated critical and nine are rated as important.The affected products include Windows, Internet Explorer, Microsoft Edge, Microsoft Office, Exchange, Skype for Business, Microsoft Lync, and Silverlight.To read this article in full or to leave a comment, please click here

Microsoft fixes record number of flaws, some publicly known

Microsoft's batch of security patches for March is one of the largest ever and includes fixes for several vulnerabilities that are publicly known and actively exploited.The company published 17 security bulletins covering 135 vulnerabilities in its own products and one separate bulletin for Flash Player, which has its security patches distributed through Windows Update. Nine bulletins are rated critical and nine are rated as important.The affected products include Windows, Internet Explorer, Microsoft Edge, Microsoft Office, Exchange, Skype for Business, Microsoft Lync, and Silverlight.To read this article in full or to leave a comment, please click here

Applied Networking Research Workshop – Paper Submission Deadline: 3 April

We’re excited to share news of the second Applied Networking Research Workshop (ANRW2017), which will take place in Prague, Czech Republic, on July 15. This one-day workshop will be co-sponsored by the Association for Computing Machinery (ACM), the Internet Society and the Internet Research Task Force (IRTF). The Call for Papers is open now, with a deadline of 3 April.

Mat Ford

Fast Convergence and the Fast Reroute – Definitions/Design Considerations in IP and MPLS

Fast Convergence and the Fast Reroute Network reliability is an important design aspect for deployability of time and loss sensitive applications. When a link, node or SRLG failure occurs in a routed network, there is inevitably a period of disruption to the delivery of traffic until the network reconverges on the new topology.   Fast reaction is essential […]

The post Fast Convergence and the Fast Reroute – Definitions/Design Considerations in IP and MPLS appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

AWS offers Alexa developers free cloud credits

Developers interested in extending the capabilities of Amazon’s Alexa virtual assistant have some more free tools in their arsenal, thanks to a program the company announced Wednesday.Developers with an active Alexa skill --  a service that expands the capabilities of the virtual assistant -- can apply for $100 in Amazon Web Services credits every month to help pay for what they’ve built. After that, they can receive up to $100 per month in additional credits if they incur usage charges for their skills.The credits are meant to build on AWS’s existing Free Tier, which offers developers a small bundle of free services every month, but charges them for any usage that goes over those low caps. According to a blog post by Amazon CTO Werner Vogels, the move is supposed to make it free for developers to operate most Alexa skills.To read this article in full or to leave a comment, please click here

Appeals court rules Americans have no legal recourse if hacked by foreign governments

Put aside the matter of Russian interference in our presidential election to instead consider this scenario: If Vladimir Putin ordered his government-employed hackers to plant spyware on your personal computer – stealing all your data and even recording your Skype calls – you would have no access to any legal remedy in the U.S. court system. Preposterous, you say? That’s the law, according to the United States Court of Appeals for the District of Columbia Circuit, which yesterday upheld a lower court decision denying even a day in court to an American citizen who moved here from Ethiopia 30 years ago and was victimized by that country’s government in the exact fashion described above.To read this article in full or to leave a comment, please click here

Appeals court rules Americans have no legal recourse if hacked by foreign governments

Put aside the matter of Russian interference in our presidential election to instead consider this scenario: If Vladimir Putin ordered his government-employed hackers to plant spyware on your personal computer – stealing all your data and even recording your Skype calls – you would have no access to any legal remedy in the U.S. court system. Preposterous, you say? That’s the law, according to the United States Court of Appeals for the District of Columbia Circuit, which yesterday upheld a lower court decision denying even a day in court to an American citizen who moved here from Ethiopia 30 years ago and was victimized by that country’s government in the exact fashion described above.To read this article in full or to leave a comment, please click here

Four charged, including Russian gov’t agents, for massive Yahoo hack

The U.S. Federal Bureau of Investigation has charged four people, including two Russian state intelligence agents, for their involvement in a massive hack of Yahoo that affected half a billion accounts.In September, Yahoo said hackers had managed to steal personal data on more than 500 million users during an attack in late 2014. The stolen data included names, email addresses, telephone numbers and hashed passwords. Blame for the attack was put on a "state-sponsored" group.On Wednesday, the FBI said that group was the Russian Federal Security Service, the FSB, and it identified agents Dmitry Dokuchaev and Igor Sushchin as leaders of the attack.To read this article in full or to leave a comment, please click here

Four charged, including Russian gov’t agents, for massive Yahoo hack

The U.S. Federal Bureau of Investigation has charged four people, including two Russian state intelligence agents, for their involvement in a massive hack of Yahoo that affected half a billion accounts.In September, Yahoo said hackers had managed to steal personal data on more than 500 million users during an attack in late 2014. The stolen data included names, email addresses, telephone numbers and hashed passwords. Blame for the attack was put on a "state-sponsored" group.On Wednesday, the FBI said that group was the Russian Federal Security Service, the FSB, and it identified agents Dmitry Dokuchaev and Igor Sushchin as leaders of the attack.To read this article in full or to leave a comment, please click here

PII of 33,698,126 Americans leaked online

The personal identifying information (PII)—names, email addresses, phone numbers, physical addresses, employers and job titles—for 33,698,126 Americans has been leaked online.The data, a 52.2GB CSV file, came from a commercial corporate database. Security researcher Troy Hunt determined that the breach came from NetProspex, a service provided by Dun & Bradstreet, which ironically was named as a 2017 world’s most ethical company.To read this article in full or to leave a comment, please click here