Archive

Category Archives for "Networking"

Leave Your Ego at the Door

You are just about to walk into the interview room. Regardless of whether you are being interviewed, or interviewing—what are you thinking about? Are you thinking about winning? Are you thinking about whining? Or are you thinking about engaging? I have noticed, on many mailing lists, and in many other forums, that interviews in our world have devolved into a contest of egos.

The person on the other side of the table has some certification I don’t care about—how can I prove they are dumb, not as smart as their certification might indicate, or… The person on the other side of the table claims to know some protocol, can I find some bit of information they don’t know? These kinds of questions are really just ego questions—and you need to leave them at the door. This is particularly acute with certifications right now—a lot of people doubt the value of certifications, claiming folks who have them don’t know anything, the certifications are worthless, they don’t reflect the real world, etc.

I will agree that we have a problem with the depth and level of knowledge of network engineers at the moment. We all need to grow up a little, learn Continue reading

The IT-business gap remains

In light of its increasingly prominent and strategic role, IT continues to remain in control of technology budgets. One-third of the CIOs responding to CIO.com's 2017 State of the CIO survey said IT controls 71 percent or more of their organizations' technology budgets.To read this article in full or to leave a comment, please click here(Insider Story)

Lessons from the rise and fall of an open source project

Eight years ago, the CyanogenMod project exploded onto the mobile device software scene. The Android-based open source mobile operating system quickly caught the attention of developers, Android fans and investors, and attracted interest from tech giants including Microsoft and Google. But at the end of last year the project imploded spectacularly.  Today the CyanogenMod project is no more, but the arc of its story offers fascinating insight into the world of open source software development.The project started out innocently enough following the discovery, in 2008, of a way to root mobile phones running Google's Android operating system, allowing modified firmware to be installed on rooted devices. One such piece of firmware was created by a developer called Steve Kondik, whose online handle was Cyanogen — a colorless toxic gas made by oxidizing hydrogen cyanide. The modified firmware was known as CyanogenMod.To read this article in full or to leave a comment, please click here

Insurance spin-out rides API-driven strategy

Allstate has spun out an analytics business that harnesses driver risk scores, roadside rescue services and other telematics data, which it is packaging into software to sell to rival insurers, automakers, as well as ride-sharing companies. So it is fitting that the startup, called Arity, is also aping the API-based platform strategies of the very startups that have blown up the transportation industry.The symmetry isn't lost on Chetan Phadnis, vice president of Arity Platform, who says a platform is the best way Arity can make its APIs and software development kits (SDKs) available to customers in the software-is-eating-the-world era. Arity’s products could help insurers, for example, better price policies.To read this article in full or to leave a comment, please click here

BrandPost: Cloud for the enterprise

Portions of this post were originally posted on the Puppet blog, and are republished here with Puppet's permission.Enterprise companies turn to the cloud for lots of reasons: to quickly and economically provide development and testing environments; to burst at times of peak customer demand; and to generally be able to make changes faster and more flexibly.Whatever you think you may need from the cloud — and whatever concerns and reservations you may have — others have been there.To read this article in full or to leave a comment, please click here

Accenture wants to help businesses secure their blockchains

Accenture wants to help businesses use blockchain technologies more securely by locking away the encryption keys they use to sign transactions.It's built a system that blockchain developers can use to store credentials in specialized cryptoprocessors called hardware security modules (HSMs).HSMs are typically used by banks to store the PINs associated with payment cards or the credentials used to make interbank payments over the SWIFT network, and are much more secure than storing the credentials, even in encrypted form, on network-connected servers from where attackers could steal them.The PINs or credentials never leave the HSMs, and their use within them is strictly controlled.To read this article in full or to leave a comment, please click here

Accenture wants to help businesses secure their blockchains

Accenture wants to help businesses use blockchain technologies more securely by locking away the encryption keys they use to sign transactions.It's built a system that blockchain developers can use to store credentials in specialized cryptoprocessors called hardware security modules (HSMs).HSMs are typically used by banks to store the PINs associated with payment cards or the credentials used to make interbank payments over the SWIFT network, and are much more secure than storing the credentials, even in encrypted form, on network-connected servers from where attackers could steal them.The PINs or credentials never leave the HSMs, and their use within them is strictly controlled.To read this article in full or to leave a comment, please click here

Here’s how Evernote moved 3 petabytes of data to Google’s cloud

Evernote decided last year that it wanted to move away from running its own data centers and start using the public cloud to operate its popular note-taking service. On Wednesday, it announced that the lion's share of the work is done, save for some last user attachments.The company signed up to work with Google, and as part of the migration process, the tech titan sent a team of engineers (in one case, bearing doughnuts) over to work with its customer on making sure the process was a success.Evernote wanted to take advantage of the cloud to help with features based on machine learning that it has been developing. It also wanted to leverage the flexibility that comes from not having to run a data center.To read this article in full or to leave a comment, please click here

Avaya powers the hockey Mecca: Montreal Canadiens’ Bell Centre

In the sports world there is no team more revered by its city than the Montreal Canadiens. With all due respect to Green Back Packer, New York Yankee or New England Patriots fans, you don’t know the absolute die-hard devotion of a Canadiens supporter. The team has also had an unparalleled level of success in North American sports with 24 Stanley Cup Championships and an equal number of players in the recently released NHL's top 100 players of all time. The home of this storied franchise is the Bell Centre in downtown Montreal. When one walks into the building, its easy to understand what “Canadiens tradition” means, as there are reminders of the legends who played for this franchise and the promise of future greatness, which is why the fans come out in droves no matter what. Through success and failure, good times and bad, the seats always sell out. To read this article in full or to leave a comment, please click here

NASA has a shadow IT problem

It’s not often enterprises get direct evidence of a shadow IT operation but a recent audit of NASA’s IT realm came up with 28 unsanctioned cloud services operating in its environment.NASA’s own CIO office found eight such services while the NASA Office of Inspector General discovered another 20, as part of an overall cloud security audit done by the NASA OIG.+More on Network World: NASA’s “Human Computers” and the Hidden Figures movie story+To read this article in full or to leave a comment, please click here

NASA has a shadow IT problem

It’s not often enterprises get direct evidence of a shadow IT operation but a recent audit of NASA’s IT realm came up with 28 unsanctioned cloud services operating in its environment.NASA’s own CIO office found eight such services while the NASA Office of Inspector General discovered another 20, as part of an overall cloud security audit done by the NASA OIG.+More on Network World: NASA’s “Human Computers” and the Hidden Figures movie story+To read this article in full or to leave a comment, please click here

NASA has a shadow IT problem

It’s not often enterprises get direct evidence of a shadow IT operation but a recent audit of NASA’s IT realm came up with 28 unsanctioned cloud services operating in its environment. NASA’s own CIO office found eight such services while the NASA Office of Inspector General discovered another 20, as part of an overall cloud security audit done by the NASA OIG. +More on Network World: NASA’s “Human Computers” and the Hidden Figures movie story+To read this article in full or to leave a comment, please click here

13 tech jobs that pay $200k salaries

Which IT roles earn the biggest salaries? Thirteen tech jobs can pull in salaries of $200,000 or more, according to new data from a tech staffing firm.The jobs that top $200,000 are the highest paying titles included in Mondo’s annual Tech Salary Guide, which lists salary ranges for 95 IT jobs. Most jobs in the $200,000 range are high-level IT leadership or technical positions related to hot areas such as security and big data. Two of the highest-paying jobs are developer roles tied to specific vendor platforms: Demandware and iOS. RELATED: 25 CIO pay packages revealed | Want to boost your CIO pay? Switch jobs | Bonuses, stocks, perks lift CIO compensation | 20 highest paid tech CEOsTo read this article in full or to leave a comment, please click here

13% off Jaybird X2 Sport Wireless Bluetooth Headphones (Storm White) – Deal Alert

With a regular list price of $149.99, the current discount makes the Jaybird X2 Sport is now available with a 13% discount for this deal. Features include: Premium Bluetooth Audio For Skip-Free Music Outdoors 8 Hours of Music + Calls With Complete Remote Controls Secure Over/Under-Ear Fit Options Lifetime Sweat proof Warranty Includes Comply Premium Sport Memory Foam Ear Tips, Patented Secure-Fit Ear Fins, Friction-Fit Silicone Sport Carrying Case, Silicone Ear Tips, Charging Cable & Cord Management Clips. Jump to Amazon now for additional details, and to explore buying options.To read this article in full or to leave a comment, please click here

Hard-to-detect fileless attacks target banks, other organizations

A wave of attacks that have recently affected banks and other enterprises used open-source penetration testing tools loaded directly into memory instead of traditional malware, making their detection much harder.Researchers from antivirus vendor Kaspersky Lab started investigating these attacks after the security team from an unnamed bank found Meterpreter in the random access memory (RAM) of a server that acted as the organization's Windows domain controller.Meterpreter is an in-memory attack payload that can inject itself into other running processes and is used to establish persistency on a compromised system. It is part of the Metasploit penetration testing framework, a popular tool used both by internal security teams and by malicious hackers.To read this article in full or to leave a comment, please click here

Hard-to-detect fileless attacks target banks, other organizations

A wave of attacks that have recently affected banks and other enterprises used open-source penetration testing tools loaded directly into memory instead of traditional malware, making their detection much harder.Researchers from antivirus vendor Kaspersky Lab started investigating these attacks after the security team from an unnamed bank found Meterpreter in the random access memory (RAM) of a server that acted as the organization's Windows domain controller.Meterpreter is an in-memory attack payload that can inject itself into other running processes and is used to establish persistency on a compromised system. It is part of the Metasploit penetration testing framework, a popular tool used both by internal security teams and by malicious hackers.To read this article in full or to leave a comment, please click here