Archive

Category Archives for "Networking"

The best office apps for Android

It's 2017. You shouldn't have to worry about whether that old budget spreadsheet will open on your tablet or whether the document in your inbox will look right on your phone. In this day and age, having office apps that work seamlessly and consistently across devices should be a given. Everything should, as the cool kids say, "just work."Yet here we are, in an era where mobile devices are as critical to productivity as desktop computers -- and our virtual office tools are still anything but universal. Features that function smoothly on one product or platform don't always work the same on another. For business users in particular, that can be a serious problem.To read this article in full or to leave a comment, please click here

Review: 3 services for managing all your cloud storage accounts

If you're like most people, you live part -- or most -- of your computing life in the cloud. And odds are that you use more than one cloud-based storage service, such as Dropbox, Google Drive, Microsoft OneDrive and others. Do you find yourself tearing your hair out when you try to remember on which service you've stored what files? Do you wish you could easily move or copy those files between your cloud services, or between the services and your local storage?To read this article in full or to leave a comment, please click here(Insider Story)

Why IT innovation follows failure

All IT organizations strive for innovation. To succeed in today's digital market you to adapt to the needs of your customers, outflanking your competitors and disrupting the status quo. So what's the most important thing IT leaders of innovative IT companies do that set them apart?"Failure is the most important element of innovation. As an IT leader, it's hard enough to know what you want; then you're taking into account what your competitors are doing, what your customers want and need, what your employees can and cannot accomplish. It's almost impossible not to fail in these high-pressure situations, but that's where innovation sparks," says Tom Willerer, chief product officer for online learning technology and MOOC provider Coursera.To read this article in full or to leave a comment, please click here

How to eliminate insider threats

Insider threats are a major security problemImage by ThinkstockFor years, the primary security objective has been to protect the perimeter—the focus on keeping outsiders from gaining access and doing harm. But statistics prove that more risk exists within an organization. Indeed, many compliance regulations require monitoring of systems to identify and eliminate insider threat. According to Forrester, 58 percent of breaches are caused from internal incidents or with a business partner’s organization. And 55 percent of attacks are originated by an insider as cited in the 2015 IBM Cyber Security Intelligence Index.To read this article in full or to leave a comment, please click here

How to eliminate insider threats

Insider threats are a major security problemImage by ThinkstockFor years, the primary security objective has been to protect the perimeter—the focus on keeping outsiders from gaining access and doing harm. But statistics prove that more risk exists within an organization. Indeed, many compliance regulations require monitoring of systems to identify and eliminate insider threat. According to Forrester, 58 percent of breaches are caused from internal incidents or with a business partner’s organization. And 55 percent of attacks are originated by an insider as cited in the 2015 IBM Cyber Security Intelligence Index.To read this article in full or to leave a comment, please click here

VRF Series Article 3 – Creating a Shared Services VRF

For those following the VRF Series, we currently have a topology built that consists of a segmented Layer 3 first hop network and remotely networked by carrying the isolation from the BrWan router to Main. This article covers, shared services, the next step in our journey to understanding VRFs for Segmented Layer 3 Networks.

The configuration focus is solely on the router Main. The shared services VRF that will be created could serve as a place to connect something that all other VRFs must have access to. Organizations should evaluate their requirements closely before deploying this configuration.

An organization that requires stateful inspection between two areas may choose to connect two or more VRFs together using an L4 or Next Generation Firewall (we will cover this in Article 5). The security ramification of having a shared services VRF, as described in this article, is that devices connected in this area could be used as a proxy into other areas. Therefore, careful planning and proper device level security is important prior to deploying this type of architecture.

The technologies covered here include:

  • IGP w/ Route Redistribution (EIGRP)
  • BGP w/ Route Redistribution
  • VRFs with Route Targets/Route Distinguisher vlaues

VRF_No_Int_Index

The logic of Continue reading

IDG Contributor Network: 6 ways to launch a targeted cyberattack

The threat of a targeted attack for any business is real and substantial. It's vital to ensure that your organization can identify constantly evolving threats, find abnormal and suspicious activity, and take effective action to keep your data safe. Consider that, on average, attackers are in a network for more than 140 days before they're detected, and 60% of network intrusions are eventually traced back to credentials, according to according to Microsoft. Most successful targeted attacks follow six steps or stages, though it's important to remember that these steps often run in parallel. Multifaceted attacks are common, so a robust threat response plan should address all six steps and avoid jumping to conclusions.To read this article in full or to leave a comment, please click here

IDG Contributor Network: TechDemocracy: Helping execs and boards ensure cybersafety

I sit on a number of not-for-profit and commercial boards of directors. I am lucky in that I have a pretty good understanding of how their technology landscape can introduce risks into the business. As someone who spends much of his time in the tech world, I can bring this knowledge and awareness into the companies I work with. But that isn't the usual way things work. Most boards of directors are made up of individuals who have little or no awareness of their organization's technology footprint and the impacts it can have when something goes wrong. This is the problem space that TechDemocracy, a global cyberrisk assurance solution provider, is trying to solve with its Intellicta platform.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Hackers could use hidden mal-audio to attack Google Now

There's a fabulous story about a slew of Amazon Echo devices that took it upon themselves to order expensive doll houses from the ecommerce retailer all because a news show host uttered the phrase “Alexa ordered me a dollhouse” on air. The machines heard it from the TV switched on in the room.Researchers say it’s not an unlikely scenario. They say not only can attackers issue mal-audio voice commands to any AI listening device that is in audible range, but they can also do it using hidden voice commands. Those are commands that might not even be noticed by the user.To read this article in full or to leave a comment, please click here

New products of the week 1.30.17

New products of the weekImage by NSSOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Blue Medora vRealize Operations Management Pack for Amazon AuroraImage by bluemedoraTo read this article in full or to leave a comment, please click here

6 highly useful & entertaining podcasts for IT & network pros

While I acknowledge that my first choices for podcast listening tend toward entertainment (All Songs Considered, The Moth, This American Life), I also encourage myself to consume to those that might help me better understand networking and keep up on the general technology scene. Here’s a short list of podcasts that enterprise IT pros might find useful --and even enjoyable.Voices from DARPA I’ll admit that this podcast intimidated me before I first listened to it, but it’s actually quite digestible even if you’re not a Ph.D. The Defense Advanced Research Projects Agency kicked off the series in September and pumps out one or two episodes per month, based on interviews by Ivan Amato with program managers from DARPA’s six technical offices (Biological Technologies, Defense Sciences, Information Innovation, Microsystems Technology, Strategic Technology, and Tactical Technology). Topics have included “Molecule Man”, “Space Sentinel” and “The Semiconductor Whisperer”, the latter of which gives a great short history of semiconductors and a look to the future. All episodes so far are less than 30 minutes long and several are under 20 minutes long. To read this article in full or to leave a comment, please click here

Restoring Space 15.2 data to 16.1

The upgrade from Space platform 15.2 to 16.1 is one of the worst procedures I’ve seen in quite a while.   It is complicated because the underlying CentOS is being upgraded at the same time, so I guess that’s part of the reason, but still, it could be a lot slicker and better tested.

In summary, you have to apply a couple of patches, the second of which backs your 15.2 data up somewhere else – ideally over SCP to a remote server.  You then shut down your 15.2 VM, install a fresh 16.1 VM with the same IP addresses, and restore the data to it.

Sounds easy, but the 16.1 installation part can generally only be done by the customer’s VMware admin because it needs console access.  So you’ve got to rely on them following lots of instructions quite well.

Recently a customer experienced some kind of failure in the restoration part, leaving me with a fresh installed 16.1, but no data.  I SSHed on to the VM and could see the standard menu, but wasn’t offered any option to attempt another restore.   After digging around for a while, I found Continue reading

Response:New Office 365 subscriptions for consumers plunged 62% in 2016 | ITworld

Another “public cloud isn’t for everyone” story:

By charting Office 365’s new subscribers using a trailing 12 months — the latest quarter plus the three previous — to eliminate seasonal spikes, the suite’s waxing and waning over the past four years becomes apparent. From its Q1 2013 debut until Q4 2015, Office 365 subscriber growth was always steady, sometimes spectacular.

Solid approach to charting and yes, Office 365 did well but:

After Q4 2015, however, the trailing 12-month numbers fell, a decline fueled by the plateau of 0.9 million each quarter from the second onward. That resulted in a gain of just 4.3 million subscribers throughout 2016, a reduction of 62% from the year before.

Office365 new subs 100706400 large

Oh, the path to public cloud isn’t always a growth market? That’s not the story from the clouderati. Oh dear.

New Office 365 subscriptions for consumers plunged 62% in 2016 | ITworld : http://www.itworld.com/article/3162708/enterprise-applications/new-office-365-subscriptions-for-consumers-plunged-62-in-2016.html

The post Response:New Office 365 subscriptions for consumers plunged 62% in 2016 | ITworld appeared first on EtherealMind.

About 150 Delta flights in the US canceled after systems outage

About 150 flights of Delta Air Lines in the U.S. were canceled and some others were delayed on Sunday on account of an IT systems outage, the airline reported.Delta said more flight cancellations were expected.The IT systems outage at Delta is the latest of a number that have affected airline operations recently.Delta reported earlier that its teams were working to fix quickly a systems outage that has resulted in departure delays and cancellations. It did not provide information on the systems issue that had caused the outage.“Not all delays and cancellations are being reflected on Delta systems, including delta.com, the Fly Delta App, airport information screens or through our Reservations agents,” the airline said. It reported at 11:45 p.m. EST that a ground stop had been lifted.To read this article in full or to leave a comment, please click here

ASIC Programmability from Barefoot Networks

Full disclosure : I was lucky to be among a group of networking influencers invited to Silicon Valley to visit some networking companies and see what they were offering to the market.  I was flown out and given accommodations at the expense of Gestalt IT – the company that organized the event.  I was given some swag by each company, but I was never paid to write a positive review on the product.  Heck, I’m not even expected to write at all.

Think about the fastest switch in your network and why it’s so fast.  Traditionally, it’s because the manufacturer has developed a very efficient ASIC that does switching very well (give me some leeway here and forget about routing, encapsulation, etc.), but it really can’t do anything else.  Want a new switching feature?  Well, your switch can’t do that if the ASIC doesn’t support it.  No big deal – the manufacturer just needs to make a new ASIC that supports it, right?  This sounds simple, but, generally, this is a many-years process and requires a hardware update on your end.  This is not a good solution in a world where new features and technologies Continue reading