Archive

Category Archives for "Networking"

5 ways to recruit more women in 2017

Companies, especially in technology, are pulling out all the stops to recruit and retain women: fertility benefits, shipping breast milk home from work trips, in-office massages and manicures, on-site OB/GYNs, the ability to travel with children and a care-giver and feminine products in the restrooms are just a few of the ways companies are getting creative with trying to appeal to women.But while these perks might be appreciated, they're not the fundamental drivers of women's decisions to come on board with your company -- or to stick around, says Ursula Mead, co-founder and CEO of InHerSight, an employee ratings and review site for women.To read this article in full or to leave a comment, please click here

Trump administration threatens net neutrality, cloud and IoT

Businesses could lose their choice of cloud services and applications if the incoming administration or the new congress rolls back net neutrality rules, Tom Wheeler, the outgoing chair of the Federal Communications Commission, warned in his final planned speech before stepping down.Identifying the 2015 open Internet order as one of his signature policy achievements, Wheeler positioned the FCC's net neutrality regulation, which bars ISPs from blocking or slowing transmissions on their networks, as a needed protection for consumers and businesses alike."As everything goes into the cloud, the ability to access the cloud free of gatekeepers is essential. If ISPs get to choose which applications and clouds work better than others in terms of access, speed and latency, they will control the cloud future," Wheeler said.To read this article in full or to leave a comment, please click here

Trump administration threatens net neutrality, cloud and IoT

Businesses could lose their choice of cloud services and applications if the incoming administration or the new congress rolls back net neutrality rules, Tom Wheeler, the outgoing chair of the Federal Communications Commission, warned in his final planned speech before stepping down.Identifying the 2015 open Internet order as one of his signature policy achievements, Wheeler positioned the FCC's net neutrality regulation, which bars ISPs from blocking or slowing transmissions on their networks, as a needed protection for consumers and businesses alike."As everything goes into the cloud, the ability to access the cloud free of gatekeepers is essential. If ISPs get to choose which applications and clouds work better than others in terms of access, speed and latency, they will control the cloud future," Wheeler said.To read this article in full or to leave a comment, please click here

Tech world has changed dramatically since the White House last changed hands

Eight years is but a blink in the grand scheme, yet so much will have changed on the technology and social-media landscape between when Barack Obama took the oath on Jan. 20, 2009 and Donald Trump does so Friday.Before he got started, Obama needed to plead and perhaps pull rank to keep his beloved BlackBerry, a gadget preference which at the time did not seem all that odd. Obama would remain loyal to the device, too, even as its popularity diminished, only relinquishing it last year in exchange for a customized smartphone that he mocked as more suitable for a toddler than a commander in chief.To read this article in full or to leave a comment, please click here

Tech world has changed dramatically since the White House last changed hands

Eight years is but a blink in the grand scheme, yet so much will have changed on the technology and social-media landscape between when Barack Obama took the oath on Jan. 20, 2009 and Donald Trump does so Friday.Before he got started, Obama needed to plead and perhaps pull rank to keep his beloved BlackBerry, a gadget preference which at the time did not seem all that odd. Obama would remain loyal to the device, too, even as its popularity diminished, only relinquishing it last year in exchange for a customized smartphone that he mocked as more suitable for a toddler than a commander in chief.To read this article in full or to leave a comment, please click here

How to overcome 5 common resume mistakes

Our resume writers have seen it all. IT resumes come in all shapes and sizes - they can be as long as novels, as hard to decode as a Shakespeare play or boring enough to put even the biggest tech-junkie to sleep. And that's because writing a resume is not an easy task, no matter how long you've been in the game or how confident you are in your skills and experience.To read this article in full or to leave a comment, please click here(Insider Story)

Tips on where to start in managing risk

Plugging the holesImage by Les ChatfieldWhat is risk management? Any time you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. As organizations innovate and change the way they use technology, the risks change too. Traditional approaches and controls are no longer good enough. Caroline Wong, vice president of security strategy at Cobalt, provides a fewtips for managing risk in today’s modern business environment.To read this article in full or to leave a comment, please click here

Tips on where to start in managing risk

Plugging the holesImage by Les ChatfieldWhat is risk management? Any time you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. As organizations innovate and change the way they use technology, the risks change too. Traditional approaches and controls are no longer good enough. Caroline Wong, vice president of security strategy at Cobalt, provides a fewtips for managing risk in today’s modern business environment.To read this article in full or to leave a comment, please click here

How—and why—you should use a VPN any time you hop on the internet

One of the most important skills any computer user should have is the ability to use a virtual private network (VPN) to protect their privacy. A VPN is typically a paid service that keeps your web browsing secure and private over public Wi-Fi hotspots. VPNs can also get past regional restrictions for video- and music-streaming sites and help you evade government censorship restrictions—though that last one is especially tricky.The best way to think of a VPN is as a secure tunnel between your PC and destinations you visit on the internet. Your PC connects to a VPN server, which can be located in the United States or a foreign country like the United Kingdom, France, Sweden, or Thailand. Your web traffic then passes back and forth through that server. The end result: As far as most websites are concerned, you’re browsing from that server’s geographical location, not your computer’s location.To read this article in full or to leave a comment, please click here

How—and why—you should use a VPN any time you hop on the internet

One of the most important skills any computer user should have is the ability to use a virtual private network (VPN) to protect their privacy. A VPN is typically a paid service that keeps your web browsing secure and private over public Wi-Fi hotspots. VPNs can also get past regional restrictions for video- and music-streaming sites and help you evade government censorship restrictions—though that last one is especially tricky.The best way to think of a VPN is as a secure tunnel between your PC and destinations you visit on the internet. Your PC connects to a VPN server, which can be located in the United States or a foreign country like the United Kingdom, France, Sweden, or Thailand. Your web traffic then passes back and forth through that server. The end result: As far as most websites are concerned, you’re browsing from that server’s geographical location, not your computer’s location.To read this article in full or to leave a comment, please click here

How—and why—you should use a VPN any time you hop on the internet

One of the most important skills any computer user should have is the ability to use a virtual private network (VPN) to protect their privacy. A VPN is typically a paid service that keeps your web browsing secure and private over public Wi-Fi hotspots. VPNs can also get past regional restrictions for video- and music-streaming sites and help you evade government censorship restrictions—though that last one is especially tricky.The best way to think of a VPN is as a secure tunnel between your PC and destinations you visit on the internet. Your PC connects to a VPN server, which can be located in the United States or a foreign country like the United Kingdom, France, Sweden, or Thailand. Your web traffic then passes back and forth through that server. The end result: As far as most websites are concerned, you’re browsing from that server’s geographical location, not your computer’s location.To read this article in full or to leave a comment, please click here

An Inside Look at Juniper Networks’ Forthcoming JNCIE-DC Exam

Data Centers and the Cloud are all the rage right now, and Juniper has been at the forefront of the Data Center revolution from the very beginning – early on with their introduction of the QFX and the much maligned QFabric, and more recently with the addition of Virtual Chassis Fabric (VCF), various open architectures …

Repealing passwords is a long way away

The campaign to eliminate passwords has been ongoing, and growing, for close to a decade. There are even some declarations that this might be the year, or at least ought to be the year, that it happens.Don’t hold your breath. Brett McDowell, executive director of the FIDO (Fast IDentity Online) Alliance, is as passionate an advocate of eliminating passwords as anyone. He says that day is coming, given the creation of a, “new generation of authentication technology” largely based on biometrics, and a “massive collaboration among hundreds of companies” to define standards for that technology.To read this article in full or to leave a comment, please click here