Archive

Category Archives for "Networking"

Trump’s CIA nominee grilled on his advocacy of surveillance database

President-elect Donald Trump's nominee to head the Central Intelligence Agency wants to create a massive surveillance database by resurrecting a U.S. telephone records collection program, but some senators questioned what limits he would accept.CIA nominee Mike Pompeo, currently a Republican representative from Kansas, has called on Congress to reverse its mid-2015 decision to rein in the phone metadata collection program run by the National Security Agency, a sister agency to the CIA that focuses on signals intelligence.To read this article in full or to leave a comment, please click here

Trump’s CIA nominee grilled on his advocacy of surveillance database

President-elect Donald Trump's nominee to head the Central Intelligence Agency wants to create a massive surveillance database by resurrecting a U.S. telephone records collection program, but some senators questioned what limits he would accept.CIA nominee Mike Pompeo, currently a Republican representative from Kansas, has called on Congress to reverse its mid-2015 decision to rein in the phone metadata collection program run by the National Security Agency, a sister agency to the CIA that focuses on signals intelligence.To read this article in full or to leave a comment, please click here

FCC chief accuses AT&T and Verizon of violating net neutrality—but it probably doesn’t matter

AT&T and Verizon are probably violating the Federal Communication Commission’s net neutrality rules by allowing third-parties to pay for subscribers’ data usage.That’s the determination FCC Chairman Tom Wheeler provided in a letter to several U.S. Senators on Wednesday, along with a report on the matter from The FCC’s Wireless Telecommunications Bureau. But Wheeler is set to step down as FCC Chair once President-elect Donald Trump takes the oath of office next Thursday.To read this article in full or to leave a comment, please click here

FCC chief accuses AT&T and Verizon of violating net neutrality—but it probably doesn’t matter

AT&T and Verizon are probably violating the Federal Communication Commission’s net neutrality rules by allowing third-parties to pay for subscribers’ data usage.That’s the determination FCC Chairman Tom Wheeler provided in a letter to several U.S. Senators on Wednesday, along with a report on the matter from The FCC’s Wireless Telecommunications Bureau. But Wheeler is set to step down as FCC Chair once President-elect Donald Trump takes the oath of office next Thursday.To read this article in full or to leave a comment, please click here

Culling The Community

exclusion

By now, you may have seen some bit of drama in the VMUG community around the apparent policy change that disqualified some VMUG leaders based on their employer. Eric Shanks (@Eric_Shanks) did a great job of covering it on his blog as did Matt Crape (@MattThatITGuy)with his post. While the VMUG situation has its own unique aspects, the question for me boils down to something simple: How do you remove people from an external community?

Babies And Bathwater

Removing unauthorized people from a community is nothing new under the sun. I was a Cisco Champion once upon a time. During the program’s second year I participated in briefings and events with the rest of the group, including my good friend Amy Arnold (@AmyEngineer). When the time came to reapply to the program for Year 3, I declined to apply again for my own reasons. Amy, however, was told that she couldn’t reapply. She and several other folks in the program were being disqualified for “reasons”. It actually took us a while to figure out why, and the answer still wasn’t 100% clear. To this day the best we can figure out is that Continue reading

Containers will be a $2.6B market by 2020, research firm says

The market for containers – which are used by developers to package applications – is “exploding” with a slew of startups looking to compete with legacy vendors who are increasingly prioritizing the technology.+MORE AT NETWORK WORLD: Greenpeace’s naughty and nice list of the most – and least – green tech vendors | Oops, this Redditor accidentally deleted his Microsoft Azure DNS +To read this article in full or to leave a comment, please click here

Introduction to VPN (Virtual Private Network)

Introduction to VPN (Virtual Private Network) Let’s start with the definition. VPN is a logical network and created over shared physical infrastructure. Shared infrastructure can be private such as MPLS VPN of a Service Provider or over the Public infrastructure such as Internet. There are many concepts to understand VPN in detail but in this […]

The post Introduction to VPN (Virtual Private Network) appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Review: PocketCHIP—Super cheap Linux terminal that fits in your pocket

Portable, pocket-sized computer. Runs Linux. Has a good battery life. Bonus points for a physical keyboard, and full-size USB port. Double bonus points for being cheap. That’s sort of my ideal “carry with me” device. If I can have a Linux device, with a proper shell that I can work entirely from, I’m a happy camper. Over the past few years I’ve been able to hobble together a few devices to accomplish this Utopian goal—more or less. At one point, I hobbled together a makeshift Raspberry Pi case (with a screen that I powered with an external USB power supply) using a whole lot of electrical tape. That was great except the “case” was just—well—tape. And I couldn’t find a tiny physical keyboard that fit with the size of it.To read this article in full or to leave a comment, please click here

Microsoft launches StaffHub to connect deskless workers

Microsoft is taking another step toward serving workers who aren't at computers all day with a new Office 365 service launched Thursday. StaffHub, which is part of the company's enterprise productivity offering, allows managers to set schedules for deskless workers like retail employees and service technicians.The service is designed to let managers set schedules for and distribute company resources to employees through a simple interface. Employees can use the service to swap shifts with one another and chat, too.The new offering is part of Microsoft's push to expand usage of Office 365. While the cloud productivity service has had a strong following among knowledge workers, it has traditionally held less utility for people who aren't editing Word documents and sending emails through Outlook all day.To read this article in full or to leave a comment, please click here

Rudy Giuliani to coordinate regular cybersecurity meetings between Trump, tech leaders

Former New York Mayor Rudy Giuliani says Donald Trump has tapped him to gather top cybersecurity leaders to meet with the administration regularly to share “all the information available in the private sector” with the goal of improving national cyber defenses “because we’re so far behind.” “The president elect-decided he wanted to bring in on a regular basis the people in the private sector, the corporate leaders in particular and thought leaders in the private sector who are working on security for cyber because we’re so far behind,” Giuliani said on Fox and Friends.To read this article in full or to leave a comment, please click here

Rudy Giuliani to coordinate regular cybersecurity meetings between Trump, tech leaders

Former New York Mayor Rudy Giuliani says Donald Trump has tapped him to gather top cybersecurity leaders to meet with the administration regularly to share “all the information available in the private sector” with the goal of improving national cyber defenses “because we’re so far behind.”“The president elect-decided he wanted to bring in on a regular basis the people in the private sector, the corporate leaders in particular and thought leaders in the private sector who are working on security for cyber because we’re so far behind,” Giuliani said on Fox and Friends.To read this article in full or to leave a comment, please click here

Lessons for corporate IT from Geek Squad legal case

The life of the corporate desktop team can turn into a legal nightmare quickly if end users haven’t agreed that it’s OK for techs to search their machines, something that has come to light in a California child pornography case involving Best Buy’s Geek Squad.In that case, Geeks working on a customer laptop found a pornographic picture and turned it over to the FBI, which paid them $500 and prosecuted the owner of the machine.Now the Geeks in question are in hot water because the arrangement with the FBI violates the corporate policies of Best Buy, which runs Geek Squad.To read this article in full or to leave a comment, please click here

Lessons for corporate IT from Geek Squad legal case

The life of the corporate desktop team can turn into a legal nightmare quickly if end users haven’t agreed that it’s OK for techs to search their machines, something that has come to light in a California child pornography case involving Best Buy’s Geek Squad.In that case, Geeks working on a customer laptop found a pornographic picture and turned it over to the FBI, which paid them $500 and prosecuted the owner of the machine.Now the Geeks in question are in hot water because the arrangement with the FBI violates the corporate policies of Best Buy, which runs Geek Squad.To read this article in full or to leave a comment, please click here

43% off Microsoft Wireless Desktop 900 Keyboard and Mouse Bundle – Deal Alert

The Wireless Desktop 900 keyboard from Microsoft has quiet-touch keys and customizable buttons for access to the Windows features you use most. The full-size ambidextrous mouse provides comfortable, precise navigation. The Wireless Desktop 900 also includes Advanced Encryption Standard to help protect your information by encrypting your keystrokes. Both the keyboard and the mouse have an average battery life of 2-years. The typical list price of $50 has been reduced to $28.28, making this a good deal on Amazon where it averages 4.5 out of 5 stars (read recent reviews) from over 140 reviewers.  See it now on Amazon.To read this article in full or to leave a comment, please click here

43% off Microsoft Wireless Desktop 900 Keyboard and Mouse Bundle – Deal Alert

The Wireless Desktop 900 keyboard from Microsoft has quiet-touch keys and customizable buttons for access to the Windows features you use most. The full-size ambidextrous mouse provides comfortable, precise navigation. The Wireless Desktop 900 also includes Advanced Encryption Standard to help protect your information by encrypting your keystrokes. Both the keyboard and the mouse have an average battery life of 2-years. The typical list price of $50 has been reduced to $28.28, making this a good deal on Amazon where it averages 4.5 out of 5 stars (read recent reviews) from over 140 reviewers.  See it now on Amazon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Death to the hybrid WAN

All too often SD-WAN and hybrid WAN are used interchangeably—mistakenly. SD-WANs extend software-defined networking (SDN) technologies to the WAN. As with SDNs, SD-WANs build an “overlay” or a virtual abstraction of the underlying physical network that can then be reconfigured and optimized for the applications traveling across the overlay. It’s this property that allows SD-WANs to give one application a hub-and-spoke WAN configuration, while another application a meshed WAN configuration each with their own IP addressing spaces, traffic policies and more. Hybrid WANs combine a mix of data services to interconnect geographically dispersed locations. A network that combines MPLS and carrier Ethernet services is a hybrid WAN, so too is a WAN that combines 4G and MPLS. When you have some sites connected via MPLS and others via IP VPNs, this too was a hybrid WAN. When you have sites connected to an MPLS backbone with a secondary Internet connection, you also have a hybrid WAN.To read this article in full or to leave a comment, please click here