Archive

Category Archives for "Networking"

IDG Contributor Network: Dome9 offers multi-cloud security, adds native support for Azure

Dome9 Security, a cloud infrastructure security and compliance vendor, announced today that it is offering native support for the Microsoft Azure cloud platform.This is interesting because until now, Dome9 had strongly pushed an Amazon Web Services (AWS) story. The reasons for that are clear: AWS is the 1,000-pound elephant when it comes to cloud infrastructure, greatly eclipsing all other vendors in terms of market share. But reliance on a single vendor is risky, and the number of third-party vendors at AWS’ recent re:Invent conference that looked uncomfortable at AWS announcements shows the folly of being completely tied to one platform.To read this article in full or to leave a comment, please click here

A network geek pilgrimage – Networking Field Day 14

What is Networking Field Day?

Networking Field Day 14 or #NFD14 is almost upon us! I am heading to sunny San Jose, California to drink from the fire hose of data – the heavens will part and rain down golden non-fragmented packets of information and insight.

If you’re not familiar with Networking Field Day, which is part of Tech Field Day hosted by Gestalt IT, you can go here to get a full overview.

The Delegates

Networking Field Day is rare opportunity for individuals (delegates) that are engaged in the practice of network engineering/architecture to come together and interact not only with the vendors who are presenting but also fellow delegates.

While some of the delegates have attended previous Tech Field Day events, others, like myself are first timers and will be taking in the vast array of technical content as fast as our buffers permit.

The delegates comprise a group of like-minded and yet diverse networkers that are heavily invested in the community of network engineers and IT.

It’s truly a privilege to be be invited to NFD14 and I count myself fortunate to be in the company of some incredibly sharp practitioners of IP networking – a Continue reading

A network geek pilgrimage – Networking Field Day 14

What is Networking Field Day?

Networking Field Day 14 or #NFD14 is almost upon us! I am heading to sunny San Jose, California to drink from the fire hose of data – the heavens will part and rain down golden non-fragmented packets of information and insight.

If you’re not familiar with Networking Field Day, which is part of Tech Field Day hosted by Gestalt IT, you can go here to get a full overview.

The Delegates

Networking Field Day is rare opportunity for individuals (delegates) that are engaged in the practice of network engineering/architecture to come together and interact not only with the vendors who are presenting but also fellow delegates.

While some of the delegates have attended previous Tech Field Day events, others, like myself are first timers and will be taking in the vast array of technical content as fast as our buffers permit.

The delegates comprise a group of like-minded and yet diverse networkers that are heavily invested in the community of network engineers and IT.

It’s truly a privilege to be be invited to NFD14 and I count myself fortunate to be in the company of some incredibly sharp practitioners of IP networking – a Continue reading

IDG Contributor Network: Fighting cybercrime using IoT and AI-based automation

Last November, detectives investigating a murder case in Bentonville, Arkansas, accessed utility data from a smart meter to determine that 140 gallons of water had been used at the victim’s home between 1 a.m. and 3 a.m. It was more water than had been used at the home before, and it was used at a suspicious time—evidence that the patio area had been sprayed down to conceal the murder scene.As technology advances, we have more detailed data and analytics at our fingertips than ever before. It can potentially offer new insights for crime investigators.One area crying out for more insight is cybersecurity.By 2020, 60 percent of digital businesses will suffer a major service failure due to the inability of IT security teams to manage digital risk, according to Gartner. If we pair all this new Internet of Things (IoT) data with artificial intelligence (AI) and machine learning, there’s scope to turn the tide in the fight against cybercriminals.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Fighting cybercrime using IoT and AI-based automation

Last November, detectives investigating a murder case in Bentonville, Arkansas, accessed utility data from a smart meter to determine that 140 gallons of water had been used at the victim’s home between 1 a.m. and 3 a.m. It was more water than had been used at the home before, and it was used at a suspicious time—evidence that the patio area had been sprayed down to conceal the murder scene.As technology advances, we have more detailed data and analytics at our fingertips than ever before. It can potentially offer new insights for crime investigators.One area crying out for more insight is cybersecurity.By 2020, 60 percent of digital businesses will suffer a major service failure due to the inability of IT security teams to manage digital risk, according to Gartner. If we pair all this new Internet of Things (IoT) data with artificial intelligence (AI) and machine learning, there’s scope to turn the tide in the fight against cybercriminals.To read this article in full or to leave a comment, please click here

Indian privacy case against WhatsApp gains momentum

A privacy lawsuit against WhatsApp in India over its new data sharing policy has got momentum with the country’s top court seeking responses from Facebook, WhatsApp and the federal government.The privacy policy of WhatsApp at launch in 2010 did not allow sharing of user data with any other party, and after Facebook announced its acquisition of the messaging app in 2014, it was “publicly announced and acknowledged” by WhatsApp that the privacy policy would not change, according to the petition filed by Indian users of WhatsApp.WhatsApp sparked off a furore last year when it said it would be sharing some account information of users with Facebook and its companies, including the mobile phone numbers they verified when they registered with WhatsApp. The sharing of information will enable users to see better friend suggestions and more relevant ads on Facebook, it added.To read this article in full or to leave a comment, please click here

Indian privacy case against WhatsApp gains momentum

A privacy lawsuit against WhatsApp in India over its new data sharing policy has got momentum with the country’s top court seeking responses from Facebook, WhatsApp and the federal government.The privacy policy of WhatsApp at launch in 2010 did not allow sharing of user data with any other party, and after Facebook announced its acquisition of the messaging app in 2014, it was “publicly announced and acknowledged” by WhatsApp that the privacy policy would not change, according to the petition filed by Indian users of WhatsApp.WhatsApp sparked off a furore last year when it said it would be sharing some account information of users with Facebook and its companies, including the mobile phone numbers they verified when they registered with WhatsApp. The sharing of information will enable users to see better friend suggestions and more relevant ads on Facebook, it added.To read this article in full or to leave a comment, please click here

Is Fate Sharing bad thing in network design ?

Is fate sharing bad thing in network design? Someone asked this question recently on my youtube channel and I want to share a post for the website followers as well. First of all, what is fate sharing ? Below is the Wikipedia definition of fate sharing. ” Fate-sharing is an engineering design philosophy where related parts of a […]

The post Is Fate Sharing bad thing in network design ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Apple to release MacBook Pro models with 32GB of RAM this year

When Apple released its line of revamped MacBook Pros late last year, the response was surprisingly lukewarm. Even though Apple's new flagship notebook introduced us to the TouchBar, even the most die-hard Apple enthusiasts couldn't help but notice that Apple's new notebooks were a little underpowered and incredibly pricey.One of the more common complaints, at least from power users, was that Apple's new MacBook Pro maxed out at 16GB of RAM. While 16GB of RAM is more than enough for most users, folks who work with complex video and photography workflows will glady take all the memory they can get their hands on. And while Apple can arguably get away with a 16GB RAM limit on its MacBook and MacBook Air line, some pondered why Apple's Pro level notebook was subject to what was presumably an arbitrary ceiling.To read this article in full or to leave a comment, please click here

Response: Saving you bandwidth on Google+ through machine learning

Image compression reduces network requirements in a major way.

  1. Smaller files means less bandwidth
  2. Less round trips for faster page rendering
  3. reduces load on network function like proxies, IDS, etc.

And its already in production for Android devices using Google services.

To help everyone be able to see the beautiful photos that photographers share to Google+ in their full glory, we’ve turned to machine learning and a new technology called RAISR. RAISR, which was introduced in November, uses machine learning to produce great quality versions of low-resolution images, allowing you to see beautiful photos as the photographers intended them to be seen. By using RAISR to display some of the large images on Google+, we’ve been able to use up to 75 percent less bandwidth per image we’ve applied it to.

Saving you bandwidth on Google+ through machine learning

The post Response: Saving you bandwidth on Google+ through machine learning appeared first on EtherealMind.

Intel thinks IoT will have a firm place in the stores of the future

Intel wants to level the playing field between online retailers and brick and mortar shops by introducing IoT technologies into physical stores. Currently, online retailers have access to information on what sorts of merchandise consumers look at, what they purchase, and what they don't. And Intel argues physical stores should have the same information.  In a Monday editorial on the company's site, Intel CEO, Brian Krzanich wrote:To read this article in full or to leave a comment, please click here

China tightens control over app stores

China is requiring that all app stores operating in the country register with its Cyberspace Administration in an effort to battle malware but also to tighten control over uncensored content.The rules took effect Monday, in a country where domestic third-party app stores -- not from Apple or Google -- are serving billions of downloads to Android smartphones. Chinese internet companies such as Baidu, Tencent and a host of smaller, shadier local app stores have been feeding the demand, at a time when Google has largely pulled out of the market.To read this article in full or to leave a comment, please click here

China tightens control over app stores

China is requiring that all app stores operating in the country register with its Cyberspace Administration in an effort to battle malware but also to tighten control over uncensored content.The rules took effect Monday, in a country where domestic third-party app stores -- not from Apple or Google -- are serving billions of downloads to Android smartphones. Chinese internet companies such as Baidu, Tencent and a host of smaller, shadier local app stores have been feeding the demand, at a time when Google has largely pulled out of the market.To read this article in full or to leave a comment, please click here

What will the Internet look like in 10 years? Help us answer that question

What will the Internet look like in the next seven to 10 years? How will things like marketplace consolidation, changes to regulation, increases in cybercrime or the widespread deployment of the Internet of Things impact the Internet, its users and society?

At the Internet Society, we are always thinking about what’s next for the Internet. And now we want your help!

The Internet is an incredibly dynamic medium, shaped by a multitude of pressures – be they social, political, technological, or cultural. From the rise of mobile to the emergence of widespread cyber threats, the Internet of today is different than the Internet of 10 years ago. 

Sally Shipman Wentworth

NDSS 2017 Deadlines Approaching

NDSS 2017 is almost here! The Network and Distributed System Security Symposium (NDSS) symposium fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. NDSS 2017 takes place February 26 through March 1, 2017, at Catamaran Resort Hotel & Spa in San Diego, California.

Here are some upcoming deadlines you should know about:

Megan Kruse

End User Involvement, Governance, and Expert Help Drive Success in the 10 Best Intranets of 2017

January doesn’t just mean the start of a new year for me – it also means an opportunity to review the Nielsen Norman Group’s Intranet Design Annual. The 10 Best Intranets of 2017 were officially announced on January 7, 2017. Even though it’s a little weird to call these the best intranets of 2017 – especially because the submissions were completed in June of 2016 – the report has a lot of interesting and helpful information and design trends that intranet design teams should consider. A word of caution as you review the full report, just because a feature was used in an “award winning” intranet doesn’t mean it needs to show up on your intranet! Megamenus continue to be a popular method for intranet navigation – and about half of the award winners use megamenus for global navigation. But that doesn’t mean your intranet must have a megamenu! You do, on the other hand, need to make sure that your users can find what they need easily. But, that doesn’t mean you must choose a megamenu as your navigational approach. On the other hand, if you don’t have a plan for ongoing governance, you can pretty much be Continue reading