Archive

Category Archives for "Networking"

Is this the year IoT standards will finally make sense?

A few brave souls predict IoT standards will start to gel this year, but making all those connected things work together still looks like a long shot.Two years ago, some industry analysts cautiously suggested that a vast array of IoT standards would merge into just a few beginning in 2017. If the internet of things in late 2014 was a cacophony of discordant musicians tuning up, it’s now reached the point where a few virtuosos are playing the same tune. But there’s still a lot of sheet music getting passed around.To read this article in full or to leave a comment, please click here

Is this the year IoT standards will finally make sense?

A few brave souls predict IoT standards will start to gel this year, but making all those connected things work together still looks like a long shot.Two years ago, some industry analysts cautiously suggested that a vast array of IoT standards would merge into just a few beginning in 2017. If the internet of things in late 2014 was a cacophony of discordant musicians tuning up, it’s now reached the point where a few virtuosos are playing the same tune. But there’s still a lot of sheet music getting passed around.To read this article in full or to leave a comment, please click here

Stumbling And Fumbling Into Video Blogging

I’m used to writing and to podcasting. I know what the content creation and publication process looks like for written and audio media. The increasing popularity of video has had me and my business partner scratching our heads, wondering how we can best leverage the medium. Or if we even should.

And so, we’ve begun our video adventure the way we’ve always done things. Just go for it. Try it. Hit publish. It won’t be perfect, but that’s okay. Learn and improve.

My first video was a good bit of work, taking roughly eight hours to write, shoot, produce, and publish a ten minute video covering some tech industry news. That’s not scalable, but it was a learning experience. Here was my process.

Write

I get press releases from dozens of marketers and public relations firms, usually several per day. I chose some that I thought folks might be interested in. And then I wrote copy. I know from past projects that many written words translate to many spoken minutes. You have to keep copy tight if you’re writing to a time limit.

I managed to do that, writing just under a thousand words of copy. I did ad lib a bit, but Continue reading

Is LISP (Locator Identity Separation Protocol) Dead?

Today, there are many networking technologies which haven’t been widely deployed. And among them are Internet Multicast and IPv6 although these two protocols have many benefits .  But probably people are asking the correct question. Do we really need new protocol ? Or can we solve our problem with the existing mechanisms deployed on our […]

The post Is LISP (Locator Identity Separation Protocol) Dead? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

IDG Contributor Network: 3 security analytics approaches that don’t work (but could) — Part 1

Digital technologies have changed the face of business and government, and they will continue to do so at an even faster pace. They drive innovation, boost productivity, improve communications and generate competitive advantage, among other benefits.The dark side of this digital revolution has now come clearly into focus as well: McKinsey estimates that cyber attacks will cost the global economy $3 trillion in lost productivity and growth by 2020, while theft, sabotage and other damage inflicted by trusted insider personnel continue to cost organizations in lost revenues, revealed secrets and damaged reputations.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 3 security analytics approaches that don’t work (but could) — Part 1

Digital technologies have changed the face of business and government, and they will continue to do so at an even faster pace. They drive innovation, boost productivity, improve communications and generate competitive advantage, among other benefits.The dark side of this digital revolution has now come clearly into focus as well: McKinsey estimates that cyber attacks will cost the global economy $3 trillion in lost productivity and growth by 2020, while theft, sabotage and other damage inflicted by trusted insider personnel continue to cost organizations in lost revenues, revealed secrets and damaged reputations.To read this article in full or to leave a comment, please click here

WhatsApp vulnerability could expose messages to prying eyes, report claims

When Facebook’s WhatsApp turned on end-end-end encryption in its messaging service last year, it was a big deal. As all eyes were glued on Apple’s fight with the FBI over unlocking the San Bernardino shooter’s iPhone, WhatsApp took a huge step toward protecting its users’ privacy by moving to encrypt all messages and calls being sent between its apps.But a new report suggests it might not be as secure as users think. According to The Guardian, a serious vulnerability in WhatApp’s encryption could allow Facebook to intercept and read messages unbeknownst to the recipient, and only aware of by the sender if they have previously opted in to receive encryption warnings. The security flaw, which was discovered by Tobias Boelter, a cryptography and security researcher at the University of California, Berkeley, can “effectively grant access (to users’ messages)” by changing the security keys and resending messages.To read this article in full or to leave a comment, please click here

WhatsApp vulnerability could expose messages to prying eyes, report claims

When Facebook’s WhatsApp turned on end-end-end encryption in its messaging service last year, it was a big deal. As all eyes were glued on Apple’s fight with the FBI over unlocking the San Bernardino shooter’s iPhone, WhatsApp took a huge step toward protecting its users’ privacy by moving to encrypt all messages and calls being sent between its apps.But a new report suggests it might not be as secure as users think. According to The Guardian, a serious vulnerability in WhatApp’s encryption could allow Facebook to intercept and read messages unbeknownst to the recipient, and only aware of by the sender if they have previously opted in to receive encryption warnings. The security flaw, which was discovered by Tobias Boelter, a cryptography and security researcher at the University of California, Berkeley, can “effectively grant access (to users’ messages)” by changing the security keys and resending messages.To read this article in full or to leave a comment, please click here

Small businesses are prime targets for cyber attacks: SIEM-as-a-service can help

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  In February 2016, quick service restaurant The Wendy’s Company reported unusual payment card activity affecting some of its franchise restaurants. The breach was confirmed in May when the company revealed it had found evidence of malware on the affected stores’ point-of-sale systems. Additional malicious activity was later reported in June.In a statement from the CEO, the company says it believes the cyberattacks resulted from service providers’ remote access credentials being compromised, allowing access – and the ability to deploy malware – to some franchisees’ point-of-sale systems.To read this article in full or to leave a comment, please click here

Small businesses are prime targets for cyber attacks: SIEM-as-a-service can help

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  In February 2016, quick service restaurant The Wendy’s Company reported unusual payment card activity affecting some of its franchise restaurants. The breach was confirmed in May when the company revealed it had found evidence of malware on the affected stores’ point-of-sale systems. Additional malicious activity was later reported in June.In a statement from the CEO, the company says it believes the cyberattacks resulted from service providers’ remote access credentials being compromised, allowing access – and the ability to deploy malware – to some franchisees’ point-of-sale systems.To read this article in full or to leave a comment, please click here

IDG Contributor Network: API adoption: Traditional industries lag

At the close of 2016, Gartner Research Director Mark O’Neill presented at both API Strategy and Practice (in Boston) and APIdays Global (in Paris) to share his insights into this year’s API trends. Top on his list was a discussion about how, while everyone talks about building APIs, the much larger impact of APIs is with their consumption. O’Neill predicts that 2017 will see some maturing in product offerings that support businesses with their API consumption.To read this article in full or to leave a comment, please click here

After MongoDB, ransomware groups hit exposed Elasticsearch clusters

After deleting data from thousands of publicly accessible MongoDB databases, ransomware groups have started doing the same with Elasticsearch clusters that are accessible from the internet and are not properly secured.Elasticsearch is a Java-based search engine that's popular in enterprise environments. It's typically used in conjunction with log collection and data analytics and visualization platforms.The first report of an Elasticsearch cluster being hit by ransomware appeared on the official support forums on Thursday from a user who was running a test deployment accessible from the internet.To read this article in full or to leave a comment, please click here

After MongoDB, ransomware groups hit exposed Elasticsearch clusters

After deleting data from thousands of publicly accessible MongoDB databases, ransomware groups have started doing the same with Elasticsearch clusters that are accessible from the internet and are not properly secured.Elasticsearch is a Java-based search engine that's popular in enterprise environments. It's typically used in conjunction with log collection and data analytics and visualization platforms.The first report of an Elasticsearch cluster being hit by ransomware appeared on the official support forums on Thursday from a user who was running a test deployment accessible from the internet.To read this article in full or to leave a comment, please click here

Review: Netgear Nighthawk X10 packs a speed punch, has nice add-on features

How many years have gone by since you’ve upgraded your Wi-Fi router? If it’s been a few years and you want to also future-proof the network for upcoming technologies, a router on your short list should be Netgear’s Nighthawk X10 (model R9000, $499.99).The X10 not only has very fast dual-band (5GHz and 2.4 GHz) networking, but it also adds 802.11ad (60GHz) support, which provides for very fast data transfer rates over very short distances. This can be perfect for transferring large amounts of files over your LAN (such as between computers or a centralized storage device). Netgear also says that VR gaming will benefit from 802.11ad technologies (for when the headsets go wireless and need a high-speed connection to the PC from the headset) in the future. MU-MIMO technology is also supported, which maintains high data transfers when multiple-devices are also trying to do things on the network (such as stream video).To read this article in full or to leave a comment, please click here

European legislators debate robot rights for autonomous vehicles

Robots should one day have rights as "electronic persons," members of the European Parliament recommended Thursday -- but not until the machines are all fitted with "kill" switches to shut them down in an emergency.Parliament's Legal Affairs Committee wants the European Commission to propose legislation that will settle a number of ethical and liability issues in the field of robotics -- including who is to blame when an autonomous vehicle is involved in a collision.Granting the more sophisticated autonomous robots some kind of electronic personhood could settle issues of who is responsible for their actions, the committee suggested. More urgent than the question of robot rights, though, is the setting up of an obligatory insurance scheme that would pay out to the victims of a self-driving car if it caused an accident in the European Union.To read this article in full or to leave a comment, please click here

Amazon commits to hiring 100,000 U.S. workers

Over the next 18 months, Amazon expects to add 100,000 full-time jobs in the U.S.While many of the jobs will be in warehouses, Amazon said the company will be looking for engineers and software developers in such areas as cloud computing and machine learning.[To comment on this article, visit Computerworld's Facebook page.]“Innovation is one of our guiding principles at Amazon, and it’s created hundreds of thousands of American jobs,” said Jeff Bezos, Amazon founder and CEO, in a statement. “These jobs are not just in our Seattle headquarters or in Silicon Valley. They’re in our customer service network, fulfillment centers and other facilities in local communities throughout the country.”To read this article in full or to leave a comment, please click here