Archive

Category Archives for "Networking"

Why We Wear Seat Belts On Airplanes

This post is inspired by Matt Simmons‘ fantastic post on why we still have ashtrays on airplanes, despite smoking being banned over a decade ago. This time, I’m going to cover seat belts on airplanes. I’ve often heard people balking at the practice for being somewhat arbitrary and useless, much like balking at turning off electronic devices before takeoff. But while some rules in commercial aviation are a bit arbitrary, there is a very good reason for seat belts.

In addition to being a very, very frequent flier (I just hit 1 million miles on United), I’m also a licensed fixed wing pilot and skydiving instructor. Part of the training of any new skydiver is what we call the “pilot briefing”. And as part of that briefing we talk about the FAA rules for seat belts: They should be on for taxi, take-off, and landing. That’s true for commercial flights as well.

Some people balk at the idea of seat belts on commercial airliners. After all, if you fly into the side of a mountain, a seat belt isn’t going to help much. But they’re still important.

84271048

Your Seat Belt Is For Me, My Seat Belt Is For You

Continue reading

Let’s Encrypt with DANE

For many years we’ve seen Domain Name certificates priced as a luxury add-on, costing many times more than the original name registration fees. Let’s Encrypt has broken that model and now basic security is now freely available to anyone. But the CA model itself is not all that robust, and there are still some critical vulnerabilities that can be exploited by a well-resourced attacker. Adding DANE TSLA records to the DNS signed zone, and equipping user applications, such as browsers, with an additional DNS lookup to fetch and validate the TLSA record is a small step, but a significant improvement to the overall security picture.

20% off Spigen 42mm Apple Watch Case and 2 Screen Protectors – Deal Alert

For the ultimate protection against drops and scratches, Spigen has invented the Rugged Armor case for your 42mm Apple Watch. The case features glossy accents and carbon fiber textures, and air absorption for superior shock protection.  The product ships with 2 screen protectors as well, and is currently listed for just $11.99, 20% off its list price. See the deal on Amazon.To read this article in full or to leave a comment, please click here

8K matures at CES, but your PC may not be ready

In 2020, 4K will be passe. The 2020 Tokyo Olympics will be broadcast in the 8K resolution, which is four times deeper than 4K.The 8K resolution -- 7680 x 4320 pixels -- will make movies will look stunning, and gaming will be even better than on today's PlayStation Pro or Xbox One S.There's a good chance you aren't thinking of 8K yet because you haven't even moved to 4K. The early 8K adopters will be gamers looking to buy the latest and greatest hardware, and creative professionals making 8K content.Content creation is as important as the hardware itself, and efforts to broadcast at 8K are underway. PCs are getting ready: Microsoft has said Windows 10 will support 8K.To read this article in full or to leave a comment, please click here

8K matures at CES, but your PC may not be ready

In 2020, 4K will be passe. The 2020 Tokyo Olympics will be broadcast in the 8K resolution, which is four times deeper than 4K.The 8K resolution -- 7680 x 4320 pixels -- will make movies will look stunning, and gaming will be even better than on today's PlayStation Pro or Xbox One S.There's a good chance you aren't thinking of 8K yet because you haven't even moved to 4K. The early 8K adopters will be gamers looking to buy the latest and greatest hardware, and creative professionals making 8K content.Content creation is as important as the hardware itself, and efforts to broadcast at 8K are underway. PCs are getting ready: Microsoft has said Windows 10 will support 8K.To read this article in full or to leave a comment, please click here

FTC goes after D-Link for shoddy security in routers, cameras

The U.S. Federal Trade Commission is cracking down on D-Link for selling wireless routers and internet cameras that can easily be hacked, the regulator said Thursday.Thousands of consumers are at risk, the FTC said in a complaint filed against the Taiwanese manufacturer charging D-Link with repeatedly failing to take reasonable measures to secure the products.The action comes as hackers have been hijacking poorly secured internet-connected products to launch massive cyberattacks that can force websites offline. Recently, a notorious malware known as Mirai has been found infecting routers, cameras, and DVRs built with weak default passwords.To read this article in full or to leave a comment, please click here

FTC goes after D-Link for shoddy security in routers, cameras

The U.S. Federal Trade Commission is cracking down on D-Link for selling wireless routers and internet cameras that can easily be hacked, the regulator said Thursday.Thousands of consumers are at risk, the FTC said in a complaint filed against the Taiwanese manufacturer charging D-Link with repeatedly failing to take reasonable measures to secure the products.The action comes as hackers have been hijacking poorly secured internet-connected products to launch massive cyberattacks that can force websites offline. Recently, a notorious malware known as Mirai has been found infecting routers, cameras, and DVRs built with weak default passwords.To read this article in full or to leave a comment, please click here

Intel’s Compute Card mini-computer is so small that you may lose it

You've perhaps never seen a full-blown computer smaller than Intel's amazingly thin Compute Card, announced for the first time at CES.At first glance, it's easy to mistake the modular computer for a credit card or smart card. It's so thin, it could be easy to lose.But it's a full blown computer, crammed with a 7th Generation Intel Kaby Lake processor, memory, storage, and wireless connectivity.It's so small, it can't accommodate USB-C or other ports to power up or connect to displays. The Compute Card will work only after being plugged into a slot of a larger device, much like smart cards.Here's the bad news: It's not targeted toward PCs. However, we hope Intel will eventually make them for PCs, and there are hints the chipmaker could.To read this article in full or to leave a comment, please click here

Woth Reading: Domain name proxies for privacy

Privacy/proxy services carry no per se stigma of nefarious purpose, although when first introduced circa 2006 there was some skepticism they could enable cybersquatting and panelists expressed different views in weighing the legitimacy for their use. Some Panels found high volume registrants responsible for registering domain-name-incorporating trademarks. Others rejected the distinction between high and low volume as a determining factor. WWF-World Wide Fund for Nature aka WWF International v. Moniker Online Services LLC and Gregory Ricks, D2006-0975 (WIPO November 1, 2006) expresses the consensus, namely that use of these services “does not of itself indicate bad faith; there are many legitimate reasons for proxy registration services”). —Circle ID

LinkedInTwitterGoogle+Facebook

The post Woth Reading: Domain name proxies for privacy appeared first on 'net work.

IDG Contributor Network: 5 New Year’s resolutions for the telecom industry

Every year around this time we “gaze into our crystal ball” to identify key trends for the coming year. But this year I’ve decided to do something different. So, instead I’ll share some suggestions for New Year’s resolutions that we, as an industry, should work on together in 2017.What’s the difference, you ask? Trends are defined by the general direction in which something is shifting or changing, whereas the dictionary defines resolution as “a firm decision to do or not do something” or “the action of solving a problem, dispute or contentious matter.” So while the trends of the past few years have prepared us to expect the unexpected when it comes to today’s networks and what users demand, now is the time for us to be bold in our solutions.To read this article in full or to leave a comment, please click here

FTC takes D-Link to court citing lax product security, privacy perils

The Federal Trade Commission has filed a complaint against network equipment vendor D-Link saying inadequate security in the company’s wireless routers and Internet cameras left consumers open to o hackers and privacy violations. +More on Network World: Top 10 Google searches of 2016 in pictures+ The FTC, in a complaint filed in the Northern District of California charged that “D-Link failed to take reasonable steps to secure its routers and Internet Protocol (IP) cameras, potentially compromising sensitive consumer information, including live video and audio feeds from D-Link IP cameras.”To read this article in full or to leave a comment, please click here

FTC takes D-Link to court citing lax product security, privacy perils

The Federal Trade Commission has filed a complaint against network equipment vendor D-Link saying inadequate security in the company’s wireless routers and Internet cameras left consumers open to o hackers and privacy violations. +More on Network World: Top 10 Google searches of 2016 in pictures+ The FTC, in a complaint filed in the Northern District of California charged that “D-Link failed to take reasonable steps to secure its routers and Internet Protocol (IP) cameras, potentially compromising sensitive consumer information, including live video and audio feeds from D-Link IP cameras.”To read this article in full or to leave a comment, please click here

FTC takes D-Link to court citing lax product security, privacy perils

The Federal Trade Commission has filed a complaint against network equipment vendor D-Link saying inadequate security in the company’s wireless routers and Internet cameras left consumers open to o hackers and privacy violations. +More on Network World: Top 10 Google searches of 2016 in pictures+ The FTC, in a complaint filed in the Northern District of California charged that “D-Link failed to take reasonable steps to secure its routers and Internet Protocol (IP) cameras, potentially compromising sensitive consumer information, including live video and audio feeds from D-Link IP cameras.”To read this article in full or to leave a comment, please click here

IT Resume Makeover: Focus on results that matter

Your resume needs to convey your work history and experience in a way that makes sense to a recruiter or hiring manager. But it's difficult to view your personal work experience as an outsider would, or to remember that not everyone has the same technical knowledge. That was the case for Rick Deckard, (whose name has been changed for this article). He needed to cut through the technical jargon to better show his personality and unique skills.To read this article in full or to leave a comment, please click here(Insider Story)

7 tips for better security awareness training sessions

Boring training sessions?Image by ThinkstockAt their worst, security awareness training sessions are boring wastes of time, both for employees and the IT people responsible for them. At their best, however, they are interactive, discussion-driven, and genuinely helpful opportunities to raise security issues and lay the groundwork for better habits.To read this article in full or to leave a comment, please click here

7 tips for better security awareness training sessions

Boring training sessions?Image by ThinkstockAt their worst, security awareness training sessions are boring wastes of time, both for employees and the IT people responsible for them. At their best, however, they are interactive, discussion-driven, and genuinely helpful opportunities to raise security issues and lay the groundwork for better habits.To read this article in full or to leave a comment, please click here

How Hadoop helps Experian crunch credit reports

Experian has implemented a new data analytics system designed to shrink from months to hours the time it takes to processes petabytes of data from hundreds of millions of customers worldwide. The information services company is deploying the software, a data fabric layer based on the Hadoop file processing system, in tandem with microservices and an API platform, that enables both corporate customers and consumers to access credit reports and information more quickly. Experian Experian CIO Barry Libenson.To read this article in full or to leave a comment, please click here

This company is using Amazon Snowmobile to transfer petabytes of data to the cloud

One of the most dramatic announcements from Amazon Web Services at its 2016 re:Invent conference was the announcement of Snowmobile: It’s a 45’ semi truck that trailers a data center on wheels. Customers can load it up with up to 100 petabytes of data per Snowmobile, which is then driven to an AWS data center and loaded into the company’s cloud. It begs the question: Who’s actually using this? DigitalGlobe (DGI) is one company. +MORE AT NETWORK WORLD: Amazon will literally truck your data into its cloud + To read this article in full or to leave a comment, please click here

Hottest Enterprise Networking & IT Startups of 2017

So many cool networking and IT startups, so little time to write about them all. One way that we at least acknowledge their presence, however, is by running this interactive timeline of funding announcements.First out of the gate this year are companies such as CloudCraze, NGDATA and Klipfolio (OK, it's a stretch to call Klipfolio a startup, given that the business was founded in 2001, but it did re-launch into the cloud in 2011...and the company just got fresh funding).MORE: Hottest Enterprise Networking & IT Startups of 2016To read this article in full or to leave a comment, please click here