Archive

Category Archives for "Networking"

Top 10 Ethical Dilemmas & Policy Issues in Science & Tech

You think you have problems? Sure you do, but pity those in science and technology tasked with advancing artificial intelligence, drones and healthcare methods that are fraught with peril despite potentially huge benefits.The University of Notre Dame's John J. Reilly Center for Science, Technology and Values has issued its fourth annual list of emerging ethical dilemmas and policy issues in science and technology, and it contains some doozies. It might have seemed tough to top some of 2016's issues, from lethal cyberweapons to bone conduction for marketing, but no sweat. Of course the Notre Dame center's researchers hope to be able help address some of these new concerns.To read this article in full or to leave a comment, please click here

Top 10 Ethical Dilemmas & Policy Issues in Science & Tech

You think you have problems? Sure you do, but pity those in science and technology tasked with advancing artificial intelligence, drones and healthcare methods that are fraught with peril despite potentially huge benefits.The University of Notre Dame's John J. Reilly Center for Science, Technology and Values has issued its fourth annual list of emerging ethical dilemmas and policy issues in science and technology, and it contains some doozies. It might have seemed tough to top some of 2016's issues, from lethal cyberweapons to bone conduction for marketing, but no sweat. Of course the Notre Dame center's researchers hope to be able help address some of these new concerns.To read this article in full or to leave a comment, please click here

Study shows 802.11ac wave 2 APs gaining sales ground

Shipments of 802.11ac wave 2 access points doubled in volume in the third quarter of 2016, as the newer wireless technology begins to reach further into the mainstream.According to statistics from IHS Markit, the new tech accounted for about 10% of all wireless access points shipped during the third quarter, up from 5% in the previous quarter. That’s more than half a million wave 2 access points sold during those months.+ALSO ON NETWORK WORLD: Facebook gets 2017 tech industry Year in Apologies rolling + Donald Trump offers cybersecurity warning: 'No computer is safe'To read this article in full or to leave a comment, please click here

Now its a Microblog

The transition to Packet Pushers is complete.  My long-form technical and analytical writing is published there.

Etherealmind will become a “microblog”:

  1. I want to share links, thoughts, references, observations that I collect from reading and research.
  2. Posts with just a few sentences and link to the source.
  3. Its not practical to publish to Twitter, Facebook, LinkedIn etc individually. Nor do I want to, I own this content.

 

The post Now its a Microblog appeared first on EtherealMind.

IDG Contributor Network: How mainframes prevent data breaches

2016 was a strange year marked by everything from election surprises to a seemingly endless spate of celebrity deaths. But when historians look back at this mirum anno—weird year—it may end up being known as the year of the data breach. Of course, this sort of thing isn’t restricted to 2016, but its impact on the world was hard to ignore. Among government organizations, the IRS and FBI suffered data breaches, and corporate victims included LinkedIn, Target, Verizon and Yahoo. Literally millions of people had their private information exposed to black hats, thieves and other ne’er-do-wells of the digital world. This epidemic of data theft calls upon security experts to get serious about creating new solutions.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How mainframes prevent data breaches

2016 was a strange year marked by everything from election surprises to a seemingly endless spate of celebrity deaths. But when historians look back at this mirum anno—weird year—it may end up being known as the year of the data breach. Of course, this sort of thing isn’t restricted to 2016, but its impact on the world was hard to ignore. Among government organizations, the IRS and FBI suffered data breaches, and corporate victims included LinkedIn, Target, Verizon and Yahoo. Literally millions of people had their private information exposed to black hats, thieves and other ne’er-do-wells of the digital world. This epidemic of data theft calls upon security experts to get serious about creating new solutions.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How mainframes prevent data breaches

2016 was a strange year marked by everything from election surprises to a seemingly endless spate of celebrity deaths. But when historians look back at this mirum anno—weird year—it may end up being known as the year of the data breach. Of course, this sort of thing isn’t restricted to 2016, but its impact on the world was hard to ignore. Among government organizations, the IRS and FBI suffered data breaches, and corporate victims included LinkedIn, Target, Verizon and Yahoo. Literally millions of people had their private information exposed to black hats, thieves and other ne’er-do-wells of the digital world. This epidemic of data theft calls upon security experts to get serious about creating new solutions.To read this article in full or to leave a comment, please click here

Writing Tools: 2017

From time to time, folks ask me about how I write so much, or rather “how do you get so much done???” The reality is I tend to be very focused on tools and process. As I just revisited my tools over the new year, particularly when looking at a lot of new material that needs to be written, I thought it might be helpful to someone, perhaps, to write a post about what I’m using as the year turns over. Right now, I use—

  • Word
  • OneNote
  • Zotero
  • Notepad++
  • Smartedit
  • CorelDRAW
  • Acrobat Standard

I know I’m “old fashioned” in this tool set; I don’t do fancy markdown, markup, marksideways, or any of that stuff. I don’t swear by a platform (I don’t have a dog in the the Apple versus Microsoft fight), etc. But this set of tools has been modified, thought, and rethought across the last 20 years and the writing of millions of words of text contained in hundreds of papers, 11 books, many hours of classroom time, etc. I have been through periods when I really focused on finding some cool new tool to write with, maybe trying to “get rid of distractions,” or whatever else. Continue reading

Review: Microsoft Windows Defender comes up short

Microsoft’s latest version of its anti-malware tool, Windows Defender, is a frustrating product to evaluate. Yes, it is perhaps the best antivirus tool to come from Microsoft, with a series of noteworthy improvements. Yes, it provides good enough protection for your family’s PCs. And yes, it could be your PC’s sole antivirus utility, if you are willing to accept its limitations.To read this article in full or to leave a comment, please click here(Insider Story)

Review: Microsoft Windows Defender comes up short

Microsoft’s latest version of its anti-malware tool, Windows Defender, is a frustrating product to evaluate. Yes, it is perhaps the best antivirus tool to come from Microsoft, with a series of noteworthy improvements. Yes, it provides good enough protection for your family’s PCs. And yes, it could be your PC’s sole antivirus utility, if you are willing to accept its limitations.However, once you examine the product in more detail, you will see why we cannot recommend it for enterprise use. And that is the frustration of this product: Microsoft is trying to do the right thing and offers a tempting feast, but ultimately offers an incomplete meal that is tough to digest.To read this article in full or to leave a comment, please click here(Insider Story)

The loss of net neutrality: Say goodbye to a free and open internet

First: I’m not a lawyer. Net neutrality—the principle that no online traffic has priority over other traffic, not even for pay—might go away. If it does, big money will be behind its demise. The end of network neutrality will create many lasting problems, including these specific issues: 1. The lawyers win  Every conceivable new theory about how one organization should have priority will ensue, and the courts will be clogged deciding the outcome. Today, the principle is simple: all traffic gets the same priority, and multimedia can have isochronous priority, but it’s not guaranteed. + Also on Network World: How Trump will attack the FCC's net neutrality rules + Without net neutrality, we will enter an era where ISPs, telcos, carriers and interconnects will all demand that THEIR traffic has priority, and yours does not—unless you pay. Let the litigation begin, and the courts glow in the dark in an attempt to sort out what theories of law now hold sway. Insert wallet, here. To read this article in full or to leave a comment, please click here

Security Data Growth Drives SOAPA (Security Operations and Analytics Platform Architecture)

Happy new year cybersecurity community!  Hope you are well rested, it’s bound to be an eventful year ahead.Way back when at the end of November 2016, I posted a blog about an evolutionary trend I see happening around cybersecurity analytics and operations technology.  Historically, large enterprises have relied on SIEM products to anchor their SOCs.  This will continue but I see SIEM becoming part of a more global cybersecurity software architecture called SOAPA (i.e. security operations and analytics platform architecture). SOAPA uses middleware (i.e. message queueing, transaction processing, etc.), APIs, and industry standards like CybOX, STIX, and TAXII to connect disparate cybersecurity analytics and operations tools and data sources like EDR, network security analytics, UBA/machine learning analytics systems, vulnerability scanners, security asset management, anti-malware sandboxes/cloud services, incident response platforms, and threat intelligence into a cohesive software architecture.  In this way, disparate analytics tools can be used collectively to gain more context out of the data while accelerating processes and cybersecurity operations.To read this article in full or to leave a comment, please click here

Security Data Growth Drives SOAPA (Security Operations and Analytics Platform Architecture)

Happy new year cybersecurity community!  Hope you are well rested, it’s bound to be an eventful year ahead.Way back when at the end of November 2016, I posted a blog about an evolutionary trend I see happening around cybersecurity analytics and operations technology.  Historically, large enterprises have relied on SIEM products to anchor their SOCs.  This will continue but I see SIEM becoming part of a more global cybersecurity software architecture called SOAPA (i.e. security operations and analytics platform architecture). SOAPA uses middleware (i.e. message queueing, transaction processing, etc.), APIs, and industry standards like CybOX, STIX, and TAXII to connect disparate cybersecurity analytics and operations tools and data sources like EDR, network security analytics, UBA/machine learning analytics systems, vulnerability scanners, security asset management, anti-malware sandboxes/cloud services, incident response platforms, and threat intelligence into a cohesive software architecture.  In this way, disparate analytics tools can be used collectively to gain more context out of the data while accelerating processes and cybersecurity operations.To read this article in full or to leave a comment, please click here

Security data growth drives SOAPA

Happy new year, cybersecurity community! I hope you are well rested; it’s bound to be an eventful year.Way back when at the end of November 2016, I wrote a blog post about an evolutionary trend I see happening around cybersecurity analytics and operations technology. Historically, large enterprises have relied on SIEM products to anchor their security operations centers (SOCs). This will continue, but I see SIEM becoming part of a more global cybersecurity software architecture called SOAPA (security operations and analytics platform architecture). To read this article in full or to leave a comment, please click here

Security data growth drives SOAPA

Happy new year, cybersecurity community! I hope you are well rested; it’s bound to be an eventful year.Way back when at the end of November 2016, I wrote a blog post about an evolutionary trend I see happening around cybersecurity analytics and operations technology. Historically, large enterprises have relied on SIEM products to anchor their security operations centers (SOCs). This will continue, but I see SIEM becoming part of a more global cybersecurity software architecture called SOAPA (security operations and analytics platform architecture). To read this article in full or to leave a comment, please click here

Acer’s Chromebook 11 N7 is tough as nails, but runs on old tech

Do you have the nasty habit of knocking your laptop around? Meet Acer's tough-as-nails Chromebook 11 N7, designed to withstand a serious beating.The Chromebook 11 N7 has an 11.6-inch screen and is fortified with layers of protection to withstand drops. Acer has been so meticulous in ruggedizing the laptop that it's even difficult to remove key caps from the keyboard -- whether by accident or on purpose.Why did Acer construct such a Chromebook? It's targeted at educational institutions that issue laptops to students, who may be clumsy with PCs. The Chromebook 11 N7 is certainly more durable than the iPad, which has been given to students and can crack easily if mishandled.To read this article in full or to leave a comment, please click here

LeEco’s smart bicycles with Android OS will be hard to steal

Conventional bicycles are undergoing a radical technological makeover that could change the way people ride and protect their bikes. LeEco isn't reinventing the wheel with its new Smart Road and Smart Mountain bikes, but infusing them with dazzling technology derived from smartphones and self-driving cars. The bicycles have navigation, fitness and communication features, and even technology to track a stolen bike. These new features are more than just bells and whistles -- they could be a blueprint of how future bikes could look. Transportation is the next big technology frontier, and LeEco's bikes are cool and smart. The LeEco smart bikes will be available in the U.S. in the second quarter. A company spokeswoman said prices will be announced at a later date.To read this article in full or to leave a comment, please click here