Archive

Category Archives for "Networking"

Tech world has changed dramatically since the White House last changed hands

Eight years is but a blink in the grand scheme, yet so much will have changed on the technology and social-media landscape between when Barack Obama took the oath on Jan. 20, 2009 and Donald Trump does so Friday.Before he got started, Obama needed to plead and perhaps pull rank to keep his beloved BlackBerry, a gadget preference which at the time did not seem all that odd. Obama would remain loyal to the device, too, even as its popularity diminished, only relinquishing it last year in exchange for a customized smartphone that he mocked as more suitable for a toddler than a commander in chief.To read this article in full or to leave a comment, please click here

Tech world has changed dramatically since the White House last changed hands

Eight years is but a blink in the grand scheme, yet so much will have changed on the technology and social-media landscape between when Barack Obama took the oath on Jan. 20, 2009 and Donald Trump does so Friday.Before he got started, Obama needed to plead and perhaps pull rank to keep his beloved BlackBerry, a gadget preference which at the time did not seem all that odd. Obama would remain loyal to the device, too, even as its popularity diminished, only relinquishing it last year in exchange for a customized smartphone that he mocked as more suitable for a toddler than a commander in chief.To read this article in full or to leave a comment, please click here

How to overcome 5 common resume mistakes

Our resume writers have seen it all. IT resumes come in all shapes and sizes - they can be as long as novels, as hard to decode as a Shakespeare play or boring enough to put even the biggest tech-junkie to sleep. And that's because writing a resume is not an easy task, no matter how long you've been in the game or how confident you are in your skills and experience.To read this article in full or to leave a comment, please click here(Insider Story)

Tips on where to start in managing risk

Plugging the holesImage by Les ChatfieldWhat is risk management? Any time you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. As organizations innovate and change the way they use technology, the risks change too. Traditional approaches and controls are no longer good enough. Caroline Wong, vice president of security strategy at Cobalt, provides a fewtips for managing risk in today’s modern business environment.To read this article in full or to leave a comment, please click here

Tips on where to start in managing risk

Plugging the holesImage by Les ChatfieldWhat is risk management? Any time you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. As organizations innovate and change the way they use technology, the risks change too. Traditional approaches and controls are no longer good enough. Caroline Wong, vice president of security strategy at Cobalt, provides a fewtips for managing risk in today’s modern business environment.To read this article in full or to leave a comment, please click here

How—and why—you should use a VPN any time you hop on the internet

One of the most important skills any computer user should have is the ability to use a virtual private network (VPN) to protect their privacy. A VPN is typically a paid service that keeps your web browsing secure and private over public Wi-Fi hotspots. VPNs can also get past regional restrictions for video- and music-streaming sites and help you evade government censorship restrictions—though that last one is especially tricky.The best way to think of a VPN is as a secure tunnel between your PC and destinations you visit on the internet. Your PC connects to a VPN server, which can be located in the United States or a foreign country like the United Kingdom, France, Sweden, or Thailand. Your web traffic then passes back and forth through that server. The end result: As far as most websites are concerned, you’re browsing from that server’s geographical location, not your computer’s location.To read this article in full or to leave a comment, please click here

How—and why—you should use a VPN any time you hop on the internet

One of the most important skills any computer user should have is the ability to use a virtual private network (VPN) to protect their privacy. A VPN is typically a paid service that keeps your web browsing secure and private over public Wi-Fi hotspots. VPNs can also get past regional restrictions for video- and music-streaming sites and help you evade government censorship restrictions—though that last one is especially tricky.The best way to think of a VPN is as a secure tunnel between your PC and destinations you visit on the internet. Your PC connects to a VPN server, which can be located in the United States or a foreign country like the United Kingdom, France, Sweden, or Thailand. Your web traffic then passes back and forth through that server. The end result: As far as most websites are concerned, you’re browsing from that server’s geographical location, not your computer’s location.To read this article in full or to leave a comment, please click here

How—and why—you should use a VPN any time you hop on the internet

One of the most important skills any computer user should have is the ability to use a virtual private network (VPN) to protect their privacy. A VPN is typically a paid service that keeps your web browsing secure and private over public Wi-Fi hotspots. VPNs can also get past regional restrictions for video- and music-streaming sites and help you evade government censorship restrictions—though that last one is especially tricky.The best way to think of a VPN is as a secure tunnel between your PC and destinations you visit on the internet. Your PC connects to a VPN server, which can be located in the United States or a foreign country like the United Kingdom, France, Sweden, or Thailand. Your web traffic then passes back and forth through that server. The end result: As far as most websites are concerned, you’re browsing from that server’s geographical location, not your computer’s location.To read this article in full or to leave a comment, please click here

An Inside Look at Juniper Networks’ Forthcoming JNCIE-DC Exam

Data Centers and the Cloud are all the rage right now, and Juniper has been at the forefront of the Data Center revolution from the very beginning – early on with their introduction of the QFX and the much maligned QFabric, and more recently with the addition of Virtual Chassis Fabric (VCF), various open architectures …

Repealing passwords is a long way away

The campaign to eliminate passwords has been ongoing, and growing, for close to a decade. There are even some declarations that this might be the year, or at least ought to be the year, that it happens.Don’t hold your breath. Brett McDowell, executive director of the FIDO (Fast IDentity Online) Alliance, is as passionate an advocate of eliminating passwords as anyone. He says that day is coming, given the creation of a, “new generation of authentication technology” largely based on biometrics, and a “massive collaboration among hundreds of companies” to define standards for that technology.To read this article in full or to leave a comment, please click here

New Webinar: Automating Data Center Fabric Deployments

The next session of the Network Automation Use Cases series will take place on January 24th. Dinesh Dutt will explain describe how you can use Ansible and Jinja2 to automate data center fabric deployments, and I’ll have a few things to say about automating network security.

If you think that what Dinesh will talk about applies only to startups you’re totally wrong. UBS is using the exact same approach to roll out their new data centers; Thomas Wacker will share the details in his guest presentation in the next Building Next-Generation Data Centers online course.

WikiLeaks’ Assange confident of winning ‘any fair trial’ in the US

WikiLeaks said that its founder Julian Assange is confident of winning 'any fair trial' in the U.S. and indicated that the founder of the whistleblowing website would stand by all the promises he had made in return for clemency to Chelsea Manning, the former U.S. soldier who disclosed classified data relating to the Iraq War to the site.On Tuesday, Manning’s prison sentence was commuted by U.S. President Barack Obama raising questions whether Assange would keep his part of a deal he proposed online, and agree to extradition to the U.S.To read this article in full or to leave a comment, please click here

WikiLeaks’ Assange confident of winning ‘any fair trial’ in the US

WikiLeaks said that its founder Julian Assange is confident of winning 'any fair trial' in the U.S. and indicated that the founder of the whistleblowing website would stand by all the promises he had made in return for clemency to Chelsea Manning, the former U.S. soldier who disclosed classified data relating to the Iraq War to the site.On Tuesday, Manning’s prison sentence was commuted by U.S. President Barack Obama raising questions whether Assange would keep his part of a deal he proposed online, and agree to extradition to the U.S.To read this article in full or to leave a comment, please click here

FTC charges Qualcomm with anticompetitive chip tactics

Qualcomm strong-armed some phone makers into accepting unfavorable technology licensing terms while giving Apple a break in exchange for exclusivity, the U.S. Federal Trade Commission has charged.The company used its dominance in baseband processors, which manage cellular communication in mobile devices, to force vendors to pay elevated royalties for Qualcomm technologies, the FTC charged in a complaint filed Tuesday in federal court.At the same time, Qualcomm gave Apple favorable terms so it could supply the baseband chips for all iPhones from 2011 to 2016, according to the FTC. Among other things, in 2007 it got Apple to agree not to use WiMax, the original 4G system used on Sprint’s network, in any iPhones, the complaint said. WiMax was promoted by Intel, Qualcomm’s archrival.To read this article in full or to leave a comment, please click here

Can a DDoS attack on Whitehouse.gov be a valid protest?

When Donald Trump is inaugurated as the U.S. President on Friday, Juan Soberanis intends to protest the event -- digitally.His San Francisco-based protest platform is calling on Americans to oppose Trump’s presidency by visiting the Whitehouse.gov site and overloading it with too much traffic. In effect, he’s proposing a distributed denial-of-service attack, an illegal act under federal law. But Soberanis doesn’t see it that way.“It’s the equivalent of someone marching on Washington, D.C,” he said on Monday. “Civil disobedience has been part of the American democratic process.”Soberanis’s call to action is raising eyebrows and highlights the isssue of whether DDoS attacks should be made a legitimate form of protest. Under the Computer Fraud and Abuse Act, sending a command to a protected computer with the intent to cause damage can be judged a criminal offense. But that hasn’t stopped hacktivists and cyber criminals from using DDoS attacks to force websites offline.  To read this article in full or to leave a comment, please click here