Archive

Category Archives for "Networking"

Google Cloud Key Management Service could help more enterprises encrypt data

Attackers are increasingly able to penetrate perimeter defenses, compromise accounts and mine data without targets even being aware of the attack, as the Democratic National Committee breach proved. Encrypting data is the best defense.Strong encryption of complex data structures requires a Key Management System (KMS). But implementing a KMS can be challenging, especially for enterprises below the security poverty line that don’t have the budget to hire a multidisciplinary security team. Google may have a solution with its Cloud Key Management Service (CKMS) now in beta in select countries.  To read this article in full or to leave a comment, please click here

Google Cloud Key Management Service could help more enterprises encrypt data

Attackers are increasingly able to penetrate perimeter defenses, compromise accounts and mine data without targets even being aware of the attack, as the Democratic National Committee breach proved. Encrypting data is the best defense.Strong encryption of complex data structures requires a Key Management System (KMS). But implementing a KMS can be challenging, especially for enterprises below the security poverty line that don’t have the budget to hire a multidisciplinary security team. Google may have a solution with its Cloud Key Management Service (CKMS) now in beta in select countries.  To read this article in full or to leave a comment, please click here

44% off YETI Rambler 64oz Stainless Steel Vacuum Insulated Bottle with Cap – Deal Alert

With double-wall vacuum insulation, these over-engineered drink holders keep your favorite beverage as cold -- or hot -- as science allows. Over-the-nose wide mouth, anti-condensation, puncture and rust-resistant, no-leak cap, and a giant 64-oz capacity that can fit everything from a growler of beer to multiple bowls of soup. The Yeti Rambler is currently listed for the very low price of $49.99, a good deal considering its $89.99 list price. See the high-end, over-engineered Yeti bottle now on Amazon. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Infrastructure monitoring: Turn data into knowledge and minimize slowdowns

It’s 2 a.m., and a hospital’s system has slowed to a crawl. Lives are at stake. For the harried system admins looking for the source of the slowdown, time is of the essence.The hospital’s system has servers attached through a SAN to storage devices. But where’s the weak link? The administrator cannot afford to waste time analyzing server performance when the problem may be in a storage device or the SAN. He needs information that enables him to conduct his root cause analysis as quickly as possible.Perhaps you don’t have to worry about whether someone will live or die when your IT infrastructure fails. However, when it’s slow or down, it fails to deliver a satisfying user experience. Also, it’s likely that your company’s operations falter, costs increase, and your bottom line suffers.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Infrastructure monitoring: Turn data into knowledge and minimize slowdowns

It’s 2 a.m., and a hospital’s system has slowed to a crawl. Lives are at stake. For the harried system admins looking for the source of the slowdown, time is of the essence.The hospital’s system has servers attached through a SAN to storage devices. But where’s the weak link? The administrator cannot afford to waste time analyzing server performance when the problem may be in a storage device or the SAN. He needs information that enables him to conduct his root cause analysis as quickly as possible.Perhaps you don’t have to worry about whether someone will live or die when your IT infrastructure fails. However, when it’s slow or down, it fails to deliver a satisfying user experience. Also, it’s likely that your company’s operations falter, costs increase, and your bottom line suffers.To read this article in full or to leave a comment, please click here

Is this the year IoT standards will finally make sense?

A few brave souls predict IoT standards will start to gel this year, but making all those connected things work together still looks like a long shot.Two years ago, some industry analysts cautiously suggested that a vast array of IoT standards would merge into just a few beginning in 2017. If the internet of things in late 2014 was a cacophony of discordant musicians tuning up, it’s now reached the point where a few virtuosos are playing the same tune. But there’s still a lot of sheet music getting passed around.To read this article in full or to leave a comment, please click here

Is this the year IoT standards will finally make sense?

A few brave souls predict IoT standards will start to gel this year, but making all those connected things work together still looks like a long shot.Two years ago, some industry analysts cautiously suggested that a vast array of IoT standards would merge into just a few beginning in 2017. If the internet of things in late 2014 was a cacophony of discordant musicians tuning up, it’s now reached the point where a few virtuosos are playing the same tune. But there’s still a lot of sheet music getting passed around.To read this article in full or to leave a comment, please click here

Stumbling And Fumbling Into Video Blogging

I’m used to writing and to podcasting. I know what the content creation and publication process looks like for written and audio media. The increasing popularity of video has had me and my business partner scratching our heads, wondering how we can best leverage the medium. Or if we even should.

And so, we’ve begun our video adventure the way we’ve always done things. Just go for it. Try it. Hit publish. It won’t be perfect, but that’s okay. Learn and improve.

My first video was a good bit of work, taking roughly eight hours to write, shoot, produce, and publish a ten minute video covering some tech industry news. That’s not scalable, but it was a learning experience. Here was my process.

Write

I get press releases from dozens of marketers and public relations firms, usually several per day. I chose some that I thought folks might be interested in. And then I wrote copy. I know from past projects that many written words translate to many spoken minutes. You have to keep copy tight if you’re writing to a time limit.

I managed to do that, writing just under a thousand words of copy. I did ad lib a bit, but Continue reading

Is LISP (Locator Identity Separation Protocol) Dead?

Today, there are many networking technologies which haven’t been widely deployed. And among them are Internet Multicast and IPv6 although these two protocols have many benefits .  But probably people are asking the correct question. Do we really need new protocol ? Or can we solve our problem with the existing mechanisms deployed on our […]

The post Is LISP (Locator Identity Separation Protocol) Dead? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

IDG Contributor Network: 3 security analytics approaches that don’t work (but could) — Part 1

Digital technologies have changed the face of business and government, and they will continue to do so at an even faster pace. They drive innovation, boost productivity, improve communications and generate competitive advantage, among other benefits.The dark side of this digital revolution has now come clearly into focus as well: McKinsey estimates that cyber attacks will cost the global economy $3 trillion in lost productivity and growth by 2020, while theft, sabotage and other damage inflicted by trusted insider personnel continue to cost organizations in lost revenues, revealed secrets and damaged reputations.To read this article in full or to leave a comment, please click here