Archive

Category Archives for "Networking"

My CCIE Journey

This is Chapter 1 of my ebook The CCIE Blueprint  It covers my journey from Desktop support engineer to CCIE – it was a long journey and hopefully after reading it you can find things that you can do better and shorten your journey. Enjoy! The CCIE Blueprint – Chapter 1 – My Journey I started […]

The post My CCIE Journey appeared first on CCIE Blog.

With the Galaxy Note7 dead, here are 7 other Android phablets to consider

Cease FireImage by REUTERS/Edgar SuIt’s official: the Galaxy Note7 is no more. The company already pulled out a miracle with its unprecedented recall to address the phone’s defective battery, only to be scorched again when more units started igniting. Samsung has now stopped production and wants you to (again) power off your device for good.To read this article in full or to leave a comment, please click here

Hardware makers unite to challenge Intel with Gen-Z spec

After years of being offered as separate technologies, storage and memory are beginning to merge. It's already happening, for example, with 3D Xpoint, a technology from Intel and Micron that can serve as memory, storage, or both. Now, a new consortium, called Gen-Z, is out to ease the transition to this new class of storage and memory in computers. It's creating a new specification and architecture that will make it easier to add new forms of non-volatile memory to computers. Gen-Z will have a new connector, fabric and data transfer protocol. One goal is to create an open standard so new forms of memory can communicate with processors and accelerators in a coherent manner. Gen-Z will also work with SSDs like QuantX from Micron.To read this article in full or to leave a comment, please click here

Wi-Fi vs. LTE could be the start of a mobile rollercoaster

The long fight over LTE networks sharing frequencies with Wi-Fi may be just the first of many battles as device makers and service providers try to make the most of the limited available spectrum.Around the world, regulators and industry are working on how to let different kinds of networks use the same spectrum. The new techniques and policies they use should lead to better mobile performance in some areas, but it’s also likely that wireless performance will fluctuate more as you move around.LTE-U has grabbed headlines because it involves licensed carriers using some of the channels that consumers depend on for Wi-Fi service, which often is free or runs on users' own routers. Wi-Fi supporters cried foul last year after Qualcomm and some U.S. carriers proposed the technology, and it took until last month for the two sides to reach an apparent peace agreement.To read this article in full or to leave a comment, please click here

Wi-Fi vs. LTE could be the start of a mobile rollercoaster

The long fight over LTE networks sharing frequencies with Wi-Fi may be just the first of many battles as device makers and service providers try to make the most of the limited available spectrum.Around the world, regulators and industry are working on how to let different kinds of networks use the same spectrum. The new techniques and policies they use should lead to better mobile performance in some areas, but it’s also likely that wireless performance will fluctuate more as you move around.LTE-U has grabbed headlines because it involves licensed carriers using some of the channels that consumers depend on for Wi-Fi service, which often is free or runs on users' own routers. Wi-Fi supporters cried foul last year after Qualcomm and some U.S. carriers proposed the technology, and it took until last month for the two sides to reach an apparent peace agreement.To read this article in full or to leave a comment, please click here

7 enterprise mobile management features in Windows 10

Security and enterprise mobile management (EMM) are big concerns for businesses of all sizes as they scramble to make sure corporate data is secure. And there's no shortage of EMM products, but there are features already baked into your operating system?Microsoft, for example, with its Windows 10 update, Redstone 1 -- officially called the Windows 10 Anniversary Update 1607 -- introduced a slew of new IT friendly features. Here are the six most notable features in the latest update that will get IT celebrating.Windows Information Protection With Windows Information Protection (WIP), previously called enterprise data protection (EDP), IT departments can get a handle on BYOD. It allows you to manage data on enterprise-owned and personal devices to avoid any security issues if a device falls into the wrong hands. Employees won't have to change the devices or apps they use and businesses can have the peace of mind of being able to encrypt and remote-wipe corporate data without affecting personal data.To read this article in full or to leave a comment, please click here

IDG Contributor Network: It’s time to encourage diversity in tech freelancing

It’s no secret the tech industry has a diversity problem. Google, Twitter, Facebook, Microsoft, Yahoo, Amazon, Apple and Pinterest are among the companies that have publicly shared how few of their tech positions are filled by women and minorities.This lack of diversity is a big problem for these companies, affecting their innovation and damaging their culture. One study found that companies with racially diverse leadership teams financially outperform their peers by 35 percent. Diversity boosts the bottom line.To read this article in full or to leave a comment, please click here

MIT event to promote U.S.-China cooperation on machine learning, autonomous vehicles & more

MIT-CHIEF, a not-for-profit student group that promotes cooperation between the United States and China in technology and innovation, is readying its annual conference with a focus on machine learning, new materials and more.The MIT-China Innovation and Entrepreneurship Forum (CHIEF) Annual Conference, to be held Nov. 12-13 at MIT, will feature 6 panels and 6 keynote speeches that in addition to the topics cited above, will hit on energy, advanced manufacturing, healthcare and autonomous driving. Speakers will include those from academia and industry, including venture capital firms, and represent outfits such as Microsoft, Stanford University and AutoX.To read this article in full or to leave a comment, please click here

Encrypted communications could have an undetectable backdoor

Researchers warn that many 1024-bit keys used to secure communications on the internet today might be based on prime numbers that have been intentionally backdoored in an undetectable way.Many public-key cryptography algorithms that are used to secure web, email, VPN, SSH and other types of connections on the internet derive their strength from the mathematical complexity of discrete logarithms -- computing discrete logarithms for groups of large prime numbers cannot be efficiently done using classical methods. This is what makes cracking strong encryption computationally impractical.Most key-generation algorithms rely on prime parameters whose generation is supposed to be verifiably random. However, many parameters have been standardized and are being used in popular crypto algorithms like Diffie-Hellman and DSA without the seeds that were used to generate them ever being published. That makes it impossible to tell whether, for example, the primes were intentionally "backdoored" -- selected to simplify the computation that would normally be required to crack the encryption.To read this article in full or to leave a comment, please click here

Encrypted communications could have an undetectable backdoor

Researchers warn that many 1024-bit keys used to secure communications on the internet today might be based on prime numbers that have been intentionally backdoored in an undetectable way.Many public-key cryptography algorithms that are used to secure web, email, VPN, SSH and other types of connections on the internet derive their strength from the mathematical complexity of discrete logarithms -- computing discrete logarithms for groups of large prime numbers cannot be efficiently done using classical methods. This is what makes cracking strong encryption computationally impractical.Most key-generation algorithms rely on prime parameters whose generation is supposed to be verifiably random. However, many parameters have been standardized and are being used in popular crypto algorithms like Diffie-Hellman and DSA without the seeds that were used to generate them ever being published. That makes it impossible to tell whether, for example, the primes were intentionally "backdoored" -- selected to simplify the computation that would normally be required to crack the encryption.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Datadog on an automation roll, makes support ticket creation seamless

Last week Datadog was in the news trying to attack the market share of monitoring vendor New Relic. While that may seem like industry shenanigans, it marked a very interesting point in time when two vendors, who had previously been happy to compete in a friendly manner, announced all-out warfare and a race for each other’s customer base.New Relic moved strongly into the infrastructure monitoring space, one that it didn’t previously cover, while Datadog made a corresponding move into application monitoring.+ Also on Network World: Infrastructure monitoring products: Users pinpoint the best and worst features +To read this article in full or to leave a comment, please click here

Pradeep’s Principle: Give up on Moore’s Law and embrace automation

It’s arguable that Juniper Networks has been the most successful competitor to Cisco over the past 20 years, and co-founder and CTO Pradeep Sindhu’s vision is the main reason why. Included in that vision is Pradeep’s Principle, which is based on the thesis that we are seeing the end of Moore’s Law. If you’re not familiar with that law, in 1965 Intel co-founder Gordon Moore surmised that the number of transistors per square inch on an integrated circuit would double every year, effectively giving us twice the processing capacity in the same time frame. Sindhu isn’t the only person to say Moore’s Law is coming to an end. Earlier this year, a post on ARS Technica UK made a similar observation. Sindhu extended this thesis to storage and packet switching and stated that the rate of growth for all of these elements has slowed down.To read this article in full or to leave a comment, please click here