Archive

Category Archives for "Networking"

IDG Contributor Network: Is your network a platform for business innovation and growth?

The whole point of a network is just to connect stuff, right? Connect people to people, people to machines, and machines to machines. It’s pipes and plumbing, a necessary part of the business infrastructure and, hopefully, one that costs less and less over time. After all, it’s a cost center not a growth engine. At least, that’s the way it’s treated by most businesses these days.Most, but not all.+ Also on Network World: Accelerating business innovation: Don't let networks get in the way +To read this article in full or to leave a comment, please click here

IDG Contributor Network: Is your network a platform for business innovation and growth?

The whole point of a network is just to connect stuff, right? Connect people to people, people to machines, and machines to machines. It’s pipes and plumbing, a necessary part of the business infrastructure and, hopefully, one that costs less and less over time. After all, it’s a cost center not a growth engine. At least, that’s the way it’s treated by most businesses these days.Most, but not all.+ Also on Network World: Accelerating business innovation: Don't let networks get in the way +To read this article in full or to leave a comment, please click here

Healthcare, retail industries give blockchain a try

The U.S. Department of Health and Human Services hopes to put a new technology to use in its ongoing effort to improve the health and well-being of Americans. The technology in question isn't something one might expect to see in the healthcare IT toolkit; rather, it's blockchain, the technology that underpins cryptocurrency and has primarily been associated with bitcoin. HHS sees blockchain as a potential salve for ills that plague the increasingly complex world of digital health records.To read this article in full or to leave a comment, please click here(Insider Story)

Hottest Black Friday 2016 Windows PC, tablet and game deals

Big dealsWhile Windows phone deals are non-surprisingly almost non-existent for Black Friday 2016, there are plenty of Microsoft Windows desktops and laptops, Surface tablets and Xbox gaming deals being touted this holiday shopping season. Come Nov. 25, and even earlier for many retailers, here are some of the best deals around.To read this article in full or to leave a comment, please click here

HP’s power-packed Z2 Mini desktop takes on Apple’s aging Mac Mini

HP has been hoping that sleek, powerful hardware will lure Apple Mac aficionados to switch to its PCs, and now is aiming the new Z2 Mini mini-desktop at Mac Mini users.The Z2 Mini packs the computing power of a full-size desktop into a box that can be held in one hand. Starting at $699, it will be available worldwide starting in December.HP has been excelling in PC design, with innovative desktops like Pavilion Wave, a cylindrical desktop, and Elite Slice, a modular mini-desktop onto which components can be snapped.To read this article in full or to leave a comment, please click here

This malware attack starts with a fake customer-service call

Hotel and restaurant chains, beware. A notorious cybercriminal gang is tricking businesses into installing malware by calling their customer services representatives and convincing them to open malicious email attachments. The culprits in these hacks, which are designed to steal customers’ credit card numbers, appear to be the Carbanak gang, a group that was blamed last year for stealing as much as $1 billion from various banks. On Monday, security firm Trustwave said that three of its clients in the past month had encountered malware built with coding found in previous Carbanak attacks.To read this article in full or to leave a comment, please click here

This malware attack starts with a fake customer-service call

Hotel and restaurant chains, beware. A notorious cybercriminal gang is tricking businesses into installing malware by calling their customer services representatives and convincing them to open malicious email attachments. The culprits in these hacks, which are designed to steal customers’ credit card numbers, appear to be the Carbanak gang, a group that was blamed last year for stealing as much as $1 billion from various banks. On Monday, security firm Trustwave said that three of its clients in the past month had encountered malware built with coding found in previous Carbanak attacks.To read this article in full or to leave a comment, please click here

Network Automation Survey

Network Automation is just getting started and it’s odd to say that as IT professionals from other technology disciplines are always surprised to see how much manual interaction there still is between the networking engineering/operations teams and the actual devices they manage.

I’ll never forget the days in 2012-2013 performing my best Google searches to find ways to program or to automate network routers and switches. I didn’t care what programming language was being used or even what tool, but I found nothing. Every time I heard someone say they were using a network script, I’d say “email it to me, that sounds interesting.” Unfortunately, 100% of the time, it ended up being a notepad or a Word file, not a script. What a bummer.

I like to think I’m a solid Googler too. It was amazing though - there was near nothing. Do a search today on network automation or network programming and you’d be amazed on what you’ll find - we’ve come a long way in the past 36 months with respect to network automation, but I truly believe we’re still in the 2nd or 3rd inning (if we were playing a game of baseball, of course).

Continue reading

Network Automation Survey

Network Automation is just getting started and it’s odd to say that as IT professionals from other technology disciplines are always surprised to see how much manual interaction there still is between the networking engineering/operations teams and the actual devices they manage.

I’ll never forget the days in 2012-2013 performing my best Google searches to find ways to program or to automate network routers and switches. I didn’t care what programming language was being used or even what tool, but I found nothing. Every time I heard someone say they were using a network script, I’d say “email it to me, that sounds interesting.” Unfortunately, 100% of the time, it ended up being a notepad or a Word file, not a script. What a bummer.

I like to think I’m a solid Googler too. It was amazing though - there was near nothing. Do a search today on network automation or network programming and you’d be amazed on what you’ll find - we’ve come a long way in the past 36 months with respect to network automation, but I truly believe we’re still in the 2nd or 3rd inning (if we were playing a game of baseball, of course).

Continue reading

GE buys ServiceMax for $915M to boost its IoT power

General Electric’s US$915 million acquisition of field service management company ServiceMax on Monday should help enterprises combine what GE does for industrial products and assets with more tools for those who work on them.GE Digital, the division that’s buying ServiceMax, sells software and services for connecting industrial assets and products in the field, then collecting and analyzing data about them. ServiceMax has a cloud-based platform for tasks like scheduling maintenance calls and making sure the right technician is on each job with the right part.To read this article in full or to leave a comment, please click here

Networking Field Day 13 – Sneak Preview

This is going to be a busy week for the Tech Field Day family. They have delegates en-route to Tech Field Day 12 this morning, and Wednesday the crew for Network Field day 13 arrive. I can’t express how excited I am about going to Networking Field Day 13 this week. I haven’t been to an actual NFD event since NFD2, although I did get to go to the TFD9 event in Austin a couple years ago. I can’t wait to land in San Jose. For those new to this concept, Networking Field day is an event that is focused on bringing together IT product vendors and thought leaders in the industry to share information and opinions in a presentation and discussion format. Please be sure to read my disclaimer page on this topic. These events are streamed live, so if you want to listen in while we talk about the latest and greatest technologies from the vendors we’re meeting with, or if you just want to listen to us moan and groan at the occasional Gartner or NASCAR slides… you should tune in. On the menu for this week we have a number of exciting companies that I’d Continue reading

12 steps to lower your espionage risk

"What company would not like to know exactly what its competitor is doing?"When we talk about corporate espionage, we're talking about companies stealing information that gives them a competitive or economic advantage, writes Chuck Easttom in the new 3rd edition of his book Computer Security Fundamentals. It's not showy, often low-tech and sometimes downright dirty, as exemplified by Oracle CEO Larry Ellison's admission that he "hire[d] private investigators to sift through Microsoft garbage in an attempt to garner information."To read this article in full or to leave a comment, please click here(Insider Story)