Archive

Category Archives for "Networking"

To Wave 2 or not to Wave 2?

The second wave of wireless networking gear based on the 802.11ac standard – collectively, “wave 2” – is the current cutting edge of Wi-Fi technology. Boasting multi-user MIMO (meaning that it can service multiple client devices using its multiple antennae), wider channels, and a number of other bells and whistles, wave 2 hardware offers more throughput and better handling of multiple connections. But is it really necessary? Generally, connection speeds are limited by other parts of the infrastructure, not the wireless connection. Cutting-edge gear, obviously, comes at a premium price. If the improvements over 802.11ac wave 1 aren’t crucially important to you, some argue, you might be better off skipping wave 2 and waiting for the next wireless standard – 802.11ax – to make it onto shelves.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Troubleshooting Cisco’s ISE without TAC

One thing I have been very passionate about is making secure network access deployments easier, which includes what we like to call serviceability. Serviceability is all about making a product easier to troubleshoot, easier to deploy and easier to use. Ultimately the goal is always customer success.There is a distinct correlation between visibility and success of any NAC project. If you are blind to what's happening, and if you can't easily get to the information that helps figure out what's wrong, it can be very frustrating and also gives the appearance of a poor deployment.My goal of this post is to highlight a lot of the serviceability items Cisco has put into ISE that you may not be aware of. I'll do my best to not only call out the feature or function that was added, but explain why it matters and what version it was added in. To read this article in full or to leave a comment, please click here

HPE invites open-source developers to pitch in on ‘The Machine’

Hewlett Packard Enterprise on Tuesday stepped up its efforts to develop a brand-new computer architecture by inviting open-source developers to collaborate on the futuristic device it calls "The Machine."Originally announced in 2014, The Machine promises a number of radical innovations, including a core design focus on memory rather than processors. It will also use light instead of electricity to connect memory and processing power efficiently, HPE says.A finished product won't be ready for years still, but HPE wants to get open-source developers involved early in making software for it. Toward that end, it has released four developer tools.To read this article in full or to leave a comment, please click here

Cisco: IP traffic will surpass the zettabyte level in 2016

IP traffic will grow in a massive way as 10 billion new devices come online over the next five years. Those are just a couple of the amazing facts found in Cisco’s 11th annual Visual Networking Index look at all things in the communications world. +More on Network World: The most momentous tech events of the past 30 years+To read this article in full or to leave a comment, please click here

Hot security startups to watch

While there’s talk that investment dollars for security startups are getting harder to find, entrepreneurs still manage to deliver a range of hardware, software and services that protect data, networks and corporate reputations.This roundup of 13 such companies that we’re keeping an eye on runs the gamut from cloud security services to fraud prevention to protecting supervisory control and data acquisition (SCADA) and Internet of Things devices.+ SEE LAST YEAR'S LIST of Security startups to watch +To read this article in full or to leave a comment, please click here

Cisco: IP traffic will surpass the zettabyte level in 2016

IP traffic will grow in a massive way as 10 billion new devices come online over the next five years. Those are just a couple of the amazing facts found in Cisco’s 11th annual Visual Networking Index look at all things in the communications world. +More on Network World: The most momentous tech events of the past 30 years+To read this article in full or to leave a comment, please click here

Cisco: IP traffic will surpass the zettabyte level in 2016

IP traffic will grow in a massive way as 10 billion new devices come online over the next five years. Those are just a couple of the amazing facts found in Cisco’s 11th annual Visual Networking Index look at all things in the communications world. +More on Network World: The most momentous tech events of the past 30 years+To read this article in full or to leave a comment, please click here

Hot security startups to watch

While there’s talk that investment dollars for security startups are getting harder to find, entrepreneurs still manage to deliver a range of hardware, software and services that protect data, networks and corporate reputations.This roundup of 13 such companies that we’re keeping an eye on runs the gamut from cloud security services to fraud prevention to protecting supervisory control and data acquisition (SCADA) and Internet of Things devices.+ SEE LAST YEAR'S LIST of Security startups to watch +To read this article in full or to leave a comment, please click here

Cisco: IP traffic will surpass the zettabyte level in 2016

IP traffic will grow in a massive way as 10 billion new devices come online over the next five years.Those are just a couple of the amazing facts found in Cisco’s 11th annual Visual Networking Index look at all things in the communications world.+More on Network World: The most momentous tech events of the past 30 years+To read this article in full or to leave a comment, please click here

Check your BITS, because deleting malware might not be enough

Attackers are abusing the Windows Background Intelligent Transfer Service (BITS) to re-infect computers with malware after they've been already cleaned by antivirus products.The technique was observed in the wild last month by researchers from SecureWorks while responding to a malware incident for a customer. The antivirus software installed on a compromised computer detected and removed a malware program, but the computer was still showing signs of malicious activity at the network level.Upon further investigation, the researchers found two rogue jobs registered in BITS, a Windows service that's used by the OS and other apps to download updates or transfer files. The two malicious jobs periodically downloaded and attempted to reinstall the deleted malware.To read this article in full or to leave a comment, please click here

Check your BITS, because deleting malware might not be enough

Attackers are abusing the Windows Background Intelligent Transfer Service (BITS) to re-infect computers with malware after they've been already cleaned by antivirus products.The technique was observed in the wild last month by researchers from SecureWorks while responding to a malware incident for a customer. The antivirus software installed on a compromised computer detected and removed a malware program, but the computer was still showing signs of malicious activity at the network level.Upon further investigation, the researchers found two rogue jobs registered in BITS, a Windows service that's used by the OS and other apps to download updates or transfer files. The two malicious jobs periodically downloaded and attempted to reinstall the deleted malware.To read this article in full or to leave a comment, please click here

Verizon to bid $3B for Yahoo’s core Internet business

Verizon Communications will be bidding about US$3 billion for the Internet assets of ailing Yahoo, according to a newspaper report.The communications company will try to beat other potential bidders  such as private-equity firm TPG with a deal that would likely aim to combine Yahoo Web properties, with over 1 billion users a month, with Verizon’s growing business in online ads, the Wall Street Journal reported late Monday.The bidding is far from final and Yahoo is expected to hold at least one more cycle of bidding, WSJ said quoting people familiar with the matter. But the price offered by Verizon could be an indicator of which way the fight for the acquisition of the Internet company is going.To read this article in full or to leave a comment, please click here

U.S. Cyber Command struggles to retain top cybersecurity talent

At U.S. Cyber Command, the top brass has made recruiting top talent a leading priority, but those efforts have been slowed by challenges in attracting and retaining the next generation of cyber warriors.Maj. Gen. Paul Nakasone, commander of Cyber Command's Cyber National Mission Force, spoke to those struggles in a recent online event hosted by Federal News Radio.[ Related: 'HACKERS WANTED' Report: NSA Not Having Trouble Filing Cybersecurity Jobs ]To read this article in full or to leave a comment, please click here

U.S. Cyber Command struggles to retain top cybersecurity talent

At U.S. Cyber Command, the top brass has made recruiting top talent a leading priority, but those efforts have been slowed by challenges in attracting and retaining the next generation of cyber warriors.Maj. Gen. Paul Nakasone, commander of Cyber Command's Cyber National Mission Force, spoke to those struggles in a recent online event hosted by Federal News Radio.[ Related: 'HACKERS WANTED' Report: NSA Not Having Trouble Filing Cybersecurity Jobs ]To read this article in full or to leave a comment, please click here

Security blindspots: websites, network architects, and third-party code

It is no easy task to secure today's digital enterprise. With all of the irons in the fire of the digital ecosystem, there is a lot that can compromise the corporate website. Both website visitors and Internet users are vulnerable to web-based malware, and it is increasingly more difficult for security practitioners to thwart web-based attacks.Even with the daily occurrence of breaches, some organizations are not thinking about security, especially those enterprises for whom a large percentage of their revenue comes directly through the website. Many companies that do worry about security, think of it in terms of restricting internal users from accessing what might be potentially risky sites.To read this article in full or to leave a comment, please click here

Polycom RealConnect makes multi-vendor videoconferencing easy

Videoconferencing and the enterprise have had a good old love-hate relationship over the past few decades. It’s kind of like what’s happening with Tom Brady and the NFL. Both know they’re better off with each other, but there’s so much historical pain that it’s hard to move on and give each other another shot.Enterprise video has come a long way over the past five years, but there are so many painful memories of how things were that many IT and business leaders don’t want to give video another chance. However, it’s worth taking another look. Complicated user interfaces have been replaced with easy-to-use touchscreens. IT no longer has to roll around carts and spend half the meeting time trying to dial the other side’s ISDN SPID. Quality issues have all but been resolved, and modern systems work fine now even over low bandwidth connections.To read this article in full or to leave a comment, please click here