Archive

Category Archives for "Networking"

Juniper Networks announces Date and Webcast Information for Upcoming Investor Events in February 2016

Rami Rahim, chief executive officer, Juniper Networks, will present at the Goldman Sachs Technology and Internet Conference 2016, Wednesday, Feb. 10, 2016 at 9:40 am PT in San Francisco. In addition, Juniper Networks will be hosting an investor and analyst update on Tuesday, February 23, 2016 from Mobile World Congress in Barcelona, Spain, beginning at... Read more →

Feds primary network security weapon needs more bang

In the face of relenting network attacks and it seems that the government’s chief weapon for combatting the assault lacks some teeth.That weapon – the Department of Homeland Security's (DHS) National Cybersecurity Protection System (NCPS)—also known as Einstein has is intended to provide DHS with capabilities to detect malicious traffic traversing federal agencies’ computer networks, prevent intrusions, and support data analytics and information sharing. A tall tale no doubt but one that is imperative to protecting the gargantuan amount of government intelligence and personally identifiable information the feds watch over.+More on Network World: 26 of the craziest and scariest things the TSA has found on travelers+To read this article in full or to leave a comment, please click here

Feds’ primary network security weapon needs more bang

In the face of relenting network attacks and it seems that the government’s chief weapon for combatting the assault lacks some teeth. That weapon – the Department of Homeland Security's (DHS) National Cybersecurity Protection System (NCPS)—also known as Einstein has is intended to provide DHS with capabilities to detect malicious traffic traversing federal agencies’ computer networks, prevent intrusions, and support data analytics and information sharing. A tall tale no doubt but one that is imperative to protecting the gargantuan amount of government intelligence and personally identifiable information the feds watch over. +More on Network World: 26 of the craziest and scariest things the TSA has found on travelers+To read this article in full or to leave a comment, please click here

Feds primary network security weapon needs more bang

In the face of relenting network attacks and it seems that the government’s chief weapon for combatting the assault lacks some teeth.That weapon – the Department of Homeland Security's (DHS) National Cybersecurity Protection System (NCPS)—also known as Einstein has is intended to provide DHS with capabilities to detect malicious traffic traversing federal agencies’ computer networks, prevent intrusions, and support data analytics and information sharing. A tall tale no doubt but one that is imperative to protecting the gargantuan amount of government intelligence and personally identifiable information the feds watch over.+More on Network World: 26 of the craziest and scariest things the TSA has found on travelers+To read this article in full or to leave a comment, please click here

Feds’ primary network security weapon needs more bang

In the face of relenting network attacks and it seems that the government’s chief weapon for combatting the assault lacks some teeth. That weapon – the Department of Homeland Security's (DHS) National Cybersecurity Protection System (NCPS)—also known as Einstein has is intended to provide DHS with capabilities to detect malicious traffic traversing federal agencies’ computer networks, prevent intrusions, and support data analytics and information sharing. A tall tale no doubt but one that is imperative to protecting the gargantuan amount of government intelligence and personally identifiable information the feds watch over. +More on Network World: 26 of the craziest and scariest things the TSA has found on travelers+To read this article in full or to leave a comment, please click here

Asentinel reduces costs and improves the efficiency of mobile device service contracts  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  If I brought up the term "mobility management" you'd probably think I was talking about BYOD and managing how workers can securely access applications and data via their smart phones. That's the aspect of mobility that IT usually has to deal with. But there's also an administrative aspect to mobility management that can be a real pain – and a big expense – for companies if it's not done well.I'm referring to the contract management aspect of company-provided mobile devices. Companies that pay for their employees' device contracts through expense reports are missing an opportunity to reduce administrative hassles and save quite a bit of money.To read this article in full or to leave a comment, please click here

Data destruction 101: There’s more to it than wiping your drive [Infographic]

In 2009, a team of journalists who were investigating the electronic waste, purchased a computer in a Ghana market that was found to contain "sensitive documents belonging to U.S. government contractor Northrop Grumman," wrote Robert McMillan in a story at the time. "Northrop Grumman is not sure how the drive ended up in a Ghana market, but apparently the company had hired an outside vendor to dispose of the PC."That's a nightmare scenario, to be sure.And in the years since, businesses have continued to store vast quantities of data on servers, hard drives, and media storage devices — sensitive data that should be protected or destroyed. But the options for data destruction can be overwhelming.To read this article in full or to leave a comment, please click here(Insider Story)

U.S. carriers stay tight-lipped on LTE-U deployments

America’s big four wireless service providers are enthusiastic about the prospect of delivering data over unlicensed frequencies via LTE-U, but they’re playing their cards very close to their chests when it comes to specific plans.LTE-U, which is a wireless protocol designed to let carriers use their LTE signals over the same unlicensed frequencies as Wi-Fi, is a controversial technology. Advocates, which include the wireless carriers, insist that coexistence features built into the standard will allow it to use the same airwaves as Wi-Fi without interference. Critics say that independent testing shows that LTE-U could drown out Wi-Fi signals when the two conflict.To read this article in full or to leave a comment, please click here

Increasingly popular update technique for iOS apps puts users at risk

An increasing number of iOS application developers use a technique that allows them to remotely modify the code in their apps without going through Apple's normal review process, potentially opening the door to abuse and security risks for users.The technique is a variation of hot patching, which is a way of dynamically updating a system or application without restarting it. In this case, an iOS application is updated without the developer having to submit a new version to the official iOS app store and then wait for Apple's review of the changes, which can be a lengthy process.An implementation of this hot patching method comes from an open-source project called JSPatch, which provides an engine that app developers can integrate into their apps and which bridges JavaScript code to Objective-C, the programming language used by iOS apps.To read this article in full or to leave a comment, please click here

US lab develops gigantic turbine blades to capture vast wind energy

US researchers at Sandia National Laboratories say they are working on a design for gigantic wind turbine blades that are longer than two football fields which could support 50-megawatt-- more than six times the power output of the largest current turbines --offshore wind farms in the future.+More on network World: Energy Dept. wants big wind energy technology in all 50 states+Sandia researchers said most US wind turbines produce power in the 1- to 2-MW range, with blades about 165 feet (50 meters) long, while the largest commercially available turbine is rated at 8 MW with blades 262 feet (80 meters) long. A 50-MW turbine requires a rotor blade more than 650 feet (200 meters) long, two and a half times longer than any existing wind blade, the researchers stated.To read this article in full or to leave a comment, please click here

US lab develops gigantic turbine blades to capture vast wind energy

US researchers at Sandia National Laboratories say they are working on a design for gigantic wind turbine blades that are longer than two football fields which could support 50-megawatt-- more than six times the power output of the largest current turbines --offshore wind farms in the future.+More on network World: Energy Dept. wants big wind energy technology in all 50 states+Sandia researchers said most US wind turbines produce power in the 1- to 2-MW range, with blades about 165 feet (50 meters) long, while the largest commercially available turbine is rated at 8 MW with blades 262 feet (80 meters) long. A 50-MW turbine requires a rotor blade more than 650 feet (200 meters) long, two and a half times longer than any existing wind blade, the researchers stated.To read this article in full or to leave a comment, please click here

Security Requirements Are Driving Identity Management

Anyone familiar with identity management knows that it can be extremely messy – lots of tactical tools, access policies, multiple data repositories, manual processes, etc. Furthermore, user authentication continues to be anchored by user names and passwords making nearly every organization vulnerable to credentials harvesting, identity theft, and cyber attacks.These persistent IAM problems remain, even though identity management is becoming a bigger component of enterprise security. This is true because, as organizations embrace cloud and mobile computing, they lose some control over their IT infrastructure. As one CISO mentioned to me, “when we lose control in some areas we need to get better control over others as compensating controls.” To read this article in full or to leave a comment, please click here

OED Tolls: Linux “at”

Another post on Linux commands, short and simple but very useful: at. The problem As IT pros we are all comfortable with the change window concept. This window usually opens at night or during the week-end and sometimes the change actually just requires a few commands on a Linux machine. The automation The at command […]