Archive

Category Archives for "Networking"

Save $105 on iRobot Roomba 880 Vacuum Cleaning Robot – Deal Alert

If you've been thinking about outsourcing some of the housework to robots, then this deal might be for you. The highly rated Roomba 880 is currently discounted by $105 on Amazon. It averages 4.5 out of 5 stars from over 1,300 people, with 70% rating it a perfect 5 stars (read reviews). With a regular price of $699.99, it can be purchased now for $594.99. Not exactly cheap, but this unit comes fully loaded to get the job done right:To read this article in full or to leave a comment, please click here

Dell adopts Aerohive WLAN management for its wired switches

Ethernet switches and wireless LANs are just two ways to get on the same network in most enterprises, so it makes sense to manage them together if you can.Wi-Fi grew up as a separate realm from wired networks, with different monitoring and management tools, but these worlds have started to collide in the past few years. Among other things, wireless specialist Aruba added Ethernet switches to its architecture and Meraki took administration of both network components into the cloud. Rivals Hewlett Packard Enterprise and Cisco Systems snapped up both of those companies.Now Dell has gotten into the game, not by acquisition but through a partnership with WLAN vendor Aerohive Networks. On Tuesday, the two companies are introducing a unified management tool called HiveManager NG.To read this article in full or to leave a comment, please click here

Dell adopts Aerohive WLAN management for its wired switches

Ethernet switches and wireless LANs are just two ways to get on the same network in most enterprises, so it makes sense to manage them together if you can.Wi-Fi grew up as a separate realm from wired networks, with different monitoring and management tools, but these worlds have started to collide in the past few years. Among other things, wireless specialist Aruba added Ethernet switches to its architecture and Meraki took administration of both network components into the cloud. Rivals Hewlett Packard Enterprise and Cisco Systems snapped up both of those companies.Now Dell has gotten into the game, not by acquisition but through a partnership with WLAN vendor Aerohive Networks. On Tuesday, the two companies are introducing a unified management tool called HiveManager NG.To read this article in full or to leave a comment, please click here

Geek-themed Meme of the Week: Blame Game

Our next installment of “Geek-themed Meme of the Week” comes courtesy of the Twitter account of INE, Inc., and will be familiar to all network professionals. INE via Twitter How familiar? https://twitter.com/SDNgeek/status/723644359099322369 If you’d like to catch up on past “Geek-Themed Memes of the Week,” you can find the archive here.To read this article in full or to leave a comment, please click here

Geek-themed Meme of the Week: Blame Game

Our next installment of “Geek-themed Meme of the Week” comes courtesy of the Twitter account of INE, Inc., and will be familiar to all network professionals. INE via Twitter How familiar? https://twitter.com/SDNgeek/status/723644359099322369 If you’d like to catch up on past “Geek-Themed Memes of the Week,” you can find the archive here.To read this article in full or to leave a comment, please click here

Geek-themed Meme of the Week: Blame Game

Our next installment of “Geek-themed Meme of the Week” comes courtesy of the Twitter account of INE, Inc., and will be familiar to all network professionals. INE via Twitter How familiar? https://twitter.com/SDNgeek/status/723644359099322369 If you’d like to catch up on past “Geek-Themed Memes of the Week,” you can find the archive here.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Zscaler provides secure remote access without the need for a VPN

Traditionally the way an organization gives its remote employees access to corporate applications is via a Virtual Private Network (VPN). VPNs have never been a whole lot of fun to use, but as the world moves to ever higher numbers of discrete applications and a huge variety of access devices, the traditional VPN model is looking tired.Zscaler aims to change that with Zscaler Private Access, a new service that promises organizations to provide access to internal applications and services while ensuring the security of their networks.Zscaler is an internet security company. The company offers a secure web gateway, fully from the cloud. In doing so, Zscaler is helping to move security further out into the internet backbone. Indeed, Zscaler is operated from over 100 data centers globally. Zscaler covers a host of security needs, including internet security, next-generation firewall, web security, sandboxing/advanced persistent threat (APT) protection, data loss prevention, SSL inspection, traffic shaping, policy management and threat intelligence.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Zscaler provides secure remote access without the need for a VPN

Traditionally the way an organization gives its remote employees access to corporate applications is via a Virtual Private Network (VPN). VPNs have never been a whole lot of fun to use, but as the world moves to ever higher numbers of discrete applications and a huge variety of access devices, the traditional VPN model is looking tired.Zscaler aims to change that with Zscaler Private Access, a new service that promises organizations to provide access to internal applications and services while ensuring the security of their networks.Zscaler is an internet security company. The company offers a secure web gateway, fully from the cloud. In doing so, Zscaler is helping to move security further out into the internet backbone. Indeed, Zscaler is operated from over 100 data centers globally. Zscaler covers a host of security needs, including internet security, next-generation firewall, web security, sandboxing/advanced persistent threat (APT) protection, data loss prevention, SSL inspection, traffic shaping, policy management and threat intelligence.To read this article in full or to leave a comment, please click here

U.S. efforts to build next-gen supercomputer take shape

For decades, the U.S. took for granted the doubling of supercomputing power every 10 years, roughly in line with Moore's Law. But once a petascale system was reached in 2008, it gradually became clear that the next leap -- a system 1,000 times more powerful -- would be difficult.Initially, some believed such a system -- an exascale computer -- was possible in 10 years, or by 2018. But problems emerged. It took too much power, and it required new approaches to applications to utilize an almost unimaginable level of parallelism involving hundreds of millions of cores. Another problem to solve was the need for resilience, or an ability to continue to working around multiple ongoing hardware failures expected in a system of this size.To read this article in full or to leave a comment, please click here

U.S. efforts to build next-gen supercomputer take shape

For decades, the U.S. took for granted the doubling of supercomputing power every 10 years, roughly in line with Moore's Law. But once a petascale system was reached in 2008, it gradually became clear that the next leap -- a system 1,000 times more powerful -- would be difficult.Initially, some believed such a system -- an exascale computer -- was possible in 10 years, or by 2018. But problems emerged. It took too much power, and it required new approaches to applications to utilize an almost unimaginable level of parallelism involving hundreds of millions of cores. Another problem to solve was the need for resilience, or an ability to continue to working around multiple ongoing hardware failures expected in a system of this size.To read this article in full or to leave a comment, please click here

5 tips for defending against advanced persistent threats

The aptly named advanced persistent threat (APT) is a type of network attack in which an attacker selects a specific target, uses social engineering and advanced technologies to break into a network and then focuses on that target for weeks, months or years until the attack has successfully played out (or been thwarted). Once inside a network, the attacker's goal is to remain undetected while using some type of malware to capture confidential information, which is ultimately sent to a different location for analysis and then sold on the black market.To read this article in full or to leave a comment, please click here(Insider Story)

5 tips for defending against advanced persistent threats

The aptly named advanced persistent threat (APT) is a type of network attack in which an attacker selects a specific target, uses social engineering and advanced technologies to break into a network and then focuses on that target for weeks, months or years until the attack has successfully played out (or been thwarted). Once inside a network, the attacker's goal is to remain undetected while using some type of malware to capture confidential information, which is ultimately sent to a different location for analysis and then sold on the black market.APTs are highly organized, sometimes with a complete staff, and have plenty of monetary and technological resources. Although APTs may use common hacker tools, they more often employ sophisticated, customized software that's less likely to be picked up by a security protection system. Types of APTs or delivery mechanisms include zero-day attacks, phishing, advanced malware and a variety of Web compromises.To read this article in full or to leave a comment, please click here(Insider Story)

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report came out this morning with bad news on multiple fronts, including click-through rates on phishing messages, how long it takes companies to detect breaches, and even whether companies spot the breaches at all.Phishing emails continued to be a primary starting point for attacks, said Bryan Sartin, executive director, global security services at Verizon.The number of phishing email messages that were opened hit 30 percent in this year's report, up from 23 percent last year.In addition, 12 percent of users don't just open the email but open the attachment as well, while 11 percent follow links in the email to online forms where they then input sensitive data such as login credentials.To read this article in full or to leave a comment, please click here

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report came out this morning with bad news on multiple fronts, including click-through rates on phishing messages, how long it takes companies to detect breaches, and even whether companies spot the breaches at all.Phishing emails continued to be a primary starting point for attacks, said Bryan Sartin, executive director, global security services at Verizon.The number of phishing email messages that were opened hit 30 percent in this year's report, up from 23 percent last year.In addition, 12 percent of users don't just open the email but open the attachment as well, while 11 percent follow links in the email to online forms where they then input sensitive data such as login credentials.To read this article in full or to leave a comment, please click here

Dropbox wants to stretch desktop file storage to infinity

Dropbox has a futuristic vision for how its users will be able to share massive files and have quick access to them on their computers, without their hard drives overflowing.The cloud storage company announced a new initiative at its Open conference in London on Tuesday called Project Infinite. It's a push to create a new Dropbox interface that allows users to see all of the files they've stored in the cloud in their computer's file explorer without requiring them to keep local copies of each document, image, spreadsheet or other file. With Project Infinite, users will be able to manage their files in the cloud by moving them around inside the Mac OS X Finder or Windows File Explorer, just like they would any local files that are taking up space on their hard drives.To read this article in full or to leave a comment, please click here

OpenStack and Amazon’s cloud: Friends or foes?

Four years ago tensions between OpenStack and Amazon Web Services were at a high. The open source cloud computing platform was being developed as an alternative to AWS’s and members of the community spoke despairingly about the public cloud behemoth. Fast-forward to today, and the relationship between these two cloud platforms seems quite undefined.To read this article in full or to leave a comment, please click here

Nokia to buy connected health gadgets firm Withings for $191 million

Nokia is paying 170 million euros (US$191 million) to acquire French fitness gadgets company Withings in a bid to get into the digital health market.For the Espoo, Finland company, which sold its handset business to Microsoft two years ago, and has been since mainly in the area of selling telecom equipment, the acquisition marks a strong push into connected healthcare and home products, ranging from activity trackers, weighing scales, thermometers, blood pressure monitors, and home and baby monitors.Nokia's brand, which is still well-regarded in many consumer markets, may aid the company as it enters new segments and starts what it describes as a "new chapter."To read this article in full or to leave a comment, please click here

Optimize Your Data Center: Virtualize Your Servers

A month ago I published the video where I described the idea that “two switches is all you need in a medium-sized data center”. Now let’s dig into the details: the first step you have to take to optimize your data center infrastructure is to virtualize all servers.

For even more details, watch the Designing Private Cloud Infrastructure webinar, or register for the Building Next-Generation Data Center course.