Archive

Category Archives for "Networking"

Microsoft’s ‘blue screen of death’ is getting more descriptive with QR codes

The Windows Blue Screen of Death isn't known for being particularly descriptive, but Microsoft may be looking to change that in a future version of Windows 10.  A Reddit user posted a picture last week that shows a new version of the dreaded blue screen, one with a QR code and a link where users can get more information about the error that caused their computer to crash.  Right now, the code and the link take users to a webpage that discusses generic fixes for errors that might cause a crash. In the future, though, Microsoft could provide a QR code that leads to more specific information about what caused the computer freeze up.To read this article in full or to leave a comment, please click here

Microsoft endorses EU-US Privacy Shield data sharing pact

Microsoft is throwing its weight behind the EU-U.S. Privacy Shield agreement, which is intended to safeguard the privacy of European Union citizens when their personal information is exported to the U.S. for processing.But a document leaked late last week suggests the proposed agreement does not have the backing of EU data protection authorities, who are meeting this week to finalize their position on it.Microsoft will seek approval to conduct data transfers under the agreement, its Vice President for EU Government Affairs, John Frank, wrote in a blog post Monday.To read this article in full or to leave a comment, please click here

Microsoft endorses EU-US Privacy Shield data sharing pact

Microsoft is throwing its weight behind the EU-U.S. Privacy Shield agreement, which is intended to safeguard the privacy of European Union citizens when their personal information is exported to the U.S. for processing.But a document leaked late last week suggests the proposed agreement does not have the backing of EU data protection authorities, who are meeting this week to finalize their position on it.Microsoft will seek approval to conduct data transfers under the agreement, its Vice President for EU Government Affairs, John Frank, wrote in a blog post Monday.To read this article in full or to leave a comment, please click here

Adobe to issue emergency patch for Flash vulnerability

Adobe is working on an emergency patch for its Flash Player after attackers are reportedly exploiting a critical flaw. The vulnerability, CVE-2016-1019, affects Flash Player version 21.0.0.197 on Windows, Mac, Linux and Chrome OS, according to an advisory published on Tuesday. The flaw is being actively exploited on Windows XP and 7 systems running Flash Player versions 20.0.0.306 and earlier. "Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system," it said. A patch could be released as soon as Thursday.To read this article in full or to leave a comment, please click here

Adobe to issue emergency patch for Flash vulnerability

Adobe is working on an emergency patch for its Flash Player after attackers are reportedly exploiting a critical flaw. The vulnerability, CVE-2016-1019, affects Flash Player version 21.0.0.197 on Windows, Mac, Linux and Chrome OS, according to an advisory published on Tuesday. The flaw is being actively exploited on Windows XP and 7 systems running Flash Player versions 20.0.0.306 and earlier. "Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system," it said. A patch could be released as soon as Thursday.To read this article in full or to leave a comment, please click here

Taipei: CloudFlare’s 77th Data Center is Now Live

台北:CloudFlare的第七十七個數據中心已經上線喔!

alt

We are excited to announce the launch of our Taipei data center, which is our 28th data center in Asia, and our 77th data center globally. Millions of websites which were previously served from Hong Kong are now served locally from Taipei.

我們高興地宣布CloudFlare的的台北機房建置完成。這是我們在亞洲的第二十八個,在全球的第七十七個數據中心。從現在起台灣的網民可以直接從CloudFlare在台北的節點訪問數以百萬計的網站,不再繞道到香港。

Taipei today
今天的台北

alt

Taipei, home to many renowned tech companies, is famous not only for its vibrant night markets, but also for its warm and welcoming people. From soup dumplings to computer peripherals to Kangsi Coming, its contribution to the world is enormous.

科技重鎮台北,不單擁用充滿活力的夜市,台北人的熱情而友善的人情味也是舉世聞名的。從小籠包、電腦周邊零件到康熙來了,台北對世界的貢獻碩大無朋。

Improved availability and performance
更進一步的可用性和性能

alt

Taipei has one of the fastest Internet speeds. Yet, being located far away from other Internet interconnect centers makes for some unique challenges. When traffic is delivered to local eyeballs from Hong Kong, Tokyo, Singapore or worse-still Los Angeles, it is often subject to long latency and the constraints of limited capacity before arriving in Taipei. Additionally, traffic flowing on undersea cables around Taipei have been subject to cable cuts over the years, mainly because of the active fault lines around the island.

台北有世界上首屈一指的網路速度。可是,因為台北和其他互聯網交換中心的距離,來自香港,東京,甚至洛杉磯的流量往往要通過高延時和有限的頻寬才能傳送到台北。另外,台北位於板塊交界處,地震發生頻繁,海底電䌫中斷時有發生。

With the launch of our Taipei data center, visitors to millions of CloudFlare websites will experience a 4x improvement in performance and Continue reading

Save 74% on RAVPower’s 16750mAh External Battery Power Bank – Deal Alert

The RAVPower 16750mAh External Battery Power Bank has a list price of $114.99, but with the current 74% discount you can save $85 and buy it now via Amazon for just $29.99.The Power Bank measures roughly 5x3 inches and weighs just 10.9oz, making it portable enough for travel. The unit is capable of charging an iPhone 6 almost 6 times, a Galaxy S6 almost 4 times, or one full charge for an iPad Air. It can charge multiple devices simultaneously, automatically detecting and delivering the optimal charging current for each connected device. An ultra reliable A+ Lithium-Ion battery provides over 500 battery charge cycles. The portable power bank will automatic shutdown if a short circuit or overload output occurred while unit is charging, protecting your device from damage.To read this article in full or to leave a comment, please click here

Failover Mechanism Part-1

Redundancy is must for ISP in Core and also its equally important for Enterprise
to have network up always thus resulting in zero business impact due to network outage.
There are  different scenarios of failover mechanism  depending upon the  requirement.
First of its kind is Dual POP Dual last mile Dual CE (DPDLDC). It provides redundancy both for WAN connectivity as well as LAN connectivity.

DUAL POP—customer  primary and secondary link terminated on different PE router.

DUAL LAST MILE—last mile connectivity between PE and CE is different for primary and secondary

DUAL CE -Primary and secondary terminated on different CPE device.

I would be sharing Multiple Scenarios of Fail over Mechanism in coming  posts.

ISP is very much transparent in this scenario, traffic control is being done from CPE end.

Considering the below  topology

failover mechanism

Failover Mechanism —

1. Outgoing Traffic from CPE wan is controlled using HSRP + IP SLA
2. Incoming traffic to CPE is controlled using AS Path Prepend attribute of BGP at secondary( lower as path count , better path)
Normal Scenerio
1)Primary WAN link is up .HSRP running towards LAN is active state. Secondary link is having AS-Prepend so primary link is preferred with having less number Continue reading

IDC: Cloud is eating legacy systems

New research from IDC shows that spending on infrastructure to run public and private clouds continues to grow at leaps and bounds as spending on non-cloud infrastructure decreases.  +MORE AT NETWORK WORLD: 10 Best Cloud SLA practices + IDC’s Worldwide Quarterly Cloud IT Infrastructure Tracker tracks spending patterns of users and service providers, along with revenues of vendors to paint a picture of cloud adoption trends. Infrastructure spending on public and private cloud technology – which includes servers, storage and Ethernet switching – grew 21.9% in 2015 to be a $29 billion industry. Cloud technology made up almost one-third (32%) of all IT infrastructure sales; that’s up from $28.6% in 2014.To read this article in full or to leave a comment, please click here

The battle between LTE and Wi-Fi may have left LTE-U out in the cold

After more than a year of rancor over whether it would hurt Wi-Fi, a technology that lets LTE networks use unlicensed spectrum may have already missed its window of opportunity.LTE-Unlicensed is designed to improve cellular service by tapping into some of the frequencies used by Wi-Fi and other unlicensed technologies. But almost as soon as LTE-U was proposed in late 2014, Wi-Fi supporters pounced. They charged that it would drown out Wi-Fi signals because LTE didn’t know how to make room for other users.+ PRIMER: LTE-U: A quick explainer +To read this article in full or to leave a comment, please click here

How to manage IT in a growing business: Implementing IT policies

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors. As business leaders grow their companies, corporate assets should always be top of mind. As such, business leaders should be implementing IT policies early on in order to set standards and expectations for employees when it comes to the use of corporate technology and managing corporate data. In parts one and two of this three-part series, I rolled out a playbook on when companies should hire their first IT consultant and what to keep in mind when appointing a CIO. In this third and final part of this series on the IT Lifecycle I’ll discuss when companies should start rolling out formal IT policies and how to do so.To read this article in full or to leave a comment, please click here

How to manage IT in a growing business: Implementing IT policies

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors.

As business leaders grow their companies, corporate assets should always be top of mind. As such, business leaders should be implementing IT policies early on in order to set standards and expectations for employees when it comes to the use of corporate technology and managing corporate data.

In parts one and two of this three-part series, I rolled out a playbook on when companies should hire their first IT consultant and what to keep in mind when appointing a CIO. In this third and final part of this series on the IT Lifecycle I’ll discuss when companies should start rolling out formal IT policies and how to do so.

To read this article in full or to leave a comment, please click here

How to manage IT in a growing business: Appointing a CIO

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors. Timing is everything when hiring a CIO. The primary function of a CIO is to be forward-looking for developing and implementing IT initiatives, but it can be difficult for a CIO to fulfill this duty if he or she is brought in too late and provided with inadequate technologies and processes. The earlier a company invests in a CIO, the earlier everyone can be in tune with what will make the business most efficient. But most companies don’t know when it’s too early and when it’s too late. In the first article of this three-part series on the IT Lifecycle, I discussed recommendations for when to hire an IT consultant, and what to consider when doing so. During this process, it’s important to recognize when a CIO will be a valuable addition. In this second part of the series, I will continue to follow Joe’s Widget Shop, a hypothetical software development company, as they move onto the next stage in the IT lifecycle. I’ll provide you with insight on what to look for when appointing a CIO Continue reading

How to manage IT in a growing business: Appointing a CIO

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors.

Timing is everything when hiring a CIO. The primary function of a CIO is to be forward-looking for developing and implementing IT initiatives, but it can be difficult for a CIO to fulfill this duty if he or she is brought in too late and provided with inadequate technologies and processes. The earlier a company invests in a CIO, the earlier everyone can be in tune with what will make the business most efficient. But most companies don’t know when it’s too early and when it’s too late.

In the first article of this three-part series on the IT Lifecycle, I discussed recommendations for when to hire an IT consultant, and what to consider when doing so. During this process, it’s important to recognize when a CIO will be a valuable addition. In this second part of the series, I will continue to follow Joe’s Widget Shop, a hypothetical software development company, as they move onto the next stage in the IT lifecycle. I’ll provide you with insight on what to look for when appointing a CIO Continue reading

DARPA moves toward spacecraft that can fly 10X in 10-days

DARPA this month will explain what it wants in the next development phase of its reusable Mach 10 satellite taxi capable of carrying and deploying a 3,000- 5,000 lb. satellite into low earth orbit (LEO) at a target cost of less than $5M per launch.+More on Network World: DARPA: Show us how to weaponize benign technologies+DARPA’s Experimental Spaceplane (XS-1) system would have a reusable first stage that would fly to hypersonic speeds at a suborbital altitude. At that point, one or more expendable upper stages would separate and deploy a satellite LEO. The reusable first stage would then return to earth, land and be prepared for the next flight. Modular components, durable thermal protection systems and automatic launch, flight and recovery systems should significantly reduce logistical needs, enabling rapid turnaround between flights.To read this article in full or to leave a comment, please click here