Archive

Category Archives for "Networking"

How far have we come with HTTPS? Google turns on the spotlight

HTTPS is widely considered one of the keys to a safer Internet, but only if it's broadly implemented. Aiming to shed some light on how much progress has been made so far, Google on Tuesday launched a new section of its transparency report dedicated to encryption.Included in the new section is data highlighting the progress of encryption efforts both at Google and on popular third-party sites.MORE: Agony & Ecstasy of Google I/O 2016 Invite Day"Our aim with this project is to hold ourselves accountable and encourage others to encrypt so we can make the Web even safer for everyone," wrote HTTPS evangelists Rutledge Chin Feman and Tim Willis on the Google Security Blog.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Wi-Fi-tracing delivers vast insights into behavioral patterns

Collecting Wi-Fi data on pedestrians as they move around can provide analysis on infrastructure, to a depth that’s never been seen before, think scientists.Collecting breadcrumb data, as people go about their daily business can be used to discover human motivations, predict how individuals react to change, and where to locate simple resources, such as automated teller machines, the researchers from Swiss university Ecole Polytechnique Fédérale de Lausanne (EPFL) believe.“We have statistics and numbers on people who drive and take the train, but pedestrian behavior is often a mystery,” says Antonin Danalet of the school in a university website article. “Understanding the use of pedestrian infrastructure at music festivals, museums and hospitals” could be useful too, he says.To read this article in full or to leave a comment, please click here

This one patch panel trick will make all your cables the right length

Remember that one time the cable you grabbed from the box was exactly the right length for the run from patch panel to server shelf?What if every patch cable you picked up were just the right length?That's the goal of 1-year-old Austrian company PatchBox, which wants to eliminate tangles and speed up network moves, adds and changes with its system of retractable cables in rack-mountable cassettes. It's showing the product in the start-up hall at the Cebit trade show in Hanover, Germany, this week.PatchBox sells kits of 24 cassettes that slot into a 1U module just under the patchboard, right where you would usually put your horizontal cable management system. Each shelf comes with four Patch Catches -- essentially cable posts that mount on the sides of the rack, around which you can route the cables on their way between patch boards.To read this article in full or to leave a comment, please click here

This one patch panel trick will make all your cables the right length

Remember that one time the cable you grabbed from the box was exactly the right length for the run from patch panel to server shelf?What if every patch cable you picked up were just the right length?That's the goal of 1-year-old Austrian company PatchBox, which wants to eliminate tangles and speed up network moves, adds and changes with its system of retractable cables in rack-mountable cassettes. It's showing the product in the start-up hall at the Cebit trade show in Hanover, Germany, this week.PatchBox sells kits of 24 cassettes that slot into a 1U module just under the patchboard, right where you would usually put your horizontal cable management system. Each shelf comes with four Patch Catches -- essentially cable posts that mount on the sides of the rack, around which you can route the cables on their way between patch boards.To read this article in full or to leave a comment, please click here

Reaction: More Encryption is Bad?

This week I was peacefully reading the March 9th issue of ACM Queue when I received a bit of a surprise. It seems someone actually buys the “blame the victim” game, arguing that governments are going to break all encryption if we don’t give them what they want.

These ideas are all based on the same principle: If we cannot break the crypto for a specific criminal on demand, we will preemptively break it for everybody. And whatever you may feel about politicians, they do have the legitimacy and power to do so. They have the constitutions, legislative powers, courts of law, and police forces to make this happen. The IT and networking communities overlooked a wise saying from soldiers and police officers: “Make sure the other side has an easier way out than destroying you.” But we didn’t, and they are.

reaction-3If you don’t get the point, it’s simple: the only way to really have secure communications is to give the government the keys. Once again, my inner philosopher threw up (as I recently said on a Network Break podcast). The reason I find the line of argument above so horrifying is simple: it’s just true enough to Continue reading

Alcatel Lucent Enterprise brings pay per use to the network

It seems like we can buy almost anything as a service today. Servers, storage, applications and collaboration can all be purchased using an “as a service” model. Recently Sprint introduced both Workplace and Mobility as a service to add to the growing portfolio of consumption-based products. In our consumer lives the Amazon button turns consumer goods into a service. The one piece of technology that’s still difficult to buy as a service is the network.Earlier this month, I authored this post discussing how the network needs to evolve into this kind of model.To read this article in full or to leave a comment, please click here

orhanergun.net New Design – New Price !

This is a great news everyone ! Now you will enjoy your CCDE preparation much more than before: orhanergun.net has a new fancy design and a new membership price for the most special network design content! You won’t believe but it’s ONLY $349 per year! Besides, it means that the investment in your career is […]

The post orhanergun.net New Design – New Price ! appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Ransomware attacks on U.S. companies blamed on state-sponsored Chinese hackers

So what do Chinese government-supported hackers turn to after China backed off on supporting economic espionage? Applying their APT skills to infecting companies with ransomware…at least that is the prevailing theory put forth by several security firms.If China really did pull its previous level of support for economic espionage after its agreement with the US late last year, then those same hackers may be supplementing their income by joining the booming business of ransomware.Security firms involved in investigating ransomware attacks that have not previously been made public told Reuters that Chinese hackers are the most likely suspects behind the attacks. It should be noted that none of the security companies could be positive that plain-old cybercrooks weren’t behind the attacks after upping their game, improving skills and purchasing tools previously used only by governments. At least a half dozen ransomware attacks in the last three months have a level of sophistication that is usually only used in state-sponsored attacks.To read this article in full or to leave a comment, please click here