Archive

Category Archives for "Networking"

Data destruction 101: There’s more to it than wiping your drive [Infographic]

In 2009, a team of journalists who were investigating the electronic waste, purchased a computer in a Ghana market that was found to contain "sensitive documents belonging to U.S. government contractor Northrop Grumman," wrote Robert McMillan in a story at the time. "Northrop Grumman is not sure how the drive ended up in a Ghana market, but apparently the company had hired an outside vendor to dispose of the PC."That's a nightmare scenario, to be sure.And in the years since, businesses have continued to store vast quantities of data on servers, hard drives, and media storage devices — sensitive data that should be protected or destroyed. But the options for data destruction can be overwhelming.To read this article in full or to leave a comment, please click here(Insider Story)

U.S. carriers stay tight-lipped on LTE-U deployments

America’s big four wireless service providers are enthusiastic about the prospect of delivering data over unlicensed frequencies via LTE-U, but they’re playing their cards very close to their chests when it comes to specific plans.LTE-U, which is a wireless protocol designed to let carriers use their LTE signals over the same unlicensed frequencies as Wi-Fi, is a controversial technology. Advocates, which include the wireless carriers, insist that coexistence features built into the standard will allow it to use the same airwaves as Wi-Fi without interference. Critics say that independent testing shows that LTE-U could drown out Wi-Fi signals when the two conflict.To read this article in full or to leave a comment, please click here

Increasingly popular update technique for iOS apps puts users at risk

An increasing number of iOS application developers use a technique that allows them to remotely modify the code in their apps without going through Apple's normal review process, potentially opening the door to abuse and security risks for users.The technique is a variation of hot patching, which is a way of dynamically updating a system or application without restarting it. In this case, an iOS application is updated without the developer having to submit a new version to the official iOS app store and then wait for Apple's review of the changes, which can be a lengthy process.An implementation of this hot patching method comes from an open-source project called JSPatch, which provides an engine that app developers can integrate into their apps and which bridges JavaScript code to Objective-C, the programming language used by iOS apps.To read this article in full or to leave a comment, please click here

US lab develops gigantic turbine blades to capture vast wind energy

US researchers at Sandia National Laboratories say they are working on a design for gigantic wind turbine blades that are longer than two football fields which could support 50-megawatt-- more than six times the power output of the largest current turbines --offshore wind farms in the future.+More on network World: Energy Dept. wants big wind energy technology in all 50 states+Sandia researchers said most US wind turbines produce power in the 1- to 2-MW range, with blades about 165 feet (50 meters) long, while the largest commercially available turbine is rated at 8 MW with blades 262 feet (80 meters) long. A 50-MW turbine requires a rotor blade more than 650 feet (200 meters) long, two and a half times longer than any existing wind blade, the researchers stated.To read this article in full or to leave a comment, please click here

US lab develops gigantic turbine blades to capture vast wind energy

US researchers at Sandia National Laboratories say they are working on a design for gigantic wind turbine blades that are longer than two football fields which could support 50-megawatt-- more than six times the power output of the largest current turbines --offshore wind farms in the future.+More on network World: Energy Dept. wants big wind energy technology in all 50 states+Sandia researchers said most US wind turbines produce power in the 1- to 2-MW range, with blades about 165 feet (50 meters) long, while the largest commercially available turbine is rated at 8 MW with blades 262 feet (80 meters) long. A 50-MW turbine requires a rotor blade more than 650 feet (200 meters) long, two and a half times longer than any existing wind blade, the researchers stated.To read this article in full or to leave a comment, please click here

Security Requirements Are Driving Identity Management

Anyone familiar with identity management knows that it can be extremely messy – lots of tactical tools, access policies, multiple data repositories, manual processes, etc. Furthermore, user authentication continues to be anchored by user names and passwords making nearly every organization vulnerable to credentials harvesting, identity theft, and cyber attacks.These persistent IAM problems remain, even though identity management is becoming a bigger component of enterprise security. This is true because, as organizations embrace cloud and mobile computing, they lose some control over their IT infrastructure. As one CISO mentioned to me, “when we lose control in some areas we need to get better control over others as compensating controls.” To read this article in full or to leave a comment, please click here

OED Tolls: Linux “at”

Another post on Linux commands, short and simple but very useful: at. The problem As IT pros we are all comfortable with the change window concept. This window usually opens at night or during the week-end and sometimes the change actually just requires a few commands on a Linux machine. The automation The at command […]

April 2016 CCDE Bootcamp

CCDE Bootcamp – This is an Online Cisco CCDE exam preparation training. Probably you all know the success of Orhan Ergun’s CCDE Bootcamps and how it has been helping so many engineer become a better network engineer/designer. If you don’t know, please just take a tour on the website. Check the Success Stories, Why Orhan and […]

The post April 2016 CCDE Bootcamp appeared first on Orhanergun.

April 2016 CCDE Bootcamp

CCDE Bootcamp – This is an Online Cisco CCDE exam preparation training. Probably you all know the success of Orhan Ergun’s CCDE Bootcamps and how it has been helping so many engineer become a better network engineer/designer. If you don’t know, please just take a tour on the website. Check the Success Stories, Why Orhan and […]

The post April 2016 CCDE Bootcamp appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

CCIE Skill Transformation to SDN Survey

I’m conducting “CCIE Skill Transformation to SDN” survey, to capture the perceived impact of SDN & NFV to CCIEs, as well as to understand how CCIEs think about their readiness to these new technologies. The result will be presented during my session at Cisco Live Berlin (BRKSDN-4005) on 16 February 2016. Only those who have passed CCIE lab can participate in the survey (regardless of your current CCIE status e.g. inactive or Emeritus). The information you provide is confidential and will not be disclosed as individual answer. No personal data will be exposed and shared to any parties. Thank you in advance for your support
https://www.surveymonkey.com/r/ccie-to-sdn