Archive

Category Archives for "Networking"

New Dell partnership throws doubt on traditional antivirus programs

A partnership announced by Dell on Tuesday shows how cybersecurity defenses are evolving, which could have wide-ranging effects on vendors like Symantec, McAfee and Trend Micro.The PC giant has partnered with Cylance, an Irvine, California-based company that specializes in detecting and blocking attacks on endpoint computers.Early next year, Dell will wrap Cylance's Protect product in its Data Protection Endpoint Security Suite, said Brett Hansen, Dell's executive director of data security solutions. The suite is an integrated package with encryption capabilities, authentication features and malware detection.To read this article in full or to leave a comment, please click here

Book Review: Design For How People Learn

Design For How People Learn, by Julie Dirksen (ISBN 978-0321768438)

Design_for_how_people_learn

I saw the title for this book roll across my Twitter feed — can’t remember from who, sorry — from someone who had a blog and was advocating for other bloggers to check this book out. When I read the abstract for the book, I immediately added it to my reading list.

“Whether it’s giving a presentation, writing documentation, or creating a website or blog, we need and want to share our knowledge with other people. But if you’ve ever fallen asleep over a boring textbook, or fast-forwarded through a tedious e-learning exercise, you know that creating a great learning experience is harder than it seems.”

Continue reading

Don’t fall for drone registration scams, warns FAA

The U.S. Federal Aviation Administration hasn't revealed its plans for drone registration yet, but that hasn't stopped at least one company from trying to make a buck from confusion about the rules.In early November, the FAA and Department of Transportation said they intend to set up a registry that will likely cover many small consumer drones, but it's yet to happen. A task force established to propose registration rules is due to deliver its findings on Friday, but even then the FAA will have to come up with formal rules and propose them.MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords "Owners should wait until additional details about the forthcoming drone registration system are announced later this month before paying anyone to do the work for them," the FAA said on Monday.To read this article in full or to leave a comment, please click here

Worth repeating: Entering your bank PIN in reverse does NOT summon police

Security vendor Kasperky Lab yesterday issued this reminder as part of its “fact or fiction” series: No matter what you may have read on Facebook, entering your bank PIN in reverse will not summon the police.From the Kaspersky post: This urban legend is over a decade old and consistently makes it’s rounds on the Internet. Surprisingly, a lot of social media users care so much about this topic that they continually share this old tale with their friends, urging them to READ IT RIGHT AWAY!As it goes with all urban legends, there is a grain of truth in this myth. The idea of ’emergency code’ for ATMs had been hatched some time ago and is obviously where the myth originated.To read this article in full or to leave a comment, please click here

Connecting Clouds with Spine Internetworking

As more and more modern applications move to hybrid or public clouds, the placement of these applications strains network infrastructure. It only makes sense to leverage the massive investments of public cloud providers. The need for public clouds to interact directly with data center resources requires the distributed deployment of cloud applications and appropriate networking...
Continue reading »

Arista looks to connect clouds

Arista Networks this week expanded its data center interconnect offerings with products designed to enable the interconnection of cloud networks.Arista is adding capabilities that extend its spine networking platforms, EOS operating system software and CloudVision management system to include cloud interconnect features. These capabilities include Spine Transit, Spine Interconnect and Spine Peering.+MORE ON NETWORK WORLD: Arista adds security to cloud software+To read this article in full or to leave a comment, please click here

Presentation: All You Need Are Two Switches

I was asked to present a data-center-related talk last week and decided to focus on one of my favorite topics: because most people don’t have more than a few hundred servers in their data center, they don’t need more than two switches (or a rack of servers).

Not surprisingly, an equipment reseller sitting in the room was not amused.

The video and the slide deck are already online, but there’s a minor challenge: the whole event was in Slovenian ;) However, I plan to record the same topic in English once my SDN travels stop.

Book Review: Design For How People Learn

Design For How People Learn, by Julie Dirksen (ISBN 978-0321768438)

I saw the title for this book roll across my Twitter feed — can't remember from who, sorry — from someone who had a blog and was advocating for other bloggers to check this book out. When I read the abstract for the book, I immediately added it to my reading list.

Whether it's giving a presentation, writing documentation, or creating a website or blog, we need and want to share our knowledge with other people. But if you've ever fallen asleep over a boring textbook, or fast-forwarded through a tedious e-learning exercise, you know that creating a great learning experience is harder than it seems.

IDG Contributor Network: This software engineering school uses blockchain technology to authenticate its graduates

Holberton School is a project-based alternative to college for the next generation of software engineers. Using project-based learning and peer learning, Holberton School's mission is to train the best software engineers of their generation. Unlike the normal models, at Holberton School, there are no formal teachers and no formal courses. Instead, everything is project-centered. The school gives students increasingly difficult programming challenges to solve, with minimal initial directions on how to solve them. As a consequence, students naturally look for the theory and tools they need, understand them, use them, work together, and help each other.To read this article in full or to leave a comment, please click here

NIST publishes guidelines for SSH key management: What happens next?

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Secure Shell (SSH) is a tool for secure computer system management, file transfers and automation in computer and telecommunications systems. The Secure Shell protocol ships standard with every Unix, Linux and Mac system and is also widely used on Windows (Microsoft has announced plans to make it a standard component of Windows). It is also included on practically every router and mobile network base station. In many ways, the connected world as we know it runs on Secure Shell. Its keys are ubiquitously used for automating access over a network, and modern systems could not be cost-effectively managed without it.

To read this article in full or to leave a comment, please click here