On this week's Citizens of Tech podcast, we conclude our special on how complex games are developed. Regular host Eric Sutphen (@zutfen) and special guest Jeff Pugliese (@tpyowritr) continue their interview with game developers Tim Anderson and Giovanni Martello from Saga of Lucimia. Topics include community, archetypes, and character progression.
The post Citizens of Tech 006 – Saga of Lucimia Special, Part 2 appeared first on Packet Pushers Podcast and was written by Ethan Banks.
On this week's Citizens of Tech podcast, we conclude our special on how complex games are developed. Regular host Eric Sutphen (@zutfen) and special guest Jeff Pugliese (@tpyowritr) continue their interview with game developers Tim Anderson and Giovanni Martello from Saga of Lucimia. Topics include community, archetypes, and character progression.
The post Citizens of Tech 006 – Saga of Lucimia Special, Part 2 appeared first on Packet Pushers.
One of the worst parts of the day has to be calling AT&T or Comcast to request a dispatch to a branch office or to check up on a problem internet circuit. Yelling out “Technical Support” to try and get past the prompts. The first question I get asked every time, “Did you reboot the modem?”. […]
The post Managed power supplies and how to automate your branch network appeared first on Packet Pushers Podcast and was written by William Marti.
For best article visual quality, open Soviet Mi-24V Hind E, 1/72 scale directly at NetworkGeekStuff.
The Mil Mi-24 (Russian: Миль Ми-24; NATO reporting name: Hind) is a large helicopter gunship and attack helicopter and low-capacity troop transport with room for eight passengers. It is produced by Mil Moscow Helicopter Plant and has been operated since 1972 by the Soviet Air Force and its successors, along with more than 30 other nations.
In NATO circles, the export versions, Mi-25 and Mi-35, are denoted with a letter suffix as “Hind D” and “Hind E” respectively. Soviet pilots called the Mi-24 the “flying tank”, or летающий танк (letayushchiy tank). More common unofficial nicknames were “Crocodile” (Крокодил or Krokodil) due to the helicopter’s camouflage scheme and “Drinking Glass” (Стакан or Stakan) because of the flat glass plates which surround the cockpit of the Mi-24.
In my small interpretation, I have used the Revell kid that was released in 2014 targeting the Czech Air Force variant, but it also has the option of doing Soviet markings, so I decided to go with this much more generally known view as I have a certain nostalgia on this thing appearing in the old Operation Flashpoint (2001) by Continue reading
$18M for software-defined storage, and good news for SD-WAN and white-box servers.
How does Internet work - We know what is networking
If your LAN is extending to some places where unauthorised people can just plug in and gain access to your protected network, it’s time to implement some security on your access switch. The best thing to do is to implement IEEE 802.1X port-based authentication which will enable users/machine authentication and prevent unauthorized devices from getting access switch port running when connected. IEEE 802.1X port-based authentication is mostly called simply as dot1x. In this article I will show you how to configure some basic dot1x stuff on switch side. I will also include Windows machine side of configuration as this is something most people presume
Re-New. Again. Greetings. Welcome to my first blog post. I have to say, I feel a little out of my class in the esteemed collection of networking talent I see blogging on this site. I have never been the top tier of networking. I have never been the guy who just seems to know everything. […]
The post Re-New. Again appeared first on Packet Pushers Podcast and was written by Doug Sheehan.
Please join us in congratulating the following iPexpert students who have passed their CCIE lab!
Have you passed your CCIE lab exam and used any of iPexpert’s self-study products, or attended a CCIE Bootcamp? If so, we’d like to add you to our CCIE Wall of Fame!
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
Thousands of customer support agents will go to work today and do the exact same thing they did yesterday: pick up the phone, answer a common question, hang up the phone, pick up the phone, answer the same question, and hang up the phone again. And tomorrow get up and do it all again. It’s no wonder the average company loses 27% of its agents each year to attrition.
If you run a customer support center at your company, consider your ultimate goals: faster time-to-resolution, increased customer satisfaction, better employee retention, and higher rates of employee satisfaction and happiness. These are the Holy Grail of our industry—and while daunting, they are attainable. Here are five key steps to becoming a higher-performing support organization:
To read this article in full or to leave a comment, please click here
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
Organizations have poured billions of dollars into cyber security detection solutions, and while they are exceptional at uncovering potential anomalies and threats, none of these products can guarantee against a breach. Consequently, the next logical step is to pair robust detection and prevention technology with equally efficient and effective operations solutions, including incident response.
Detection solutions are now generating an average of 10,000 alerts per day, according to a recent survey Damballa—far too many for companies to inspect and manage. Yet, security professionals are still attempting to manually separate false alarms from real threats; decide what action, if any, to take; and then perform repetitive actions like gathering data, conducting basic analysis, and generating notifications and tickets.
To read this article in full or to leave a comment, please click here
This guest blog post is by Jason Matlof, Executive Vice President, LightCyber. We thank LightCyber for being a sponsor. LightCyber’s Magna Active Breach Detection platform is a behavior-based detection system that integrates network and endpoint context and is designed specifically to find active breaches after a threat actor has already penetrated a network. To hear […]
The post Why It’s So Hard To Find Intruders After A Network Penetration appeared first on Packet Pushers Podcast and was written by Drew Conry-Murray.
SDxCentral’s sat down with Kelly Herrell to dive into the Brocade SteelApp and why Brocade acquired the NFV asset.