Archive

Category Archives for "Networking"

Citizens of Tech 006 – Saga of Lucimia Special, Part 2

On this week's Citizens of Tech podcast, we conclude our special on how complex games are developed. Regular host Eric Sutphen (@zutfen) and special guest Jeff Pugliese (@tpyowritr) continue their interview with game developers Tim Anderson and Giovanni Martello from Saga of Lucimia. Topics include community, archetypes, and character progression.

Author information

Ethan Banks

Ethan Banks, CCIE #20655, has been managing networks for higher ed, government, financials and high tech since 1995. Ethan co-hosts the Packet Pushers Podcast, which has seen over 3M downloads and reaches over 10K listeners. With whatever time is left, Ethan writes for fun & profit, studies for certifications, and enjoys science fiction. @ecbanks

The post Citizens of Tech 006 – Saga of Lucimia Special, Part 2 appeared first on Packet Pushers Podcast and was written by Ethan Banks.

Citizens of Tech 006 – Saga of Lucimia Special, Part 2

On this week's Citizens of Tech podcast, we conclude our special on how complex games are developed. Regular host Eric Sutphen (@zutfen) and special guest Jeff Pugliese (@tpyowritr) continue their interview with game developers Tim Anderson and Giovanni Martello from Saga of Lucimia. Topics include community, archetypes, and character progression.

The post Citizens of Tech 006 – Saga of Lucimia Special, Part 2 appeared first on Packet Pushers.

Managed power supplies and how to automate your branch network

One of the worst parts of the day has to be calling AT&T or Comcast to request a dispatch to a branch office or to check up on a problem internet circuit.  Yelling out “Technical Support” to try and get past the prompts.  The first question I get asked every time, “Did you reboot the modem?”. […]

Author information

William Marti

William Marti

Network Admin for the last 5 years at a large NA based food distributor. Graduated with a Bachelors in Information Systems

The post Managed power supplies and how to automate your branch network appeared first on Packet Pushers Podcast and was written by William Marti.

Soviet Mi-24V Hind E, 1/72 scale

For best article visual quality, open Soviet Mi-24V Hind E, 1/72 scale directly at NetworkGeekStuff.

0606060005The Mil Mi-24 (Russian: Миль Ми-24; NATO reporting name: Hind) is a large helicopter gunship and attack helicopter and low-capacity troop transport with room for eight passengers. It is produced by Mil Moscow Helicopter Plant and has been operated since 1972 by the Soviet Air Force and its successors, along with more than 30 other nations.

In NATO circles, the export versions, Mi-25 and Mi-35, are denoted with a letter suffix as “Hind D” and “Hind E” respectively. Soviet pilots called the Mi-24 the “flying tank”, or летающий танк (letayushchiy tank). More common unofficial nicknames were “Crocodile” (Крокодил or Krokodil) due to the helicopter’s camouflage scheme and “Drinking Glass” (Стакан or Stakan) because of the flat glass plates which surround the cockpit of the Mi-24.

In my small interpretation, I have used the Revell kid that was released in 2014 targeting the Czech Air Force variant, but it also has the option of doing Soviet markings, so I decided to go with this much more generally known view as I have a certain nostalgia on this thing appearing in the old Operation Flashpoint (2001) by Continue reading

How to Enable Dot1x authentication for wired clients

How does Internet work - We know what is networking

If your LAN is extending to some places where unauthorised people can just plug in and gain access to your protected network, it’s time to implement some security on your access switch. The best thing to do is to implement IEEE 802.1X port-based authentication which will enable users/machine authentication and prevent unauthorized devices from getting access switch port running when connected. IEEE 802.1X port-based authentication is mostly called simply as dot1x. In this article I will show you how to configure some basic dot1x stuff on switch side. I will also include Windows machine side of configuration as this is something most people presume

How to Enable Dot1x authentication for wired clients

For its next feat, Google will try to make you eat your vegetables

If your image of the Google cafeteria is a bunch of portly coders tucking into steak and lobster every night, think again: Silicon Valley’s cream of the crop is going on a diet.To the list of perks you’re missing out on at the famous workers’ paradise, you can now add healthier food. But don’t worry, the planet wins, too. For the last year and a half, Google’s food department has been on a mission to cut down on meat.“A more balanced, plant-centric diet is good for the environment and is good for your health,” said Michiel Bakker, director of the Global Food Program at Google. “So if we can move more people to eat less meat and to enjoy more vegetables, the rest will follow.”To read this article in full or to leave a comment, please click here

For its next feat, Google will try to make you eat your vegetables

If your image of the Google cafeteria is a bunch of portly coders tucking into steak and lobster every night, think again: Silicon Valley’s cream of the crop is going on a diet.To the list of perks you’re missing out on at the famous workers’ paradise, you can now add healthier food. But don’t worry, the planet wins, too. For the last year and a half, Google’s food department has been on a mission to cut down on meat.“A more balanced, plant-centric diet is good for the environment and is good for your health,” said Michiel Bakker, director of the Global Food Program at Google. “So if we can move more people to eat less meat and to enjoy more vegetables, the rest will follow.”To read this article in full or to leave a comment, please click here

Re-New. Again

Re-New. Again. Greetings. Welcome to my first blog post. I have to say, I feel a little out of my class in the esteemed collection of networking talent I see blogging on this site. I have never been the top tier of networking. I have never been the guy who just seems to know everything. […]

Author information

Doug Sheehan

Doug Sheehan has been an IT/Network Tech for what seems like a long time. Most of his career has been directly or indirectly connecting to routers and switches. His work in Alaska focused on layer2/layer 3 connections over satellites, since there are still no roads to most places. He now works on automation networks on the little island off the big island, where he lives with his beautiful wife and two dogs.
Having overslept the three years to update his CCNA, He now finds himself beginning the certification journey again from the start. He also has unrealized potential in programming and BSD.
His website is at dougsheehan.com

The post Re-New. Again appeared first on Packet Pushers Podcast and was written by Doug Sheehan.

Apple Watch to launch in seven new countries this month

After a slow initial rollout, it's finally seems that Apple is getting a handle on Apple Watch supply.The Cupertino-based company yesterday announced that the Apple Watch is poised to launch in an additional seven countries come Friday, June 24.The countries being graced with the Apple Watch treatment include Italy, Mexico, Singapore, South Korea, Spain, Switzerland and Taiwan. This will soon bring the total number of countries that carry the Apple Watch to 16.“The response to Apple Watch has surpassed our expectations in every way," Apple executive Jeff Williams said in a press release, "and we are thrilled to bring it to more customers around the world."To read this article in full or to leave a comment, please click here

Apple may reduce its cut of app store revenue for some developers

Apple will begin taking a smaller cut of application revenue from some developers on its App Store, according to a report Friday from the Financial Times.Since the App Store opened in 2008, one of the costs of being an iOS developer has been handing over to Apple 30 percent of an app’s revenue. But the company is now working with media companies including Spotify, Netflix and Time Inc. to give them a larger cut of the sales from their apps, the FT said, citing unnamed sources.It’s unclear what the new revenue split will be, or which companies will be eligible for it, but it marks a departure from the plan Steve Jobs announced when the store first launched.To read this article in full or to leave a comment, please click here

iPexpert’s Newest “CCIE Wall of Fame” Additions 6/5/2015

Please join us in congratulating the following iPexpert students who have passed their CCIE lab!

This Week’s CCIE Success Stories

  • Martin Fischer, CCIE #48881 (Security)
  • Joseph Ploehn, CCIE #17658 (Data Center)
  • David Sun, CCIE #48879 (Routing and Switching)

We Want to Hear From You!

Have you passed your CCIE lab exam and used any of iPexpert’s self-study products, or attended a CCIE Bootcamp? If so, we’d like to add you to our CCIE Wall of Fame!

PayPal users may get break on unsolicited robocalls, texts

After a backlash from critics, PayPal seems to be reconsidering a plan to give itself unilateral permission to ping its users with robocalls and text messages.The controversy started when PayPal recently indicated in proposed amendments to its user agreement and privacy policy its intention to engage in this type of communication with its customers. There, it also stated that the only opt-out recourse for those in disagreement with its plan would be to close their accounts.The plan drew attention from critics who, in blogs and on social media, questioned the prudence and legality of the new policy, which is slated to go into effect July 1. If the changes are adopted, PayPal would be able to make autodialed and prerecorded calls, and send text messages using any telephone number account holders have provided to PayPal or that the company has “otherwise obtained.”To read this article in full or to leave a comment, please click here

PayPal users may get break on unsolicited robocalls, texts

After a backlash from critics, PayPal seems to be reconsidering a plan to give itself unilateral permission to ping its users with robocalls and text messages.The controversy started when PayPal recently indicated in proposed amendments to its user agreement and privacy policy its intention to engage in this type of communication with its customers. There, it also stated that the only opt-out recourse for those in disagreement with its plan would be to close their accounts.The plan drew attention from critics who, in blogs and on social media, questioned the prudence and legality of the new policy, which is slated to go into effect July 1. If the changes are adopted, PayPal would be able to make autodialed and prerecorded calls, and send text messages using any telephone number account holders have provided to PayPal or that the company has “otherwise obtained.”To read this article in full or to leave a comment, please click here

As PC interest wanes, Computex loses its luster

Taiwan held its 35th annual Computex trade show this week, and the event hasn’t aged well. There was little news to get excited about, the crowds were thinner, and there were no products on the show floor that generated the buzz seen in years past.To be sure, Computex has never had the glitz and glamor of CES, but for the PC industry it’s the big event of the year. Taiwanese companies make most of the world’s PCs—including those sold under more famous brands—and Computex has been a place where Intel and AMD launch new processors, and where competing memory and interface technologies battle for dominance.To read this article in full or to leave a comment, please click here

As PC interest wanes, Computex loses its luster

Taiwan held its 35th annual Computex trade show this week, and the event hasn’t aged well. There was little news to get excited about, the crowds were thinner, and there were no products on the show floor that generated the buzz seen in years past.To be sure, Computex has never had the glitz and glamor of CES, but for the PC industry it’s the big event of the year. Taiwanese companies make most of the world’s PCs—including those sold under more famous brands—and Computex has been a place where Intel and AMD launch new processors, and where competing memory and interface technologies battle for dominance.To read this article in full or to leave a comment, please click here

5 steps to transform support services

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Thousands of customer support agents will go to work today and do the exact same thing they did yesterday: pick up the phone, answer a common question, hang up the phone, pick up the phone, answer the same question, and hang up the phone again. And tomorrow get up and do it all again. It’s no wonder the average company loses 27% of its agents each year to attrition.

If you run a customer support center at your company, consider your ultimate goals: faster time-to-resolution, increased customer satisfaction, better employee retention, and higher rates of employee satisfaction and happiness. These are the Holy Grail of our industry—and while daunting, they are attainable. Here are five key steps to becoming a higher-performing support organization:

To read this article in full or to leave a comment, please click here

Closing the security loop with automated incident response

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Organizations have poured billions of dollars into cyber security detection solutions, and while they are exceptional at uncovering potential anomalies and threats, none of these products can guarantee against a breach. Consequently, the next logical step is to pair robust detection and prevention technology with equally efficient and effective operations solutions, including incident response.

 

Detection solutions are now generating an average of 10,000 alerts per day, according to a recent survey Damballa—far too many for companies to inspect and manage. Yet, security professionals are still attempting to manually separate false alarms from real threats; decide what action, if any, to take; and then perform repetitive actions like gathering data, conducting basic analysis, and generating notifications and tickets.

To read this article in full or to leave a comment, please click here

Why It’s So Hard To Find Intruders After A Network Penetration

This guest blog post is by Jason Matlof, Executive Vice President, LightCyber. We thank LightCyber for being a sponsor. LightCyber’s Magna Active Breach Detection platform is a behavior-based detection system that integrates network and endpoint context and is designed specifically to find active breaches after a threat actor has already penetrated a network. To hear […]

Author information

Drew Conry-Murray

I'm a tech journalist, editor, and content director with 17 years' experience covering the IT industry. I'm author of the book "The Symantec Guide To Home Internet Security" and co-author of the post-apocalyptic novel "Wasteland Blues," available at Amazon.

The post Why It’s So Hard To Find Intruders After A Network Penetration appeared first on Packet Pushers Podcast and was written by Drew Conry-Murray.