Certifications: Why I Like Them, How I Use Them and My Plan for Security Learning
The other day Daniel Dib (http://lostintransit.se) asked me an interview question. The question was about certifications. What do I think about them…. and are they losing their “value”.
Poor certifications. People question their value. Of course “value” typically means for many what can the cert “do” for you once you have it. People also get so judgemental of others for “collecting” them. And yes… when I was younger I was, admittedly, one of those people who looked down on people I viewed as “cert collectors”. Poor poor certifications. In every area certifications exist they can get a bad rep. IT industry, Scuba Diving, .. heck even in girl scouts when there was always that one girl who wanted to try to get every possible girl scout badge. 
Why I Like Them and How I Use Them
In 2012 my view on certs changed. I realized I could use them to my advantage to help me organize my learning by making goals and signing up for certs. You see, back in 2010 I had bought a few books about Wireshark by Laura Chappel and told myself I would make Continue reading
This looks like a big threat to traditional router vendors.
The goal is to create an “information solutions” powerhouse.
While thought to be possible, no organizations have yet attempted the move in a production environment.
Thomas Rowlandson [Public domain], via
ONAP’s second code release will take on enterprise data centers.
If you are a hacker or a security company, 2017 was a very good year.
Download the HPE MEC Research Report, . Telecommunications (telco) providers are excited about Multi-Access Edge Computing (MEC) because it promises to make compute and storage capabilities available to customers at the edge of communications networks. Workloads and applications will be closer to customers, potentially enhancing experiences and enabling new services and offers. MEC is being...