Aruba rolls out security fabric designed for IoT and the digital era

Aruba, a Hewlett Packard Enterprise Company, is best known for its outstanding business-grade Wi-Fi products. What’s less well known about Aruba is that it has always had excellent security products. In fact, I’ve often described the company as a security vendor dressed up as a Wi-Fi vendor, as Aruba and security have gone hand in hand like the New England Patriots and winning. However, Aruba’s security positioning has always been tactical rather than strategic because its products were used for specific purposes, such as end point protection or wireless security. That shifted this week at APAC Atmosphere in Macau when the company introduced its 360 Security Fabric, which enables it to provide end-to-end security to address the needs of a world that is becoming increasingly digitized. To read this article in full or to leave a comment, please click here

Aruba rolls out security fabric designed for IoT and the digital era

Aruba, a Hewlett Packard Enterprise Company, is best known for its outstanding business-grade Wi-Fi products. What’s less well known about Aruba is that it has always had excellent security products. In fact, I’ve often described the company as a security vendor dressed up as a Wi-Fi vendor, as Aruba and security have gone hand in hand like the New England Patriots and winning. However, Aruba’s security positioning has always been tactical rather than strategic because its products were used for specific purposes, such as end point protection or wireless security. That shifted this week at APAC Atmosphere in Macau when the company introduced its 360 Security Fabric, which enables it to provide end-to-end security to address the needs of a world that is becoming increasingly digitized. To read this article in full or to leave a comment, please click here

Aruba rolls out security fabric designed for IoT and the digital era

Aruba, a Hewlett Packard Enterprise Company, is best known for its outstanding business-grade Wi-Fi products. What’s less well known about Aruba is that it has always had excellent security products. In fact, I’ve often described the company as a security vendor dressed up as a Wi-Fi vendor, as Aruba and security have gone hand in hand like the New England Patriots and winning. However, Aruba’s security positioning has always been tactical rather than strategic because its products were used for specific purposes, such as end point protection or wireless security. That shifted this week at APAC Atmosphere in Macau when the company introduced its 360 Security Fabric, which enables it to provide end-to-end security to address the needs of a world that is becoming increasingly digitized. To read this article in full or to leave a comment, please click here

Evolution of data structures in Yandex.Metrica

Yandex.Metrica is the world's second largest web analytics system. Metrica takes in a stream of data representing events that took place on sites or on apps. Our task is to process this data and present it in an analyzable form.


Processing the data in itself is not a problem. The real difficulty lies in trying to determine what form the processed results should be saved in so that they are easy to work with. During the development process, we had to completely change our approach to data storage organization several times. We started with MyISAM tables, then used LSM-trees and eventually came up with column-oriented database, ClickHouse. In this article I'll explain what led us to settle on this last option.

Yandex.Metrica was launched in 2008 and has now been running for more than nine years. Every time we changed our approach to data storage in the past it was because a particular solution proved inefficient: either there was insufficient performance reserve, or the solution was unreliable, or it used too many computational resources, or it just did not allow us to implement what we needed to.

The old Yandex.Metrica for websites has more than 40 "fixed" Continue reading

W3C DRM appeal fails, votes kept secret

Earlier this summer, the World Wide Web Consortium (W3C) — the organization responsible for defining the standards that make up the Web — decided to embrace DRM (aka "EME") as a web standard. I wasn’t happy about this. I don’t know many who were.Shortly after that, the W3C agreed to talk with me about the issue. During that discussion, I encouraged the W3C to increase their level of transparency going forward — and if there is an appeal of their DRM decision, to make that process completely open and visible to the public (including how individual members of the W3C vote on the issue).To read this article in full or to leave a comment, please click here

Docker at Microsoft Ignite 2017

Docker at Ignite

Docker will be at Microsoft Ignite in Orlando, FL the week of Sept 24th to showcase the latest release of Docker Enterprise Edition (EE) and the joint solutions with our partner Microsoft. Docker Enterprise Edition is the only platform available to secure and manage Linux and Windows containers in production.

In the Docker Booth #2127

Visit Docker in Booth #2127 for a #DockerSelfie, a chance for cool swag and to learn more about how Docker Enterprise Edition can help you save costs on legacy applications, accelerate your cloud strategy and uniformly secure and manage your Linux and Windows app landscape.

Register Here for daily in-booth talks or to schedule time to ask questions about containers and clouds on Linux and Windows Server.

  • Monday 3pm: Save $ on Legacy Apps with Docker
  • Tuesday 11am: Windows and Linux Together with Docker EE
  • Tuesday 3pm: Docker Enterprise Edition Demo
  • Wednesday 11am: Take Legacy .NET Apps to Azure with Docker
  • Thursday 11am: Docker Enterprise Edition Demo

Add these great sessions to your schedule

Container Fest on Sunday Sept 24th:

Docker will be on hand at the Container Fest Pre Day to discuss the possibilities of Docker Enterprise Edition for modernizing traditional Windows and Continue reading

48% off Sycees Plug-in LED Night Light with Dusk to Dawn Sensor, 6-Pack – Deal Alert

These night lights turn themselves on & off from dusk to dawn, have offset prongs that won't block your second outlet, and feature long lasting LED bulbs that won't make any noticeable impact on your energy bill at only 2.2 Kwh per year. Their frosted white diffuser ring puts out just the right amount of soft light for you to find way in the dark without having to turn on any overhead lights. A pack of 6 is currently discounted 48% down to just $12.59. See this deal on Amazon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Ethernet frames and packets: what’s the difference?

When discussing Ethernet data, the terms frame and packet are often used interchangeably. Frames and packets are the electronic containers that carry our data from point-to-point by navigating LANs and WANs and, as they both serve similar functions, their differences are often misunderstood.So what’s the difference? To simplify matters, imagine frames and packets as envelopes of information that are going to be sent from one person to another. The key difference between a frame and a packet is how they encapsulate the information and that depends on where the information is being sent.Frames explained Imagine a company with inter-department mail where a person can send documents to another person within their private/local organization. The contents are placed in an internal envelope and the sender writes their name and department in the “From” field, then writes the recipient’s name and department in the “To” field. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Ethernet frames and packets: what’s the difference?

When discussing Ethernet data, the terms frame and packet are often used interchangeably. Frames and packets are the electronic containers that carry our data from point-to-point by navigating LANs and WANs and, as they both serve similar functions, their differences are often misunderstood.So what’s the difference? To simplify matters, imagine frames and packets as envelopes of information that are going to be sent from one person to another. The key difference between a frame and a packet is how they encapsulate the information and that depends on where the information is being sent.Frames explained Imagine a company with inter-department mail where a person can send documents to another person within their private/local organization. The contents are placed in an internal envelope and the sender writes their name and department in the “From” field, then writes the recipient’s name and department in the “To” field. To read this article in full or to leave a comment, please click here

Some Q&A About the Migration to Hugo

As you may already know, I recently completed the migration of this site from GitHub Pages (generated using Jekyll) to S3/CloudFront and Hugo for static site generation. Since then, I’ve talked with a few readers who had additional questions about the site migration. I thought others might have the same questions, so I decided to gather the most common questions here and share the answers with everyone.

(For those who need a quick primer on how the site is set up/served, refer to this post.)

I’ll structure the rest of this post in a “question-and-answer” format.

Q: Why migrate away from Jekyll?

A: Some of this is tied up with GitHub Pages (see the next question), but the key things that drove me away were very slow build times (in excess of five minutes), limited troubleshooting, dealing with Ruby dependencies in order to run local Jekyll builds (needed to help with troubleshooting), and limited functionality (due in part to GitHub Pages’ restrictive support for plugins).

Q: Why migrate away from GitHub Pages?

A: If you’re happy with Jekyll (and it’s a fine static site generator for lots of folks), having it integrated on the backend with GitHub Pages Continue reading

5 Ways to Secure Wi-Fi Networks

Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security.But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time in learning about and applying enhanced security measures can go a long way toward better protecting your network. Here are six tips to betters secure your Wi-Fi network.Use an inconspicuous network name (SSID) The service set identifier (SSID) is one of the most basic Wi-Fi network settings. Though it doesn’t seem like the network name could compromise security, it certainly can. Using a too common of a SSID, like “wireless” or the vendor’s default name, can make it easier for someone to crack the personal mode of WPA or WPA2 security. This is because the encryption algorithm incorporates the SSID, and password cracking dictionaries used by hackers are preloaded with common and default SSIDs. Using one of those just makes the hacker’s job easier.To read this article in full, please click here

5 Ways to Secure Wi-Fi Networks

Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security.But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time in learning about and applying enhanced security measures can go a long way toward better protecting your network. Here are six tips to betters secure your Wi-Fi network.Use an inconspicuous network name (SSID) The service set identifier (SSID) is one of the most basic Wi-Fi network settings. Though it doesn’t seem like the network name could compromise security, it certainly can. Using a too common of a SSID, like “wireless” or the vendor’s default name, can make it easier for someone to crack the personal mode of WPA or WPA2 security. This is because the encryption algorithm incorporates the SSID, and password cracking dictionaries used by hackers are preloaded with common and default SSIDs. Using one of those just makes the hacker’s job easier.To read this article in full or to leave a comment, please click here

5 Ways to Secure Wi-Fi Networks

Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security.But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time in learning about and applying enhanced security measures can go a long way toward better protecting your network. Here are six tips to betters secure your Wi-Fi network.Use an inconspicuous network name (SSID) The service set identifier (SSID) is one of the most basic Wi-Fi network settings. Though it doesn’t seem like the network name could compromise security, it certainly can. Using a too common of a SSID, like “wireless” or the vendor’s default name, can make it easier for someone to crack the personal mode of WPA or WPA2 security. This is because the encryption algorithm incorporates the SSID, and password cracking dictionaries used by hackers are preloaded with common and default SSIDs. Using one of those just makes the hacker’s job easier.To read this article in full or to leave a comment, please click here

DWDM – The Innovation Technology

Today I am going to talk about the technology named as DWDM, DWDM stands for Dense Wavelength Division Multiplexing.  So the question now is why and where we are using the DWDM technology and Who are using these technology.

DWDM is a technology used to used to increase bandwidth over existing fiber optics backbone and is generally used by the service provider across the globe. The need to have the higher bandwidth in the backbone because the count of the users and the customers increases day by day and service provider required higher bandwidth in the core or backbone networks.

The Technology behind the DWDM is used the multiple signals together at different wavelength on the same fiber. DWDM became market in the year of 1995 whilst CWDM (Coarse WDM) emerged after 2000, stimulated by using the telecom crisis. CWDM brings less complicated technological standards as compared to DWDM, reducing down costs, but suits just the lower transmission ability markets, together with the metro and corporation networks. extra recently,  new paradigmatic revolutions have made their manner into the optical communique market: ROADM (Reconfigurable Optical upload-Drop Multiplexing) and Coherent Optical systems. whilst those optical technology are the suitable solutions to fulfil Continue reading

WATCH LIVE: the “25 under 25” Award Ceremony, Monday, 18 September, at 9:00am PDT

Want to learn more about our “25 Under 25” award recipients?  How are they using the Internet to change the communities in which they live?  On Monday, September 18, 2017, at 9:00am US Pacific (16:00 UTC), you will have the chance to learn about the amazing work they are doing. The awards ceremony will be streaming live out of Los Angeles on both Livestream.com and Facebook. You can watch at:

22 of the awardees will be in L.A. to receive their awards. (Three were denied visas.) One of the initiatives supporting the Internet Society’s 25th Anniversary, the program recognizes 25 young people from around the globe who are passionate about using the Internet to make a positive impact in their communities and the world.

Representing 19 countries on five continents, the 25 Under 25 awardees’ initiatives include creating an anti-cyberbullying youth movement in Australia, providing e-health education to teens in Tanzania, and using ICTs to break the cycle of poverty for families in Costa Rica.

Join us to be inspired in how these young people are working to #ShapeTomorrow!

The post WATCH LIVE: the Continue reading