Techniques of a Network Detective: A New Series

Put your detective hat on your head and your Network Detective badge on your lapel.  Introducing a new blog series – Techniques of a Network Detective.  This series will focus on the detective work (troubleshooting side) of our jobs as network engineers.

For over 30 years I’ve been playing in the “world of IT”. During those years there have been a lot of changes in our world. But through all that change, there has been a thread, for me, that has always remained constant. A thread and a passion that always seemed to be with me in every job over all these years.

Troubleshooting!

Being a “Network Detective” is much the same as being a regular detective in many ways.  As a Network Detective we get put on a “case” – the “Case of the Missing Packets” maybe.  We go to the crime scene and try to find answers so we can solve the “who done it”

nd1

When a “crime” happens you need to be right there interviewing the suspects, surveying the crime scene, asking the right questions.  Trying to quickly figure out what is happening, where it is happening, and why it Continue reading

Extortion schemes expand, threatening consumers and businesses with data leaks

Ransomware authors are not the only cybercriminals who use extortion tactics to make money from users and companies. Data thieves are also increasingly resorting to intimidation.The FBI's Internet Crime Complaint Center (IC3) has received many reports from users whose data was stolen in various high-profile breaches and then received emails threatening to publicly disclose their personal information, including phone numbers, home addresses and credit card information.The ransom amount asked by the extortionists ranged from 2 to 5 bitcoins or approximately $250 to $1,200, IC3 said in an advisory Wednesday.To read this article in full or to leave a comment, please click here

Extortion schemes expand, threatening consumers and businesses with data leaks

Ransomware authors are not the only cybercriminals who use extortion tactics to make money from users and companies. Data thieves are also increasingly resorting to intimidation.The FBI's Internet Crime Complaint Center (IC3) has received many reports from users whose data was stolen in various high-profile breaches and then received emails threatening to publicly disclose their personal information, including phone numbers, home addresses and credit card information.The ransom amount asked by the extortionists ranged from 2 to 5 bitcoins or approximately $250 to $1,200, IC3 said in an advisory Wednesday.To read this article in full or to leave a comment, please click here

Response: Videoconferencing Numbers

IDC published a promo piece about their research into videoconferencing market. From a market segment perspective: Multi-codec telepresence equipment revenue ($23.9 million) was down 44.4% quarter over quarter, but increased 27.4% year over year in 1Q16. Unit shipments were down 47.1% quarter over quarter, but increased 48.8% year over year. Room-based videoconferencing system revenue ($359.6 […]

The post Response: Videoconferencing Numbers appeared first on EtherealMind.

eBay Taps Dell Triton Systems To Overclock Search Engines

While online auctioneer eBay does not run the largest search engine in the world, search is a very key component of its service, which has over 162 million active buyers and 900 million product listings. Looking to improve upon its current hardware infrastructure underpinning its search engine, eBay has tapped Dell to create a new water-cooled, hyperscale-style rack system that will let it overclock its servers and boost their performance on compute-intensive search algorithms.

The hyperscalers are all a bit cagey about the search engine infrastructure that they use because it is such a critical component of what they do,

eBay Taps Dell Triton Systems To Overclock Search Engines was written by Timothy Prickett Morgan at The Next Platform.

BGP Best External

BGP Best External is used in Active Standby BGP Topologies. BGP Best External helps for BGP convergence by sending external BGP prefixes which wouldn’t normally be sent if they are not overall BGP best path. There are BGP best internal, BGP best external and BGP Overall best path. BGP Best external in an active-standby scenarios […]

The post BGP Best External appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Which company has the most CCDE in the World ?

Which company has the most Cisco CCDE certified engineers in the world? Of course, Cisco  has the most certified engineers across the globe. In this post, I will introduce you to the second company that has the most CCDE engineers in the world outside of Cisco.   I like sharing the Global CCDE List whenever someone […]

The post Which company has the most CCDE in the World ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Cool Tools roundup: Charging, sweating and keyboarding

As part of my research for the Network World Father’s Day 2016 gift idea slideshow, several companies sent along gadgets for me to try out. While some products made the guide, some didn’t – not because they aren’t good, but because I wanted to pick only one device per vendor.  Ventev For example, I chose the Ventev PowerCell 3015+ charger for the guide, but they also sent me some other cool devices. The Desktop Charging Hub (model s500, $50 - See it on Amazon) is a combination device that will help you recharge a phone, a tablet and at least one other USB device. The circular unit also has two 10-amp outlets, for powering additional devices (like your computer, monitor or perhaps other accessories for your desk). The Charging Hub comes with a 5-foot power cord for optimal desktop placement, and two grooves for resting your tablet and/or phone. It should help clean up an area if you do a lot of recharging.To read this article in full or to leave a comment, please click here

Intel’s data center chief talks machine learning — just don’t ask about GPUs

If you want to get under Diane Bryant’s skin these days, just ask her about GPUs. The head of Intel’s powerful data center group was at Computex in Taipei this week, in part to explain how the company's latest Xeon Phi processor is a good fit for machine learning. Machine learning is the process by which companies like Google and Facebook train software to get better at performing AI tasks including computer vision and understanding natural language. It’s key to improving all kinds of online services: Google said recently that it's rethinking everything it does around machine learning.To read this article in full or to leave a comment, please click here

How Intel turned Thunderbolt from a failure into a success

The third time could be the charm for Intel and its Thunderbolt technology. A year after introducing Thunderbolt 3 at Computex 2015, Intel is finally starting to see success with its high-speed external I/O—enough that even doubters might agree it’s winning.You needn’t look far for signs that Thunderbolt 3 will succeed where its two predecessors failed dismally on the PC. This year’s top-tier laptops from HP and Dell, as well models from MSI, Asus, Razer, and Acer, all prominently feature Thunderbolt 3 ports. Almost all of the high-profile laptops of the last few months have prominently featured Thunderbolt 3 ports.To read this article in full or to leave a comment, please click here

Code red: Health IT must fix its security crisis

The health care industry provides an alluring target for malicious hackers. Personal health information has a much longer shelf life than financial information, making it a major draw for identity thieves. But a new and more troubling threat has arisen: the potential disruption of critical hospital systems by cybercriminals.With a diverse array of digital systems, hospitals have evolved into complex technology operations. Yet they remain singularly ill-prepared to defend against attacks, in part because the multiplicity of systems forms a wider surface area to attack.To read this article in full or to leave a comment, please click here

Code red: Health IT must fix its security crisis

The health care industry provides an alluring target for malicious hackers. Personal health information has a much longer shelf life than financial information, making it a major draw for identity thieves. But a new and more troubling threat has arisen: the potential disruption of critical hospital systems by cybercriminals.With a diverse array of digital systems, hospitals have evolved into complex technology operations. Yet they remain singularly ill-prepared to defend against attacks, in part because the multiplicity of systems forms a wider surface area to attack.To read this article in full or to leave a comment, please click here

Code red: Health IT must fix its security crisis

The health care industry provides an alluring target for malicious hackers. Personal health information has a much longer shelf life than financial information, making it a major draw for identity thieves. But a new and more troubling threat has arisen: the potential disruption of critical hospital systems by cybercriminals.With a diverse array of digital systems, hospitals have evolved into complex technology operations. Yet they remain singularly ill-prepared to defend against attacks, in part because the multiplicity of systems forms a wider surface area to attack.To read this article in full or to leave a comment, please click here

Tricks that ransomware uses to fool you

Pulling ransomware out of …Image by ThinkstockRansomware quite often targets businesses (for example hospitals) rather than individuals. Corporations have more valuable data and more money for ransom (ransom increases from roughly $500 per computer to $15,000 for the entire enterprise). Cyphort has examined different variants of ransomware to help users get an idea of what might be coming down the Internet pipeline. So keep an eye out for these characteristics before your network is taken hostage.To read this article in full or to leave a comment, please click here

Tricks that ransomware uses to fool you

Pulling ransomware out of …Image by ThinkstockRansomware quite often targets businesses (for example hospitals) rather than individuals. Corporations have more valuable data and more money for ransom (ransom increases from roughly $500 per computer to $15,000 for the entire enterprise). Cyphort has examined different variants of ransomware to help users get an idea of what might be coming down the Internet pipeline. So keep an eye out for these characteristics before your network is taken hostage.To read this article in full or to leave a comment, please click here

IDG Contributor Network: People are more likely to share their passwords when offered chocolate

"Beware those bearing gifts" is the ancient phrase that dates back a few thousand years. It referred to the wooden horse that was used to dupe the folks of Troy into allowing the Greeks into their city.Well, don’t trust the horse today, either.Freebies are just as likely to be accompanied by trickery now as they’ve ever been, according to scientists who’ve been studying the willingness to communicate confidential information.Presents “greatly increased the likelihood of participants giving away their password,” psychologists from the University of Luxembourg say their research has revealed.To read this article in full or to leave a comment, please click here