Worth Reading: Lego Robots versus Gesture Security
The post Worth Reading: Lego Robots versus Gesture Security appeared first on 'net work.
The post Worth Reading: Lego Robots versus Gesture Security appeared first on 'net work.
When Cyrus wanted to capture Babylon, he attacked the river that flows through the city, drying it out and then sending his army under the walls through the river entrance and exit points. In a similar way, the ventilator is a movie favorite, used in both Lord of the Rings and Star Wars, probably along with a thousand other movies and stories throughout time. What do rivers and ventilators have to do with network security?
Side channel attacks. Now I don’t know if the attacks described in these papers, or Cyrus’ attack through the Euphrates, are considered side channel, or just lateral, but either way: the most vulnerable point in your network is just where you assume you can’t be attacked, or that point where you haven’t thought through security. Two things I read this week reminded me of the importance of system level thinking when it comes to security.
The first explores the Network Time Protocol (NTP), beginning with the general security of the protocol. Security in a time protocol is particularly difficult, as the entire point of encryption is to use algorithms that take a lot of time for an attacker to calculate—and there’s probably some relationship between Continue reading
There is no question that the memory hierarchy in systems is being busted wide open and that new persistent memory technology that can be byte addressable like DRAM or block addressable like storage are going to radically change the architecture of machines and the software that runs on them. Picking what memory might go mainstream is another story.
It has been decades since IBM made its own DRAM, but the company still has a keen interest in doing research and development on core processing and storage technologies and in integrating new devices with its Power-based systems.
To that end, IBM …
IBM Throws Weight Behind Phase Change Memory was written by Timothy Prickett Morgan at The Next Platform.
Don't be the IT hero who has to do everything yourself. It might feel good, but you're an operational bottleneck who doesn't give others a chance to learn.
The post You Can’t Do Everything Yourself appeared first on Packet Pushers.
Don't be the IT hero who has to do everything yourself. It might feel good, but you're an operational bottleneck who doesn't give others a chance to learn.
The post You Can’t Do Everything Yourself appeared first on Packet Pushers.
Duh! Networks are becoming more software-centric.