Three critical considerations when optimizing infrastructure for application performance

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Overprovisioning has been the go-to approach for ensuring infrastructure and application performance. But when performance degradations and unplanned outages occur, even the most experienced teams move into “react-and-guess” mode.

Where to start? Every level of the infrastructure stack comes with its own possible issues, and tracking the culprit down takes time. And with IT infrastructures growing at an exponential pace and workloads to the cloud, the typical approach of overprovisioning and reacting-and-guessing is no longer a viable option.

To read this article in full or to leave a comment, please click here

Facebook axes a future intern for exposing a privacy flaw

After being accepted for an internship at Facebook, Harvard University student Aran Khanna continued to embrace the same entrepreneurial spirit that helped launch the site on the very same campus over a decade ago. Ironically, his efforts cost him his chance at working at the company.Khanna discovered a privacy flaw in the default settings of Facebook's Messenger app for Android that automatically shared users' detailed location data. To draw attention to the flaw, Khanna launched an Android app called Marauder's Map that mapped Facebook users' locations based on their activity on Messenger in May, according to Boston.com. The app showed that the location sharing was accurate to within a three-foot distance and shared users' location data even with Facebook users they were not Friends with.To read this article in full or to leave a comment, please click here

My CCIE Journey – Act II

In fact the title should be “My CCIE Journey – Act III” but I don’t want to use that one because I had a bad experience with the CCIE Voice lab exam There are many (very good) links about that specific subject but I wanted to give my own opinion as well :). Here is […]

HTC to cut work force by 15 percent, amid struggling smartphone sales

Struggling HTC is cutting 15 percent of its work force in an attempt to cut costs and revive its ailing smartphone business.The Taiwanese company announced the lay offs on Thursday, after its second quarter earnings took a dive, for a NT$8 billion (US$257 million) loss.HTC declined to mention the exact number of layoffs. But as of March 31, the company had 15,685 employees, according to its most recent annual report. This means a 15 percent reduction could end up cutting 2,300 jobs.+ ALSO ON NETWORK WORLD: HTC is dead in the water +To read this article in full or to leave a comment, please click here

Don’t look for Google to make big, quick changes after Alphabet pronouncement

The announcement Monday that saw Google reorganize under the banner of new holding company Alphabet was Big News, we all seem to agree, but it’s much less clear exactly what kind of Big News it is.It’s going to keep investors happy by segmenting some of Google’s wilder moonshot projects out of the main earnings figures, according to the Verge. Or maybe, says the Guardian, Google wants to make itself a smaller target for the European regulators it’s currently battling.To read this article in full or to leave a comment, please click here

Cisco warns customers about attacks installing rogue firmware on networking gear

Installing rogue firmware on embedded devices has long been a concern for security researchers, and it seems that such attacks have started to gain ground with hackers.In an advisory Tuesday, Cisco Systems warned customers that it is aware of a limited number of cases where attackers have replaced the boot firmware on devices running its IOS operating system. IOS runs on most Cisco routers and switches and provides a complex set of networking tools and features.MEET CISCO'S NEW CEO: The Real Chuck RobbinsTo read this article in full or to leave a comment, please click here

Cisco warns customers about attacks installing rogue firmware on networking gear

Installing rogue firmware on embedded devices has long been a concern for security researchers, and it seems that such attacks have started to gain ground with hackers.In an advisory Tuesday, Cisco Systems warned customers that it is aware of a limited number of cases where attackers have replaced the boot firmware on devices running its IOS operating system. IOS runs on most Cisco routers and switches and provides a complex set of networking tools and features.MEET CISCO'S NEW CEO: The Real Chuck RobbinsTo read this article in full or to leave a comment, please click here

Cisco warns customers about attacks installing rogue firmware on networking gear

Installing rogue firmware on embedded devices has long been a concern for security researchers, and it seems that such attacks have started to gain ground with hackers.In an advisory Tuesday, Cisco Systems warned customers that it is aware of a limited number of cases where attackers have replaced the boot firmware on devices running its IOS operating system. IOS runs on most Cisco routers and switches and provides a complex set of networking tools and features.MEET CISCO'S NEW CEO: The Real Chuck RobbinsTo read this article in full or to leave a comment, please click here

It’s alive! Patch Tuesday survives for Windows 10

Patch Tuesday, contrary to expectations earlier this year, survived after Microsoft yesterday delivered security updates not only for the legacy editions of Windows, but also for the new Windows 10.For now, Patch Tuesday -- Microsoft prefers "Update Tuesday" for some reason -- lives.In a large release yesterday, Microsoft issued 14 security updates for Windows PCs, distributed individually to older OSes like Windows 7 and 8.1, and as a six-bulletin bundle for Windows 10.To read this article in full or to leave a comment, please click here

Most allegations against Julian Assange are dropped, but rape investigation remains

The Swedish Prosecution Authority has dropped the investigation of WikiLeaks front-man Julian Assange for sexual molestation and two unlawful coercion allegations, but it still has a rape allegation to investigate.The charges were dropped because the statute of limitations will run out on in the next week, Marianne Ny, director of public prosecution said in a statement. Assange can be prosecuted for the rape allegation until August 2020.[ ALSO ON CSO: Was LulzSec bust part of a play against Julian Assange? ]To read this article in full or to leave a comment, please click here

Threat intelligence needs to grow up

Security teams are overwhelmed with a massive amount of threat data. While a decade ago no one was talking about threat intelligence except government agencies, organizations are now bombarded with threat data leaving them challenged with identifying what is relevant.Aggregating that data requires a shift in mindset and a maturing of threat intelligence in order to better mitigate risks.Experts say that collecting data for the purposes of having data does no good and can actually detract from a security intelligence program by using up time and man power to analyze data that is most often noise rather than real indicators of threat.MORE ON CSO:10 tips to make sure you are ready when a disaster strikes If the long-term goal of enterprises is to have mature threat intelligence programs, they need to conduct an internal risk assessment and design a plan of action.To read this article in full or to leave a comment, please click here

IMUNES on Linux

The IMUNES open-source network simulator can now be installed on and run on Linux. Previously, IMUNES was available only for the FreeBSD operating system.

IMUNES-linux

The Linux version of IMUNES is ready to be used and can set up and run network emulation scenarios. It does not yet have all the features offered in the FreeBSD version of IMUNES but the development team intends make add in more features until both versions support similar capabilities.

In this post, we will show how to install the Linux version of IMUNES on Ubuntu 14.04, look at the tool set used by IMUNES on Linux, and experiment with a simple network simulation scenario.

Compatibility with Linux versions

IMUNES is compatible with all popular Linux distributions.

The IMUNES development team seems to be testing IMUNEs on the latest available Linux distributions. If you are using Linux distributions like Ubuntu 15.04, you can follow the standard IMUNES install directions. However, if you are using a long-term-supported distribution like Ubuntu 14.04, there are some extra software dependencies that you must install.

Install IMUNES in Ubuntu 14.04

I am using Ubuntu 14.04 LTS as my host operating system. When installing IMUNES on Ubuntu Continue reading