iPexpert’s Newest “CCIE Wall of Fame” Additions 6/5/2015

Please join us in congratulating the following iPexpert students who have passed their CCIE lab!

This Week’s CCIE Success Stories

  • Martin Fischer, CCIE #48881 (Security)
  • Joseph Ploehn, CCIE #17658 (Data Center)
  • David Sun, CCIE #48879 (Routing and Switching)

We Want to Hear From You!

Have you passed your CCIE lab exam and used any of iPexpert’s self-study products, or attended a CCIE Bootcamp? If so, we’d like to add you to our CCIE Wall of Fame!

PayPal users may get break on unsolicited robocalls, texts

After a backlash from critics, PayPal seems to be reconsidering a plan to give itself unilateral permission to ping its users with robocalls and text messages.The controversy started when PayPal recently indicated in proposed amendments to its user agreement and privacy policy its intention to engage in this type of communication with its customers. There, it also stated that the only opt-out recourse for those in disagreement with its plan would be to close their accounts.The plan drew attention from critics who, in blogs and on social media, questioned the prudence and legality of the new policy, which is slated to go into effect July 1. If the changes are adopted, PayPal would be able to make autodialed and prerecorded calls, and send text messages using any telephone number account holders have provided to PayPal or that the company has “otherwise obtained.”To read this article in full or to leave a comment, please click here

PayPal users may get break on unsolicited robocalls, texts

After a backlash from critics, PayPal seems to be reconsidering a plan to give itself unilateral permission to ping its users with robocalls and text messages.The controversy started when PayPal recently indicated in proposed amendments to its user agreement and privacy policy its intention to engage in this type of communication with its customers. There, it also stated that the only opt-out recourse for those in disagreement with its plan would be to close their accounts.The plan drew attention from critics who, in blogs and on social media, questioned the prudence and legality of the new policy, which is slated to go into effect July 1. If the changes are adopted, PayPal would be able to make autodialed and prerecorded calls, and send text messages using any telephone number account holders have provided to PayPal or that the company has “otherwise obtained.”To read this article in full or to leave a comment, please click here

As PC interest wanes, Computex loses its luster

Taiwan held its 35th annual Computex trade show this week, and the event hasn’t aged well. There was little news to get excited about, the crowds were thinner, and there were no products on the show floor that generated the buzz seen in years past.To be sure, Computex has never had the glitz and glamor of CES, but for the PC industry it’s the big event of the year. Taiwanese companies make most of the world’s PCs—including those sold under more famous brands—and Computex has been a place where Intel and AMD launch new processors, and where competing memory and interface technologies battle for dominance.To read this article in full or to leave a comment, please click here

As PC interest wanes, Computex loses its luster

Taiwan held its 35th annual Computex trade show this week, and the event hasn’t aged well. There was little news to get excited about, the crowds were thinner, and there were no products on the show floor that generated the buzz seen in years past.To be sure, Computex has never had the glitz and glamor of CES, but for the PC industry it’s the big event of the year. Taiwanese companies make most of the world’s PCs—including those sold under more famous brands—and Computex has been a place where Intel and AMD launch new processors, and where competing memory and interface technologies battle for dominance.To read this article in full or to leave a comment, please click here

5 steps to transform support services

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Thousands of customer support agents will go to work today and do the exact same thing they did yesterday: pick up the phone, answer a common question, hang up the phone, pick up the phone, answer the same question, and hang up the phone again. And tomorrow get up and do it all again. It’s no wonder the average company loses 27% of its agents each year to attrition.

If you run a customer support center at your company, consider your ultimate goals: faster time-to-resolution, increased customer satisfaction, better employee retention, and higher rates of employee satisfaction and happiness. These are the Holy Grail of our industry—and while daunting, they are attainable. Here are five key steps to becoming a higher-performing support organization:

To read this article in full or to leave a comment, please click here

Closing the security loop with automated incident response

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Organizations have poured billions of dollars into cyber security detection solutions, and while they are exceptional at uncovering potential anomalies and threats, none of these products can guarantee against a breach. Consequently, the next logical step is to pair robust detection and prevention technology with equally efficient and effective operations solutions, including incident response.

 

Detection solutions are now generating an average of 10,000 alerts per day, according to a recent survey Damballa—far too many for companies to inspect and manage. Yet, security professionals are still attempting to manually separate false alarms from real threats; decide what action, if any, to take; and then perform repetitive actions like gathering data, conducting basic analysis, and generating notifications and tickets.

To read this article in full or to leave a comment, please click here

Why It’s So Hard To Find Intruders After A Network Penetration

This guest blog post is by Jason Matlof, Executive Vice President, LightCyber. We thank LightCyber for being a sponsor. LightCyber’s Magna Active Breach Detection platform is a behavior-based detection system that integrates network and endpoint context and is designed specifically to find active breaches after a threat actor has already penetrated a network. To hear […]

Author information

Drew Conry-Murray

I'm a tech journalist, editor, and content director with 17 years' experience covering the IT industry. I'm author of the book "The Symantec Guide To Home Internet Security" and co-author of the post-apocalyptic novel "Wasteland Blues," available at Amazon.

The post Why It’s So Hard To Find Intruders After A Network Penetration appeared first on Packet Pushers Podcast and was written by Drew Conry-Murray.

Four years later and CloudFlare is still doing IPv6 automatically

Over the past four years CloudFlare has helped well over two million websites join the modern web, making us one of the fastest growing providers of IPv6 web connectivity on the Internet. CloudFlare's Automatic IPv6 Gateway allows IPv4-only websites to support IPv6-only clients with zero clicks. No hardware. No software. No code changes. And no need to change your hosting provider.

alt Image by Andrew D. Ferguson

A Four Year Story

The story of IPv6 support for customers of CloudFlare is about as long as the story of CloudFlare itself. June 6th, 2011 (four years ago) was the original World IPv6 Day, and CloudFlare participated. Each year since, the global Internet community has pushed forward with additional IPv6 deployment. Now, four years later, CloudFlare is celebrating June 6th knowing that our customers are being provided with a solid IPv6 offering that requires zero configuration to enable. CloudFlare is the only global CDN that provides IPv4/IPv6 delivery of content by default and at scale.

IPv6 has been featured in our blog various times over the last four years. We have provided support for legacy logging systems to handle IPv6 addresses, provided DDoS protection on IPv6 alongside classic IPv4 address space, and provided Continue reading

Hacker turns toy into tool that can open garage doors in seconds

Owners of fixed-code garage door openers might want to consider upgrading them because a researcher has developed a technique that guesses the numbers in seconds.To showcase the new attack, which he dubbed Open Sesame, security researcher Samy Kamkar reprogrammed a children's toy designed for short-distance texting called Radica Girl Tech IM-me because it has all the needed wireless components and because "it's pink," his favorite color.With a fixed-code garage door opener, the remote control, or "clicker" always transmits the same 8 to 12-bit binary code. For a 12-bit code, there are 4,096 possible combinations -- strings of 1s and 0s.To read this article in full or to leave a comment, please click here

Five new things we know about Skylake

With the upcoming release of Intel’s Skylake chips, there’s a lot to look forward to, including faster computers, fewer ports and wireless charging. At Computex in Taipei this week Intel shed more light on the new chip technology, a much hyped successor to Intel’s family of Broadwell family of chips. Here are five things we learned:1) Skylake chips won’t be released when Windows 10 becomes commercially available on July 29, so PCs with a combination of the new OS and chip technology won’t be immediately available, said Kirk Skaugen, senior vice president and general manager of the PC Client Group at Intel, during an interview at Computex. Intel has built Skylake to work hand-in-glove with Windows 10, which among other new features offers biometric authentication that will allow a user’s fingerprint or face to replace a typed password. Skaugen declined to provide a specific release date, but Skylake could be the centerpiece announcement at the Intel Developer Forum in mid-August. PCs could follow soon after.To read this article in full or to leave a comment, please click here

5 reasons you should move your video to specialty storage

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Video is everywhere, and growing exponentially. According to a recent report, 35 billion video ads were viewed in December, representing year-over-year growth of more than 100%. And every industry is seeing video growth, which creates a problem for data managers because video challenges storage management in four ways: Performance requirements are not served well by traditional storage architecture. Rapid video growth can overwhelm storage environments while resource utilization is masked by virtualization Use of traditional backup tools make data protection expensive and challenging Long-term data value means this is not a temporary problem If, however, you move video to specialty storage, you’ll achieve five amazing benefits:To read this article in full or to leave a comment, please click here

5 reasons you should move your video to specialty storage

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Video is everywhere, and growing exponentially. According to a recent report, 35 billion video ads were viewed in December, representing year-over-year growth of more than 100%. And every industry is seeing video growth, which creates a problem for data managers because video challenges storage management in four ways:

  1. Performance requirements are not served well by traditional storage architecture.
  2. Rapid video growth can overwhelm storage environments while resource utilization is masked by virtualization
  3. Use of traditional backup tools make data protection expensive and challenging
  4. Long-term data value means this is not a temporary problem

If, however, you move video to specialty storage, you’ll achieve five amazing benefits:

To read this article in full or to leave a comment, please click here

PlexxiPulse—Have you heard of Bimodal IT?

The networking space is buzzing about “Bimodal IT.” Simply defined, Bimodal IT is the segmentation of application deployments into cloud (public and/or private). Ben Kepes of Forbes included the concept in a recent deep dive on enterprise IT in the cloud. The network underpinning bimodal initiatives is critical and as Kepes pointed out in his article, tough to achieve if operating a legacy network. Our own Director of Solutions Marketing, Bob Noel, agrees with Kepes and highlights the importance of scalable and agile networks in response to the piece: “Those left to run (Bimodal deployments) on the legacy infrastructure is a fantastic idea that unfortunately has an Achilles heel inhibiting success for the approach…Until there is a fundamental shift in networking, companies will struggle to support Bimodal IT.” What are your thoughts on bimodal IT? Do you agree with Kepes and Bob?

Below please find a few of our top picks for our favorite news articles of the week. Enjoy!

BetaBoston: New Hampshire tries to reclaim tech vibe
By Staff Writer
MANCHESTER, N.H. — In one corner, a guy was hunched over his laptop, working on a pitch for a smartphone app that would allow golfers to Continue reading

DARPA spends $24M to smarten-up WAN edge

Officials of Defense Advanced Research Projects Agency (DARPA) this week awarded two contracts worth a total of nearly $24 million to develop new networking and security technologies at the WAN edge.Raytheon BBN Technologies and Vencore Labs’ Applied Communication Sciences research program pretty much evenly divided the money which DARPA expects will develop technologies that “bolster the resilience of communication over IP networks solely by instantiating new capabilities in computing devices within user enclaves at the WAN edge.”To read this article in full or to leave a comment, please click here

Software-Defined Networking will be a critical enabler of the Internet of Things

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Organizations are excited about the business value of the data that will be generated by the Internet of Things (IoT). But there’s less discussion about how to manage the devices that will make up the network, secure the data they generate and analyze it quickly enough to deliver the insights businesses need. Software defined networking (SDN) can help meet these needs. By virtualizing network components and services, they can rapidly and automatically reconfigure network devices, reroute traffic and apply authentication and access rules. All this can help speed and secure data delivery, and improve network management, for even the most remote devices.To read this article in full or to leave a comment, please click here