Use a Raspberry Pi to DIY a digital photo frame that streams photos from the cloud.
Happy official birthday to the Steam client for Linux
The BackBox Linux operating system promises to offer Amazon Web Services users an optimal environment for professional penetration testing operations
The following guide shows you how to Flush the DNS Cache in Ubuntu 18.04
Opening folders in Ubuntu is one of the basic tasks you will perform as a regular Ubuntu user.
2DayGeek: Simple methods to change hostname in Linux.
ostechnix: This brief tutorial describes how to run particular commands without sudo password in Unix-like operating systems.
Knowing how much traffic your web server can handle when under stress is essential for planning future grow of your website or application.
Yum is the default package manager for RPM packages on RHEL & CentOS.
eWEEK - RSS Feed
eWeek - RSS Feed
Network World Networking
Quantum computing is still in its infancy, but you wouldn’t know it judging from the investments pouring into the space.
Edge computing container specialist Vapor IO has organized the Kinetic Edge Alliance, a group of hardware, software and networking companies that plan to collaborate on accelerating the integration edge solutions.
The list of partners includes Federated Wireless, Linode, MobiledgeX, Packet, StackPath, Alef Mobitech, Detecon International, Hitachi Vantara, New Continuum Data Centers, Pluribus Networks, and Seagate Technology.
The Alliance plans to target the top 30 U.S. metro markets with its products, which cover nearly 50 percent of the U.S. population. So far, Vapor IO has begun rollouts in Chicago but plans for five more cities this year: Chicago, Pittsburgh, Atlanta, Dallas, Los Angeles, and Seattle.
If you’re a VPN subscriber and have ever wondered just how secure the supposedly encrypted pipe that you’re using through the internet is — and whether the anonymity promise made by the VPN provider is indeed protecting your privacy— well, your hunches may be correct. It turns out several of these connections are not secure.
Academics say they’ve discovered a whopping 13 programming errors in 61 separate VPN systems tested recently. The configuration bungles “allowed Internet traffic to travel outside the encrypted connection,” the researchers say.
The independent research group, made up of computer scientists from UC San Diego, UC Berkeley, University of Illinois at Chicago, and Spain’s Madrid Institute of Advanced Studies (IMDEA) with International Computer Science Institute, write in the Conversation this month, some of which is redistributed by Homeland Security Newswire, that six of 200 VPN services also scandalously monitored user traffic. That’s more serious than unintended leaks, the team explains — users trust providers not to snoop. The point of a VPN is to be private and not get monitored. VPN use ranges from companies protecting commercial secrets on public Wi-Fi to dissidents.
It’s a common tactic to combine two technologies for synergy sake, but Lentiq really has a unique idea. It is combining the concept of the data lake with edge computing into what it calls “interconnected micro data lakes,” or data pools.
“Data pools” are micro-data lakes that function like a data lake while supporting popular apps such as Apache Spark, Apache Kafka, and Streamsets software, or “everything a data scientist or data engineer needs,” according to the company.
The data pools exist independently across different clouds, and governance rules are enforced only when the data moves, so each department will have the tools needed for their use cases and access to the data they need.
With SD-WAN becoming remote users’ primary access to cloud-based applications, and with organizations deploying multi-cloud environments to optimize performance, it’s important for IT pros to choose SD-WAN technology that supports secure, low-latency and easy-to-manage connectivity to their cloud providers.
Cisco said it's closed its deal to buy optical-semiconductor firm Luxtera for $660 million, bringing it the advanced optical technology customers will need for speed and throughput for future data-center and webscale networks.
When Cisco announced the deal in December, Rob Salvagno, Cisco's vice president of Corporate Business Development, said, “As system port capacity increases from 100GbE to 400GbE and beyond, optics plays an increasingly important role in addressing network infrastructure constraints, particularly density and power requirements.”
With all major mobile carriers expected to offer 5G this year, enterprises that want to take advantage of this next-gen mobile data service need to start thinking about how to support it on site.
SD-WAN products have been available for the better part of five years. Early adopters of the technology focused primarily on transport-related issues such as replacing or augmenting MPLS with broadband. As any technology matures and moves out of the early adopter phase, the buying criteria changes — and SD-WAN is no different.
In 2018, a ZK Research survey asked respondents to rank SD-WAN buying criteria, and security came out as the top response, well ahead of technology innovation and price. (Note: I am employee of ZK Research.) To better understand this trend and what it means to network professionals, I sat down with Fortinet’s executive vice president of products and solutions, John Maddison, who sets the company’s product strategy, making him well versed in both SD-WAN and security.
Today, connectivity to the Internet is easy; you simply get an Ethernet driver and hook up the TCP/IP protocol stack. Then dissimilar network types in remote locations can communicate with each other. However, before the introduction of the TCP/IP model, networks were manually connected but with the TCP/IP stack, the networks can connect themselves up, nice and easy. This eventually caused the Internet to explode, followed by the World Wide Web.
So far, TCP/IP has been a great success. It’s good at moving data and is both robust and scalable. It enables any node to talk to any other node by using a point-to-point communication channel with IP addresses as identifiers for the source and destination. Ideally, a network ships the data bits. You can either name the locations to ship the bits to or name the bits themselves. Today’s TCP/IP protocol architecture picked the first option. Let’s discuss the section option later in the article.
Hyperconvergence is an IT framework that combines storage, computing and networking into a single system in an effort to reduce data center complexity and increase scalability. Hyperconverged platforms include a hypervisor for virtualized computing, software-defined storage, and virtualized networking, and they typically run on standard, off-the-shelf servers. Multiple nodes can be clustered together to create pools of shared compute and storage resources, designed for convenient consumption.
The use of commodity hardware, supported by a single vendor, yields an infrastructure that's designed to be more flexible and simpler to manage than traditional enterprise storage infrastructure. For IT leaders who are embarking on data center modernization projects, hyperconvergence can provide the agility of public cloud infrastructure without relinquishing control of hardware on their own premises.
IPv6 has characteristics lacking in IPv4 that make it advantageous for internet of things deployments, such as supporting large IoT networks, helping preserve battery life of IoT devices and reducing administrative and maintenance burden. Could IoT be helping to drive IPv6 adoption in enterprise networks?
Technology is always evolving. However, in recent time, two significant changes have emerged in the world of networking. Firstly, the networking is moving to software that can run on commodity off-the-shelf hardware. Secondly, we are witnessing the introduction and use of many open source technologies, removing the barrier of entry for new product innovation and rapid market access.
Networking is the last bastion within IT to adopt the open source. Consequently, this has badly hit the networking industry in terms of slow speed of innovation and high costs. Every other element of IT has seen radical technology and cost model changes over the past 10 years. However, IP networking has not changed much since the mid-’90s.
Network capacity planning aims to ensure that sufficient bandwidth is provisioned, allowing network SLA targets, such as delay, jitter, loss, and availability, to be reliably met. It's a complex, error-prone task with serious financial implications. Until recently, the network data necessary for insightful capacity planning was generally only available via static, historical, after-the-fact reports. This situation is now rapidly changing.
As the number of cyber attacks increases, the demand for penetration tests – to determine the strength of a company’s defense – is also going up. People are worried about their companies’ networks and computer systems being hacked and data being stolen. Plus, many regulatory standards such PCI and HITRUST require these tests to be performed on at least an annual basis.
The demand for these tests is only going to increase as attackers get more sophisticated. And it’s essential these tests catch all possible vulnerabilities.
Benefits and gaps of penetration tests
Penetration tests involve live tests of computer networks, systems, or web applications to find potential vulnerabilities. The tester actually attempts to exploit the vulnerabilities and documents the details of the results to their client. They document how severe the vulnerabilities are and recommend the steps that should be taken in order to resolve them.
Solutions are needed to replace the archaic air-gapping of computers used to isolate and protect sensitive defense information, the U.S. Government has decided.
Air-gapping is the common practice of physically isolating data-storing computers from other systems, computers and networks so they theoretically can’t be compromised because there is nothing connecting the machines.
However, many say air-gapping is no longer practical, as the cloud and internet take a hold of massive swaths of data and communications.
Cisco has rolled out a new family of switches, software, developer tools and blueprints to meld IoT and industrial networking with intent-based networking and classic IT security, monitoring and application-development support.
To take on the daunting task the company unveiled a new family of industrial-networking Catalyst switches, IoT developer tools and support for Cisco’s DevNet developer program, and it validated IoT network design blueprints customers can work with to build solid IoT environments.
In a series of announcements at its Cisco Live! customer gathering in Barcelona, the company sought to expand its data center-influence by extending its Application Centric Infrastructure (ACI) to the cloud, extending its hyperconverged HyperFlex offering to the edge and bolstering the management capabilities of its CloudCenter offering.
A smartphone can be a key part of a network troubleshooting toolkit.
The Internet of Things (IoT) is no longer some futuristic thing that’s years off from being something IT leaders need to be concerned with. The IoT era has arrived. In fact, Gartner forecasts there will be 20.4 billion connected devices globally by 2020.
An alternative proof point is the fact that when I talk with people about their company's IoT plans, they don’t look at me like a deer in headlights as they did a few years ago. In fact, often the term “IoT” doesn’t even come up. Businesses are connecting more “things” to create new processes, improve efficiency, or improve customer service.
As they do, though, new security challenges arise. One of which is there's no “easy button.” IT professionals can’t just deploy some kind of black box and have everything be protected. Securing the IoT is a multi-faceted problem with many factors to consider, and it must be built into any IoT plan.
Today, the wide area network (WAN) is a vital enterprise resource. Its uptime, often targeting availability of 99.999%, is essential to maintain the productivity of employees and partners and also for maintaining the business’s competitive edge.
Historically, enterprises had two options for WAN management models — do it yourself (DIY) and a managed network service (MNS). Under the DIY model, the IT networking and security teams build the WAN by integrating multiple components including MPLS service providers, internet service providers (ISPs), edge routers, WAN optimizers and firewalls.
The components are responsible for keeping that infrastructure current and optimized. They configure and adjust the network for changes, troubleshoot outages and ensure that the network is secure. Since this is not a trivial task, therefore many organizations have switched to an MNS. The enterprises outsource the buildout, configuration and on-going management often to a regional telco.