| You broke the network. Do you confess? Today we're taking a deep look into mindset of the network professional – his or her soul -- when it comes to breaking something and owning up to the mistake … or not.Posted to Reddit's section that is devoted to networking: "Have you ever accidentally broken something then fixed it immediately to find your colleagues praising your skills even though it (was) your lack of skills? How do you react?"The inquisitor answers his own question: "Generally speaking I've always let the peasants (end users) think I'm a wizard while I tell my boss what actually happened. What have you guys done in similar situations?"To read this article in full or to leave a comment, please click here Read More RESOURCE COMPLIMENTS OF: LinkTek
Hidden Problem with Migrations to the Cloud Invalid characters are a known problem when migrating to the cloud. But there is another often unknown and hidden problem that can also result in costly disruptions and lost data -– broken file links! LinkFixer Advanced automatically finds and fixes broken file links during cloud migrations. Click now to download your FREE trial of LinkFixer Advanced today! WHITE PAPER: ExtraHop Networks, Inc.
10 Ways Wire Data Helps Conquer IT Complexity This whitepaper explains the value of wire data in practical, simple to understand terms. With a robust wire data analytics solution, IT can automatically detect problems across the entire IT environment, spot data theft by flagging queries from untrusted sources, select unique pieces of transaction payloads to send to any big data source, and more Learn more >> HP latest to unbundle switch hardware, software HP has joined the disaggregation party through two partnerships that will produce a branded white box switch capable of running multiple network operating systems.HP has expanded a relationship with Accton Technology to offer two new switches initially, and more later this year. The switches will be low-cost, software-independent white box hardware targeted at Web scale data centers supporting cloud, mobile, social media and big data workloads.Under a second arrangement, HP will offer Cumulus Networks' Cumulus Linux network operating system on the Accton switches. Cumulus Linux runs on a variety of white box and branded switching hardware based on merchant silicon, and is intended to make the software side of networking hardware independent.To read this article in full or to leave a comment, please click here Read More How the NSA is improving security for everyone The NSA's core function is gather and analyze data. But the NSA is also expected to secure and protect sensitive information, and as part of that role NSA security experts have launched a program to integrate more commercial off-the-shelf products.To read this article in full or to leave a comment, please click here(Insider Story) Read More 10 tips for mastering Microsoft cloud SLAs On Nov. 19, 2014 the IT department of a Texas contracting company started getting reports that the Microsoft Office 365 cloud-based email system was unavailable to its employees. Users couldn't get email on their phones or via Outlook. As the day rolled on some users' email came back, others didn't. When US workers signed off, international employees started reporting similar issues. For some users, email was out for 24 hours.After the outage IT leaders huddled and filed a claim with Microsoft for a breach of the company's service-level agreement (SLA), which guarantees that Office and other Microsoft Online services will be available 99.9% of a given month. If the service is available for less than that, a 25% credit can be issued to customers. But the response they got from Microsoft surprised them: Web access was still available so the service was not technically unavailable and therefore it was not a breach of the SLA.To read this article in full or to leave a comment, please click here Read More IDG Contributor Network: An LTE over Wi-Fi spectrum grab is coming Unlicensed spectrum would be the logical place to expand traffic if, as mobile networks are finding, their licensed spectrum is running out.Why not shift over to unlicensed spectrum? It's unlicensed, after all, so anyone can use it. Who would object?Well, the answer to that question may be a bunch of Wi-Fi users, like you and me, if it doesn't work as promised and stomps on existing use, such as Wi-Fi.Wi-Fi at 5 GHzThe new piggy-backing technology uses the same Wi-Fi band that mobile device users are beginning to take advantage of in the home and workplace. That is 5 GHz—the free-to-use band you'll find in newer routers and mobile devices, like tablets and recent phones.To read this article in full or to leave a comment, please click here Read More 15 cities that are hidden gems for tech job seekers Lesser-Known Cities With Solid Salaries and Strong Tech ScenesImage by Flickr/ Kevin HutchinsonEveryone knows the world's giant tech hubs that lie on both coasts and boast the highest salaries: New York's salaries are 139 percent of the national average, and San Francisco's 138 percent. The cost of living in those cities are some of the highest, too. So what's a hard-working techie to do? Maybe it's time to check out some of the country's lesser-known cities with solid salaries and strong tech scenes. Here are 15 cities, from east to west, gleaned from data provided by the U.S. Department of Labor's Bureau of Labor Statistics and Robert Half Technology.To read this article in full or to leave a comment, please click here Read More The world of containers doesn't end with Docker Last year was a good one for Docker, the open-source app containerization startup that helps applications run efficiently in any on-premises or cloud environment, no matter the runtime.To read this article in full or to leave a comment, please click here(Insider Story) Read More How to remove the dangerous Superfish adware preinstalled on Lenovo PCs Lenovo's been caught going a bit too far in its quest for bloatware money, and the results have put its users at risk. The company has been preloading Superfish, a "visual search" tool that includes adware that fakes the encryption certificates for every HTTPS-protected site you visit, on its PCs since at least the middle of 2014. Essentially, the software conducts a man-in-the-middle attack to fill the websites you visit with ads, and leaves you vulnerable to hackers in its wake.MORE ON NETWORK WORLD: Free security tools you should try You can read all the sordid details here. This article is dedicated to helping you discover whether your Lenovo PC is infected with Superfish, and how to eradicate it if you are.To read this article in full or to leave a comment, please click here Read More Carnegie Mellon Computer Science School's epic admissions blunder [View the story "Carnegie Mellon School of Computer Science's epic admissions blunder" on Storify] To read this article in full or to leave a comment, please click here Read More How Etsy makes Devops work Etsy, which describes itself as an online "marketplace where people around the world connect to buy and sell unique goods," is often trotted out as a poster child for Devops. The company latched onto the concepts early and today is reaping the benefits as it scales to keep pace with rapid business growth. Network World Editor in Chief John Dix caught up with Etsy VP of Technical Operations Michael Rembetsy to ask how the company put the ideas to work and what lessons it learned along the way. Let's start with a brief update on where the company stands today. The company was founded and launched in 2005 and, by the time I joined in 2008 (the same year as Chad Dickerson, who is now CEO), there were about 35 employees. Now we have well over 600 employees and some 42 million members in over 200 countries around the world, including over 1 million active sellers. We don't have sales numbers for this year yet, but in 2013 we had about $1.3 billion in Gross Merchandise Sales.To read this article in full or to leave a comment, please click here Read More 4 open-source monitoring tools that deserve a look Network monitoring is a key component in making sure your network is running smoothly. However, it is important to distinguish between network monitoring and network management. For the most part, network monitoring tools report issues and findings, but as a rule provide no way to take action to solve reported issues.To read this article in full or to leave a comment, please click here(Insider Story) Read More 9 futuristic display technologies 9 far-out future display technologiesImage by Pawel GaulFor decades, there was exactly one way to look at electronically displayed text and images: the cathode ray tube. This hardworking, stalwart technology was the display of choice for everything, from radar systems in the 1940s all the way to desktop PCs in the 1990s, with millions of heavy, fragile cabinet TVs in between.To read this article in full or to leave a comment, please click here Read More Review: The big 4 Java IDEs compared When you think of a Java IDE, you undoubtedly imagine a graphical application in which you write Java source code, then compile, debug, and run it. Of course that's a small part of the picture -- if you're building a Java application, odds are good you're working with more than Java.To read this article in full or to leave a comment, please click here(Insider Story) Read More Tens of thousands of home routers at risk with duplicate SSH keys A setup mistake has apparently left hundreds of thousands of home routers running the SSH (Secure Shell) remote access tool with identical private and public keys.John Matherly used Shodan, a specialized search engine for querying Internet-connected devices, and found more than 250,000 devices that appear to be deployed by Telefónica de España sharing the same public SSH key.Matherly, who founded Shodan, performed the search after someone posted a shorter version of a public key—called a fingerprint—for their device.He was surprised to find more than 250,000 other devices, mostly in Spain, that shared the same public key fingerprint. It means the devices—which are likely home routers—also have the same private key, which could pose a security risk.To read this article in full or to leave a comment, please click here Read More | |
No comments:
Post a Comment