サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
画力アップ
www.networkworld.com
Open source security frameworks help enterprises stay one step ahead of attackers by facilitating penetration testing and vulnerability assessments on wired and wireless networks. Picking just 10 Linux open source security tools isn’t easy, especially when network professionals and security experts have dozens if not several hundred tools available to them. There are different sets of tools for ju
Amazon Web Services has rolled out a new, more native way to connect SD-WAN infrastructures with AWS resources. Introduced at its re:Invent virtual event, AWS Transit Gateway Connect promises a simpler, faster, and more secure way for customers to tie cloud-based resources back to data centers, remote office workers or other distributed access points as needed. Thirteen networking vendors includin
You might not know it, but inside your Intel system, you have an operating system running in addition to your main OS that is raising eyebrows and concerns. It's called MINNIX. Take a look at your desktop computer. What operating system is it currently running? Now take a look in your data center — at all of your servers. What operating system are they running? Linux? Microsoft Windows? Mac OS X?
In addition to my editing duties, I have written Buzzblog since January, 2006. Feel free to e-mail me at buzz@nww.com. MIT is selling half of its 16 million valuable IPv4 addresses – an increasingly scarce stash it has held since the birth of the Internet. While details of the sale have not been made public, at least some of those addresses have already been transferred to Amazon. MIT says it will
One of the most common use cases for public IaaS cloud computing is storage and that’s for good reason: Instead of buying hardware and managing it, users simply upload data to the cloud and pay for how much they put there. +MORE AT NETWORK WORLD: Battle of the clouds: AWS vs. Azure vs. Google Cloud Platform | Interactive map of public cloud regions around the world + It sounds simple. But in reali
Self-driving cars will soon create significantly more data than people—3 billion people’s worth of data, according to Intel Two real-life, practical, semi-autonomous vehicle launches next year are an indication that the self-driving car is really happening. Audi is expected to make its up-to-35-mph hands-free driving system available late next year in some 2018 vehicles. And Volvo will start testi
A Cisco bug report addressing “partial data traffic loss” on the company’s ASR 9000 Series routers contends that a “possible trigger is cosmic radiation causing SEU soft errors.” Cosmic radiation? While we all know that cosmic radiation can wreak havoc on electronic devices, there’s far less agreement as to the likelihood of it being the culprit in this case. Or that Cisco could know one way or th
Employees in small IT departments tend to work more hours than those in large IT departments It’s no surprise that a majority of IT pros work more than 40 hours per week, but it’s interesting to learn that some are putting in significantly longer workweeks, according to new survey data from Spiceworks. Among 600 IT pros surveyed, 54% said they work more than 40 hours per week. At the high end of t
It is often said, “the Internet is running out of phone numbers,” as a way to express that the Internet is running out of IPv4 addresses, to those who are unfamiliar with Internet technologies. IPv4 addresses, like phone numbers are assigned hierarchically, and thus, have inherent inefficiency. The world’s Internet population has been growing and the number of Internet-connected devices continues
Spy agency uses SDN to keep tabs on IT inventory, simplify operations SANTA CLARA — Just as the industry is becoming more comfortable with SDNs, the NSA says it’s using them too. The embattled National Security Agency, which has been surreptitiously collecting phone records on all of us for many years as part of a secret surveillance operation, is implementing an OpenFlow SDN for its own internal
I was sitting in on the Peering BOF at NANOG a couple of weeks ago, and there was a discussion of Non-Stop Forwarding (NSF), Non-Stop Routing (NSR), and Graceful Restart (GR). It became apparent in the discussion that a couple of the participants were not making clear distinctions among these functions (or at least the acronyms), which are in fact quite different. Confusion about these and a few r
The internet of things (IoT) is a network of connected smart devices providing rich data, but it can also be a security nightmare. The internet of things (IoT) is a catch-all term for the growing number of electronics that aren’t traditional computing devices, but are connected to the internet to send data, receive instructions, or both. An incredibly broad range of ‘things’ that fall under the Io
Frequent spanning tree protocol misconfigurations cause network problems Ethernet devices running the Spanning Tree Protocol (STP) have been implemented in networks since the early 1990s. Many organizations take STP for granted and do not configure it per industry best practices. STP errors are very common and during the past 15 years we have witnessed the same errors being made over-and-over agai
Apple iOS 7 surprises as first with new multipath TCP connections Network World - Apple's iOS 7 is the first large-scale use of a newly-minted Internet protocol, called multipath TCP. It lets computers send and receive data across different network paths and interfaces at the same time, such as Ethernet, Wi-Fi and 3G. There is evidence [see screen shot below that Apple is using the new protocol fo
By Julie Sartain, Network World August 19, 2013 06:02 AM ET Network World - We caught up with the pioneers who brought us the Unix operating system and asked them to share some memories of the early days of Unix development. Unix co-developer Ken Thompson worked at Bell Labs from 1966 until he retired in December 2000. He recalls this prank: “The Unix room was on the sixth floor at one end of Bell
Hackers turn a Canon EOS camera into a remote surveillance tool The Canon EOS 1D-X camera is not designed with security in mind, a researcher said IDG News Service - The high-end Canon EOS-1D X camera can be hacked for use as a remote surveillance tool, with images remotely downloaded, erased and uploaded, a researcher said during the Hack in the Box security conference in Amsterdam on Wednesday.
Network World - In what's being described as a "radical shift" in its cloud strategy, the CIA has signed a reported $600 million, 10-year deal with Amazon Web Services (AWS) to build a private cloud, according to a story in Federal Computer Week. [ MORE NEWS: JPMorgan Chase customers see zero balances after technical glitch ] Such a deal would be significant for multiple reasons. First, there are
A vendor-independent comparison of NoSQL databases: Cassandra, HBase, MongoDB, Riak By Sergey Bushik, senior R&D engineer at Altoros Systems Inc., special to Network World October 22, 2012 04:26 PM ET "The more alternatives, the more difficult the choice." -- Abbe' D'Allanival In 2010, when the world became enchanted by the capabilities of cloud systems and new databases designed to serve them, a
Ever-improving Wi-Fi standards make for denser, faster Wi-Fi networks. The big news in wireless is the expected ratification of Wi-Fi 7 (802.11be) by the IEEE standards body early this year. Some vendors are already shipping pre-standard Wi-Fi 7 gear, and the Wi-Fi Alliance announced in January that it has begun certifying Wi-Fi 7 products. While the adoption of Wi-Fi 7 is expected to have the mos
However, there are various methods for sneaking malicious requests that violate these rules past WAFs by modifying certain parts of their headers or the paths of requested URLs. These are known as protocol-level evasion techniques, and WAFs are not properly equipped to deal with them at the moment because the techniques are not very well documented, Ristic said. The researcher tested the evasion t
Nine-minute film called '1944' was produced to inspire Apple sales team to take on IBM If all you want to see is Steve Jobs playfully portraying Franklin Delano Roosevelt – right down to the cigarette holder – here’s that short clip before we get to the longer version of the film that it’s taken from and an explanation: Entitled “1944,” the almost 9-minute full version was Apple’s in-house takeoff
What happens when a bunch of IETF super nerds show up in Paris for a major conference and discover their hotel's Wi-Fi network has imploded? They give it an Extreme Wi-Fi Makeover. MILESTONES: A brief history of Cisco STANDARDS: IETF explores new working group on identity management in the cloud The Internet Engineering Task Force (IETF), which sets a range of Internet standards, gathers for its
A tutorial on the Open Systems Interconnection (OSI) networking reference model plus tips on how to memorize the seven layers. The Open Systems Interconnect (OSI) model is a conceptual framework that describes networking or telecommunications systems as seven layers, each with its own function. The layers help network pros visualize what is going on within their networks and can help network manag
10 technologies that will change the world in the next 10 years 3D printers, sensor networks, virtual humans and other technologies under development now will drastically change our world in the decade to come, according to Cisco chief futurist Dave Evans As computational power rises exponentially, not linearly, so does the rate of change -- and that means the next 10 years should pack in far more
ChromeBy Anonymous on June 13, 2011, 10:48 pmAn interesting question would be: Why Chrome rather than Chromium?Reply | Read entire commentChrome and Chromium are pretty much the same thingBy Jon Brodkin on June 13, 2011, 11:04 pmTrue. To be honest, I didn't ask him (we talked about many topics and we were jumping from one to another). In any case, They could certainly do Chromium. But both...Reply
Many IT people, who are unfamiliar with IPv6, believe the responsibility for IPv6 deployment falls on the network-teams. However, those who are knowledgeable about IPv6 realize the migration to IPv6 will involve any system that uses an IP address. As the network teams prepare the infrastructure for the addition of IPv6 we should alert our application developers and make sure they are ready for the
AI is driving new cyber threats. Zero Trust with AI is ready for the fight Zscaler is putting its own AI to work, protecting against emerging cyber threats and helping organizations embrace the potential of AI, without compromising security. Several years back, my security team and I noticed that the four walls of legacy perimeter-based security were eroding. As a respected leader in the electroni
Steve Jobs doesn't email Apple customers often, but when he does, his responses are always short and to the point When The Little App Factory received a legal letter from Apple requesting that they change the name of their popular Mac app, “iPodRip”, CEO John Devor decided to pen a heartfelt email to Apple CEO Steve Jobs himself. iPodRip, in case you’re unaware, is a nifty little Mac app that ena
Cisco revamps key DevNet sandboxesNew and upgraded DevNet sandboxes from Cisco are dedicated to Catalyst Center, CI/CD pipelines for infrastructure automation, and Meraki products.
次のページ
このページを最初にブックマークしてみませんか?
『Network World』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く