サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
レイングッズ
www.networkworld.com
Open source security frameworks help enterprises stay one step ahead of attackers by facilitating penetration testing and vulnerability assessments on wired and wireless networks. Picking just 10 Linux open source security tools isn’t easy, especially when network professionals and security experts have dozens if not several hundred tools available to them. There are different sets of tools for ju
Amazon Web Services has rolled out a new, more native way to connect SD-WAN infrastructures with AWS resources. Introduced at its re:Invent virtual event, AWS Transit Gateway Connect promises a simpler, faster, and more secure way for customers to tie cloud-based resources back to data centers, remote office workers or other distributed access points as needed. Thirteen networking vendors includin
Bryan is a writer and works as the Social Media Marketing Manager of SUSE. On this blog, he seeks to highlight the coolest things happening in the Linux world. What is MINIX? The most popular OS in the world, thanks to Intel You might not know it, but inside your Intel system, you have an operating system running in addition to your main OS that is raising eyebrows and concerns. It's called MINNIX
In addition to my editing duties, I have written Buzzblog since January, 2006. Feel free to e-mail me at buzz@nww.com. MIT is selling half of its 16 million valuable IPv4 addresses – an increasingly scarce stash it has held since the birth of the Internet. While details of the sale have not been made public, at least some of those addresses have already been transferred to Amazon. MIT says it will
Deep dive on AWS vs. Azure vs. Google cloud storage options Comparing block, object and file storage across the three providers One of the most common use cases for public IaaS cloud computing is storage and that’s for good reason: Instead of buying hardware and managing it, users simply upload data to the cloud and pay for how much they put there. +MORE AT NETWORK WORLD: Battle of the clouds: AWS
Thought-provoking commentary on technologies that are changing the way mankind does things. Just one autonomous car will use 4,000 GB of data/day Self-driving cars will soon create significantly more data than people—3 billion people’s worth of data, according to Intel Two real-life, practical, semi-autonomous vehicle launches next year are an indication that the self-driving car is really happeni
For more than 30 years, Gibbs has advised on and developed product and service marketing for many businesses and he has consulted, lectured, and authored numerous articles and books. Cluster HAT, the easiest way to build a Raspberry Pi Zero cluster One HAT, four Zeros, and one controller Raspberry Pi and for under $100 you have a cluster I recently compiled a list of Raspberry Pi clusters and read
In addition to my editing duties, I have written Buzzblog since January, 2006. Feel free to e-mail me at buzz@nww.com. Cisco says router bug could be result of ‘cosmic radiation’ … Seriously? UPDATED: See Cisco's further explanation below A Cisco bug report addressing “partial data traffic loss” on the company’s ASR 9000 Series routers contends that a “possible trigger is cosmic radiation causing
IT pros average 52-hour workweek Employees in small IT departments tend to work more hours than those in large IT departments It’s no surprise that a majority of IT pros work more than 40 hours per week, but it’s interesting to learn that some are putting in significantly longer workweeks, according to new survey data from Spiceworks. Among 600 IT pros surveyed, 54% said they work more than 40 hou
ARIN Finally Runs Out of IPv4 Addresses IPv4 Address Cupboards are Bare in North America. It is often said, "the Internet is running out of phone numbers," as a way to express that the Internet is running out of IPv4 addresses, to those who are unfamiliar with Internet technologies. IPv4 addresses, like phone numbers are assigned hierarchically, and thus, have inherent inefficiency. The world’s In
NSA uses OpenFlow for tracking... its network Spy agency uses SDN to keep tabs on IT inventory, simplify operations SANTA CLARA -- Just as the industry is becoming more comfortable with SDNs, the NSA says it’s using them too. The embattled National Security Agency, which has been surreptitiously collecting phone records on all of us for many years as part of a secret surveillance operation, is imp
I was sitting in on the Peering BOF at NANOG a couple of weeks ago, and there was a discussion of Non-Stop Forwarding (NSF), Non-Stop Routing (NSR), and Graceful Restart (GR). It became apparent in the discussion that a couple of the participants were not making clear distinctions among these functions (or at least the acronyms), which are in fact quite different. Confusion about these and a few r
The internet of things (IoT) is a network of connected smart devices providing rich data, but it can also be a security nightmare. The internet of things (IoT) is a catch-all term for the growing number of electronics that aren’t traditional computing devices, but are connected to the internet to send data, receive instructions, or both. An incredibly broad range of ‘things’ that fall under the Io
Frequent spanning tree protocol misconfigurations cause network problems Ethernet devices running the Spanning Tree Protocol (STP) have been implemented in networks since the early 1990s. Many organizations take STP for granted and do not configure it per industry best practices. STP errors are very common and during the past 15 years we have witnessed the same errors being made over-and-over agai
Apple iOS 7 surprises as first with new multipath TCP connections Network World - Apple's iOS 7 is the first large-scale use of a newly-minted Internet protocol, called multipath TCP. It lets computers send and receive data across different network paths and interfaces at the same time, such as Ethernet, Wi-Fi and 3G. There is evidence [see screen shot below that Apple is using the new protocol fo
By Julie Sartain, Network World August 19, 2013 06:02 AM ET Network World - We caught up with the pioneers who brought us the Unix operating system and asked them to share some memories of the early days of Unix development. Unix co-developer Ken Thompson worked at Bell Labs from 1966 until he retired in December 2000. He recalls this prank: “The Unix room was on the sixth floor at one end of Bell
Hackers turn a Canon EOS camera into a remote surveillance tool The Canon EOS 1D-X camera is not designed with security in mind, a researcher said IDG News Service - The high-end Canon EOS-1D X camera can be hacked for use as a remote surveillance tool, with images remotely downloaded, erased and uploaded, a researcher said during the Hack in the Box security conference in Amsterdam on Wednesday.
Network World - In what's being described as a "radical shift" in its cloud strategy, the CIA has signed a reported $600 million, 10-year deal with Amazon Web Services (AWS) to build a private cloud, according to a story in Federal Computer Week. [ MORE NEWS: JPMorgan Chase customers see zero balances after technical glitch ] Such a deal would be significant for multiple reasons. First, there are
A vendor-independent comparison of NoSQL databases: Cassandra, HBase, MongoDB, Riak By Sergey Bushik, senior R&D engineer at Altoros Systems Inc., special to Network World October 22, 2012 04:26 PM ET "The more alternatives, the more difficult the choice." -- Abbe' D'Allanival In 2010, when the world became enchanted by the capabilities of cloud systems and new databases designed to serve them, a
Ever-improving Wi-Fi standards make for denser, faster Wi-Fi networks. The big news in wireless is the expected ratification of Wi-Fi 7 (802.11be) by the IEEE standards body early this year. Some vendors are already shipping pre-standard Wi-Fi 7 gear, and the Wi-Fi Alliance announced in January that it has begun certifying Wi-Fi 7 products. While the adoption of Wi-Fi 7 is expected to have the mos
However, there are various methods for sneaking malicious requests that violate these rules past WAFs by modifying certain parts of their headers or the paths of requested URLs. These are known as protocol-level evasion techniques, and WAFs are not properly equipped to deal with them at the moment because the techniques are not very well documented, Ristic said. The researcher tested the evasion t
In addition to my editing duties, I have written Buzzblog since January, 2006. Feel free to e-mail me at buzz@nww.com. EXCLUSIVE: Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial Nine-minute film called '1944' was produced to inspire Apple sales team to take on IBM If all you want to see is Steve Jobs playfully portraying Franklin Delano Roosevelt - r
What happens when a bunch of IETF super nerds show up in Paris for a major conference and discover their hotel's Wi-Fi network has imploded? They give it an Extreme Wi-Fi Makeover. MILESTONES: A brief history of Cisco STANDARDS: IETF explores new working group on identity management in the cloud The Internet Engineering Task Force (IETF), which sets a range of Internet standards, gathers for its
A tutorial on the Open Systems Interconnection networking reference model and tips on and how to memorize the seven layers The Open Systems Interconnect (OSI) model is a conceptual framework that describes networking or telecommunications systems as seven layers, each with its own function. The layers help network pros visualize what is going on within their networks and can help network managers
10 technologies that will change the world in the next 10 years 3D printers, sensor networks, virtual humans and other technologies under development now will drastically change our world in the decade to come, according to Cisco chief futurist Dave Evans As computational power rises exponentially, not linearly, so does the rate of change -- and that means the next 10 years should pack in far more
ChromeBy Anonymous on June 13, 2011, 10:48 pmAn interesting question would be: Why Chrome rather than Chromium?Reply | Read entire commentChrome and Chromium are pretty much the same thingBy Jon Brodkin on June 13, 2011, 11:04 pmTrue. To be honest, I didn't ask him (we talked about many topics and we were jumping from one to another). In any case, They could certainly do Chromium. But both...Reply
Scott Hogg is a co-founder of HexaBuild.io, an IPv6 consulting and training firm, and has over 25 years of cloud, networking and security experience. Top 10 Tasks for IPv6 Application Developers Things to consider when creating dual-protocol applications Many IT people, who are unfamiliar with IPv6, believe the responsibility for IPv6 deployment falls on the network-teams. However, those who are k
The company has been looking to divest non-core parts of its business, including the end-user computing unit and Carbon Black post its acquisition of VMware in November for $69 billion. Chipmaker Broadcom could be looking to sell off its end-user computing business for $3.8 billion as part of its plans to divest non-core business units post its acquisition of VMware in November for $69 billion. Ac
Steve Jobs doesn't email Apple customers often, but when he does, his responses are always short and to the point When The Little App Factory received a legal letter from Apple requesting that they change the name of their popular Mac app, “iPodRip”, CEO John Devor decided to pen a heartfelt email to Apple CEO Steve Jobs himself. iPodRip, in case you’re unaware, is a nifty little Mac app that ena
次のページ
このページを最初にブックマークしてみませんか?
『Network World』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く