OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
LinuxInsider.com
What SMBs Want From IT Services
May 16, 2016
When small businesses choose an IT and support service provider, the two most important considerations are the provider's ability to include all of the company's devices and provide a comprehensive IT service plan. More than half of small businesses that use professional IT services use two or more services. However, small businesses may have to rely on multiple vendors to address their IT needs.
Linux Foundation Badges Aim to Separate Wheat From Chaff
May 4, 2016
The Linux Foundation's Core Infrastructure Initiative project on Tuesday announced a free badge program to help foster security, quality and stability in open source software projects. Through an online app, the CII lets devs determine whether they're following best practices, generally within an hour or so. If they are, they'll receive the badge, which they can display on GitHub and other online properties.
App Dev Today
April 27, 2016
Last year, I researched the impact of the proliferation of cloud computing on business. I know it sounds like a dry topic, but if you are a CIO or an application development manager, the results can have serious meaning. Cloud computing has deeply penetrated the enterprise and SMB ranks, and 46.3 percent of respondents said they had four or more cloud applications in use.
Ubuntu 16.04 LTS Xenial Xerus Makes Its Debut
April 20, 2016
Canonical on Thursday launched Ubuntu 16.04, aka "Xenial Xerus," an upgrade that will be supported for the next five years. The latest version for all desktop, server and cloud editions will be available for download starting Thursday. Ubuntu 16.04 includes four major technology advancements geared toward multiplatform uses. Xenial Xerus is the sixth Long Term Support release for Ubuntu.
Greenwave Brings Unity to IoT Networks
February 23, 2016
Greenwave Systems on Monday announced the expansion of its AXON Platform to unite mobile machine-to-machine and residential IoT networks into one fully manageable network service. Mobile carriers, telecommunications operators and service providers can use AXON for Mobile IoT to integrate a variety of communications protocols into the same standard IP-based language.
Cisco Aims to Pin Down Shadow IT
January 15, 2016
Cisco has unveiled Cloud Consumption as a Service to help enterprises discover and continually monitor public cloud use -- aka "shadow IT" -- across their systems. Shadow IT systems in an enterprise or organization expose it to security risks and hidden costs, and may give rise to compliance issues. Organizations are using up to 20 times more cloud services than IT is aware of, according to Cisco.
Juniper Networks Shortens ScreenOS Threat List
December 21, 2015
Juniper Networks on Sunday informed customers that recent security threats to its ScreenOS were not as widespread as initially believed. The company last week issued an alert following its discovery in ScreenOS of unauthorized code that could allow an attacker to gain administrative control of devices using Netscreen or to decrypt a VPN. The two issues are unrelated to each other.
Ready or Not, Enterprise Appification Is Here
December 21, 2015
Portfolios of task-oriented mobile apps for employees, contractors and business partners have been transforming the way enterprises conduct business, Apperian reported last week. Companies that have launched mobility initiatives have customized and deployed one or more apps that have streamlined business operations, according to the firm's analysis of 2 million app deployments.
Cisco and Ericsson Hook Up for IoT Network
November 10, 2015
Cisco and Ericsson on Monday announced a partnership to build out a next-generation network for smart things and the carriers and enterprises that want to support such devices. The deal plays to the companies' strengths in cloud, data center, mobility, management, networking, routing and global services, they said. Each company expects to earn about US$1 billion in revenue by 2018 from the deal.
Europe's New Net Neutrality Law Draws Jeers
October 28, 2015
The European Parliament on Tuesday passed Net neutrality legislation to a chorus of boos from Net neutrality proponents. The European Union has found consensus on the common principles of Net neutrality -- no blocking, no throttling and no prepaid prioritization -- said Commissioner GŁnther H. Oettinger. However, the rules have three major loopholes, Net neutrality supporters said.
ONOS Project Gets Linux Foundation Bump
October 15, 2015
The Linux Foundation has announced a strategic partnership with ON.Lab and its ONOS project community to develop open source network services. They will build infrastructure for software-defined networking and network function virtualization technology. The foundation will provide its global reach, experience and infrastructure to seed ONOS' growing community.
Linux Foundation Security Checklist: Have It Your Way
September 6, 2015
The Linux Foundation's recently published security checklist may draw more attention to best practices for protecting Linux workstations, even if IT pros do not embrace all of its recommendations. Konstantin Ryabitsev, the foundation's director of collaborative IT services, developed the list for the use of LF remote sysadmins, to harden their laptops against attacks.
Shadow IT Feeds 'Man in the Cloud' Attacks
August 27, 2015
Shadow IT -- the use of unauthorized online services by company employees -- is a concern of cyberwarriors charged with defending business systems against network attacks. There's new evidence that those concerns are justified. A new attack vector on business systems leverages the synchronization features of services like Dropbox and Google Drive to perform malicious mischief.
OpenDaylight Project Picks Up Steam
July 30, 2015
The OpenDaylight Project this week announced that AT&T, ClearPath Networks and Nokia Networks have joined, bringing its membership total to 359. OpenDaylight is a collaborative open source project hosted by the Linux Foundation. Its goal is twofold: accelerate the adoption of software-defined networking; and create a solid foundation for network functions virtualization.
Is Isolating the Internet Key to Bulletproof Security?
July 7, 2015
With so many cybersecurity pros drowning in an ever-rising tide of hack attacks on their computer systems, an emerging approach to defending those systems may be the life preserver they've been looking for. The approach doesn't involve beefing up perimeter defenses, carefully scrutinizing network traffic, or applying analytics to employee behavior.
Poll Highlights Container Security Concerns
July 6, 2015
The results of a recent survey on container usage trends suggest that a deployment surge is likely within the next two years -- but also that companies have serious concerns about container security, certification and skills. The survey, commissioned by Red Hat and conducted by TechValidate, assessed enterprise adoption plans for application containers.
Cisco Erects 6 Pillars for the IoT
June 29, 2015
Cisco on Monday launched Cisco IoT System -- a new Internet of Things initiative comprised of 15 products geared toward improving device interoperability. As many as 50 billion devices and objects could be connected to the Internet by 2020, the company forecast, yet today more than 99 percent of things in the physical world currently are unconnected.
Linux Foundation Beefs Up Scholarship Program
June 17, 2015
The Linux Foundation on Wednesday announced that it was more than doubling the number of scholarships to be awarded this year for Linux training. The Linux Foundation is a nonprofit organization dedicated to accelerating the growth of Linux and collaborative development. Its announcement opened the door for the submission of applications for the 2015 Linux Training Scholarship Program.
Are Feds Losing the Cybersecurity Fight?
May 27, 2015
U.S. government agencies have invested time, effort and significant funding in the last several years to meet the challenges of cybersecurity threats, but the payoff has been disappointing, according to a report from the ISC2 Foundation. As part of its seventh Global Information Security Workforce Study, the foundation included a section that involved a survey of 1,800 federal IT professionals.
Venom Less Toxic Than Heartbleed
May 20, 2015
It was a little over a year ago that the Heartbleed bug shocked the Internet with its potential for mischief. Now another flaw in open source code has sent network administrators into damage control mode. The bug, called "Venom" for "Virtualized Environment Neglected Operations Manipulation," allows an intruder to jump out of a virtual machine and execute malicious code on its host.
5 IT Security Implementation Myths
May 19, 2015
There's a common perception that implementing comprehensive IT security to protect against today's sophisticated threats and attacks is a difficult and expensive task, and that the benefits of replacing current solutions (even if highly ineffective) are seldom worthwhile. This mindset has resulted in many businesses dealing with a virtual patchwork of disparate systems.
Venom Vulnerability Could Violate Virtual Machines
May 14, 2015
Crowdstrike on Wednesday made public its discovery of yet another long-buried Linux vulnerability. "Venom," as it has been dubbed, was unearthed by the firm's senior security researcher, Jason Geffner. It is listed as vulnerability CVE-2015-3456. Venom exists in the virtual floppy drive code used by virtualization platforms based on QEMU, or quick emulator. It has been around since 2004.
Feds Value - but Don't Always Use - Big Data Tools for Cybersecurity
May 13, 2015
U.S. government agencies can significantly improve their ability to deal with cybersecurity problems by utilizing big data analytics. However, agencies are finding it difficult to fully benefit from these advanced analytical tools for a variety of reasons -- including dealing with the sheer volume of data. Cyberthreats hide in plain sight, suggests a recent report from MeriTalk.
Microsoft Fires Up Its Business Engines
May 5, 2015
Microsoft on Monday announced a slew of products and services for IT professionals at its first Ignite conference, being held in Chicago through Friday. Among them were the Microsoft Azure Stack, its next-generation hybrid cloud, and Windows Update for Business, a new management option for Windows 10 that will keep devices up to date with the latest security updates and Windows features.
Capitalizing on the Cloud
March 6, 2015
I've been traversing North America keynoting a series of cloud events hosted by Oracle. At every stop of the roadshow my comments regarding the opportunity to transform traditional product businesses into powerful information services via cloud-based alternatives has generated the greatest interest among enterprise decision-makers and software developers alike.
Relax, You're Surrounded
February 25, 2015
I don't know how many old movies there are in which the good guys say, "You're surrounded, come out with your hands up!" Somehow being surrounded is a bad thing -- or at least it was -- until it became a hot trend in the back office. Let me explain. Surrounding legacy systems, such as conventional ERP, is proving to be a good idea for a bunch of reasons.
IT's 10 Steps to IoT Success
January 9, 2015
This past week's International CES brought even greater attention to the seemingly infinite opportunities being created by the rapidly evolving Internet of Things. However, it also created plenty of hype that can become pitfalls for companies that are not properly prepared to achieve the promise of the IoT. There are 10 steps IT organizations must take to help pave the way to success.
Misfortune Cookie Crumbles Millions of Security Systems
December 29, 2014
Check Point Software Technologies recently revealed a flaw in millions of routers that allows the devices to be controlled by hackers. The company detected 12 million Internet-connected devices that have the flaw. The vulnerability, which Check Point dubbed "Misfortune Cookie," can be found in the code of a commonly used embedded Web server, RomPager from AllegroSoft.
'The Practice of Cloud System Administration' Brings Network Management Down to Earth
November 25, 2014
The Practice of Cloud System Administration, Volume 2 is a look into IT gone bad in some companies, and how doing it right can salvage enterprise use of cloud computing. The authors make 11 statements about computers and their networks on the first page of the book's preface. They ask which statements are true. You most likely will get numerous wrong answers.
Wristband Heads Off Password Headaches
November 25, 2014
Has software glut got you down? Do you reuse passwords because creating unique ones for all your online accounts would cause a memory overload? If so, you may be interested in a bit of jewelry called the "Everykey," by a startup with the same name. Everykey is a wristband that removes the need to remember the countless log-in credentials we use every day.
See More Articles in Network Management Section >>
Facebook Twitter LinkedIn Google+ RSS
Google just announced Home, a voice-activated speaker similar to Amazon's Echo. What do you think of these devices?
I have an Echo and I love it.
I have an Echo but rarely use it.
I plan to buy an Echo or Home.
Google's Home will be much better than Echo.
They're expensive novelties.
They're intrusive and creepy.